Sample records for tactical vulnerability assessment

  1. Spatiotemporal heterogeneity in prey abundance and vulnerability shapes the foraging tactics of an omnivore

    USGS Publications Warehouse

    Rayl, Nathaniel; Bastille-Rousseau, Guillaume; Organ, John F.; Mumma, Matthew; Mahoney, Shane P.; Soulliere, Colleen; Lewis, Keith; Otto, Robert; Murray, Dennis; Waits, Lisette; Fuller, Todd

    2018-01-01

    Prey abundance and prey vulnerability vary across space and time, but we know little about how they mediate predator–prey interactions and predator foraging tactics. To evaluate the interplay between prey abundance, prey vulnerability and predator space use, we examined patterns of black bear (Ursus americanus) predation of caribou (Rangifer tarandus) neonates in Newfoundland, Canada using data from 317 collared individuals (9 bears, 34 adult female caribou, 274 caribou calves).During the caribou calving season, we predicted that landscape features would influence calf vulnerability to bear predation, and that bears would actively hunt calves by selecting areas associated with increased calf vulnerability. Further, we hypothesized that bears would dynamically adjust their foraging tactics in response to spatiotemporal changes in calf abundance and vulnerability (collectively, calf availability). Accordingly, we expected bears to actively hunt calves when they were most abundant and vulnerable, but switch to foraging on other resources as calf availability declined.As predicted, landscape heterogeneity influenced risk of mortality, and bears displayed the strongest selection for areas where they were most likely to kill calves, which suggested they were actively hunting caribou. Initially, the per‐capita rate at which bears killed calves followed a type‐I functional response, but as the calving season progressed and calf vulnerability declined, kill rates dissociated from calf abundance. In support of our hypothesis, bears adjusted their foraging tactics when they were less efficient at catching calves, highlighting the influence that predation phenology may have on predator space use. Contrary to our expectations, however, bears appeared to continue to hunt caribou as calf availability declined, but switched from a tactic of selecting areas of increased calf vulnerability to a tactic that maximized encounter rates with calves.Our results reveal that

  2. Spatiotemporal heterogeneity in prey abundance and vulnerability shapes the foraging tactics of an omnivore.

    PubMed

    Rayl, Nathaniel D; Bastille-Rousseau, Guillaume; Organ, John F; Mumma, Matthew A; Mahoney, Shane P; Soulliere, Colleen E; Lewis, Keith P; Otto, Robert D; Murray, Dennis L; Waits, Lisette P; Fuller, Todd K

    2018-05-01

    Prey abundance and prey vulnerability vary across space and time, but we know little about how they mediate predator-prey interactions and predator foraging tactics. To evaluate the interplay between prey abundance, prey vulnerability and predator space use, we examined patterns of black bear (Ursus americanus) predation of caribou (Rangifer tarandus) neonates in Newfoundland, Canada using data from 317 collared individuals (9 bears, 34 adult female caribou, 274 caribou calves). During the caribou calving season, we predicted that landscape features would influence calf vulnerability to bear predation, and that bears would actively hunt calves by selecting areas associated with increased calf vulnerability. Further, we hypothesized that bears would dynamically adjust their foraging tactics in response to spatiotemporal changes in calf abundance and vulnerability (collectively, calf availability). Accordingly, we expected bears to actively hunt calves when they were most abundant and vulnerable, but switch to foraging on other resources as calf availability declined. As predicted, landscape heterogeneity influenced risk of mortality, and bears displayed the strongest selection for areas where they were most likely to kill calves, which suggested they were actively hunting caribou. Initially, the per-capita rate at which bears killed calves followed a type-I functional response, but as the calving season progressed and calf vulnerability declined, kill rates dissociated from calf abundance. In support of our hypothesis, bears adjusted their foraging tactics when they were less efficient at catching calves, highlighting the influence that predation phenology may have on predator space use. Contrary to our expectations, however, bears appeared to continue to hunt caribou as calf availability declined, but switched from a tactic of selecting areas of increased calf vulnerability to a tactic that maximized encounter rates with calves. Our results reveal that generalist

  3. Review of the tactical evaluation tools for youth players, assessing the tactics in team sports: football.

    PubMed

    González-Víllora, Sixto; Serra-Olivares, Jaime; Pastor-Vicedo, Juan Carlos; da Costa, Israel Teoldo

    2015-01-01

    For sports assessment to be comprehensive, it must address all variables of sports development, such as psychological, social-emotional, physical and physiological, technical and tactical. Tactical assessment has been a neglected variable until the 1980s or 1990s. In the last two decades (1995-2015), the evolution of tactical assessment has grown considerably, given its importance in game performance. The aim of this paper is to compile and analyze different tactical measuring tools in team sports, particularly in soccer, through a bibliographical review. Six tools have been selected on five different criteria: (1) Instruments which assess tactics, (2) The studies have an evolution approach related to the tactical principles, (3) With a valid and reliable method, (4) The existence of publications mentioning the tool in the method, v. Applicable in different sports contexts. All six tools are structured around seven headings: introduction, objective(s), tactical principles, materials, procedures, instructions/rules of the game and published studies. In conclusion, the teaching-learning processes more tactical oriented have useful tactical assessment instrument in the literature. The selection of one or another depends some context information, like age and level of expertise of the players.

  4. Cyber threat model for tactical radio networks

    NASA Astrophysics Data System (ADS)

    Kurdziel, Michael T.

    2014-05-01

    The shift to a full information-centric paradigm in the battlefield has allowed ConOps to be developed that are only possible using modern network communications systems. Securing these Tactical Networks without impacting their capabilities has been a challenge. Tactical networks with fixed infrastructure have similar vulnerabilities to their commercial counterparts (although they need to be secure against adversaries with greater capabilities, resources and motivation). However, networks with mobile infrastructure components and Mobile Ad hoc Networks (MANets) have additional unique vulnerabilities that must be considered. It is useful to examine Tactical Network based ConOps and use them to construct a threat model and baseline cyber security requirements for Tactical Networks with fixed infrastructure, mobile infrastructure and/or ad hoc modes of operation. This paper will present an introduction to threat model assessment. A definition and detailed discussion of a Tactical Network threat model is also presented. Finally, the model is used to derive baseline requirements that can be used to design or evaluate a cyber security solution that can be scaled and adapted to the needs of specific deployments.

  5. Tactical expertise assessment in youth football using representative tasks.

    PubMed

    Serra-Olivares, Jaime; Clemente, Filipe Manuel; González-Víllora, Sixto

    2016-01-01

    Specific football drills improve the development of technical/tactical and physical variables in players. Based on this principle, in recent years it has been possible to observe in daily training a growing volume of small-sided and conditioned games. These games are smaller and modified forms of formal games that augment players' perception of specific tactics. Despite this approach, the assessment of players' knowledge and tactical execution has not been well documented, due mainly to the difficulty in measuring tactical behavior. For that reason, this study aims to provide a narrative review about the tactical assessment of football training by using representative tasks to measure the tactical expertise of youth football players during small-sided and conditioned games. This study gives an overview of the ecological approach to training and the principles used for representative task design, providing relevant contribution and direction for future research into the assessment of tactical expertise in youth football.

  6. Capturing subregional variability in regional-scale climate change vulnerability assessments of natural resources.

    PubMed

    Buotte, Polly C; Peterson, David L; McKelvey, Kevin S; Hicke, Jeffrey A

    2016-03-15

    Natural resource vulnerability to climate change can depend on the climatology and ecological conditions at a particular site. Here we present a conceptual framework for incorporating spatial variability in natural resource vulnerability to climate change in a regional-scale assessment. The framework was implemented in the first regional-scale vulnerability assessment conducted by the US Forest Service. During this assessment, five subregional workshops were held to capture variability in vulnerability and to develop adaptation tactics. At each workshop, participants answered a questionnaire to: 1) identify species, resources, or other information missing from the regional assessment, and 2) describe subregional vulnerability to climate change. Workshop participants divided into six resource groups; here we focus on wildlife resources. Participants identified information missing from the regional assessment and multiple instances of subregional variability in climate change vulnerability. We provide recommendations for improving the process of capturing subregional variability in a regional vulnerability assessment. We propose a revised conceptual framework structured around pathways of climate influence, each with separate rankings for exposure, sensitivity, and adaptive capacity. These revisions allow for a quantitative ranking of species, pathways, exposure, sensitivity, and adaptive capacity across subregions. Rankings can be used to direct the development and implementation of future regional research and monitoring programs. The revised conceptual framework is equally applicable as a stand-alone model for assessing climate change vulnerability and as a nested model within a regional assessment for capturing subregional variability in vulnerability. Copyright © 2015 Elsevier Ltd. All rights reserved.

  7. Situation assessment in the Paladin tactical decision generation system

    NASA Technical Reports Server (NTRS)

    Mcmanus, John W.; Chappell, Alan R.; Arbuckle, P. Douglas

    1992-01-01

    Paladin is a real-time tactical decision generator for air combat engagements. Paladin uses specialized knowledge-based systems and other Artificial Intelligence (AI) programming techniques to address the modern air combat environment and agile aircraft in a clear and concise manner. Paladin is designed to provide insight into both the tactical benefits and the costs of enhanced agility. The system was developed using the Lisp programming language on a specialized AI workstation. Paladin utilizes a set of air combat rules, an active throttle controller, and a situation assessment module that have been implemented as a set of highly specialized knowledge-based systems. The situation assessment module was developed to determine the tactical mode of operation (aggressive, defensive, neutral, evasive, or disengagement) used by Paladin at each decision point in the air combat engagement. Paladin uses the situation assessment module; the situationally dependent modes of operation to more accurately represent the complex decision-making process of human pilots. This allows Paladin to adapt its tactics to the current situation and improves system performance. Discussed here are the details of Paladin's situation assessment and modes of operation. The results of simulation testing showing the error introduced into the situation assessment module due to estimation errors in positional and geometric data for the opponent aircraft are presented. Implementation issues for real-time performance are discussed and several solutions are presented, including Paladin's use of an inference engine designed for real-time execution.

  8. Unmanned Tactical Autonomous Control and Collaboration Threat and Vulnerability Assessment

    DTIC Science & Technology

    2015-06-01

    they are evaluated separately 15 from each other [19]. One major difference between this classification method and the FIPS 199 is that no...both technical and nontechnical methods ” [31]. These different methods will enable the UTACC system to effectively mitigate vulnerabilities that...team. Marines on the battlefield communicate with each other in many different and unique methods . UTACC must be adaptable to these different methods

  9. Review of the Instruments Most Frequently Employed to Assess Tactics in Physical Education and Youth Sports

    ERIC Educational Resources Information Center

    Arias, Jose L.; Castejon, Francisco Javier

    2012-01-01

    Investigators' increased interest in teaching game tactics requires generalizable assessment instruments that are appropriate to whatever is needed by the tactic. This literature review aims to provide information about the instruments most frequently used to assess tactics in youth sports. We found that very few studies used instruments that…

  10. MID-ATLANTIC REGIONAL VULNERABILITY ASSESSMENT

    EPA Science Inventory

    ORD's Regional Vulnerability Assessment (REVA) Program is developing and demonstrating approaches to assess current and future environmental vulnerabilities so that risk management activities can be targeted. The sister program to EMA.P (Environmental Monitoring Assessment Progr...

  11. Infrastructure Vulnerability Assessment Model (I-VAM).

    PubMed

    Ezell, Barry Charles

    2007-06-01

    Quantifying vulnerability to critical infrastructure has not been adequately addressed in the literature. Thus, the purpose of this article is to present a model that quantifies vulnerability. Vulnerability is defined as a measure of system susceptibility to threat scenarios. This article asserts that vulnerability is a condition of the system and it can be quantified using the Infrastructure Vulnerability Assessment Model (I-VAM). The model is presented and then applied to a medium-sized clean water system. The model requires subject matter experts (SMEs) to establish value functions and weights, and to assess protection measures of the system. Simulation is used to account for uncertainty in measurement, aggregate expert assessment, and to yield a vulnerability (Omega) density function. Results demonstrate that I-VAM is useful to decisionmakers who prefer quantification to qualitative treatment of vulnerability. I-VAM can be used to quantify vulnerability to other infrastructures, supervisory control and data acquisition systems (SCADA), and distributed control systems (DCS).

  12. Assessing the security vulnerabilities of correctional facilities

    NASA Astrophysics Data System (ADS)

    Spencer, Debra D.; Morrison, G. Steve

    1998-12-01

    The National Institute of Justice has tasked their satellite facility at Sandia National Laboratories and their Southeast Regional Technology Center in Charleston, South Carolina to devise new procedures and tools for helping correctional facilities to assess their security vulnerabilities. Thus, a team is visiting selected correctional facilities and performing vulnerability assessments. A vulnerability assessment helps identify the easiest paths for inmate escape, for introduction of contraband such as drugs or weapons, for unexpected intrusion from outside of the facility, and for the perpetration of violent acts on other inmates and correctional employees. In addition, the vulnerability assessment helps to quantify the security risks for the facility. From these assessments will come better procedures for performing vulnerability assessments in general at other correctional facilities, as well as the development of tools to assist with the performance of such vulnerability assessments.

  13. 6 CFR 27.215 - Security vulnerability assessments.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Security vulnerability assessments. 27.215... FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.215 Security vulnerability...-risk, the facility must complete a Security Vulnerability Assessment. A Security Vulnerability...

  14. Climate change vulnerability for species-Assessing the assessments.

    PubMed

    Wheatley, Christopher J; Beale, Colin M; Bradbury, Richard B; Pearce-Higgins, James W; Critchlow, Rob; Thomas, Chris D

    2017-09-01

    Climate change vulnerability assessments are commonly used to identify species at risk from global climate change, but the wide range of methodologies available makes it difficult for end users, such as conservation practitioners or policymakers, to decide which method to use as a basis for decision-making. In this study, we evaluate whether different assessments consistently assign species to the same risk categories and whether any of the existing methodologies perform well at identifying climate-threatened species. We compare the outputs of 12 climate change vulnerability assessment methodologies, using both real and simulated species, and validate the methods using historic data for British birds and butterflies (i.e. using historical data to assign risks and more recent data for validation). Our results show that the different vulnerability assessment methods are not consistent with one another; different risk categories are assigned for both the real and simulated sets of species. Validation of the different vulnerability assessments suggests that methods incorporating historic trend data into the assessment perform best at predicting distribution trends in subsequent time periods. This study demonstrates that climate change vulnerability assessments should not be used interchangeably due to the poor overall agreement between methods when considering the same species. The results of our validation provide more support for the use of trend-based rather than purely trait-based approaches, although further validation will be required as data become available. © 2017 The Authors. Global Change Biology Published by John Wiley & Sons Ltd.

  15. Using Instruments for Tactical Assessment in Physical Education and Extra-Curricular Sports

    ERIC Educational Resources Information Center

    Arias-Estero, José; Castejón, Francisco

    2014-01-01

    The aim was to analyse the features concerning the applicational purpose and strategy of the most common instruments used to assess game tactics both in Physical Education (PE) and in extra-curricular sport contexts. The review focused on two instruments: the Game Performance Assessment Instrument (GPAI) and the Team Sport Assessment Procedure…

  16. [Vulnerability of eco-economy in northern slope region of Tianshan Mountains].

    PubMed

    Wu, Jian-zhai; Li, Bo; Zhang, Xin-shi; Zhao, Wen-wu; Jiang, Guang-hui

    2008-04-01

    Based on the theoretical meaning of vulnerability, a vulnerability assessment of eco-econom in fifteen counties in the northern slope region of Tianshan Mountains was conducted. The ecosystem services change to land use was regarded as the impact, and based on the fourteen indices from resource holding, society development, and economy development statistic data, the adaptive ability was evaluated by using the methods of analytic hierarchy process (AHP) and fuzzy synthetic evaluation. On the basis of assessment results of impact and adaptive capacity, the fifteen counties were divided into five classes under the assessment principles, and the district with higher-class number was of more vulnerability. The first class included Usu City and Changji City, the second class included Hutubi County, Miquan County, Fukang City, Jimsar County, Qitai County and Mori Kazak Autonomous County, the third class included Karamay City and Urumqi City, the fourth class included Kuitun City and Shawan County, and the fifth class included Jinghe County, Shihezi City and Manas County. The vulnerability reflected the level of eco-environment change and socioeconomic development, and the vulnerability assessment could be a good way to ensure the sustainable development. Aiming to decrease the vulnerability, various districts belonging to different class of vulnerability should establish relevant tactics according to the vulnerability factors to accelerate the region's sustainable development.

  17. Assessing European wild fire vulnerability

    NASA Astrophysics Data System (ADS)

    Oehler, F.; Oliveira, S.; Barredo, J. I.; Camia, A.; Ayanz, J. San Miguel; Pettenella, D.; Mavsar, R.

    2012-04-01

    Wild fire vulnerability is a measure of potential socio-economic damage caused by a fire in a specific area. As such it is an important component of long-term fire risk management, helping policy-makers take informed decisions about adequate expenditures for fire prevention and suppression, and to target those regions at highest risk. This paper presents a first approach to assess wild fire vulnerability at the European level. A conservative approach was chosen that assesses the cost of restoring the previous land cover after a potential fire. Based on the CORINE Land Cover, a restoration cost was established for each land cover class at country level, and an average restoration time was assigned according to the recovery capacity of the land cover. The damage caused by fire was then assessed by discounting the cost of restoring the previous land cover over the restoration period. Three different vulnerability scenarios were considered assuming low, medium and high fire severity causing different levels of damage. Over Europe, the potential damage of wild land fires ranges from 10 - 13, 732 Euro*ha-1*yr-1 for low fire severity, 32 - 45,772 Euro*ha-1*yr-1 for medium fire severity and 54 - 77,812 Euro*ha-1*yr-1 for high fire severity. The least vulnerable are natural grasslands, moors and heathland and sclerophyllous vegetation, while the highest cost occurs for restoring broad-leaved forest. Preliminary validation comparing these estimates with official damage assessments for past fires shows reasonable results. The restoration cost approach allows for a straightforward, data extensive assessment of fire vulnerability at European level. A disadvantage is the inherent simplification of the evaluation procedure with the underestimation of non-markets goods and services. Thus, a second approach has been developed, valuing individual wild land goods and services and assessing their annual flow which is lost for a certain period of time in case of a fire event. However

  18. Mountain torrents: Quantifying vulnerability and assessing uncertainties

    PubMed Central

    Totschnig, Reinhold; Fuchs, Sven

    2013-01-01

    Vulnerability assessment for elements at risk is an important component in the framework of risk assessment. The vulnerability of buildings affected by torrent processes can be quantified by vulnerability functions that express a mathematical relationship between the degree of loss of individual elements at risk and the intensity of the impacting process. Based on data from the Austrian Alps, we extended a vulnerability curve for residential buildings affected by fluvial sediment transport processes to other torrent processes and other building types. With respect to this goal to merge different data based on different processes and building types, several statistical tests were conducted. The calculation of vulnerability functions was based on a nonlinear regression approach applying cumulative distribution functions. The results suggest that there is no need to distinguish between different sediment-laden torrent processes when assessing vulnerability of residential buildings towards torrent processes. The final vulnerability functions were further validated with data from the Italian Alps and different vulnerability functions presented in the literature. This comparison showed the wider applicability of the derived vulnerability functions. The uncertainty inherent to regression functions was quantified by the calculation of confidence bands. The derived vulnerability functions may be applied within the framework of risk management for mountain hazards within the European Alps. The method is transferable to other mountain regions if the input data needed are available. PMID:27087696

  19. Social vulnerability assessment: a growing practice in Europe?

    NASA Astrophysics Data System (ADS)

    Tapsell, S.; McC arthy, S.

    2012-04-01

    This paper builds upon work on social vulnerability from the CapHaz-Net consortium, an ongoing research project funded by the European Commission in its 7th Framework Programme. The project focuses on the social dimensions of natural hazards, as well as on regional practices of risk prevention and management, and aims at improving the resilience of European societies to natural hazards, paying particular attention to social capacity building. The topic of social vulnerability is one of seven themes being addressed in the project. There are various rationales for examining the relevance of social vulnerability to natural hazards. Vulnerability assessment has now been accepted as a requirement for the effective development of emergency management capability, and assessment of social vulnerability has been recognised as being integral to understanding the risk to natural hazards. The aim of our research was to examine social vulnerability, how it might be understood in the context of natural hazards in Europe, and how social vulnerability can be addressed to increase social capacity. The work comprised a review of research on social vulnerability to different natural hazards within Europe and included concepts and definitions of social vulnerability (and related concepts), the purpose of vulnerability assessment and who decides who is vulnerable, different approaches to assessing or measuring social vulnerability (such as the use of 'classical' quantitative vulnerability indicators and qualitative community-based approaches, along with the advantages and disadvantages of both), conceptual frameworks for assessing social vulnerability and three case studies of social vulnerability studies within Europe: flash floods in the Italian Alps, fluvial flooding in Germany and heat waves in Spain. The review reveals variable application of social vulnerability analysis across Europe and there are indications why this might be the case. Reasons could range from the scale of

  20. Vulnerability Assessment and Adaptation Framework, Third Edition

    DOT National Transportation Integrated Search

    2017-11-01

    The Federal Highway Administrations (FHWAs) Vulnerability Assessment and Adaptation Framework (the Framework), third edition, is a manual to help transportation agencies and their partners assess the vulnerability of transportation infrastructu...

  1. 77 FR 28894 - Maritime Vulnerability Self-Assessment Tool

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-16

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Maritime Vulnerability Self... maritime vulnerability self- assessment tool. SUMMARY: The Transportation Security Administration (TSA... conducting vulnerability assessments became available and usage of the TMSARM has dropped off considerably...

  2. Climate change & extreme weather vulnerability assessment framework.

    DOT National Transportation Integrated Search

    2012-12-01

    The Federal Highway Administrations (FHWAs) Climate Change and Extreme Weather Vulnerability : Assessment Framework is a guide for transportation agencies interested in assessing their vulnerability : to climate change and extreme weather event...

  3. Warfighter Information Network - Tactical (WIN-T) Increment 2: Second Follow-on Operational Test and Evaluation

    DTIC Science & Technology

    2015-05-01

    HNW line-of-sight network is mounted on a 10-meter telescoping mast located just aft of the TCN’s cab. The flat plate Range Throughput Extension Kit... TAC – Tactical Command Post ATH – At-the-Halt PoP – Point of Presence SNE – Soldier Network Extension NOSC – Network Operations & Security...Survivability/Lethality Analysis Directorate (ARL/SLAD) conducted a Cooperative Vulnerability and Penetration Assessment on WIN-T Increment 2. The Army

  4. VuWiki: An Ontology-Based Semantic Wiki for Vulnerability Assessments

    NASA Astrophysics Data System (ADS)

    Khazai, Bijan; Kunz-Plapp, Tina; Büscher, Christian; Wegner, Antje

    2014-05-01

    The concept of vulnerability, as well as its implementation in vulnerability assessments, is used in various disciplines and contexts ranging from disaster management and reduction to ecology, public health or climate change and adaptation, and a corresponding multitude of ideas about how to conceptualize and measure vulnerability exists. Three decades of research in vulnerability have generated a complex and growing body of knowledge that challenges newcomers, practitioners and even experienced researchers. To provide a structured representation of the knowledge field "vulnerability assessment", we have set up an ontology-based semantic wiki for reviewing and representing vulnerability assessments: VuWiki, www.vuwiki.org. Based on a survey of 55 vulnerability assessment studies, we first developed an ontology as an explicit reference system for describing vulnerability assessments. We developed the ontology in a theoretically controlled manner based on general systems theory and guided by principles for ontology development in the field of earth and environment (Raskin and Pan 2005). Four key questions form the first level "branches" or categories of the developed ontology: (1) Vulnerability of what? (2) Vulnerability to what? (3) What reference framework was used in the vulnerability assessment?, and (4) What methodological approach was used in the vulnerability assessment? These questions correspond to the basic, abstract structure of the knowledge domain of vulnerability assessments and have been deduced from theories and concepts of various disciplines. The ontology was then implemented in a semantic wiki which allows for the classification and annotation of vulnerability assessments. As a semantic wiki, VuWiki does not aim at "synthesizing" a holistic and overarching model of vulnerability. Instead, it provides both scientists and practitioners with a uniform ontology as a reference system and offers easy and structured access to the knowledge field of

  5. Vulnerability of Forests in India: A National Scale Assessment.

    PubMed

    Sharma, Jagmohan; Upgupta, Sujata; Jayaraman, Mathangi; Chaturvedi, Rajiv Kumar; Bala, Govindswamy; Ravindranath, N H

    2017-09-01

    Forests are subjected to stress from climatic and non-climatic sources. In this study, we have reported the results of inherent, as well as climate change driven vulnerability assessments for Indian forests. To assess inherent vulnerability of forests under current climate, we have used four indicators, namely biological richness, disturbance index, canopy cover, and slope. The assessment is presented as spatial profile of inherent vulnerability in low, medium, high and very high vulnerability classes. Fourty percent forest grid points in India show high or very high inherent vulnerability. Plantation forests show higher inherent vulnerability than natural forests. We assess the climate change driven vulnerability by combining the results of inherent vulnerability assessment with the climate change impact projections simulated by the Integrated Biosphere Simulator dynamic global vegetation model. While 46% forest grid points show high, very high, or extremely high vulnerability under future climate in the short term (2030s) under both representative concentration pathways 4.5 and 8.5, such grid points are 49 and 54%, respectively, in the long term (2080s). Generally, forests in the higher rainfall zones show lower vulnerability as compared to drier forests under future climate. Minimizing anthropogenic disturbance and conserving biodiversity can potentially reduce forest vulnerability under climate change. For disturbed forests and plantations, adaptive management aimed at forest restoration is necessary to build long-term resilience.

  6. Vulnerability of Forests in India: A National Scale Assessment

    NASA Astrophysics Data System (ADS)

    Sharma, Jagmohan; Upgupta, Sujata; Jayaraman, Mathangi; Chaturvedi, Rajiv Kumar; Bala, Govindswamy; Ravindranath, N. H.

    2017-09-01

    Forests are subjected to stress from climatic and non-climatic sources. In this study, we have reported the results of inherent, as well as climate change driven vulnerability assessments for Indian forests. To assess inherent vulnerability of forests under current climate, we have used four indicators, namely biological richness, disturbance index, canopy cover, and slope. The assessment is presented as spatial profile of inherent vulnerability in low, medium, high and very high vulnerability classes. Fourty percent forest grid points in India show high or very high inherent vulnerability. Plantation forests show higher inherent vulnerability than natural forests. We assess the climate change driven vulnerability by combining the results of inherent vulnerability assessment with the climate change impact projections simulated by the Integrated Biosphere Simulator dynamic global vegetation model. While 46% forest grid points show high, very high, or extremely high vulnerability under future climate in the short term (2030s) under both representative concentration pathways 4.5 and 8.5, such grid points are 49 and 54%, respectively, in the long term (2080s). Generally, forests in the higher rainfall zones show lower vulnerability as compared to drier forests under future climate. Minimizing anthropogenic disturbance and conserving biodiversity can potentially reduce forest vulnerability under climate change. For disturbed forests and plantations, adaptive management aimed at forest restoration is necessary to build long-term resilience.

  7. Multi-dimensional flood vulnerability assessment using data envelopment analysis

    NASA Astrophysics Data System (ADS)

    Zahid, Zalina; Saharizan, Nurul Syuhada; Hamzah, Paezah; Hussin, Siti Aida Sheikh; Khairi, Siti Shaliza Mohd

    2017-11-01

    Malaysia has been greatly impacted by flood during monsoon seasons. Even though flood prone areas are well identified, assessment on the vulnerability of the disaster is lacking. Assessment of flood vulnerability, defined as the potential for loss when a disaster occurs, is addressed in this paper. The focus is on the development of flood vulnerability measurement in 11 states in Peninsular Malaysia using a non-parametric approach of Data Envelopment Analysis. Scores for three dimensions of flood vulnerability (Population Vulnerability, Social Vulnerability and Biophysical) were calculated using secondary data of selected input and output variables across an 11-year period from 2004 to 2014. The results showed that Johor and Pahang were the most vulnerable to flood in terms of Population Vulnerability, followed by Kelantan, the most vulnerable to flood in terms of Social Vulnerability and Kedah, Pahang and Terengganu were the most vulnerable to flood in terms of Biophysical Vulnerability among the eleven states. The results also showed that the state of Johor, Pahang and Kelantan to be most vulnerable across the three dimensions. Flood vulnerability assessment is important as it provides invaluable information that will allow the authority to identify and develop plans for flood mitigation and to reduce the vulnerability of flood at the affected regions.

  8. CALTRANS CLIMATE CHANGE VULNERABILITY ASSESSMENTS

    DOT National Transportation Integrated Search

    2018-01-01

    The following report was developed for the California Department of Transportation (Caltrans) to summarize a vulnerability assessment conducted for assets in Caltrans District 4. The assessment was developed to specifically identify the potential eff...

  9. Extending Vulnerability Assessment to Include Life Stages Considerations

    PubMed Central

    Hodgson, Emma E.; Essington, Timothy E.; Kaplan, Isaac C.

    2016-01-01

    Species are experiencing a suite of novel stressors from anthropogenic activities that have impacts at multiple scales. Vulnerability assessment is one tool to evaluate the likely impacts that these stressors pose to species so that high-vulnerability cases can be identified and prioritized for monitoring, protection, or mitigation. Commonly used semi-quantitative methods lack a framework to explicitly account for differences in exposure to stressors and organism responses across life stages. Here we propose a modification to commonly used spatial vulnerability assessment methods that includes such an approach, using ocean acidification in the California Current as an illustrative case study. Life stage considerations were included by assessing vulnerability of each life stage to ocean acidification and were used to estimate population vulnerability in two ways. We set population vulnerability equal to: (1) the maximum stage vulnerability and (2) a weighted mean across all stages, with weights calculated using Lefkovitch matrix models. Vulnerability was found to vary across life stages for the six species explored in this case study: two krill–Euphausia pacifica and Thysanoessa spinifera, pteropod–Limacina helicina, pink shrimp–Pandalus jordani, Dungeness crab–Metacarcinus magister and Pacific hake–Merluccius productus. The maximum vulnerability estimates ranged from larval to subadult and adult stages with no consistent stage having maximum vulnerability across species. Similarly, integrated vulnerability metrics varied greatly across species. A comparison showed that some species had vulnerabilities that were similar between the two metrics, while other species’ vulnerabilities varied substantially between the two metrics. These differences primarily resulted from cases where the most vulnerable stage had a low relative weight. We compare these methods and explore circumstances where each method may be appropriate. PMID:27416031

  10. Extending Vulnerability Assessment to Include Life Stages Considerations.

    PubMed

    Hodgson, Emma E; Essington, Timothy E; Kaplan, Isaac C

    2016-01-01

    Species are experiencing a suite of novel stressors from anthropogenic activities that have impacts at multiple scales. Vulnerability assessment is one tool to evaluate the likely impacts that these stressors pose to species so that high-vulnerability cases can be identified and prioritized for monitoring, protection, or mitigation. Commonly used semi-quantitative methods lack a framework to explicitly account for differences in exposure to stressors and organism responses across life stages. Here we propose a modification to commonly used spatial vulnerability assessment methods that includes such an approach, using ocean acidification in the California Current as an illustrative case study. Life stage considerations were included by assessing vulnerability of each life stage to ocean acidification and were used to estimate population vulnerability in two ways. We set population vulnerability equal to: (1) the maximum stage vulnerability and (2) a weighted mean across all stages, with weights calculated using Lefkovitch matrix models. Vulnerability was found to vary across life stages for the six species explored in this case study: two krill-Euphausia pacifica and Thysanoessa spinifera, pteropod-Limacina helicina, pink shrimp-Pandalus jordani, Dungeness crab-Metacarcinus magister and Pacific hake-Merluccius productus. The maximum vulnerability estimates ranged from larval to subadult and adult stages with no consistent stage having maximum vulnerability across species. Similarly, integrated vulnerability metrics varied greatly across species. A comparison showed that some species had vulnerabilities that were similar between the two metrics, while other species' vulnerabilities varied substantially between the two metrics. These differences primarily resulted from cases where the most vulnerable stage had a low relative weight. We compare these methods and explore circumstances where each method may be appropriate.

  11. Assessing species vulnerability to climate change

    NASA Astrophysics Data System (ADS)

    Pacifici, Michela; Foden, Wendy B.; Visconti, Piero; Watson, James E. M.; Butchart, Stuart H. M.; Kovacs, Kit M.; Scheffers, Brett R.; Hole, David G.; Martin, Tara G.; Akçakaya, H. Resit; Corlett, Richard T.; Huntley, Brian; Bickford, David; Carr, Jamie A.; Hoffmann, Ary A.; Midgley, Guy F.; Pearce-Kelly, Paul; Pearson, Richard G.; Williams, Stephen E.; Willis, Stephen G.; Young, Bruce; Rondinini, Carlo

    2015-03-01

    The effects of climate change on biodiversity are increasingly well documented, and many methods have been developed to assess species' vulnerability to climatic changes, both ongoing and projected in the coming decades. To minimize global biodiversity losses, conservationists need to identify those species that are likely to be most vulnerable to the impacts of climate change. In this Review, we summarize different currencies used for assessing species' climate change vulnerability. We describe three main approaches used to derive these currencies (correlative, mechanistic and trait-based), and their associated data requirements, spatial and temporal scales of application and modelling methods. We identify strengths and weaknesses of the approaches and highlight the sources of uncertainty inherent in each method that limit projection reliability. Finally, we provide guidance for conservation practitioners in selecting the most appropriate approach(es) for their planning needs and highlight priority areas for further assessments.

  12. Tactical assessment in a squad of intelligent bots

    NASA Astrophysics Data System (ADS)

    Gołuński, Marcel; Wasiewicz, Piotr

    2010-09-01

    In this paper we explore the problem of communication and coordination in a team of intelligent game bots (aka embodied agents). It presents a tactical decision making system controlling the behavior of an autonomous bot followed by the concept of a team tactical decision making system controlling the team of intelligent bots. The algorithms to be introduced have been implemented in the Java language by means of Pogamut 2 framework, interfacing the bot logic with Unreal Tournament 2004 virtual environment.

  13. Comparative studies of groundwater vulnerability assessment

    NASA Astrophysics Data System (ADS)

    Maria, Rizka

    2018-02-01

    Pollution of groundwater is a primary issue because aquifers are susceptible to contamination from land use and anthropogenic impacts. Groundwater susceptibility is intrinsic and specific. Intrinsic vulnerability refers to an aquifer that is susceptible to pollution and to the geological and hydrogeological features. Vulnerability assessment is an essential step in assessing groundwater contamination. This approach provides a visual analysis for helping planners and decision makers to achieve the sustainable management of water resources. Comparative studies are applying different methodologies to result in the basic evaluation of the groundwater vulnerability. Based on the comparison of methods, there are several advantages and disadvantages. SI can be overlaid on DRASTIC and Pesticide DRASTIC to extract the divergence in sensitivity. DRASTIC identifies low susceptibility and underestimates the pollution risk while Pesticide DRASTIC and SI represents better risk and is recommended for the future. SINTACS method generates very high vulnerability zones with surface waters and aquifer interactions. GOD method could be adequate for vulnerability mapping in karstified carbonate aquifers at small-moderate scales, and EPIK method can be used for large scale. GOD method is suitable for designing large area such as land management while DRASTIC has good accuracy and more real use in geoenvironmental detailed studies.

  14. Climate change vulnerability assessment in Georgia

    Treesearch

    Binita KC; J. Marshall Shepherd; Cassandra Johnson Gaither

    2015-01-01

    Climate change is occurring in the Southeastern United States, and one manifestation is changes in frequency and intensity of extreme events. A vulnerability assessment is performed in the state of Georgia (United States) at the county level from 1975 to 2012 in decadal increments. Climate change vulnerability is typically measured as a function of exposure to physical...

  15. Review Article: A comparison of flood and earthquake vulnerability assessment indicators

    NASA Astrophysics Data System (ADS)

    de Ruiter, Marleen C.; Ward, Philip J.; Daniell, James E.; Aerts, Jeroen C. J. H.

    2017-07-01

    In a cross-disciplinary study, we carried out an extensive literature review to increase understanding of vulnerability indicators used in the disciplines of earthquake- and flood vulnerability assessments. We provide insights into potential improvements in both fields by identifying and comparing quantitative vulnerability indicators grouped into physical and social categories. Next, a selection of index- and curve-based vulnerability models that use these indicators are described, comparing several characteristics such as temporal and spatial aspects. Earthquake vulnerability methods traditionally have a strong focus on object-based physical attributes used in vulnerability curve-based models, while flood vulnerability studies focus more on indicators applied to aggregated land-use classes in curve-based models. In assessing the differences and similarities between indicators used in earthquake and flood vulnerability models, we only include models that separately assess either of the two hazard types. Flood vulnerability studies could be improved using approaches from earthquake studies, such as developing object-based physical vulnerability curve assessments and incorporating time-of-the-day-based building occupation patterns. Likewise, earthquake assessments could learn from flood studies by refining their selection of social vulnerability indicators. Based on the lessons obtained in this study, we recommend future studies for exploring risk assessment methodologies across different hazard types.

  16. Vulnerability assessments as a political creation: tsunami management in Portugal.

    PubMed

    Pronk, Maartje; Maat, Harro; Crane, Todd A

    2017-10-01

    Vulnerability assessments are a cornerstone of contemporary disaster research. This paper shows how research procedures and the presentation of results of vulnerability assessments are politically filtered. Using data from a study of tsunami risk assessment in Portugal, the paper demonstrates that approaches, measurement instruments, and research procedures for evaluating vulnerability are influenced by institutional preferences, lines of communication, or lack thereof, between stakeholder groups, and available technical expertise. The institutional setting and the pattern of stakeholder interactions form a filter, resulting in a particular conceptualisation of vulnerability, affecting its operationalisation via existing methods and technologies and its institutional embedding. The Portuguese case reveals a conceptualisation that is aligned with perceptions prevalent in national government bureaucracies and the exclusion of local stakeholders owing to selected methodologies and assessment procedures. The decisions taken by actors involved in these areas affect how vulnerability is assessed, and ultimately which vulnerability reduction policies will be recommended in the appraisal. © 2017 The Author(s). Disasters © Overseas Development Institute, 2017.

  17. Assessing the social vulnerability to malaria in Rwanda.

    PubMed

    Bizimana, Jean-Pierre; Twarabamenye, Emmanuel; Kienberger, Stefan

    2015-01-07

    Since 2004, malaria interventions in Rwanda have resulted in substantial decline of malaria incidence. However, this achievement is fragile as potentials for local malaria transmissions remain. The risk of getting malaria infection is partially explained by social conditions of vulnerable populations. Since vulnerability to malaria is both influenced by social and environmental factors, its complexity cannot be measured by a single value. The aim of this paper is, therefore, to apply a composite indicator approach for assessing social vulnerability to malaria in Rwanda. This assessment informs the decision-makers in targeting malaria interventions and allocating limited resources to reduce malaria burden in Rwanda. A literature review was used to conceptualize the social vulnerability to malaria and to select the appropriate vulnerability indicators. Indicators used in the index creation were classified into susceptibility and lack of resilience vulnerability domains. The main steps followed include selection of indicators and datasets, imputation of missing values, descriptive statistics, normalization and weighting of indicators, local sensitivity analysis and indicators aggregation. Correlation analysis helped to empirically evidence the association between the indicators and malaria incidence. The high values of social vulnerability to malaria are found in Gicumbi, Rusizi, Nyaruguru and Gisagara, and low values in Muhanga, Nyarugenge, Kicukiro and Nyanza. The most influential susceptibility indicators to increase malaria are population change (r = 0.729), average number of persons per bedroom (r = 0.531), number of households affected by droughts and famines (r = 0.591), and area used for irrigation (r = 0.611). The bed net ownership (r = -0.398) and poor housing wall materials (0.378) are the lack of resilience indicators that significantly correlate with malaria incidence. The developed composite index social vulnerability to malaria

  18. Improving satellite vulnerability assessment to untrackable orbital debris

    NASA Astrophysics Data System (ADS)

    Welty, Nathan; Schaefer, Frank; Rudolph, Martin; Destefanis, Roberto; Grassi, Lilith

    2012-07-01

    The projected growth in the untrackable orbital debris population will place an increased emphasis on satellite vulnerability assessments during both design and mission operations. This study presents an enhanced method for assessing satellite vulnerability to untrackable orbital debris that expands on traditional practices. By looking beyond structural penetration of the spacecraft, the method predicts the survivability of individual components and the associated degradation of system functionality resulting from untrackable debris impacts. A new risk assessment tool, the Particle Impact Risk and Vulnerability Assessment Tool (PIRAT), has been developed based on this method and is also presented here. It interfaces with both the NASA ORDEM2000 and ESA MASTER-2009 debris models and has been validated against the benchmark test cases from the Inter-Agency Space Debris Coordination Committee (IADC). This study concludes with an example vulnerability assessment using PIRAT for a generic Earth observation satellite in a Sun-synchronous low-Earth orbit. The results illustrate the additional insight provided by this method that can be used to improve the robustness of future satellite designs and mitigate the overall mission risk posed by untrackable orbital debris.

  19. 7 CFR 1730.27 - Vulnerability and Risk Assessment (VRA).

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 11 2013-01-01 2013-01-01 false Vulnerability and Risk Assessment (VRA). 1730.27... Requirements § 1730.27 Vulnerability and Risk Assessment (VRA). (a) Each borrower with an approved RUS electric...'s system, and records of such additional assessments shall be maintained by the borrower. (b) Each...

  20. 7 CFR 1730.27 - Vulnerability and Risk Assessment (VRA).

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 11 2011-01-01 2011-01-01 false Vulnerability and Risk Assessment (VRA). 1730.27... Requirements § 1730.27 Vulnerability and Risk Assessment (VRA). (a) Each borrower with an approved RUS electric...'s system, and records of such additional assessments shall be maintained by the borrower. (b) Each...

  1. 7 CFR 1730.27 - Vulnerability and Risk Assessment (VRA).

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 11 2012-01-01 2012-01-01 false Vulnerability and Risk Assessment (VRA). 1730.27... Requirements § 1730.27 Vulnerability and Risk Assessment (VRA). (a) Each borrower with an approved RUS electric...'s system, and records of such additional assessments shall be maintained by the borrower. (b) Each...

  2. 7 CFR 1730.27 - Vulnerability and Risk Assessment (VRA).

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 11 2014-01-01 2014-01-01 false Vulnerability and Risk Assessment (VRA). 1730.27... Requirements § 1730.27 Vulnerability and Risk Assessment (VRA). (a) Each borrower with an approved RUS electric...'s system, and records of such additional assessments shall be maintained by the borrower. (b) Each...

  3. Volcanic risk assessment: Quantifying physical vulnerability in the built environment

    NASA Astrophysics Data System (ADS)

    Jenkins, S. F.; Spence, R. J. S.; Fonseca, J. F. B. D.; Solidum, R. U.; Wilson, T. M.

    2014-04-01

    This paper presents structured and cost-effective methods for assessing the physical vulnerability of at-risk communities to the range of volcanic hazards, developed as part of the MIA-VITA project (2009-2012). An initial assessment of building and infrastructure vulnerability has been carried out for a set of broadly defined building types and infrastructure categories, with the likelihood of damage considered separately for projectile impact, ash fall loading, pyroclastic density current dynamic pressure and earthquake ground shaking intensities. In refining these estimates for two case study areas: Kanlaon volcano in the Philippines and Fogo volcano in Cape Verde, we have developed guidelines and methodologies for carrying out physical vulnerability assessments in the field. These include identifying primary building characteristics, such as construction material and method, as well as subsidiary characteristics, for example the size and prevalence of openings, that may be important in assessing eruption impacts. At-risk buildings around Kanlaon were found to be dominated by timber frame buildings that exhibit a high vulnerability to pyroclastic density currents, but a low vulnerability to failure from seismic shaking. Around Fogo, the predominance of unreinforced masonry buildings with reinforced concrete slab roofs suggests a high vulnerability to volcanic earthquake but a low vulnerability to ash fall loading. Given the importance of agriculture for local livelihoods around Kanlaon and Fogo, we discuss the potential impact of infrastructure vulnerability for local agricultural economies, with implications for volcanic areas worldwide. These methodologies and tools go some way towards offering a standardised approach to carrying out future vulnerability assessments for populated volcanic areas.

  4. Risk assessment by dynamic representation of vulnerability, exploitation, and impact

    NASA Astrophysics Data System (ADS)

    Cam, Hasan

    2015-05-01

    Assessing and quantifying cyber risk accurately in real-time is essential to providing security and mission assurance in any system and network. This paper presents a modeling and dynamic analysis approach to assessing cyber risk of a network in real-time by representing dynamically its vulnerabilities, exploitations, and impact using integrated Bayesian network and Markov models. Given the set of vulnerabilities detected by a vulnerability scanner in a network, this paper addresses how its risk can be assessed by estimating in real-time the exploit likelihood and impact of vulnerability exploitation on the network, based on real-time observations and measurements over the network. The dynamic representation of the network in terms of its vulnerabilities, sensor measurements, and observations is constructed dynamically using the integrated Bayesian network and Markov models. The transition rates of outgoing and incoming links of states in hidden Markov models are used in determining exploit likelihood and impact of attacks, whereas emission rates help quantify the attack states of vulnerabilities. Simulation results show the quantification and evolving risk scores over time for individual and aggregated vulnerabilities of a network.

  5. Forest climate change Vulnerability and Adaptation Assessment in Himalayas

    NASA Astrophysics Data System (ADS)

    Chitale, V. S.; Shrestha, H. L.; Agarwal, N. K.; Choudhurya, D.; Gilani, H.; Dhonju, H. K.; Murthy, M. S. R.

    2014-11-01

    Forests offer an important basis for creating and safeguarding more climate-resilient communities over Hindu Kush Himalayan region. The forest ecosystem vulnerability assessment to climate change and developing knowledge base to identify and support relevant adaptation strategies is realized as an urgent need. The multi scale adaptation strategies portray increasing complexity with the increasing levels in terms of data requirements, vulnerability understanding and decision making to choose a particular adaptation strategy. We present here how such complexities could be addressed and adaptation decisions could be either directly supported by open source remote sensing based forestry products or geospatial analysis and modelled products. The forest vulnerability assessment under climate change scenario coupled with increasing forest social dependence was studied using IPCC Landscape scale Vulnerability framework in Chitwan-Annapurna Landscape (CHAL) situated in Nepal. Around twenty layers of geospatial information on climate, forest biophysical and forest social dependence data was used to assess forest vulnerability and associated adaptation needs using self-learning decision tree based approaches. The increase in forest fires, evapotranspiration and reduction in productivity over changing climate scenario was observed. The adaptation measures on enhancing productivity, improving resilience, reducing or avoiding pressure with spatial specificity are identified to support suitable decision making. The study provides spatial analytical framework to evaluate multitude of parameters to understand vulnerabilities and assess scope for alternative adaptation strategies with spatial explicitness.

  6. 6 CFR 27.240 - Review and approval of security vulnerability assessments.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Review and approval of security vulnerability... of security vulnerability assessments. (a) Review and Approval. The Department will review and approve in writing all Security Vulnerability Assessments that satisfy the requirements of § 27.215...

  7. Relationship between Procedural Tactical Knowledge and Specific Motor Skills in Young Soccer Players

    PubMed Central

    Aquino, Rodrigo; Marques, Renato Francisco R.; Petiot, Grégory Hallé; Gonçalves, Luiz Guilherme C.; Moraes, Camila; Santiago, Paulo Roberto P.; Puggina, Enrico Fuini

    2016-01-01

    The purpose of this study was to investigate the association between offensive tactical knowledge and the soccer-specific motor skills performance. Fifteen participants were submitted to two evaluation tests, one to assess their technical and tactical analysis. The motor skills performance was measured through four tests of technical soccer skills: ball control, shooting, passing and dribbling. The tactical performance was based on a tactical assessment system called FUT-SAT (Analyses of Procedural Tactical Knowledge in Soccer). Afterwards, technical and tactical evaluation scores were ranked with and without the use of the cluster method. A positive, weak correlation was perceived in both analyses (rho = 0.39, not significant p = 0.14 (with cluster analysis); and rho = 0.35; not significant p = 0.20 (without cluster analysis)). We can conclude that there was a weak association between the technical and the offensive tactical knowledge. This shows the need to reflect on the use of such tests to assess technical skills in team sports since they do not take into account the variability and unpredictability of game actions and disregard the inherent needs to assess such skill performance in the game. PMID:29910300

  8. A systematic review of dynamics in climate risk and vulnerability assessments

    NASA Astrophysics Data System (ADS)

    Jurgilevich, Alexandra; Räsänen, Aleksi; Groundstroem, Fanny; Juhola, Sirkku

    2017-01-01

    Understanding climate risk is crucial for effective adaptation action, and a number of assessment methodologies have emerged. We argue that the dynamics of the individual components in climate risk and vulnerability assessments has received little attention. In order to highlight this, we systematically reviewed 42 sub-national climate risk and vulnerability assessments. We analysed the assessments using an analytical framework with which we evaluated (1) the conceptual approaches to vulnerability and exposure used, (2) if current or future risks were assessed, and (3) if and how changes over time (i.e. dynamics) were considered. Of the reviewed assessments, over half addressed future risks or vulnerability; and of these future-oriented studies, less than 1/3 considered both vulnerability and exposure dynamics. While the number of studies that include dynamics is growing, and while all studies included socio-economic aspects, often only biophysical dynamics was taken into account. We discuss the challenges of assessing socio-economic and spatial dynamics, particularly the poor availability of data and methods. We suggest that future-oriented studies assessing risk dynamics would benefit from larger stakeholder involvement, discussion of the assessment purpose, the use of multiple methods, inclusion of uncertainty/sensitivity analyses and pathway approaches.

  9. Vulnerability assessment of atmospheric environment driven by human impacts.

    PubMed

    Zhang, Yang; Shen, Jing; Ding, Feng; Li, Yu; He, Li

    2016-11-15

    Atmospheric environment quality worsening is a substantial threat to public health worldwide, and in many places, air pollution due to the intensification of the human activity is increasing dramatically. However, no studies have been investigated the integration of vulnerability assessment and atmospheric environment driven by human impacts. The objective of this study was to identify and prioritize the undesirable environmental changes as an early warning system for environment managers and decision makers in term of human, atmospheric environment, and social economic elements. We conduct a vulnerability assessment method of atmospheric environment associated with human impact, this method integrates spatial context of Geographic Information System (GIS) tool, multi-criteria decision analysis (MCDA) method, ordered weighted averaging (OWA) operators under the Exposure-Sensitivity- Adaptive Capacity (ESA) framework. Decision makers can find out relevant vulnerability assessment results with different vulnerable attitudes. In the Beijing-Tianjin-Hebei (BTH) region, China, we further applied this developed method and proved it to be reliable and consistent with the China Environmental Status Bulletin. Results indicate that the vulnerability of atmospheric environment in the BTH region is not optimistic, and environment managers should do more about air pollution. Thus, the most appropriate strategic decision and development program of city or state can be picked out assisting by the vulnerable results. Copyright © 2016 Elsevier B.V. All rights reserved.

  10. Affective Decision-Making and Tactical Behavior of Under-15 Soccer Players

    PubMed Central

    Gonzaga, Adeilton dos Santos; Albuquerque, Maicon Rodrigues; Malloy-Diniz, Leandro Fernandes; Greco, Pablo Juan; Teoldo da Costa, Israel

    2014-01-01

    Affective decision-making is a type of Executive Function related to cost benefit analysis in situations where gains and losses imply direct consequences for the subject. The purpose of this study was to explore the influence of the affective decision-making on tactical behavior in soccer players under the age of 15 years old. The System of Tactical Assessment in Soccer (FUT-SAT) was used to assess tactical behavior. To evaluate affective decision-making, we used the neuropsychological test called The Iowa Gambling Task (IGT). The values of the offensive, defensive and game tactical behavior of participants were used to create performance groups. The low (≤25%) and high (≥75%) groups, according to offensive, defensive and game tactical behavior, were compared and shown to be different. The values of the IGT net score of the participants with low and high tactical behavior were compared using the non-parametric Mann-Whitney test. Statistically significant differences between the groups were observed for Defensive Tactical Behavior (Z = −3.133; p = 0.002; r = −0.355) and Game Tactical Behavior (Z = −2.267; p = 0.023; r = −0.260). According to these results, it is possible to state that affective decision-making can influence the tactical behavior of under-15 soccer players. PMID:24978030

  11. [Assessment of eco-environmental vulnerability of Hainan Island, China].

    PubMed

    Huang, Bao-rong; Ouyang, Zhi-yun; Zhang, Hui-zhi; Zhang, Li-hua; Zheng, Hua

    2009-03-01

    Based on the assessment method of environmental vulnerability constructed by SOPAC and UNEP, this paper constructed an indicator system from three sub-themes including hazard, resistance, and damage to assess the eco-environmental vulnerability of Hainan Island. The results showed that Hainan Island was suffering a middling level eco-environmental hazard, and the main hazards came from some intensive human activities such as intensive agriculture, mass tourism, mining, and a mass of solid wastes thrown by islanders and tourists. Some geographical characters such as larger land area, larger altitude range, integrated geographical form, and abundant habitat types endowed Hainan Island higher resistance to environmental hazards. However, disturbed by historical accumulative artificial and natural hazards, the Island ecosystem had showed serious ecological damage, such as soil degradation and biodiversity loss. Comprehensively considered hazard, resistance, damage, and degradation, the comprehensive environmental vulnerability of the Island was at a middling level. Some indicators showed lower vulnerability, but some showed higher vulnerability.

  12. Drought vulnerability assessment for prioritising drought warning implementation

    NASA Astrophysics Data System (ADS)

    Naumann, Gustavo; Faneca Sànchez, Marta; Mwangi, Emmah; Barbosa, Paulo; Iglesias, Ana; Garrote, Luis; Werner, Micha

    2014-05-01

    Drought warning provides a potentially efficient approach to mitigation of drought impacts, and should be targeted at areas most vulnerable to being adversely impacted. Assessing drought vulnerability is, however, complex and needs to consider susceptibility to drought impact as well as the capacity to cope with drought. In this paper a Drought Vulnerability Index (DVI) is proposed that considers four primary components that reflect the capacity of society to adapt to drought; the renewable natural capital, the economic capacity, the human and civic resources, and the available infrastructure and technology. The DVI is established as a weighted combination of these four components, each a composite of selected indicators. Constituent indicators are calculated based on national and/or regional census data and statistics, and while the resulting DVI should not be considered an absolute measure of drought vulnerability it does provide for a prioritisation of areas that can be used to target drought warning efforts. Sensitivity analysis of weights applied show the established DVI to be robust. Through the DVI the development of drought forecasting and warning can be targeted at the most vulnerable areas. The proposed DVI is applied at both the continental scale in Africa to assess drought vulnerability of the different nations across Africa, and at the national level in Kenya, allowing for prioritisation of the counties within Kenya to drought vulnerability. Results show the relative vulnerability of countries and counties vulnerable to drought. At the continental scale, Somalia, Burundi, Niger, Ethiopia, Mali and Chad are found to be the countries most vulnerable to drought. At the national level, the relative vulnerability of the counties across Kenya is found, with counties in the North-East of Kenya having the highest values of DVI. At the country level results were compared with drought disaster information from the EM-DAT disaster database, showing a good

  13. Climate Change Vulnerability Assessment for Idaho National Laboratory

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Christopher P. Ischay; Ernest L. Fossum; Polly C. Buotte

    2014-10-01

    The University of Idaho (UI) was asked to participate in the development of a climate change vulnerability assessment for Idaho National Laboratory (INL). This report describes the outcome of that assessment. The climate change happening now, due in large part to human activities, is expected to continue in the future. UI and INL used a common framework for assessing vulnerability that considers exposure (future climate change), sensitivity (system or component responses to climate), impact (exposure combined with sensitivity), and adaptive capacity (capability of INL to modify operations to minimize climate change impacts) to assess vulnerability. Analyses of climate change (exposure)more » revealed that warming that is ongoing at INL will continue in the coming decades, with increased warming in later decades and under scenarios of greater greenhouse gas emissions. Projections of precipitation are more uncertain, with multi model means exhibiting somewhat wetter conditions and more wet days per year. Additional impacts relevant to INL include estimates of more burned area and increased evaporation and transpiration, leading to reduced soil moisture and plant growth.« less

  14. The effect of deliberate play on tactical performance in basketball.

    PubMed

    Greco, Pablo; Memmert, Daniel; Morales, Juan C P

    2010-06-01

    This field-based study analyzed effects of a deliberate-play training program in basketball on tactical game intelligence and tactical creativity. 22 youth basketball players, ages 10 to 12 years, completed basketball training in one of two equal-sized groups. The deliberate-play training program contained unstructured game forms in basketball. The placebo group played in traditional structured basketball game forms. Tactical intelligence and creativity was assessed before and after an 18-lesson intervention. Analysis showed significant training improvement only for the deliberate-play group. In addition, this outperformance of the placebo group was not only observed for tactical creativity but also for tactical intelligence.

  15. Cyber / Physical Security Vulnerability Assessment Integration

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    MacDonald, Douglas G.; Simpkins, Bret E.

    Abstract Both physical protection and cyber security domains offer solutions for the discovery of vulnerabilities through the use of various assessment processes and software tools. Each vulnerability assessment (VA) methodology provides the ability to identify and categorize vulnerabilities, and quantifies the risks within their own areas of expertise. Neither approach fully represents the true potential security risk to a site and/or a facility, nor comprehensively assesses the overall security posture. The technical approach to solving this problem was to identify methodologies and processes that blend the physical and cyber security assessments, and develop tools to accurately quantify the unaccounted formore » risk. SMEs from both the physical and the cyber security domains developed the blending methodologies, and cross trained each other on the various aspects of the physical and cyber security assessment processes. A local critical infrastructure entity volunteered to host a proof of concept physical/cyber security assessment, and the lessons learned have been leveraged by this effort. The four potential modes of attack an adversary can use in approaching a target are; Physical Only Attack, Cyber Only Attack, Physical Enabled Cyber Attack, and the Cyber Enabled Physical Attack. The Physical Only and the Cyber Only pathway analysis are two of the most widely analyzed attack modes. The pathway from an off-site location to the desired target location is dissected to ensure adversarial activity can be detected and neutralized by the protection strategy, prior to completion of a predefined task. This methodology typically explores a one way attack from the public space (or common area) inward towards the target. The Physical Enabled Cyber Attack and the Cyber Enabled Physical Attack are much more intricate. Both scenarios involve beginning in one domain to affect change in the other, then backing outward to take advantage of the reduced system effectiveness

  16. Tactical Infrasound

    DTIC Science & Technology

    2005-05-01

    received briefings on a variety of infra - sonic sensor systenis. Materials were also received from the 2001 and 2002 Infrasonic Technology Workshops and...Systems to Tactical Acoustic Sys- tems One issue to be considered in the evaluation of a p)otential tactical infra - sonic system is the ability to...Communication range Fixed Fixed 5 km 7.4 A Design Approach for a Future Tactical Infra - sonic Sensor System This section describes a procedure used to

  17. Addressing uncertainty in vulnerability assessments [Chapter 5

    Treesearch

    Linda Joyce; Molly Cross; Evan Girvatz

    2011-01-01

    This chapter addresses issues and approaches for dealing with uncertainty specifically within the context of conducting climate change vulnerability assessments (i.e., uncertainties related to identifying and modeling the sensitivities, levels of exposure, and adaptive capacity of the assessment targets).

  18. U.S. Military Technology Dependence: The Hidden Vulnerability to National Security

    DTIC Science & Technology

    2016-06-10

    10-06-2016 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER U.S. MILITARY TECHNOLOGY DEPENDENCE : THE HIDDEN Sb. GRANT NUMBER VULNERABILITY TO NATIONAL...14. ABSTRACT Because the U.S. has a technological culture, the U.S. military has become technology dependent . This dependence has made the military...technology dependent that the organization no longer recognizes that technology has made it more vulnerable strategically, operationally, and tactically. The

  19. Flood Vulnerability Assessment Map

    EIA Publications

    Maps of energy infrastructure with real-time storm and emergency information by fuel type and by state. Flood hazard information from FEMA has been combined with EIA's energy infrastructure layers as a tool to help state, county, city, and private sector planners assess which key energy infrastructure assets are vulnerable to rising sea levels, storm surges, and flash flooding. Note that flood hazard layers must be zoomed-in to street level before they become visible.

  20. Tsunami vulnerability assessment in the western coastal belt in Sri Lanka

    NASA Astrophysics Data System (ADS)

    Ranagalage, M. M.

    2017-12-01

    26th December 2004 tsunami disaster has caused massive loss of life, damage to coastal infrastructures and disruption to economic activities in the coastal belt of Sri Lanka. Tsunami vulnerability assessment is a requirement for disaster risk and vulnerability reduction. It plays a major role in identifying the extent and level of vulnerabilities to disasters within the communities. There is a need for a clearer understanding of the disaster risk patterns and factors contributing to it in different parts of the coastal belt. The main objective of this study is to investigate tsunami vulnerability assessment of Moratuwa Municipal council area in Sri Lanka. We have selected Moratuwa area due to considering urbanization pattern and Tsunami hazards of the country. Different data sets such as one-meter resolution LiDAR data, orthophoto, population, housing data and road layer were employed in this study. We employed tsunami vulnerability model for 1796 housing units located there, for a tsunami scenario with a maximum run-up 8 meters. 86% of the total land area affected by the tsunami in 8 meters scenarios. Additionally, building population has been used to estimate population in different vulnerability levels. The result shows that 32% of the buildings have extremely critical vulnerability level, 46% have critical vulnerability level, 22% have high vulnerability level, and 1% have a moderate vulnerability. According to the population estimation model results, 18% reside building with extremely critical vulnerability, 43% with critical vulnerability, 36% with high vulnerability and 3% belong to moderate vulnerability level. The results of the study provide a clear picture of tsunami vulnerability. Outcomes of this analysis can use as a valuable tool for urban planners to assess the risk and extent of disaster risk reduction which could be achieved via suitable mitigation measures to manage the coastal belt in Sri Lanka.

  1. A support system for assessing local vulnerability to weather and climate

    USGS Publications Warehouse

    Coletti, Alex; Howe, Peter D.; Yarnal, Brent; Wood, Nathan J.

    2013-01-01

    The changing number and nature of weather- and climate-related natural hazards is causing more communities to need to assess their vulnerabilities. Vulnerability assessments, however, often require considerable expertise and resources that are not available or too expensive for many communities. To meet the need for an easy-to-use, cost-effective vulnerability assessment tool for communities, a prototype online vulnerability assessment support system was built and tested. This prototype tool guides users through a stakeholder-based vulnerability assessment that breaks the process into four easy-to-implement steps. Data sources are integrated in the online environment so that perceived risks—defined and prioritized qualitatively by users—can be compared and discussed against the impacts that past events have had on the community. The support system is limited in scope, and the locations of the case studies do not provide a sufficiently broad range of sample cases. The addition of more publically available hazard databases combined with future improvements in the support system architecture and software will expand opportunities for testing and fully implementing the support system.

  2. Climate Change Impacts and Vulnerability Assessment in Industrial Complexes

    NASA Astrophysics Data System (ADS)

    Lee, H. J.; Lee, D. K.

    2016-12-01

    Climate change has recently caused frequent natural disasters, such as floods, droughts, and heat waves. Such disasters have also increased industrial damages. We must establish climate change adaptation policies to reduce the industrial damages. It is important to make accurate vulnerability assessment to establish climate change adaptation policies. Thus, this study aims at establishing a new index to assess vulnerability level in industrial complexes. Most vulnerability indices have been developed with subjective approaches, such as the Delphi survey and the Analytic Hierarchy Process(AHP). The subjective approaches rely on the knowledge of a few experts, which provokes the lack of the reliability of the indices. To alleviate the problem, we have designed a vulnerability index incorporating objective approaches. We have investigated 42 industrial complex sites in Republic of Korea (ROK). To calculate weights of variables, we used entropy method as an objective method integrating the Delphi survey as a subjective method. Finally, we found our method integrating both subjective method and objective method could generate result. The integration of the entropy method enables us to assess the vulnerability objectively. Our method will be useful to establish climate change adaptation policies by reducing the uncertainties of the methods based on the subjective approaches.

  3. Participatory flood vulnerability assessment: a multi-criteria approach

    NASA Astrophysics Data System (ADS)

    Madruga de Brito, Mariana; Evers, Mariele; Delos Santos Almoradie, Adrian

    2018-01-01

    This paper presents a participatory multi-criteria decision-making (MCDM) approach for flood vulnerability assessment while considering the relationships between vulnerability criteria. The applicability of the proposed framework is demonstrated in the municipalities of Lajeado and Estrela, Brazil. The model was co-constructed by 101 experts from governmental organizations, universities, research institutes, NGOs, and private companies. Participatory methods such as the Delphi survey, focus groups, and workshops were applied. A participatory problem structuration, in which the modellers work closely with end users, was used to establish the structure of the vulnerability index. The preferences of each participant regarding the criteria importance were spatially modelled through the analytical hierarchy process (AHP) and analytical network process (ANP) multi-criteria methods. Experts were also involved at the end of the modelling exercise for validation. The final product is a set of individual and group flood vulnerability maps. Both AHP and ANP proved to be effective for flood vulnerability assessment; however, ANP is preferred as it considers the dependences among criteria. The participatory approach enabled experts to learn from each other and acknowledge different perspectives towards social learning. The findings highlight that to enhance the credibility and deployment of model results, multiple viewpoints should be integrated without forcing consensus.

  4. Training and Tactical Operationally Responsive Space Operations

    NASA Astrophysics Data System (ADS)

    Sorensen, B.; Strunce, R., Jr.

    to realize the full potential of the ORS approach to the support of in-theater tactical forces is the development of satellite tasking, interface, and data retrieval capabilities and mission operations approaches from a warfighter centered perspective, and the development of realistic training and simulation capabilities that will allow development, demonstration, and assessment of ORS tactical CONOPS. A system for Training and Tactical ORS Operations (TATOO) is currently being developed. This system will support development and evaluation of ORS specific CONOPS approaches, and training and evaluation of those CONOPS implementations through dedicated training capabilities, facilities, and exercises. TATOO will support the operational side of ORS and will merge with the revolutionary ORS spacecraft development and deployment processes to make the ORS paradigm a reality. TATOO's primary objective is to support the In-Theater Commander and Warfighter by developing, training, and assessing ORS mission CONOPS for In-Theater tasking, scheduling, interface, and data retrieval for TacSats owned by In-Theater Commanders. TATOO provides a laboratory/classroom environment for the development, test and evaluation of ORS Tactical Mission CONOPS for In-Theater ORS operations. The TATOO laboratory will also be used to develop, evaluate, and document ORS Mission CONOPS for tactical ISR and other ORS missions. Within this framework, the laboratory/classroom can be used to develop the necessary training materials and procedures, as well as conduct training exercises that emphasize the training of In-Theater personal with regard to: Tactical Ground Station Mission Operations; Tactical Operations for Mission Tasking and Scheduling; Tactical Mission Data Retrieval; and, Support for Warfighter Operations.

  5. Seaside, Oregon, Tsunami Vulnerability Assessment Pilot Study

    NASA Astrophysics Data System (ADS)

    Dunbar, P. K.; Dominey-Howes, D.; Varner, J.

    2006-12-01

    The results of a pilot study to assess the risk from tsunamis for the Seaside-Gearhart, Oregon region will be presented. To determine the risk from tsunamis, it is first necessary to establish the hazard or probability that a tsunami of a particular magnitude will occur within a certain period of time. Tsunami inundation maps that provide 100-year and 500-year probabilistic tsunami wave height contours for the Seaside-Gearhart, Oregon, region were developed as part of an interagency Tsunami Pilot Study(1). These maps provided the probability of the tsunami hazard. The next step in determining risk is to determine the vulnerability or degree of loss resulting from the occurrence of tsunamis due to exposure and fragility. The tsunami vulnerability assessment methodology used in this study was developed by M. Papathoma and others(2). This model incorporates multiple factors (e.g. parameters related to the natural and built environments and socio-demographics) that contribute to tsunami vulnerability. Data provided with FEMA's HAZUS loss estimation software and Clatsop County, Oregon, tax assessment data were used as input to the model. The results, presented within a geographic information system, reveal the percentage of buildings in need of reinforcement and the population density in different inundation depth zones. These results can be used for tsunami mitigation, local planning, and for determining post-tsunami disaster response by emergency services. (1)Tsunami Pilot Study Working Group, Seaside, Oregon Tsunami Pilot Study--Modernization of FEMA Flood Hazard Maps, Joint NOAA/USGS/FEMA Special Report, U.S. National Oceanic and Atmospheric Administration, U.S. Geological Survey, U.S. Federal Emergency Management Agency, 2006, Final Draft. (2)Papathoma, M., D. Dominey-Howes, D.,Y. Zong, D. Smith, Assessing Tsunami Vulnerability, an example from Herakleio, Crete, Natural Hazards and Earth System Sciences, Vol. 3, 2003, p. 377-389.

  6. Assessment of composite index methods for agricultural vulnerability to climate change.

    PubMed

    Wiréhn, Lotten; Danielsson, Åsa; Neset, Tina-Simone S

    2015-06-01

    A common way of quantifying and communicating climate vulnerability is to calculate composite indices from indicators, visualizing these as maps. Inherent methodological uncertainties in vulnerability assessments, however, require greater attention. This study examines Swedish agricultural vulnerability to climate change, the aim being to review various indicator approaches for assessing agricultural vulnerability to climate change and to evaluate differences in climate vulnerability depending on the weighting and summarizing methods. The reviewed methods are evaluated by being tested at the municipal level. Three weighting and summarizing methods, representative of climate vulnerability indices in general, are analysed. The results indicate that 34 of 36 method combinations differ significantly from each other. We argue that representing agricultural vulnerability in a single composite index might be insufficient to guide climate adaptation. We emphasize the need for further research into how to measure and visualize agricultural vulnerability and into how to communicate uncertainties in both data and methods. Copyright © 2015 Elsevier Ltd. All rights reserved.

  7. A synthesized biophysical and social vulnerability assessment for Taiwan

    NASA Astrophysics Data System (ADS)

    Lee, Yung-Jaan

    2017-11-01

    Taiwan, located in the Western Pacific, is a country that is one of the most vulnerable to disasters that are associated with the changing climate; it is located within the Ring of Fire, which is the most geologically active region in the world. The environmental and geological conditions in Taiwan are sensitive and vulnerable to such disasters. Owing to increasing urbanization in Taiwan, floods and climate-related disasters have taken an increasing toll on human lives. As global warming accelerates the rising of sea levels and increasing of the frequency of extreme weather events, disasters will continue to affect socioeconomic development and human conditions. Under such circumstances, researchers and policymakers alike must recognize the importance of providing useful knowledge concerning vulnerability, disaster recovery and resilience. Strategies for reducing vulnerability and climate-related disaster risks and for increasing resilience involve preparedness, mitigation and adaptation. In the last two decades, extreme climate events have caused severe flash floods, debris flows, landslides, and other disasters and have had negative effects of many sectors, including agriculture, infrastructure and health. Since climate change is expected to have a continued impact on socio-economic development, this work develops a vulnerability assessment framework that integrates both biophysical and social vulnerability and supports synthesized vulnerability analyses to identify vulnerable areas in Taiwan. Owing to its geographical, geological and climatic features, Taiwan is susceptible to earthquakes, typhoons, droughts and various induced disasters. Therefore, Taiwan has the urgent task of establishing a framework for assessing vulnerability as a planning and policy tool that can be used to identify not only the regions that require special attention but also hotspots in which efforts should be made to reduce vulnerability and the risk of climate-related disaster. To

  8. Integrated flash flood vulnerability assessment: Insights from East Attica, Greece

    NASA Astrophysics Data System (ADS)

    Karagiorgos, Konstantinos; Thaler, Thomas; Heiser, Micha; Hübl, Johannes; Fuchs, Sven

    2016-10-01

    In the framework of flood risk assessment, vulnerability is a key concept to assess the susceptibility of elements at risk. Besides the increasing amount of studies on flash floods available, in-depth information on vulnerability in Mediterranean countries was missing so far. Moreover, current approaches in vulnerability research are driven by a divide between social scientists who tend to view vulnerability as representing a set of socio-economic factors, and natural scientists who view vulnerability in terms of the degree of loss to an element at risk. Further, vulnerability studies in response to flash flood processes are rarely answered in the literature. In order to close this gap, this paper implemented an integrated vulnerability approach focusing on residential buildings exposed to flash floods in Greece. In general, both physical and social vulnerability was comparable low, which is interpreted as a result from (a) specific building regulations in Greece as well as general design principles leading to less structural susceptibility of elements at risk exposed, and (b) relatively low economic losses leading to less social vulnerability of citizens exposed. The population show high risk awareness and coping capacity to response to natural hazards event and in the same time the impact of the events are quite low, because of the already high use of local protection measures. The low vulnerability score for East Attica can be attributed especially to the low physical vulnerability and the moderate socio-economic well-being of the area. The consequence is to focus risk management strategies mainly in the reduction of the social vulnerability. By analysing both physical and social vulnerability an attempt was made to bridge the gap between scholars from sciences and humanities, and to integrate the results of the analysis into the broader vulnerability context.

  9. A new method for assessing squash tactics using 15 court areas for ball locations.

    PubMed

    Vučković, Goran; James, Nic; Hughes, Mike; Murray, Stafford; Milanović, Zoran; Perš, Janez; Sporiš, Goran

    2014-04-01

    Tactics in squash have typically been assessed using the frequency of different shot types played at different locations on the court either without reference to other relevant information or on the basis of the preceding shot. This paper presents a new squash specific method for categorizing court locations in which the ball was played, a novel techniques for assessing the reliability of this method and presents typical shots responses in these new areas controlled for preceding shot as well as the time between shots and the handedness of the players. Twelve games were viewed using the SAGIT/Squash software and 2907 shots viewed a second time from a video image taken from behind the court with an overall agreement of 88.90% for the court location data and 99.52% for shot type. 3192 shots from 9 matches from the 2003 World Team Championships were analyzed in SAGIT/Squash. In the court areas analyzed between 2 and 7 shot responses were predominant suggesting tactical patterns were evident. This was supported by differences evident between shot responses played from the two back corners where the backhand side was characterized by a predominance of straight drives whereas straight and crosscourt drives were played on the forehand side. These results tended to confirm that tactics i.e., consistent shot types, are played although these are only apparent when factors that determine shot selection are accounted for. This paper has controlled for some of these factors but others need to be considered e.g., if individual player profiles are to be ascertained. Copyright © 2014 Elsevier B.V. All rights reserved.

  10. Urban flood risk mitigation: from vulnerability assessment to resilient city

    NASA Astrophysics Data System (ADS)

    Serre, D.; Barroca, B.

    2009-04-01

    Urban flood risk mitigation: from vulnerability assessment to resilient city Bruno Barroca1, Damien Serre2 1Laboratory of Urban Engineering, Environment and Building (L G U E H) - Université de Marne-la-Vallée - Pôle Ville, 5, Bd Descartes - Bâtiment Lavoisier - 77454 Marne la Vallée Cedex 2 - France 2City of Paris Engineering School, Construction - Environment Department, 15 rue Fénelon, 75010 Paris, France In France, as in Europe and more generally throughout the world, river floods have been increasing in frequency and severity over the last ten years, and there are more instances of rivers bursting their banks, aggravating the impact of the flooding of areas supposedly protected by flood defenses. Despite efforts made to well maintain the flood defense assets, we often observe flood defense failures leading to finally increase flood risk in protected area during major flood events. Furthermore, flood forecasting models, although they benefit continuous improvements, remain partly inaccurate due to uncertainties populated all along data calculation processes. These circumstances obliged stakeholders and the scientific communities to manage flood risk by integrating new concepts like stakes management, vulnerability assessments and more recently urban resilience development. Definitively, the goal is to reduce flood risk by managing of course flood defenses and improving flood forecasting models, but also stakes and vulnerability of flooded areas to achieve urban resilience face to flood events. Vulnerability to flood is essentially concentrated in urban areas. Assessing vulnerability of a city is very difficult. Indeed, urban area is a complex system composed by a sum of technical sub-systems as complex as the urban area itself. Assessing city vulnerability consists in talking into account each sub system vulnerability and integrating all direct and indirect impacts generally depending from city shape and city spatial organization. At this time, although

  11. Improving vulnerability models: lessons learned from a comparison between flood and earthquake assessments

    NASA Astrophysics Data System (ADS)

    de Ruiter, Marleen; Ward, Philip; Daniell, James; Aerts, Jeroen

    2017-04-01

    In a cross-discipline study, an extensive literature review has been conducted to increase the understanding of vulnerability indicators used in both earthquake- and flood vulnerability assessments, and to provide insights into potential improvements of earthquake and flood vulnerability assessments. It identifies and compares indicators used to quantitatively assess earthquake and flood vulnerability, and discusses their respective differences and similarities. Indicators have been categorized into Physical- and Social categories, and further subdivided into (when possible) measurable and comparable indicators. Physical vulnerability indicators have been differentiated to exposed assets such as buildings and infrastructure. Social indicators are grouped in subcategories such as demographics, economics and awareness. Next, two different vulnerability model types have been described that use these indicators: index- and curve-based vulnerability models. A selection of these models (e.g. HAZUS) have been described, and compared on several characteristics such as temporal- and spatial aspects. It appears that earthquake vulnerability methods are traditionally strongly developed towards physical attributes at an object scale and used in vulnerability curve models, whereas flood vulnerability studies focus more on indicators applied to aggregated land-use scales. Flood risk studies could be improved using approaches from earthquake studies, such as incorporating more detailed lifeline and building indicators, and developing object-based vulnerability curve assessments of physical vulnerability, for example by defining building material based flood vulnerability curves. Related to this, is the incorporation of time of the day based building occupation patterns (at 2am most people will be at home while at 2pm most people will be in the office). Earthquake assessments could learn from flood studies when it comes to the refined selection of social vulnerability indicators

  12. DEMONSTRATING APPLICATIONS OF REGIONAL VULNERABILITY ASSESSMENT

    EPA Science Inventory

    This task is designed to respond to 2 Congressional earmarks of $1,000,000 to the Canaan Valley Institute (CVI) to work in close coordination with the Regional Vulnerability Assessment (ReVA) initiative to develop research and educational tools using integrative technologies to p...

  13. Tactical visualization module

    NASA Astrophysics Data System (ADS)

    Kachejian, Kerry C.; Vujcic, Doug

    1999-07-01

    The Tactical Visualization Module (TVM) research effort will develop and demonstrate a portable, tactical information system to enhance the situational awareness of individual warfighters and small military units by providing real-time access to manned and unmanned aircraft, tactically mobile robots, and unattended sensors. TVM consists of a family of portable and hand-held devices being advanced into a next- generation, embedded capability. It enables warfighters to visualize the tactical situation by providing real-time video, imagery, maps, floor plans, and 'fly-through' video on demand. When combined with unattended ground sensors, such as Combat- Q, TVM permits warfighters to validate and verify tactical targets. The use of TVM results in faster target engagement times, increased survivability, and reduction of the potential for fratricide. TVM technology can support both mounted and dismounted tactical forces involved in land, sea, and air warfighting operations. As a PCMCIA card, TVM can be embedded in portable, hand-held, and wearable PCs. Thus, it leverages emerging tactical displays including flat-panel, head-mounted displays. The end result of the program will be the demonstration of the system with U.S. Army and USMC personnel in an operational environment. Raytheon Systems Company, the U.S. Army Soldier Systems Command -- Natick RDE Center (SSCOM- NRDEC) and the Defense Advanced Research Projects Agency (DARPA) are partners in developing and demonstrating the TVM technology.

  14. Is a clean river fun for all? Recognizing social vulnerability in watershed planning.

    PubMed

    Cutts, Bethany B; Greenlee, Andrew J; Prochaska, Natalie K; Chantrill, Carolina V; Contractor, Annie B; Wilhoit, Juliana M; Abts, Nancy; Hornik, Kaitlyn

    2018-01-01

    Watershed planning can lead to policy innovation and action toward environmental protection. However, groups often suffer from low engagement with communities that experience disparate impacts from flooding and water pollution. This can limit the capacity of watershed efforts to dismantle pernicious forms of social inequality. As a result, the benefits of environmental changes often flow to more empowered residents, short-changing the power of watershed-based planning as a tool to transform ecological, economic, and social relationships. The objectives of this paper are to assess whether the worldview of watershed planning actors are sufficiently attuned to local patterns of social vulnerability and whether locally significant patterns of social vulnerability can be adequately differentiated using conventional data sources. Drawing from 35 in-depth interviews with watershed planners and community stakeholders in the Milwaukee River Basin (WI, USA), we identify five unique definitions of social vulnerability. Watershed planners in our sample articulate a narrower range of social vulnerability definitions than other participants. All five definitions emphasize spatial and demographic characteristics consistent with existing ways of measuring social vulnerability. However, existing measures do not adequately differentiate among the spatio-temporal dynamics used to distinguish definitions. In response, we develop two new social vulnerability measures. The combination of interviews and demographic analyses in this study provides an assessment technique that can help watershed planners (a) understand the limits of their own conceptualization of social vulnerability and (b) acknowledge the importance of place-based vulnerabilities that may otherwise be obscured. We conclude by discussing how our methods can be a useful tool for identifying opportunities to disrupt social vulnerability in a watershed by evaluating how issue frames, outreach messages, and engagement tactics

  15. Is a clean river fun for all? Recognizing social vulnerability in watershed planning

    PubMed Central

    Greenlee, Andrew J.; Prochaska, Natalie K.; Chantrill, Carolina V.; Contractor, Annie B.; Wilhoit, Juliana M.; Abts, Nancy; Hornik, Kaitlyn

    2018-01-01

    Watershed planning can lead to policy innovation and action toward environmental protection. However, groups often suffer from low engagement with communities that experience disparate impacts from flooding and water pollution. This can limit the capacity of watershed efforts to dismantle pernicious forms of social inequality. As a result, the benefits of environmental changes often flow to more empowered residents, short-changing the power of watershed-based planning as a tool to transform ecological, economic, and social relationships. The objectives of this paper are to assess whether the worldview of watershed planning actors are sufficiently attuned to local patterns of social vulnerability and whether locally significant patterns of social vulnerability can be adequately differentiated using conventional data sources. Drawing from 35 in-depth interviews with watershed planners and community stakeholders in the Milwaukee River Basin (WI, USA), we identify five unique definitions of social vulnerability. Watershed planners in our sample articulate a narrower range of social vulnerability definitions than other participants. All five definitions emphasize spatial and demographic characteristics consistent with existing ways of measuring social vulnerability. However, existing measures do not adequately differentiate among the spatio-temporal dynamics used to distinguish definitions. In response, we develop two new social vulnerability measures. The combination of interviews and demographic analyses in this study provides an assessment technique that can help watershed planners (a) understand the limits of their own conceptualization of social vulnerability and (b) acknowledge the importance of place-based vulnerabilities that may otherwise be obscured. We conclude by discussing how our methods can be a useful tool for identifying opportunities to disrupt social vulnerability in a watershed by evaluating how issue frames, outreach messages, and engagement tactics

  16. Scenarios for coastal vulnerability assessment

    USGS Publications Warehouse

    Nicholls, Robert J.; Woodroffe, Colin D.; Burkett, Virginia; Hay, John; Wong, Poh Poh; Nurse, Leonard; Wolanski, Eric; McLusky, Donald S.

    2011-01-01

    Coastal vulnerability assessments tend to focus mainly on climate change and especially on sea-level rise. Assessment of the influence of nonclimatic environmental change or socioeconomic change is less well developed and these drivers are often completely ignored. Given that the most profound coastal changes of the twentieth century due to nonclimate drivers are likely to continue through the twenty-first century, this is a major omission. It may result in not only overstating the importance of climate change but also overlooking significant interactions of climate change and other drivers. To support the development of policies relating to climate change and coastal management, integrated assessments of climatic change in coastal areas are required, including the effects of all the relevant drivers. This chapter explores the development of scenarios (or "plausible futures") of relevant climate and nonclimate drivers that can be used for coastal analysis, with an emphasis on the nonclimate drivers. It shows the importance of analyzing the impacts of climate change and sea-level rise in a broader context of coastal change and all its drivers. This will improve the analysis of impacts, key vulnerabilities, and adaptation needs and, hence, inform climate and coastal policy. Stakeholder engagement is important in the development of scenarios, and the underlying assumptions need to be explicit, transparent, and open to scientific debate concerning their uncertainties/realism and likelihood.

  17. Offensive tactical thinking level of wheelchair basketball players in Arab countries.

    PubMed

    Hindawi, Omar S; Orabi, Samira; Al Arjan, Jafar; Judge, Lawrence W; Cottingham, Michael; Bellar, David Michael

    2013-01-01

    The purpose of this study was to assess the appropriateness of offensive tactical decision-making of Arab basketball players, and to determine if there are differences in the appropriateness of offensive tactical decision-making within the various disability classifications of Arab basketball players. A twenty-question survey was formulated to assess decision-making in offensive tactical situations in wheelchair basketball players. Participants in the present study were 108 athletes from 10 Arab national teams participating in wheelchair basketball. The mean offensive tactical thinking level of wheelchair basketball players in the 20 different situations in the Arab countries ranged between 1.38-2.84, and the standard deviations for these 20 means ranged from 0.41 to 0.90. The total mean of all tactical situations was 2.33, which is moderate thinking level. The influence of the disability classification on the offensive tactical thinking of wheelchair basketball players was addressed by examining the data via a one-way ANOVA. The ANOVA revealed no significant differences among disability classifications/categories in tactical thinking (F(3, 104)=1.12, p=0.34). This study represents the first attempt to identify why Arab nations have not consistently qualified for the Paralympics or World Championships. These findings indicate that the moderate offensive tactical thinking level of wheelchair basketball players on Arab national teams may be part of the reason that performances of these teams have not been as strong as they would like.

  18. [Research advances in vulnerability assessment of natural ecosystem response to climate change].

    PubMed

    Zhao, Hui-xia; Wu, Shao-hong; Jiang, Lu-guang

    2007-02-01

    Climate change with global warming as the sign has been caught great attention by the governments, international organizations, and scientists in the world. Human society and natural ecosystem are both exposed to climate change, and more and more people are waked up by its increasing harm. Vulnerability analysis and assessment are the key and basis for adapting and mitigating climate change, being the highlight in the research fields of climate change and ecology in recent years. The vulnerability assessment of climate change is being carried out in various research fields and on different scales, and much progress has been made. This paper introduced the concept of vulnerability, and summarized the research progress in vulnerability assessment of climate change, with the focus on the frame and methodology of vulnerability assessment of natural ecosystem response to climate change. The existed problems and future prospects in this research area were also discussed.

  19. Evaluation of tactical training in team handball by means of artificial neural networks.

    PubMed

    Hassan, Amr; Schrapf, Norbert; Ramadan, Wael; Tilp, Markus

    2017-04-01

    While tactical performance in competition has been analysed extensively, the assessment of training processes of tactical behaviour has rather been neglected in the literature. Therefore, the purpose of this study is to provide a methodology to assess the acquisition and implementation of offensive tactical behaviour in team handball. The use of game analysis software combined with an artificial neural network (ANN) software enabled identifying tactical target patterns from high level junior players based on their positions during offensive actions. These patterns were then trained by an amateur junior handball team (n = 14, 17 (0.5) years)). Following 6 weeks of tactical training an exhibition game was performed where the players were advised to use the target patterns as often as possible. Subsequently, the position data of the game was analysed with an ANN. The test revealed that 58% of the played patterns could be related to the trained target patterns. The similarity between executed patterns and target patterns was assessed by calculating the mean distance between key positions of the players in the game and the target pattern which was 0.49 (0.20) m. In summary, the presented method appears to be a valid instrument to assess tactical training.

  20. Ecosystem Vulnerability Review: Proposal of an Interdisciplinary Ecosystem Assessment Approach

    NASA Astrophysics Data System (ADS)

    Weißhuhn, Peter; Müller, Felix; Wiggering, Hubert

    2018-06-01

    To safeguard the sustainable use of ecosystems and their services, early detection of potentially damaging changes in functional capabilities is needed. To support a proper ecosystem management, the analysis of an ecosystem's vulnerability provide information on its weaknesses as well as on its capacity to recover after suffering an impact. However, the application of the vulnerability concept to ecosystems is still an emerging topic. After providing background on the vulnerability concept, we summarize existing ecosystem vulnerability research on the basis of a systematic literature review with a special focus on ecosystem type, disciplinary background, and more detailed definition of the ecosystem vulnerability components. Using the Web of ScienceTM Core Collection, we overviewed the literature from 1991 onwards but used the 5 years from 2011 to 2015 for an in-depth analysis, including 129 articles. We found that ecosystem vulnerability analysis has been applied most notably in conservation biology, climate change research, and ecological risk assessments, pinpointing a limited spreading across the environmental sciences. It occurred primarily within marine and freshwater ecosystems. To avoid confusion, we recommend using the unambiguous term ecosystem vulnerability rather than ecological, environmental, population, or community vulnerability. Further, common ground has been identified, on which to define the ecosystem vulnerability components exposure, sensitivity, and adaptive capacity. We propose a framework for ecosystem assessments that coherently connects the concepts of vulnerability, resilience, and adaptability as different ecosystem responses. A short outlook on the possible operationalization of the concept by ecosystem vulnerabilty indices, and a conclusion section complete the review.

  1. Ecosystem Vulnerability Review: Proposal of an Interdisciplinary Ecosystem Assessment Approach.

    PubMed

    Weißhuhn, Peter; Müller, Felix; Wiggering, Hubert

    2018-06-01

    To safeguard the sustainable use of ecosystems and their services, early detection of potentially damaging changes in functional capabilities is needed. To support a proper ecosystem management, the analysis of an ecosystem's vulnerability provide information on its weaknesses as well as on its capacity to recover after suffering an impact. However, the application of the vulnerability concept to ecosystems is still an emerging topic. After providing background on the vulnerability concept, we summarize existing ecosystem vulnerability research on the basis of a systematic literature review with a special focus on ecosystem type, disciplinary background, and more detailed definition of the ecosystem vulnerability components. Using the Web of Science TM Core Collection, we overviewed the literature from 1991 onwards but used the 5 years from 2011 to 2015 for an in-depth analysis, including 129 articles. We found that ecosystem vulnerability analysis has been applied most notably in conservation biology, climate change research, and ecological risk assessments, pinpointing a limited spreading across the environmental sciences. It occurred primarily within marine and freshwater ecosystems. To avoid confusion, we recommend using the unambiguous term ecosystem vulnerability rather than ecological, environmental, population, or community vulnerability. Further, common ground has been identified, on which to define the ecosystem vulnerability components exposure, sensitivity, and adaptive capacity. We propose a framework for ecosystem assessments that coherently connects the concepts of vulnerability, resilience, and adaptability as different ecosystem responses. A short outlook on the possible operationalization of the concept by ecosystem vulnerabilty indices, and a conclusion section complete the review.

  2. Relationship between tactics and energy expenditure according to level of experience in badminton.

    PubMed

    Dieu, Olivier; Blondeau, Thomas; Vanhelst, Jérémy; Fardy, Paul S; Bui-Xuân, Gilles; Mikulovic, Jacques

    2014-10-01

    Research on racket sports has traditionally focused on expert players and has treated energy expenditure and tactics as independent factors. These prior studies could not assess how energy expenditure and tactics changed as a function of experience and skill. Here, the specific relationship between playing tactics and energy expenditure in badminton were assessed. Participants were classified into five stages of badminton experience on the basis of conative criteria: structural (physical abilities), technical (technical skills), and functional (tactics). The physical activity of 99 players (47 beginners, 15 intermediates, 30 advanced, and 7 experts) was measured using a three-axis accelerometer during a badminton set (21 points, no extra scoring). The results showed that physical activity (counts/sec.) ranged between about 115 (Stage 1) and 155 (Stage 5), and differed significantly across the conative stages. For Stages 2 and 4, defined by an increase in use of tactics, physical activity increased substantially. For Stage 3, defined by a decrease in use of tactics, physical activity decreased significantly. Thus, tactically-oriented play appears to be closely related to physical activity.

  3. Assessing groundwater vulnerability to agrichemical contamination in the Midwest US

    USGS Publications Warehouse

    Burkart, M.R.; Kolpin, D.W.; James, D.E.

    1999-01-01

    Agrichemicals (herbicides and nitrate) are significant sources of diffuse pollution to groundwater. Indirect methods are needed to assess the potential for groundwater contamination by diffuse sources because groundwater monitoring is too costly to adequately define the geographic extent of contamination at a regional or national scale. This paper presents examples of the application of statistical, overlay and index, and process-based modeling methods for groundwater vulnerability assessments to a variety of data from the Midwest U.S. The principles for vulnerability assessment include both intrinsic (pedologic, climatologic, and hydrogeologic factors) and specific (contaminant and other anthropogenic factors) vulnerability of a location. Statistical methods use the frequency of contaminant occurrence, contaminant concentration, or contamination probability as a response variable. Statistical assessments are useful for defining the relations among explanatory and response variables whether they define intrinsic or specific vulnerability. Multivariate statistical analyses are useful for ranking variables critical to estimating water quality responses of interest. Overlay and index methods involve intersecting maps of intrinsic and specific vulnerability properties and indexing the variables by applying appropriate weights. Deterministic models use process-based equations to simulate contaminant transport and are distinguished from the other methods in their potential to predict contaminant transport in both space and time. An example of a one-dimensional leaching model linked to a geographic information system (GIS) to define a regional metamodel for contamination in the Midwest is included.

  4. Vulnerability Assessments and Resilience Planning at Federal Sites

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Moss, Richard H.; Blohm, Andrew; Delgado, Alison

    2016-02-01

    U.S. government agencies are now directed to assess the vulnerability of their operations and facilities to climate change and to develop adaptation plans to increase their resilience. Specific guidance on methods is still evolving based on the many different available frameworks. This technical paper synthesizes lessons and insights from a series of research case studies conducted by the investigators at facilities of the U.S. Departments of Energy and Defense. The paper provides a framework of steps for climate vulnerability assessments at Federal facilities and elaborates on three sets of methods required for assessments, regardless of the detailed framework used. Inmore » a concluding section, the paper suggests a roadmap to further develop methods to support agencies in preparing for climate change.« less

  5. Vulnerability Assessments and Resilience Planning at Federal Facilities. Preliminary Synthesis of Project

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Moss, R. H.; Blohm, A. J.; Delgado, A.

    2015-08-15

    U.S. government agencies are now directed to assess the vulnerability of their operations and facilities to climate change and to develop adaptation plans to increase their resilience. Specific guidance on methods is still evolving based on the many different available frameworks. Agencies have been experimenting with these frameworks and approaches. This technical paper synthesizes lessons and insights from a series of research case studies conducted by the investigators at facilities of the U.S. Department of Energy and the Department of Defense. The purpose of the paper is to solicit comments and feedback from interested program managers and analysts before finalmore » conclusions are published. The paper describes the characteristics of a systematic process for prioritizing needs for adaptation planning at individual facilities and examines requirements and methods needed. It then suggests a framework of steps for vulnerability assessments at Federal facilities and elaborates on three sets of methods required for assessments, regardless of the detailed framework used. In a concluding section, the paper suggests a roadmap to further develop methods to support agencies in preparing for climate change. The case studies point to several preliminary conclusions; (1) Vulnerability assessments are needed to translate potential changes in climate exposure to estimates of impacts and evaluation of their significance for operations and mission attainment, in other words into information that is related to and useful in ongoing planning, management, and decision-making processes; (2) To increase the relevance and utility of vulnerability assessments to site personnel, the assessment process needs to emphasize the characteristics of the site infrastructure, not just climate change; (3) A multi-tiered framework that includes screening, vulnerability assessments at the most vulnerable installations, and adaptation design will efficiently target high-risk sites and

  6. Enhancement of global flood damage assessments using building material based vulnerability curves

    NASA Astrophysics Data System (ADS)

    Englhardt, Johanna; de Ruiter, Marleen; de Moel, Hans; Aerts, Jeroen

    2017-04-01

    This study discusses the development of an enhanced approach for flood damage and risk assessments using vulnerability curves that are based on building material information. The approach draws upon common practices in earthquake vulnerability assessments, and is an alternative for land-use or building occupancy approach in flood risk assessment models. The approach is of particular importance for studies where there is a large variation in building material, such as large scale studies or studies in developing countries. A case study of Ethiopia is used to demonstrate the impact of the different methodological approaches on direct damage assessments due to flooding. Generally, flood damage assessments use damage curves for different land-use or occupancy types (i.e. urban or residential and commercial classes). However, these categories do not necessarily relate directly to vulnerability of damage by flood waters. For this, the construction type and building material may be more important, as is used in earthquake risk assessments. For this study, we use building material classification data of the PAGER1 project to define new building material based vulnerability classes for flood damage. This approach will be compared to the widely applied land-use based vulnerability curves such as used by De Moel et al. (2011). The case of Ethiopia demonstrates and compares the feasibility of this novel flood vulnerability method on a country level which holds the potential to be scaled up to a global level. The study shows that flood vulnerability based on building material also allows for better differentiation between flood damage in urban and rural settings, opening doors to better link to poverty studies when such exposure data is available. Furthermore, this new approach paves the road to the enhancement of multi-risk assessments as the method enables the comparison of vulnerability across different natural hazard types that also use material-based vulnerability curves

  7. Combining landscape variables and species traits can improve the utility of climate change vulnerability assessments

    USGS Publications Warehouse

    Nadeau, Christopher P.; Fuller, Angela K.

    2016-01-01

    Conservation organizations worldwide are investing in climate change vulnerability assessments. Most vulnerability assessment methods focus on either landscape features or species traits that can affect a species vulnerability to climate change. However, landscape features and species traits likely interact to affect vulnerability. We compare a landscape-based assessment, a trait-based assessment, and an assessment that combines landscape variables and species traits for 113 species of birds, herpetofauna, and mammals in the northeastern United States. Our aim is to better understand which species traits and landscape variables have the largest influence on assessment results and which types of vulnerability assessments are most useful for different objectives. Species traits were most important for determining which species will be most vulnerable to climate change. The sensitivity of species to dispersal barriers and the species average natal dispersal distance were the most important traits. Landscape features were most important for determining where species will be most vulnerable because species were most vulnerable in areas where multiple landscape features combined to increase vulnerability, regardless of species traits. The interaction between landscape variables and species traits was important when determining how to reduce climate change vulnerability. For example, an assessment that combines information on landscape connectivity, climate change velocity, and natal dispersal distance suggests that increasing landscape connectivity may not reduce the vulnerability of many species. Assessments that include landscape features and species traits will likely be most useful in guiding conservation under climate change.

  8. Drought vulnerability assessment: The case of wheat farmers in Western Iran

    NASA Astrophysics Data System (ADS)

    Zarafshani, Kiumars; Sharafi, Lida; Azadi, Hossein; Hosseininia, Gholamhossein; De Maeyer, Philippe; Witlox, Frank

    2012-12-01

    Drought, as a natural and slow-onset phenomenon, creates numerous damages to agricultural communities. As a drought prone area in the Middle East, Iran has currently launched a crisis management approach to mitigate the harmful impacts of drought. However, thus far studies indicate that effective drought management strategies should be designed based upon vulnerability management which can increase farmers' ability to challenge the impacts. The purpose of this study was to assess drought vulnerability across three drought intensities (very high, extremely high, and critical) areas in Western Iran. Accordingly, a survey study was applied and 370 wheat farmers who all experienced drought during 2007-2009 were selected through a multi-stage stratified random sampling method. Face to face interviews were used to collect data on vulnerability indices from the farmers. Me-Bar and Valdez's vulnerability formula was applied to assess the vulnerability of wheat farmers during drought. Results revealed that the farmers' vulnerability is influenced mainly by economic, socio-cultural, psychological, technical, and infrastructural factors. The results also indicated that the farmers in Sarpole-Zahab township were most vulnerable compared to those in the Kermanshah township as the least vulnerable. Accordingly, some conclusions and recommendations are drawn for both policy-makers and practitioners who often must prioritize limited resources in the design vulnerability-reducing interventions.

  9. Intrinsic vulnerability assessment of Sette Comuni Plateau aquifer (Veneto Region, Italy).

    PubMed

    Cucchi, Franco; Franceschini, Giuliana; Zini, Luca; Aurighi, Marina

    2008-09-01

    Maps illustrating the different degrees of vulnerability within a given area are integral to environmental protection and management policies. The assessment of the intrinsic vulnerability of karst areas is difficult since the type and stage of karst development and the related underground discharge behavior are difficult to determine and quantify. Geographic Information Systems techniques are applied to the evaluation of the vulnerability of an aquifer in the alpine karst area of the Sette Comuni Plateau, in the Veneto Region of northern Italy. The water resources of the studied aquifer are of particular importance to the local communities. This aquifer must therefore be protected from both inappropriate use as well as possible pollution. The SINTACS and SINTACS P(RO) K(ARST) vulnerability assessment methods have been utilized here to create the vulnerability map. SINTACS P(RO) K(ARST) is an adaptation of the parametric managerial model (SINTACS) to karst hydrostructures. The vulnerability map reveals vast zones (81% of the analyzed areas) with a high degree of vulnerability. The presence of well-developed karst structures in these highly vulnerable areas facilitate water percolation, thereby enhancing the groundwater vulnerability risk. Only 1.5 of the studied aquifer have extremely high-vulnerability levels, however these areas include all of the major springs utilized for human consumption. This vulnerability map of the Sette Comuni Plateau aquifer is an indispensable tool for both the effective management of water resources and as support to environmental planning in the Sette Comuni Plateau area.

  10. Vulnerability assessment at a national level in Georgia

    NASA Astrophysics Data System (ADS)

    Tsereteli, N.; Arabidze, V.; Varazanashvili, O.; Gugeshashvili, T.

    2012-04-01

    Vulnerability assessment at a national level in Georgia Nino Tsereteli, Vakhtang Arabidze, Otar Varazanashvili, Tengiz Gugeshashvili The risk always exists when cities are built on. Population growth in cities and urbanization in natural hazard-prone zones leads to infrastructure expansion. The goal of the society is to construct natural hazards resistant infrastructure and minimize the expected losses. This is a complicated task as there is always knowledge deficiency on real seismic hazard and vulnerability. Assessment of vulnerability is vital in risk analysis, as vulnerability is defined in many different ways. Work presented here mostly deals with assessment of infrastructure's and population vulnerability at national level in Georgia. This work was initiated by NATO SFP project "seismic Hazard and Risk Assessment for Southern Caucasus - Eastern Turkey Energy Corridors" and the two work packages WP4 (seismic risk) and WP5 (city scenarios) of risk module of EMME (Earthquake Model of the Middle East Region) project. First step was creation databases (inventory) of elements at risk in GIS. Element at risk were the buildings, population, pipelines. The inventories was studied and Created in GIS for the following categories: Building material, number of stories, number of entrances, condition of building, building period. For pipelines pipe tipe (continous or segmented), material, pipe diameter. Very important is to estimate the initial cost of building for assessment of economic losses. From this purpose the attempt was done and the algorithm of this estimation were prepared taking into account obtained the inventory. Build quality, reliability and durability are of special importance to corresponding state agencies and include different aesthetic, engineering, practical, social, technological and economical aspects. The necessity that all of these aspects satisfy existing normative requirements becomes evident as the building and structures come into exploitation

  11. Assessing vulnerability to drought: identifying underlying factors across Europe

    NASA Astrophysics Data System (ADS)

    Urquijo, Julia; Gonzalez Tánago, Itziar; Ballesteros, Mario; De Stefano, Lucia

    2015-04-01

    Drought is considered one of the most severe and damaging natural hazards in terms of people and sectors affected and associated losses. Drought is a normal and recurrent climatic phenomenon that occurs worldwide, although its spatial and temporal characteristics vary significantly among climates. In the case of Europe, in the last thirty years, the region has suffered several drought events that have caused estimated economic damages over a €100 billion and have affected almost 20% of its territory and population. In recent years, there has been a growing awareness among experts and authorities of the need to shift from a reactive crisis approach to a drought risk management approach, as well as of the importance of designing and implementing policies, strategies and plans at country and river basin levels to deal with drought. The identification of whom and what is vulnerable to drought is a central aspect of drought risk mitigation and planning and several authors agree that societal vulnerability often determines drought risk more than the actual precipitation shortfalls. The final aim of a drought vulnerability assessment is to identify the underlying sources of drought impact, in order to develop policy options that help to enhance coping capacity and therefore to prevent drought impact. This study identifies and maps factors underlying vulnerability to drought across Europe. The identification of factors influencing vulnerability starts from the analysis of past drought impacts in four European socioeconomic sectors. This analysis, along with an extensive literature review, led to the selection of vulnerability factors that are both relevant and adequate for the European context. Adopting the IPCC model, vulnerability factors were grouped to describe exposure, sensitivity and adaptive capacity. The aggregation of these components has resulted in the mapping of vulnerability to drought across Europe at NUTS02 level. Final results have been compared with

  12. Burnout of teachers as related to influence tactics within the college classroom.

    PubMed

    Lamude, K G; Scudder, J

    1994-10-01

    Previous research has shown that burnout among college teachers is negatively associated with on-task learning and student-oriented concerns expressed as tactics on influence in class. Using data collected from 142 college teachers, this study examined this relationship. Burnout was measured on Cherniss's measure, and tactics of influence were assessed by the Behavior Alteration Message Technique. Analysis indicated burnout in teachers was positively related to pressure and position tactics on influence and negatively related to exchange of rewards, rational arguments, and feedback tactics of influence.

  13. Probabilistic seismic vulnerability and risk assessment of stone masonry structures

    NASA Astrophysics Data System (ADS)

    Abo El Ezz, Ahmad

    Earthquakes represent major natural hazards that regularly impact the built environment in seismic prone areas worldwide and cause considerable social and economic losses. The high losses incurred following the past destructive earthquakes promoted the need for assessment of the seismic vulnerability and risk of the existing buildings. Many historic buildings in the old urban centers in Eastern Canada such as Old Quebec City are built of stone masonry and represent un-measurable architectural and cultural heritage. These buildings were built to resist gravity loads only and generally offer poor resistance to lateral seismic loads. Seismic vulnerability assessment of stone masonry buildings is therefore the first necessary step in developing seismic retrofitting and pre-disaster mitigation plans. The objective of this study is to develop a set of probability-based analytical tools for efficient seismic vulnerability and uncertainty analysis of stone masonry buildings. A simplified probabilistic analytical methodology for vulnerability modelling of stone masonry building with systematic treatment of uncertainties throughout the modelling process is developed in the first part of this study. Building capacity curves are developed using a simplified mechanical model. A displacement based procedure is used to develop damage state fragility functions in terms of spectral displacement response based on drift thresholds of stone masonry walls. A simplified probabilistic seismic demand analysis is proposed to capture the combined uncertainty in capacity and demand on fragility functions. In the second part, a robust analytical procedure for the development of seismic hazard compatible fragility and vulnerability functions is proposed. The results are given by sets of seismic hazard compatible vulnerability functions in terms of structure-independent intensity measure (e.g. spectral acceleration) that can be used for seismic risk analysis. The procedure is very efficient for

  14. Tactical missile aerodynamics

    NASA Technical Reports Server (NTRS)

    Hemsch, Michael J. (Editor); Nielsen, Jack N. (Editor)

    1986-01-01

    The present conference on tactical missile aerodynamics discusses autopilot-related aerodynamic design considerations, flow visualization methods' role in the study of high angle-of-attack aerodynamics, low aspect ratio wing behavior at high angle-of-attack, supersonic airbreathing propulsion system inlet design, missile bodies with noncircular cross section and bank-to-turn maneuvering capabilities, 'waverider' supersonic cruise missile concepts and design methods, asymmetric vortex sheding phenomena from bodies-of-revolution, and swept shock wave/boundary layer interaction phenomena. Also discussed are the assessment of aerodynamic drag in tactical missiles, the analysis of supersonic missile aerodynamic heating, the 'equivalent angle-of-attack' concept for engineering analysis, the vortex cloud model for body vortex shedding and tracking, paneling methods with vorticity effects and corrections for nonlinear compressibility, the application of supersonic full potential method to missile bodies, Euler space marching methods for missiles, three-dimensional missile boundary layers, and an analysis of exhaust plumes and their interaction with missile airframes.

  15. Assessing and managing freshwater ecosystems vulnerable to global change

    USGS Publications Warehouse

    Angeler, David G.; Allen, Craig R.; Birge, Hannah E.; Drakare, Stina; McKie, Brendan G.; Johnson, Richard K.

    2014-01-01

    Freshwater ecosystems are important for global biodiversity and provide essential ecosystem services. There is consensus in the scientific literature that freshwater ecosystems are vulnerable to the impacts of environmental change, which may trigger irreversible regime shifts upon which biodiversity and ecosystem services may be lost. There are profound uncertainties regarding the management and assessment of the vulnerability of freshwater ecosystems to environmental change. Quantitative approaches are needed to reduce this uncertainty. We describe available statistical and modeling approaches along with case studies that demonstrate how resilience theory can be applied to aid decision-making in natural resources management. We highlight especially how long-term monitoring efforts combined with ecological theory can provide a novel nexus between ecological impact assessment and management, and the quantification of systemic vulnerability and thus the resilience of ecosystems to environmental change.

  16. A Model for Developing and Assessing Tactical Decision-Making Competency in Game Play

    ERIC Educational Resources Information Center

    Pagnano-Richardson, Karen; Henninger, Mary L.

    2008-01-01

    All teachers want their students to become better game players who are motivated to participate in and outside of class. Students need to learn how to make good tactical decisions, in addition to being skilled movers, in order to become competent game players. When students make better tactical decisions, they experience more success and therefore…

  17. Livelihood Vulnerability Assessment Of Farmers and Nomads in Eastern Ecotone of Tibetan Plateau

    NASA Astrophysics Data System (ADS)

    Yan, J.; Zhang, Y.

    2011-12-01

    Livelihood vulnerability assessment provides a scientific basis for anti-poverty of people and regional sustainable development in vulnerable area. Although there are massive discussions on concept of vulnerability, it is still difficult to make it quantitative and to carry out comprehensive appraise. Vulnerability assessments based on sustainable livelihood frame are widely accepted in case studies for attentions to vulnerable groups. However, these case studies are always on regional scale and never reflect how climate change affects people's livelihood and adaptive capability of people. It is necessary to seek vulnerable assessment index system and means based on livelihood process of local people. This paper develops a livelihood vulnerability assessment index system on the basis of sustainable livelihood framework and appraises livelihood vulnerability values of 11 townships, using data of 879 sample households. Livelihood vulnerability assessment index system reflects main risks, livelihood assets and adaptation strategies of local people and government. The results show that livelihood vulnerability level of plateau region is higher than that of mountain to plateau region and mountain gorge region. Manzhang Township in plateau region is the most vulnerable township and nomads there cannot cope with risks of climate change, meadow degeneration and herbs degradation. Upper part of mountain to plateau region and the whole plateau region have high livelihood vulnerability values and local nomads would not cope with risks if no measures are taken by government. The driving forces of livelihood vulnerability include strikes of risks and deficiency of livelihood assets and adaptive capability. Farmers and nomads in high mountain gorge region and lower part of mountain to plateau region can cope with these risks, meanwhile, there are more employment opportunities in second and tertiary industries are needed to help them realize livelihood diversification. Therefore

  18. Study on the Groundwater Vulnerability Assessment in Sanjiang Plain in Northeast China

    NASA Astrophysics Data System (ADS)

    Tang, Y.; Tang, W. K.; Liu, C.

    2012-12-01

    The Sanjiang Plain is located in eastern part of China's Heilongjiang Province.It's total area is 109 000 km2, with cultivated land area being 3.6677 million hm2. It is a major national commodity grain base. Rice planting area in Sanjiang Plain has been increasing year by year. Groundwater exploitation is increasing rapidly as a result of rapid increase of paddy field area. It is necessary to research and analyze spatial diversity of groundwater pollution vulnerability for Sanjiang Plain, so as to fulfill the goal of integrated planning, rational utilization of land and water resource, avoiding or minimizing groundwater contamination, and protecting grain security of China. Based on the commonly used DRASTIC method internationally, and according to hydrogeology, land use and other characteristics of Sanjiang Plain, this paper establishes groundwater vulnerability assessment index system. Since the Sanjiang Plain is an area that gives priority to agriculture, and impact of agricultural land and agricultural activity on groundwater vulnerability can not be ignored. Two indicators of agricultural land use rate (L) and population density (P) are increased in the DRASTC index system, the remaining 5 indicators are groundwater depth (D), aquifer net recharge(R), aquifer media type (A), soil type(S), aquifer hydraulic conductivity (C). Taking ArcGis as a calculation analysis platform to assess groundwater vulnerability of the Sanjiang Plain, by using hierarchical analysis method of the fuzzy mathematics method to calculate each index weigh of evaluation vulnerability. This paper applies 6 levels of assessment standard as follows: vulnerability index DI <2 stands for not vulnerable; 2 vulnerable; 4< DI ≤ 5 stands for more vulnerable; 5vulnerable; 7vulnerable; DI> 8 stands for extremely vulnerable. Groundwater vulnerably contaminated area is delineated based on the groundwater vulnerability spatial

  19. An Assessment of Vulnerabilities for Ship-based Control Systems

    DTIC Science & Technology

    2009-09-01

    VULNERABILITIES FOR SHIP- BASED CONTROL SYSTEMS by Richard Bensing September 2009 Thesis Advisor: Karen Burke Co-Advisor: George Dinolt...COVERED Master’s Thesis 4. TITLE AND SUBTITLE: An Assessment of Vulnerabilities for Ship- based Control Systems 6. AUTHOR(S) Richard Bensing 5...soft underbelly. Computer- based control systems form the heart of the critical infrastructure, and these control systems are riddled with rampant

  20. Assessment of human-natural system characteristics influencing global freshwater supply vulnerability

    NASA Astrophysics Data System (ADS)

    Padowski, Julie C.; Gorelick, Steven M.; Thompson, Barton H.; Rozelle, Scott; Fendorf, Scott

    2015-10-01

    Global freshwater vulnerability is a product of environmental and human dimensions, however, it is rarely assessed as such. Our approach identifies freshwater vulnerability using four broad categories: endowment, demand, infrastructure, and institutions, to capture impacts on natural and managed water systems within the coupled human-hydrologic environment. These categories are represented by 19 different endogenous and exogenous characteristics affecting water supply vulnerability. By evaluating 119 lower per capita income countries (<10 725), we find that every nation experiences some form of vulnerability. Institutional vulnerability is experienced most commonly, occurring in 44 nations, and 23 countries suffer deficiencies in all four categories. Of these highly vulnerable countries, Jordan is the most vulnerable, reporting the greatest number of characteristics (5 of 19) at critical vulnerability levels, with Yemen and Djibouti nearly as vulnerable. Surprising similarities in vulnerability were also found among geographically disparate nations such as Vietnam, Sri Lanka, and Guatemala. Determining shared patterns of freshwater vulnerability provides insights into why water supply vulnerabilities are manifested in human-water systems at the national scale.

  1. Regulatory Guide on Conducting a Security Vulnerability Assessment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ek, David R.

    This document will provide guidelines on conducting a security vulnerability assessment at a facility regulated by the Radiation Protection Centre. The guidelines provide a performance approach assess security effectiveness. The guidelines provide guidance for a review following the objectives outlined in IAEA NSS#11 for Category 1, 2, & 3 sources.

  2. Multiple flood vulnerability assessment approach based on fuzzy comprehensive evaluation method and coordinated development degree model.

    PubMed

    Yang, Weichao; Xu, Kui; Lian, Jijian; Bin, Lingling; Ma, Chao

    2018-05-01

    Flood is a serious challenge that increasingly affects the residents as well as policymakers. Flood vulnerability assessment is becoming gradually relevant in the world. The purpose of this study is to develop an approach to reveal the relationship between exposure, sensitivity and adaptive capacity for better flood vulnerability assessment, based on the fuzzy comprehensive evaluation method (FCEM) and coordinated development degree model (CDDM). The approach is organized into three parts: establishment of index system, assessment of exposure, sensitivity and adaptive capacity, and multiple flood vulnerability assessment. Hydrodynamic model and statistical data are employed for the establishment of index system; FCEM is used to evaluate exposure, sensitivity and adaptive capacity; and CDDM is applied to express the relationship of the three components of vulnerability. Six multiple flood vulnerability types and four levels are proposed to assess flood vulnerability from multiple perspectives. Then the approach is applied to assess the spatiality of flood vulnerability in Hainan's eastern area, China. Based on the results of multiple flood vulnerability, a decision-making process for rational allocation of limited resources is proposed and applied to the study area. The study shows that multiple flood vulnerability assessment can evaluate vulnerability more completely, and help decision makers learn more information about making decisions in a more comprehensive way. In summary, this study provides a new way for flood vulnerability assessment and disaster prevention decision. Copyright © 2018 Elsevier Ltd. All rights reserved.

  3. Assessing intrinsic and specific vulnerability models ability to indicate groundwater vulnerability to groups of similar pesticides: A comparative study

    USGS Publications Warehouse

    Douglas, Steven; Dixon, Barnali; Griffin, Dale W.

    2018-01-01

    With continued population growth and increasing use of fresh groundwater resources, protection of this valuable resource is critical. A cost effective means to assess risk of groundwater contamination potential will provide a useful tool to protect these resources. Integrating geospatial methods offers a means to quantify the risk of contaminant potential in cost effective and spatially explicit ways. This research was designed to compare the ability of intrinsic (DRASTIC) and specific (Attenuation Factor; AF) vulnerability models to indicate groundwater vulnerability areas by comparing model results to the presence of pesticides from groundwater sample datasets. A logistic regression was used to assess the relationship between the environmental variables and the presence or absence of pesticides within regions of varying vulnerability. According to the DRASTIC model, more than 20% of the study area is very highly vulnerable. Approximately 30% is very highly vulnerable according to the AF model. When groundwater concentrations of individual pesticides were compared to model predictions, the results were mixed. Model predictability improved when concentrations of the group of similar pesticides were compared to model results. Compared to the DRASTIC model, the AF model more accurately predicts the distribution of the number of contaminated wells within each vulnerability class.

  4. Testing of Tactical Performance in Youth Elite Soccer

    PubMed Central

    2010-01-01

    This is a twofold study with the goals of evaluating tactical oriented game test situations for 12-13-year old highly-talented soccer players and to analyze dynamic, intra-individual developments of the players. A cross-sectional design was carried in study 1, using game test situations to measure specific tactics and creative performance for 195 expert players. The results from five evaluation criteria show that both diagnostic instruments can be used for recording football-specific creativity and game intelligence in talented young players. They produced tactical indicators that can be described as objective and valid, exhibit a sufficient degree of differentiation and are easy to record. Study 2 uses a longitudinal design to present a dynamic performance diagnostic tool for analyzing intra-individual improvements of German Soccer Foundation talents according to football-specific creativity and game intelligence. The results with respect to divergent tactical thinking clearly show that very different change processes were observed in the German Soccer Foundation players. Finally, the practical implications for the training process are discussed on the basis of both studies. Key points With game test situations it is possible to assess tactical performance as game intelligence and creativity objective, valid, with a sufficient degree of differentiation, and economically. The results with respect to game intelligence and creativity show that very different change processes were observed in the German Soccer Foundation players dependend on the bases (trainers). Current literature on tactics for school sports as well as for children’s, youth and high performance soccer at the club level should place much more emphasis on individual and group-tactical requirements in soccer. PMID:24149686

  5. Testing of tactical performance in youth elite soccer.

    PubMed

    Memmert, Daniel

    2010-01-01

    This is a twofold study with the goals of evaluating tactical oriented game test situations for 12-13-year old highly-talented soccer players and to analyze dynamic, intra-individual developments of the players. A cross-sectional design was carried in study 1, using game test situations to measure specific tactics and creative performance for 195 expert players. The results from five evaluation criteria show that both diagnostic instruments can be used for recording football-specific creativity and game intelligence in talented young players. They produced tactical indicators that can be described as objective and valid, exhibit a sufficient degree of differentiation and are easy to record. Study 2 uses a longitudinal design to present a dynamic performance diagnostic tool for analyzing intra-individual improvements of German Soccer Foundation talents according to football-specific creativity and game intelligence. The results with respect to divergent tactical thinking clearly show that very different change processes were observed in the German Soccer Foundation players. Finally, the practical implications for the training process are discussed on the basis of both studies. Key pointsWith game test situations it is possible to assess tactical performance as game intelligence and creativity objective, valid, with a sufficient degree of differentiation, and economically.The results with respect to game intelligence and creativity show that very different change processes were observed in the German Soccer Foundation players dependend on the bases (trainers).Current literature on tactics for school sports as well as for children's, youth and high performance soccer at the club level should place much more emphasis on individual and group-tactical requirements in soccer.

  6. Development and implementation of a Bayesian-based aquifer vulnerability assessment in Florida

    USGS Publications Warehouse

    Arthur, J.D.; Wood, H.A.R.; Baker, A.E.; Cichon, J.R.; Raines, G.L.

    2007-01-01

    The Florida Aquifer Vulnerability Assessment (FAVA) was designed to provide a tool for environmental, regulatory, resource management, and planning professionals to facilitate protection of groundwater resources from surface sources of contamination. The FAVA project implements weights-of-evidence (WofE), a data-driven, Bayesian-probabilistic model to generate a series of maps reflecting relative aquifer vulnerability of Florida's principal aquifer systems. The vulnerability assessment process, from project design to map implementation is described herein in reference to the Floridan aquifer system (FAS). The WofE model calculates weighted relationships between hydrogeologic data layers that influence aquifer vulnerability and ambient groundwater parameters in wells that reflect relative degrees of vulnerability. Statewide model input data layers (evidential themes) include soil hydraulic conductivity, density of karst features, thickness of aquifer confinement, and hydraulic head difference between the FAS and the watertable. Wells with median dissolved nitrogen concentrations exceeding statistically established thresholds serve as training points in the WofE model. The resulting vulnerability map (response theme) reflects classified posterior probabilities based on spatial relationships between the evidential themes and training points. The response theme is subjected to extensive sensitivity and validation testing. Among the model validation techniques is calculation of a response theme based on a different water-quality indicator of relative recharge or vulnerability: dissolved oxygen. Successful implementation of the FAVA maps was facilitated by the overall project design, which included a needs assessment and iterative technical advisory committee input and review. Ongoing programs to protect Florida's springsheds have led to development of larger-scale WofE-based vulnerability assessments. Additional applications of the maps include land-use planning

  7. Integrating Science and Management to Assess Forest Ecosystem Vulnerability to Climate Change

    Treesearch

    Leslie A. Brandt; Patricia R. Butler; Stephen D. Handler; Maria K. Janowiak; P. Danielle Shannon; Christopher W. Swanston

    2017-01-01

    We developed the ecosystem vulnerability assessment approach (EVAA) to help inform potential adaptation actions in response to a changing climate. EVAA combines multiple quantitative models and expert elicitation from scientists and land managers. In each of eight assessment areas, a panel of local experts determined potential vulnerability of forest ecosystems to...

  8. Vulnerability assessment and risk perception: the case of the Arieş River Middle Basin

    NASA Astrophysics Data System (ADS)

    Ozunu, Al.; Botezan, C.

    2012-04-01

    Vulnerability assessment is influenced by a number of factors, including risk perception. This paper investigates the vulnerability of people living in the middle basin of the Aries river region, a former mining area, to natural and technologic hazards. The mining industry lead to significant environmental changes, which combined with the social problems caused by its decline (high unemployment rate, low income and old age) raised the level of the vulnerability in the area. This case study is unique, as it includes an evaluation of risk perception and its influence on the social vulnerability and resilience of local communities to disasters. Key words: vulnerability assessment, natural hazards, social vulnerability, risk perception

  9. Coastal vulnerability assessment of Puducherry coast, India using analytical hierarchical process

    NASA Astrophysics Data System (ADS)

    Mani Murali, R.; Ankita, M.; Amrita, S.; Vethamony, P.

    2013-03-01

    Increased frequency of natural hazards such as storm surge, tsunami and cyclone, as a consequence of change in global climate, is predicted to have dramatic effects on the coastal communities and ecosystems by virtue of the devastation they cause during and after their occurrence. The tsunami of December 2004 and the Thane cyclone of 2011 caused extensive human and economic losses along the coastline of Puducherry and Tamil Nadu. The devastation caused by these events highlighted the need for vulnerability assessment to ensure better understanding of the elements causing different hazards and to consequently minimize the after-effects of the future events. This paper advocates an Analytical Hierarchical Process (AHP) based approach to coastal vulnerability studies as an improvement to the existing methodologies for vulnerability assessment. The paper also encourages the inclusion of socio-economic parameters along with the physical parameters to calculate the coastal vulnerability index using AHP derived weights. Seven physical-geological parameters (slope, geomorphology, elevation, shoreline change, sea level rise, significant wave height and tidal range) and four socio-economic factors (population, Land-use/Land-cover (LU/LC), roads and location of tourist places) are considered to measure the Physical Vulnerability Index (PVI) as well as the Socio-economic Vulnerability Index (SVI) of the Puducherry coast. Based on the weights and scores derived using AHP, vulnerability maps are prepared to demarcate areas with very low, medium and high vulnerability. A combination of PVI and SVI values are further utilized to compute the Coastal Vulnerability Index (CVI). Finally, the various coastal segments are grouped into the 3 vulnerability classes to obtain the final coastal vulnerability map. The entire coastal extent between Muthiapet and Kirumampakkam as well as the northern part of Kalapet is designated as the high vulnerability zone which constitutes 50% of the

  10. Tactical Damage Control Resuscitation.

    PubMed

    Fisher, Andrew D; Miles, Ethan A; Cap, Andrew P; Strandenes, Geir; Kane, Shawn F

    2015-08-01

    Recently the Committee on Tactical Combat Casualty Care changed the guidelines on fluid use in hemorrhagic shock. The current strategy for treating hemorrhagic shock is based on early use of components: Packed Red Blood Cells (PRBCs), Fresh Frozen Plasma (FFP) and platelets in a 1:1:1 ratio. We suggest that lack of components to mimic whole blood functionality favors the use of Fresh Whole Blood in managing hemorrhagic shock on the battlefield. We present a safe and practical approach for its use at the point of injury in the combat environment called Tactical Damage Control Resuscitation. We describe pre-deployment preparation, assessment of hemorrhagic shock, and collection and transfusion of fresh whole blood at the point of injury. By approaching shock with goal-directed therapy, it is possible to extend the period of survivability in combat casualties. Reprint & Copyright © 2015 Association of Military Surgeons of the U.S.

  11. Research on vulnerability assessments of the Huanghe (Yellow River) delta

    NASA Astrophysics Data System (ADS)

    qiao, shuqing; shi, xuefa

    2014-05-01

    Coastal zone located at the juncture of the sea, river and land, and under the influence of both land and ocean (including atmosphere), especially the sea-level rise and human activities, are vulnerable to environment and ecology. At highest risk are coastal zone of South, Southeast and East Asia with dense populations, low elevations and inadequate adaptive capacity. In China, more than 40% of the population live on the 15% of the land in coastal area and more than 70% cities located around the coastal area. The Chinese coastal region, especially river delta area has been experienced erosion, seawater intrusion and decrease in biodiversity under the combined influence of sea-level rise, tectonic subsidence and flooding. Furthermore, some kinds of human activity, such as land use, building, dam construction, reclamation from the sea and waste dumping strengthen the vulnerability of environment and ecosystem in coastal region. The coastal hazards (e.g. coastal erosion, seawater intrusion, land subsidence) and vulnerability of the Huanghe (Yelllow River) delta area are studied during the past several years. A systematic coastal assessment index is built and an evaluation model is developed using the development platform of Visual studio.Net 2005. The assessment index system includes two parts, inherent (sea level rise rate, elevation, morphology, water and sediment discharge, mean tidal range, mean wave height etc) and specific vulnerability index (population density, GDP, land utilization, protection structures etc). The assessment index are determined the weight using Analytic hierarchy process (AHP) method. Based on the research results, we better understand the current status and future change of coastal vulnerability and hazards, discuss the impact of the natural possess and human activities. Furthermore, we provide defending strategies for coastal zone vulnerability and typical coastal hazards.

  12. Vulnerability Assessment of Water Supply Systems: Status, Gaps and Opportunities

    NASA Astrophysics Data System (ADS)

    Wheater, H. S.

    2015-12-01

    Conventional frameworks for assessing the impacts of climate change on water resource systems use cascades of climate and hydrological models to provide 'top-down' projections of future water availability, but these are subject to high uncertainty and are model and scenario-specific. Hence there has been recent interest in 'bottom-up' frameworks, which aim to evaluate system vulnerability to change in the context of possible future climate and/or hydrological conditions. Such vulnerability assessments are generic, and can be combined with updated information from top-down assessments as they become available. While some vulnerability methods use hydrological models to estimate water availability, fully bottom-up schemes have recently been proposed that directly map system vulnerability as a function of feasible changes in water supply characteristics. These use stochastic algorithms, based on reconstruction or reshuffling methods, by which multiple water supply realizations can be generated under feasible ranges of change in water supply conditions. The paper reports recent successes, and points to areas of future improvement. Advances in stochastic modeling and optimization can address some technical limitations in flow reconstruction, while various data mining and system identification techniques can provide possibilities to better condition realizations for consistency with top-down scenarios. Finally, we show that probabilistic and Bayesian frameworks together can provide a potential basis to combine information obtained from fully bottom-up analyses with projections available from climate and/or hydrological models in a fully integrated risk assessment framework for deep uncertainty.

  13. (Non-) robustness of vulnerability assessments to climate change: An application to New Zealand.

    PubMed

    Fernandez, Mario Andres; Bucaram, Santiago; Renteria, Willington

    2017-12-01

    Assessments of vulnerability to climate change are a key element to inform climate policy and research. Assessments based on the aggregation of indicators have a strong appeal for their simplicity but are at risk of over-simplification and uncertainty. This paper explores the non-robustness of indicators-based assessments to changes in assumptions on the degree of substitution or compensation between indicators. Our case study is a nationwide assessment for New Zealand. We found that the ranking of geographic areas is sensitive to different parameterisations of the aggregation function, that is, areas that are categorised as highly vulnerable may switch to the least vulnerable category even with respect to the same climate hazards and population groups. Policy implications from the assessments are then compromised. Though indicators-based approaches may help on identifying drivers of vulnerability, there are weak grounds to use them to recommend mitigation or adaptation decisions given the high level of uncertainty because of non-robustness. Copyright © 2017 Elsevier Ltd. All rights reserved.

  14. Network Vulnerability Assessment of the U.S. Crude Pipeline Infrastructure

    DTIC Science & Technology

    2012-09-01

    56 Clanton, “Oklahoma Oil Hub Helps Keep Oil Prices from Going Higher.” 57 Donald Furgeson, John Mahoney , and Brett Warfield...Vulnerability Assessment Matrix of the COTH.58 58 Furgeson, Mahoney , and Warfield, Security...Steinhäusler et al., “Security Risks to the Oil and Gas Industry: Terrorist Capabilities.” 71 Furgeson, Mahoney , and Warfield, Security Vulnerability

  15. Flood hazard, vulnerability, and risk assessment for human life

    NASA Astrophysics Data System (ADS)

    Pan, T.; Chang, T.; Lai, J.; Hsieh, M.; Tan, Y.; Lin, Y.

    2011-12-01

    Flood risk assessment is an important issue for the countries suffering tropical cyclones and monsoon. Taiwan is located in the hot zone of typhoon tracks in the Western Pacific. There are three to five typhoons landing Taiwan every year. Typhoons and heavy rainfalls often cause inundation disaster rising with the increase of population and the development of social economy. The purpose of this study is to carry out the flood hazard, vulnerability and risk in term of human life. Based on the concept that flood risk is composed by flood hazard and vulnerability, a inundation simulation is performed to evaluate the factors of flood hazard for human life according to base flood (100-year return period). The flood depth, velocity and rising ratio are the three factors of flood hazards. Furthermore, the factors of flood vulnerability are identified in terms of human life that are classified into two main factors, residents and environment. The sub factors related to residents are the density of population and the density of vulnerable people including elders, youngers and disabled persons. The sub factors related to environment include the the number of building floors, the locations of buildings, the and distance to rescue center. The analytic hierarchy process (AHP) is adopted to determine the weights of these factors. The risk matrix is applied to show the risk from low to high based on the evaluation of flood hazards and vulnerabilities. The Tseng-Wen River watershed is selected as the case study because a serious flood was induced by Typhoon Morakot in 2009, which produced a record-breaking rainfall of 2.361mm in 48 hours in the last 50 years. The results of assessing the flood hazard, vulnerability and risk in term of human life could improve the emergency operation for flood disaster to prepare enough relief goods and materials during typhoon landing.

  16. V-DRASTIC: Using visualization to engage policymakers in groundwater vulnerability assessment

    NASA Astrophysics Data System (ADS)

    Bojórquez-Tapia, Luis A.; Cruz-Bello, Gustavo M.; Luna-González, Laura; Juárez, Lourdes; Ortiz-Pérez, Mario A.

    2009-06-01

    SummaryGroundwater vulnerability mapping is increasingly being used to design aquifer protection and management strategies. This paper presents a dynamic visualization method to groundwater vulnerability mapping. This method—called V-DRASTIC—extends the capacities of DRASTIC, an overlay/index technique that has been applied worldwide to evaluate the condition of hydrogeological factors and determine groundwater vulnerability at regional scales. V-DRASTIC is based upon psychophysics' principles (a theory that describes the people's response to a stimulus) to generate alternative groundwater vulnerability categorization schemes. These are used as inputs in a fuzzy pattern recognition procedure to enable planners, decision makers and stakeholders identify which scheme conveys meaningful information regarding groundwater vulnerability across a territory. V-DRASTIC was applied in the groundwater vulnerability assessment of two urban watersheds in Mexico.

  17. Performance-based methodology for assessing seismic vulnerability and capacity of buildings

    NASA Astrophysics Data System (ADS)

    Shibin, Lin; Lili, Xie; Maosheng, Gong; Ming, Li

    2010-06-01

    This paper presents a performance-based methodology for the assessment of seismic vulnerability and capacity of buildings. The vulnerability assessment methodology is based on the HAZUS methodology and the improved capacitydemand-diagram method. The spectral displacement ( S d ) of performance points on a capacity curve is used to estimate the damage level of a building. The relationship between S d and peak ground acceleration (PGA) is established, and then a new vulnerability function is expressed in terms of PGA. Furthermore, the expected value of the seismic capacity index (SCev) is provided to estimate the seismic capacity of buildings based on the probability distribution of damage levels and the corresponding seismic capacity index. The results indicate that the proposed vulnerability methodology is able to assess seismic damage of a large number of building stock directly and quickly following an earthquake. The SCev provides an effective index to measure the seismic capacity of buildings and illustrate the relationship between the seismic capacity of buildings and seismic action. The estimated result is compared with damage surveys of the cities of Dujiangyan and Jiangyou in the M8.0 Wenchuan earthquake, revealing that the methodology is acceptable for seismic risk assessment and decision making. The primary reasons for discrepancies between the estimated results and the damage surveys are discussed.

  18. The Art and Science of Tactics

    DTIC Science & Technology

    1977-01-01

    THE ART AND SCIENCE OF TACTICS by MAJOR ROBERT A. DOUGHTY, US ARMY E stablishing the nature of tactics has been a pastime of professional...tactics in the US Army have implicitly begun to assume that tactics is more an exact science than an " art and science ." As one recent military writer...and 19th centuries generally agreed that tactics was more an art than it was a science . Many agreed with the terse definition given by Antoine

  19. Assessing Tactical Scheduler Options for Time-Based Surface Metering

    NASA Technical Reports Server (NTRS)

    Zelinski, Shannon; Windhorst, Robert

    2017-01-01

    NASA is committed to demonstrating a concept of integrated arrival, departure, and surface operations by 2020 under the Airspace Technology Demonstration 2 (ATD2) sub-project. This will be accomplished starting with a demonstration of flight specific time-based departure metering at Charlotte Douglass International Airport (CLT). ATD2 tactical metering capability is based on NASAs Spot And Runway Departure Advisor (SARDA) which has been tested successfully in human-in-the-loop simulations of CLT. SARDA makes use of surface surveillance data and surface modeling to estimate the earliest takeoff time for each flight active on the airport surface or ready for pushback from the gate. The system then schedules each flight to its assigned runway in order of earliest takeoff time and assigns a target pushback time, displayed to ramp controllers as an advisory gate hold time. The objective of this method of departure metering is to move as much delay as possible to the gate to minimize surface congestion and engine on-time, while keeping sufficient pressure on the runway to maintain throughput. This flight specific approached enables greater flight efficiency and predictability, facilitating trajectory-based operations and surface-airspace integration, which ATD2 aims to achieve.Throughout ATD2 project formulation and system development, researchers have continuously engaged with stakeholders and future users, uncovering key system requirements for tactical metering that SARDA did not address. The SARDA scheduler is updated every 10 seconds using real-time surface surveillance data to ensure the most up-to-date information is used to predict runway usage. However, rapid updates also open the potential for fluctuating advisories, which Ramp controllers at a busy airport like CLT find unacceptable. Therefore, ATD2 tactical metering requires that all advisories freeze once flights are ready so that Ramp controllers may communicate a single hold time when responding to pilot

  20. 6 CFR 27.240 - Review and approval of security vulnerability assessments.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.240 Review and approval of security vulnerability assessments. (a) Review and Approval. The Department will review and... 6 Domestic Security 1 2014-01-01 2014-01-01 false Review and approval of security vulnerability...

  1. 6 CFR 27.240 - Review and approval of security vulnerability assessments.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.240 Review and approval of security vulnerability assessments. (a) Review and Approval. The Department will review and... 6 Domestic Security 1 2011-01-01 2011-01-01 false Review and approval of security vulnerability...

  2. 6 CFR 27.240 - Review and approval of security vulnerability assessments.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.240 Review and approval of security vulnerability assessments. (a) Review and Approval. The Department will review and... 6 Domestic Security 1 2013-01-01 2013-01-01 false Review and approval of security vulnerability...

  3. 6 CFR 27.240 - Review and approval of security vulnerability assessments.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.240 Review and approval of security vulnerability assessments. (a) Review and Approval. The Department will review and... 6 Domestic Security 1 2012-01-01 2012-01-01 false Review and approval of security vulnerability...

  4. Vulnerability Assessments in Support of the Climate Ready ...

    EPA Pesticide Factsheets

    As part of the Climate Ready Estuaries (CRE) program, the Global Change Research Program (GCRP) in the National Center for Environmental Assessment, Office of Research and Development at the U.S. Environmental Protection Agency has prepared this draft report exploring a new methodology for climate change vulnerability assessments using San Francisco Bay’s salt marsh and mudflat ecosystems as a demonstration. N/A

  5. Fundamental Tactical Principles of Soccer: A Comparison of Different Age Groups.

    PubMed

    Borges, Paulo Henrique; Guilherme, José; Rechenchosky, Leandro; da Costa, Luciane Cristina Arantes; Rinadi, Wilson

    2017-09-01

    The fundamental tactical principles of the game of soccer represent a set of action rules that guide behaviours related to the management of game space. The aim of this study was to compare the performance of fundamental offensive and defensive tactical principles among youth soccer players from 12 to 17 years old. The sample consisted of 3689 tactical actions performed by 48 soccer players in three age categories: under 13 (U-13), under 15 (U-15), and under 17 (U-17). Tactical performance was measured using the System of Tactical Assessment in Soccer (FUT-SAT). The Kruskal Wallis, Mann-Whitney U, Friedman, Wilcoxon, and Cohen's Kappa tests were used in the study analysis. The results showed that the principles of "offensive coverage" (p = 0.01) and "concentration" (p = 0.04) were performed more frequently by the U-17 players than the U-13 players. The tactical principles "width and length" (p < 0.05) and "defensive unit" (p < 0.05) were executed more frequently by younger soccer players. It can be concluded that the frequency with which fundamental tactical principles are performed varies between the gaming categories, which implies that there is valuation of defensive security and a progressive increase in "offensive coverage" caused by increased confidence and security in offensive actions.

  6. Flood stress as a technicque to assess preventive insecticide and fungicide treatments for protecting trees against ambrosia beetles

    USDA-ARS?s Scientific Manuscript database

    The exotic ambrosia beetles Xylosandrus germanus, Xylosandrus crassiusculus, and Xylosandrus compactus tunnel into the heartwood of trees where they cultivate and feed upon a symbiotic fungus. We assessed the effectiveness of flood stress as a tactic for making trees attractive and vulnerable to att...

  7. A climate change vulnerability assessment of California's at-risk birds.

    PubMed

    Gardali, Thomas; Seavy, Nathaniel E; DiGaudio, Ryan T; Comrack, Lyann A

    2012-01-01

    Conservationists must develop new strategies and adapt existing tools to address the consequences of anthropogenic climate change. To support statewide climate change adaptation, we developed a framework for assessing climate change vulnerability of California's at-risk birds and integrating it into the existing California Bird Species of Special Concern list. We defined climate vulnerability as the amount of evidence that climate change will negatively impact a population. We quantified climate vulnerability by scoring sensitivity (intrinsic characteristics of an organism that make it vulnerable) and exposure (the magnitude of climate change expected) for each taxon. Using the combined sensitivity and exposure scores as an index, we ranked 358 avian taxa, and classified 128 as vulnerable to climate change. Birds associated with wetlands had the largest representation on the list relative to other habitat groups. Of the 29 state or federally listed taxa, 21 were also classified as climate vulnerable, further raising their conservation concern. Integrating climate vulnerability and California's Bird Species of Special Concern list resulted in the addition of five taxa and an increase in priority rank for ten. Our process illustrates a simple, immediate action that can be taken to inform climate change adaptation strategies for wildlife.

  8. The use of climate information in vulnerability assessments.

    DOT National Transportation Integrated Search

    2011-01-01

    This memorandum focuses on the use of climate information when performing a vulnerability : assessment, a topic that was discussed at the Newark Pilot Peer Exchange Workshop on May 4-5, : 2011. The memorandum describes several sources of climate info...

  9. Accounting for adaptive capacity and uncertainty in assessments of species’ climate-change vulnerability

    USGS Publications Warehouse

    Wade, Alisa A.; Hand, Brian K.; Kovach, Ryan; Luikart, Gordon; Whited, Diane; Muhlfeld, Clint C.

    2016-01-01

    Climate change vulnerability assessments (CCVAs) are valuable tools for assessing species’ vulnerability to climatic changes, yet failure to include measures of adaptive capacity and to account for sources of uncertainty may limit their effectiveness. Here, we provide a more comprehensive CCVA approach that incorporates all three elements used for assessing species’ climate change vulnerability: exposure, sensitivity, and adaptive capacity. We illustrate our approach using case studies of two threatened salmonids with different life histories – anadromous steelhead trout (Oncorhynchus mykiss) and non-anadromous bull trout (Salvelinus confluentus) – within the Columbia River Basin, USA. We identified general patterns of high vulnerability in low-elevation and southernmost habitats for both species. However, vulnerability rankings varied widely depending on the factors (climate, habitat, demographic, and genetic) included in the CCVA and often differed for the two species at locations where they were sympatric. Our findings illustrate that CCVA results are highly sensitive to data inputs and that spatial differences can complicate multi-species conservation. Our results highlight how CCVAs should be considered within a broader conceptual and computational framework for refining hypotheses, guiding research, and comparing plausible scenarios of species’ vulnerability for ongoing and projected climate change.

  10. Rapid Assessment of Seismic Vulnerability in Palestinian Refugee Camps

    NASA Astrophysics Data System (ADS)

    Al-Dabbeek, Jalal N.; El-Kelani, Radwan J.

    Studies of historical and recorded earthquakes in Palestine demonstrate that damaging earthquakes are occurring frequently along the Dead Sea Transform: Earthquake of 11 July 1927 (ML 6.2), Earthquake of 11 February 2004 (ML 5.2). In order to reduce seismic vulnerability of buildings, losses in lives, properties and infrastructures, an attempt was made to estimate the percentage of damage degrees and losses at selected refugee camps: Al Ama`ri, Balata and Dhaishe. Assessing the vulnerability classes of building structures was carried out according to the European Macro-Seismic Scale 1998 (EMS-98) and the Fedral Emergency Management Agency (FEMA). The rapid assessment results showed that very heavy structural and non structural damages will occur in the common buildings of the investigated Refugee Camps (many buildings will suffer from damages grades 4 and 5). Bad quality of buildings in terms of design and construction, lack of uniformity, absence of spaces between the building and the limited width of roads will definitely increase the seismic vulnerability under the influence of moderate-strong (M 6-7) earthquakes in the future.

  11. Assessment of groundwater vulnerability by applying the modified DRASTIC model in Beihai City, China.

    PubMed

    Wu, Xiaoyu; Li, Bin; Ma, Chuanming

    2018-05-01

    This study assesses vulnerability of groundwater to pollution in Beihai City, China, as a support of groundwater resource protection. The assessment result not only objectively reflects potential possibility of groundwater to contamination but also provides scientific basis for the planning and utilization of groundwater resources. This study optimizes the parameters consisting of natural factors and human factors upon the DRASTIC model and modifies the ratings of these parameters, based on the local environmental conditions for the study area. And a weight of each parameter is assigned by the analytic hierarchy process (AHP) to reduce the subjectivity of humans to vulnerability assessment. The resulting scientific ratings and weights of modified DRASTIC model (AHP-DRASTLE model) contribute to obtain the more realistic assessment of vulnerability of groundwater to contaminant. The comparison analysis validates the accuracy and rationality of the AHP-DRASTLE model and shows it suits the particularity of the study area. The new assessment method (AHP-DRASTLE model) can provide a guide for other scholars to assess the vulnerability of groundwater to contamination. The final vulnerability map for the AHP-DRASTLE model shows four classes: highest (2%), high (29%), low (55%), and lowest (14%). The vulnerability map serves as a guide for decision makers on groundwater resource protection and land use planning at the regional scale and that it is adapted to a specific area.

  12. An holistic approach to beach erosion vulnerability assessment.

    PubMed

    Alexandrakis, George; Poulos, Serafim Ε

    2014-08-15

    Erosion is a major threat for coasts worldwide, beaches in particular, which constitute one of the most valuable coastal landforms. Vulnerability assessments related to beach erosion may contribute to planning measures to counteract erosion by identifying, quantifying and ranking vulnerability. Herein, we present a new index, the Beach Vulnerability Index (BVI), which combines simplicity in calculations, easily obtainable data and low processing capacity. This approach provides results not only for different beaches, but also for different sectors of the same beach and enables the identification of the relative significance of the processes involved. It functions through the numerical approximation of indicators that correspond to the mechanisms related to the processes that control beach evolution, such as sediment availability, wave climate, beach morhodynamics and sea level change. The BVI is also intended to be used as a managerial tool for beach sustainability, including resilience to climate change impact on beach erosion.

  13. [Vulnerability assessment on the coastal wetlands in the Yangtze Estuary under sea-level rise].

    PubMed

    Cui, Li-Fang; Wang, Ning; Ge, Zhen-Ming; Zhang, Li-Quan

    2014-02-01

    To study the response of coastal wetlands to climate change, assess the impacts of climate change on the coastal wetlands and formulate feasible and practical mitigation strategies are the important prerequisite for securing coastal ecosystems. In this paper, the possible impacts of sea level rise caused by climate change on the coastal wetlands in the Yangtze Estuary were analyzed by the Source-Pathway-Receptor-Consequence (SPRC) model and IPCC definition on the vulnerability. An indicator system for vulnerability assessment was established, in which sea-level rise rate, subsidence rate, habitat elevation, inundation threshold of habitat and sedimentation rate were selected as the key indicators. A quantitatively spatial assessment method based on the GIS platform was established by quantifying each indicator, calculating the vulnerability index and grading the vulnerability index for the assessment of coastal wetlands in the Yangtze Estuary under the scenarios of sea-level rise. The vulnerability assessments on the coastal wetlands in the Yangtze Estuary in 2030 and 2050 were performed under two sea-level rise scenarios (the present sea-level rise trend over recent 30 years and IPCC A1F1 scenario). The results showed that with the projection in 2030 under the present trend of sea-level rise (0.26 cm x a(-1)), 6.6% and 0.1% of the coastal wetlands were in the low and moderate vulnerabilities, respectively; and in 2050, 9.8% and 0.2% of the coastal wetlands were in low and moderate vulnerabilities, respectively. With the projection in 2030 under the A1F1 scenario (0.59 cm x a(-1)), 9.0% and 0.1% of the coastal wetlands were in the low and moderate vulnerabilities, respectively; and in 2050, 9.5%, 1.0% and 0.3% of the coastal wetlands were in the low, moderate and high vulnerabilities, respectively.

  14. An atmospheric vulnerability assessment framework for environment management and protection based on CAMx.

    PubMed

    Zhang, Yang; Shen, Jing; Li, Yu

    2018-02-01

    This paper presents an atmospheric vulnerability assessment framework based on CAMx that should be helpful to assess potential impacts of changes in human, atmospheric environment, and social economic elements of atmospheric vulnerability. It is also a useful and effective tool that can provide policy-guidance for environmental protection and management to reduce the atmospheric vulnerability. The developed framework was applied to evaluate the atmospheric environment vulnerability of 13 cities in the Beijing-Tianjin-Hebei (BTH) region for verification. The results indicated that regional disparity of the atmospheric vulnerability existed in the study site. More specifically, the central and southern regions show more atmospheric environment vulnerability than the northern regions. The impact factors of atmospheric environment vulnerability in the BTH region mainly derived from increasing population press, frequently unfavorable meteorological conditions, extensive economic growth of secondary industry, increased environmental pollution, and accelerating population aging. The framework shown in this paper is an interpretative and heuristic tool for a better understanding of atmospheric vulnerability. This framework can also be replicated at different spatial and temporal scales using context-specific datasets to straightly support environmental managers with decision-making. Copyright © 2017 Elsevier Ltd. All rights reserved.

  15. Characterization of Tactical Departure Scheduling in the National Airspace System

    NASA Technical Reports Server (NTRS)

    Capps, Alan; Engelland, Shawn A.

    2011-01-01

    This paper discusses and analyzes current day utilization and performance of the tactical departure scheduling process in the National Airspace System (NAS) to understand the benefits in improving this process. The analysis used operational air traffic data from over 1,082,000 flights during the month of January, 2011. Specific metrics included the frequency of tactical departure scheduling, site specific variances in the technology's utilization, departure time prediction compliance used in the tactical scheduling process and the performance with which the current system can predict the airborne slot that aircraft are being scheduled into from the airport surface. Operational data analysis described in this paper indicates significant room for improvement exists in the current system primarily in the area of reduced departure time prediction uncertainty. Results indicate that a significant number of tactically scheduled aircraft did not meet their scheduled departure slot due to departure time uncertainty. In addition to missed slots, the operational data analysis identified increased controller workload associated with tactical departures which were subject to traffic management manual re-scheduling or controller swaps. An analysis of achievable levels of departure time prediction accuracy as obtained by a new integrated surface and tactical scheduling tool is provided to assess the benefit it may provide as a solution to the identified shortfalls. A list of NAS facilities which are likely to receive the greatest benefit from the integrated surface and tactical scheduling technology are provided.

  16. Intrinsic vulnerability assessment of shallow aquifers of the sedimentary basin of southwestern Nigeria

    PubMed Central

    2018-01-01

    The shallow groundwater of the multi-layered sedimentary basin aquifer of southwestern Nigeria was assessed based on its intrinsic vulnerability property. The vulnerability evaluation involves determining the protective cover and infiltration condition of the unsaturated zone in the basin. This was achieved using the PI (P stands for protective cover effectiveness of the overlying lithology and I indicates the degree of infiltration bypass) vulnerability method of the European vulnerability approach. The PI method specifically measures the protection cover and the degree to which the protective cover is bypassed. Intrinsic parameters assessed were the subsoil, lithology, topsoil, recharge and fracturing for the protective cover. The saturated hydraulic conductivity of topsoil, infiltration processes and the lateral surface and subsurface flow were evaluated for the infiltration bypassed. The results show moderate to very low vulnerability areas. Low vulnerability areas were characterised by lithology with massive sandstone and limestone, subsoils of sandy loam texture, high slopes and high depth to water table. The moderate vulnerability areas were characterised by high rainfall and high recharge, low water table, unconsolidated sandstones and alluvium lithology. The intrinsic vulnerability properties shown in vulnerability maps will be a useful tool in planning and monitoring land use activities that can be of impact in groundwater pollution.

  17. Assessing the Vulnerability of Agriculture to Climate Change in Jordan

    NASA Astrophysics Data System (ADS)

    Khresat, Sa'eb; Shraidaeh, Fadi; Maddat, Amer

    2015-04-01

    Climate change represents one of the greatest environmental, social and economic threats facing Jordan. In particular, the combined effects of climate change and water scarcity threaten to affect food and water resources that are critical for livelihoods in Jordan. This is especially true for those communities who live in the dryland area in the country and who rely wholly on rain-fed agriculture. The exact nature and extent of the impact of climate change on temperature and precipitation distribution pattern remain uncertain and it is the poor and vulnerable who will be the most susceptible to climate change adverse effects. A vulnerability assessment of rain fed agriculture to climate change and variability in semi-arid parts of Jordan was conducted in 2014. The purpose of this study is to assess the vulnerability and resilience of the most vulnerable groups where rainfed and irrigated agriculture is practiced. Also, the study focused on quantifying the impacts on agricultural productivity in response to climate change. This will help policymakers and researchers better understand and anticipate the likely impacts of climate change on agriculture and on vulnerable communities in Jordan. Also, it will provide them with tools to identify and implement appropriate adaptation strategies. The data used includes; Representative Concentration Pathways (RCPs), RCP 4.5 and RCP 8.5 adopted by the IPCC for its fifth Assessment Report (AR5). Those pathways were used for climate modeling. A decision support system (DSSAT) for agricultural production was used to assess the impact of climate changes on agricultural production. This approach was used for the Identification of climate change risk and their impacts on Agriculture. Outputs from models are used to assess the vulnerability of farmers and crops to climate and socio-economic change by estimating their sensitivity and capacity to adapt to external factors as a means of identifying what causes the differences in their

  18. Coastal vulnerability assessment using Fuzzy Logic and Bayesian Belief Network approaches

    NASA Astrophysics Data System (ADS)

    Valentini, Emiliana; Nguyen Xuan, Alessandra; Filipponi, Federico; Taramelli, Andrea

    2017-04-01

    Natural hazards such as sea surge are threatening low-lying coastal plains. In order to deal with disturbances a deeper understanding of benefits deriving from ecosystem services assessment, management and planning can contribute to enhance the resilience of coastal systems. In this frame assessing current and future vulnerability is a key concern of many Systems Of Systems SOS (social, ecological, institutional) that deals with several challenges like the definition of Essential Variables (EVs) able to synthesize the required information, the assignment of different weight to be attributed to each considered variable, the selection of method for combining the relevant variables. It is widely recognized that ecosystems contribute to human wellbeing and then their conservation increases the resilience capacities and could play a key role in reducing climate related risk and thus physical and economic losses. A way to fully exploit ecosystems potential, i.e. their so called ecopotential (see H2020 EU funded project "ECOPOTENTIAL"), is the Ecosystem based Adaptation (EbA): the use of ecosystem services as part of an adaptation strategy. In order to provide insight in understanding regulating ecosystem services to surge and which variables influence them and to make the best use of available data and information (EO products, in situ data and modelling), we propose a multi-component surge vulnerability assessment, focusing on coastal sandy dunes as natural barriers. The aim is to combine together eco-geomorphological and socio-economic variables with the hazard component on the base of different approaches: 1) Fuzzy Logic; 2) Bayesian Belief Networks (BBN). The Fuzzy Logic approach is very useful to get a spatialized information and it can easily combine variables coming from different sources. It provides information on vulnerability moving along-shore and across-shore (beach-dune transect), highlighting the variability of vulnerability conditions in the spatial

  19. How to Assess Vulnerabilities of Water Policies to Global Change?

    NASA Astrophysics Data System (ADS)

    Kumar, A.; Haasnoot, M.; Weijs, S.

    2017-12-01

    Water managers are confronted with uncertainties arising from hydrological, societal, economical and political drivers. To manage these uncertainties two paradigms have been identified: top-down and bottom-up approaches. Top-down or prediction-based approaches use socio-economic scenarios together with a discrete set of GCM projections (often downscaled) to assess the expected impact of drivers and policies on water resource system through various hydrological and social systems models. Adaptation strategies to alleviate these impacts are then identified and tested against the scenarios. To address GCM and downscaling uncertainties, these approaches put more focus on climate predictions, rather than the decision problem itself. Triggered by the wish to have a more scenario-neutral approach and address downscaling uncertainties, recent analyses have been shifted towards vulnerability-based (bottom-up or decision-centric) approaches. They begin at the local scale by addressing socio-economic responses to climate, often involving stakeholder's input; identify vulnerabilities under a larger sample of plausible futures and evaluate sensitivity and robustness of possible adaptation options. Several bottom-up approaches have emerged so far and are increasingly recommended. Fundamentally they share several core ideas, however, subtle differences exist in vulnerability assessment, visualization tools for exploring vulnerabilities and computational methods used for identifying robust water policies. Through this study, we try to identify how these approaches are progressing, how the climate and non-climate uncertainties are being confronted and how to integrate existing and new tools. We find that choice of a method may depend on the number of vulnerability drivers identified and type of threshold levels (environmental conditions or policy objectives) defined. Certain approaches are suited well for assessing adaptive capacities, tipping points and sequencing of decisions

  20. Linking local vulnerability to climatic hazard damage assessment for integrated river basin management

    NASA Astrophysics Data System (ADS)

    Hung, Hung-Chih; Liu, Yi-Chung; Chien, Sung-Ying

    2015-04-01

    1. Background Major portions of areas in Asia are expected to increase exposure and vulnerability to climate change and weather extremes due to rapid urbanization and overdevelopment in hazard-prone areas. To prepare and confront the potential impacts of climate change and related hazard risk, many countries have implemented programs of integrated river basin management. This has led to an impending challenge for the police-makers in many developing countries to build effective mechanism to assess how the vulnerability distributes over river basins, and to understand how the local vulnerability links to climatic (climate-related) hazard damages and risks. However, the related studies have received relatively little attention. This study aims to examine whether geographic localities characterized by high vulnerability experience significantly more damages owing to onset weather extreme events at the river basin level, and to explain what vulnerability factors influence these damages or losses. 2. Methods and data An indicator-based assessment framework is constructed with the goal of identifying composite indicators (including exposure, biophysical, socioeconomic, land-use and adaptive capacity factors) that could serve as proxies for attributes of local vulnerability. This framework is applied by combining geographical information system (GIS) techniques with multicriteria decision analysis (MCDA) to evaluate and map integrated vulnerability to climatic hazards across river basins. Furthermore, to explain the relationship between vulnerability factors and disaster damages, we develop a disaster damage model (DDM) based on existing disaster impact theory. We then synthesize a Zero-Inflated Poisson regression model with a Tobit regression analysis to identify and examine how the disaster impacts and vulnerability factors connect to typhoon disaster damages and losses. To illustrate the proposed methodology, the study collects data on the vulnerability attributes of

  1. A Climate Change Vulnerability Assessment of California's At-Risk Birds

    PubMed Central

    Gardali, Thomas; Seavy, Nathaniel E.; DiGaudio, Ryan T.; Comrack, Lyann A.

    2012-01-01

    Conservationists must develop new strategies and adapt existing tools to address the consequences of anthropogenic climate change. To support statewide climate change adaptation, we developed a framework for assessing climate change vulnerability of California's at-risk birds and integrating it into the existing California Bird Species of Special Concern list. We defined climate vulnerability as the amount of evidence that climate change will negatively impact a population. We quantified climate vulnerability by scoring sensitivity (intrinsic characteristics of an organism that make it vulnerable) and exposure (the magnitude of climate change expected) for each taxon. Using the combined sensitivity and exposure scores as an index, we ranked 358 avian taxa, and classified 128 as vulnerable to climate change. Birds associated with wetlands had the largest representation on the list relative to other habitat groups. Of the 29 state or federally listed taxa, 21 were also classified as climate vulnerable, further raising their conservation concern. Integrating climate vulnerability and California's Bird Species of Special Concern list resulted in the addition of five taxa and an increase in priority rank for ten. Our process illustrates a simple, immediate action that can be taken to inform climate change adaptation strategies for wildlife. PMID:22396726

  2. Fundamental Tactical Principles of Soccer: A Comparison of Different Age Groups

    PubMed Central

    Guilherme, José; Rechenchosky, Leandro; da Costa, Luciane Cristina Arantes; Rinadi, Wilson

    2017-01-01

    Abstract The fundamental tactical principles of the game of soccer represent a set of action rules that guide behaviours related to the management of game space. The aim of this study was to compare the performance of fundamental offensive and defensive tactical principles among youth soccer players from 12 to 17 years old. The sample consisted of 3689 tactical actions performed by 48 soccer players in three age categories: under 13 (U-13), under 15 (U-15), and under 17 (U-17). Tactical performance was measured using the System of Tactical Assessment in Soccer (FUT-SAT). The Kruskal Wallis, Mann-Whitney U, Friedman, Wilcoxon, and Cohen’s Kappa tests were used in the study analysis. The results showed that the principles of “offensive coverage” (p = 0.01) and “concentration” (p = 0.04) were performed more frequently by the U-17 players than the U-13 players. The tactical principles “width and length” (p < 0.05) and “defensive unit” (p < 0.05) were executed more frequently by younger soccer players. It can be concluded that the frequency with which fundamental tactical principles are performed varies between the gaming categories, which implies that there is valuation of defensive security and a progressive increase in “offensive coverage” caused by increased confidence and security in offensive actions. PMID:28828091

  3. Capturing subregional variability in regional-scale climate change vulnerability assessments of natural resources

    Treesearch

    Polly C. Buotte; David L. Peterson; Kevin S. McKelvey; Jeffrey A. Hicke

    2016-01-01

    Natural resource vulnerability to climate change can depend on the climatology and ecological conditions at a particular site. Here we present a conceptual framework for incorporating spatial variability in natural resource vulnerability to climate change in a regional-scale assessment. The framework was implemented in the first regional-scale vulnerability...

  4. Coastal vulnerability assessment of Puducherry coast, India, using the analytical hierarchical process

    NASA Astrophysics Data System (ADS)

    Mani Murali, R.; Ankita, M.; Amrita, S.; Vethamony, P.

    2013-12-01

    As a consequence of change in global climate, an increased frequency of natural hazards such as storm surges, tsunamis and cyclones, is predicted to have dramatic affects on the coastal communities and ecosystems by virtue of the devastation they cause during and after their occurrence. The tsunami of December 2004 and the Thane cyclone of 2011 caused extensive human and economic losses along the coastline of Puducherry and Tamil Nadu. The devastation caused by these events highlighted the need for vulnerability assessment to ensure better understanding of the elements causing different hazards and to consequently minimize the after- effects of the future events. This paper demonstrates an analytical hierarchical process (AHP)-based approach to coastal vulnerability studies as an improvement to the existing methodologies for vulnerability assessment. The paper also encourages the inclusion of socio-economic parameters along with the physical parameters to calculate the coastal vulnerability index using AHP-derived weights. Seven physical-geological parameters (slope, geomorphology, elevation, shoreline change, sea level rise, significant wave height and tidal range) and four socio-economic factors (population, land use/land cover (LU/LC), roads and location of tourist areas) are considered to measure the physical vulnerability index (PVI) as well as the socio-economic vulnerability index (SVI) of the Puducherry coast. Based on the weights and scores derived using AHP, vulnerability maps are prepared to demarcate areas with very low, medium and high vulnerability. A combination of PVI and SVI values are further utilized to compute the coastal vulnerability index (CVI). Finally, the various coastal segments are grouped into the 3 vulnerability classes to obtain the coastal vulnerability map. The entire coastal extent between Muthiapet and Kirumampakkam as well as the northern part of Kalapet is designated as the high vulnerability zone, which constitutes 50% of the

  5. Communication networks for the tactical edge

    NASA Astrophysics Data System (ADS)

    Evans, Joseph B.; Pennington, Steven G.; Ewy, Benjamin J.

    2017-04-01

    Information at the tactical level is increasingly critical in today's conflicts. The proliferation of commercial tablets and smart phones has created the ability for extensive information sharing at the tactical edge, beyond the traditional tactical voice communications and location information. This is particularly the case in Gray Zone conflicts, in which tactical decision making and actions are intertwined with information sharing and exploitation. Networking of tactical devices is the key to this information sharing. In this work, we detail and analyze two network models at different parts of the Gray Zone spectrum, and explore a number of networking options including Named Data Networking. We also compare networking approaches in a variety of realistic operating environments. Our results show that Named Data Networking is a good match for the disrupted networking environments found in many tactical situations

  6. REGIONAL VULNERABILITY ASSESSMENT OF THE MID-ATLANTIC REGION: EVALUATION OF INTEGRATION METHODS AND ASSESSMENTS RESULTS

    EPA Science Inventory

    This report describes methods for quantitative regional assessment developed by the Regional Vulnerability Assessment (ReVA) program. The goal of ReVA is to develop regional-scale assessments of the magnitude, extent, distribution, and uncertainty of current and anticipated envir...

  7. Assessment of Two Desk-Top Computer Simulations Used to Train Tactical Decision Making (TDM) of Small Unit Infantry Leaders

    DTIC Science & Technology

    2007-04-01

    judgmental self-doubt, depression, and causal uncertainty, tend to take fewer risks, and have lower self-esteem. Results from two studies (Nygren, 2000...U.S. Army Research Institute for the Behavioral and Social Sciences Research Report 1869 Assessment of Two Desk-Top Computer Simulations Used to...SUBTITLE 5a. CONTRACT OR GRANT NUMBER Assessment of Two Desk-Top Computer Simulations Used to Train Tactical Decision Making (TDM) of Small Unit

  8. Groundwater Vulnerability Assessment of the Pingtung Plain in Southern Taiwan.

    PubMed

    Liang, Ching-Ping; Jang, Cheng-Shin; Liang, Cheng-Wei; Chen, Jui-Sheng

    2016-11-23

    In the Pingtung Plain of southern Taiwan, elevated levels of NO₃ - -N in groundwater have been reported. Therefore, efforts for assessing groundwater vulnerability are required as part of the critical steps to prevent and control groundwater pollution. This study makes a groundwater vulnerability assessment for the Pingtung Plain using an improved overlay and index-based DRASTIC model. The improvement of the DRASTIC model is achieved by reassigning the weighting coefficients of the factors in this model with the help of a discriminant analysis statistical method. The analytical results obtained from the improved DRASTIC model provide a reliable prediction for use in groundwater vulnerability assessment to nitrate pollution and can correctly identify the groundwater protection zones in the Pingtung Plain. Moreover, the results of the sensitivity analysis conducted for the seven parameters in the improved DRASTIC model demonstrate that the aquifer media (A) is the most sensitive factor when the nitrate-N concentration is below 2.5 mg/L. For the cases where the nitrate-N concentration is above 2.5 mg/L, the aquifer media (A) and net recharge (R) are the two most important factors.

  9. A System for Assessing Vulnerability of Species (SAVS) to Climate Change

    Treesearch

    Karen E. Bagne; Megan M. Friggens; Deborah M. Finch

    2011-01-01

    Sustained conservation of species requires integration of future climate change effects, but few tools exist to assist managers. The System for Assessing Vulnerability of Species (SAVS) identifies the relative vulnerability or resilience of vertebrate species to climate change. Designed for managers, the SAVS is an easily applied tool that uses a questionnaire of 22...

  10. Assessing the Vulnerability of Eco-Environmental Health to Climate Change

    PubMed Central

    Tong, Shilu; Mather, Peter; Fitzgerald, Gerry; McRae, David; Verrall, Ken; Walker, Dylan

    2010-01-01

    There is an urgent need to assess the vulnerability of eco-environmental health to climate change. This paper aims to provide an overview of current research, to identify knowledge gaps, and to propose future research needs in this challenging area. Evidence shows that climate change is affecting and will, in the future, have more (mostly adverse) impacts on ecosystems. Ecosystem degradation, particularly the decline of the life support systems, will undoubtedly affect human health and wellbeing. Therefore, it is important to develop a framework to assess the vulnerability of eco-environmental health to climate change, and to identify appropriate adaptation strategies to minimize the impact of climate change. PMID:20616990

  11. Binational climate change vulnerability assessment of migratory birds in the Great Lakes Basins: Tools and impediments.

    PubMed

    Rempel, Robert S; Hornseth, Megan L

    2017-01-01

    Climate change is a global concern, requiring international strategies to reduce emissions, however, climate change vulnerability assessments are often local in scope with assessment areas restricted to jurisdictional boundaries. In our study we explored tools and impediments to understanding and responding to the effects of climate change on vulnerability of migratory birds from a binational perspective. We apply and assess the utility of a Climate Change Vulnerability Index on 3 focal species using distribution or niche modeling frameworks. We use the distributional forecasts to explore possible changes to jurisdictional conservation responsibilities resulting from shifting distributions for: eastern meadowlark (Sturnella magna), wood thrush (Hylocichla mustelina), and hooded warbler (Setophaga citrina). We found the Climate Change Vulnerability Index to be a well-organized approach to integrating numerous lines of evidence concerning effects of climate change, and provided transparency to the final assessment of vulnerability. Under this framework, we identified that eastern meadowlark and wood thrush are highly vulnerable to climate change, but hooded warbler is less vulnerable. Our study revealed impediments to assessing and modeling vulnerability to climate change from a binational perspective, including gaps in data or modeling for climate exposure parameters. We recommend increased cross-border collaboration to enhance the availability and resources needed to improve vulnerability assessments and development of conservation strategies. We did not find evidence to suggest major shifts in jurisdictional responsibility for the 3 focal species, but results do indicate increasing responsibility for these birds in the Canadian Provinces. These Provinces should consider conservation planning to help ensure a future supply of necessary habitat for these species.

  12. Binational climate change vulnerability assessment of migratory birds in the Great Lakes Basins: Tools and impediments

    PubMed Central

    2017-01-01

    Climate change is a global concern, requiring international strategies to reduce emissions, however, climate change vulnerability assessments are often local in scope with assessment areas restricted to jurisdictional boundaries. In our study we explored tools and impediments to understanding and responding to the effects of climate change on vulnerability of migratory birds from a binational perspective. We apply and assess the utility of a Climate Change Vulnerability Index on 3 focal species using distribution or niche modeling frameworks. We use the distributional forecasts to explore possible changes to jurisdictional conservation responsibilities resulting from shifting distributions for: eastern meadowlark (Sturnella magna), wood thrush (Hylocichla mustelina), and hooded warbler (Setophaga citrina). We found the Climate Change Vulnerability Index to be a well-organized approach to integrating numerous lines of evidence concerning effects of climate change, and provided transparency to the final assessment of vulnerability. Under this framework, we identified that eastern meadowlark and wood thrush are highly vulnerable to climate change, but hooded warbler is less vulnerable. Our study revealed impediments to assessing and modeling vulnerability to climate change from a binational perspective, including gaps in data or modeling for climate exposure parameters. We recommend increased cross-border collaboration to enhance the availability and resources needed to improve vulnerability assessments and development of conservation strategies. We did not find evidence to suggest major shifts in jurisdictional responsibility for the 3 focal species, but results do indicate increasing responsibility for these birds in the Canadian Provinces. These Provinces should consider conservation planning to help ensure a future supply of necessary habitat for these species. PMID:28225817

  13. Throughput Benefit Assessment for Tactical Runway Configuration Management (TRCM)

    NASA Technical Reports Server (NTRS)

    Phojanamongkolkij, Nipa; Oseguera-Lohr, Rosa M.; Lohr, Gary W.; Fenbert, James W.

    2014-01-01

    The System-Oriented Runway Management (SORM) concept is a collection of needed capabilities focused on a more efficient use of runways while considering all of the factors that affect runway use. Tactical Runway Configuration Management (TRCM), one of the SORM capabilities, provides runway configuration and runway usage recommendations, monitoring the active runway configuration for suitability given existing factors, based on a 90 minute planning horizon. This study evaluates the throughput benefits using a representative sample of today's traffic volumes at three airports: Memphis International Airport (MEM), Dallas-Fort Worth International Airport (DFW), and John F. Kennedy International Airport (JFK). Based on this initial assessment, there are statistical throughput benefits for both arrivals and departures at MEM with an average of 4% for arrivals, and 6% for departures. For DFW, there is a statistical benefit for arrivals with an average of 3%. Although there is an average of 1% benefit observed for departures, it is not statistically significant. For JFK, there is a 12% benefit for arrivals, but a 2% penalty for departures. The results obtained are for current traffic volumes and should show greater benefit for increased future demand. This paper also proposes some potential TRCM algorithm improvements for future research. A continued research plan is being worked to implement these improvements and to re-assess the throughput benefit for today and future projected traffic volumes.

  14. Assessment of Vulnerability to Coccidioidomycosis in Arizona and California.

    PubMed

    Shriber, Jennifer; Conlon, Kathryn C; Benedict, Kaitlin; McCotter, Orion Z; Bell, Jesse E

    2017-06-23

    Coccidioidomycosis is a fungal infection endemic to the southwestern United States, particularly Arizona and California. Its incidence has increased, potentially due in part to the effects of changing climatic variables on fungal growth and spore dissemination. This study aims to quantify the county-level vulnerability to coccidioidomycosis in Arizona and California and to assess the relationships between population vulnerability and climate variability. The variables representing exposure, sensitivity, and adaptive capacity were combined to calculate county level vulnerability indices. Three methods were used: (1) principal components analysis; (2) quartile weighting; and (3) percentile weighting. Two sets of indices, "unsupervised" and "supervised", were created. Each index was correlated with coccidioidomycosis incidence data from 2000-2014. The supervised percentile index had the highest correlation; it was then correlated with variability measures for temperature, precipitation, and drought. The supervised percentile index was significantly correlated ( p < 0.05) with coccidioidomycosis incidence in both states. Moderate, positive significant associations ( p < 0.05) were found between index scores and climate variability when both states were concurrently analyzed and when California was analyzed separately. This research adds to the body of knowledge that could be used to target interventions to vulnerable counties and provides support for the hypothesis that population vulnerability to coccidioidomycosis is associated with climate variability.

  15. Assessment of Vulnerability to Coccidioidomycosis in Arizona and California

    PubMed Central

    Conlon, Kathryn C.; Benedict, Kaitlin; McCotter, Orion Z.; Bell, Jesse E.

    2017-01-01

    Coccidioidomycosis is a fungal infection endemic to the southwestern United States, particularly Arizona and California. Its incidence has increased, potentially due in part to the effects of changing climatic variables on fungal growth and spore dissemination. This study aims to quantify the county-level vulnerability to coccidioidomycosis in Arizona and California and to assess the relationships between population vulnerability and climate variability. The variables representing exposure, sensitivity, and adaptive capacity were combined to calculate county level vulnerability indices. Three methods were used: (1) principal components analysis; (2) quartile weighting; and (3) percentile weighting. Two sets of indices, “unsupervised” and “supervised”, were created. Each index was correlated with coccidioidomycosis incidence data from 2000–2014. The supervised percentile index had the highest correlation; it was then correlated with variability measures for temperature, precipitation, and drought. The supervised percentile index was significantly correlated (p < 0.05) with coccidioidomycosis incidence in both states. Moderate, positive significant associations (p < 0.05) were found between index scores and climate variability when both states were concurrently analyzed and when California was analyzed separately. This research adds to the body of knowledge that could be used to target interventions to vulnerable counties and provides support for the hypothesis that population vulnerability to coccidioidomycosis is associated with climate variability. PMID:28644403

  16. Assessing mental health and violence on college campuses using the vulnerability model.

    PubMed

    Ponsford, Lisa R

    2016-04-01

    Violence on college campuses has become increasingly more common than in previous years. Nearly 73% of students with a mental health condition living on campus experience a mental health crisis. College students arriving on campuses today come with different needs, expectations for services, and with different risk factors than in previous years. Advanced practice registered nurses (APRNs) in college health settings have the ability to recognize these changing trends and assist with improving the mental health of this population. A critical analysis of an exemplar college campus is explored using the vulnerability model to assess risks that can lead to unnecessary and preventable violence on college campuses. The vulnerability model is a comprehensive approach utilized to guide an assessment to identify both individual and community risk factors influencing health and healthcare environments. The use of the vulnerability model illustrated in this article reveals its usefulness in identifying the risk and needs for this population. APRNs and student health centers are positioned well to utilize the vulnerability model in assessing the needs of college campuses to improve outcomes of students. ©2016 American Association of Nurse Practitioners.

  17. Groundwater vulnerability assessment in karstic aquifers using COP method.

    PubMed

    Bagherzadeh, Somayeh; Kalantari, Nasrollah; Nobandegani, Amir Fadaei; Derakhshan, Zahra; Conti, Gea Oliveri; Ferrante, Margherita; Malekahmadi, Roya

    2018-05-02

    Access to safe and reliable drinking water is amongst the important indicators of development in each society, and water scarcity is one of the challenges and limitations affecting development at national and regional levels and social life and economic activity areas. Generally, there are two types of drinking water sources: the first type is surface waters, including lakes, rivers, and streams and the second type is groundwaters existing in aquifers. Amongst aquifers, karst aquifers play an important role in supplying water sources of the world. Therefore, protecting these aquifers from pollution sources is of paramount importance. COP method is amongst the methods to investigate the intrinsic vulnerability of this type of aquifers, so that areas susceptible to contamination can be determined before being contaminated and these sources can be protected. In the present study, COP method was employed in order to spot the regions that are prone to contamination in the region. This method uses the properties of overlying geological layers above the water table (O factor), the concentration of flow (C factor), and precipitation (P factor) over the aquifer, as the parameters to assess the intrinsic vulnerability of groundwater resources. In this regard, geographical information system (GIS) and remote sensing (RS) were utilized to prepare the mentioned factors and the intrinsic vulnerability map was obtained. The results of COP method indicated that the northwest and the west of the region are highly and very vulnerable. This study indicated that regions with low vulnerability were observed in eastern areas, which accounted for 15.6% of the area. Moderate vulnerability was 40% and related to the northeast and southeast of the area. High vulnerability was 38.2% and related to western and southwestern regions. Very high vulnerability was 6.2% and related to the northwest of the area. By means of the analysis of sensitivity of the model, it was determined that the focus

  18. Assessing Hydro-Ecological Vulnerability from Space

    NASA Astrophysics Data System (ADS)

    Stampoulis, D.; Andreadis, K.; Granger, S. L.; Fisher, J. B.; Turk, F. J.; Behrangi, A.; Das, N. N.; Ines, A.

    2015-12-01

    The main driver of economic growth in East Africa is agriculture. However, climate change and the resulting intensification of the hydrologic cycle will increase water limitation in this already drought-burdened region, and the challenge of ensuring food security is bound to become critical. Efforts must, therefore, be made to develop appropriate adaptation strategies for agriculture in such regions. Assessing and predicting ecosystem responses to global environmental change can advance management and decision support systems that would improve food security and economic development. The current study uses a plethora of multi-year remote sensing earth observations to study the hydro-ecological vulnerability of the various ecosystems in the water-stressed East African region to droughts. More specifically, we assess the hydrologic sensitivity and resilience of soil moisture and vegetation water content (derived from NRL's WindSat radiometer), during dry spells, for different dry-period durations, and for various vegetation categories. Spatiotemporal patterns and characteristics of the response of the two aforementioned variables to sustained precipitation deficits (derived from TRMM 3B42 V7), as well as their persistence in maintaining their stability are identified. We also assess changes, in space and time, in the normalized radar surface-backscattering cross-sections from NASA's QuikSCAT Scatterometer, to obtain information on the vegetation regimes, as well as changes in vegetation phenometrics using the enhanced vegetation index (EVI) derived from MODIS. Quantifying the response and characterizing the resilience of the two aforementioned major hydrological attributes using various remote sensing techniques that complement each other, can provide critical insight into the region's vulnerability and adaptive capacity with respect to rainfall variability.

  19. Hydrocode simulations of air and water shocks for facility vulnerability assessments.

    PubMed

    Clutter, J Keith; Stahl, Michael

    2004-01-02

    Hydrocodes are widely used in the study of explosive systems but their use in routine facility vulnerability assessments has been limited due to the computational resources typically required. These requirements are due to the fact that the majority of hydrocodes have been developed primarily for the simulation of weapon-scale phenomena. It is not practical to use these same numerical frameworks on the large domains found in facility vulnerability studies. Here, a hydrocode formulated specifically for facility vulnerability assessments is reviewed. Techniques used to accurately represent the explosive source while maintaining computational efficiency are described. Submodels for addressing other issues found in typical terrorist attack scenarios are presented. In terrorist attack scenarios, loads produced by shocks play an important role in vulnerability. Due to the difference in the material properties of water and air and interface phenomena, there exists significant contrast in wave propagation phenomena in these two medium. These physical variations also require special attention be paid to the mathematical and numerical models used in the hydrocodes. Simulations for a variety of air and water shock scenarios are presented to validate the computational models used in the hydrocode and highlight the phenomenological issues.

  20. A Preliminary Assessment of Social Vulnerability in Ganga-Brahmaputra-Meghna Delta

    NASA Astrophysics Data System (ADS)

    Hazra, Sugata; Islam, Nabiul

    2017-04-01

    The Ganga-Brahmaputra-Meghna (GBM) Delta has a high population density and is exposed to rapid environmental changes making it one of the most stressed deltas in the world. The low-lying coastal areas of the Ganga-Brahmaputra-Meghna (GBM) Delta comprise 19 coastal districts of Bangladesh and two districts in India with significant land areas within 5 meters of sea level has a population of more than 50 million people at an average population density of 1100 people/km2. This population is exposed to a range of hazards such as severe cyclones, coastal erosion, and salinization, exacerbated by climate change and subsidence which imply severe stress on the resource dependent community of this region. This situation is further complicated by poverty and limited social well-being such as poor access to education/ health/ drinking water/ sanitation facilities, and lack of food and energy security. Thus assessing social vulnerability can help to understand which communities are susceptible to environmental change and guide adaptation actions to address these threats. This preliminary study aims to construct a socio-economic index by assessing the social vulnerability of coastal communities of GBM Delta taking consistent and common secondary data from the Census of India and the Bangladesh Bureau of Statisticsand applyinga Principle Component Analysis(PCA) methodology. Several statistical tests like Kaiser-Meyer-Olkin (KMO) have also been used to assess the appropriateness of using PCA. Among the selected common indicators, five major components are found to explain majority of the total variation of social vulnerability across the delta: (1) poverty, (2) dependency ratio, (3) agriculture dependency, (4) lack of sanitation and (5) existence of mud houses. The most important observation is the existence of a social vulnerability gradient across the coast. In other words, socially marginalised and vulnerable communities are found on the Delta margin in both India and

  1. Development of AHPDST Vulnerability Indexing Model for Groundwater Vulnerability Assessment Using Hydrogeophysical Derived Parameters and GIS Application

    NASA Astrophysics Data System (ADS)

    Mogaji, K. A.

    2017-04-01

    Producing a bias-free vulnerability assessment map model is significantly needed for planning a scheme of groundwater quality protection. This study developed a GIS-based AHPDST vulnerability index model for producing groundwater vulnerability model map in the hard rock terrain, Nigeria by exploiting the potentials of analytic hierarchy process (AHP) and Dempster-Shafer theory (DST) data mining models. The acquired borehole and geophysical data in the study area were processed to derive five groundwater vulnerability conditioning factors (GVCFs), namely recharge rate, aquifer transmissivity, hydraulic conductivity, transverse resistance and longitudinal conductance. The produced GVCFs' thematic maps were multi-criterially analyzed by employing the mechanisms of AHP and DST models to determine the normalized weight ( W) parameter for the GVCFs and mass function factors (MFFs) parameter for the GVCFs' thematic maps' class boundaries, respectively. Based on the application of the weighted linear average technique, the determined W and MFFs parameters were synthesized to develop groundwater vulnerability potential index (GVPI)-based AHPDST model algorithm. The developed model was applied to establish four GVPI mass/belief function indices. The estimates based on the applied GVPI belief function indices were processed in GIS environment to create prospective groundwater vulnerability potential index maps. The most representative of the resulting vulnerability maps (the GVPIBel map) was considered for producing the groundwater vulnerability potential zones (GVPZ) map for the area. The produced GVPZ map established 48 and 52% of the areal extent to be covered by the lows/moderate and highs vulnerable zones, respectively. The success and the prediction rates of the produced GVPZ map were determined using the relative operating characteristics technique to give 82.3 and 77.7%, respectively. The analyzed results reveal that the developed GVPI-based AHPDST model algorithm is

  2. Vulnerability assessment of urban ecosystems driven by water resources, human health and atmospheric environment

    NASA Astrophysics Data System (ADS)

    Shen, Jing; Lu, Hongwei; Zhang, Yang; Song, Xinshuang; He, Li

    2016-05-01

    As ecosystem management is a hotspot and urgent topic with increasing population growth and resource depletion. This paper develops an urban ecosystem vulnerability assessment method representing a new vulnerability paradigm for decision makers and environmental managers, as it's an early warning system to identify and prioritize the undesirable environmental changes in terms of natural, human, economic and social elements. The whole idea is to decompose a complex problem into sub-problem, and analyze each sub-problem, and then aggregate all sub-problems to solve this problem. This method integrates spatial context of Geographic Information System (GIS) tool, multi-criteria decision analysis (MCDA) method, ordered weighted averaging (OWA) operators, and socio-economic elements. Decision makers can find out relevant urban ecosystem vulnerability assessment results with different vulnerable attitude. To test the potential of the vulnerability methodology, it has been applied to a case study area in Beijing, China, where it proved to be reliable and consistent with the Beijing City Master Plan. The results of urban ecosystem vulnerability assessment can support decision makers in evaluating the necessary of taking specific measures to preserve the quality of human health and environmental stressors for a city or multiple cities, with identifying the implications and consequences of their decisions.

  3. Assessment of economic vulnerability to infectious disease crises.

    PubMed

    Sands, Peter; El Turabi, Anas; Saynisch, Philip A; Dzau, Victor J

    2016-11-12

    Infectious disease crises have substantial economic impact. Yet mainstream macroeconomic forecasting rarely takes account of the risk of potential pandemics. This oversight contributes to persistent underestimation of infectious disease risk and consequent underinvestment in preparedness and response to infectious disease crises. One reason why economists fail to include economic vulnerability to infectious disease threats in their assessments is the absence of readily available and digestible input data to inform such analysis. In this Viewpoint we suggest an approach by which the global health community can help to generate such inputs, and a framework to use these inputs to assess the economic vulnerability to infectious disease crises of individual countries and regions. We argue that incorporation of these risks in influential macroeconomic analyses such as the reports from the International Monetary Fund's Article IV consultations, rating agencies and risk consultancies would simultaneously improve the quality of economic risk forecasting and reinforce individual government and donor incentives to mitigate infectious disease risks. Copyright © 2016 Elsevier Ltd. All rights reserved.

  4. Impact of Tactical and Strategic Weather Avoidance on Separation Assurance

    NASA Technical Reports Server (NTRS)

    Refai, Mohamad S.; Windhorst, Robert

    2011-01-01

    The ability to keep flights away from weather hazards while maintaining aircraft-to-aircraft separation is critically important. The Advanced Airspace Concept is an automation concept that implements a ground-based strategic conflict resolution algorithm for management of aircraft separation. The impact of dynamic and uncertain weather avoidance on this concept is investigated. A strategic weather rerouting system is integrated with the Advanced Airspace Concept, which also provides a tactical weather avoidance algorithm, in a fast time simulation of the Air Transportation System. Strategic weather rerouting is used to plan routes around weather in the 20 minute to two-hour time horizon. To address forecast uncertainty, flight routes are revised at 15 minute intervals. Tactical weather avoidance is used for short term trajectory adjustments (30 minute planning horizon) that are updated every minute to address any weather conflicts (instances where aircraft are predicted to pass through weather cells) that are left unresolved by strategic weather rerouting. The fast time simulation is used to assess the impact of tactical weather avoidance on the performance of automated conflict resolution as well as the impact of strategic weather rerouting on both conflict resolution and tactical weather avoidance. The results demonstrate that both tactical weather avoidance and strategic weather rerouting increase the algorithm complexity required to find aircraft conflict resolutions. Results also demonstrate that tactical weather avoidance is prone to higher airborne delay than strategic weather rerouting. Adding strategic weather rerouting to tactical weather avoidance reduces total airborne delays for the reported scenario by 18% and reduces the number of remaining weather violations by 13%. Finally, two features are identified that have proven important for strategic weather rerouting to realize these benefits; namely, the ability to revise reroutes and the use of maneuvers

  5. Summarizing components of U.S. Department of the Interior vulnerability assessments to focus climate adaptation planning

    USGS Publications Warehouse

    Thompson, Laura M.; Staudinger, Michelle D.; Carter, Shawn L.

    2015-09-29

    A secretarial order identified climate adaptation as a critical performance objective for future management of U.S. Department of the Interior (DOI) lands and resources in response to global change. Vulnerability assessments can inform climate adaptation planning by providing insight into what natural resources are most at risk and why. Three components of vulnerability—exposure, sensitivity, and adaptive capacity—were defined by the Intergovernmental Panel on Climate Change (IPCC) as necessary for identifying climate adaptation strategies and actions. In 2011, the DOI requested all internal bureaus report ongoing or completed vulnerability assessments about a defined range of assessment targets or climate-related threats. Assessment targets were defined as freshwater resources, landscapes and wildlife habitat, native and cultural resources, and ocean health. Climate-related threats were defined as invasive species, wildfire risk, sea-level rise, and melting ice and permafrost. Four hundred and three projects were reported, but the original DOI survey did not specify that information be provided on exposure, sensitivity, and adaptive capacity collectively as part of the request, and it was unclear which projects adhered to the framework recommended by the IPCC. Therefore, the U.S. Geological Survey National Climate Change and Wildlife Science Center conducted a supplemental survey to determine how frequently each of the three vulnerability components was assessed. Information was categorized for 124 of the 403 reported projects (30.8 percent) based on the three vulnerability components, and it was discovered that exposure was the most common component assessed (87.9 percent), followed by sensitivity (68.5 percent) and adaptive capacity (33.1 percent). The majority of projects did not fully assess vulnerability; projects focused on landscapes/wildlife habitats and sea-level rise were among the minority that simultaneously addressed all three vulnerability

  6. Resilience, Vulnerability and Residual Threat: An Assessment from Indian Sundarban

    NASA Astrophysics Data System (ADS)

    Ghosh, T.

    2016-12-01

    The estuarine islands within Indian Sundarban are extremely vulnerable due to climate change, erosion, flooding and increasing population pressure. Around 4.6 million people are living under constant threat of climatic shocks, affecting their farm based economy and dependency on forest resources for their livelihood. This paper attempts to focus on the dynamics of system's resilience in the backdrop of higher level of vulnerability. Globally the assessment of island vulnerability is generally more focused towards the climate change impacts, rather than taking into account other determining drivers with proper weightage. Three estuarine islands namely Sagar, Ghoramara and Mousani at the western part of Indian Sundarban Delta (ISD) have been chosen for this study to derive the indicator based scoring method using the household survey data from twenty seven (27) sampled `Mouza' (lowest administrative boundary; village) with cluster random sampling. Vulnerability and resilience of these islands have been calculated using the indicators like housing condition, electrification, population density, accretion, adult secondary education level, percentage of people `Below Poverty Line' (BPL) based on per capita income. Residual threats for these islands have been obtained by subtracting the score of resilience and vulnerability of the system. Result suggests that all these islands are in less resilient condition to combat the negative impact of the influencing factors. Sapkhali, Ghoramara, Bankimnagar, Shibpur and Baliara are becoming sensitive from excess residual threats. This study is an initiation for identifying the thrust areas need to address with effective policy adaptation, necessary to minimize the existing vulnerable conditions in these islands. Key words: Vulnerability, Resilience, Residual threat, Indian Sundarban

  7. User’s Guide for Tactical Thinking Behaviorally Anchored Rating Scales

    DTIC Science & Technology

    2006-06-01

    Shafer , J., Ross, K. G., Cox, D. A., & Shadrick, S . B. (2005). A behaviorally anchored assessment tool to measure tactical thinking proficiency. Paper...NUMBER User’s Guide for Tactical Thinking Behaviorally Anchored Rating W74V8H-04-C-0018 Scales 5b. PROGRAM ELEMENT NUMBER 622785 6. AUTHOR( S ) 5c...cognition by observing and rating behaviors . Phillips, Shafer , Ross, Cox, and Shadrick (2005) describe the process by which the T- BARS were developed. This

  8. The arctic water resource vulnerability index: An integrated assessment tool for community resilience and vulnerability with respect to freshwater

    USGS Publications Warehouse

    Alessa, L.; Kliskey, A.; Lammers, R.; Arp, C.; White, D.; Hinzman, L.; Busey, R.

    2008-01-01

    People in the Arctic face uncertainty in their daily lives as they contend with environmental changes at a range of scales from local to global. Freshwater is a critical resource to people, and although water resource indicators have been developed that operate from regional to global scales and for midlatitude to equatorial environments, no appropriate index exists for assessing the vulnerability of Arctic communities to changing water resources at the local scale. The Arctic Water Resource Vulnerability Index (AWRVI) is proposed as a tool that Arctic communities can use to assess their relative vulnerability-resilience to changes in their water resources from a variety of biophysical and socioeconomic processes. The AWRVI is based on a social-ecological systems perspective that includes physical and social indicators of change and is demonstrated in three case study communities/watersheds in Alaska. These results highlight the value of communities engaging in the process of using the AWRVI and the diagnostic capability of examining the suite of constituent physical and social scores rather than the total AWRVI score alone. ?? 2008 Springer Science+Business Media, LLC.

  9. The arctic water resource vulnerability index: an integrated assessment tool for community resilience and vulnerability with respect to freshwater.

    PubMed

    Alessa, Lilian; Kliskey, Andrew; Lammers, Richard; Arp, Chris; White, Dan; Hinzman, Larry; Busey, Robert

    2008-09-01

    People in the Arctic face uncertainty in their daily lives as they contend with environmental changes at a range of scales from local to global. Freshwater is a critical resource to people, and although water resource indicators have been developed that operate from regional to global scales and for midlatitude to equatorial environments, no appropriate index exists for assessing the vulnerability of Arctic communities to changing water resources at the local scale. The Arctic Water Resource Vulnerability Index (AWRVI) is proposed as a tool that Arctic communities can use to assess their relative vulnerability-resilience to changes in their water resources from a variety of biophysical and socioeconomic processes. The AWRVI is based on a social-ecological systems perspective that includes physical and social indicators of change and is demonstrated in three case study communities/watersheds in Alaska. These results highlight the value of communities engaging in the process of using the AWRVI and the diagnostic capability of examining the suite of constituent physical and social scores rather than the total AWRVI score alone.

  10. A model for assessing the systemic vulnerability in landslide prone areas

    NASA Astrophysics Data System (ADS)

    Pascale, S.; Sdao, F.; Sole, A.

    2010-07-01

    The objectives of spatial planning should include the definition and assessment of possible mitigation strategies regarding the effects of natural hazards on the surrounding territory. Unfortunately, however, there is often a lack of adequate tools to provide necessary support to the local bodies responsible for land management. This paper deals with the conception, the development and the validation of an integrated numerical model for assessing systemic vulnerability in complex and urbanized landslide-prone areas. The proposed model considers this vulnerability not as a characteristic of a particular element at risk, but as a peculiarity of a complex territorial system, in which the elements are reciprocally linked in a functional way. It is an index of the tendency of a given territorial element to suffer damage (usually of a functional kind) due to its interconnections with other elements of the same territorial system. The innovative nature of this work also lies in the formalization of a procedure based on a network of influences for an adequate assessment of such "systemic" vulnerability. This approach can be used to obtain information which is useful, in any given situation of a territory hit by a landslide event, for the identification of the element which has suffered the most functional damage, ie the most "critical" element and the element which has the greatest repercussions on other elements of the system and thus a "decisive" role in the management of the emergency. This model was developed within a GIS system through the following phases: 1. the topological characterization of the territorial system studied and the assessment of the scenarios in terms of spatial landslide hazard. A statistical method, based on neural networks was proposed for the assessment of landslide hazard; 2. the analysis of the direct consequences of a scenario event on the system; 3. the definition of the assessment model of systemic vulnerability in landslide-prone areas. To

  11. Assessing tsunami vulnerability, an example from Herakleio, Crete

    NASA Astrophysics Data System (ADS)

    Papathoma, M.; Dominey-Howes, D.; Zong, Y.; Smith, D.

    Recent tsunami have caused massive loss of life, destruction of coastal infrastructures and disruption to economic activity. To date, tsunami hazard studies have concentrated on determining the frequency and magnitude of events and in the production of simplistic flood maps. In general, such maps appear to have assumed a uniform vulnerability of population, infrastructure and business. In reality however, a complex set of factors interact to produce a pattern of vulnerability that varies spatially and temporally. A new vulnerability assessment approach is described, that incorporates multiple factors (e.g. parameters relating to the natural and built environments and socio-demographics) that contribute to tsunami vulnerability. The new methodology is applied on a coastal segment in Greece and, in particular, in Crete, westof the city of Herakleio. The results are presented within a Geographic Information System (GIS). The application of GIS ensures the approach is novel for tsunami studies, since it permits interrogation of the primary database by several different end-users. For example, the GIS may be used: (1) to determine immediate post-tsunami disaster response needs by the emergency services; (2) to preplan tsunami mitigation measures by disaster planners; (3) as a tool for local planning by the municipal authorities or; (4) as a basis for catastrophe modelling by insurance companies. We show that population density varies markedly with the time of the year and that 30% of buildings within the inundation zone are only single story thus increasing the vulnerability of their occupants. Within the high inundation depth zone, 11% of buildings are identified as in need of reinforcement and this figure rises to 50% within the medium inundation depth zone. 10% of businesses are located within the high inundation depth zone and these may need to consider their level of insurance cover to protect against primary building damage, contents loss and business interruption

  12. Airborne Tactical Crossload Planner

    DTIC Science & Technology

    2017-12-01

    set out in the Airborne Standard Operating Procedure (ASOP). 14. SUBJECT TERMS crossload, airborne, optimization, integer linear programming ...they land to their respective sub-mission locations. In this thesis, we formulate and implement an integer linear program called the Tactical...to meet any desired crossload objectives. xiv We demonstrate TCP with two real-world tactical problems from recent airborne operations: one by the

  13. THE US EPA'S REGIONAL VULNERABILITY ASSESSMENT PROGRAM: A RESEARCH STRATEGY FOR 2001-2006

    EPA Science Inventory

    The goal of ORD's Regional Vulnerability Assessment (ReVA) Program is to develop all
    approach to quantifying regional ecological vulnerabilities so that risk management activities can be targeted and prioritized. ReVA's focus is, to develop a set of methods that are applica...

  14. Assessment of coastal vulnerability through the use of GIS tools in South Sicily (Italy).

    PubMed

    Anfuso, Giorgio; Martínez Del Pozo, José Angel

    2009-03-01

    This study assessed coastal erosion vulnerability along a 90-km sector, which included both erosional and accretionary beaches, and different levels of human occupation. Two aerial photogrammetric flights were used to reconstruct coastal evolution between 1977 and 1999. During this period, extensive accretion was recorded updrift of human structures at harbors and ports, e.g., Scoglitti (105.6 m), Donnalucata (52.8 m), and Pozzallo (94.6 m). Conversely, erosion was recorded in downdrift areas, with maximum values at Modica Stream mouth (63.8 m) and Point Castellazzo (35.2 m). Assessments were subsequently divided into four categories ranging from "high erosion" to "accretion." Several sources were examined to assess human activities and land use. The latter was mapped and divided into four categories, ranging from "very high" to "no capital" land use. Subsequently, coastal erosion vulnerability was assessed by combining land use categories with recorded coastline behavior. Results showed "very high" to "high" vulnerability along 5.8% and 16.6%, respectively, of the littoral, while 20.9% and 56.7%, respectively, was found to exhibit "medium" and "low/very low" vulnerability. A very good agreement between predicted coastal vulnerability and coastal trend had been observed over recent years. Furthermore, several human structures and activities are located within the "imminent collapse zone (ICZ)" which reached maximum values of 17.5 m at Modica Stream and 13.5 m at Point Braccetto.

  15. Vulnerability Assessments in Support of the Climate Ready ...

    EPA Pesticide Factsheets

    As part of the Climate Ready Estuaries (CRE) program, the Global Change Research Program (GCRP) in the National Center for Environmental Assessment, Office of Research and Development at the U.S. Environmental Protection Agency has prepared a report exploring a new methodology for climate change vulnerability assessments using Massachusetts Bays’ salt marsh ecosystem as a demonstration. The aim is to synthesize place-based information on the potential implications of climate change for key ecosystem processes in each estuary, in a form that will enable managers to undertake management adaptation planning.

  16. REGIONAL VULNERABILITY ASSESSMENT (REVA) IMPROVING ENVIRONMENTAL DECISION MAKING THROUGH CLIENT PARTNERSHIPS

    EPA Science Inventory

    The Regional Vulnerability Assessment (ReV A) Program is an applied research program t,1at is focusing on using spatial information and model results to support environmental decision-making at regional- down to local-scales. Re VA has developed analysis and assessment methods to...

  17. Full annual cycle climate change vulnerability assessment for migratory birds

    USGS Publications Warehouse

    Culp, Leah A.; Cohen, Emily B.; Scarpignato, Amy L.; Thogmartin, Wayne E.; Marra, Peter P.

    2017-01-01

    Climate change is a serious challenge faced by all plant and animal species. Climate change vulnerability assessments (CCVAs) are one method to assess risk and are increasingly used as a tool to inform management plans. Migratory animals move across regions and continents during their annual cycles where they are exposed to diverse climatic conditions. Climate change during any period and in any region of the annual cycle could influence survival, reproduction, or the cues used to optimize timing of migration. Therefore, CCVAs for migratory animals best estimate risk when they include climate exposure during the entire annual cycle. We developed a CCVA incorporating the full annual cycle and applied this method to 46 species of migratory birds breeding in the Upper Midwest and Great Lakes (UMGL) region of the United States. Our methodology included background risk, climate change exposure × climate sensitivity, adaptive capacity to climate change, and indirect effects of climate change. We compiled information about migratory connectivity between breeding and stationary non-breeding areas using literature searches and U.S. Geological Survey banding and re-encounter data. Climate change exposure (temperature and moisture) was assessed using UMGL breeding season climate and winter climate from non-breeding regions for each species. Where possible, we focused on non-breeding regions known to be linked through migratory connectivity. We ranked 10 species as highly vulnerable to climate change and two as having low vulnerability. The remaining 34 species were ranked as moderately vulnerable. In general, including non-breeding data provided more robust results that were highly individualistic by species. Two species were found to be highly vulnerable throughout their annual cycle. Projected drying will have the greatest effect during the non-breeding season for species overwintering in Mexico and the Caribbean. Projected temperature increases will have the greatest

  18. A comparison of data-driven groundwater vulnerability assessment methods

    USGS Publications Warehouse

    Sorichetta, Alessandro; Ballabio, Cristiano; Masetti, Marco; Robinson, Gilpin R.; Sterlacchini, Simone

    2013-01-01

    Increasing availability of geo-environmental data has promoted the use of statistical methods to assess groundwater vulnerability. Nitrate is a widespread anthropogenic contaminant in groundwater and its occurrence can be used to identify aquifer settings vulnerable to contamination. In this study, multivariate Weights of Evidence (WofE) and Logistic Regression (LR) methods, where the response variable is binary, were used to evaluate the role and importance of a number of explanatory variables associated with nitrate sources and occurrence in groundwater in the Milan District (central part of the Po Plain, Italy). The results of these models have been used to map the spatial variation of groundwater vulnerability to nitrate in the region, and we compare the similarities and differences of their spatial patterns and associated explanatory variables. We modify the standard WofE method used in previous groundwater vulnerability studies to a form analogous to that used in LR; this provides a framework to compare the results of both models and reduces the effect of sampling bias on the results of the standard WofE model. In addition, a nonlinear Generalized Additive Model has been used to extend the LR analysis. Both approaches improved discrimination of the standard WofE and LR models, as measured by the c-statistic. Groundwater vulnerability probability outputs, based on rank-order classification of the respective model results, were similar in spatial patterns and identified similar strong explanatory variables associated with nitrate source (population density as a proxy for sewage systems and septic sources) and nitrate occurrence (groundwater depth).

  19. Rainfall-induced landslide vulnerability Assessment in urban area reflecting Urban structure and building characteristics

    NASA Astrophysics Data System (ADS)

    Park, C.; Cho, M.; Lee, D.

    2017-12-01

    Landslide vulnerability assessment methodology of urban area is proposed with urban structure and building charateristics which can consider total damage cost of climate impacts. We used probabilistic analysis method for modeling rainfall-induced shallow landslide susceptibility by slope stability analysis and Monte Carlo simulations. And We combined debris flows with considering spatial movements under topographical condition and built environmental condition. Urban vulnerability of landslide is assessed by two categories: physical demages and urban structure aspect. Physical vulnerability is related to buildings, road, other ubran infra. Urban structure vulnerability is considered a function of the socio-economic factors, trigger factor of secondary damage, and preparedness level of the local government. An index-based model is developed to evaluate the life and indirect damage under landslide as well as the resilience ability against disasters. The analysis was performed in a geographic information system (GIS) environment because GIS can deal efficiently with a large volume of spatial data. The results of the landslide susceptibility assessment were compared with the landslide inventory, and the proposed approach demonstrated good predictive performance. The general trend found in this study indicates that the higher population density areas under a weaker fiscal condition that are located at the downstream of mountainous areas are more vulnerable than the areas in opposite conditions.

  20. The Influence of Victim Vulnerability and Gender on Police Officers' Assessment of Intimate Partner Violence Risk.

    PubMed

    Storey, Jennifer E; Strand, Susanne

    2017-01-01

    This study investigated the influence of victim vulnerability factors and gender on risk assessment for intimate partner violence (IPV). 867 cases of male and female perpetrated IPV investigated by Swedish police officers using the Brief Spousal Assault Form for the Evaluation of Risk (B-SAFER) were examined. For male-to-female IPV, victim vulnerability factors were associated with summary risk judgments and risk management recommendations. For female-to-male IPV, vulnerability factors were more often omitted, and consistent associations were not found between vulnerability factors, summary risk judgments, and risk management. Results indicate that B-SAFER victim vulnerability factors can assist in assessing male-to-female IPV risk. Further research is necessary to examine the use of B-SAFER victim vulnerability factors for female-to-male IPV, as results showed victim vulnerability factors to be less relevant to officers' decision making, particularly their management recommendations. However, several variables external to the B-SAFER, such as the availability of management strategies may account for these findings.

  1. Mapping eco-environmental vulnerability patterns: An assessment framework based on remote sensing, GIS, and AHP

    NASA Astrophysics Data System (ADS)

    Anh, N. K.; Liou, Y. A.; Li, M. H.

    2016-12-01

    The motivation for this study is assessment of the eco-environment vulnerability based on four independent determinants: hydro-meteorology, topography, land resources, and human activities. An assessment framework is proposed to assess the vulnerable eco-environment by using 16 variables with 6 of them constructed from Landsat 8 satellite images. The remaining variables were extracted from digital maps. Each variable was evaluated and spatially mapped with the aid of an analytical hierarchy process (AHP) and geographical information system (GIS). The Thua Thien - Hue Province that has been experiencing natural disasters and urbanization in the recent decades is selected as our study area. An eco-environmental vulnerability map is assorted into six vulnerable levels consisting of potential, slight, light, medium, heavy, and very heavy vulnerabilities, representing 14%, 27%, 17%, 26%, 13%, 3% of the study area, respectively. It is found that heavy and very heavy vulnerable areas appear mainly in the low and medium lands with high intensification of social-economic activities and often suffer from flooding. Tiny percentages of medium and heavy vulnerable levels occur in high land areas probably caused by agricultural practices in highlands, slash and burn cultivation and removal of natural forests with new plantation forests and these regions are usually influenced by landslides, flash flooding. Based on our results, three ecological zones requiring different development and protection solutions are proposed to restore local eco-environment toward sustainable development. Our findings support the idea that eco-environmental vulnerability is driven by anthropogenic processes and enhanced by natural disaster in the Thua Thien-Hue Province.

  2. Assess and Adapt: Coordinated Ecoregional Forest Vulnerability Assessments Covering the Upper Midwest and Northeast in Support of Climate-informed Decision-making

    NASA Astrophysics Data System (ADS)

    Swanston, C.; Janowiak, M.; Handler, S.; Butler, P.; Brandt, L.; Iverson, L.; Thompson, F.; Ontl, T.; Shannon, D.

    2016-12-01

    Forest ecosystem vulnerability assessments are rapidly becoming an integral component of forest management planning, in which there is increasing public expectation that even near-term activities explicitly incorporate information about anticipated climate impacts and risks. There is a clear desire among forest managers for targeted assessments that address critical questions about species and ecosystem vulnerabilities while delivering this information in an accessible format. We developed the Ecosystem Vulnerability Assessment Approach (EVAA), which combines multiple quantitative models, expert elicitation from scientists and land managers, and a templated report structure oriented to natural resource managers. The report structure includes relevant information on the contemporary landscape, past climate, future climate projections, impact model results, and a transparent vulnerability assessment of species and ecosystems. We have used EVAA in seven ecoregional assessments covering 246 million acres of forestland across the upper Midwest and Northeast (www.forestadaptation.org; five published, two in review). We convened a panel of local forest ecology and management experts in each assessment area to examine projected climate effects on system drivers, stressors, and dominant species, as well as the current adaptive capacity of the major ecoregional forest ecosystems. The panels provided a qualitative assessment of the vulnerability of forest ecosystems to climate change over the next century. Over 130 authors from dozens of organizations collaborated on these peer-reviewed assessment publications, which are delivered to thousands of stakeholders through live and recorded webinars, online briefs, and in-person trainings and seminars. The assessments are designed to be used with the Adaptation Workbook (www.adaptationworkbook.org), a planning tool that works at multiple scales and has generated more than 200 real-world forest adaptation demonstration projects.

  3. Gulf Coast vulnerability assessment: Mangrove, tidal emergent marsh, barrier islands and oyster reef

    USGS Publications Warehouse

    Watson, Amanda; Reece, Joshua; Tirpak, Blair; Edwards, Cynthia Kallio; Geselbracht, Laura; Woodrey, Mark; LaPeyre, Megan K.; Dalyander, Patricia (Soupy)

    2017-01-01

    Climate, sea level rise, and urbanization are undergoing unprecedented levels of combined change and are expected to have large effects on natural resources—particularly along the Gulf of Mexico coastline (Gulf Coast). Management decisions to address these effects (i.e., adaptation) require an understanding of the relative vulnerability of various resources to these stressors. To meet this need, the four Landscape Conservation Cooperatives along the Gulf partnered with the Gulf of Mexico Alliance to conduct this Gulf Coast Vulnerability Assessment (GCVA). Vulnerability in this context incorporates exposure and sensitivity to threats (potential impact), coupled with the adaptive capacity to mitigate those threats. Potential impact and adaptive capacity reflect natural history features of target species and ecosystems. The GCVA used an expert opinion approach to qualitatively assess the vulnerability of four ecosystems: mangrove, oyster reef, tidal emergent marsh, and barrier islands, and a suite of wildlife species that depend on them. More than 50 individuals participated in the completion of the GCVA, facilitated via Ecosystem and Species Expert Teams. Of the species assessed, Kemp’s ridley sea turtle was identified as the most vulnerable species across the Gulf Coast. Experts identified the main threats as loss of nesting habitat to sea level rise, erosion, and urbanization. Kemp’s ridley also had an overall low adaptive capacity score due to their low genetic diversity, and higher nest site fidelity as compared to other assessed species. Tidal emergent marsh was the most vulnerable ecosystem, due in part to sea level rise and erosion. In general, avian species were more vulnerable than fish because of nesting habitat loss to sea level rise, erosion, and potential increases in storm surge. Assessors commonly indicated a lack of information regarding impacts due to projected changes in the disturbance regime, biotic interactions, and synergistic effects in

  4. [The Machiavellianism and manipulation tactics used by patients with borderline personality disorder in everyday life and in therapy].

    PubMed

    Mandal, Eugenia; Kocur, Dagna

    2013-01-01

    The aim of the researches was to inspect the relation between borderline personality and Machiavellianism as well as the tendency to apply various manipulation tactics in everyday life and in therapy. The test used an original/authors' survey for testing the tendency to employ manipulation tactics as well as a MACH-IV questionnaire (Christie, Geis, 1970) for measuring Machiavellianism. The studied group included 30 patients with diagnosed BPD, 37 therapists and 30 persons in the control group. No differences were noted in the general indicator of Machiavellianism; however, the patients scored lower on the Tactics scale than people from the control group. Patients preferred employing the tactics of taking offense, lying and begging in everyday life. Compared to people from the control group, patients presented a larger tendency to employ tactics of begging, threatening and threatening to break off a close relationship, and a lower tendency to employ seduction. According to therapists, during the therapy patients most often resorted to lying and arousing guilt. Therapists assessed the patients' tendency to employ manipulation tactics higher than the patients themselves. BPD patients are characterized by a degree of Machiavellianism similar to that present in people from the control group. Patients show larger tendency to employ tactics of threatening and begging than the people from the control group. Compared to assessments made by doctors and therapists, they lower their own assessment of the tendency to employ manipulation. The longer the seniority of therapists and the larger the number of treated BPD patients, the higher the ability to perceive the patients' tendency to manipulate.

  5. Assessment of Coastal Vulnerability Through the Use of GIS Tools in South Sicily (Italy)

    NASA Astrophysics Data System (ADS)

    Anfuso, Giorgio; Martínez Del Pozo, José Ángel

    2009-03-01

    This study assessed coastal erosion vulnerability along a 90-km sector, which included both erosional and accretionary beaches, and different levels of human occupation. Two aerial photogrammetric flights were used to reconstruct coastal evolution between 1977 and 1999. During this period, extensive accretion was recorded updrift of human structures at harbors and ports, e.g., Scoglitti (105.6 m), Donnalucata (52.8 m), and Pozzallo (94.6 m). Conversely, erosion was recorded in downdrift areas, with maximum values at Modica Stream mouth (63.8 m) and Point Castellazzo (35.2 m). Assessments were subsequently divided into four categories ranging from “high erosion” to “accretion.” Several sources were examined to assess human activities and land use. The latter was mapped and divided into four categories, ranging from “very high” to “no capital” land use. Subsequently, coastal erosion vulnerability was assessed by combining land use categories with recorded coastline behavior. Results showed “very high” to “high” vulnerability along 5.8% and 16.6%, respectively, of the littoral, while 20.9% and 56.7%, respectively, was found to exhibit “medium” and “low/very low” vulnerability. A very good agreement between predicted coastal vulnerability and coastal trend had been observed over recent years. Furthermore, several human structures and activities are located within the “imminent collapse zone (ICZ)” which reached maximum values of 17.5 m at Modica Stream and 13.5 m at Point Braccetto.

  6. Chemical facility vulnerability assessment project.

    PubMed

    Jaeger, Calvin D

    2003-11-14

    Sandia National Laboratories, under the direction of the Office of Science and Technology, National Institute of Justice, conducted the chemical facility vulnerability assessment (CFVA) project. The primary objective of this project was to develop, test and validate a vulnerability assessment methodology (VAM) for determining the security of chemical facilities against terrorist or criminal attacks (VAM-CF). The project also included a report to the Department of Justice for Congress that in addition to describing the VAM-CF also addressed general observations related to security practices, threats and risks at chemical facilities and chemical transport. In the development of the VAM-CF Sandia leveraged the experience gained from the use and development of VAs in other areas and the input from the chemical industry and Federal agencies. The VAM-CF is a systematic, risk-based approach where risk is a function of the severity of consequences of an undesired event, the attack potential, and the likelihood of adversary success in causing the undesired event. For the purpose of the VAM-CF analyses Risk is a function of S, L(A), and L(AS), where S is the severity of consequence of an event, L(A) is the attack potential and L(AS) likelihood of adversary success in causing a catastrophic event. The VAM-CF consists of 13 basic steps. It involves an initial screening step, which helps to identify and prioritize facilities for further analysis. This step is similar to the prioritization approach developed by the American Chemistry Council (ACC). Other steps help to determine the components of the risk equation and ultimately the risk. The VAM-CF process involves identifying the hazardous chemicals and processes at a chemical facility. It helps chemical facilities to focus their attention on the most critical areas. The VAM-CF is not a quantitative analysis but, rather, compares relative security risks. If the risks are deemed too high, recommendations are developed for

  7. Vulnerability assessment of medieval civic towers as a tool for retrofitting design

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Casciati, Sara; Faravelli, Lucia

    2008-07-08

    The seismic vulnerability of an ancient civic bell-tower is studied. Rather than seeing it as an intermediate stage toward a risk analysis, the assessment of vulnerability is here pursued for the purpose of optimizing the retrofit design. The vulnerability curves are drawn by carrying out a single time history analysis of a model calibrated on the basis of experimental data. From the results of this analysis, the medians of three selected performance parameters are estimated, and they are used to compute, for each of them, the probability of exceeding or attaining the three corresponding levels of light, moderate and severemore » damage. The same numerical model is then used to incorporate the effects of several retrofitting solutions and to re-estimate the associated vulnerability curves. The ultimate goal is to provide a numerical tool able to drive the optimization process of a retrofit design by the comparison of the vulnerability estimates associated with the different retrofitting solutions.« less

  8. Combining demographic and genetic factors to assess population vulnerability in stream species

    USGS Publications Warehouse

    Erin L, Landguth; Muhlfeld, Clint C.; Jones, Leslie W.; Waples, Robin S.; Whited, Diane; Lowe, Winsor H.; Lucotch, John; Neville, Helen; Luikart, Gordon

    2014-01-01

    Accelerating climate change and other cumulative stressors create an urgent need to understand the influence of environmental variation and landscape features on the connectivity and vulnerability of freshwater species. Here, we introduce a novel modeling framework for aquatic systems that integrates spatially explicit, individual-based, demographic and genetic (demogenetic) assessments with environmental variables. To show its potential utility, we simulated a hypothetical network of 19 migratory riverine populations (e.g., salmonids) using a riverscape connectivity and demogenetic model (CDFISH). We assessed how stream resistance to movement (a function of water temperature, fluvial distance, and physical barriers) might influence demogenetic connectivity, and hence, population vulnerability. We present demographic metrics (abundance, immigration, and change in abundance) and genetic metrics (diversity, differentiation, and change in differentiation), and combine them into a single vulnerability index for identifying populations at risk of extirpation. We considered four realistic scenarios that illustrate the relative sensitivity of these metrics for early detection of reduced connectivity: (1) maximum resistance due to high water temperatures throughout the network, (2) minimum resistance due to low water temperatures throughout the network, (3) increased resistance at a tributary junction caused by a partial barrier, and (4) complete isolation of a tributary, leaving resident individuals only. We then applied this demogenetic framework using empirical data for a bull trout (Salvelinus confluentus) metapopulation in the upper Flathead River system, Canada and USA, to assess how current and predicted future stream warming may influence population vulnerability. Results suggest that warmer water temperatures and associated barriers to movement (e.g., low flows, dewatering) are predicted to fragment suitable habitat for migratory salmonids, resulting in the loss

  9. Social vulnerability assessment using spatial multi-criteria analysis (SEVI model) and the Social Vulnerability Index (SoVI model) - a case study for Bucharest, Romania

    NASA Astrophysics Data System (ADS)

    Armaş, I.; Gavriş, A.

    2013-06-01

    In recent decades, the development of vulnerability frameworks has enlarged the research in the natural hazards field. Despite progress in developing the vulnerability studies, there is more to investigate regarding the quantitative approach and clarification of the conceptual explanation of the social component. At the same time, some disaster-prone areas register limited attention. Among these, Romania's capital city, Bucharest, is the most earthquake-prone capital in Europe and the tenth in the world. The location is used to assess two multi-criteria methods for aggregating complex indicators: the social vulnerability index (SoVI model) and the spatial multi-criteria social vulnerability index (SEVI model). Using the data of the 2002 census we reduce the indicators through a factor analytical approach to create the indices and examine if they bear any resemblance to the known vulnerability of Bucharest city through an exploratory spatial data analysis (ESDA). This is a critical issue that may provide better understanding of the social vulnerability in the city and appropriate information for authorities and stakeholders to consider in their decision making. The study emphasizes that social vulnerability is an urban process that increased in a post-communist Bucharest, raising the concern that the population at risk lacks the capacity to cope with disasters. The assessment of the indices indicates a significant and similar clustering pattern of the census administrative units, with an overlap between the clustering areas affected by high social vulnerability. Our proposed SEVI model suggests adjustment sensitivity, useful in the expert-opinion accuracy.

  10. BROAD-SCALE ASSESSMENT OF WETLAND VULNERABILITY USING GIS AND LANDSCAPE-ECOLOGICAL METRICS

    EPA Science Inventory

    Landscape-ecological indicators of ecosystem integrity are increasingly being sought for use in habitat suitability assessments, habitat vulnerability assessments, and as a means to set goals for restoration projects. We utilized currently available information from the Arkansas...

  11. Assessing the geomorphological vulnerability of arid beach-dune systems.

    PubMed

    Peña-Alonso, Carolina; Gallego-Fernández, Juan B; Hernández-Calvento, Luis; Hernández-Cordero, Antonio I; Ariza, Eduard

    2018-09-01

    In this study, an arid dune vulnerability index (ADVI) is developed using a system of indicators to evaluate the geomorphological vulnerability of beach-dune systems of arid regions. The indicators are comprised of three analytical dimensions (susceptibility, exposure and resilience) and their corresponding sub-indices and variables and were assessed for eleven sites located in four aeolian sedimentary systems of the Canary archipelago (Spain). The selected sites have varying geomorphological characteristics, vegetation types, marine and wind conditions and human pressure degrees, and have seen different trends in their geomorphological evolution since 1960. The eleven sites were separated into three groups according to their different conservation status and different management needs, and the results of the ADVI dimensions and variables were compared and analyzed for these three groups. In general, the results obtained in the analyzed sites reveal that susceptibility and exposure dimensions are related to low-moderate values, while resilience was high. Only one site presented a state of critical vulnerability, due to the loss of its capacity to maintain its geomorphological function in recent decades. Given the lack of knowledge about geomorphological vulnerability processes in foredunes of arid regions, ADVI is the first approximation to geomorphological diagnostic in these environments and can be useful for managers. Copyright © 2018 Elsevier B.V. All rights reserved.

  12. Tactical Radar Technology Study. Volume II.

    DTIC Science & Technology

    1980-03-01

    area around the component by air conditioning of some nature. The electronic components are solid state and densely packaged. The use of heat pipe ...capabilities. The heat pipe industry may be able to achieve considerable improvement. A tactical assessment of the threat resistance threshold required...Operating -60 to +1550 F (+ Solar Radiation) Temperature Nonoperating -70 to +155F Relative Humidity 100% Winds 45 knots - operation 45-60 knots

  13. Vulnerability curves vs. vulnerability indicators: application of an indicator-based methodology for debris-flow hazards

    NASA Astrophysics Data System (ADS)

    Papathoma-Köhle, Maria

    2016-08-01

    The assessment of the physical vulnerability of elements at risk as part of the risk analysis is an essential aspect for the development of strategies and structural measures for risk reduction. Understanding, analysing and, if possible, quantifying physical vulnerability is a prerequisite for designing strategies and adopting tools for its reduction. The most common methods for assessing physical vulnerability are vulnerability matrices, vulnerability curves and vulnerability indicators; however, in most of the cases, these methods are used in a conflicting way rather than in combination. The article focuses on two of these methods: vulnerability curves and vulnerability indicators. Vulnerability curves express physical vulnerability as a function of the intensity of the process and the degree of loss, considering, in individual cases only, some structural characteristics of the affected buildings. However, a considerable amount of studies argue that vulnerability assessment should focus on the identification of these variables that influence the vulnerability of an element at risk (vulnerability indicators). In this study, an indicator-based methodology (IBM) for mountain hazards including debris flow (Kappes et al., 2012) is applied to a case study for debris flows in South Tyrol, where in the past a vulnerability curve has been developed. The relatively "new" indicator-based method is being scrutinised and recommendations for its improvement are outlined. The comparison of the two methodological approaches and their results is challenging since both methodological approaches deal with vulnerability in a different way. However, it is still possible to highlight their weaknesses and strengths, show clearly that both methodologies are necessary for the assessment of physical vulnerability and provide a preliminary "holistic methodological framework" for physical vulnerability assessment showing how the two approaches may be used in combination in the future.

  14. Vulnerability studies and integrated assessments for hazard risk reduction in Pittsburgh, PA (Invited)

    NASA Astrophysics Data System (ADS)

    Klima, K.

    2013-12-01

    Today's environmental problems stretch beyond the bounds of most academic disciplines, and thus solutions require an interdisciplinary approach. For instance, the scientific consensus is changes in the frequency and severity of many types of extreme weather events are increasing (IPCC 2012). Yet despite our efforts to reduce greenhouse gases, we continue to experience severe weather events such as Superstorm Sandy, record heat and blizzards, and droughts. These natural hazards, combined with increased vulnerability and exposure, result in longer-lasting disruptions to critical infrastructure and business continuity throughout the world. In order to protect both our lives and the economy, we must think beyond the bounds of any one discipline to include an integrated assessment of relevant work. In the wake of recent events, New York City, Washington, DC, Chicago, and a myriad of other cities have turned to their academic powerhouses for assistance in better understanding their vulnerabilities. This talk will share a case study of the state of integrated assessments and vulnerability studies of energy, transportation, water, real estate, and other main sectors in Pittsburgh, PA. Then the talk will use integrated assessment models and other vulnerability studies to create coordinated sets of climate projections for use by the many public agencies and private-sector organizations in the region.

  15. Energy Vulnerability Assessment for the US Pacific Islands. Technical Appendix 2

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fesharaki, F.; Rizer, J.P.; Greer, L.S.

    1994-05-01

    The study, Energy Vulnerability Assessment of the US Pacific Islands, was mandated by the Congress of the United States as stated in House Resolution 776-220 of 1992, Section 1406. The resolution states that the US Secretary of Energy shall conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption. Such study shall outline how the insular areas shall gain access to vital oil supplies during times of national emergency. The resolution defines insular areas as the US Virgin Islands, Puerto Rico, Guam, American Samoa, the Commonwealth of the Northern Mariana Islands,more » and Palau. The US Virgin Islands and Puerto Rico are not included in this report. The US Department of Energy (USDOE) has broadened the scope of the study contained in the House Resolution to include emergency preparedness and response strategies which would reduce vulnerability to an oil supply disruption as well as steps to ameliorate adverse economic consequences. This includes a review of alternative energy technologies with respect to their potential for reducing dependence on imported petroleum. USDOE has outlined the four tasks of the energy vulnerability assessment as the following: (1) for each island, determine crude oil and refined product demand/supply, and characterize energy and economic infrastructure; (2) forecast global and regional oil trade flow patterns, energy demand/supply, and economic activities; (3) formulate oil supply disruption scenarios and ascertain the general and unique vulnerabilities of these islands to oil supply disruptions; and (4) outline emergency preparedness and response options to secure oil supplies in the short run, and reduce dependence on imported oil in the longer term.« less

  16. An integrated risk and vulnerability assessment framework for climate change and malaria transmission in East Africa.

    PubMed

    Onyango, Esther Achieng; Sahin, Oz; Awiti, Alex; Chu, Cordia; Mackey, Brendan

    2016-11-11

    Malaria is one of the key research concerns in climate change-health relationships. Numerous risk assessments and modelling studies provide evidence that the transmission range of malaria will expand with rising temperatures, adversely impacting on vulnerable communities in the East African highlands. While there exist multiple lines of evidence for the influence of climate change on malaria transmission, there is insufficient understanding of the complex and interdependent factors that determine the risk and vulnerability of human populations at the community level. Moreover, existing studies have had limited focus on the nature of the impacts on vulnerable communities or how well they are prepared to cope. In order to address these gaps, a systems approach was used to present an integrated risk and vulnerability assessment framework for studies of community level risk and vulnerability to malaria due to climate change. Drawing upon published literature on existing frameworks, a systems approach was applied to characterize the factors influencing the interactions between climate change and malaria transmission. This involved structural analysis to determine influential, relay, dependent and autonomous variables in order to construct a detailed causal loop conceptual model that illustrates the relationships among key variables. An integrated assessment framework that considers indicators of both biophysical and social vulnerability was proposed based on the conceptual model. A major conclusion was that this integrated assessment framework can be implemented using Bayesian Belief Networks, and applied at a community level using both quantitative and qualitative methods with stakeholder engagement. The approach enables a robust assessment of community level risk and vulnerability to malaria, along with contextually relevant and targeted adaptation strategies for dealing with malaria transmission that incorporate both scientific and community perspectives.

  17. A framework for sea level rise vulnerability assessment for southwest U.S. military installations

    USGS Publications Warehouse

    Chadwick, B.; Flick, Reinhard; Helly, J.; Nishikawa, Tracy; Pei, Fang Wang; O'Reilly, W.; Guza, R.; Bromirski, Peter; Young, A.; Crampton, W.; Wild, B.; Canner, I.

    2011-01-01

    We describe an analysis framework to determine military installation vulnerabilities under increases in local mean sea level as projected over the next century. The effort is in response to an increasing recognition of potential climate change ramifications for national security and recommendations that DoD conduct assessments of the impact on U.S. military installations of climate change. Results of the effort described here focus on development of a conceptual framework for sea level rise vulnerability assessment at coastal military installations in the southwest U.S. We introduce the vulnerability assessment in the context of a risk assessment paradigm that incorporates sources in the form of future sea level conditions, pathways of impact including inundation, flooding, erosion and intrusion, and a range of military installation specific receptors such as critical infrastructure and training areas. A unique aspect of the methodology is the capability to develop wave climate projections from GCM outputs and transform these to future wave conditions at specific coastal sites. Future sea level scenarios are considered in the context of installation sensitivity curves which reveal response thresholds specific to each installation, pathway and receptor. In the end, our goal is to provide a military-relevant framework for assessment of accelerated SLR vulnerability, and develop the best scientifically-based scenarios of waves, tides and storms and their implications for DoD installations in the southwestern U.S.

  18. Index based regional vulnerability assessment to cyclones hazards of coastal area of Bangladesh

    NASA Astrophysics Data System (ADS)

    Mohammad, Q. A.; Kervyn, M.; Khan, A. U.

    2016-12-01

    Cyclone, storm surge, coastal flooding, salinity intrusion, tornado, nor'wester, and thunderstorms are the listed natural hazards in the coastal areas of Bangladesh. Bangladesh was hit by devastating cyclones in 1970, 1991, 2007, 2009, and 2016. Intensity and frequency of natural hazards in the coastal area are likely to increase in future due to climate change. Risk assessment is one of the most important steps of disaster risk reduction. As a climate change victim nation, Bangladesh claims compensation from green climate fund. It also created its own climate funds. It is therefore very important to assess vulnerability of the coast of Bangladesh to natural hazards for efficient allocation of financial investment to support the national risk reduction. This study aims at identifying the spatial variations in factors contributing to vulnerability of the coastal inhabitants of Bangladesh to natural hazards. An exploratory factor analysis method has been used to assess the vulnerability at each local administrative unit. The 141 initially selected 141 socio-economic indicators were reduced to 41 by converting some of them to meaningful widely accepted indicators and removing highly correlated indicators. Principle component analysis further reduced 41 indicators to 13 dimensions which explained 79% of total variation. PCA dimensions show three types of characteristics of the people that may lead people towards vulnerability. They are (a) demographic, education and job opportunities, (b) access to basic needs and facilities, and (c) special needs people. Vulnerability maps of the study area has been prepared by weighted overlay of the dimensions. Study revealed that 29 and 8 percent of total coastal area are very high and high vulnerable to natural hazards respectively. These are distributed along sea boundary and major rivers. Comparison of this spatial distribution with the capacities to face disaster show that highly vulnerable areas are well covered by cyclone

  19. Quantitative assessment of Vulnerability of Forest ecosystem to Climate Change in Korea

    NASA Astrophysics Data System (ADS)

    Byun, J.; Lee, W.; Choi, S.; Oh, S.; Climate Change Model Team

    2011-12-01

    The purpose of this study was to assess the vulnerability of forest ecosystem to climate change in Korea using outputs of vegetation models(HyTAG and MC1) and socio-ecological indicators. Also it suggested adaptation strategies in forest management through analysis of three vulnerability components: exposure, sensitivity and adaptive capacity. For the model simulation of past years(1971-2000), the climatic data was prepared by the Korea Meteorological Administration(KMA). In addition, for the future simulation, the Fifth-Generation NCAR/Penn State Mesoscale Model(MM5) coupling with atmosphere-ocean circulation model(ECHO-G) provide the future climatic data under the A1B scenarios. HyTAG (Hydrological and Thermal Analogy Groups), korean model of forest distribution on a regional-scale, could show extent of sensitivity and adaptive capacity in connection with changing frequency and changing direction of vegetation. MC1 model could provide variation and direction of NPP(Net Primary Production) and SCS(Soil Carbon Storage). In addition, the sensitivity and adaptation capacity were evaluated for each. Besides indicators from models, many other indicators such as financial affairs and number of officers were included in the vulnerability components. As a result of the vulnerability assessment, south western part and Je-ju island of Korea had relatively high vulnerability. This finding is considered to come from a distinctively adaptative capacity. Using these results, we could propose actions against climate change and develop decision making systems on forest management.

  20. Assessing climate change and health vulnerability at the local level: Travis County, Texas.

    PubMed

    Prudent, Natasha; Houghton, Adele; Luber, George

    2016-10-01

    We created a measure to help comprehend population vulnerability to potential flooding and excessive heat events using health, built environment and social factors. Through principal component analysis (PCA), we created non-weighted sum index scores of literature-reviewed social and built environment characteristics. We created baseline poor health measures using 1999-2005 age-adjusted cardiovascular and combined diabetes and hypertension mortality rates to correspond with social-built environment indices. We mapped US Census block groups by linked age-adjusted mortality and a PCA-created social-built environment index. The goal was to measure flooding and excessive heat event vulnerability as proxies for population vulnerability to climate change for Travis County, Texas. This assessment identified communities where baseline poor health, social marginalisation and built environmental impediments intersected. Such assessments may assist targeted interventions and improve emergency preparedness in identified vulnerable communities, while fostering resilience through the focus of climate change adaptation policies at the local level. No claim to original US government works. Journal compilation © 2016 Overseas Development Institute.

  1. Performance assessments of Android-powered military applications operating on tactical handheld devices

    NASA Astrophysics Data System (ADS)

    Weiss, Brian A.; Fronczek, Lisa; Morse, Emile; Kootbally, Zeid; Schlenoff, Craig

    2013-05-01

    Transformative Apps (TransApps) is a Defense Advanced Research Projects Agency (DARPA) funded program whose goal is to develop a range of militarily-relevant software applications ("apps") to enhance the operational-effectiveness of military personnel on (and off) the battlefield. TransApps is also developing a military apps marketplace to facilitate rapid development and dissemination of applications to address user needs by connecting engaged communities of endusers with development groups. The National Institute of Standards and Technology's (NIST) role in the TransApps program is to design and implement evaluation procedures to assess the performance of: 1) the various software applications, 2) software-hardware interactions, and 3) the supporting online application marketplace. Specifically, NIST is responsible for evaluating 50+ tactically-relevant applications operating on numerous Android™-powered platforms. NIST efforts include functional regression testing and quantitative performance testing. This paper discusses the evaluation methodologies employed to assess the performance of three key program elements: 1) handheld-based applications and their integration with various hardware platforms, 2) client-based applications and 3) network technologies operating on both the handheld and client systems along with their integration into the application marketplace. Handheld-based applications are assessed using a combination of utility and usability-based checklists and quantitative performance tests. Client-based applications are assessed to replicate current overseas disconnected (i.e. no network connectivity between handhelds) operations and to assess connected operations envisioned for later use. Finally, networked applications are assessed on handhelds to establish baselines of performance for when connectivity will be common usage.

  2. EPA'S REGIONAL VULNERABILITY ASSESSMENT PROGRAM (REVA) DEMONSTRATING RESULTS THROUGH PARTNERSHIPS

    EPA Science Inventory

    EPA's Regional Vulnerability Assessment (ReVA) program, a regional-scale comparative risk research effort, has been under development since 1998 with a pilot study focused on the Mid- Atlantic region. ReVA is part of the interagency Integrated Science for Ecosystem Challenges ini...

  3. Alternative reproductive tactics and the propensity of hybridization.

    PubMed

    Tynkkynen, K; Raatikainen, K J; Häkkilä, M; Haukilehto, E; Kotiaho, J S

    2009-12-01

    One explanation for hybridization between species is the fitness benefits it occasionally confers to the hybridizing individuals. This explanation is possible in species that have evolved alternative male reproductive tactics: individuals with inferior tactics might be more prone to hybridization provided it increases their reproductive success and fitness. Here we experimentally tested whether the propensity of hybridization in the wild depends on male reproductive tactic in Calopteryx splendens damselflies. Counter to our expectation, it was males adopting the superior reproductive tactic (territoriality) that had greatest propensity to hybridize than males adopting the inferior tactics (sneakers and floaters). Moreover, among the territorial males, the most ornamented males had greatest propensity to hybridize whereas the pattern was reversed in the sneaker males. Our results suggest that there is fluctuating selection on male mate discrimination against heterospecific females depending on both ornament size and the male's reproductive tactic.

  4. Joint Tactical Networks (JTN)

    DTIC Science & Technology

    2013-12-01

    Selected Acquisition Report (SAR) RCS: DD-A&T(Q&A)823-284 Joint Tactical Networks (JTN) As of FY 2015 President’s Budget... Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection...to 00-00-2013 4. TITLE AND SUBTITLE Joint Tactical Networks (JTN) 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S

  5. REGIONAL VULNERABILITY ASSESSMENT: CREATING A CONTEXT FOR EVALUATING STREAM ACIDIFICATION

    EPA Science Inventory

    USEPA's Regional Vulnerability Assessment (ReVA) program is designed to identify ecosystems that are likely to vary beyond the range of natural variability and thereby experience reduced ecological integrity as a result of natural and human-induced stressors. ReVA makes use of r...

  6. Remote Sensing Based Vulnerability Assessment of Desertification in Mongolia and Myanmar

    NASA Astrophysics Data System (ADS)

    Lim, C. H.; Lee, E. J.; Song, C.; Lee, W. K.; Jeon, S. W.

    2015-12-01

    Desertification is one of the global threatening problems in respect of society, economy, and environment, and the assessment of desertification is essential for land planning and management. However desertification is a process that encompasses various factors in various aspects, having difficulties to assess qualitatively. The main purpose of the research is to qualitatively assess sensitivity of land to desertification, and detect the most vulnerable land to desertification in Mongolia and Myanmar using the Mediterranean Desertification and Land Use (MEDALUS) approach. MEDALUS approach aims to provide a manual on key indicators of desertification and mapping environmentally sensitive areas to desertification in the Mediterranean countries. However in this research, MEDALUS approach is implemented and reviewed on the countries located in the Middle Asia; Mongolia and Myanmar. MEDALUS approach identifies regions with the highest risk of desertification with 4 quality index; climate, soil, vegetation, management. Within the four quality index are several regional scale indicators for Mongolia and Myanmar, which gives effect with increasing or decreasing risk of desertification. MODIS satellite images, Digital Elevation Model (DEM), and climatic and geographical data were used to calculate the indicators. The weighting of each indicator ranged from 1 to 2; the higher weight the more vulnerable to desertification. The weighted indicators were allocated to 4 quality index, and the four quality index was summed to calculate Environmentally Sensitive Area Index (ESAI) representing the vulnerability of land degradation to desertification. As a result, the Middle East region of Mongolia showed the highest sensitivity, thus the most vulnerable to desertification. Based on the result of this study, it is useful to identify the current state of affairs and the necessity of land planning in Mongolia and Myanmar, one tool that can be utilized for combating desertification. The

  7. A design proposal of a certain missile tactical command system based on Beidou satellite communication and GPS positioning techniques

    NASA Astrophysics Data System (ADS)

    Ma, Jian; Hao, Yongsheng; Miao, Jian; Zhang, Jianmao

    2007-11-01

    This paper introduced a design proposal of tactical command system that applied to a kind of anti-tank missile carriers. The tactical command system was made up of embedded computer system based on PC104 bus, Linux operating system, digital military map, Beidou satellite communication equipments and GPS positioning equipments. The geographic coordinates was measured by the GPS receiver, the positioning data, commands and information were transmitted real-time between tactical command systems, tactical command systems and command center, by the Beidou satellite communication systems. The Beidou satellite communication equipments and GPS positioning equipments were integrated to an independent module, exchanging data with embedded computer through RS232 serial ports and USB ports. The decision support system software based on information fusion, calculates positioning data, geography information and battle field information synthetically, shows the position of allies and the position of enemy on the military map, and assesses the various threats of different enemy objects, educes a situation assessment and threat assessment.

  8. From Risk Assessment to Risk Management: Matching Interventions to Adolescent Offenders’ Strengths and Vulnerabilities

    PubMed Central

    Singh, Jay P.; Desmarais, Sarah L.; Sellers, Brian G.; Hylton, Tatiana; Tirotti, Melissa; Van Dorn, Richard A.

    2013-01-01

    Though considerable research has examined the validity of risk assessment tools in predicting adverse outcomes in justice-involved adolescents, the extent to which risk assessments are translated into risk management strategies and, importantly, the association between this link and adverse outcomes has gone largely unexamined. To address these shortcomings, the Risk-Need-Responsivity (RNR) model was used to examine associations between identified strengths and vulnerabilities, interventions, and institutional outcomes for justice-involved youth. Data were collected from risk assessments completed using the Short-Term Assessment of Risk and Treatability: Adolescent Version (START:AV) for 120 adolescent offenders (96 boys and 24 girls). Interventions and outcomes were extracted from institutional records. Mixed evidence of adherence to RNR principles was found. Accordant to the risk principle, adolescent offenders judged to have more strengths had more strength-based interventions in their service plans, though adolescent offenders with more vulnerabilities did not have more interventions targeting their vulnerabilities. With respect to the need and responsivity principles, vulnerabilities and strengths identified as particularly relevant to the individual youth's risk of adverse outcomes were addressed in the service plans about half and a quarter of the time, respectively. Greater adherence to the risk and need principles was found to predict significantly the likelihood of externalizing outcomes. Findings suggest some gaps between risk assessment and risk management and highlight the potential usefulness of strength-based approaches to intervention. PMID:25346561

  9. Physically-Based Assessment of Intrinsic Groundwater Resource Vulnerability in AN Urban Catchment

    NASA Astrophysics Data System (ADS)

    Graf, T.; Therrien, R.; Lemieux, J.; Molson, J. W.

    2013-12-01

    Several methods exist to assess intrinsic groundwater (re)source vulnerability for the purpose of sustainable groundwater management and protection. However, several methods are empirical and limited in their application to specific types of hydrogeological systems. Recent studies suggest that a physically-based approach could be better suited to provide a general, conceptual and operational basis for groundwater vulnerability assessment. A novel method for physically-based assessment of intrinsic aquifer vulnerability is currently under development and tested to explore the potential of an integrated modelling approach, combining groundwater travel time probability and future scenario modelling in conjunction with the fully integrated HydroGeoSphere model. To determine the intrinsic groundwater resource vulnerability, a fully coupled 2D surface water and 3D variably-saturated groundwater flow model in conjunction with a 3D geological model (GoCAD) has been developed for a case study of the Rivière Saint-Charles (Québec/Canada) regional scale, urban watershed. The model has been calibrated under transient flow conditions for the hydrogeological, variably-saturated subsurface system, coupled with the overland flow zone by taking into account monthly recharge variation and evapotranspiration. To better determine the intrinsic groundwater vulnerability, two independent approaches are considered and subsequently combined in a simple, holistic multi-criteria-decision analyse. Most data for the model comes from an extensive hydrogeological database for the watershed, whereas data gaps have been complemented via field tests and literature review. The subsurface is composed of nine hydrofacies, ranging from unconsolidated fluvioglacial sediments to low permeability bedrock. The overland flow zone is divided into five major zones (Urban, Rural, Forest, River and Lake) to simulate the differences in landuse, whereas the unsaturated zone is represented via the model

  10. Climate change vulnerability of native and alien freshwater fishes of California: a systematic assessment approach.

    PubMed

    Moyle, Peter B; Kiernan, Joseph D; Crain, Patrick K; Quiñones, Rebecca M

    2013-01-01

    Freshwater fishes are highly vulnerable to human-caused climate change. Because quantitative data on status and trends are unavailable for most fish species, a systematic assessment approach that incorporates expert knowledge was developed to determine status and future vulnerability to climate change of freshwater fishes in California, USA. The method uses expert knowledge, supported by literature reviews of status and biology of the fishes, to score ten metrics for both (1) current status of each species (baseline vulnerability to extinction) and (2) likely future impacts of climate change (vulnerability to extinction). Baseline and climate change vulnerability scores were derived for 121 native and 43 alien fish species. The two scores were highly correlated and were concordant among different scorers. Native species had both greater baseline and greater climate change vulnerability than did alien species. Fifty percent of California's native fish fauna was assessed as having critical or high baseline vulnerability to extinction whereas all alien species were classified as being less or least vulnerable. For vulnerability to climate change, 82% of native species were classified as highly vulnerable, compared with only 19% for aliens. Predicted climate change effects on freshwater environments will dramatically change the fish fauna of California. Most native fishes will suffer population declines and become more restricted in their distributions; some will likely be driven to extinction. Fishes requiring cold water (<22°C) are particularly likely to go extinct. In contrast, most alien fishes will thrive, with some species increasing in abundance and range. However, a few alien species will likewise be negatively affected through loss of aquatic habitats during severe droughts and physiologically stressful conditions present in most waterways during summer. Our method has high utility for predicting vulnerability to climate change of diverse fish species. It

  11. Climate Change Vulnerability of Native and Alien Freshwater Fishes of California: A Systematic Assessment Approach

    PubMed Central

    Moyle, Peter B.; Kiernan, Joseph D.; Crain, Patrick K.; Quiñones, Rebecca M.

    2013-01-01

    Freshwater fishes are highly vulnerable to human-caused climate change. Because quantitative data on status and trends are unavailable for most fish species, a systematic assessment approach that incorporates expert knowledge was developed to determine status and future vulnerability to climate change of freshwater fishes in California, USA. The method uses expert knowledge, supported by literature reviews of status and biology of the fishes, to score ten metrics for both (1) current status of each species (baseline vulnerability to extinction) and (2) likely future impacts of climate change (vulnerability to extinction). Baseline and climate change vulnerability scores were derived for 121 native and 43 alien fish species. The two scores were highly correlated and were concordant among different scorers. Native species had both greater baseline and greater climate change vulnerability than did alien species. Fifty percent of California’s native fish fauna was assessed as having critical or high baseline vulnerability to extinction whereas all alien species were classified as being less or least vulnerable. For vulnerability to climate change, 82% of native species were classified as highly vulnerable, compared with only 19% for aliens. Predicted climate change effects on freshwater environments will dramatically change the fish fauna of California. Most native fishes will suffer population declines and become more restricted in their distributions; some will likely be driven to extinction. Fishes requiring cold water (<22°C) are particularly likely to go extinct. In contrast, most alien fishes will thrive, with some species increasing in abundance and range. However, a few alien species will likewise be negatively affected through loss of aquatic habitats during severe droughts and physiologically stressful conditions present in most waterways during summer. Our method has high utility for predicting vulnerability to climate change of diverse fish species. It

  12. Beyond Vulnerability Assessment: Impact of Developments toward Local Adaptive Capacity in Kemijen City Village, Semarang City

    NASA Astrophysics Data System (ADS)

    Jayanimitta, M. E.; Puspasari, D. A.; Widyahantari, R.; Kristina, D.; Ratnaningtyas, T.; Setionurjaya, A.; Anindita, Y. A.

    2018-02-01

    Vulnerability Assessment is usually used for assessing the ability of an area on facing disaster. In previous studies, the study of Vulnerability Assessment applied only quantitative method to show the vulnerability level. Therefore, this study attempts to add information reviews using qualitative method. Kemijen City Village is one of the administrative areas in the northern part of Semarang City affected by climate change. The residents have to adapt it by renovating and elevating their houses and other infrastructures to avoid floods. There are some development programs held by government, NGOs, and corporations such as Banger Polder Development, PLPBK, etc. It is interesting to know how big the vulnerability level of Kemijen on facing flood disasters, then how the projects can affect local adaptive capacity. To answer it, this research uses mixed-method approach. Vulnerability Assessment uses quantitative method by scoring indicators of Exposure, Sensitivity, and Adaptive Capacity, while the development impact uses qualitative method. The data were collected through interviews and FGD conducted in Joint Studio Course between Diponegoro University and University of Hawaii in October 2016. Non-physical programs such as community empowerment have more positive impacts on local adaptive capacity in Kemijen. Community participation is important for environmental sustainability that can not be done in a short time to educate the people.

  13. Accounting for adaptive capacity and uncertainty in assessments of species' climate-change vulnerability.

    PubMed

    Wade, Alisa A; Hand, Brian K; Kovach, Ryan P; Luikart, Gordon; Whited, Diane C; Muhlfeld, Clint C

    2017-02-01

    Climate-change vulnerability assessments (CCVAs) are valuable tools for assessing species' vulnerability to climatic changes, yet failure to include measures of adaptive capacity and to account for sources of uncertainty may limit their effectiveness. We took a more comprehensive approach that incorporates exposure, sensitivity, and capacity to adapt to climate change. We applied our approach to anadromous steelhead trout (Oncorhynchus mykiss) and nonanadromous bull trout (Salvelinus confluentus), threatened salmonids within the Columbia River Basin (U.S.A.). We quantified exposure on the basis of scenarios of future stream temperature and flow, and we represented sensitivity and capacity to adapt to climate change with metrics of habitat quality, demographic condition, and genetic diversity. Both species were found to be highly vulnerable to climate change at low elevations and in their southernmost habitats. However, vulnerability rankings varied widely depending on the factors (climate, habitat, demographic, and genetic) included in the CCVA and often differed for the 2 species at locations where they were sympatric. Our findings illustrate that CCVA results are highly sensitive to data inputs and that spatial differences can complicate multispecies conservation. Based on our results, we suggest that CCVAs be considered within a broader conceptual and computational framework and be used to refine hypotheses, guide research, and compare plausible scenarios of species' vulnerability to climate change. © 2016 Society for Conservation Biology.

  14. Tsunami vulnerability assessment mapping for the west coast of Peninsular Malaysia using a geographical information system (GIS)

    NASA Astrophysics Data System (ADS)

    Najihah, R.; Effendi, D. M.; Hairunnisa, M. A.; Masiri, K.

    2014-02-01

    The catastrophic Indian Ocean tsunami of 26 December 2004 raised a number of questions for scientist and politicians on how to deal with the tsunami risk and assessment in coastal regions. This paper discusses the challenges in tsunami vulnerability assessment and presents the result of tsunami disaster mapping and vulnerability assessment study for West Coast of Peninsular Malaysia. The spatial analysis was carried out using Geographical Information System (GIS) technology to demarcate spatially the tsunami affected village's boundary and suitable disaster management program can be quickly and easily developed. In combination with other thematic maps such as road maps, rail maps, school maps, and topographic map sheets it was possible to plan the accessibility and shelter to the affected people. The tsunami vulnerability map was used to identify the vulnerability of villages/village population to tsunami. In the tsunami vulnerability map, the intensity of the tsunami was classified as hazard zones based on the inundation level in meter (contour). The approach produced a tsunami vulnerability assessment map consists of considering scenarios of plausible extreme, tsunami-generating events, computing the tsunami inundation levels caused by different events and scenarios and estimating the possible range of casualties for computing inundation levels. The study provides an interactive means to identify the tsunami affected areas after the disaster and mapping the tsunami vulnerable village before for planning purpose were the essential exercises for managing future disasters.

  15. Free and Open Source Software for land degradation vulnerability assessment

    NASA Astrophysics Data System (ADS)

    Imbrenda, Vito; Calamita, Giuseppe; Coluzzi, Rosa; D'Emilio, Mariagrazia; Lanfredi, Maria Teresa; Perrone, Angela; Ragosta, Maria; Simoniello, Tiziana

    2013-04-01

    Nowadays the role of FOSS software in scientific research is becoming increasingly important. Besides the important issues of reduced costs for licences, legality and security there are many other reasons that make FOSS software attractive. Firstly, making the code opened is a warranty of quality permitting to thousands of developers around the world to check the code and fix bugs rather than rely on vendors claims. FOSS communities are usually enthusiastic about helping other users for solving problems and expand or customize software (flexibility). Most important for this study, the interoperability allows to combine the user-friendly QGIS with the powerful GRASS-GIS and the richness of statistical methods of R in order to process remote sensing data and to perform geo-statistical analysis in one only environment. This study is focused on the land degradation (i.e. the reduction in the capacity of the land to provide ecosystem goods and services and assure its functions) and in particular on the estimation of the vulnerability levels in order to suggest appropriate policy actions to reduce/halt land degradation impacts, using the above mentioned software. The area investigated is the Basilicata Region (Southern Italy) where large natural areas are mixed with anthropized areas. To identify different levels of vulnerability we adopted the Environmentally Sensitive Areas (ESAs) model, based on the combination of indicators related to soil, climate, vegetation and anthropic stress. Such indicators were estimated by using the following data-sources: - Basilicata Region Geoportal to assess soil vulnerability; - DESERTNET2 project to evaluate potential vegetation vulnerability and climate vulnerability; - NDVI-MODIS satellite time series (2000-2010) with 250m resolution, available as 16-day composite from the NASA LP DAAC to characterize the dynamic component of vegetation; - Agricultural Census data 2010, Corine Land Cover 2006 and morphological information to assess

  16. Behavioural Thermoregulatory Tactics in Lacustrine Brook Charr, Salvelinus fontinalis

    PubMed Central

    Bertolo, Andrea; Pépino, Marc; Adams, Julie; Magnan, Pierre

    2011-01-01

    The need to vary body temperature to optimize physiological processes can lead to thermoregulatory behaviours, particularly in ectotherms. Despite some evidence of within-population phenotypic variation in thermal behaviour, the occurrence of alternative tactics of this behaviour is rarely explicitly considered when studying natural populations. The main objective of this study was to determine whether different thermal tactics exist among individuals of the same population. We studied the behavioural thermoregulation of 33 adult brook charr in a stratified lake using thermo-sensitive radio transmitters that measured hourly individual temperature over one month. The observed behavioural thermoregulatory patterns were consistent between years and suggest the existence of four tactics: two “warm” tactics with both crepuscular and finer periodicities, with or without a diel periodicity, and two “cool” tactics, with or without a diel periodicity. Telemetry data support the above findings by showing that the different tactics are associated with different patterns of diel horizontal movements. Taken together, our results show a clear spatio-temporal segregation of individuals displaying different tactics, suggesting a reduction of niche overlap. To our knowledge, this is the first study showing the presence of behavioural thermoregulatory tactics in a vertebrate. PMID:21490935

  17. The Gulf Coast Vulnerability Assessment: Mangrove, Tidal Emergent Marsh, Barrier Islands, and Oyster Reef

    USGS Publications Warehouse

    Watson, Amanda; Reece, Joshua S.; Tirpak, Blair; Edwards, Cynthia Kallio; Geselbracht, Laura; Woodrey, Mark; LaPeyre, Megan K.; Dalyander, P. Soupy

    2015-01-01

    Climate, sea level rise, and urbanization are undergoing unprecedented levels of combined change and are expected to have large effects on natural resources—particularly along the Gulf of Mexico coastline (Gulf Coast). Management decisions to address these effects (i.e., adaptation) require an understanding of the relative vulnerability of various resources to these stressors. To meet this need, the four Landscape Conservation Cooperatives along the Gulf partnered with the Gulf of Mexico Alliance to conduct this Gulf Coast Vulnerability Assessment (GCVA). Vulnerability in this context incorporates the aspects of exposure and sensitivity to threats, coupled with the adaptive capacity to mitigate those threats. Potential impact and adaptive capacity reflect natural history features of target species and ecosystems. The GCVA used an expert opinion approach to qualitatively assess the vulnerability of four ecosystems: mangrove, oyster reef, tidal emergent marsh, and barrier islands, and a suite of wildlife species that depend on them. More than 50 individuals participated in the completion of the GCVA, facilitated via Ecosystem and Species Expert Teams. Of the species assessed, Kemp’s ridley sea turtle was identified as the most vulnerable species across the Gulf Coast. Experts identified the main threats as loss of nesting habitat to sea level rise, erosion, and urbanization. Kemp’s ridley also had an overall low adaptive capacity score due to their low genetic diversity, and higher nest site fidelity as compared to other assessed species. Tidal emergent marsh was the most vulnerable ecosystem, due in part to sea level rise and erosion. In general, avian species were more vulnerable than fish because of nesting habitat loss to sea level rise, erosion, and potential increases in storm surge. Assessors commonly indicated a lack of information regarding impacts due to projected changes in the disturbance regime, biotic interactions, and synergistic effects in both

  18. Potential of 3D City Models to assess flood vulnerability

    NASA Astrophysics Data System (ADS)

    Schröter, Kai; Bochow, Mathias; Schüttig, Martin; Nagel, Claus; Ross, Lutz; Kreibich, Heidi

    2016-04-01

    Vulnerability, as the product of exposure and susceptibility, is a key factor of the flood risk equation. Furthermore, the estimation of flood loss is very sensitive to the choice of the vulnerability model. Still, in contrast to elaborate hazard simulations, vulnerability is often considered in a simplified manner concerning the spatial resolution and geo-location of exposed objects as well as the susceptibility of these objects at risk. Usually, area specific potential flood loss is quantified on the level of aggregated land-use classes, and both hazard intensity and resistance characteristics of affected objects are represented in highly simplified terms. We investigate the potential of 3D City Models and spatial features derived from remote sensing data to improve the differentiation of vulnerability in flood risk assessment. 3D City Models are based on CityGML, an application scheme of the Geography Markup Language (GML), which represents the 3D geometry, 3D topology, semantics and appearance of objects on different levels of detail. As such, 3D City Models offer detailed spatial information which is useful to describe the exposure and to characterize the susceptibility of residential buildings at risk. This information is further consolidated with spatial features of the building stock derived from remote sensing data. Using this database a spatially detailed flood vulnerability model is developed by means of data-mining. Empirical flood damage data are used to derive and to validate flood susceptibility models for individual objects. We present first results from a prototype application in the city of Dresden, Germany. The vulnerability modeling based on 3D City Models and remote sensing data is compared i) to the generally accepted good engineering practice based on area specific loss potential and ii) to a highly detailed representation of flood vulnerability based on a building typology using urban structure types. Comparisons are drawn in terms of

  19. Assessing community vulnerabilities to natural hazards on the Island of Hawaii

    NASA Astrophysics Data System (ADS)

    Nishioka, Chris; Delparte, Donna

    2010-05-01

    The island of Hawaii is susceptible to numerous natural hazards such as tsunamis, flooding, lava flow, earthquakes, hurricanes, landslides, wildfires and storm surge. The impact of a natural disaster on the island's communities has the potential to endanger peoples' lives and threaten critical infrastructure, homes, businesses and economic drivers such as tourism. A Geographic Information System (GIS) has the ability to assess community vulnerabilities by examining the spatial relationships between hazard zones, socioeconomic infrastructure and demographic data. By drawing together existing datasets, GIS was used to examine a number of community vulnerabilities. Key areas of interest were government services, utilities, property assets, industry and transportation. GIS was also used to investigate population dynamics in hazard zones. Identification of community vulnerabilities from GIS analysis can support mitigation measures and assist planning and response measures to natural hazards.

  20. Protection of agriculture against drought in Slovenia based on vulnerability and risk assessment

    NASA Astrophysics Data System (ADS)

    Dovžak, M.; Stanič, S.; Bergant, K.; Gregorič, G.

    2012-04-01

    Past and recent extreme events, like earthquakes, extreme droughts, heat waves, flash floods and volcanic eruptions continuously remind us that natural hazards are an integral component of the global environment. Despite rapid improvement of detection techniques many of these events evade long-term or even mid-term prediction and can thus have disastrous impacts on affected communities and environment. Effective mitigation and preparedness strategies will be possible to develop only after gaining the understanding on how and where such hazards may occur, what causes them, what circumstances increase their severity, and what their impacts may be and their study has the recent years emerged as under the common title of natural hazard management. The first step in natural risk management is risk identification, which includes hazard analysis and monitoring, vulnerability analysis and determination of the risk level. The presented research focuses on drought, which is at the present already the most widespread as well as still unpredictable natural hazard. Its primary aim was to assess the frequency and the consequences of droughts in Slovenia based on drought events in the past, to develop methodology for drought vulnerability and risk assessment that can be applied in Slovenia and wider in South-Eastern Europe, to prepare maps of drought risk and crop vulnerability and to guidelines to reduce the vulnerability of the crops. Using the amounts of plant available water in the soil, slope inclination, solar radiation, land use and irrigation infrastructure data sets as inputs, we obtained vulnerability maps for Slovenia using GIS-based multi-criteria decision analysis with a weighted linear combination of the input parameters. The weight configuration was optimized by comparing the modelled crop damage to the assessed actual damage, which was available for the extensive drought case in 2006. Drought risk was obtained quantitatively as a function of hazard and

  1. Marine Tactical Command and Control System (MTACCS) Field Development System-1 (FDS-1) assessment: Final report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Avery, L.W.; Hunt, S.T.; Savage, S.F.

    1992-04-01

    The United State Marine Corps (USMC) is continuing the development and fielding of the Marine Corps Tactical Command and Control System (MTACCS), a system which exists in varying states of development, fielding, or modernization. MTACCS is currently composed of the following components: Tactical Combat Operations System (TCO) for ground command and control (C2), Intelligence Analysis System (IAS) with a Genser terminal connected to a TCO workstation for intelligence C2, Marine Integrated Personnel System (MIPS) and a TCO workstation using the Marine Combat Personnel System (MCPERS) software for personnel C2, Marine Integrated Logistics System (MILOGS) which is composed of the Landingmore » Force Asset Distribution System (LFADS), the Marine Air-Ground Task Force (MAGTF) II, and a TCO terminal using the Marine Combat Logistics System (MCLOG) for logistics C2, Marine Corps Fire Support System (MCFSS) for fire support C2, and Advanced Tactical Air Command Central (ATACC) and the Improved Direct Air Support Central for aviation C2.« less

  2. Coastal erosion vulnerability and risk assessment focusing in tourism beach use.

    NASA Astrophysics Data System (ADS)

    Alexandrakis, George

    2016-04-01

    It is well established that the global market for tourism services is a key source of economic growth. Especially among Mediterranean countries, the tourism sector is one of the principal sectors driving national economies. With the majority of the mass tourism activities concentrated around coastal areas, coastal erosion, inter alia, poses a significant threat to coastal economies that depend heavily on revenues from tourism. The economic implications of beach erosion were mainly focused in the cost of coastal protection measures, instead of the revenue losses from tourism. For this, the vulnerability of the coast to sea level rise and associated erosion, in terms of expected land loss and economic activity need to be identified. To achieve this, a joint environmental and economic evaluation approach of the problem can provide a managerial tool to mitigate the impact of beach erosion in tourism, through realistic cost-benefit scenarios for planning alternative protection measures. Such a multipurpose tool needs to consider social, economic and environmental factors, which relationships can be better understood when distributed and analyzed along the geographical space. The risk assessment is implemented through the estimation of the vulnerability and exposure variables of the coast in two scales. The larger scale estimates the vulnerability in a regional level, with the use environmental factors with the use of CVI. The exposure variable is estimated by the use of socioeconomic factors. Subsequently, a smaller scale focuses on highly vulnerable beaches with high social and economic value. The assessment of the natural processes to the environmental characteristics of the beach is estimated with the use of the Beach Vulnerability Index (BVI) method. As exposure variable, the value of beach width that is capitalized in revenues is implemented through a hedonic pricing model. In this econometric modelling, Beach Value is related with economic and environmental

  3. Groundwater Pollution and Vulnerability Assessment.

    PubMed

    Kurwadkar, Sudarshan

    2017-10-01

    Groundwater is a critical resource that serve as a source of drinking water to large human population and, provide long-term water for irrigation purposes. In recent years; however, this precious resource being increasingly threatened, due to natural and anthropogenic activities. A variety of contaminants of emerging concern such as pharmaceuticals and personal care products, perfluorinated compounds, endocrine disruptors, and biological agents detected in the groundwater sources of both developing and developed nations. In this review paper, various studies have been included that documented instances of groundwater pollution and vulnerability to emerging contaminants of concern, pesticides, heavy metals, and leaching potential of various organic and inorganic contaminants from poorly managed residual waste products (biosolids, landfills, latrines, and septic tanks etc.). Understanding vulnerability of groundwater to pollution is critical to maintain the integrity of groundwater. A section on managed artificial recharge studies is included to highlight the sustainable approaches to groundwater conservation, replenishment and sustainability. This review paper is the synthesis of studies published in last one year that either documented the pollution problems or evaluated the vulnerability of groundwater pollution.

  4. Benefits Assessment for Tactical Runway Configuration Management Tool

    NASA Technical Reports Server (NTRS)

    Oseguera-Lohr, Rosa; Phojanamongkolkij, Nipa; Lohr, Gary; Fenbert, James W.

    2013-01-01

    The Tactical Runway Configuration Management (TRCM) software tool was developed to provide air traffic flow managers and supervisors with recommendations for airport configuration changes and runway usage. The objective for this study is to conduct a benefits assessment at Memphis (MEM), Dallas Fort-Worth (DFW) and New York's John F. Kennedy (JFK) airports using the TRCM tool. Results from simulations using the TRCM-generated runway configuration schedule are compared with results using historical schedules. For the 12 days of data used in this analysis, the transit time (arrival fix to spot on airport movement area for arrivals, or spot to departure fix for departures) for MEM departures is greater (7%) than for arrivals (3%); for JFK, there is a benefit for arrivals (9%) but not for departures (-2%); for DFW, arrivals show a slight benefit (1%), but this is offset by departures (-2%). Departure queue length benefits show fewer aircraft in queue for JFK (29%) and MEM (11%), but not for DFW (-13%). Fuel savings for surface operations at MEM are seen for both arrivals and departures. At JFK there are fuel savings for arrivals, but these are offset by increased fuel use for departures. In this study, no surface fuel benefits resulted for DFW. Results suggest that the TRCM algorithm requires modifications for complex surface traffic operations that can cause taxi delays. For all three airports, the average number of changes in flow direction (runway configuration) recommended by TRCM was many times greater than the historical data; TRCM would need to be adapted to a particular airport's needs, to limit the number of changes to acceptable levels. The results from this analysis indicate the TRCM tool can provide benefits at some high-capacity airports. The magnitude of these benefits depends on many airport-specific factors and would require adaptation of the TRCM tool; a detailed assessment is needed prior to determining suitability for a particular airport.

  5. Multidimensional Approach for Tsunami Vulnerability Assessment: Framing the Territorial Impacts in Two Municipalities in Portugal.

    PubMed

    Tavares, Alexandre Oliveira; Barros, José Leandro; Santos, Angela

    2017-04-01

    This study presents a new multidimensional methodology for tsunami vulnerability assessment that combines the morphological, structural, social, and tax component of vulnerability. This new approach can be distinguished from previous methodologies that focused primarily on the evaluation of potentially affected buildings and did not use tsunami numerical modeling. The methodology was applied to the Figueira da Foz and Vila do Bispo municipalities in Portugal. For each area, the potential tsunami-inundated areas were calculated considering the 1755 Lisbon tsunami, which is the greatest disaster caused by natural hazards that ever occurred in Portugal. Furthermore, the four components of the vulnerability were calculated to obtain a composite vulnerability index. This methodology enables us to differentiate the two areas in their vulnerability, highlighting the characteristics of the territory components. This methodology can be a starting point for the creation of a local assessment framework at the municipal scale related to tsunami risk. In addition, the methodology is an important support for the different local stakeholders. © 2016 Society for Risk Analysis.

  6. Certification of tactics and strategies in aviation

    NASA Technical Reports Server (NTRS)

    Koelman, Hartmut

    1994-01-01

    The paper suggests that the 'tactics and strategies' notion is a highly suitable paradigm to describe the cognitive involvement of human operators in advanced aviation systems (far more suitable than classical functional analysis), and that the workload and situational awareness of operators are intimately associated with the planning and execution of their tactics and strategies. If system designers have muddled views about the collective tactics and strategies to be used during operation, they will produce sub-optimum designs. If operators use unproven and/or inappropriate tactics and strategies, the system may fail. The author wants to make a point that, beyond certification of people or system designs, there may be a need to go into more detail and examine (certify?) the set of tactics and strategies (i.e., the Operational Concept) which makes the people and systems perform as expected. The collective tactics and strategies determine the information flows and situational awareness which exists in organizations and composite human-machine systems. The available infrastructure and equipment (automation) enable these information flows and situational awareness, but are at the same time the constraining factor. Frequently, the tactics and strategies are driven by technology, whereas we would rather like to see a system designed to support an optimized Operational Concept, i.e., to support a sufficiently coherent, cooperative and modular set of anticipation and planning mechanisms. Again, in line with the view of MacLeod and Taylor (1993), this technology driven situation may be caused by the system designer's and operator job designer's over-emphasis on functional analysis (a mechanistic engineering concept), at the expense of a subject which does not seem to be well understood today: the role of the (human cognitive and/or automated) tactics and strategies which are embedded in composite human-machine systems. Research would be needed to arrive at a generally

  7. On the Science-Policy Bridge: Do Spatial Heat Vulnerability Assessment Studies Influence Policy?

    PubMed Central

    Wolf, Tanja; Chuang, Wen-Ching; McGregor, Glenn

    2015-01-01

    Human vulnerability to heat varies at a range of spatial scales, especially within cities where there can be noticeable intra-urban differences in heat risk factors. Mapping and visualizing intra-urban heat vulnerability offers opportunities for presenting information to support decision-making. For example the visualization of the spatial variation of heat vulnerability has the potential to enable local governments to identify hot spots of vulnerability and allocate resources and increase assistance to people in areas of greatest need. Recently there has been a proliferation of heat vulnerability mapping studies, all of which, to varying degrees, justify the process of vulnerability mapping in a policy context. However, to date, there has not been a systematic review of the extent to which the results of vulnerability mapping studies have been applied in decision-making. Accordingly we undertook a comprehensive review of 37 recently published papers that use geospatial techniques for assessing human vulnerability to heat. In addition, we conducted an anonymous survey of the lead authors of the 37 papers in order to establish the level of interaction between the researchers as science information producers and local authorities as information users. Both paper review and author survey results show that heat vulnerability mapping has been used in an attempt to communicate policy recommendations, raise awareness and induce institutional networking and learning, but has not as yet had a substantive influence on policymaking or preventive action. PMID:26512681

  8. On the Science-Policy Bridge: Do Spatial Heat Vulnerability Assessment Studies Influence Policy?

    PubMed

    Wolf, Tanja; Chuang, Wen-Ching; McGregor, Glenn

    2015-10-23

    Human vulnerability to heat varies at a range of spatial scales, especially within cities where there can be noticeable intra-urban differences in heat risk factors. Mapping and visualizing intra-urban heat vulnerability offers opportunities for presenting information to support decision-making. For example the visualization of the spatial variation of heat vulnerability has the potential to enable local governments to identify hot spots of vulnerability and allocate resources and increase assistance to people in areas of greatest need. Recently there has been a proliferation of heat vulnerability mapping studies, all of which, to varying degrees, justify the process of vulnerability mapping in a policy context. However, to date, there has not been a systematic review of the extent to which the results of vulnerability mapping studies have been applied in decision-making. Accordingly we undertook a comprehensive review of 37 recently published papers that use geospatial techniques for assessing human vulnerability to heat. In addition, we conducted an anonymous survey of the lead authors of the 37 papers in order to establish the level of interaction between the researchers as science information producers and local authorities as information users. Both paper review and author survey results show that heat vulnerability mapping has been used in an attempt to communicate policy recommendations, raise awareness and induce institutional networking and learning, but has not as yet had a substantive influence on policymaking or preventive action.

  9. Quantitative Assessment of Transportation Network Vulnerability with Dynamic Traffic Simulation Methods

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shekar, Venkateswaran; Fiondella, Lance; Chatterjee, Samrat

    Transportation networks are critical to the social and economic function of nations. Given the continuing increase in the populations of cities throughout the world, the criticality of transportation infrastructure is expected to increase. Thus, it is ever more important to mitigate congestion as well as to assess the impact disruptions would have on individuals who depend on transportation for their work and livelihood. Moreover, several government organizations are responsible for ensuring transportation networks are available despite the constant threat of natural disasters and terrorist activities. Most of the previous transportation network vulnerability research has been performed in the context ofmore » static traffic models, many of which are formulated as traditional optimization problems. However, transportation networks are dynamic because their usage varies over time. Thus, more appropriate methods to characterize the vulnerability of transportation networks should consider their dynamic properties. This paper presents a quantitative approach to assess the vulnerability of a transportation network to disruptions with methods from traffic simulation. Our approach can prioritize the critical links over time and is generalizable to the case where both link and node disruptions are of concern. We illustrate the approach through a series of examples. Our results demonstrate that the approach provides quantitative insight into the time varying criticality of links. Such an approach could be used as the objective function of less traditional optimization methods that use simulation and other techniques to evaluate the relative utility of a particular network defense to reduce vulnerability and increase resilience.« less

  10. Groundwater vulnerability to climate change: A review of the assessment methodology.

    PubMed

    Aslam, Rana Ammar; Shrestha, Sangam; Pandey, Vishnu Prasad

    2018-01-15

    Impacts of climate change on water resources, especially groundwater, can no longer be hidden. These impacts are further exacerbated under the integrated influence of climate variability, climate change and anthropogenic activities. The degree of impact varies according to geographical location and other factors leading systems and regions towards different levels of vulnerability. In the recent past, several attempts have been made in various regions across the globe to quantify the impacts and consequences of climate and non-climate factors in terms of vulnerability to groundwater resources. Firstly, this paper provides a structured review of the available literature, aiming to critically analyse and highlight the limitations and knowledge gaps involved in vulnerability (of groundwater to climate change) assessment methodologies. The effects of indicator choice and the importance of including composite indicators are then emphasised. A new integrated approach for the assessment of groundwater vulnerability to climate change is proposed to successfully address those limitations. This review concludes that the choice of indicator has a significant role in defining the reliability of computed results. The effect of an individual indicator is also apparent but the consideration of a combination (variety) of indicators may give more realistic results. Therefore, in future, depending upon the local conditions and scale of the study, indicators from various groups should be chosen. Furthermore, there are various assumptions involved in previous methodologies, which limit their scope by introducing uncertainty in the calculated results. These limitations can be overcome by implementing the proposed approach. Copyright © 2017 Elsevier B.V. All rights reserved.

  11. Heuristic automation for decluttering tactical displays.

    PubMed

    St John, Mark; Smallman, Harvey S; Manes, Daniel I; Feher, Bela A; Morrison, Jeffrey G

    2005-01-01

    Tactical displays can quickly become cluttered with large numbers of symbols that can compromise effective monitoring. Here, we studied how heuristic automation can aid users by intelligently "decluttering" the display. In a realistic simulated naval air defense task, 27 experienced U.S. Navy users monitored a cluttered airspace and executed defensive responses against significant threats. An algorithm continuously evaluated aircraft for their levels of threat and decluttered the less threatening ones by dimming their symbols. Users appropriately distrusted and spot-checked the automation's assessments, and decluttering had very little effect on which aircraft were judged as significantly threatening. Nonetheless, decluttering improved the timeliness of responses to threatening aircraft by 25% as compared with a baseline display with no decluttering; it was especially beneficial for threats in more peripheral locations, and 25 of 27 participants preferred decluttering. Heuristic automation, when properly designed to guide users' attention by decluttering less important objects, may prove valuable in many cluttered monitoring situations, including air traffic management, crisis team management, and tactical situation awareness in general.

  12. Organizational Commitment through Organizational Socialization Tactics

    ERIC Educational Resources Information Center

    Filstad, Cathrine

    2011-01-01

    Purpose: The aim of this paper is to investigate how organizational socialization tactics affect newcomers' organizational commitment and learning processes. Design/methodology/approach: A survey was conducted using a measurement tool based on Van Maanen and Schein's theory on organizational socialization tactics and Kuvaas' measurement tools of…

  13. Vulnerability survival analysis: a novel approach to vulnerability management

    NASA Astrophysics Data System (ADS)

    Farris, Katheryn A.; Sullivan, John; Cybenko, George

    2017-05-01

    Computer security vulnerabilities span across large, enterprise networks and have to be mitigated by security engineers on a routine basis. Presently, security engineers will assess their "risk posture" through quantifying the number of vulnerabilities with a high Common Vulnerability Severity Score (CVSS). Yet, little to no attention is given to the length of time by which vulnerabilities persist and survive on the network. In this paper, we review a novel approach to quantifying the length of time a vulnerability persists on the network, its time-to-death, and predictors of lower vulnerability survival rates. Our contribution is unique in that we apply the cox proportional hazards regression model to real data from an operational IT environment. This paper provides a mathematical overview of the theory behind survival analysis methods, a description of our vulnerability data, and an interpretation of the results.

  14. Structural vulnerability assessment using reliability of slabs in avalanche area

    NASA Astrophysics Data System (ADS)

    Favier, Philomène; Bertrand, David; Eckert, Nicolas; Naaim, Mohamed

    2013-04-01

    Improvement of risk assessment or hazard zoning requires a better understanding of the physical vulnerability of structures. To consider natural hazard issue such as snow avalanches, once the flow is characterized, highlight on the mechanical behaviour of the structure is a decisive step. A challenging approach is to quantify the physical vulnerability of impacted structures according to various avalanche loadings. The main objective of this presentation is to introduce methodology and outcomes regarding the assessment of vulnerability of reinforced concrete buildings using reliability methods. Reinforced concrete has been chosen as it is one of the usual material used to build structures exposed to potential avalanche loadings. In avalanche blue zones, structures have to resist to a pressure up to 30kPa. Thus, by providing systematic fragility relations linked to the global failure of the structure, this method may serve the avalanche risk assessment. To do so, a slab was numerically designed. It represented the avalanche facing wall of a house. Different configuration cases of the element in stake have been treated to quantify numerical aspects of the problem, such as the boundary conditions or the mechanical behaviour of the structure. The structure is analysed according to four different limit states, semi-local and global failures are considered to describe the slab behaviour. The first state is attained when cracks appear in the tensile zone, then the two next states are described consistent with the Eurocode, the final state is the total collapse of the structure characterized by the yield line theory. Failure probability is estimated in accordance to the reliability framework. Monte Carlo simulations were conducted to quantify the fragility to different loadings. Sensitivity of models in terms of input distributions were defined with statistical tools such as confidence intervals and Sobol's indexes. Conclusion and discussion of this work are established to

  15. EPA'S REGIONAL VULNERABILITY ASSESSMENT PROGRAM: TOOLS TO FACILITATE REGIONAL TO LOCAL DECISION-MAKING

    EPA Science Inventory

    EPA's Regional Vulnerability Assessment (ReVA) program is developing and testing approaches to conducting comparative environmental risk assessments at the regional scale, considering impacts to ecological human, and fiscal health endpoints. It seeks an objective and quantifiable...

  16. Tactical AI in Real Time Strategy Games

    DTIC Science & Technology

    2015-03-26

    TACTICAL AI IN REAL TIME STRATEGY GAMES THESIS Donald A. Gruber, Capt, USAF AFIT-ENG-MS-15-M-021 DEPARTMENT OF THE AIR FORCE AIR UNIVERSITY AIR FORCE...protection in the United States. AFIT-ENG-MS-15-M-021 TACTICAL AI IN REAL TIME STRATEGY GAMES THESIS Presented to the Faculty Department of Electrical...DISTRIBUTION STATEMENT A APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED. AFIT-ENG-MS-15-M-021 TACTICAL AI IN REAL TIME STRATEGY GAMES THESIS Donald A

  17. More than Solutions: Empowering Students to Think Strategically and Tactically

    ERIC Educational Resources Information Center

    Del Gandio, Jason

    2017-01-01

    Courses: Communication Activism; Public Advocacy; Social Movements; Public Speaking; Persuasion; Argumentation; Public Sphere. Objectives: This semester-long activity helps students implement a solutions--strategies--tactics framework into their advocacy work. More specifically, students learn to (1) designate, research, and assess the causes of…

  18. How useful are Swiss flood insurance data for flood vulnerability assessments?

    NASA Astrophysics Data System (ADS)

    Röthlisberger, Veronika; Bernet, Daniel; Zischg, Andreas; Keiler, Margreth

    2015-04-01

    vulnerability and resilience assessments. For instance, the collation of insurance loss data with event documentations containing information on flood intensity allows to develop damage curves. Flood damage curves are fundamental for many risk analysis methodologies but to date only few are published and the spatial and temporal scope of their applicability is subject of discussion. Another possibility of using insurance data lies in the field of assessment exposure, where the analysis of comprehensive insurance portfolio data can improve the understanding of the physical but also the socio-economical vulnerability of a society. The poster spotlights key opportunities and challenges scientists are facing when using insurance data for flood vulnerability assessments.

  19. Tactics for Improving Parenting Skills (TIPS).

    ERIC Educational Resources Information Center

    Algozzine, Bob, Ed.; Ysseldyke, Jim, Ed.

    This manual presents 99 one-sheet informational brochures designed to improve parenting skills. Each brochure is in a format suitable for duplicating, folding, and distributing. Each parenting "tactic" offers references to related brochures. Tactics are grouped under the following broad areas: (1) home/family involvement (e.g., accepting "The…

  20. Combining analytical frameworks to assess livelihood vulnerability to climate change and analyse adaptation options.

    PubMed

    Reed, M S; Podesta, G; Fazey, I; Geeson, N; Hessel, R; Hubacek, K; Letson, D; Nainggolan, D; Prell, C; Rickenbach, M G; Ritsema, C; Schwilch, G; Stringer, L C; Thomas, A D

    2013-10-01

    Experts working on behalf of international development organisations need better tools to assist land managers in developing countries maintain their livelihoods, as climate change puts pressure on the ecosystem services that they depend upon. However, current understanding of livelihood vulnerability to climate change is based on a fractured and disparate set of theories and methods. This review therefore combines theoretical insights from sustainable livelihoods analysis with other analytical frameworks (including the ecosystem services framework, diffusion theory, social learning, adaptive management and transitions management) to assess the vulnerability of rural livelihoods to climate change. This integrated analytical framework helps diagnose vulnerability to climate change, whilst identifying and comparing adaptation options that could reduce vulnerability, following four broad steps: i) determine likely level of exposure to climate change, and how climate change might interact with existing stresses and other future drivers of change; ii) determine the sensitivity of stocks of capital assets and flows of ecosystem services to climate change; iii) identify factors influencing decisions to develop and/or adopt different adaptation strategies, based on innovation or the use/substitution of existing assets; and iv) identify and evaluate potential trade-offs between adaptation options. The paper concludes by identifying interdisciplinary research needs for assessing the vulnerability of livelihoods to climate change.

  1. Combining analytical frameworks to assess livelihood vulnerability to climate change and analyse adaptation options☆

    PubMed Central

    Reed, M.S.; Podesta, G.; Fazey, I.; Geeson, N.; Hessel, R.; Hubacek, K.; Letson, D.; Nainggolan, D.; Prell, C.; Rickenbach, M.G.; Ritsema, C.; Schwilch, G.; Stringer, L.C.; Thomas, A.D.

    2013-01-01

    Experts working on behalf of international development organisations need better tools to assist land managers in developing countries maintain their livelihoods, as climate change puts pressure on the ecosystem services that they depend upon. However, current understanding of livelihood vulnerability to climate change is based on a fractured and disparate set of theories and methods. This review therefore combines theoretical insights from sustainable livelihoods analysis with other analytical frameworks (including the ecosystem services framework, diffusion theory, social learning, adaptive management and transitions management) to assess the vulnerability of rural livelihoods to climate change. This integrated analytical framework helps diagnose vulnerability to climate change, whilst identifying and comparing adaptation options that could reduce vulnerability, following four broad steps: i) determine likely level of exposure to climate change, and how climate change might interact with existing stresses and other future drivers of change; ii) determine the sensitivity of stocks of capital assets and flows of ecosystem services to climate change; iii) identify factors influencing decisions to develop and/or adopt different adaptation strategies, based on innovation or the use/substitution of existing assets; and iv) identify and evaluate potential trade-offs between adaptation options. The paper concludes by identifying interdisciplinary research needs for assessing the vulnerability of livelihoods to climate change. PMID:25844020

  2. Soft-assembled Multilevel Dynamics of Tactical Behaviors in Soccer

    PubMed Central

    Ric, Angel; Torrents, Carlota; Gonçalves, Bruno; Sampaio, Jaime; Hristovski, Robert

    2016-01-01

    This study aimed to identify the tactical patterns and the timescales of variables during a soccer match, allowing understanding the multilevel organization of tactical behaviors, and to determine the similarity of patterns performed by different groups of teammates during the first and second halves. Positional data from 20 professional male soccer players from the same team were collected using high frequency global positioning systems (5 Hz). Twenty-nine categories of tactical behaviors were determined from eight positioning-derived variables creating multivariate binary (Boolean) time-series matrices. Hierarchical principal component analysis (PCA) was used to identify the multilevel structure of tactical behaviors. The sequential reduction of each set level of principal components revealed a sole principal component as the slowest collective variable, forming the global basin of attraction of tactical patterns during each half of the match. In addition, the mean dwell time of each positioning-derived variable helped to understand the multilevel organization of collective tactical behavior during a soccer match. This approach warrants further investigations to analyze the influence of task constraints on the emergence of tactical behavior. Furthermore, PCA can help coaches to design representative training tasks according to those tactical patterns captured during match competitions and to compare them depending on situational variables. PMID:27761120

  3. Using Bayesian networks to assess the vulnerability of Hawaiian terrestrial biota to climate change

    NASA Astrophysics Data System (ADS)

    Fortini, L.; Jacobi, J.; Price, J.; Vorsino, A.; Paxton, E.; Amidon, F.; 'Ohukani'ohi'a Gon, S., III; Koob, G.; Brink, K.; Burgett, J.; Miller, S.

    2012-12-01

    As the effects of climate change on individual species become increasingly apparent, there is a clear need for effective adaptation planning to prevent an increase in species extinctions worldwide. Given the limited understanding of species responses to climate change, vulnerability assessments and species distribution models (SDMs) have been two common tools used to jump-start climate change adaptation efforts. However, although these two approaches generally serve the same purpose of understanding species future responses to climate change, they have rarely mixed. In collaboration with research and management partners from federal, state and non-profit organizations, we are conducting a climate change vulnerability assessment for hundreds of plant and forest bird species of the Main Hawaiian Islands. This assessment is the first to comprehensively consider the potential threats of climate change to a significant portion of Hawaii's fauna and flora (over one thousand species considered) and thus fills a critical gap defined by natural resource scientists and managers in the region. We have devised a flexible approach that effectively integrates species distribution models into a vulnerability assessment framework that can be easily updated with improved models and data. This tailors our assessment approach to the Pacific Island reality of often limited and fragmented information on species and large future climate uncertainties, This vulnerability assessment is based on a Bayesian network-based approach that integrates multiple landscape (e.g., topographic diversity, dispersal barriers), species trait (e.g., generation length, fecundity) and expert-knowledge based information (e.g., capacity to colonize restored habitat) relevant to long-term persistence of species under climate change. Our presentation will highlight some of the results from our assessment but will mainly focus on the utility of the flexible approach we have developed and its potential

  4. Systems Architectures for a Tactical Naval Command and Control System

    DTIC Science & Technology

    2009-03-01

    Supplement TST Time-sensitive Targeting TTP Tactics, Techniques, and Procedures WTP Weapons-target pairing xix GLOSSARY Analysis...target pairings ( WTPs ) and are presented to OTC [a]. 24. OTC conducts risk assessment of engagement options [a]. 25. OTC orders confirmed surface...engagement options are generated through weapon- target pairings ( WTPs ) and are presented to OTC [a]. 24. OTC conducts risk assessment of engagement

  5. A Performance Assessment of a Tactical Airborne Separation Assistance System using Realistic, Complex Traffic Flows

    NASA Technical Reports Server (NTRS)

    Smith, Jeremy C.; Neitzke, Kurt W.; Bussink, Frank J. L.

    2008-01-01

    This paper presents the results from a study that investigates the performance of aspects of an Airborne Separation Assistance System (ASAS) under varying demand levels using realistic traffic patterns. This study only addresses the tactical aspects of an ASAS using aircraft state data (latitude, longitude, altitude, heading and speed) to detect and resolve projected conflicts. The main focus of this paper is to determine the extent to which sole reliance on the proposed tactical ASAS can maintain aircraft separation at demand levels up to three times current traffic. The effect of mixing ASAS equipped aircraft with non-equipped aircraft that do not have the capability to self-separate is also investigated.

  6. Groundwater vulnerability assessment for organic compounds: fuzzy multi-criteria approach for Mexico city.

    PubMed

    Mazari-Hiriart, Marisa; Cruz-Bello, Gustavo; Bojórquez-Tapia, Luis A; Juárez-Marusich, Lourdes; Alcantar-López, Georgina; Marín, Luis E; Soto-Galera, Ernesto

    2006-03-01

    This study was based on a groundwater vulnerability assessment approach implemented for the Mexico City Metropolitan Area (MCMA). The approach is based on a fuzzy multi-criteria procedure integrated in a geographic information system. The approach combined the potential contaminant sources with the permeability of geological materials. Initially, contaminant sources were ranked by experts through the Analytic Hierarchy Process. An aggregated contaminant sources map layer was obtained through the simple additive weighting method, using a scalar multiplication of criteria weights and binary maps showing the location of each source. A permeability map layer was obtained through the reclassification of a geology map using the respective hydraulic conductivity values, followed by a linear normalization of these values against a compatible scale. A fuzzy logic procedure was then applied to transform and combine the two map layers, resulting in a groundwater vulnerability map layer of five classes: very low, low, moderate, high, and very high. Results provided a more coherent assessment of the policy-making priorities considered when discussing the vulnerability of groundwater to organic compounds. The very high and high vulnerability areas covered a relatively small area (71 km(2) or 1.5% of the total study area), allowing the identification of the more critical locations. The advantage of a fuzzy logic procedure is that it enables the best possible use to be made of the information available regarding groundwater vulnerability in the MCMA.

  7. Departure Queue Prediction for Strategic and Tactical Surface Scheduler Integration

    NASA Technical Reports Server (NTRS)

    Zelinski, Shannon; Windhorst, Robert

    2016-01-01

    A departure metering concept to be demonstrated at Charlotte Douglas International Airport (CLT) will integrate strategic and tactical surface scheduling components to enable the respective collaborative decision making and improved efficiency benefits these two methods of scheduling provide. This study analyzes the effect of tactical scheduling on strategic scheduler predictability. Strategic queue predictions and target gate pushback times to achieve a desired queue length are compared between fast time simulations of CLT surface operations with and without tactical scheduling. The use of variable departure rates as a strategic scheduler input was shown to substantially improve queue predictions over static departure rates. With target queue length calibration, the strategic scheduler can be tuned to produce average delays within one minute of the tactical scheduler. However, root mean square differences between strategic and tactical delays were between 12 and 15 minutes due to the different methods the strategic and tactical schedulers use to predict takeoff times and generate gate pushback clearances. This demonstrates how difficult it is for the strategic scheduler to predict tactical scheduler assigned gate delays on an individual flight basis as the tactical scheduler adjusts departure sequence to accommodate arrival interactions. Strategic/tactical scheduler compatibility may be improved by providing more arrival information to the strategic scheduler and stabilizing tactical scheduler changes to runway sequence in response to arrivals.

  8. Enabling information management systems in tactical network environments

    NASA Astrophysics Data System (ADS)

    Carvalho, Marco; Uszok, Andrzej; Suri, Niranjan; Bradshaw, Jeffrey M.; Ceccio, Philip J.; Hanna, James P.; Sinclair, Asher

    2009-05-01

    Net-Centric Information Management (IM) and sharing in tactical environments promises to revolutionize forward command and control capabilities by providing ubiquitous shared situational awareness to the warfighter. This vision can be realized by leveraging the tactical and Mobile Ad hoc Networks (MANET) which provide the underlying communications infrastructure, but, significant technical challenges remain. Enabling information management in these highly dynamic environments will require multiple support services and protocols which are affected by, and highly dependent on, the underlying capabilities and dynamics of the tactical network infrastructure. In this paper we investigate, discuss, and evaluate the effects of realistic tactical and mobile communications network environments on mission-critical information management systems. We motivate our discussion by introducing the Advanced Information Management System (AIMS) which is targeted for deployment in tactical sensor systems. We present some operational requirements for AIMS and highlight how critical IM support services such as discovery, transport, federation, and Quality of Service (QoS) management are necessary to meet these requirements. Our goal is to provide a qualitative analysis of the impact of underlying assumptions of availability and performance of some of the critical services supporting tactical information management. We will also propose and describe a number of technologies and capabilities that have been developed to address these challenges, providing alternative approaches for transport, service discovery, and federation services for tactical networks.

  9. A hybrid framework for assessing maize drought vulnerability in Sub-Saharan Africa

    NASA Astrophysics Data System (ADS)

    Kamali, B.; Abbaspour, K. C.; Wehrli, B.; Yang, H.

    2017-12-01

    Drought has devastating impacts on crop yields. Quantifying drought vulnerability is the first step to better design of mitigation policies. The vulnerability of crop yield to drought has been assessed with different methods, however they lack a standardized base to measure its components and a procedure that facilitates spatial and temporal comparisons. This study attempts to quantify maize drought vulnerability through linking the Drought Exposure Index (DEI) to the Crop Failure Index (CFI). DEI and CFI were defined by fitting probability distribution functions to precipitation and maize yield respectively. To acquire crop drought vulnerability index (CDVI), DEI and CFI were combined in a hybrid framework which classifies CDVI with the same base as DEI and CFI. The analysis were implemented on Sub-Saharan African countries using maize yield simulated with the Environmental Policy Integrated Climate (EPIC) model at 0.5° resolution. The model was coupled with the Sequential Uncertainty Fitting algorithm for calibration at country level. Our results show that Central Africa and those Western African countries located below the Sahelian strip receive higher amount of precipitation, but experience high crop failure. Therefore, they are identified as more vulnerable regions compared to countries such as South Africa, Tanzania, and Kenya. We concluded that our hybrid approach complements information on crop drought vulnerability quantification and can be applied to different regions and scales.

  10. Analysis of Physiological, Technical, and Tactical Analysis during a Friendly Football Match of Elite U19.

    PubMed

    Ortega, Juan Ignacio; Evangelio, Carlos; Clemente, Filipe Manuel; Martins, Fernando Manuel Lourenço; González-Víllora, Sixto

    2016-06-16

    The main objective was to analyze a friendly match of youth elite soccer players identifying the variance of tactical and physiological response parameters during the game. In addition, detecting the impact of both halves on player performance. For the purposes of this study twenty-two U19 players were analyzed playing 11v11. Activity profile, heart rate (HR and HRmax), grouped in five different zones were analyzed via Bluetooth technology, technical performance was analyzed by the Team Sport Assessment Procedure (TSAP), and tactical performance was measured by Social Network Analysis. A comparison of heart rate responses showed significant main effects in the halves (p = 0.001; η p 2 = 0.623). A comparison between tactical position and technical performance had significant main effects (p = 0.001; η p 2 = 0.390). Tactical position showed statistically significant effects on tactical prominence (p = 0.002; η p 2 = 0.296). Therefore, fatigue is a component distinguished in technical/tactical parameters, such as volume of play and efficiency index. Results suggest that fatigue effects may constrain technical performance and, for that reason, the use of instruments to monitor the fatigue effect during matches may be suggested.

  11. Analysis of Physiological, Technical, and Tactical Analysis during a Friendly Football Match of Elite U19

    PubMed Central

    Ortega, Juan Ignacio; Evangelio, Carlos; Clemente, Filipe Manuel; Martins, Fernando Manuel Lourenço; González-Víllora, Sixto

    2016-01-01

    The main objective was to analyze a friendly match of youth elite soccer players identifying the variance of tactical and physiological response parameters during the game. In addition, detecting the impact of both halves on player performance. For the purposes of this study twenty-two U19 players were analyzed playing 11v11. Activity profile, heart rate (HR and HRmax), grouped in five different zones were analyzed via Bluetooth technology, technical performance was analyzed by the Team Sport Assessment Procedure (TSAP), and tactical performance was measured by Social Network Analysis. A comparison of heart rate responses showed significant main effects in the halves (p = 0.001; ηp2 = 0.623). A comparison between tactical position and technical performance had significant main effects (p = 0.001; ηp2 = 0.390). Tactical position showed statistically significant effects on tactical prominence (p = 0.002; ηp2 = 0.296). Therefore, fatigue is a component distinguished in technical/tactical parameters, such as volume of play and efficiency index. Results suggest that fatigue effects may constrain technical performance and, for that reason, the use of instruments to monitor the fatigue effect during matches may be suggested. PMID:29910283

  12. Integrated assessment of urban vulnerability and resilience. Case study: Targu Ocna town, Romania

    NASA Astrophysics Data System (ADS)

    Grozavu, Adrian; Bănică, Alexandru

    2015-04-01

    Vulnerability assessment frequently emphasizes the internal fragility of a system in relation to a given hazard, when compared to similar systems or to a reference standard. This internal fragility, either biophysical or structural, may affect the ability to predict, to prepare for and cope with or to recover from the manifestation of a risk phenomenon. Thus, the vulnerability is highly related to resilience and adaptability. There is no single methodology for vulnerability and resilience analysis, their assessment can only be made by identifying and integrating indicators which are compatible with the analysis level and the geographic, economic and social features of a certain area. An integrated model of evaluating vulnerability and resilience capacity is being proposed in this paper for Targu Ocna, a small mining settlement in the Eastern Carpathians of Romania, that became in the last years a tourist town and acts within the surrounding territory as a dynamic local pole. Methodologically, the following steps and operations were considered: identifying potential hazards, identifying elements at risk, identifying proper indicators and integrating them in order to evaluate the general vulnerability and resilience. The inventory of elements at risk (the number of people potentially affected, residential or other functionalities buildings, roads and other infrastructure elements etc.) was made based on General Urban Plan, topographic maps (scale 1:5000), ortophotos from 2003 and 2008 and field mapping and researches. Further on, several vulnerability indicators were identified and included within the analytical approach: dependency ratio, income, quality of the habitat and technical urban facilities, environment quality showing differentiated sensitivity. Issues such as preparedness and preventive measures (priority areas within the risk prevention plans), coping ability (networks' geometry and connectivity, emergency utilities and services accessibility) and the

  13. Assessments of species' vulnerability to climate change: From pseudo to science

    USGS Publications Warehouse

    Wade, Alisa A.; Hand, Brian K.; Kovach, Ryan; Muhlfeld, Clint C.; Waples, Robin S.; Luikart, Gordon

    2017-01-01

    Climate change vulnerability assessments (CCVAs) are important tools to plan for and mitigate potential impacts of climate change. However, CCVAs often lack scientific rigor, which can ultimately lead to poor conservation prioritization and associated ecological and economic costs. We discuss the need to improve comparability and consistency of CCVAs and either validate their findings or improve assessment of CCVA uncertainty and sensitivity to methodological assumptions.

  14. The Future of Risk Analysis: Operationalizing Living Vulnerability Assessments from the Cloud to the Street (and Back)

    NASA Astrophysics Data System (ADS)

    Tellman, B.; Schwarz, B.; Kuhn, C.; Pandey, B.; Schank, C.; Sullivan, J.; Mahtta, R.; Hammet, L.

    2016-12-01

    21 million people are exposed to flooding every year, and that number is expected to more than double by 2030 due to climate, land use, and demographic change. Cloud to Street, a mission driven science organization, is working to make big and real time data more meaningful to understand both biophysical and social vulnerability to flooding in this changing world. This talk will showcase the science and practice we have built of integrated social and biophysical flood vulnerability assessments based on our work in Uttarakhand, India and Senegal, in conjunction with nonprofits and development banks. We will show developments of our global historical flood database, detected from MODIS and Landsat satellites, used to power machine learning flood exposure models in Google Earth Engine's API. Demonstrating the approach, we will also showcase new approaches in social vulnerability science, from developing data-driven social vulnerability indices in India, to deriving predictive models that explain the social conditions that lead to disproportionate flood damage and fatality in the US. While this talk will draw on examples of completed vulnerability assessments, we will also discuss the possible future for place-based "living" flood vulnerability assessments that are updated each time satellites circle the earth or people add crowd-sourced observations about flood events and social conditions.

  15. Definitions of Tactical and Strategic: An Informal Study

    NASA Technical Reports Server (NTRS)

    Schutte, Paul C.

    2004-01-01

    Seventeen subject matter experts defined tactical and strategic within the aviation domain. They provided five verbs and a sentence describing both behaviors. The verbs for strategic behavior were Plan, Think, Arrange, Formulate, Intend, Devise, Anticipate, and Order. The verbs for tactical behavior were Act, Fly, Respond, Do, Avoid, Control, React, and Move. Verbs that were common to both were Get Information, Navigate, Know, Execute, Manage, Perceive, Understand, Direct, Concentrate, and Point. The responses highlight the difference between planning (strategic) and carrying out those plans (tactical). Tactical verbs are more action-oriented that change the state of the world after they have been accomplished. Strategic verbs are more prescriptive in that they do not change the state of the world but offer a procedure or program for changing the world. The pilot is in a tactical mode when actually moving the aircraft and in a strategic mode when thinking about moving it.

  16. Assessing social vulnerability to climate change in human communities near public forests and grasslands: a framework for resource managers and planners

    Treesearch

    A. Paige Fischer; Travis Paveglio; Matthew Carroll; Daniel Murphy; Hannah Brenkert-Smith

    2013-01-01

    Public land management agencies have incorporated the concept of vulnerability into protocols for assessing and planning for climate change impacts on public forests and grasslands. However, resource managers and planners have little guidance for how to address the social aspects of vulnerability in these assessments and plans. Failure to assess social vulnerability to...

  17. Assessment of vulnerability zones for ground water pollution using GIS-DRASTIC-EC model: A field-based approach

    NASA Astrophysics Data System (ADS)

    Anantha Rao, D.; Naik, Pradeep K.; Jain, Sunil K.; Vinod Kumar, K.; Dhanamjaya Rao, E. N.

    2018-06-01

    Assessment of groundwater vulnerability to pollution is an essential pre-requisite for better planning of an area. We present the groundwater vulnerability assessment in parts of the Yamuna Nagar District, Haryana State, India in an area of about 800 km2, considered to be a freshwater zone in the foothills of the Siwalik Hill Ranges. Such areas in the Lower Himalayas form good groundwater recharge zones, and should always be free from contamination. But, the administration has been trying to promote industrialization along these foothill zones without actually assessing the environmental consequences such activities may invite in the future. GIS-DRASTIC model has been used with field based data inputs for studying the vulnerability assessment. But, we find that inclusion electrical conductivity (EC) as a model parameter makes it more robust. Therefore, we rename it as GIS-DRASTIC-EC model. The model identifies three vulnerability zones such as low, moderate and high with an areal extent of 5%, 80% and 15%, respectively. On the basis of major chemical parameters alone, the groundwater in the foothill zones apparently looks safe, but analysis with the help of GIS-DRASTIC-EC model gives a better perspective of the groundwater quality in terms of identifying the vulnerable areas.

  18. Climate Change Vulnerability Assessments: Four Case Studies of Water Utility Practices (2011 Final)

    EPA Science Inventory

    EPA has released the final report titled, Climate Change Vulnerability Assessments: Four Case Studies of Water Utility Practices. This report was prepared by the National Center for Environmental Assessment's Global Climate Research Staff in the Office of Research and D...

  19. Life cycle assessment of milk production from commercial dairy farms: the influence of management tactics.

    PubMed

    Yan, M-J; Humphreys, J; Holden, N M

    2013-07-01

    Little consideration has been given to how farm management, specifically tactics used to implement the management strategy, may influence the carbon footprint (CF) and land use for milk produced on commercial farms. In this study, the CF and land use of milk production from 18 Irish commercial dairy farms were analyzed based on foreground data from a 12-mo survey capturing management tactics and background data from the literature. Large variation was found in farm attributes and management tactics; for example, up to a 1.5-fold difference in fertilizer nitrogen input was used to support the same stocking density, and up to a 3.5-fold difference in concentrate fed for similar milk output per cow. However, the coefficient of variation for milk CF between farms only varied by 13% and for land use by 18%. The overall CF and overall land use of the milk production from the 18 dairy farms was 1.23±0.04kg of CO2 Eq and 1.22±0.05 m(2) per kilogram of energy-corrected milk. Milk output per cow, economic allocation between exports of milk and liveweight, and on-farm diesel use per ha were found to be influential factors on milk CF, whereas the fertilizer N rate, milk output per cow, and economic allocation between exports of milk and liveweight were influential on land use. Effective sward management of white clover within a few farms appeared to lower the CF but increased on-farm land use. It was concluded that a combination of multiple tactics determines CF and land use for milk production on commercial dairy farms and, although these 2 measures of environmental impact are correlated, a farm with a low CF did not always have low land use and vice versa. Copyright © 2013 American Dairy Science Association. Published by Elsevier Inc. All rights reserved.

  20. [The assessment of vulnerability to floods in Guangdong province at district level].

    PubMed

    Zhu, Qi; Liu, Tao; Zhang, Yong-hui; Luo, Yuan; Wei, Yao; Xiao, Jian-peng; Zeng, Si-qing; Ma, Wen-jun

    2012-11-01

    To evaluate the vulnerability to floods in Guangdong province at district level. Data were collected from the sixth census, the 2010 Statistical Yearbook of Guangdong, the 2010 Health Statistics Yearbook of Guangdong and China Disease Prevention and Control information systems, etc. The weight of each indicator was determined based on subjective method and objective method respectively; and finally the results of the two methods were compared. 13 indicators were selected for the assessment of vulnerability to floods, including 6 sensitivity indicators, 5 adaptability indicators and 2 exposure indicators. Indicators with large weight (subjective weight/objective weight) were the proportion of population older than 65 years old (0.31/0.30), the proportion of population older than 65 years old (0.16/0.23), infant mortality rate (0.18/0.20), the total Gross Domestic Product (GDP) per capita (0.33/0.21), the proportion of illiterate in the population older than 15 years old (0.19/0.28), history frequency of floods (0.75/0.75). The mean vulnerability index (VI) calculated by subjective method was 0.35 with the standard deviation of 0.10; the mean vulnerability index calculated by objective method was 0.31 with the standard deviation of 0.08. The two weighting methods showed consistent results of vulnerability index (ICC = 0.975, P < 0.01). VI of most districts dropped in the interval of 0.30 - 0.39. Districts with subjective VI > 0.50 or objective VI > 0.40 should pay more attention to floods, including parts of the coastal areas, Beijiang River Basin, the eastern tributary area of Dongjiang River and the northern part of Pearl River Delta. Dapu district of Meizhou (0.55/0.45), Dianbai district and Maogang district of Maoming (0.54/0.48) were most vulnerable. Districts of Heyuan, Dongguan, Zhaoqing and Huizhou were less vulnerable, Yuancheng district of Heyuan showed least vulnerable to floods (0.15/0.12) followed by Dongguan (0.18/0.16), Duanzhou district (0

  1. Integrated assessment on the vulnerability of animal husbandry to snow disasters under climate change in the Qinghai-Tibetan Plateau

    NASA Astrophysics Data System (ADS)

    Wei, Yanqiang; Wang, Shijin; Fang, Yiping; Nawaz, Zain

    2017-10-01

    Animal husbandry is a dominant and traditional source of livelihood and income in the Qinghai-Tibetan Plateau. The Qinghai-Tibetan Plateau is the third largest snow covered area in China and is one of the main snow disaster regions in the world. It is thus imperative to urgently address the issue of vulnerability of the animal husbandry sector to snow disasters for disaster mitigation and adaptation under growing risk of these disasters as a result of future climate change. However, there is very few literature reported on the vulnerability of animal husbandry in the Qinghai-Tibetan Plateau. This assessment aims at identifying vulnerability of animal husbandry at spatial scale and to identify the reasons for vulnerability for adaptive planning and disaster mitigation. First, historical snow disaster characteristics have been analyzed and used for the spatial weight for vulnerability assessment. Second, indicator-based vulnerability assessment model and indicator system have been established. We combined risk of snow hazard, sensitivity of livestock to disaster, physical exposure to disaster, and community capacity to adapt to snow disaster in an integrated vulnerability index. Lastly, vulnerability of animal husbandry to snow disaster on the Qinghai-Tibetan Plateau has been evaluated. Results indicate that high vulnerabilities are mainly concentrated in the eastern and central plateau and that vulnerability decreases gradually from the east to the west. Due to global warming, the vulnerability trend has eased to some extent during the last few decades. High livestock density exposure to blizzard-prone regions and shortages of livestock barn and forage are the main reasons of high vulnerability. The conclusion emphasizes the important role of the local government and community to help local pastoralists for reducing vulnerability to snow disaster and frozen hazard. The approaches presented in this paper can be used for snow disaster mitigation, resilience

  2. Landmark-based robust navigation for tactical UGV control in GPS-denied communication-degraded environments

    NASA Astrophysics Data System (ADS)

    Endo, Yoichiro; Balloch, Jonathan C.; Grushin, Alexander; Lee, Mun Wai; Handelman, David

    2016-05-01

    Control of current tactical unmanned ground vehicles (UGVs) is typically accomplished through two alternative modes of operation, namely, low-level manual control using joysticks and high-level planning-based autonomous control. Each mode has its own merits as well as inherent mission-critical disadvantages. Low-level joystick control is vulnerable to communication delay and degradation, and high-level navigation often depends on uninterrupted GPS signals and/or energy-emissive (non-stealth) range sensors such as LIDAR for localization and mapping. To address these problems, we have developed a mid-level control technique where the operator semi-autonomously drives the robot relative to visible landmarks that are commonly recognizable by both humans and machines such as closed contours and structured lines. Our novel solution relies solely on optical and non-optical passive sensors and can be operated under GPS-denied, communication-degraded environments. To control the robot using these landmarks, we developed an interactive graphical user interface (GUI) that allows the operator to select landmarks in the robot's view and direct the robot relative to one or more of the landmarks. The integrated UGV control system was evaluated based on its ability to robustly navigate through indoor environments. The system was successfully field tested with QinetiQ North America's TALON UGV and Tactical Robot Controller (TRC), a ruggedized operator control unit (OCU). We found that the proposed system is indeed robust against communication delay and degradation, and provides the operator with steady and reliable control of the UGV in realistic tactical scenarios.

  3. Transportation security research : coordination needed in selecting and implementing infrastructure vulnerability assessments

    DOT National Transportation Integrated Search

    2003-05-01

    The Department of Transportation's (DOT) Research and Special Programs Administration (RSPA) began research in to assess the vulnerabilities of the nation's transportation infrastructure and develop needed improvements in security in June 2001. The g...

  4. A vulnerability assessment of 300 species in Florida: threats from sea level rise, land use, and climate change.

    PubMed

    Reece, Joshua Steven; Noss, Reed F; Oetting, Jon; Hoctor, Tom; Volk, Michael

    2013-01-01

    Species face many threats, including accelerated climate change, sea level rise, and conversion and degradation of habitat from human land uses. Vulnerability assessments and prioritization protocols have been proposed to assess these threats, often in combination with information such as species rarity; ecological, evolutionary or economic value; and likelihood of success. Nevertheless, few vulnerability assessments or prioritization protocols simultaneously account for multiple threats or conservation values. We applied a novel vulnerability assessment tool, the Standardized Index of Vulnerability and Value, to assess the conservation priority of 300 species of plants and animals in Florida given projections of climate change, human land-use patterns, and sea level rise by the year 2100. We account for multiple sources of uncertainty and prioritize species under five different systems of value, ranging from a primary emphasis on vulnerability to threats to an emphasis on metrics of conservation value such as phylogenetic distinctiveness. Our results reveal remarkable consistency in the prioritization of species across different conservation value systems. Species of high priority include the Miami blue butterfly (Cyclargus thomasi bethunebakeri), Key tree cactus (Pilosocereus robinii), Florida duskywing butterfly (Ephyriades brunnea floridensis), and Key deer (Odocoileus virginianus clavium). We also identify sources of uncertainty and the types of life history information consistently missing across taxonomic groups. This study characterizes the vulnerabilities to major threats of a broad swath of Florida's biodiversity and provides a system for prioritizing conservation efforts that is quantitative, flexible, and free from hidden value judgments.

  5. A Vulnerability Assessment of 300 Species in Florida: Threats from Sea Level Rise, Land Use, and Climate Change

    PubMed Central

    Reece, Joshua Steven; Noss, Reed F.; Oetting, Jon; Hoctor, Tom; Volk, Michael

    2013-01-01

    Species face many threats, including accelerated climate change, sea level rise, and conversion and degradation of habitat from human land uses. Vulnerability assessments and prioritization protocols have been proposed to assess these threats, often in combination with information such as species rarity; ecological, evolutionary or economic value; and likelihood of success. Nevertheless, few vulnerability assessments or prioritization protocols simultaneously account for multiple threats or conservation values. We applied a novel vulnerability assessment tool, the Standardized Index of Vulnerability and Value, to assess the conservation priority of 300 species of plants and animals in Florida given projections of climate change, human land-use patterns, and sea level rise by the year 2100. We account for multiple sources of uncertainty and prioritize species under five different systems of value, ranging from a primary emphasis on vulnerability to threats to an emphasis on metrics of conservation value such as phylogenetic distinctiveness. Our results reveal remarkable consistency in the prioritization of species across different conservation value systems. Species of high priority include the Miami blue butterfly (Cyclargus thomasi bethunebakeri), Key tree cactus (Pilosocereus robinii), Florida duskywing butterfly (Ephyriades brunnea floridensis), and Key deer (Odocoileus virginianus clavium). We also identify sources of uncertainty and the types of life history information consistently missing across taxonomic groups. This study characterizes the vulnerabilities to major threats of a broad swath of Florida’s biodiversity and provides a system for prioritizing conservation efforts that is quantitative, flexible, and free from hidden value judgments. PMID:24260447

  6. Coastal vulnerability assessment of the Northern Gulf of Mexico to sea-level rise and coastal change

    USGS Publications Warehouse

    Pendleton, E.A.; Barras, J.A.; Williams, S.J.; Twichell, D.C.

    2010-01-01

    A coastal vulnerability index (CVI) was used to map the relative vulnerability of the coast to future sea-level rise along the Northern Gulf of Mexico from Galveston, TX, to Panama City, FL. The CVI ranks the following in terms of their physical contribution to sea-level rise-related coastal change: geomorphology, regional coastal slope, rate of relative sea-level rise, historical shoreline change rate, mean tidal range, and mean significant wave height. The rankings for each variable are combined and an index value is calculated for 1-kilometer grid cells along the coast. The CVI highlights those regions where the physical effects of sea-level rise might be the greatest. The CVI assessment presented here builds on an earlier assessment conducted for the Gulf of Mexico. Recent higher resolution shoreline change, land loss, elevation, and subsidence data provide the foundation for a better assessment for the Northern Gulf of Mexico. The areas along the Northern Gulf of Mexico that are likely to be most vulnerable to sea-level rise are parts of the Louisiana Chenier Plain, Teche-Vermillion Basin, and the Mississippi barrier islands, as well as most of the Terrebonne and Barataria Bay region and the Chandeleur Islands. These very high vulnerability areas have the highest rates of relative sea-level rise and the highest rates of shoreline change or land area loss. The information provided by coastal vulnerability assessments can be used in long-term coastal management and policy decision making.

  7. Assessing vulnerability of giant pandas to climate change in the Qinling Mountains of China.

    PubMed

    Li, Jia; Liu, Fang; Xue, Yadong; Zhang, Yu; Li, Diqiang

    2017-06-01

    Climate change might pose an additional threat to the already vulnerable giant panda ( Ailuropoda melanoleuca ). Effective conservation efforts require projections of vulnerability of the giant panda in facing climate change and proactive strategies to reduce emerging climate-related threats. We used the maximum entropy model to assess the vulnerability of giant panda to climate change in the Qinling Mountains of China. The results of modeling included the following findings: (1) the area of suitable habitat for giant pandas was projected to decrease by 281 km 2 from climate change by the 2050s; (2) the mean elevation of suitable habitat of giant panda was predicted to shift 30 m higher due to climate change over this period; (3) the network of nature reserves protect 61.73% of current suitable habitat for the species, and 59.23% of future suitable habitat; (4) current suitable habitat mainly located in Chenggu, Taibai, and Yangxian counties (with a total area of 987 km 2 ) was predicted to be vulnerable. Assessing the vulnerability of giant panda provided adaptive strategies for conservation programs and national park construction. We proposed adaptation strategies to ameliorate the predicted impacts of climate change on giant panda, including establishing and adjusting reserves, establishing habitat corridors, improving adaptive capacity to climate change, and strengthening monitoring of giant panda.

  8. Comprehensive vulnerability assessment method for nodes considering anti-interference ability and influence

    NASA Astrophysics Data System (ADS)

    LUO, Jianchun; WANG, Yunyu; YANG, Jun; RAN, hong; PENG, Xiaodong; HUANG, Ming; FENG, Hao; LIU, Meijun

    2018-03-01

    The vulnerability assessment of power grid is of great significance in the current research. Power system faces many kinds of uncertainty factors, and the disturbance caused by them has become one of the main factors which restrict the safe operation of power grid. To solve this problem, considering the anti-interference ability of the system when the system is disturbed and the effect of the system when the node is out of operation, a set of index to reflect the anti-interference ability and the influence of nodes are set up. On this basis, a new comprehensive vulnerability assessment method of nodes is put forward by using super efficiency data envelopment analysis to scientific integration. Finally, the simulative results of IEEE30-bus system indicated that the proposed model is rational and valid.

  9. Assessment of Climate Change Vulnerability at the Local Level: A Case Study on the Dniester River Basin (Moldova)

    PubMed Central

    Sîrodoev, Igor; Koeppel, Sonja; Denisov, Nickolai; Sîrodoev, Ghennadi

    2013-01-01

    Vulnerability to climate change of the Moldavian part of the Dniester river was assessed as the function of exposure, sensitivity, and adaptive capacity of its basin's natural and socioeconomic systems. As a spatial “scale” of the assessment, Moldova's administrative-territorial units (ATUs) were selected. The exposure assessment was based on the climatic analysis of baseline (1971–2000) temperature and precipitation and projections of their changes in 2021–2050, separately for cold and warm periods. The sensitivity assessment included physiographical and socioeconomic characteristics, described by a set of specific indicators. The adaptive capacity was expressed by general economic and agricultural indicators, taking into consideration the medical provision and housing conditions. Through a ranking approach, the relative vulnerability of each ATU was calculated by summing its sensitivity and adaptive capacity ranks; the latter were obtained as combinations of their primary indicator ranks, arranged in an increasing and decreasing order, respectively. Due to lack of sound knowledge on these components' importance in overall assessment of vulnerability, their weights were taken as conventionally equal. Mapping of vulnerability revealed that ATUs neighboring to municipalities are the most vulnerable and need special attention in climate change adaptation. The basin's “hotspots” were discussed with public participation. PMID:23766677

  10. Case Studies of Water Utility Climate Change Vulnerability Assessment [External Review Draft Report

    EPA Science Inventory

    This report presents a series of case studies describing the approaches taken by four water utilities in the United States to assess their vulnerability to climate change. The report is not intended to be a comprehensive listing of assessment approaches or utilities conducting v...

  11. An holistic view on aquifer vulnerability based on a distinction of different types of vulnerability

    NASA Astrophysics Data System (ADS)

    De Luca, Domenico Antonio; Lasagna, Manuela; Franchino, Elisa

    2016-04-01

    AN HOLISTIC VIEW ON AQUIFER VULNERABILITY BASED ON A DISTINCTION OF DIFFERENT TYPES OF VULNERABILITY D.A. De Luca1 , M. Lasagna1, E. Franchino1 1Department of Earth Sciences, University of Turin The concept of vulnerability is certainly useful in the field of groundwater protection. Nevertheless, within the scientific community, the definition of groundwater vulnerability is still debatable and not clear and conclusive. This is probably due to the fact that researchers often have very different experiences and education. A positive effect of it is a constant exchange of ideas, but there are also negative consequences and difficulties in deepening the issue. The different approaches are very important but they are usable only if the concept of vulnerability is standardized: thus, for the sake of clarity, a number of definitions should be laid down, based on the different types of vulnerability. These definitions can then provide the necessary holistic view for the aquifer vulnerability assessment. Nowadays vulnerability methods focus on the degree of vulnerability and the parameters needed for its evaluation, often neglecting to clarify what is the type of vulnerability the proposed methods are referred. The type of vulnerability, indeed, is both logically and hierarchically superior to the degree of vulnerability. More specifically the type of vulnerability represents the evaluation of the hydrogeological conditions considered in the vulnerability assessment and able to influence the way in which the contamination can take place. Currently the only distinction, based on of the type of vulnerability, is referred to intrinsic and specific vulnerability. Intrinsic vulnerability assesses the susceptibility of the receptor based on the natural properties of the land and subsurface; specific vulnerability also includes properties of the analyzed contaminant. This distinction is useful but not exhaustive. In addition to this, e.g., a distinction of vertical vulnerability

  12. Development of a decision support tool for assessing vulnerability of transportation networks.

    DOT National Transportation Integrated Search

    2010-08-01

    This research develops a decision support tool for assessing vulnerability of transportation networks. This report consists of 1) describing the trends of freight movements in Utah, 2) identifying the current and potential freight chokepoints/bottlen...

  13. Factor weighting in DRASTIC modelling for assessing the groundwater vulnerability in Salatiga groundwater basin, Central Java Province, Indonesia

    NASA Astrophysics Data System (ADS)

    Kesuma, D. A.; Purwanto, P.; Putranto, T. T.; Rahmani, T. P. D.

    2017-06-01

    The increase in human population as well as area development in Salatiga Groundwater Basin, Central Java Province, will increase the potency of groundwater contamination in that area. Groundwater quality, especially the shallow groundwater, is very vulnerable to the contamination from industrial waste, fertilizer/agricultural waste, and domestic waste. The first step in the conservation of groundwater quality is by conducting the mapping of the groundwater vulnerability zonation against the contamination. The result of this research was groundwater vulnerability map which showed the areas vulnerable to the groundwater contamination. In this study, groundwater vulnerability map was assessed based on the DRASTIC Method and was processed spatially using Geographic Information System. The DRASTIC method is used to assess the level of groundwater vulnerability based on weighting on seven parameters, which are: depth to the water table (D), recharge (R), aquifer material (A), soil media (S), topography (T), impact of vadose zone (I), and hydraulic conductivity (C). The higher the DRASTIC Index will result in the higher vulnerability level of groundwater contamination in that area. The DRASTIC Indexes in the researched area were 85 - 100 (low vulnerability level), 101 -120 (low to moderate vulnerability level), 121 - 140 (moderate vulnerability level), 141 - 150, (moderate to high vulnerability level), and 151 - 159 (high vulnerability level). The output of this study can be used by local authority as a tool for consideration to arrange the policy for sustainable area development, especially the development in an area affecting the quality of Salatiga Groundwater Basin.

  14. Novel method of vulnerability assessment of simple landfills area using the multimedia, multipathway and multireceptor risk assessment (3MRA) model, China.

    PubMed

    Yuan, Ying; He, Xiao-Song; Xi, Bei-Dou; Wei, Zi-Min; Tan, Wen-Bing; Gao, Ru-Tai

    2016-11-01

    Vulnerability assessment of simple landfills was conducted using the multimedia, multipathway and multireceptor risk assessment (3MRA) model for the first time in China. The minimum safe threshold of six contaminants (benzene, arsenic (As), cadmium (Cd), hexavalent chromium [Cr(VI)], divalent mercury [Hg(II)] and divalent nickel [Ni(II)]) in landfill and waste pile models were calculated by the 3MRA model. Furthermore, the vulnerability indexes of the six contaminants were predicted based on the model calculation. The results showed that the order of health risk vulnerability index was As > Hg(II) > Cr(VI) > benzene > Cd > Ni(II) in the landfill model, whereas the ecology risk vulnerability index was in the order of As > Hg(II) > Cr(VI) > Cd > benzene > Ni(II). In the waste pile model, the order of health risk vulnerability index was benzene > Hg(II) > Cr(VI) > As > Cd and Ni(II), whereas the ecology risk vulnerability index was in the order of Hg(II) > Cd > Cr(VI) > As > benzene > Ni(II). These results indicated that As, Hg(II) and Cr(VI) were the high risk contaminants for the case of a simple landfill in China; the concentration of these in soil and groundwater around the simple landfill should be strictly monitored, and proper mediation is also recommended for simple landfills with a high concentration of contaminants. © The Author(s) 2016.

  15. Analysis of interference performance of tactical radio network

    NASA Astrophysics Data System (ADS)

    Nie, Hao; Cai, Xiaoxia; Chen, Hong

    2017-08-01

    Mobile Ad hoc network has a strong military background for its development as the core technology of the backbone network of US tactical Internet. And which tactical radio network, is the war in today's tactical use of the Internet more mature form of networking, mainly used in brigade and brigade following forces. This paper analyzes the typical protocol AODV in the tactical radio network, and then carries on the networking. By adding the interference device to the whole network, the battlefield environment is simulated, and then the throughput, delay and packet loss rate are analyzed, and the performance of the whole network and the single node before and after the interference is obtained.

  16. Groundwater vulnerability assessment using hydrogeologic and geoelectric layer susceptibility indexing at Igbara Oke, Southwestern Nigeria

    NASA Astrophysics Data System (ADS)

    Oni, T. E.; Omosuyi, G. O.; Akinlalu, A. A.

    2017-12-01

    Groundwater vulnerability assessment was carried out at Igbara Oke Southwestern Nigeria, with a view to classify the area into vulnerability zones, by applying the electrical resistivity method, using Schlumberger electrode arrays with maximum electrode separation (AB/2) of 65 m in (41) different locations for data acquisition. Geoelectric parameters (layer resistivity and thickness) were determined from the interpreted data. The study area comprises four geoelectric layers (topsoil, lateritic layer, weathered/fractured layer and fresh basement). The geoelectric parameters of the overlying layers across the area were used to assess the vulnerability of the underlying aquifers to near-surface contaminants with the aid of vulnerability maps generated. Three models were compared by maps using geo-electrically derived models; longitudinal conductance, GOD (groundwater occurrence, overlying lithology and depth to the aquifer) and GLSI (geoelectric layer susceptibility indexing). The total longitudinal conductance map shows the north central part of the study area as a weakly protected (0.1-0.19) area, while the northern and southern parts have poor protective capacity (<0.1); this is in agreement with the GOD method which shows the northern part of the study area as less vulnerable (0-0.1) while the southern part has low/moderate (0.1-0.3) vulnerability to contamination. The longitudinal conductance exaggerates the degree of susceptibility to contamination than the GOD and GLSI models. From the models, vulnerability to contamination can be considered higher at the southern part than the northern part and therefore, sources of contamination like septic tank, refuse dump should be cited far from groundwater development area.

  17. The drought risk of maize in the farming-pastoral ecotone in Northern China based on physical vulnerability assessment

    NASA Astrophysics Data System (ADS)

    Wang, Zhiqiang; Jiang, Jingyi; Ma, Qing

    2016-12-01

    Climate change is affecting every aspect of human activities, especially the agriculture. In China, extreme drought events caused by climate change have posed a great threat to food safety. In this work we aimed to study the drought risk of maize in the farming-pastoral ecotone in Northern China based on physical vulnerability assessment. The physical vulnerability curve was constructed from the relationship between drought hazard intensity index and yield loss rate. The risk assessment of agricultural drought was conducted from the drought hazard intensity index and physical vulnerability curve. The probability distribution of drought hazard intensity index decreased from south-west to north-east and increased from south-east to north-west along the rainfall isoline. The physical vulnerability curve had a reduction effect in three parts of the farming-pastoral ecotone in Northern China, which helped to reduce drought hazard vulnerability on spring maize. The risk of yield loss ratio calculated based on physical vulnerability curve was lower compared with the drought hazard intensity index, which suggested that the capacity of spring maize to resist and adapt to drought is increasing. In conclusion, the farming-pastoral ecotone in Northern China is greatly sensitive to climate change and has a high probability of severe drought hazard. Risk assessment of physical vulnerability can help better understand the physical vulnerability to agricultural drought and can also promote measurements to adapt to climate change.

  18. Distributed tactical reasoning framework for intelligent vehicles

    NASA Astrophysics Data System (ADS)

    Sukthankar, Rahul; Pomerleau, Dean A.; Thorpe, Chuck E.

    1998-01-01

    In independent vehicle concepts for the Automated Highway System (AHS), the ability to make competent tactical-level decisions in real-time is crucial. Traditional approaches to tactical reasoning typically involve the implementation of large monolithic systems, such as decision trees or finite state machines. However, as the complexity of the environment grows, the unforeseen interactions between components can make modifications to such systems very challenging. For example, changing an overtaking behavior may require several, non-local changes to car-following, lane changing and gap acceptance rules. This paper presents a distributed solution to the problem. PolySAPIENT consists of a collection of autonomous modules, each specializing in a particular aspect of the driving task - classified by traffic entities rather than tactical behavior. Thus, the influence of the vehicle ahead on the available actions is managed by one reasoning object, while the implications of an approaching exit are managed by another. The independent recommendations form these reasoning objects are expressed in the form of votes and vetos over a 'tactical action space', and are resolved by a voting arbiter. This local independence enables PolySAPIENT reasoning objects to be developed independently, using a heterogenous implementation. PolySAPIENT vehicles are implemented in the SHIVA tactical highway simulator, whose vehicles are based on the Carnegie Mellon Navlab robots.

  19. PROBABILISTIC ASSESSMENT OF GROUNDWATER VULNERABILITY TO NONPOINT SOURCE POLLUTION IN AGRICULTURAL WATERSHEDS

    EPA Science Inventory

    This paper presents a probabilistic framework for the assessment of groundwater pollution potential by pesticides in two adjacent agricultural watersheds in the Mid-Altantic Coastal Plain. Indices for estimating streams vulnerability to pollutants' load from the surficial aquifer...

  20. Advocates and critics for tactical behaviors in UGV navigation

    NASA Astrophysics Data System (ADS)

    Hussain, Talib S.; Vidaver, Gordon; Berliner, Jeffrey

    2005-05-01

    Critical to the development of unmanned ground vehicle platforms is the incorporation of adaptive tactical behaviors for the planning of high-level navigation and tactical actions. BBN Technologies recently completed a simulation-based project for the Army Research Lab (ARL) in which we applied an evolutionary computation approach to navigating through a terrain to capture flag objectives while faced with one or more mobile enemies. Our Advocates and Critics for Tactical Behaviors (ACTB) system evolves plans for the vehicle that control its movement goals (in the form of waypoints), and its future actions (e.g., pointing cameras). We apply domain-specific, state-dependent genetic operators called advocates that promote specific tactical behaviors (e.g., adapt a plan to stay closer to walls). We define the fitness function as a weighted sum of a number of independent, domain-specific, state-dependent evaluation components called critics. Critics reward plans based upon specific tactical criteria, such as minimizing risk of exposure or time to the flags. Additionally, the ACTB system provides the capability for a human commander to specify the "rules of engagement" under which the vehicle will operate. The rules of engagement determine the planning emphasis required under different tactical situations (e.g., discovery of an enemy), and provide a mechanism for automatically adapting the relative selection probabilities of the advocates, the weights of the critics, and the depth of planning in response to tactical events. The ACTB system demonstrated highly effective performance in a head-to-head testing event, held by ARL, against two competing tactical behavior systems.

  1. An Evaluation of Methods for Assessing Vulnerability of Army Installations toImpacts of Climate Change on Listed and At-Risk Species

    DTIC Science & Technology

    2017-07-01

    ER D C/ CE RL T R- 17 -2 5 Army Environmental Quality Technology An Evaluation of Methods for Assessing Vulnerability of Army...Evaluation of Methods for Assessing Vulnerability of Army Installations to Impacts of Climate Change on Listed and At-Risk Species Matthew G. Hohmann...their suitability for informing BRAC-related evaluations. Three recently developed methods for assessing the vulnerability of Army installations to

  2. Effectiveness evaluation of objective and subjective weighting methods for aquifer vulnerability assessment in urban context

    NASA Astrophysics Data System (ADS)

    Sahoo, Madhumita; Sahoo, Satiprasad; Dhar, Anirban; Pradhan, Biswajeet

    2016-10-01

    Groundwater vulnerability assessment has been an accepted practice to identify the zones with relatively increased potential for groundwater contamination. DRASTIC is the most popular secondary information-based vulnerability assessment approach. Original DRASTIC approach considers relative importance of features/sub-features based on subjective weighting/rating values. However variability of features at a smaller scale is not reflected in this subjective vulnerability assessment process. In contrast to the subjective approach, the objective weighting-based methods provide flexibility in weight assignment depending on the variation of the local system. However experts' opinion is not directly considered in the objective weighting-based methods. Thus effectiveness of both subjective and objective weighting-based approaches needs to be evaluated. In the present study, three methods - Entropy information method (E-DRASTIC), Fuzzy pattern recognition method (F-DRASTIC) and Single parameter sensitivity analysis (SA-DRASTIC), were used to modify the weights of the original DRASTIC features to include local variability. Moreover, a grey incidence analysis was used to evaluate the relative performance of subjective (DRASTIC and SA-DRASTIC) and objective (E-DRASTIC and F-DRASTIC) weighting-based methods. The performance of the developed methodology was tested in an urban area of Kanpur City, India. Relative performance of the subjective and objective methods varies with the choice of water quality parameters. This methodology can be applied without/with suitable modification. These evaluations establish the potential applicability of the methodology for general vulnerability assessment in urban context.

  3. Building vulnerability to hydro-geomorphic hazards: Estimating damage probability from qualitative vulnerability assessment using logistic regression

    NASA Astrophysics Data System (ADS)

    Ettinger, Susanne; Mounaud, Loïc; Magill, Christina; Yao-Lafourcade, Anne-Françoise; Thouret, Jean-Claude; Manville, Vern; Negulescu, Caterina; Zuccaro, Giulio; De Gregorio, Daniela; Nardone, Stefano; Uchuchoque, Juan Alexis Luque; Arguedas, Anita; Macedo, Luisa; Manrique Llerena, Nélida

    2016-10-01

    The focus of this study is an analysis of building vulnerability through investigating impacts from the 8 February 2013 flash flood event along the Avenida Venezuela channel in the city of Arequipa, Peru. On this day, 124.5 mm of rain fell within 3 h (monthly mean: 29.3 mm) triggering a flash flood that inundated at least 0.4 km2 of urban settlements along the channel, affecting more than 280 buildings, 23 of a total of 53 bridges (pedestrian, vehicle and railway), and leading to the partial collapse of sections of the main road, paralyzing central parts of the city for more than one week. This study assesses the aspects of building design and site specific environmental characteristics that render a building vulnerable by considering the example of a flash flood event in February 2013. A statistical methodology is developed that enables estimation of damage probability for buildings. The applied method uses observed inundation height as a hazard proxy in areas where more detailed hydrodynamic modeling data is not available. Building design and site-specific environmental conditions determine the physical vulnerability. The mathematical approach considers both physical vulnerability and hazard related parameters and helps to reduce uncertainty in the determination of descriptive parameters, parameter interdependency and respective contributions to damage. This study aims to (1) enable the estimation of damage probability for a certain hazard intensity, and (2) obtain data to visualize variations in damage susceptibility for buildings in flood prone areas. Data collection is based on a post-flood event field survey and the analysis of high (sub-metric) spatial resolution images (Pléiades 2012, 2013). An inventory of 30 city blocks was collated in a GIS database in order to estimate the physical vulnerability of buildings. As many as 1103 buildings were surveyed along the affected drainage and 898 buildings were included in the statistical analysis. Univariate and

  4. Corrugated QWIP for Tactical Army Applications

    DTIC Science & Technology

    2008-12-01

    1 CORRUGATED QWIP FOR TACTICAL ARMY APPLICATIONS David. P. Forrai, Darrel W. Endres L-3 Communications Cincinnati Electronics Mason, OH 45040...Directorate (NVESD) have been developing the corrugated quantum well infrared photodetector (C- QWIP ) technology for applications in tactical LWIR...imaging. The C- QWIP was invented at ARL and shows promise to overcome some of the limitations in commercially available QWIPs . The C- QWIP uses micro

  5. A Guide to School Vulnerability Assessments: Key Principles for Safe Schools

    ERIC Educational Resources Information Center

    Office of Safe and Drug-Free Schools, US Department of Education, 2008

    2008-01-01

    Crises affect schools across the country every day. While natural hazards such as tornadoes, floods, hurricanes, and earthquakes may be thought of more commonly as emergencies, schools are also at risk from other hazards such as school violence, infectious disease, and terrorist threats. Through the vulnerability assessment process, schools can…

  6. Assessing vulnerability of marine bird populations to offshore wind farms.

    PubMed

    Furness, Robert W; Wade, Helen M; Masden, Elizabeth A

    2013-04-15

    Offshore wind farms may affect bird populations through collision mortality and displacement. Given the pressures to develop offshore wind farms, there is an urgent need to assess population-level impacts on protected marine birds. Here we refine an approach to assess aspects of their ecology that influence population vulnerability to wind farm impacts, also taking into account the conservation importance of each species. Flight height appears to be a key factor influencing collision mortality risk but improved data on flight heights of marine birds are needed. Collision index calculations identify populations of gulls, white-tailed eagles, northern gannets and skuas as of particularly high concern in Scottish waters. Displacement index calculations identify populations of divers and common scoters as most vulnerable to population-level impacts of displacement, but these are likely to be less evident than impacts of collision mortality. The collision and displacement indices developed here for Scottish marine bird populations could be applied to populations elsewhere, and this approach will help in identifying likely impacts of future offshore wind farms on marine birds and prioritising monitoring programmes, at least until data on macro-avoidance rates become available. Copyright © 2013 Elsevier Ltd. All rights reserved.

  7. A Methodology for Assessing the Seismic Vulnerability of Highway Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cirianni, Francis; Leonardi, Giovanni; Scopelliti, Francesco

    2008-07-08

    Modern society is totally dependent on a complex and articulated infrastructure network of vital importance for the existence of the urban settlements scattered on the territory. On these infrastructure systems, usually indicated with the term lifelines, are entrusted numerous services and indispensable functions of the normal urban and human activity.The systems of the lifelines represent an essential element in all the urbanised areas which are subject to seismic risk. It is important that, in these zones, they are planned according to opportune criteria based on two fundamental assumptions: a) determination of the best territorial localization, avoiding, within limits, the placesmore » of higher dangerousness; b) application of constructive technologies finalized to the reduction of the vulnerability.Therefore it is indispensable that in any modern process of seismic risk assessment the study of the networks is taken in the rightful consideration, to be integrated with the traditional analyses of the buildings.The present paper moves in this direction, dedicating particular attention to one kind of lifeline: the highway system, proposing a methodology of analysis finalized to the assessment of the seismic vulnerability of the system.« less

  8. Cognitive representations and cognitive processing of team-specific tactics in soccer.

    PubMed

    Lex, Heiko; Essig, Kai; Knoblauch, Andreas; Schack, Thomas

    2015-01-01

    Two core elements for the coordination of different actions in sport are tactical information and knowledge about tactical situations. The current study describes two experiments to learn about the memory structure and the cognitive processing of tactical information. Experiment 1 investigated the storage and structuring of team-specific tactics in humans' long-term memory with regard to different expertise levels. Experiment 2 investigated tactical decision-making skills and the corresponding gaze behavior, in presenting participants the identical match situations in a reaction time task. The results showed that more experienced soccer players, in contrast to less experienced soccer players, possess a functionally organized cognitive representation of team-specific tactics in soccer. Moreover, the more experienced soccer players reacted faster in tactical decisions, because they needed less fixations of similar duration as compared to less experienced soccer players. Combined, these experiments offer evidence that a functionally organized memory structure leads to a reaction time and a perceptual advantage in tactical decision-making in soccer. The discussion emphasizes theoretical and applied implications of the current results of the study.

  9. Cognitive Representations and Cognitive Processing of Team-Specific Tactics in Soccer

    PubMed Central

    Lex, Heiko; Essig, Kai; Knoblauch, Andreas; Schack, Thomas

    2015-01-01

    Two core elements for the coordination of different actions in sport are tactical information and knowledge about tactical situations. The current study describes two experiments to learn about the memory structure and the cognitive processing of tactical information. Experiment 1 investigated the storage and structuring of team-specific tactics in humans’ long-term memory with regard to different expertise levels. Experiment 2 investigated tactical decision-making skills and the corresponding gaze behavior, in presenting participants the identical match situations in a reaction time task. The results showed that more experienced soccer players, in contrast to less experienced soccer players, possess a functionally organized cognitive representation of team-specific tactics in soccer. Moreover, the more experienced soccer players reacted faster in tactical decisions, because they needed less fixations of similar duration as compared to less experienced soccer players. Combined, these experiments offer evidence that a functionally organized memory structure leads to a reaction time and a perceptual advantage in tactical decision-making in soccer. The discussion emphasizes theoretical and applied implications of the current results of the study. PMID:25714486

  10. REGIONAL VULNERABILITY ASSESSMENT (REVA): TARGETING RISK MANAGEMENT ACTIONS AND PROVIDING OPTIONS FOR INTEGRATED MANAGEMENT

    EPA Science Inventory

    EPA's Regional Vulnerability Assessment (ReVA) program is an approach to regional scale, priority-setting assessment being developed by EPA's Office of Research and Development (ORD). ReVA will effectively informs decision-makers as to the magnitude, extent, distribution, and unc...

  11. A Method for Evaluation of Microcomputers for Tactical Applications.

    DTIC Science & Technology

    1980-06-01

    application. The computational requirements of a tactical application are specified in terms of performance parameters. The presently marketed microcomputer...computational requirements of a tactical application are specified in terms of performance parameters. The presently marketed microcomputer and multi...also to provide a method to evaluate microcomputer systems for tactical applications, i.e., Command Control Communications (C 3), weapon systems, etc

  12. Identifying the world's most climate change vulnerable species: a systematic trait-based assessment of all birds, amphibians and corals.

    PubMed

    Foden, Wendy B; Butchart, Stuart H M; Stuart, Simon N; Vié, Jean-Christophe; Akçakaya, H Resit; Angulo, Ariadne; DeVantier, Lyndon M; Gutsche, Alexander; Turak, Emre; Cao, Long; Donner, Simon D; Katariya, Vineet; Bernard, Rodolphe; Holland, Robert A; Hughes, Adrian F; O'Hanlon, Susannah E; Garnett, Stephen T; Sekercioğlu, Cagan H; Mace, Georgina M

    2013-01-01

    Climate change will have far-reaching impacts on biodiversity, including increasing extinction rates. Current approaches to quantifying such impacts focus on measuring exposure to climatic change and largely ignore the biological differences between species that may significantly increase or reduce their vulnerability. To address this, we present a framework for assessing three dimensions of climate change vulnerability, namely sensitivity, exposure and adaptive capacity; this draws on species' biological traits and their modeled exposure to projected climatic changes. In the largest such assessment to date, we applied this approach to each of the world's birds, amphibians and corals (16,857 species). The resulting assessments identify the species with greatest relative vulnerability to climate change and the geographic areas in which they are concentrated, including the Amazon basin for amphibians and birds, and the central Indo-west Pacific (Coral Triangle) for corals. We found that high concentration areas for species with traits conferring highest sensitivity and lowest adaptive capacity differ from those of highly exposed species, and we identify areas where exposure-based assessments alone may over or under-estimate climate change impacts. We found that 608-851 bird (6-9%), 670-933 amphibian (11-15%), and 47-73 coral species (6-9%) are both highly climate change vulnerable and already threatened with extinction on the IUCN Red List. The remaining highly climate change vulnerable species represent new priorities for conservation. Fewer species are highly climate change vulnerable under lower IPCC SRES emissions scenarios, indicating that reducing greenhouse emissions will reduce climate change driven extinctions. Our study answers the growing call for a more biologically and ecologically inclusive approach to assessing climate change vulnerability. By facilitating independent assessment of the three dimensions of climate change vulnerability, our approach can

  13. Identifying the World's Most Climate Change Vulnerable Species: A Systematic Trait-Based Assessment of all Birds, Amphibians and Corals

    PubMed Central

    Foden, Wendy B.; Butchart, Stuart H. M.; Stuart, Simon N.; Vié, Jean-Christophe; Akçakaya, H. Resit; Angulo, Ariadne; DeVantier, Lyndon M.; Gutsche, Alexander; Turak, Emre; Cao, Long; Donner, Simon D.; Katariya, Vineet; Bernard, Rodolphe; Holland, Robert A.; Hughes, Adrian F.; O’Hanlon, Susannah E.; Garnett, Stephen T.; Şekercioğlu, Çagan H.; Mace, Georgina M.

    2013-01-01

    Climate change will have far-reaching impacts on biodiversity, including increasing extinction rates. Current approaches to quantifying such impacts focus on measuring exposure to climatic change and largely ignore the biological differences between species that may significantly increase or reduce their vulnerability. To address this, we present a framework for assessing three dimensions of climate change vulnerability, namely sensitivity, exposure and adaptive capacity; this draws on species’ biological traits and their modeled exposure to projected climatic changes. In the largest such assessment to date, we applied this approach to each of the world’s birds, amphibians and corals (16,857 species). The resulting assessments identify the species with greatest relative vulnerability to climate change and the geographic areas in which they are concentrated, including the Amazon basin for amphibians and birds, and the central Indo-west Pacific (Coral Triangle) for corals. We found that high concentration areas for species with traits conferring highest sensitivity and lowest adaptive capacity differ from those of highly exposed species, and we identify areas where exposure-based assessments alone may over or under-estimate climate change impacts. We found that 608–851 bird (6–9%), 670–933 amphibian (11–15%), and 47–73 coral species (6–9%) are both highly climate change vulnerable and already threatened with extinction on the IUCN Red List. The remaining highly climate change vulnerable species represent new priorities for conservation. Fewer species are highly climate change vulnerable under lower IPCC SRES emissions scenarios, indicating that reducing greenhouse emissions will reduce climate change driven extinctions. Our study answers the growing call for a more biologically and ecologically inclusive approach to assessing climate change vulnerability. By facilitating independent assessment of the three dimensions of climate change vulnerability

  14. A new approach to flood vulnerability assessment for historic buildings in England

    NASA Astrophysics Data System (ADS)

    Stephenson, V.; D'Ayala, D.

    2014-05-01

    The recent increase in frequency and severity of flooding in the UK has led to a shift in the perception of risk associated with flood hazards. This has extended to the conservation community, and the risks posed to historic structures that suffer from flooding are particularly concerning for those charged with preserving and maintaining such buildings. In order to fully appraise the risks in a manner appropriate to the complex issue of preservation, a new methodology is presented here that studies the nature of the vulnerability of such structures, and places it in the context of risk assessment, accounting for the vulnerable object and the subsequent exposure of that object to flood hazards. The testing of the methodology is carried out using three urban case studies and the results of the survey analysis provide guidance on the development of fragility curves for historic structures exposed to flooding. This occurs through appraisal of vulnerability indicators related to building form, structural and fabric integrity, and preservation of architectural and archaeological values. Key findings of the work include determining the applicability of these indicators to fragility analysis, and the determination of the relative vulnerability of the three case study sites.

  15. Tactics and Economics of Wildlife Oral Rabies Vaccination, Canada and the United States

    PubMed Central

    Meltzer, Martin I.; Shwiff, Stephanie A.; Slate, Dennis

    2009-01-01

    Progressive elimination of rabies in wildlife has been a general strategy in Canada and the United States; common campaign tactics are trap–vaccinate–release (TVR), point infection control (PIC), and oral rabies vaccination (ORV). TVR and PIC are labor intensive and the most expensive tactics per unit area (≈$616/km2 [in 2008 Can$, converted from the reported $450/km2 in 1991 Can$] and ≈$612/km2 [$500/km2 in 1999 Can$], respectively), but these tactics have proven crucial to elimination of raccoon rabies in Canada and to maintenance of ORV zones for preventing the spread of raccoon rabies in the United States. Economic assessments have shown that during rabies epizootics, costs of human postexposure prophylaxis, pet vaccination, public health, and animal control spike. Modeling studies, involving diverse assumptions, have shown that ORV programs can be cost-efficient and yield benefit:cost ratios >1.0. PMID:19757549

  16. Groundwater vulnerability assessment for the Banyas Catchment of the Syrian coastal area using GIS and the RISKE method.

    PubMed

    Kattaa, Bassam; Al-Fares, Walid; Al Charideh, Abdul Rahman

    2010-05-01

    Vulnerability assessment to delineate areas that are more susceptible to contamination from anthropogenic sources has become an important element for sensible resource management and landuse planning. This contribution aims at estimating aquifer vulnerability by applying the RISKE model in Banyas Catchment Area (BCA), Tartous Prefecture, west Syria. An additional objective is to demonstrate the combined use of the RISKE model and a geographical information system (GIS) as an effective method for groundwater pollution risk assessment. The RISKE model uses five environmental parameters (Rock of aquifer media, Infiltration, Soil media, Karst, and Epikarst) to characterize the hydro-geological setting and evaluate aquifer vulnerability. The elevated eastern and low western part of the study area was dominated by high vulnerability classes, while the middle part was characterized by moderate vulnerability classes. Based on the vulnerability analysis, it was found that 2% and 39% of BCA is under low and high vulnerability to groundwater contamination, respectively, while more than 52% and 5% of the area of BCA can be designated as an area of moderate and very high vulnerability to groundwater contamination, respectively. The GIS technique has provided an efficient environment for analyses and high capabilities of handling a large amount of spatial data. Copyright 2009 Elsevier Ltd. All rights reserved.

  17. Tactical Synthesis Of Efficient Global Search Algorithms

    NASA Technical Reports Server (NTRS)

    Nedunuri, Srinivas; Smith, Douglas R.; Cook, William R.

    2009-01-01

    Algorithm synthesis transforms a formal specification into an efficient algorithm to solve a problem. Algorithm synthesis in Specware combines the formal specification of a problem with a high-level algorithm strategy. To derive an efficient algorithm, a developer must define operators that refine the algorithm by combining the generic operators in the algorithm with the details of the problem specification. This derivation requires skill and a deep understanding of the problem and the algorithmic strategy. In this paper we introduce two tactics to ease this process. The tactics serve a similar purpose to tactics used for determining indefinite integrals in calculus, that is suggesting possible ways to attack the problem.

  18. From the laboratory to the soldier: providing tactical behaviors for Army robots

    NASA Astrophysics Data System (ADS)

    Knichel, David G.; Bruemmer, David J.

    2008-04-01

    The Army Future Combat System (FCS) Operational Requirement Document has identified a number of advanced robot tactical behavior requirements to enable the Future Brigade Combat Team (FBCT). The FBCT advanced tactical behaviors include Sentinel Behavior, Obstacle Avoidance Behavior, and Scaled Levels of Human-Machine control Behavior. The U.S. Army Training and Doctrine Command, (TRADOC) Maneuver Support Center (MANSCEN) has also documented a number of robotic behavior requirements for the Army non FCS forces such as the Infantry Brigade Combat Team (IBCT), Stryker Brigade Combat Team (SBCT), and Heavy Brigade Combat Team (HBCT). The general categories of useful robot tactical behaviors include Ground/Air Mobility behaviors, Tactical Mission behaviors, Manned-Unmanned Teaming behaviors, and Soldier-Robot Interface behaviors. Many DoD research and development centers are achieving the necessary components necessary for artificial tactical behaviors for ground and air robots to include the Army Research Laboratory (ARL), U.S. Army Research, Development and Engineering Command (RDECOM), Space and Naval Warfare (SPAWAR) Systems Center, US Army Tank-Automotive Research, Development and Engineering Center (TARDEC) and non DoD labs such as Department of Energy (DOL). With the support of the Joint Ground Robotics Enterprise (JGRE) through DoD and non DoD labs the Army Maneuver Support Center has recently concluded successful field trails of ground and air robots with specialized tactical behaviors and sensors to enable semi autonomous detection, reporting, and marking of explosive hazards to include Improvised Explosive Devices (IED) and landmines. A specific goal of this effort was to assess how collaborative behaviors for multiple unmanned air and ground vehicles can reduce risks to Soldiers and increase efficiency for on and off route explosive hazard detection, reporting, and marking. This paper discusses experimental results achieved with a robotic countermine system

  19. The importance of assessing climate change vulnerability to address species conservation

    Treesearch

    Karen E. Bagne; Megan M. Friggens; Sharon J. Coe; Deborah M. Finch

    2014-01-01

    Species conservation often prioritizes attention on a small subset of "special status" species at high risk of extinction, but actions based on current lists of special status species may not effectively moderate biodiversity loss if climate change alters threats. Assessments of climate change vulnerability may provide a method to enhance identification of...

  20. Tsunami Hazard, Vulnerability and Risk assessment for the coast of Oman

    NASA Astrophysics Data System (ADS)

    Gonzalez, Mauricio; Aniel-Quiroga, Íñigo; Aguirre-Ayerbe, Ignacio; Álvarez-Gómez, José Antonio; MArtínez, Jara; Gonzalez-Riancho, Pino; Fernandez, Felipe; Medina, Raúl; Al-Yahyai, Sultan

    2016-04-01

    Tsunamis are relatively infrequent phenomena representing a greater threat than earthquakes, hurricanes and tornadoes, and causing the loss of thousands of human lives and extensive damage to coastal infrastructures around the world. Advances in the understanding and prediction of tsunami impacts allow the development of new methodologies in this field. This work presents the methodology that has been followed for developing the tsunami hazard, vulnerability and risk assessment for the coast of Oman, including maps containing the results of the process. Oman is located in the south eastern corner of the Arabian Peninsula and of the Arabian plate, in front of the Makran Subduction Zone (MSZ), which is the major source of earthquakes in the eastern border of the Arabian plate and Oman (Al-Shaqsi, 2012). There are at least three historical tsunamis assigned to seismic origin in the MSZ (Heidarzadeh et al., 2008; Jordan, 2008). These events show the high potential for tsunami generation of the MSZ, being one of the most tsunamigenic zones in the Indian Ocean. For the tsunami hazard assessment, worst potential cases have been selected, as well as the historical case of 1945, when an 8.1 earthquake generated a tsunami affecting the coast of Oman, and prompting 4000 casualties in the countries of the area. These scenarios have been computationally simulated in order to get tsunami hazard maps, including flooding maps. These calculations have been carried out at national and local scale, in 9 municipalities all along the coast of Oman, including the cities of Sohar, Wudam, Sawadi, Muscat, Quriyat, Sur, Masirah, Al Duqm, and Salalah. Using the hazard assessment as input, this work presents as well an integrated framework for the tsunami vulnerability and risk assessment carried out in the Sultanate of Oman. This framework considers different dimensions (human, structural) and it is developed at two different spatial resolutions, national and local scale. The national

  1. Assessment of social vulnerability to natural hazards in Nepal

    NASA Astrophysics Data System (ADS)

    Gautam, Dipendra

    2017-12-01

    This paper investigates district-wide social vulnerability to natural hazards in Nepal. Disasters such as earthquakes, floods, landslides, epidemics, and droughts are common in Nepal. Every year thousands of people are killed and huge economic and environmental losses occur in Nepal due to various natural hazards. Although natural hazards are well recognized, quantitative and qualitative social vulnerability mapping has not existed until now in Nepal. This study aims to quantify the social vulnerability on a local scale, considering all 75 districts using the available census. To perform district-level vulnerability mapping, 13 variables were selected and aggregated indexes were plotted in an ArcGIS environment. The sum of results shows that only 4 districts in Nepal have a very low social vulnerability index whereas 46 districts (61 %) are at moderate to high social vulnerability levels. Vulnerability mapping highlights the immediate need for decentralized frameworks to tackle natural hazards in district level; additionally, the results of this study can contribute to preparedness, planning and resource management, inter-district coordination, contingency planning, and public awareness efforts.

  2. Physical assessment of coastal vulnerability under enhanced land subsidence in Semarang, Indonesia, using multi-sensor satellite data

    NASA Astrophysics Data System (ADS)

    Husnayaen; Rimba, A. Besse; Osawa, Takahiro; Parwata, I. Nyoman Sudi; As-syakur, Abd. Rahman; Kasim, Faizal; Astarini, Ida Ayu

    2018-04-01

    Research has been conducted in Semarang, Indonesia, to assess coastal vulnerability under enhanced land subsidence using multi-sensor satellite data, including the Advanced Land Observing Satellite (ALOS) Phased Array type L-band SAR (PALSAR), Landsat TM, IKONOS, and TOPEX/Poseidon. A coastal vulnerability index (CVI) was constructed to estimate the level of vulnerability of a coastline approximately 48.68 km in length using seven physical variables, namely, land subsidence, relative sea level change, coastal geomorphology, coastal slope, shoreline change, mean tidal range, and significant wave height. A comparison was also performed between a CVI calculated using seven parameters and a CVI using six parameters, the latter of which excludes the land subsidence parameter, to determine the effects of land subsidence during the coastal vulnerability assessment. This study showed that the accuracy of coastal vulnerability was increased 40% by adding the land subsidence factor (i.e., CVI 6 parameters = 53%, CVI 7 parameters = 93%). Moreover, Kappa coefficient indicated very good agreement (0.90) for CVI 7 parameters and fair agreement (0.3) for CVI 6 parameters. The results indicate that the area of very high vulnerability increased by 7% when land subsidence was added. Hence, using the CVI calculation including land subsidence parameters, the very high vulnerability area is determined to be 20% of the total coastline or 9.7 km of the total 48.7 km of coastline. This study proved that land subsidence has significant influence on coastal vulnerability in Semarang.

  3. Photogrammetric point cloud compression for tactical networks

    NASA Astrophysics Data System (ADS)

    Madison, Andrew C.; Massaro, Richard D.; Wayant, Clayton D.; Anderson, John E.; Smith, Clint B.

    2017-05-01

    We report progress toward the development of a compression schema suitable for use in the Army's Common Operating Environment (COE) tactical network. The COE facilitates the dissemination of information across all Warfighter echelons through the establishment of data standards and networking methods that coordinate the readout and control of a multitude of sensors in a common operating environment. When integrated with a robust geospatial mapping functionality, the COE enables force tracking, remote surveillance, and heightened situational awareness to Soldiers at the tactical level. Our work establishes a point cloud compression algorithm through image-based deconstruction and photogrammetric reconstruction of three-dimensional (3D) data that is suitable for dissimination within the COE. An open source visualization toolkit was used to deconstruct 3D point cloud models based on ground mobile light detection and ranging (LiDAR) into a series of images and associated metadata that can be easily transmitted on a tactical network. Stereo photogrammetric reconstruction is then conducted on the received image stream to reveal the transmitted 3D model. The reported method boasts nominal compression ratios typically on the order of 250 while retaining tactical information and accurate georegistration. Our work advances the scope of persistent intelligence, surveillance, and reconnaissance through the development of 3D visualization and data compression techniques relevant to the tactical operations environment.

  4. Concept Map Value Propagation for Tactical Intelligence

    DTIC Science & Technology

    2007-06-01

    meaningful diagrams: KMap, SmartDraw , MindGenius, and so on. However, CmapTools is the package we are using for this project. The software , produced by the...Cmap, driven by expected variability in the value of a datum and cost to get a new value. We use the CmapTools software developed with DoD support at... software developed with DoD support at the Institute of Human and Machine Cognition as a structural basis for creating and assessing tactical Cmaps. The

  5. Development and assessment of indices to determine stream fish vulnerability to climate change and habitat alteration

    USGS Publications Warehouse

    Sievert, Nicholas A.; Paukert, Craig P.; Tsang, Yin-Phan; Infante, Dana M.

    2016-01-01

    Understanding the future impacts of climate and land use change are critical for long-term biodiversity conservation. We developed and compared two indices to assess the vulnerability of stream fish in Missouri, USA based on species environmental tolerances, rarity, range size, dispersal ability and on the average connectivity of the streams occupied by each species. These two indices differed in how environmental tolerance was classified (i.e., vulnerability to habitat alteration, changes in stream temperature, and changes to flow regimes). Environmental tolerance was classified based on measured species responses to habitat alteration, and extremes in stream temperatures and flow conditions for one index, while environmental tolerance for the second index was based on species’ traits. The indices were compared to determine if vulnerability scores differed by index or state listing status. We also evaluated the spatial distribution of species classified as vulnerable to habitat alteration, changes in stream temperature, and change in flow regimes. Vulnerability scores were calculated for all 133 species with the trait association index, while only 101 species were evaluated using the species response index, because 32 species lacked data to analyze for a response. Scores from the trait association index were greater than the species response index. This is likely due to the species response index's inability to evaluate many rare species, which generally had high vulnerability scores for the trait association index. The indices were consistent in classifying vulnerability to habitat alteration, but varied in their classification of vulnerability due to increases in stream temperature and alterations to flow regimes, likely because extremes in current climate may not fully capture future conditions and their influence on stream fish communities. Both indices showed higher mean vulnerability scores for listed species than unlisted species, which provided a coarse

  6. Personal Area Networks in Tactical Mobile Devices

    DTIC Science & Technology

    2014-08-01

    TECHNICAL DOCUMENT 2047 August 2014 Personal Area Networks in Tactical Mobile Devices Brian Visser...Tactical Mobile Devices Brian Visser Approved for public release. SSC Pacific San Diego, CA 92152-5001 SB...consistent power source, which is normally not available to patrols. In addition to the lack of computer resources, robust network infrastructure

  7. Assessment of vulnerability of forest ecosystems to climate change and adaptation planning in Nepal

    NASA Astrophysics Data System (ADS)

    Matin, M. A.; Chitale, V. S.

    2016-12-01

    Understanding ecosystem level vulnerability of forests and dependence of local communities on these ecosystems is a first step towards developing effective adaptation strategies. As forests are important components of livelihoods system for a large percentage of the population in the Himalayan region, they offer an important basis for creating and safeguarding more climate-resilient communities. Increased frequency, duration, and/or severity of drought and heat stress, changes in winter ecology, and pest and fire outbreaksunder climate change scenarios could fundamentally alter the composition, productivity and biogeography of forests affecting the potential ecosystem services offered and forest-based livelihoods. Hence, forest ecosystem vulnerability assessment to climate change and the development of a knowledgebase to identify and support relevant adaptation strategies is identified as an urgent need. Climate change vulnerability is measured as a function of exposure, sensitivity and the adaptive capacity of the system towards climate variability and extreme events. Effective adaptation to climate change depends on the availability of two important prerequisites: a) information on what, where, and how to adapt, and b) availability of resources to implement the adaptation measures. In the present study, we introduce the concept of two way multitier approach, which can support effective identification and implementation of adaptation measures in Nepal and the framework can be replicated in other countries in the HKH region. The assessment of overall vulnerability of forests comprises of two components: 1) understanding the relationship between exposure and sensitivity and positive feedback from adaptive capacity of forests; 2) quantifying the dependence of local communities on these ecosystems. We use climate datasets from Bioclim and biophysical products from MODIS, alongwith field datasets. We report that most of the forests along the high altitude areas and few

  8. Security and Vulnerability Assessment of Social Media Sites: An Exploratory Study

    ERIC Educational Resources Information Center

    Zhao, Jensen; Zhao, Sherry Y.

    2015-01-01

    While the growing popularity of social media has brought many benefits to society, it has also resulted in privacy and security threats. The authors assessed the security and vulnerability of 50 social media sites. The findings indicate that most sites (a) posted privacy and security policies but only a minority stated clearly their execution of…

  9. Vulnerability assessment to frost disaster in dieng volcanic highland using spatial multi-criteria evaluation

    NASA Astrophysics Data System (ADS)

    Pradana, A.; Rahmanu, Y. A.; Prabaningrum, I.; Nurafifa, I.; Hizbaron, D. R.

    2018-04-01

    Dieng Volcanic Highland is one of frost disaster prone area which is very unique phenomenon in tropical region. Frost indicated by appearance of frozen dew or ice layer on the ground or vegetation surface due air inversion and cold temperatures during midnight in dry season. Appearance of frost significantly causes plant damage and losses on agricultural land, while the impacts were strongly influenced by level of vulnerability within agricultural communities. This study aims to analyze the impact of frost on agricultural land in Dieng, to identify characteristics of physical, social, economic vulnerability and coping capacity of agricultural communities to frost disaster in Dieng, and to estimate total vulnerability of frost disasters in Dieng through SMCE scenario. Research was conducted in Dieng Village, Wonosobo and Dieng Kulon Village, Banjarnegara. Method to assess vulnerability level is performed by Spatial Multi Criteria Evaluation (SMCE) method using ILWIS software through a combination of physical, social, and economic vulnerability regarding frost hazard, as well as coping capacity of farmers. Data collected by interview within different agricultural plots using questionnaire and in-depth interview method on frost affected agricultural land. Impact of frost mostly causes damage on potato agricultural land than any other types of commodities, such as carrot, leek or cabbage. Losses varies in range of 0 million to 55 million rupiah, at most events in range of 10 million to 15 million rupiah during frost season on July-August-September. Main factors determining vulnerability comes from crop losses, preparedness effort, and type of commodity. Agricultural land dominated by high level physical vulnerability (95.37 percent), high level social vulnerability (70.79 percent), moderate level economic vulnerability (79.23 percent) and moderate level coping capacity (73.18 percent). All five scenarios indicated that level of total vulnerability vary only from

  10. 75 FR 51806 - Climate Change Vulnerability Assessment: Four Case Studies of Water Utility Practices

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-23

    ... case studies describing the approaches currently being taken by four water utilities to assess their... series of case studies describing the approaches currently being taken by four water utilities in the... Vulnerability Assessment: Four Case Studies of Water Utility Practices AGENCY: Environmental Protection Agency...

  11. MODIFIED FUNCTIONAL MOVEMENT SCREENING AS A PREDICTOR OF TACTICAL PERFORMANCE POTENTIAL IN RECREATIONALLY ACTIVE ADULTS.

    PubMed

    Glass, Stephen M; Ross, Scott E

    2015-10-01

    Failure to meet minimum performance standards is a leading cause of attrition from basic combat training. A standardized assessment such as the Functional Movement Screen™ (FMS™) could help identify movement behaviors relevant to physical performance in tactical occupations. Previous work has demonstrated only marginal association between FMS™ tests and performance outcomes, but adding a load challenge to this movement assessment may help highlight performance-limiting behaviors. The purposes of this investigation were to quantify the effect of load on FMS™ tests and determine the extent to which performance outcomes could be predicted using scores from both loaded and unloaded FMS™ conditions. Crossover Trial. Thirteen female and six male recreationally active college students (21 ± 1.37 years, 168 ± 9.8 cm, 66 ± 12.25 kg) completed the FMS™ under (1) a control condition (FMS™C), and (2) an 18.10kg weight vest condition (FMS™W). Balance was assessed using a force plate in double-legged stance and tactical physical performance was evaluated via completion times in a battery of field tests. For each condition, penalized regression was used to select models from the seven FMS™ component tests to predict balance and performance outcomes. Data were collected during a single session lasting approximately three hours per participant. For balance, significant predictors were identified from both conditions but primarily predicted poorer balance with increasing FMS™ scores. For tactical performance, models were retained almost exclusively from FMS™W and generally predicted better performance with higher item scores. The current results suggest that FMS™ screening with an external load could help predict performance relevant to tactical occupations. Sports medicine and fitness professionals interested in performance outcomes may consider assessing movement behaviors under a load. 3.

  12. Climate change vulnerability assessments as catalysts for social learning: four case studies in south-eastern Australia

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Preston, Benjamin L

    2012-01-01

    Technical assessments of vulnerability and/or risk are increasingly being undertaken to assess the impacts of climate change. Underlying this is the belief that they will bring clarity to questions regarding the scale of institutional investments required, plausible adaptation policies and measures, and the timing of their implementation. Despite the perceived importance of technical assessments in 'evidence-based' decision environments, assessments cannot be undertaken independent of values and politics, nor are they capable of eliminating the uncertainty that clouds decision-making on climate adaptation As such, assessments can trigger as many questions as they answer, leaving practitioners and stakeholders to question their value.more » This paper explores the value of vulnerability/risk assessments in climate change adaptation planning processes as a catalyst for learning in four case studies in Southeastern Australia. Data were collected using qualitative interviews with stakeholders involved in the assessments and analysed using a social learning framework. This analysis revealed that detailed and tangible strategies or actions often do not emerge directly from technical assessments. However, it also revealed that the assessments became important platforms for social learning. In providing these platforms, assessments present opportunities to question initial assumptions, explore multiple framings of an issue, generate new information, and galvanise support for collective actions. This study highlights the need for more explicit recognition and understanding of the important role social learning plays in climate change vulnerability assessments and adaptation planning more broadly.« less

  13. Appendix: Assessment of watershed vulnerability to climate change - Pilot National Forest reports

    Treesearch

    Michael J. Furniss; Ken B. Roby; Dan Cenderelli; John Chatel; Caty F. Clifton; Alan Clingenpeel; Polly E. Hays; Dale Higgins; Ken Hodges; Carol Howe; Laura Jungst; Joan Louie; Christine Mai; Ralph Martinez; Kerry Overton; Brian P. Staab; Rory Steinke; Mark Weinhold

    2013-01-01

    Assessment of watershed vulnerability to climate change. Pilot National Forest reports: Gallatin National Forest, Helena National Forest, Grand Mesa, Uncompahgre, and Gunnison National Forests, White River National Forest, Coconino National Forest, Sawtooth National Forest, Shasta-Trinity National Forest, Umatilla National Forest, Umatilla National Forest, Ouachita...

  14. Use of the NatureServe Climate Change Vulnerability Index as an Assessment Tool for Reptiles and Amphibians: Lessons Learned.

    PubMed

    Tuberville, Tracey D; Andrews, Kimberly M; Sperry, Jinelle H; Grosse, Andrew M

    2015-10-01

    Climate change threatens biodiversity globally, yet it can be challenging to predict which species may be most vulnerable. Given the scope of the problem, it is imperative to rapidly assess vulnerability and identify actions to decrease risk. Although a variety of tools have been developed to assess climate change vulnerability, few have been evaluated with regard to their suitability for certain taxonomic groups. Due to their ectothermic physiology, low vagility, and strong association with temporary wetlands, reptiles and amphibians may be particularly vulnerable relative to other groups. Here, we evaluate use of the NatureServe Climate Change Vulnerability Index (CCVI) to assess a large suite of herpetofauna from the Sand Hills Ecoregion of the southeastern United States. Although data were frequently lacking for certain variables (e.g., phenological response to climate change, genetic variation), sufficient data were available to evaluate all 117 species. Sensitivity analyses indicated that results were highly dependent on size of assessment area and climate scenario selection. In addition, several ecological traits common in, but relatively unique to, herpetofauna are likely to contribute to their vulnerability and need special consideration during the scoring process. Despite some limitations, the NatureServe CCVI was a useful tool for screening large numbers of reptile and amphibian species. We provide general recommendations as to how the CCVI tool's application to herpetofauna can be improved through more specific guidance to the user regarding how to incorporate unique physiological and behavioral traits into scoring existing sensitivity factors and through modification to the assessment tool itself.

  15. Use of the NatureServe Climate Change Vulnerability Index as an Assessment Tool for Reptiles and Amphibians: Lessons Learned

    NASA Astrophysics Data System (ADS)

    Tuberville, Tracey D.; Andrews, Kimberly M.; Sperry, Jinelle H.; Grosse, Andrew M.

    2015-10-01

    Climate change threatens biodiversity globally, yet it can be challenging to predict which species may be most vulnerable. Given the scope of the problem, it is imperative to rapidly assess vulnerability and identify actions to decrease risk. Although a variety of tools have been developed to assess climate change vulnerability, few have been evaluated with regard to their suitability for certain taxonomic groups. Due to their ectothermic physiology, low vagility, and strong association with temporary wetlands, reptiles and amphibians may be particularly vulnerable relative to other groups. Here, we evaluate use of the NatureServe Climate Change Vulnerability Index (CCVI) to assess a large suite of herpetofauna from the Sand Hills Ecoregion of the southeastern United States. Although data were frequently lacking for certain variables (e.g., phenological response to climate change, genetic variation), sufficient data were available to evaluate all 117 species. Sensitivity analyses indicated that results were highly dependent on size of assessment area and climate scenario selection. In addition, several ecological traits common in, but relatively unique to, herpetofauna are likely to contribute to their vulnerability and need special consideration during the scoring process. Despite some limitations, the NatureServe CCVI was a useful tool for screening large numbers of reptile and amphibian species. We provide general recommendations as to how the CCVI tool's application to herpetofauna can be improved through more specific guidance to the user regarding how to incorporate unique physiological and behavioral traits into scoring existing sensitivity factors and through modification to the assessment tool itself.

  16. Collective bargaining: a vulnerability assessment.

    PubMed

    Fitzpatrick, M A

    2001-02-01

    When it comes to the "soft side" of health care, employees want to be informed, respected, and included in decisions that affect their ability to care for patients with pride and satisfaction. Union vulnerability is low when staff satisfaction and morale are high.

  17. The classification and assessment of vulnerability of man-land system of oasis city in arid area

    NASA Astrophysics Data System (ADS)

    Gao, Chao; Lei, Jun; Jin, Fengjun

    2013-12-01

    Oasis city system is the center of the man-land relationship in arid area and it is the most influential spatial and temporal multiple dynamic system. Oasis city system is not only the largest area where artificial disturbances occur at a regional scale but also the most concentrated area of human activity in arid area. In this study, we developed an applicable and convenient method to assess vulnerability of man-land system of oasis cities with vulnerability indicator system, respectively evaluating the sensitivity, adaptability and vulnerability of the eco-environment system, the economic system and the social system. The results showed that the sensitivity and vulnerability of oasis cities in Xinjiang, China have significant differences while their adaptability does little. In order to find the inherent differences in the vulnerability of oasis cities, triangle methodology has been adopted to divide Xinjiang oasis cities into five types. Some adaptive developing policies specific for individual cities are also proposed based on their vulnerability type and constraining factors.

  18. A Vulnerability Assessment of Fish and Invertebrates to Climate Change on the Northeast U.S. Continental Shelf.

    PubMed

    Hare, Jonathan A; Morrison, Wendy E; Nelson, Mark W; Stachura, Megan M; Teeters, Eric J; Griffis, Roger B; Alexander, Michael A; Scott, James D; Alade, Larry; Bell, Richard J; Chute, Antonie S; Curti, Kiersten L; Curtis, Tobey H; Kircheis, Daniel; Kocik, John F; Lucey, Sean M; McCandless, Camilla T; Milke, Lisa M; Richardson, David E; Robillard, Eric; Walsh, Harvey J; McManus, M Conor; Marancik, Katrin E; Griswold, Carolyn A

    2016-01-01

    Climate change and decadal variability are impacting marine fish and invertebrate species worldwide and these impacts will continue for the foreseeable future. Quantitative approaches have been developed to examine climate impacts on productivity, abundance, and distribution of various marine fish and invertebrate species. However, it is difficult to apply these approaches to large numbers of species owing to the lack of mechanistic understanding sufficient for quantitative analyses, as well as the lack of scientific infrastructure to support these more detailed studies. Vulnerability assessments provide a framework for evaluating climate impacts over a broad range of species with existing information. These methods combine the exposure of a species to a stressor (climate change and decadal variability) and the sensitivity of species to the stressor. These two components are then combined to estimate an overall vulnerability. Quantitative data are used when available, but qualitative information and expert opinion are used when quantitative data is lacking. Here we conduct a climate vulnerability assessment on 82 fish and invertebrate species in the Northeast U.S. Shelf including exploited, forage, and protected species. We define climate vulnerability as the extent to which abundance or productivity of a species in the region could be impacted by climate change and decadal variability. We find that the overall climate vulnerability is high to very high for approximately half the species assessed; diadromous and benthic invertebrate species exhibit the greatest vulnerability. In addition, the majority of species included in the assessment have a high potential for a change in distribution in response to projected changes in climate. Negative effects of climate change are expected for approximately half of the species assessed, but some species are expected to be positively affected (e.g., increase in productivity or move into the region). These results will inform

  19. A Vulnerability Assessment of Fish and Invertebrates to Climate Change on the Northeast U.S. Continental Shelf

    PubMed Central

    Hare, Jonathan A.; Morrison, Wendy E.; Nelson, Mark W.; Stachura, Megan M.; Teeters, Eric J.; Griffis, Roger B.; Alexander, Michael A.; Scott, James D.; Alade, Larry; Bell, Richard J.; Chute, Antonie S.; Curti, Kiersten L.; Curtis, Tobey H.; Kircheis, Daniel; Kocik, John F.; Lucey, Sean M.; McCandless, Camilla T.; Milke, Lisa M.; Richardson, David E.; Robillard, Eric; Walsh, Harvey J.; McManus, M. Conor; Marancik, Katrin E.; Griswold, Carolyn A.

    2016-01-01

    Climate change and decadal variability are impacting marine fish and invertebrate species worldwide and these impacts will continue for the foreseeable future. Quantitative approaches have been developed to examine climate impacts on productivity, abundance, and distribution of various marine fish and invertebrate species. However, it is difficult to apply these approaches to large numbers of species owing to the lack of mechanistic understanding sufficient for quantitative analyses, as well as the lack of scientific infrastructure to support these more detailed studies. Vulnerability assessments provide a framework for evaluating climate impacts over a broad range of species with existing information. These methods combine the exposure of a species to a stressor (climate change and decadal variability) and the sensitivity of species to the stressor. These two components are then combined to estimate an overall vulnerability. Quantitative data are used when available, but qualitative information and expert opinion are used when quantitative data is lacking. Here we conduct a climate vulnerability assessment on 82 fish and invertebrate species in the Northeast U.S. Shelf including exploited, forage, and protected species. We define climate vulnerability as the extent to which abundance or productivity of a species in the region could be impacted by climate change and decadal variability. We find that the overall climate vulnerability is high to very high for approximately half the species assessed; diadromous and benthic invertebrate species exhibit the greatest vulnerability. In addition, the majority of species included in the assessment have a high potential for a change in distribution in response to projected changes in climate. Negative effects of climate change are expected for approximately half of the species assessed, but some species are expected to be positively affected (e.g., increase in productivity or move into the region). These results will inform

  20. Multi-criteria evaluation of hydro-geological and anthropogenic parameters for the groundwater vulnerability assessment.

    PubMed

    Kumar, Prashant; Thakur, Praveen K; Bansod, Baban Ks; Debnath, Sanjit K

    2017-10-16

    Groundwater contamination assessment is a challenging task due to inherent complex dynamisms associated with the groundwater. DRASTIC is a very widely used rapid regional tool for the assessment of vulnerability of groundwater to contamination. DRASTIC has many lacunas in the form of subjectivities associated with weights and ratings of its hydro-geological parameters, and, therefore, the accuracy of the DRASTIC-based vulnerability map is questioned. The present study demonstrates the optimisation of the DRASTIC parameters along with a scientific consideration to the anthropogenic factors causing groundwater contamination. The resulting scientific consistent weights and ratings to DRASTIC parameters assist in the development of a very precise groundwater vulnerability map highlighting different zones of different gravity of contamination. One of the most important aspects of this study is that we have considered the impact of vadose zone in a very comprehensive manner by considering every sub-surface layer from the earth surface to the occurrence of groundwater. The study area for our experiment is Fatehgarh Sahib district of Punjab which is facing several groundwater issues.

  1. Using standard clinical assessments for home care to identify vulnerable populations before, during, and after disasters.

    PubMed

    van Solm, Alexandra I T; Hirdes, John P; Eckel, Leslie A; Heckman, George A; Bigelow, Philip L

    Several studies have shown the increased vulnerability of and disproportionate mortality rate among frail community-dwelling older adults as a result of emergencies and disasters. This article will discuss the applicability of the Vulnerable Persons at Risk (VPR) and VPR Plus decision support algorithms designed based on the Resident Assessment Instrument-Home Care (RAI-HC) to identify the most vulnerable community-dwelling (older) adults. A sample was taken from the Ontario RAI-HC database by selecting unique home care clients with assessments closest to December 31, 2014 (N = 275,797). Statistical methods used include cross tabulation, bivariate logistic regression as well as Kaplan-Meier survival plotting and Cox proportional hazards ratios calculations. The VPR and VPR Plus algorithms, were highly predictive of mortality, long-term care admission and hospitalization in ordinary circumstances. This provides a good indication of the strength of the algorithms in identifying vulnerable persons at times of emergencies. Access to real-time person-level information of persons with functional care needs is a vital enabler for emergency responders in prioritizing and allocating resources during a disaster, and has great utility for emergency planning and recovery efforts. The development of valid and reliable algorithms supports the rapid identification and response to vulnerable community-dwelling persons for all phases of emergency management.

  2. AirLand Battle and Tactical Command and Control Automation,

    DTIC Science & Technology

    1987-01-07

    Army Tactical Command and Control System (ATCCS) are the primary subjects of the last period. The precepts of AirLand Battle doctrine are examined to...AirLand Battle and the Army Tactical Command and Control System (ATCCS) are thE primary subjects of the last period. The precepts of AirLand Battle...centralized control is identified. AirLand Battle and the Army Tactical Command and Control System (ATCCS) are the primary subjects of the last

  3. Data related uncertainty in near-surface vulnerability assessments for agrochemicals in the San Joaquin Valley.

    PubMed

    Loague, Keith; Blanke, James S; Mills, Melissa B; Diaz-Diaz, Ricardo; Corwin, Dennis L

    2012-01-01

    Precious groundwater resources across the United States have been contaminated due to decades-long nonpoint-source applications of agricultural chemicals. Assessing the impact of past, ongoing, and future chemical applications for large-scale agriculture operations is timely for designing best-management practices to prevent subsurface pollution. Presented here are the results from a series of regional-scale vulnerability assessments for the San Joaquin Valley (SJV). Two relatively simple indices, the retardation and attenuation factors, are used to estimate near-surface vulnerabilities based on the chemical properties of 32 pesticides and the variability of both soil characteristics and recharge rates across the SJV. The uncertainties inherit to these assessments, derived from the uncertainties within the chemical and soil data bases, are estimated using first-order analyses. The results are used to screen and rank the chemicals based on mobility and leaching potential, without and with consideration of data-related uncertainties. Chemicals of historic high visibility in the SJV (e.g., atrazine, DBCP [dibromochloropropane], ethylene dibromide, and simazine) are ranked in the top half of those considered. Vulnerability maps generated for atrazine and DBCP, featured for their legacy status in the study area, clearly illustrate variations within and across the assessments. For example, the leaching potential is greater for DBCP than for atrazine, the leaching potential for DBCP is greater for the spatially variable recharge values than for the average recharge rate, and the leaching potentials for both DBCP and atrazine are greater for the annual recharge estimates than for the monthly recharge estimates. The data-related uncertainties identified in this study can be significant, targeting opportunities for improving future vulnerability assessments. Copyright © by the American Society of Agronomy, Crop Science Society of America, and Soil Science Society of America

  4. Using the analytical hierarchy process to assess the environmental vulnerabilities of basins in Taiwan.

    PubMed

    Chang, Chia-Ling; Chao, Yu-Chi

    2012-05-01

    Every year, Taiwan endures typhoons and earthquakes; these natural hazards often induce landslides and debris flows. Therefore, watershed management strategies must consider the environmental vulnerabilities of local basins. Because many factors affect basin ecosystems, this study applied multiple criteria analysis and the analytical hierarchy process (AHP) to evaluate seven criteria in three phases (geographic phase, hydrologic phase, and societal phase). This study focused on five major basins in Taiwan: the Tan-Shui River Basin, the Ta-Chia River Basin, the Cho-Shui River Basin, the Tseng-Wen River Basin, and the Kao-Ping River Basin. The objectives were a comprehensive examination of the environmental characteristics of these basins and a comprehensive assessment of their environmental vulnerabilities. The results of a survey and AHP analysis showed that landslide area is the most important factor for basin environmental vulnerability. Of all these basins, the Cho-Shui River Basin in central Taiwan has the greatest environmental vulnerability.

  5. Constructing the Indicators of Assessing Human Vulnerability to Industrial Chemical Accidents: A Consensus-based Fuzzy Delphi and Fuzzy AHP Approach.

    PubMed

    Fatemi, Farin; Ardalan, Ali; Aguirre, Benigno; Mansouri, Nabiollah; Mohammadfam, Iraj

    2017-04-10

    Industrial chemical accidents have been increased in developing countries. Assessing the human vulnerability in the residents of industrial areas is necessary for reducing the injuries and causalities of chemical hazards. The aim of this study was to explore the key indicators for the assessment of human vulnerability in the residents living near chemical installations. The indicators were established in the present study based on the Fuzzy Delphi method (FDM) and Fuzzy Analytic Hierarchy Process (FAHP). The reliability of FDM and FAHP was calculated. The indicators of human vulnerability were explored in two sets of social and physical domains. Thirty-five relevant experts participated in this study during March-July 2015. According to experts, the top three indicators of human vulnerability according to the FDM and FAHP were vulnerable groups, population density, and awareness. Detailed sub-vulnerable groups and awareness were developed based on age, chronic or severe diseases, disability, first responders, and residents, respectively. Each indicator and sub-indicator was weighted and ranked and had an acceptable consistency ratio. The importance of social vulnerability indicators are about 7 times more than physical vulnerability indicators. Among the extracted indicators, vulnerable groups had the highest weight and the greatest impact on human vulnerability. however, further research is needed to investigate the applicability of established indicators and generalizability of the results to other studies. Fuzzy Delphi; Fuzzy AHP; Human vulnerability; Chemical hazards.

  6. [Vulnerability assessment of eco-environment in Yimeng mountainous area of Shandong Province based on SRP conceptual model].

    PubMed

    Liu, Zheng-jia; Yu, Xing-xiu; Li, Lei; Huang, Mei

    2011-08-01

    Based on the ecological sensitivity-resilience-pressure (SRP) conceptual model, and selecting 13 indices including landscape diversity index, soil erosion, and elevation, etc. , the vulnerability of the eco-environment in Yimeng mountainous area of Shandong Province was assessed under the support of GIS and by using principal component analysis and hierarchy analytical method. According to the eco-environmental vulnerability index (EVI) values, the eco-environment vulnerability of study area was classified into 5 levels, i.e., slight (<1.8), light (1.8-2.8), moderate (2.8-3.5), heavy (3.5-4.0), and extreme vulnerability (>4.0). In the study area, moderately vulnerable area occupied 43.3% of the total, while the slightly, lightly, heavily, and extremely vulnerable areas occupied 6.1%, 33.8%, 15.9%, and 0.9%, respectively. The heavily and extremely vulnerable areas mainly located in the topographically complicated hilly area or the hill-plain ecotone with frequent human activities.

  7. Spatial-temporal eco-environmental vulnerability assessment and its influential factors based on Landsat data

    NASA Astrophysics Data System (ADS)

    Anh, N. K.; Liou, Y. A.; Ming-Hsu, L.

    2016-12-01

    Regional land use/land cover (LULC) changes lead to various changes in ecological processes and, in turn, alter regional micro-climate. To understand eco-environmental responses to LULC changes, eco-environmental evaluation is thus required with aims to identify vulnerable regions and influential factors, so that practical measures for environmental protection and management may be proposed. The Thua Thien - Hue Province has been experiencing urbanization at a rapid rate in both population and physical size. The urban land, agricultural land, and aquaculture activities have been invasively into natural space and caused eco-environment deterioration by land desertification, soil erosion, shrinking forest resources,…etc. In this study, an assessment framework that is composed by 11 variables with 9 of them constructed from Landsat time series is proposed to serve as basis to examine eco-environmental vulnerability in the Thua Thien - Hue Province in years 1989, 2003, and 2014. An eco-environmental vulnerability map is assorted into six vulnerability levels consisting of potential, slight, light, medium, heavy, and very heavy vulnerabilities. Result shows that there is an increasing trend in eco-environmental vulnerability in general with expected evolving distributions in heavy and very heavy vulnerability levels, which mainly lying on developed land, bare land, semi bare land, agricultural land, and poor and recovery forests. In contrast, there is a significant decline in potential vulnerability level. The contributing factors of an upward trend in medium, heavy, and very heavy levels include: (i) a large natural forest converted to plantation forest and agriculture land; and (ii) significant expansion of developed land leading to difference in thermal signatures in urban areas as compared with those of the surrounding areas. It is concluded that anthropogenic processes with transformation on LULC has amplified the vulnerability of eco-environment in the study

  8. Coastal vulnerability assessment with the use of environmental and socio-economic indicators

    NASA Astrophysics Data System (ADS)

    Alexandrakis, George; Petrakis, Stelios; Vousdoukas, Mixalis; Ghionis, George; Hatziyanni, Eleni; Kampanis, Nikolaos

    2014-05-01

    Climate change has significant repercussions on the natural environment, triggering obvious changes in the natural processes that have a severe socio-economic impact on the coastal zone; where a great number of human activities are concentrated. So far, the estimation of coastal vulnerability was based primarily on the natural processes and less on socio-economic variables, which would assist in the identification of vulnerable areas. The present investigation proposes a methodology to examine the vulnerability of a highly touristic area in the Island of Crete to an expected sea level rise of up to ~40 cm by the year 2100, according to the A1B scenario of IPCC 2007. The methodology includes the combination of socio-economic indicators into a GIS-based coastal vulnerability index for wave-induced erosion. This approach includes three sub-indices that contribute equally to the overall index. The sub-indices refer to coastal forcing, socio-economic and coastal characteristics. All variables are ranked on a 1-5 scale with 5 indicating higher vulnerability. The socio-economic sub-index includes, as indicators, the population of the study area, cultural heritage sites, transport networks, land use and protection measures. The coastal forcing sub-index includes the frequency of extreme events, while the Coastal Vulnerability Index includes the geological variables (coastal geomorphology, historical coastline changes, and regional coastal slope) and the variables representing the marine processes (relative sea level rise, mean significant wave height, and tidal range). The main difficulty for the estimation of the index lies in assessing and ranking the socio-economic indicators. The whole approach was tested and validated through field and desktop studies, using as a case study the Elouda bay, Crete Isl., an area of high cultural and economic value, which combines monuments from ancient and medieval times, with a very high touristic development since the 1970s.

  9. Effect of playing tactics on goal scoring in Norwegian professional soccer.

    PubMed

    Tenga, Albin; Holme, Ingar; Ronglan, Lars Tore; Bahr, Roald

    2010-02-01

    Methods that include an assessment of opponent interactions are thought to provide a more valid analysis of team match performance. The purpose of this study was to examine the effect of playing tactics on goal scoring by assessing opponent interactions in Norwegian elite soccer. The sample included 203 team possessions leading to goals (cases) and 1688 random team possessions (control group) from 163 of 182 (90%) matches played in the men's professional league during the 2004 season. Multidimensional qualitative data using ten ordered categorical variables were obtained to characterize each team possession. The proportion of goals scored during counterattacks (52%) was higher than during elaborate attacks (48%), while for the control group the proportion using elaborate attacks (59%) was higher than when using counterattacks (41%) (P = 0.002). Multiple logistic regression analyses showed that, for the main variable "team possession type", counterattacks were more effective than elaborate attacks when playing against an imbalanced defence (OR = 1.64; 95% confidence interval: 1.03 to 2.61; P = 0.038). Assessment of opponent interactions is critical to evaluate the effectiveness of offensive playing tactics on the probability of scoring goals, and improves the validity of team match-performance analysis in soccer.

  10. Beyond exposure, sensitivity and adaptive capacity: A response based ecological framework to assess species climate change vulnerability

    USGS Publications Warehouse

    Fortini, Lucas B.; Schubert, Olivia

    2017-01-01

    As the impacts of global climate change on species are increasingly evident, there is a clear need to adapt conservation efforts worldwide. Species vulnerability assessments (VAs) are increasingly used to summarize all relevant information to determine a species’ potential vulnerability to climate change and are frequently the first step in informing climate adaptation efforts. VAs commonly integrate multiple sources of information by utilizing a framework that distinguishes factors relevant to species exposure, sensitivity, and adaptive capacity. However, this framework was originally developed for human systems, and its use to evaluate species vulnerability has serious practical and theoretical limitations. By instead defining vulnerability as the degree to which a species is unable to exhibit any of the responses necessary for persistence under climate change (i.e., toleration of projected changes, migration to new climate-compatible areas, enduring in microrefugia, and evolutionary adaptation), we can bring VAs into the realm of ecological science without applying borrowed abstract concepts that have consistently challenged species-centric research and management. This response-based framework to assess species vulnerability to climate change allows better integration of relevant ecological data and past research, yielding results with much clearer implications for conservation and research prioritization.

  11. Space System Applications to Tactical Operations.

    DTIC Science & Technology

    1984-10-01

    AD-AI51 884 SPACE SYSTEM APPLICATIONS TO TACTICAL OPERATIONSIU) I, ADVISORY GROU)P FOR AEROSPACE RESEARCH AND DEVELOPMENT NEUILIT-SUR-SEINE (FRANCE...FOR1’ AIIII [ I [IiP[E REEAC [ [llllvd[ N I AGARD CONFERENCE PROCEEDINGS No.344 Space System Applications to Tactical Operations DTIC ELECTE...nota %ii. .tm’ ih1.1i .Il t oning oiii.ian later oil Ili thre centturv are charaeteri/ed. Bloth the ad’.antage’. and limitation%. iii space ’.’.’tem

  12. [Integrated assessment of eco-environmental vulnerability in Pearl River Delta based on RS and GIS].

    PubMed

    Xu, Qing-Yong; Huang, Mei; Liu, Hong-Sheng; Yan, Hui-Min

    2011-11-01

    Based on the remote sensing data and with the help of geographic information system, an integrated assessment was conducted on the eco-environmental vulnerability of Pearl River Delta in 2004-2008. Spatial principal component analysis was used to generate the evaluation indicators, and analytic hierarchy process (AHP) was applied to determine the weights of the evaluation factors. The reasons causing the vulnerability of the eco- environment in Pearl River Delta were discussed. In the study area, its middle part was the most vulnerable region, occupying 34.0% of the total, eastern part was the moderately vulnerable region, accounting for 25.5%, and western part was the lightly and slightly vulnerable areas, accounting for 28.7 and 11.8%, respectively. Totally, the moderately and lightly vulnerable areas occupied 54.2%, indicating that a majority of the Delta was under moderate and light vulnerability. The natural factors affecting the eco-environmental vulnerability of the Delta were altitude, heavy rain days, water and soil erosion rate, flooded infield rate, normalized difference vegetation index (ND VI) and landscape diversity index, whereas the human factors were population density, waste discharge per unit area, exhaust emission per unit area, land use change, chemical fertilization intensity, pesticide application intensity, amount of motor vehicles possessed by ten thousands people, and index of environmental protection investment. The main characteristics of the extremely and heavily vulnerable regions were low altitude, high frequency of flood disaster, large flooded infield, serious vegetation degradation, high pollution level and low environment protection investment index.

  13. Quantitative risk assessment using empirical vulnerability functions from debris flow event reconstruction

    NASA Astrophysics Data System (ADS)

    Luna, Byron Quan; Blahut, Jan; Camera, Corrado; van Westen, Cees; Sterlacchini, Simone; Apuani, Tiziana; Akbas, Sami

    2010-05-01

    For a quantitative risk assessment framework it is essential to assess not only the hazardous process itself but to perform an analysis of their consequences. This quantitative assessment should include the expected monetary losses as the product of the probability of occurrence of a hazard with a given magnitude and its vulnerability. A quantifiable integrated approach of both hazard and risk is becoming a required practice in risk reduction management. Dynamic run-out models for debris flows are able to calculate physical outputs (extension, depths, velocities, impact pressures) and to determine the zones where the elements at risk could suffer an impact. These results are then applied for vulnerability and risk calculations. The risk assessment has been conducted in the Valtellina Valley, a typical Italian alpine valley lying in northern Italy (Lombardy Region). On 13th July 2008, after more than two days of intense rainfall, several debris and mud flows were released in the central part of valley between Morbegno and Berbenno. One of the largest debris flows occurred in Selvetta. The debris flow event was reconstructed after extensive field work and interviews with local inhabitants and civil protection teams. Also inside the Valtellina valley, between the 22nd and the 23rd of May 1983, two debris flows happened in Tresenda (Teglio municipality), causing casualties and considerable economic damages. On the same location, during the 26th of November 2002, another debris flow occurred that caused significant damage. For the quantification of a new scenario, the outcome results obtained from the event of Selvetta were applied in Tresenda. The Selvetta and Tresenda event were modelled with the FLO2D program. FLO2D is an Eulerian formulation with a finite differences numerical scheme that requires the specification of an input hydrograph. The internal stresses are isotropic and the basal shear stresses are calculated using a quadratic model. The significance of

  14. Indicator-based model to assess vulnerability to landslides in urban areas. Case study of Husi city (Eastern Romania)

    NASA Astrophysics Data System (ADS)

    Grozavu, Adrian; Ciprian Margarint, Mihai; Catalin Stanga, Iulian

    2013-04-01

    In the last three or four decades, vulnerability evolved from physical fragility meanings to a more complex concept, being a key element of risk assessment. In landslide risk assessment, there are a large series of studies regarding landslide hazard, but far fewer researches focusing on vulnerability measurement. Furthermore, there is still no unitary understanding on the methodological framework, neither any internationally agreed standard for landslide vulnerability measurements. The omnipresent common element is the existence of elements at risk, but while some approaches are limited to exposure, other focus on the degree of losses (human injuries, material damages and monetary losses, structural dysfunctions etc.). These losses are differently assessed using both absolute and relative values on qualitative or quantitative scales and they are differently integrated to provide a final vulnerability value. This study aims to assess vulnerability to landslides at local level using an indicator-based model applied to urban areas and tested for Husi town (Eastern Romania). The study region is characterized by permeable and impermeable alternating sedimentary rocks, monoclinal geological structure and hilly relief with impressive cuestas, continental temperate climate, and precipitation of about 500 mm/year, rising to 700 m and even more in some rainy years. The town is a middle size one (25000 inhabitants) and it had an ascending evolution in the last centuries, followed by an increasing human pressure on lands. Methodologically, the first step was to assess the landslide susceptibility and to identify in this way those regions within which any asset would be exposed to landslide hazards. Landslide susceptibility was assessed using the logistic regression approach, taking into account several quantitative and qualitative factors (elements of geology, morphometry, rainfall, land use etc.). The spatial background consisted in the Digital Elevation Model and all derived

  15. Tactical Nuclear Weapons: Their Purpose and Placement

    DTIC Science & Technology

    2015-06-01

    War II, nuclear scientists argued against the development of fusion weapons .3 In the 1970s, politicians debated the use of neutron bombs, weapons ...Tactical Nuclear Weapons : Their Purpose and Placement BY EDWARD G. FERGUSON A THESIS SUBMITTED TO THE FACULTY OF THE...This study answers the question -- Why does America have tactical nuclear weapons (TNWs) in Europe today? – treating America and the North

  16. Extraction of features from ultrasound acoustic emissions: a tool to assess the hydraulic vulnerability of Norway spruce trunkwood?

    PubMed Central

    Rosner, Sabine; Klein, Andrea; Wimmer, Rupert; Karlsson, Bo

    2011-01-01

    Summary • The aim of this study was to assess the hydraulic vulnerability of Norway spruce (Picea abies) trunkwood by extraction of selected features of acoustic emissions (AEs) detected during dehydration of standard size samples. • The hydraulic method was used as the reference method to assess the hydraulic vulnerability of trunkwood of different cambial ages. Vulnerability curves were constructed by plotting the percentage loss of conductivity vs an overpressure of compressed air. • Differences in hydraulic vulnerability were very pronounced between juvenile and mature wood samples; therefore, useful AE features, such as peak amplitude, duration and relative energy, could be filtered out. The AE rates of signals clustered by amplitude and duration ranges and the AE energies differed greatly between juvenile and mature wood at identical relative water losses. • Vulnerability curves could be constructed by relating the cumulated amount of relative AE energy to the relative loss of water and to xylem tension. AE testing in combination with feature extraction offers a readily automated and easy to use alternative to the hydraulic method. PMID:16771986

  17. Online Pedagogical Tutorial Tactics Optimization Using Genetic-Based Reinforcement Learning.

    PubMed

    Lin, Hsuan-Ta; Lee, Po-Ming; Hsiao, Tzu-Chien

    2015-01-01

    Tutorial tactics are policies for an Intelligent Tutoring System (ITS) to decide the next action when there are multiple actions available. Recent research has demonstrated that when the learning contents were controlled so as to be the same, different tutorial tactics would make difference in students' learning gains. However, the Reinforcement Learning (RL) techniques that were used in previous studies to induce tutorial tactics are insufficient when encountering large problems and hence were used in offline manners. Therefore, we introduced a Genetic-Based Reinforcement Learning (GBML) approach to induce tutorial tactics in an online-learning manner without basing on any preexisting dataset. The introduced method can learn a set of rules from the environment in a manner similar to RL. It includes a genetic-based optimizer for rule discovery task by generating new rules from the old ones. This increases the scalability of a RL learner for larger problems. The results support our hypothesis about the capability of the GBML method to induce tutorial tactics. This suggests that the GBML method should be favorable in developing real-world ITS applications in the domain of tutorial tactics induction.

  18. Online Pedagogical Tutorial Tactics Optimization Using Genetic-Based Reinforcement Learning

    PubMed Central

    Lin, Hsuan-Ta; Lee, Po-Ming; Hsiao, Tzu-Chien

    2015-01-01

    Tutorial tactics are policies for an Intelligent Tutoring System (ITS) to decide the next action when there are multiple actions available. Recent research has demonstrated that when the learning contents were controlled so as to be the same, different tutorial tactics would make difference in students' learning gains. However, the Reinforcement Learning (RL) techniques that were used in previous studies to induce tutorial tactics are insufficient when encountering large problems and hence were used in offline manners. Therefore, we introduced a Genetic-Based Reinforcement Learning (GBML) approach to induce tutorial tactics in an online-learning manner without basing on any preexisting dataset. The introduced method can learn a set of rules from the environment in a manner similar to RL. It includes a genetic-based optimizer for rule discovery task by generating new rules from the old ones. This increases the scalability of a RL learner for larger problems. The results support our hypothesis about the capability of the GBML method to induce tutorial tactics. This suggests that the GBML method should be favorable in developing real-world ITS applications in the domain of tutorial tactics induction. PMID:26065018

  19. Ultra Wideband (UWB) communication vulnerability for security applications.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cooley, H. Timothy

    2010-07-01

    RF toxicity and Information Warfare (IW) are becoming omnipresent posing threats to the protection of nuclear assets, and within theatres of hostility or combat where tactical operation of wireless communication without detection and interception is important and sometimes critical for survival. As a result, a requirement for deployment of many security systems is a highly secure wireless technology manifesting stealth or covert operation suitable for either permanent or tactical deployment where operation without detection or interruption is important The possible use of ultra wideband (UWB) spectrum technology as an alternative physical medium for wireless network communication offers many advantages overmore » conventional narrowband and spread spectrum wireless communication. UWB also known as fast-frequency chirp is nonsinusoidal and sends information directly by transmitting sub-nanosecond pulses without the use of mixing baseband information upon a sinusoidal carrier. Thus UWB sends information using radar-like impulses by spreading its energy thinly over a vast spectrum and can operate at extremely low-power transmission within the noise floor where other forms of RF find it difficult or impossible to operate. As a result UWB offers low probability of detection (LPD), low probability of interception (LPI) as well as anti-jamming (AJ) properties in signal space. This paper analyzes and compares the vulnerability of UWB to narrowband and spread spectrum wireless network communication.« less

  20. Benefit Assessment for Metroplex Tactical Runway Configuration Management (mTRCM) in a Simulated Environment

    NASA Technical Reports Server (NTRS)

    Phojanamongkolkij, Nipa; Oseguera-Lohr, Rosa M.; Lohr, Gary W.; Robbins, Steven W.; Fenbert, James W.; Hartman, Christopher L.

    2015-01-01

    The System-Oriented Runway Management (SORM) concept is a collection of capabilities focused on a more efficient use of runways while considering all of the factors that affect runway use. Tactical Runway Configuration Management (TRCM), one of the SORM capabilities, provides runway configuration and runway usage recommendations, and monitoring the active runway configuration for suitability given existing factors. This report focuses on the metroplex environment, with two or more proximate airports having arrival and departure operations that are highly interdependent. The myriad of factors that affect metroplex opeations require consideration in arriving at runway configurations that collectively best serve the system as a whole. To assess the metroplex TRCM (mTRCM) benefit, the performance metrics must be compared with the actual historical operations. The historical configuration schedules can be viewed as the schedules produced by subject matter experts (SMEs), and therefore are referred to as the SMEs' schedules. These schedules were obtained from the FAA's Aviation System Performance Metrics (ASPM) database; this is the most representative information regarding runway configuration selection by SMEs. This report focused on a benefit assessment of total delay, transit time, and throughput efficiency (TE) benefits using the mTRCM algorithm at representative volumes for today's traffic at the New York metroplex (N90).

  1. Modelling self-assessed vulnerability to HIV and its associated factors in a HIV-burdened country.

    PubMed

    Fagbamigbe, A F; Lawal, A M; Idemudia, E S

    2017-12-01

    Globally, individuals' self-assessment of vulnerability to HIV infection is important to maintain safer sexual behaviour and reduce risky behaviours. However, determinants of self-perceived risk of HIV infection are not well documented and differ. We assessed the level of self-perceived vulnerability to HIV infection in Nigeria and also identified its risk factors. We explored a recent nationally representative data with self-reported vulnerability ('high', 'low' and 'no risk at all') to HIV infection as the outcome of interest. Data were weighted and association between the outcomes and the risk factors determined. We used simple ordered logit regression to model relationship between the outcome variable and risk factors, and controlled for the significant variables in multiple ordered logistic regression at 5% significance level. About 74% had good knowledge of HIV transmission and 6% had experienced STI recently. The likelihood of assessing oneself as having 'no risk at all' was 50% and for 'high chances' was 1.6%. Self-perceived high risk of HIV was higher among those who recently experienced STI (5.6%) than those who did not (1.7%), and also higher among those who recently engaged in transactional sex and had multiple sexual partners. The odds of good knowledge of HIV transmission on high self-perceived vulnerability to HIV was 19% higher than poor knowledge (OR = 1.19, 95% CI: 1.12-1.27). Also, respondents who recently had multiple sexual partners were 72% (OR = 1.72, 95% CI: 1.60-1.86) more likely to report self as having high risk. Younger respondents aged 14-19 years had higher odds of 41% (OR = 1.41, 95% CI: 1.29-1.55) to perceive self as having high vulnerability to HIV than older respondents. High vulnerability to HIV infection was reported among younger respondents, those with history of STIS and those who engage in multiple sexual relations. Despite high level of risky sexual behaviour and good knowledge of HIV transmission and prevention

  2. Constructing the Indicators of Assessing Human Vulnerability to Industrial Chemical Accidents: A Consensus-based Fuzzy Delphi and Fuzzy AHP Approach

    PubMed Central

    Fatemi, Farin; Ardalan, Ali; Aguirre, Benigno; Mansouri, Nabiollah; Mohammadfam, Iraj

    2017-01-01

    Introduction: Industrial chemical accidents have been increased in developing countries. Assessing the human vulnerability in the residents of industrial areas is necessary for reducing the injuries and causalities of chemical hazards. The aim of this study was to explore the key indicators for the assessment of human vulnerability in the residents living near chemical installations. Methods: The indicators were established in the present study based on the Fuzzy Delphi method (FDM) and Fuzzy Analytic Hierarchy Process (FAHP). The reliability of FDM and FAHP was calculated. The indicators of human vulnerability were explored in two sets of social and physical domains. Thirty-five relevant experts participated in this study during March-July 2015. Results: According to experts, the top three indicators of human vulnerability according to the FDM and FAHP were vulnerable groups, population density, and awareness. Detailed sub-vulnerable groups and awareness were developed based on age, chronic or severe diseases, disability, first responders, and residents, respectively. Each indicator and sub-indicator was weighted and ranked and had an acceptable consistency ratio. Conclusions: The importance of social vulnerability indicators are about 7 times more than physical vulnerability indicators. Among the extracted indicators, vulnerable groups had the highest weight and the greatest impact on human vulnerability. however, further research is needed to investigate the applicability of established indicators and generalizability of the results to other studies. Key words: Fuzzy Delphi; Fuzzy AHP; Human vulnerability; Chemical hazards PMID:28480124

  3. Fluctuating asymmetry, sociosexuality, and intrasexual competitive tactics.

    PubMed

    Simpson, J A; Gangestad, S W; Christensen, P N; Leck, K

    1999-01-01

    Heterosexual men and women were told they were competing with another same-sex individual for a date with an attractive opposite-sex interviewer. After answering 6 questions, participants were asked to tell the competitor why the interviewer should choose them over the competitor. Participants' videotaped behavior was coded for different behavioral tactics. Men who were more symmetrical and who had a more unrestricted sociosexual orientation were more likely to use direct competition tactics than were less symmetrical and restricted men. Restricted men accentuated their positive personal qualities, presenting themselves as "nice guys." Structural equation modeling revealed that fluctuating asymmetry (FA) was directly associated with the use of direct competition tactics. However, the link between FA and presenting oneself as a nice guy was mediated through sociosexuality. No effects were found for women.

  4. Assessment of groundwater vulnerability using supervised committee to combine fuzzy logic models.

    PubMed

    Nadiri, Ata Allah; Gharekhani, Maryam; Khatibi, Rahman; Moghaddam, Asghar Asghari

    2017-03-01

    Vulnerability indices of an aquifer assessed by different fuzzy logic (FL) models often give rise to differing values with no theoretical or empirical basis to establish a validated baseline or to develop a comparison basis between the modeling results and baselines, if any. Therefore, this research presents a supervised committee fuzzy logic (SCFL) method, which uses artificial neural networks to overarch and combine a selection of FL models. The indices are expressed by the widely used DRASTIC framework, which include geological, hydrological, and hydrogeological parameters often subject to uncertainty. DRASTIC indices represent collectively intrinsic (or natural) vulnerability and give a sense of contaminants, such as nitrate-N, percolating to aquifers from the surface. The study area is an aquifer in Ardabil plain, the province of Ardabil, northwest Iran. Improvements on vulnerability indices are achieved by FL techniques, which comprise Sugeno fuzzy logic (SFL), Mamdani fuzzy logic (MFL), and Larsen fuzzy logic (LFL). As the correlation between estimated DRASTIC vulnerability index values and nitrate-N values is as low as 0.4, it is improved significantly by FL models (SFL, MFL, and LFL), which perform in similar ways but have differences. Their synergy is exploited by SCFL and uses the FL modeling results "conditioned" by nitrate-N values to raise their correlation to higher than 0.9.

  5. The use of impression management tactics in structured interviews: a function of question type?

    PubMed

    Ellis, Aleksander P J; West, Bradley J; Ryan, Ann Marie; DeShon, Richard P

    2002-12-01

    This study investigated impression management tactic use during structured interviews containing both experience-based and situational questions. Specifically, the authors examined whether applicants' use of impression management tactics depended on question type. Results from 119 structured interviews indicated that almost all of the applicants used some form of impression management. Significantly more assertive than defensive impression management tactics were used, and among assertive tactics, applicants tended to use self-promotion rather than ingratiation. However, different question types prompted the use of different impression management tactics. Ingratiation tactics were used significantly more when applicants answered situational questions, whereas self-promotion tactics were used significantly more when applicants answered experience-based questions. Furthermore, the use of self-promotion and ingratiation tactics was positively related to interviewer evaluations.

  6. You Won't Get Me: Therapist Responses to Patient Impression Management Tactics.

    PubMed

    Frühauf, Sarah; Figlioli, Patrick; Caspar, Franz

    2017-03-01

    In psychotherapy, therapist and patient influence each other constantly. We aimed to investigate how therapists respond to patient impression management and influence tactics. For 60 videotaped intake interviews, judges rated therapist responses to patient tactics as neutral, desired, or undesired from the patient perspective. Judges rated the therapist responses in 57% as neutral, in 40% as desired, and in 2% as undesired by the patients. The proportions of response outcomes varied across tactics. Therapist responses were unrelated to therapist and patient sex. Therapist experience was related to their responses to the tactic Supplication. Overall, some patient tactics seem to be more challenging for therapists than others. Awareness of such response tendencies can help therapists prepare their reactions to certain patient impression management and influence tactics. Implications for training and research are presented.

  7. Vulnerability Assessment of Natural Disasters for Small and Mid-Sized Streams due to Climate Change and Stream Improvement

    NASA Astrophysics Data System (ADS)

    Choi, D.; Jun, H. D.; Kim, S.

    2012-04-01

    Vulnerability assessment plays an important role in drawing up climate change adaptation plans. Although there are some studies on broad vulnerability assessment in Korea, there have been very few studies to develop and apply locally focused and specific sector-oriented climate change vulnerability indicators. Especially, there has seldom been any study to investigate the effect of an adaptation project on assessing the vulnerability status to climate change for fundamental local governments. In order to relieve adverse effects of climate change, Korean government has performed the project of the Major Four Rivers (Han, Geum, Nakdong and Yeongsan river) Restoration since 2008. It is expected that water level in main stream of 4 rivers will be dropped through this project, but flood effect will be mainly occurred in small and mid-sized streams which flows in main stream. Hence, we examined how much the project of the major four rivers restoration relieves natural disasters. Conceptual framework of vulnerability-resilience index to climate change for the Korean fundamental local governments is defined as a function of climate exposure, sensitivity, and adaptive capacity. Then, statistical data on scores of proxy variables assumed to comprise climate change vulnerability for local governments are collected. Proxy variables and estimated temporary weights of them are selected by surveying a panel of experts using Delphi method, and final weights are determined by modified Entropy method. Developed vulnerability-resilience index was applied to Korean fundamental local governments and it is calculated under each scenario as follows. (1) Before the major four rivers restoration, (2) 100 years after represented climate change condition without the major four rivers restoration, (3) After the major four rivers restoration without representing climate change (this means present climate condition) and (4) After the major four rivers restoration and 100 years after represented

  8. Channel CAT: A Tactical Link Analysis Tool

    DTIC Science & Technology

    1997-09-01

    NAVAL POSTGRADUATE SCHOOL Monterey, California THESIS CHANNEL CAT : A TACTICAL LINK ANALYSIS TOOL by Michael Glenn Coleman September 1997 Thesis...REPORT TYPE AND DATES COVERED September 1997 Master’s Thesis 4. TITLE AND SUBTITLE CHANNEL CAT : A TACTICAL LINK ANALYSIS TOOL 5. FUNDING NUMBERS 6...tool, the Channel Capacity Analysis Tool (Channel CAT ), designed to provide an automated tool for the anlysis of design decisions in developing client

  9. Assessing node risk and vulnerability in epidemics on networks

    NASA Astrophysics Data System (ADS)

    Rogers, T.

    2015-01-01

    Which nodes are most vulnerable to an epidemic spreading through a network, and which carry the highest risk of causing a major outbreak if they are the source of the infection? Here we show how these questions can be answered to good approximation using the cavity method. Several curious properties of node vulnerability and risk are explored: some nodes are more vulnerable than others to weaker infections, yet less vulnerable to stronger ones; a node is always more likely to be caught in an outbreak than it is to start one, except when the disease has a deterministic lifetime; the rank order of node risk depends on the details of the distribution of infectious periods.

  10. Comparative assessment of lowland and highland Smallholder farmers' vulnerability to climate variability in Ethiopia

    NASA Astrophysics Data System (ADS)

    Ayal, D. Y., Sr.; Abshare, M. W. M.; Desta, S. D.; Filho, W. L.

    2015-12-01

    Desalegn Yayeh Ayal P.O.BOX 150129 Addis Ababa University Ethiopia Mobil +251910824784 Abstract Smallholder farmers' near term scenario (2010-2039) vulnerability nature and magnitude was examined using twenty-two exposure, sensitivity and adaptive capacity vulnerability indicators. Assessment of smallholder farmers' vulnerability to climate variability revealed the importance of comprehending exposure, sensitivity and adaptive capacity induces. Due to differences in level of change in rainfall, temperature, drought frequency, their environmental interaction and variations on adaptive capacity the nature and magnitude of smallholder farmers vulnerability to physical, biological and epidemiological challenges of crop and livestock production varied within and across agro-ecologies. Highlanders' sensitive relates with high population density, erosion and crop disease and pest damage occurrence. Whereas lowlanders will be more sensitive to high crop disease and pest damage, provenance of livestock disease, absence of alternative water sources, less diversified agricultural practices. However, with little variations in the magnitude and nature of vulnerability, both highlanders and lowlanders are victims of climate variability and change. Given the ever increasing population, temperature and unpredictable nature of rainfall variability, the study concluded that future adaptation strategies should capitalize on preparing smallholder farmers for both extremes- excess rainfall and flooding on the one hand and severe drought on the other.

  11. Multi-Hazard Vulnerability Assessment Along the Coast of Visakhapatnam, North-East Coast of India

    NASA Astrophysics Data System (ADS)

    Vivek, G.; Grinivasa Kumar, T.

    2016-08-01

    The current study area is coastal zone of Visakhapatnam, district of Andhra Pradesh along the coast of India. This area is mostly vulnerable to many disasters such as storms, cyclone, flood, tsunami and erosion. This area is considered as cyclone prone area because of frequently occurrence of the cyclones in this area. Recently the two tropical cyclones that formed in the Bay of Bengal are Hudhud (October 13, 2014) and Phylin (October 11, 2013), has caused devastating impacts on the eastern coast and shows that the country has lack of preparedness to cyclone, storm surge and related natural hazards. The multi-hazard vulnerability maps prepared here are a blended and combined overlay of multiple hazards those affecting the coastal zone. The present study aims to develop a methodology for coastal multi-hazard vulnerability assessment. This study carried out using parameters like probability of coastal slope, tsunami arrival height, future sea level rise, coastal erosion and tidal range. The multi-hazard vulnerability maps prepared by overlaying of multi hazards those affecting the coastal zone. Multi-hazard vulnerability maps further reproduced as risk maps with the land use information. The decision making tools presented here can provide a useful information during the disaster for the evacuation process and to evolve a management strategy.

  12. The Use of Influence Tactics Among Mid-Level Managers in the Community College.

    ERIC Educational Resources Information Center

    Quinley, John W.; Baker, George A. III; Gillett-Karam, Rosemary

    1995-01-01

    Examines the extent to which community college midlevel managers use power and influence tactics. Results show tactics were not used uniformly and were mostly directed toward lateral levels. Community college administrators employed influence tactics more often than did corporate, with both ranking tactics in almost identical order of use. (19…

  13. An Integrated Approach for Urban Earthquake Vulnerability Analyses

    NASA Astrophysics Data System (ADS)

    Düzgün, H. S.; Yücemen, M. S.; Kalaycioglu, H. S.

    2009-04-01

    The earthquake risk for an urban area has increased over the years due to the increasing complexities in urban environments. The main reasons are the location of major cities in hazard prone areas, growth in urbanization and population and rising wealth measures. In recent years physical examples of these factors are observed through the growing costs of major disasters in urban areas which have stimulated a demand for in-depth evaluation of possible strategies to manage the large scale damaging effects of earthquakes. Understanding and formulation of urban earthquake risk requires consideration of a wide range of risk aspects, which can be handled by developing an integrated approach. In such an integrated approach, an interdisciplinary view should be incorporated into the risk assessment. Risk assessment for an urban area requires prediction of vulnerabilities related to elements at risk in the urban area and integration of individual vulnerability assessments. However, due to complex nature of an urban environment, estimating vulnerabilities and integrating them necessities development of integrated approaches in which vulnerabilities of social, economical, structural (building stock and infrastructure), cultural and historical heritage are estimated for a given urban area over a given time period. In this study an integrated urban earthquake vulnerability assessment framework, which considers vulnerability of urban environment in a holistic manner and performs the vulnerability assessment for the smallest administrative unit, namely at neighborhood scale, is proposed. The main motivation behind this approach is the inability to implement existing vulnerability assessment methodologies for countries like Turkey, where the required data are usually missing or inadequate and decision makers seek for prioritization of their limited resources in risk reduction in the administrative districts from which they are responsible. The methodology integrates socio

  14. LANDSCAPE ECOLOGY APPROACHES FOR DETECTING, MAPPING, AND ASSESSING THE VULNERABILITY OF DEPRESSIONAL WETLANDS

    EPA Science Inventory

    U.S. EPA is using a landscape ecology approach to assess the ecological/hydrologic functions and related human values of depressional wetlands along coastal Texas, considered to be vulnerable to human disturbance. Many of those wetlands may be at high risk because of recent court...

  15. Modifiability Tactics

    DTIC Science & Technology

    2007-09-01

    The Pattern Understood in Terms of Tactics 44 13.4 Variants 44 14 Microkernel Pattern 45 14.1 Problem 45 14.2 Solution 45 14.3 The Pattern...Figure 12: Model-View-Controller Pattern Structure 42 Figure 13: Presentation-Abstraction-Control Pattern Structure 43 Figure 14: Microkernel ...Presentation- Abstraction- Control X X X X Microkernel X X X X X Reflection X X Each pattern is described in more detail in the

  16. Assessing the vulnerability of infrastructure to climate change on the Islands of Samoa

    NASA Astrophysics Data System (ADS)

    Fakhruddin, S. H. M.

    2015-03-01

    Pacific Islanders have been exposed to risks associated with climate change. Samoa as one of the Pacific Islands are prone to climatic hazards that will likely increase in coming decades, affecting coastal communities and infrastructure around the islands. Climate models do not predict a reduction of such disaster events in the future in Samoa; indeed, most predict an increase in such events. This paper identifies key infrastructure and their functions and status in order to provide an overall picture of relative vulnerability to climate-related stresses of such infrastructure on the island. By reviewing existing reports as well as holding a series of consultation meetings, a list of critical infrastructures were developed and shared with stakeholders for their consideration. An indicator-based vulnerability model (SIVM) was developed in collaboration with stakeholders to assess the vulnerability of selected infrastructure systems on the Samoan Islands. Damage costs were extracted from the Evan cyclone recovery needs document. On the other hand, criticality and capacity to repair data were collected from stakeholders. Having stakeholder perspectives on these two issues was important because (a) criticality of a given infrastructure could be viewed differently among different stakeholders, and (b) stakeholders were the best available source (in this study) to estimate the capacity to repair non-physical damage to such infrastructure. Analysis of the results suggested rankings from most vulnerable to least vulnerable sectors are the transportation sector, the power sector, the water supply sector and the sewerage system.

  17. Assessing the vulnerability of infrastructure to climate change on the Islands of Samoa

    NASA Astrophysics Data System (ADS)

    Fakhruddin, S. H. M.; Babel, M. S.; Kawasaki, A.

    2015-06-01

    Pacific Islanders have been exposed to risks associated with climate change. Samoa, as one of the Pacific Islands, is prone to climatic hazards that will likely increase in the coming decades, affecting coastal communities and infrastructure around the islands. Climate models do not predict a reduction of such disaster events in the future in Samoa; indeed, most predict an increase. This paper identifies key infrastructure and their functions and status in order to provide an overall picture of relative vulnerability to climate-related stresses of such infrastructure on the island. By reviewing existing reports as well as holding a series of consultation meetings, a list of critical infrastructure was developed and shared with stakeholders for their consideration. An indicator-based vulnerability model (SIVM) was developed in collaboration with stakeholders to assess the vulnerability of selected infrastructure systems on the Samoan Islands. Damage costs were extracted from the Cyclone Evan recovery needs document. Additionally, data on criticality and capacity to repair damage were collected from stakeholders. Having stakeholder perspectives on these two issues was important because (a) criticality of a given infrastructure could be viewed differently among different stakeholders, and (b) stakeholders were the best available source (in this study) to estimate the capacity to repair non-physical damage to such infrastructure. Analysis of the results suggested a ranking of sectors from the most vulnerable to least vulnerable are: the transportation sector, the power sector, the water supply sector and the sewerage system.

  18. Measuring Psychological and Physical Abuse of Children with the Conflict Tactics Scales.

    ERIC Educational Resources Information Center

    Straus, Murray A.

    Application of the Conflict Tactics Scales (CTS) to the assessment of child abuse is described. The CTS is a brief instrument designed to measure three aspects of parent-to-child behavior: (1) reasoning; (2) psychological aggression; and (3) physical aggression. The psychological and physical aggression indexes are intended to measure the…

  19. The Influence Tactic Preferred by Teaching Faculty: An Exploratory Case Study

    ERIC Educational Resources Information Center

    Rogers-Backus, Bonnie L.

    2010-01-01

    This quantitative study was developed to determine the influence tactic used most often by teachers in a small college classroom. It was hypothesized that the rational persuasion tactic, which is defined as "using logical arguments and factual evidence to persuade the target". (Fu & Yukl, 2000, p. 252) would be the most commonly employed tactic by…

  20. Online Mate-Retention Tactics on Facebook Are Associated With Relationship Aggression.

    PubMed

    Brem, Meagan J; Spiller, Laura C; Vandehey, Michael A

    2015-10-01

    A measure of Facebook-related mate-retention tactics was developed to investigate the relationship between online behaviors and intimate partner aggression. One hundred and seventy-seven young adults (65 men, 112 women) completed questionnaires that included measures of online and offline mate-retention tactics, Facebook jealousy, Facebook surveillance, and intimate partner violence. A factor analysis yielded four subscales for the Facebook Mate-Retention Tactic Inventory (FMRTI): Care and Affection, Jealousy and Surveillance, Possession Signals, and Punishment of Infidelity Threat. The FMRTI total scores were positively correlated with Facebook jealousy, Facebook surveillance, and use of offline mate-retention tactics. The Jealousy and Surveillance subscale uniquely predicted intimate partner psychological and physical aggression over and above existing measures. Facebook mate-retention tactics fully mediated the relation between Facebook jealousy and both intimate partner psychological and physical aggression. The current study provides preliminary evidence for conceptualizing Facebook as an environment for the use of mate-retention tactics that have real-life implications for intimate partner violence. © The Author(s) 2014.

  1. Vulnerability assessment including tangible and intangible components in the index composition: An Amazon case study of flooding and flash flooding.

    PubMed

    Andrade, Milena Marília Nogueira de; Szlafsztein, Claudio Fabian

    2018-07-15

    The vulnerability of cities and communities in the Amazon to flooding and flash flooding is increasing. The effects of extreme events on populations vary across landscapes, causing vulnerability to differ spatially. Traditional vulnerability studies in Brazil and across the world have used the vulnerability index for the country and, more recently, municipality scales. The vulnerability dimensions are exposure, sensitivity, and adaptive capacity. For each of these dimensions, there is a group of indicators that constitutes a vulnerability index using quantitative data. Several vulnerability assessments have used sensitivity and exposure analyses and, recently, adaptive capacity has been considered. The Geographical Information Systems (GIS) analysis allows spatial regional modeling using quantitative vulnerability indicators. This paper presents a local-scale vulnerability assessment in an urban Amazonian area, Santarém City, using interdisciplinary methods. Data for exposure and sensitivity were gathered by remote sensing and census data, respectively. However, adaptive capacity refers to local capacities, whether infrastructural or not, and the latter were gathered by qualitative participatory methods. For the mixed data used to study adaptive capacity, we consider tangible components for countable infrastructure that can cope with hazards, and intangible components that reflect social activities based on risk perceptions and collective action. The results indicate that over 80% of the area is highly or moderately vulnerable to flooding and flash flooding. Exposure and adaptive capacity were determinants of the results. Lower values of adaptive capacity play a significant role in vulnerability enhancement. Copyright © 2018 Elsevier B.V. All rights reserved.

  2. Developing a Composite Aquifer Vulnerability Assessment Model Combining DRASTIC with Agricultural Land Use in Choushui River Alluvial Fan, Central Taiwan

    NASA Astrophysics Data System (ADS)

    Chen, Shih-Kai; Hsieh, Chih-Heng; Tsai, Cheng-Bin

    2017-04-01

    Aquifer vulnerability assessment is considered to be an effective tool in controlling potential pollution which is critical for groundwater management. The Choushui River alluvial fan, located in central Taiwan, is an agricultural area with complex crop patterns and various irrigation schemes, which increased the difficulties in groundwater resource management. The aim of this study is to propose an integrated methodology to assess shallow groundwater vulnerability by including land-use impact on groundwater potential pollution. The original groundwater vulnerability methodology, DRASTIC, was modified by adding a land-use parameter in order to assess groundwater vulnerability under intense agricultural activities. To examine the prediction capacity of pollution for the modified DRASTIC model, various risk categories of contamination potentials were compared with observed nitrate-N obtained from groundwater monitoring network. It was found that for the original DRASTIC vulnerability map, some areas with low nitrate-N concentrations are covered within the high vulnerability areas, especially in the northern part of mid-fan areas, where rice paddy is the main crop and planted for two crop seasons per year. The low nitrate-N contamination potential of rice paddies may be resulted from the denitrification in the reduced root zone. By reducing the rating for rice paddies, the modified model was proved to be capable of increasing the precise of prediction in study area. The results can provide a basis for groundwater monitoring network design and effective preserve measures formulation in the mixed agricultural area. Keyword:Aquifer Vulnerability, Groundwater, DRASTIC, Nitrate-N

  3. Pharmaceutical lobbying and pandemic stockpiling of Tamiflu: a qualitative study of arguments and tactics.

    PubMed

    Vilhelmsson, Andreas; Mulinari, Shai

    2017-08-09

    Little is known about how pharmaceutical companies lobby authorities or experts regarding procurement or the use of vaccines and antivirals. This paper investigates how members of Denmark's pandemic planning committee experienced lobbying efforts by Roche, manufacturer of Tamiflu, the antiviral that was stockpiled before the 2009 A(H1N1) pandemic. Analysis of interviews with six of seven members of the Danish core pandemic committee, supplemented with documentary analysis. We sought to identify (1) arguments and (2) tactics used in lobbying, and to characterize interviewees' views on the impact of (3) lobbying and (4) scientific evidence on the decision to stockpile Tamiflu. Roche lobbied directly (in its own name) and through a seemingly independent third party. Roche used two arguments: (1) the procurement agreement had to be signed quickly because the drug would be delivered on a first-come, first-served basis and (2) Denmark was especially vulnerable to an influenza crisis because it had smaller Tamiflu stocks than other countries. Most interviewees suspected that lobbying had an impact on Tamiflu procurement. Our study highlights risks posed by pharmaceutical lobbying. Arguments and tactics deployed by Roche are likely to be repeated whenever many countries are negotiating drug procurements in a monopolistic market. © The Author 2017. Published by Oxford University Press on behalf of Faculty of Public Health.

  4. Objective Metric Based Assessments for Efficient Evaluation of Auditory Situation Awareness Characteristics of Tactical Communications and Protective Systems (TCAPS) and Augmented Hearing Protective Devices (HPDs)

    DTIC Science & Technology

    2015-11-30

    Assessments for Efficient Evaluation of Auditory Situation Awareness Characteristics of Tactical Communications and Protective Systems (TCAPS) and Augmented...Hearing Protective Devices (HPDs) W81XWH-13-C-0193 John G. Casali, Ph.D, CPE & Kichol Lee, Ph.D Auditory Systems Lab, Industrial and Systems ...Suite 1 JBSA Lackland, TX 78236-9908 Approved for public release: distribution unlimited. The Virginia Tech Auditory Systems Laboratory (ASL

  5. Assessment on vulnerability of coastal wetlands to sea level rise in the Yangtze Estuary, China

    NASA Astrophysics Data System (ADS)

    Cui, L.; Ge, Z.; Zhang, L.

    2013-12-01

    The Yangtze Delta in China is vital economic hubs in terms of settlement, industry, agriculture, trade and tourism as well as of great environmental significance. In recent decades, the prospect of climate change, in particular sea level rise and its effects on low lying coastal areas have generated worldwide attention to coastal ecosystems. Coastal wetlands, as important parts of coastal ecosystem, are particularly sensitive to sea level rise. To study the responses of coastal wetlands to climate change, assess the impacts of climate change on coastal wetlands and formulate feasible and practical mitigation strategies are the important prerequisites for securing the coastal zone ecosystems. In this study, taking the coastal wetlands in the Yangtze Estuary as a case study, the potential impacts of sea-level rise to coastal wetlands habitat were analyzed by the Source-Pathway-Receptor-Consequence (SPRC) model. The key indicators, such as the sea-level rise rate, subsidence rate, elevation, daily inundation duration of habitat and sedimentation rate, were selected to build a vulnerability assessment system according to the IPCC definition of vulnerability, i.e. the aspects of exposure, sensitivity and adaptation. A quantitatively spatial assessment method on the GIS platform was established by quantifying each indicator, calculating the vulnerability index and grading the vulnerability. The vulnerability assessment on the coastal wetlands in the Yangtze Estuary under the sea level rise rate of the present trend and IPCC A1F1 scenario were performed for three sets of projections of short-term (2030s), mid-term (2050s) and long-term (2100s). The results showed that at the present trend of sea level rise rate of 0.26 cm/a, 92.3 % of the coastal wetlands in the Yangtze Estuary was in the EVI score of 0 in 2030s, i.e. the impact of sea level rise on habitats/species of coastal wetlands was negligible. While 7.4 % and 0.3 % of the coastal wetlands were in the EVI score of

  6. Developing a national food defense guideline based on a vulnerability assessment of intentional food contamination in Japanese food factories using the CARVER+Shock vulnerability assessment tool.

    PubMed

    Kanagawa, Yoshiyuki; Akahane, Manabu; Hasegawa, Atsushi; Yamaguchi, Kentaro; Onitake, Kazuo; Takaya, Satoshi; Yamamoto, Shigeki; Imamura, Tomoaki

    2014-12-01

    The awareness of food terrorism has increased following the September 11, 2001 terrorist attacks in New York City, United States, and many measures and policies dealing with this issue have been established worldwide. Suspected deliberate food-poisoning crimes have occurred in Japan, although they are not regarded as acts of food terrorism. One area of concern is that the small- to medium-sized companies that dominate Japan's food industry are extremely vulnerable to deliberate food poisoning. We conducted a literature research on food defense measures undertaken by the World Health Organization and in the United States and Europe. Using the Carver+Shock vulnerability assessment tool, eight food factories and related facilities in Japan were evaluated and we found the level of awareness of food defense to be low and the measures inappropriate. On the basis of this evaluation, we developed a set of guidelines that Japanese food companies can use to help develop their food defense strategies and to serve as a reference in considering specific measures.

  7. The Development of Sport Expertise: Mapping the Tactical Domain.

    ERIC Educational Resources Information Center

    McPherson, Sue L.

    1994-01-01

    Explores issues and research relevant to sport tactical knowledge development and expertise. The paper discusses controversies concerning methodological tools, possible levels of analysis in sport research, sport tactical knowledge and expertise, a protocol structure model for sport, and expert-novice sport research. (SM)

  8. Fuzzy-based assessment of groundwater intrinsic vulnerability of a volcanic aquifer in the Chilean Andean Valley.

    PubMed

    Duhalde, Denisse J; Arumí, José L; Oyarzún, Ricardo A; Rivera, Diego A

    2018-06-11

    A fuzzy logic approach has been proposed to face the uncertainty caused by sparse data in the assessment of the intrinsic vulnerability of a groundwater system with parametric methods in Las Trancas Valley, Andean Mountain, south-central Chile, a popular touristic place in Chile, but lacking of a centralized drinking and sewage water public systems; this situation is a potentially source of groundwater pollution. Based on DRASTIC, GOD, and EKv and the expert knowledge of the study area, the Mamdani fuzzy approach was generated and the spatial data were processed by ArcGIS. The groundwater system exhibited areas with high, medium, and low intrinsic vulnerability indices. The fuzzy approach results were compared with traditional methods results, which, in general, have shown a good spatial agreement even though significant changes were also identified in the spatial distribution of the indices. The Mamdani logic approach has shown to be a useful and practical tool to assess the intrinsic vulnerability of an aquifer under sparse data conditions.

  9. Geospatial approach for assessment of biophysical vulnerability to agricultural drought and its intra-seasonal variations.

    PubMed

    Sehgal, Vinay Kumar; Dhakar, Rajkumar

    2016-03-01

    The study presents a methodology to assess and map agricultural drought vulnerability during main kharif crop season at local scale and compare its intra-seasonal variations. A conceptual model of vulnerability based on variables of exposure, sensitivity, and adaptive capacity was adopted, and spatial datasets of key biophysical factors contributing to vulnerability were generated using remote sensing and GIS for Rajasthan State of India. Hazard exposure was based on frequency and intensity of gridded standardized precipitation index (SPI). Agricultural sensitivity was based on soil water holding capacity as well as on frequency and intensity of normalized difference vegetation index (NDVI)-derived trend adjusted vegetation condition index (VCITadj). Percent irrigated area was used as a measure of adaptive capacity. Agricultural drought vulnerability was derived separately for early, mid, late, and whole kharif seasons by composting rating of factors using linear weighting scheme and pairwise comparison of multi-criteria evaluation. The regions showing very low to extreme rating of hazard exposure, drought sensitivity, and agricultural vulnerability were identified at all four time scales. The results indicate that high to extreme vulnerability occurs in more than 50% of net sown area in the state and such areas mostly occur in western, central, and southern parts. The higher vulnerability is on account of non-irrigated croplands, moderate to low water holding capacity of sandy soils, resulting in higher sensitivity, and located in regions with high probability of rainfall deficiency. The mid and late season vulnerability has been found to be much higher than that during early and whole season. Significant correlation of vulnerability rating with food grain productivity, drought recurrence period, crop area damaged in year 2009 and socioeconomic indicator of human development index (HDI) proves the general soundness of methodology. Replication of this methodology

  10. Supporting tactical intelligence using collaborative environments and social networking

    NASA Astrophysics Data System (ADS)

    Wollocko, Arthur B.; Farry, Michael P.; Stark, Robert F.

    2013-05-01

    Modern military environments place an increased emphasis on the collection and analysis of intelligence at the tactical level. The deployment of analytical tools at the tactical level helps support the Warfighter's need for rapid collection, analysis, and dissemination of intelligence. However, given the lack of experience and staffing at the tactical level, most of the available intelligence is not exploited. Tactical environments are staffed by a new generation of intelligence analysts who are well-versed in modern collaboration environments and social networking. An opportunity exists to enhance tactical intelligence analysis by exploiting these personnel strengths, but is dependent on appropriately designed information sharing technologies. Existing social information sharing technologies enable users to publish information quickly, but do not unite or organize information in a manner that effectively supports intelligence analysis. In this paper, we present an alternative approach to structuring and supporting tactical intelligence analysis that combines the benefits of existing concepts, and provide detail on a prototype system embodying that approach. Since this approach employs familiar collaboration support concepts from social media, it enables new-generation analysts to identify the decision-relevant data scattered among databases and the mental models of other personnel, increasing the timeliness of collaborative analysis. Also, the approach enables analysts to collaborate visually to associate heterogeneous and uncertain data within the intelligence analysis process, increasing the robustness of collaborative analyses. Utilizing this familiar dynamic collaboration environment, we hope to achieve a significant reduction of time and skill required to glean actionable intelligence in these challenging operational environments.

  11. A Climate Change Vulnerability Assessment Report for the National Renewable Energy Laboratory: May 23, 2014 -- June 5, 2015

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Vogel, J.; O'Grady, M.; Renfrow, S.

    The U.S. Department of Energy's (DOE's) National Renewable Energy Laboratory (NREL), in Golden, Colorado, focuses on renewable energy and energy efficiency research. Its portfolio includes advancing renewable energy technologies that can help meet the nation's energy and environmental goals. NREL seeks to better understand the potential effects of climate change on the laboratory--and therefore on its mission--to ensure its ongoing success. Planning today for a changing climate can reduce NREL's risks and improve its resiliency to climate-related vulnerabilities. This report presents a vulnerability assessment for NREL. The assessment was conducted in fall 2014 to identify NREL's climate change vulnerabilities andmore » the aspects of NREL's mission or operations that may be affected by a changing climate.« less

  12. Dynamic Analytics-Driven Assessment of Vulnerabilities and Exploitation

    DTIC Science & Technology

    2016-07-15

    integration with big data technologies such as Hadoop , nor does it natively support exporting of events to external relational databases. OSSIM supports...power of big data analytics to determine correlations and temporal causality among vulnerabilities and cyber events. The vulnerability dependencies...via the SCAPE (formerly known as LLCySA [6]). This is illustrated as a big data cyber analytic system architecture in

  13. Assessment of physical vulnerability of buildings and analysis of landslide risk at the municipal scale: application to the Loures municipality, Portugal

    NASA Astrophysics Data System (ADS)

    Guillard-Gonçalves, C.; Zêzere, J. L.; Pereira, S.; Garcia, R. A. C.

    2016-02-01

    This study offers a semi-quantitative assessment of the physical vulnerability of buildings to landslides in a Portuguese municipality (Loures), as well as the quantitative landslide risk analysis computed as the product of the landslide hazard by the vulnerability and the economic value of the buildings. The hazard was assessed by combining the spatiotemporal probability and the frequency-magnitude relationship of the landslides. The physical vulnerability assessment was based on an inquiry of a pool of European landslide experts and a sub-pool of landslide experts who know the study area, and the answers' variability was assessed with standard deviation. The average vulnerability of the basic geographic entities was compared by changing the map unit and applying the vulnerability to all the buildings of a test site, the inventory of which was listed on the field. The economic value was calculated using an adaptation of the Portuguese Tax Services approach, and the risk was computed for different landslide magnitudes and different spatiotemporal probabilities. As a rule, the vulnerability values given by the sub-pool of experts who know the study area are higher than those given by the European experts, namely for the high-magnitude landslides. The obtained vulnerabilities vary from 0.2 to 1 as a function of the structural building types and the landslide magnitude, and are maximal for 10 and 20 m landslide depths. However, the highest risk was found for the landslides that are 3 m deep, because these landslides combine a relatively high frequency in the Loures municipality with a substantial potential damage.

  14. Tactical Decision Aids High Bandwidth Links Using Autonomous Vehicles

    DTIC Science & Technology

    2004-01-01

    1 Tactical Decision Aids (High Bandwidth Links Using Autonomous Vehicles ) A. J. Healey, D. P. Horner, Center for Autonomous Underwater Vehicle...SUBTITLE Tactical Decision Aids (High Bandwidth Links Using Autonomous Vehicles ) 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6

  15. Data management for geospatial vulnerability assessment of interdependencies in US power generation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shih, C.Y.; Scown, C.D.; Soibelman, L.

    2009-09-15

    Critical infrastructures maintain our society's stability, security, and quality of life. These systems are also interdependent, which means that the disruption of one infrastructure system can significantly impact the operation of other systems. Because of the heavy reliance on electricity production, it is important to assess possible vulnerabilities. Determining the source of these vulnerabilities can provide insight for risk management and emergency response efforts. This research uses data warehousing and visualization techniques to explore the interdependencies between coal mines, rail transportation, and electric power plants. By merging geospatial and nonspatial data, we are able to model the potential impacts ofmore » a disruption to one or more mines, rail lines, or power plants, and visually display the results using a geographical information system. A scenario involving a severe earthquake in the New Madrid Seismic Zone is used to demonstrate the capabilities of the model when given input in the form of a potentially impacted area. This type of interactive analysis can help decision makers to understand the vulnerabilities of the coal distribution network and the potential impact it can have on electricity production.« less

  16. Adaptation of a Knowledge-Based Decision-Support System in the Tactical Environment.

    DTIC Science & Technology

    1981-12-01

    002-04-6411S1CURITY CL All PICATION OF 1,416 PAGE (00HIR Onto ea0aOW .L10 *GU9WVC 4bGSI.CAYON S. Voss 10466lVka t... OftesoE ’ making decisons . The...noe..aaw Ad tdlalttt’ IV 680011 MMib) Artificial Intelligence; Decision-Support Systems; Tactical Decision- making ; Knowledge-based Decision-support...tactical information to assist tactical commanders in making decisions. The system, TAC*, for "Tactical Adaptable Consultant," incorporates a database

  17. Climate change and coastal vulnerability assessment: Scenarios for integrated assessment

    USGS Publications Warehouse

    Nicholls, R.J.; Wong, P.P.; Burkett, V.; Woodroffe, C.D.; Hay, J.

    2008-01-01

    Coastal vulnerability assessments still focus mainly on sea-level rise, with less attention paid to other dimensions of climate change. The influence of non-climatic environmental change or socio-economic change is even less considered, and is often completely ignored. Given that the profound coastal changes of the twentieth century are likely to continue through the twenty-first century, this is a major omission, which may overstate the importance of climate change, and may also miss significant interactions of climate change with other non-climate drivers. To better support climate and coastal management policy development, more integrated assessments of climatic change in coastal areas are required, including the significant non-climatic changes. This paper explores the development of relevant climate and non-climate drivers, with an emphasis on the non-climate drivers. While these issues are applicable within any scenario framework, our ideas are illustrated using the widely used SRES scenarios, with both impacts and adaptation being considered. Importantly, scenario development is a process, and the assumptions that are made about future conditions concerning the coast need to be explicit, transparent and open to scientific debate concerning their realism and likelihood. These issues are generic across other sectors. ?? Integrated Research System for Sustainability Science and Springer 2008.

  18. Assessing groundwater vulnerability in the Kinshasa region, DR Congo, using a calibrated DRASTIC model

    NASA Astrophysics Data System (ADS)

    Mfumu Kihumba, Antoine; Vanclooster, Marnik; Ndembo Longo, Jean

    2017-02-01

    This study assessed the vulnerability of groundwater against pollution in the Kinshasa region, DR Congo, as a support of a groundwater protection program. The parametric vulnerability model (DRASTIC) was modified and calibrated to predict the intrinsic vulnerability as well as the groundwater pollution risk. The method uses groundwater body specific parameters for the calibration of the factor ratings and weightings of the original DRASTIC model. These groundwater specific parameters are inferred from the statistical relation between the original DRASTIC model and observed nitrate pollution for a specific period. In addition, site-specific land use parameters are integrated into the method. The method is fully embedded in a Geographic Information System (GIS). Following these modifications, the correlation coefficient between groundwater pollution risk and observed nitrate concentrations for the 2013-2014 survey improved from r = 0.42, for the original DRASTIC model, to r = 0.61 for the calibrated model. As a way to validate this pollution risk map, observed nitrate concentrations from another survey (2008) are compared to pollution risk indices showing a good degree of coincidence with r = 0.51. The study shows that a calibration of a vulnerability model is recommended when vulnerability maps are used for groundwater resource management and land use planning at the regional scale and that it is adapted to a specific area.

  19. On investigating social dynamics in tactical opportunistic mobile networks

    NASA Astrophysics Data System (ADS)

    Gao, Wei; Li, Yong

    2014-06-01

    The efficiency of military mobile network operations at the tactical edge is challenging due to the practical Disconnected, Intermittent, and Limited (DIL) environments at the tactical edge which make it hard to maintain persistent end-to-end wireless network connectivity. Opportunistic mobile networks are hence devised to depict such tactical networking scenarios. Social relations among warfighters in tactical opportunistic mobile networks are implicitly represented by their opportunistic contacts via short-range radios, but were inappropriately considered as stationary over time by the conventional wisdom. In this paper, we develop analytical models to probabilistically investigate the temporal dynamics of this social relationship, which is critical to efficient mobile communication in the battlespace. We propose to formulate such dynamics by developing various sociological metrics, including centrality and community, with respect to the opportunistic mobile network contexts. These metrics investigate social dynamics based on the experimentally validated skewness of users' transient contact distributions over time.

  20. Assessment of well vulnerability for groundwater source protection based on a solute transport model: a case study from Jilin City, northeast China

    NASA Astrophysics Data System (ADS)

    Huan, Huan; Wang, Jinsheng; Lai, Desheng; Teng, Yanguo; Zhai, Yuanzheng

    2015-05-01

    Well vulnerability assessment is essential for groundwater source protection. A quantitative approach to assess well vulnerability in a well capture zone is presented, based on forward solute transport modeling. This method was applied to three groundwater source areas (Jiuzhan, Hadawan and Songyuanhada) in Jilin City, northeast China. The ratio of the maximum contaminant concentration at the well to the released concentration at the contamination source ( c max/ c 0) was determined as the well vulnerability indicator. The results indicated that well vulnerability was higher close to the pumping well. The well vulnerability in each groundwater source area was low. Compared with the other two source areas, the cone of depression at Jiuzhan resulted in higher spatial variability of c max/ c 0 and lower minimum c max/ c 0 by three orders of magnitude. Furthermore, a sensitivity analysis indicated that the denitrification rate in the aquifer was the most sensitive with respect to well vulnerability. A process to derive a NO3-N concentration at the pumping well is presented, based on determining the maximum nitrate loading limit to satisfy China's drinking-water quality standards. Finally, the advantages, disadvantages and prospects for improving the precision of this well vulnerability assessment approach are discussed.

  1. Relative fitness of alternative male reproductive tactics in a mammal varies between years.

    PubMed

    Schradin, Carsten; Lindholm, Anna K

    2011-09-01

    1. In many species, males can use different behavioural tactics to achieve fertilization, so-called alternative reproductive tactics (ARTs). Few field studies have measured fitness consequences of ARTs under varying environmental conditions. 2. Here, we describe fitness consequences of three phenotypically plastic ARTs in the African striped mouse (Rhabdomys pumilio) and show that relative fitness of ARTs differs between years. Each year represents a different generation. 3. For the generation living under high population density, tactics differed in relative fitness in accordance with the theory of conditional strategies, with highly successful territorial breeding males having 10 times higher success than solitary roaming males and 102 times higher success than adult natally philopatric males. 4. For the generation living under intermediate population density, the territorial breeding and roaming tactics yielded similar fitness, which would be in agreement with the theory of mixed strategies. No philopatric males occurred. 5. For the generation living under low population density, roaming was the only tactic used and some roamers had very high fitness. 6. The main prediction of status-dependent selection for conditional strategies is a correlation between fitness and status, often measured as body mass, but we did not find this correlation within tactics when more than one tactic was expressed in the population. 7. Female distribution seems to have an effect on which reproductive tactics male chose: female defence polygyny when females are clumped (interference competition), but a searching tactic when females are dispersed (scramble competition). In contrast to predictions arising from theory on scramble competition, male body mass was important in determining fitness only in the year when females were dispersed, but not in other years. 8. Our results indicate that the differentiation between conditional and mixed strategies is not an absolute one. In many other

  2. Health Impacts of Climate Change in Pacific Island Countries: A Regional Assessment of Vulnerabilities and Adaptation Priorities.

    PubMed

    McIver, Lachlan; Kim, Rokho; Woodward, Alistair; Hales, Simon; Spickett, Jeffery; Katscherian, Dianne; Hashizume, Masahiro; Honda, Yasushi; Kim, Ho; Iddings, Steven; Naicker, Jyotishma; Bambrick, Hilary; McMichael, Anthony J; Ebi, Kristie L

    2016-11-01

    Between 2010 and 2012, the World Health Organization Division of Pacific Technical Support led a regional climate change and health vulnerability assessment and adaptation planning project, in collaboration with health sector partners, in 13 Pacific island countries-Cook Islands, Federated States of Micronesia, Fiji, Kiribati, Marshall Islands, Nauru, Niue, Palau, Samoa, Solomon Islands, Tonga, Tuvalu, and Vanuatu. We assessed the vulnerabilities of Pacific island countries to the health impacts of climate change and planned adaptation strategies to minimize such threats to health. This assessment involved a combination of quantitative and qualitative techniques. The former included descriptive epidemiology, time series analyses, Poisson regression, and spatial modeling of climate and climate-sensitive disease data, in the few instances where this was possible; the latter included wide stakeholder consultations, iterative consensus building, and expert opinion. Vulnerabilities were ranked using a "likelihood versus impact" matrix, and adaptation strategies were prioritized and planned accordingly. The highest-priority climate-sensitive health risks in Pacific island countries included trauma from extreme weather events, heat-related illnesses, compromised safety and security of water and food, vector-borne diseases, zoonoses, respiratory illnesses, psychosocial ill-health, non-communicable diseases, population pressures, and health system deficiencies. Adaptation strategies relating to these climate change and health risks could be clustered according to categories common to many countries in the Pacific region. Pacific island countries are among the most vulnerable in the world to the health impacts of climate change. This vulnerability is a function of their unique geographic, demographic, and socioeconomic characteristics combined with their exposure to changing weather patterns associated with climate change, the health risks entailed, and the limited capacity

  3. Health Impacts of Climate Change in Pacific Island Countries: A Regional Assessment of Vulnerabilities and Adaptation Priorities

    PubMed Central

    McIver, Lachlan; Kim, Rokho; Woodward, Alistair; Hales, Simon; Spickett, Jeffery; Katscherian, Dianne; Hashizume, Masahiro; Honda, Yasushi; Kim, Ho; Iddings, Steven; Naicker, Jyotishma; Bambrick, Hilary; McMichael, Anthony J.; Ebi, Kristie L.

    2015-01-01

    Background: Between 2010 and 2012, the World Health Organization Division of Pacific Technical Support led a regional climate change and health vulnerability assessment and adaptation planning project, in collaboration with health sector partners, in 13 Pacific island countries—Cook Islands, Federated States of Micronesia, Fiji, Kiribati, Marshall Islands, Nauru, Niue, Palau, Samoa, Solomon Islands, Tonga, Tuvalu, and Vanuatu. Objective: We assessed the vulnerabilities of Pacific island countries to the health impacts of climate change and planned adaptation strategies to minimize such threats to health. Methods: This assessment involved a combination of quantitative and qualitative techniques. The former included descriptive epidemiology, time series analyses, Poisson regression, and spatial modeling of climate and climate-sensitive disease data, in the few instances where this was possible; the latter included wide stakeholder consultations, iterative consensus building, and expert opinion. Vulnerabilities were ranked using a “likelihood versus impact” matrix, and adaptation strategies were prioritized and planned accordingly. Results: The highest-priority climate-sensitive health risks in Pacific island countries included trauma from extreme weather events, heat-related illnesses, compromised safety and security of water and food, vector-borne diseases, zoonoses, respiratory illnesses, psychosocial ill-health, non-communicable diseases, population pressures, and health system deficiencies. Adaptation strategies relating to these climate change and health risks could be clustered according to categories common to many countries in the Pacific region. Conclusion: Pacific island countries are among the most vulnerable in the world to the health impacts of climate change. This vulnerability is a function of their unique geographic, demographic, and socioeconomic characteristics combined with their exposure to changing weather patterns associated with climate

  4. Airborne and Maritime/Fixed Station Joint Tactical Radio System (AMF JTRS)

    DTIC Science & Technology

    2015-12-01

    Selected Acquisition Report (SAR) RCS: DD-A&T(Q&A)823-421 Airborne & Maritime/Fixed Station Joint Tactical Radio System (AMF JTRS) As of FY 2017...Information Program Name Airborne & Maritime/Fixed Station Joint Tactical Radio System (AMF JTRS) DoD Component Army Responsible Office References SAR...UNCLASSIFIED 5 Mission and Description Airborne & Maritime/Fixed Station Joint Tactical Radio System (AMF JTRS) products are software programmable

  5. Pacing Behavior and Tactical Positioning in 1500-m Short-Track Speed Skating.

    PubMed

    Konings, Marco J; Noorbergen, Olaf S; Parry, David; Hettinga, Florentina J

    2016-01-01

    To gain more insight in pacing behavior and tactical positioning in 1500-m short-track speed skating, a sport in which several athletes directly compete in the same race. Lap times and intermediate rankings of elite 1500-m short-track- skating competitors were collected over the season 2012-13 (N = 510, 85 races). Two statistical approaches were used to assess pacing behavior and tactical positioning. First, lap times were analyzed using a MANOVA, and for each lap differences between sex, race type, final rankings, and stage of competition were determined. Second, Kendall tau b correlations were used to assess relationships between intermediate and final rankings. In addition, intermediate rankings of the winner of each race were examined. In 1500 m (13.5 laps of 111.12 m), correlations between intermediate and final ranking gradually increased throughout the race (eg, lap 1, r = .05; lap 7, r = .26; lap 13, r = .85). Moreover, the percentage of race winners skating in the leading position was over 50% during the last 3 laps. Top finishers were faster than bottom-place finishers only during the last 5 laps, with on average 0.1- to 1.5-s faster lap times of the race winners compared with the others during the last 5 laps. Although a fast start led to faster finishing times, top finishers were faster than bottom-placed finishers only during the last 5 laps. Moreover, tactical positioning at 1 of the foremost positions during the latter phase of the race appeared to be a strong determinant of finishing position.

  6. Assessment of physical vulnerability of buildings and analysis of landslide risk at the municipal scale - application to the Loures municipality, Portugal

    NASA Astrophysics Data System (ADS)

    Guillard-Gonçalves, C.; Zêzere, J. L.; Pereira, S.; Garcia, R. A. C.

    2015-09-01

    This study offers a semi-quantitative assessment of the physical vulnerability of buildings to landslides in the Loures municipality, as well as an analysis of the landslide risk computed as the product of the vulnerability by the economic value of the buildings and by the landslide hazard. The physical vulnerability assessment, which was based on a questionnaire sent to a pool of Portuguese and European researchers, and the assessment of the subjectivity of their answers are innovative contributions of this work. The generalization of the vulnerability to the smallest statistical subsection was validated by changing the map unit and applying the vulnerability to all the buildings of a test site (approximately 800 buildings), which were inventoried during fieldwork. The economic value of the buildings of the Loures municipality was calculated using an adaptation of the Portuguese Tax Services formula. The hazard was assessed by combining the susceptibility of the slopes, the spatio-temporal probability and the frequency-magnitude relationship of the landslide. Finally, the risk was mapped for different landslide magnitudes and different spatio-temporal probabilities. The highest landslide risk was found for the landslide with a depth of 3 m in the landslide body, and a height of 1m in the landslide foot.

  7. Spatial vulnerability units - expert-based spatial modelling of socio-economic vulnerability in the Salzach catchment, Austria

    NASA Astrophysics Data System (ADS)

    Kienberger, S.; Lang, S.; Zeil, P.

    2009-05-01

    The assessment of vulnerability has moved to centre-stage of the debate between different scientific disciplines related to climate change and disaster risk management. Composed by a combination of social, economical, physical and environmental factors the assessment implies combining different domains as well as quantitative with qualitative data and makes it therefore a challenge to identify an integrated metric for vulnerability. In this paper we define vulnerability in the context of climate change, targeting the hazard "flood". The developed methodology is being tested in the Salzach river catchment in Austria, which is largely prone to floods. The proposed methodology allows the spatial quantification of vulnerability and the identification of vulnerability units. These units build upon the geon concept which acts as a framework for the regionalization of continuous spatial information according to defined parameters of homogeneity. Using geons, we are capable of transforming singular domains of information on specific systemic components to policy-relevant, conditioned information. Considering the fact that vulnerability is not directly measurable and due to its complex dimension and social construction an expert-based approach has been chosen. Established methodologies such as Multicriteria Decision Analysis, Delphi exercises and regionalization approaches are being integrated. The method not only enables the assessment of vulnerability independent from administrative boundaries, but also applies an aggregation mode which reflects homogenous vulnerability units. This supports decision makers to reflect on complex issues such as vulnerability. Next to that, the advantage is to decompose the units to their underlying domains. Feedback from disaster management experts indicates that the approach helps to improve the design of measures aimed at strengthening preparedness and mitigation. From this point of view, we reach a step closer towards validation of the

  8. Battlefield Medical Network: Biosensors In A Tactical Environment

    DTIC Science & Technology

    2016-03-01

    MEDICAL NETWORK: BIOSENSORS IN A TACTICAL ENVIRONMENT by Ralph R. Montgomery Yekaterina L. Anderson March 2016 Thesis Advisor: Alex...2016 3. REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE BATTLEFIELD MEDICAL NETWORK: BIOSENSORS IN A TACTICAL ENVIRONMENT 5...School Monterey, CA 93943-5000 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING /MONITORING AGENCY NAME(S) AND ADDRESS(ES) N/ A 10

  9. Transitioning the Tactical Marine Corps to IPv6

    DTIC Science & Technology

    2011-09-01

    SUT System Under Test SYSCOM Systems Command (synonymous with MCSC) TCP Transmission Control Protocol TDS Tactical Data Systems TDN...capability to provide services to the Marine Corps Tactical Data Systems ( TDS ) and other DDS-M systems. The 2 DDS-M can function as the file server...Intelligence ( ATI ) program provides comprehensive application protocols and attacks, as well as feature updates and responsive service and support with

  10. Media/Device Configurations for Platoon Leader Tactical Training

    DTIC Science & Technology

    1985-02-01

    munication and visual communication sig- na ls, VInputs to the The device should simulate the real- Platoon Leader time receipt of all tactical voice...communication, audio and visual battle- field cues, and visual communication signals. 14- Table 4 (Continued) Functional Capability Categories and...battlefield cues, and visual communication signals. 0.8 Receipt of limited tactical voice communication, plus audio and visual battlefield cues, and visual

  11. Analysis of Tactical Intelligence Experience in Southeast Asia

    DTIC Science & Technology

    1976-02-01

    Analysis of Tactical Intelligence Experience in Southeast Asia (U) by John R. Johnson Richard P. Joyce Paul C. Nagle Aristotelis D. Stathacopoulos...INSTRUCTIONSREPORT DOCUMENTATION PAEBEFORE COMPLETING FORM 1. REKPOXT NUMBER F OT CESSION No. I PIENT’S CAT ALOG NUMBER Experience in Southeast Asia (U...WORDS (Confinue, an reverse aide ii neressory and identit’ biy blockA ,wmbor) tactical intelligence intelligence organization Laos Southeast Asia

  12. Climate change and forest trees in the Pacific Northwest: guide to vulnerability assessment methodology

    Treesearch

    W. Devine; C. Aubry; J. Miller; K. Potter; A. Bower

    2012-01-01

    This guide provides a step-by-step description of the methodology used to apply the Forest Tree Genetic Risk Assessment System (ForGRAS; Potter and Crane 2010) to the tree species of the Pacific Northwest in a recent climate change vulnerability assessment (Devine et al. 2012). We describe our modified version of the ForGRAS model, and we review the model’s basic...

  13. Assessing socioeconomic vulnerability to dengue fever in Cali, Colombia: statistical vs expert-based modeling

    PubMed Central

    2013-01-01

    Background As a result of changes in climatic conditions and greater resistance to insecticides, many regions across the globe, including Colombia, have been facing a resurgence of vector-borne diseases, and dengue fever in particular. Timely information on both (1) the spatial distribution of the disease, and (2) prevailing vulnerabilities of the population are needed to adequately plan targeted preventive intervention. We propose a methodology for the spatial assessment of current socioeconomic vulnerabilities to dengue fever in Cali, a tropical urban environment of Colombia. Methods Based on a set of socioeconomic and demographic indicators derived from census data and ancillary geospatial datasets, we develop a spatial approach for both expert-based and purely statistical-based modeling of current vulnerability levels across 340 neighborhoods of the city using a Geographic Information System (GIS). The results of both approaches are comparatively evaluated by means of spatial statistics. A web-based approach is proposed to facilitate the visualization and the dissemination of the output vulnerability index to the community. Results The statistical and the expert-based modeling approach exhibit a high concordance, globally, and spatially. The expert-based approach indicates a slightly higher vulnerability mean (0.53) and vulnerability median (0.56) across all neighborhoods, compared to the purely statistical approach (mean = 0.48; median = 0.49). Both approaches reveal that high values of vulnerability tend to cluster in the eastern, north-eastern, and western part of the city. These are poor neighborhoods with high percentages of young (i.e., < 15 years) and illiterate residents, as well as a high proportion of individuals being either unemployed or doing housework. Conclusions Both modeling approaches reveal similar outputs, indicating that in the absence of local expertise, statistical approaches could be used, with caution. By decomposing identified

  14. Tactics for the Educational Change Agent. A Preliminary Analyisis.

    ERIC Educational Resources Information Center

    Rosenau, Fred S.

    This prototype of a guide for educational change agents focuses on the roles and tactics of personnel employed in nonprofit educational research and development organizations and in state and intermediate education agencies. Included is a compilation of reports from recent users of three classes of tactics: information, demonstration, and field…

  15. National Levee Database: monitoring, vulnerability assessment and management in Italy

    NASA Astrophysics Data System (ADS)

    Barbetta, Silvia; Camici, Stefania; Maccioni, Pamela; Moramarco, Tommaso

    2015-04-01

    Italian levees and historical breach failures to be exploited in the framework of an operational procedure addressed to the seepage vulnerability assessment of river reaches where the levee system is an important structural measure against flooding. For its structure, INLED is a dynamic geospatial database with ongoing efforts to add levee data from authorities with the charge of hydraulic risk mitigation. In particular, the database is aimed to provide the available information about: i) location and condition of levees; ii) morphological and geometrical properties; iii) photographic documentation; iv) historical levee failures; v) assessment of vulnerability to overtopping and seepage carried out through a procedure based on simple vulnerability indexes (Camici et al. 2014); vi) management, control and maintenance; vii)flood hazard maps developed by assuming the levee system undamaged/damaged during the flood event. Currently, INLED contains data of levees that are mostly located in the Tiber basin, Central Italy. References Apel H., Merz B. & Thieken A.H. Quantification of uncertainties in flood risk assessments. Int J River Basin Manag 2008, 6, (2), 149-162. Camici S,, Barbetta S., Moramarco T., Levee body vulnerability to seepage: the case study of the levee failure along the Foenna stream on 1st January 2006 (central Italy)", Journal of Flood Risk Management, in press. Colleselli F. Geotechnical problems related to river and channel embankments. Rotterdam, the Netherlands: Springer, 1994. H. R.Wallingford Consultants (HRWC). Risk assessment for flood and coastal defence for strategic planning: high level methodology technical report, London, 2003. Mazzoleni M., Bacchi B., Barontini S., Di Baldassarre G., Pilotti M. & Ranzi R. Flooding hazard mapping in floodplain areas affected by piping breaches in the Po River, Italy. J Hydrol Eng 2014, 19, (4), 717-731.

  16. Improving the role of vulnerability assessments In decision support for effective climate adaptation

    Treesearch

    Linda A. Joyce; Constance I. Millar

    2014-01-01

    Vulnerability assessments (VA) have been proposed as an initial step in a process to develop and implement adaptation management for climate change in forest ecosystems. Scientific understanding of the effects of climate change is an ever-accumulating knowledge base. Synthesizing information from this knowledge base in the context of our understanding of ecosystem...

  17. Network Exploration and Vulnerability Assessment Using a Combined Blackbox and Whitebox Analysis Approach

    DTIC Science & Technology

    2010-03-01

    Employ NetFlow on Edge Router ......................................... 45 E. IMPLEMENT AN INTEGRATED VULNERABILITY ASSESSMENT. 48 1. Conduct...45 Figure 18. Netflow Information on Unauthorized Connections ............................ 46 Figure 19. Algorithm for Detecting...indicating that an attack has being initiated from this port. Figure 17. Information on Traffic Generated by Suspicious Host 3. Employ NetFlow

  18. IVUS-Based Computational Modeling and Planar Biaxial Artery Material Properties for Human Coronary Plaque Vulnerability Assessment

    PubMed Central

    Liu, Haofei; Cai, Mingchao; Yang, Chun; Zheng, Jie; Bach, Richard; Kural, Mehmet H.; Billiar, Kristen L.; Muccigrosso, David; Lu, Dongsi; Tang, Dalin

    2012-01-01

    Image-based computational modeling has been introduced for vulnerable atherosclerotic plaques to identify critical mechanical conditions which may be used for better plaque assessment and rupture predictions. In vivo patient-specific coronary plaque models are lagging due to limitations on non-invasive image resolution, flow data, and vessel material properties. A framework is proposed to combine intravascular ultrasound (IVUS) imaging, biaxial mechanical testing and computational modeling with fluid-structure interactions and anisotropic material properties to acquire better and more complete plaque data and make more accurate plaque vulnerability assessment and predictions. Impact of pre-shrink-stretch process, vessel curvature and high blood pressure on stress, strain, flow velocity and flow maximum principal shear stress was investigated. PMID:22428362

  19. Assessing the Impacts of Decadal Socio-Agro-Hydro Climatic Variations on Agricultural Vulnerability over India

    NASA Astrophysics Data System (ADS)

    Mohanty, M. P.; Sharma, T.; Ghosh, S.; Karmakar, S.

    2017-12-01

    Among both rice and wheat producing countries, India holds one of the major global shares in terms of production. However, with rising population, economic variability, and increasing food demand, it has become indispensable to strategically assess the food security of the nation, particularly under changing climatic conditions. This can be achieved by improving knowledge on the impacts of climate change on crop growth and yield through understanding the current status of agricultural vulnerability and quantifying its decadal changes. The present research focuses on assessing the observed decadal changes in agricultural vulnerability over India, at a district-scale. In the study, the deliberation of multiple climatic, hydrologic, agricultural indicators will majorly facilitate evaluating their direct/indirect influence on the crop production. In addition, a set of socio-economic indicators will also be considered to understand the attribution of these factors on the change in agricultural vulnerability. Here, these indicators will be integrated into a multivariate data envelopment analysis (DEA) framework to derive relative efficiency of each unit or district in crop production, which will be further transformed into a well-grounded agricultural vulnerability map. It has become essential to understand the influence of these indicators on agriculture, given that the extended periods of excessive/no rainfall or high/low temperature can alter the water cycle and hence cause stress on the agroecosystem. Likewise, change in the population density, main and marginal cultivators, main and marginal agriculture labours, improvement in management practices, or increase in power supply for agricultural use, can directly affect the food security of the region. Hence, this study will undoubtedly assist the decision-makers/strategists by highlighting the agriculturally vulnerable regions over India. Consequently, it will reassure the farmers to define bottom-up approaches in

  20. Automating Flood Hazard Mapping Methods for Near Real-time Storm Surge Inundation and Vulnerability Assessment

    NASA Astrophysics Data System (ADS)

    Weigel, A. M.; Griffin, R.; Gallagher, D.

    2015-12-01

    Storm surge has enough destructive power to damage buildings and infrastructure, erode beaches, and threaten human life across large geographic areas, hence posing the greatest threat of all the hurricane hazards. The United States Gulf of Mexico has proven vulnerable to hurricanes as it has been hit by some of the most destructive hurricanes on record. With projected rises in sea level and increases in hurricane activity, there is a need to better understand the associated risks for disaster mitigation, preparedness, and response. GIS has become a critical tool in enhancing disaster planning, risk assessment, and emergency response by communicating spatial information through a multi-layer approach. However, there is a need for a near real-time method of identifying areas with a high risk of being impacted by storm surge. Research was conducted alongside Baron, a private industry weather enterprise, to facilitate automated modeling and visualization of storm surge inundation and vulnerability on a near real-time basis. This research successfully automated current flood hazard mapping techniques using a GIS framework written in a Python programming environment, and displayed resulting data through an Application Program Interface (API). Data used for this methodology included high resolution topography, NOAA Probabilistic Surge model outputs parsed from Rich Site Summary (RSS) feeds, and the NOAA Census tract level Social Vulnerability Index (SoVI). The development process required extensive data processing and management to provide high resolution visualizations of potential flooding and population vulnerability in a timely manner. The accuracy of the developed methodology was assessed using Hurricane Isaac as a case study, which through a USGS and NOAA partnership, contained ample data for statistical analysis. This research successfully created a fully automated, near real-time method for mapping high resolution storm surge inundation and vulnerability for the

  1. Comparison of empirical and numerical methods for the assessment of coastal vulnerability to erosion

    NASA Astrophysics Data System (ADS)

    Kokkinos, Dimitris; Prinos, Panagiotis

    2017-04-01

    Assessing the vulnerability to erosion is an important step in order to identify the prone areas and propose an adaptation policy to climate change in coastal areas. In this paper two coastal areas at the Northern part of the Aegean Sea are selected to examine their vulnerability to erosion. The first case is Lesbos Island where the most common feature is pocket beaches and the second one is the coast of Thrace composed by long sandy beaches. In both case studies, the same simplified methodology proposed by Mendoza and Jimenez (2009) is used, which links the vulnerability to erosion with morphodynamic parameters such as beach retreat and beach width. The key parameter for the vulnerability assessment is the beach retreat. For its calculation two different approaches are used and compared. The first approach divides the eroded volume with the eroded depth and it is based on an empirical formula, derived for the Greek seas from the CCSEAWAVS project (Kokkinos et al, 2014), which links the eroded volume with JA parameter, a beach erosion predictor proposed by Jimenez (1993). The sediment fall velocity, the beach slope and the wave characteristics are the only necessary parameters to calculate JA. The second approach is based on the results derived from the numerical model Xbeach (Roelvink et al., 2009), which is an open source, state-of the-art, two-dimensional model including the hydrodynamic processes of short and long wave transformation, wave-induced setup, overwash, inundation, as well as the morphodynamic processes of bed load and suspended sediment transport, dune face avalanching, bed update and breaching. The results indicate that the area of Thrace is very prone to erosion at the eastern and western part of the study area, while the Island of Lesbos appears to have very low vulnerability. The application of this methodology with the two different approaches aims to generate useful information about the vulnerability to erosion, to examine the reliability of

  2. Current Simulation Methods in Military Systems Vulnerability Assessment

    DTIC Science & Technology

    1990-11-01

    Weapons * 1990: JASON Review of the Army Approach to Vulnerability Testing Many of the suggestions and recommendations made by these committees concern...damage vectors. Ongoing work by the JASONs 29 is also targeted to developing statistical methods for LF-test/SQuASH-model comparisons in Space 2]. We...Technical Report BRL-TR-3113, June 1990. 28. L. Tonnessen, A. Fries , L. Starkey and A. Stein, Live Fire Testing in the Evaluation of the Vulnerability of

  3. Intramuscular Tranexamic Acid in Tactical and Combat Settings.

    PubMed

    Vu, Erik N; Wan, Wilson C Y; Yeung, Titus C; Callaway, David W

    Uncontrolled hemorrhage remains a leading cause of preventable death in tactical and combat settings. Alternate routes of delivery of tranexamic acid (TXA), an adjunct in the management of hemorrhagic shock, are being studied. A working group for the Committee for Tactical Emergency Casualty Care reviewed the available evidence on the potential role for intramuscular (IM) administration of TXA in nonhospital settings as soon as possible from the point of injury. EMBASE and MEDLINE/PubMed databases were sequentially searched by medical librarians for evidence of TXA use in the following contexts and/or using the following keywords: prehospital, trauma, hemorrhagic shock, optimal timing, optimal dose, safe volume, incidence of venous thromboembolism (VTE), IM bioavailability. A total of 183 studies were reviewed. The strength of the available data was variable, generally weak in quality, and included laboratory research, case reports, retrospective observational reviews, and few prospective studies. Current volume and concentrations of available formulations of TXA make it, in theory, amenable to IM injection. Current bestpractice guidelines for large-volume injection (i.e., 5mL) support IM administration in four locations in the adult human body. One case series suggests complete bioavailability of IM TXA in healthy patients. Data are lacking on the efficacy and safety of IM TXA in hemorrhagic shock. There is currently insufficient evidence to support a strong recommendation for or against IM administration of TXA in the combat setting; however, there is an abundance of literature demonstrating efficacy and safety of TXA use in a broad range of patient populations. Balancing the available data and risk- benefit ratio, IM TXA should be considered a viable treatment option for tactical and combat applications. Additional studies should focus on the optimal dose and bioavailability of IM dosing of patients in hemorrhagic shock, with assessment of potential downstream

  4. A Machine Learning System for Analyzing Human Tactics in a Game

    NASA Astrophysics Data System (ADS)

    Ito, Hirotaka; Tanaka, Toshimitsu; Sugie, Noboru

    In order to realize advanced man-machine interfaces, it is desired to develop a system that can infer the mental state of human users and then return appropriate responses. As the first step toward the above goal, we developed a system capable of inferring human tactics in a simple game played between the system and a human. We present a machine learning system that plays a color expectation game. The system infers the tactics of the opponent, and then decides the action based on the result. We employed a modified version of classifier system like XCS in order to design the system. In addition, three methods are proposed in order to accelerate the learning rate. They are a masking method, an iterative method, and tactics templates. The results of computer experiments confirmed that the proposed methods effectively accelerate the machine learning. The masking method and the iterative method are effective to a simple strategy that considers only a part of past information. However, study speed of these methods is not enough for the tactics that refers to a lot of past information. For the case, the tactics template was able to settle the study rapidly when the tactics is identified.

  5. Beyond just sea-level rise: Considering macroclimatic drivers within coastal wetland vulnerability assessments to climate change

    USGS Publications Warehouse

    Osland, Michael J.; Enwright, Nicholas M.; Day, Richard H.; Gabler, Christopher A.; Stagg, Camille L.; Grace, James B.

    2016-01-01

    Due to their position at the land-sea interface, coastal wetlands are vulnerable to many aspects of climate change. However, climate change vulnerability assessments for coastal wetlands generally focus solely on sea-level rise without considering the effects of other facets of climate change. Across the globe and in all ecosystems, macroclimatic drivers (e.g., temperature and rainfall regimes) greatly influence ecosystem structure and function. Macroclimatic drivers have been the focus of climate-change related threat evaluations for terrestrial ecosystems, but largely ignored for coastal wetlands. In some coastal wetlands, changing macroclimatic conditions are expected to result in foundation plant species replacement, which would affect the supply of certain ecosystem goods and services and could affect ecosystem resilience. As examples, we highlight several ecological transition zones where small changes in macroclimatic conditions would result in comparatively large changes in coastal wetland ecosystem structure and function. Our intent in this communication is not to minimize the importance of sea-level rise. Rather, our overarching aim is to illustrate the need to also consider macroclimatic drivers within vulnerability assessments for coastal wetlands.

  6. Development of a security vulnerability assessment process for the RAMCAP chemical sector.

    PubMed

    Moore, David A; Fuller, Brad; Hazzan, Michael; Jones, J William

    2007-04-11

    sector. This method was developed through the cooperation of the many organizations and the individuals involved from the chemical sector RAMCAP development activities. The RAMCAP SVA method is intended to provide a common basis for making vulnerability assessments and risk-based decisions for homeland security. Mr. Moore serves as the coordinator for the chemical manufacturing, petroleum refining, and LNG sectors for the RAMCAP project and Dr. Jones is the chief technology officer for ASME-ITI, LLC for RAMCAP.

  7. Earthquake Vulnerability Assessment for Hospital Buildings Using a Gis-Based Group Multi Criteria Decision Making Approach: a Case Study of Tehran, Iran

    NASA Astrophysics Data System (ADS)

    Delavar, M. R.; Moradi, M.; Moshiri, B.

    2015-12-01

    Nowadays, urban areas are threatened by a number of natural hazards such as flood, landslide and earthquake. They can cause huge damages to buildings and human beings which necessitates disaster mitigation and preparation. One of the most important steps in disaster management is to understand all impacts and effects of disaster on urban facilities. Given that hospitals take care of vulnerable people reaction of hospital buildings against earthquake is vital. In this research, the vulnerability of hospital buildings against earthquake is analysed. The vulnerability of buildings is related to a number of criteria including age of building, number of floors, the quality of materials and intensity of the earthquake. Therefore, the problem of seismic vulnerability assessment is a multi-criteria assessment problem and multi criteria decision making methods can be used to address the problem. In this paper a group multi criteria decision making model is applied because using only one expert's judgments can cause biased vulnerability maps. Sugeno integral which is able to take into account the interaction among criteria is employed to assess the vulnerability degree of buildings. Fuzzy capacities which are similar to layer weights in weighted linear averaging operator are calculated using particle swarm optimization. Then, calculated fuzzy capacities are included into the model to compute a vulnerability degree for each hospital.

  8. Case Study 3: Species vulnerability assessment for the Middle Rio Grande, New Mexico

    Treesearch

    Deborah M. Finch; Megan Friggens; Karen Bagne

    2011-01-01

    This case study describes a method for scoring terrestrial species that have potential to be vulnerable to climate change. The assessment tool seeks to synthesize complex information related to projected climate changes into a predictive tool for species conservation. The tool was designed to aid managers in prioritizing species management actions in response to...

  9. Vulnerability assessment of RC frames considering the characteristic of pulse-like ground motions

    NASA Astrophysics Data System (ADS)

    Xu, Chao; Wen, Zengping

    2017-04-01

    Pulse-like ground motions are a special class of ground motions that are particularly challenging to characterize for earthquake hazard assessment. These motions are characterized by a "pulse" in the velocity time history of the motion, and they are typically very intense and have been observed to cause severe damage to structures in past earthquakes. So it is particularly important to characterize these ground motions. Previous studies show that the severe response of structure is not entirely accounted for by measuring the intensity of the ground motion using spectral acceleration of the elastic first-mode period of a structure (Sa(T1)). This paper will use several alternative intensity measures to characterize the effect of pulse-like ground motions in vulnerability assessment. The ability of these intensity measures to characterize pulse-like ground motions will be evaluated. Pulse-like ground motions and ordinary ground motions are selected as input to carry out incremental dynamic analysis. Structural response and vulnerability are estimated by using Sa(T1) as the intensity measure. The impact of pulse period on structural response is studied through residual analysis. By comparing the difference between the structural response and vulnerability curves using pulse-like ground motions and ordinary ground motions as the input, the impact of velocity pulse on vulnerability is investigated and the shortcoming of using Sa(T1) to characterize pulse-like ground motion is analyzed. Then, vector-valued ground motion intensity measures(Sa(T1)&RT1,T2, Sa(T1)&RPGV,Sa) and inelastic displacement spectra(Sdi(T1)) are used to characterize the damage potential of pulse-like ground motions, the efficiency and sufficiency of these intensity measures are evaluated. The study shows that: have strong the damage potential of near fault ground motions with velocity pulse is closely related to the pulse period of strong motion as well as first mode period of vibration and nonlinear

  10. Psychosocial Needs Assessment among Earthquake Survivors in Lorestan Province with an Emphasis on the Vulnerable Groups

    PubMed Central

    Forouzan, A.; Eftekhari, M. Baradaran; Falahat, K.; Dejman, M.; Heidari, N.; Habibi, E.

    2013-01-01

    Introduction: Iran is one of the ten most earthquake prone countries in the world. Earthquakes not only cause new psychological needs among the population but particularly so when one considers vulnerable groups. This in - depth study was conducted with the aim of assessing psychosocial needs six months after an earthquake happened in the west of the county in Lorestan province. Methods: This is a qualitative study using focus group discussion that focuses mainly on the vulnerable groups (women, children, elderly and disabled people) after an earthquake in Boz-azna; a village in Lorestan province in western part of Iran. Findings: Results of the psychosocial assessment indicated feelings of anxiety and worries in four vulnerable groups. Horror, hyper-excitement, avoidance and disturbing thoughts were observed in all groups with the exception of the elderly. Educational failures, loneliness and isolation were highlighted in children. All groups encountered socio-economic needs that included loss of assets and sense of insecurity and also reproductive problems were reported in women's group. Discussion and Conclusion: Modification of a protocol on psychosocial support considering the context of the rural and urban areas with emphasis on the specific needs of the vulnerable groups is an appropriate strategy in crisis management. It seems that appropriate public awareness regarding assistance programs can be effective in reducing stress and needs of disaster survivors. PMID:23777724

  11. Advanced Strategic and Tactical Relay Request Management for the Mars Relay Operations Service

    NASA Technical Reports Server (NTRS)

    Allard, Daniel A.; Wallick, Michael N.; Gladden, Roy E.; Wang, Paul; Hy, Franklin H.

    2013-01-01

    This software provides a new set of capabilities for the Mars Relay Operations Service (MaROS) in support of Strategic and Tactical relay, including a highly interactive relay request Web user interface, mission control over relay planning time periods, and mission management of allowed strategic vs. tactical request parameters. Together, these new capabilities expand the scope of the system to include all elements critical for Tactical relay operations. Planning of replay activities spans a time period that is split into two distinct phases. The first phase is called Strategic, which begins at the time that relay opportunities are identified, and concludes at the point that the orbiter generates the flight sequences for on board execution. Any relay request changes from this point on are called Tactical. Tactical requests, otherwise called Orbit - er Relay State Changes (ORSC), are highly restricted in terms of what types of changes can be made, and the types of parameters that can be changed may differ from one orbiter to the next. For example, one orbiter may be able to delay the start of a relay request, while another may not. The legacy approach to ORSC management involves exchanges of e-mail with "requests for change" and "acknowledgement of approval," with no other tracking of changes outside of e-mail folders. MaROS Phases 1 and 2 provided the infrastructure for strategic relay for all supported missions. This new version, 3.0, introduces several capabilities that fully expand the scope of the system to include tactical relay. One new feature allows orbiter users to manage and "lock" Planning Periods, which allows the orbiter team to formalize the changeover from Strategic to Tactical operations. Another major feature allows users to interactively submit tactical request changes via a Web user interface. A third new feature allows orbiter missions to specify allowed tactical updates, which are automatically incorporated into the tactical change process

  12. Leading Change Step-by-Step: Tactics, Tools, and Tales

    ERIC Educational Resources Information Center

    Spiro, Jody

    2010-01-01

    "Leading Change Step-by-Step" offers a comprehensive and tactical guide for change leaders. Spiro's approach has been field-tested for more than a decade and proven effective in a wide variety of public sector organizations including K-12 schools, universities, international agencies and non-profits. The book is filled with proven tactics for…

  13. Source Code Vulnerability Assessment Methodology

    DTIC Science & Technology

    2008-09-01

    Information Sciences Directorate’s (CISD) Center for Intrusion Detection Monitoring and Protection ( CIMP ) to reverse engineer tools captured by...application terminates. It is possible, however, to write past the buffer boundary in a controlled way such that the value for EIP can be overwritten with...vulnerability is widely known and has been exploited in the past . This work provides a proof-of-concept for the ARL/SLAD CAM and exploit development process

  14. Assessing the Relationship Between Social Vulnerability and Community Resilience to Hazards

    PubMed Central

    Bergstrand, Kelly; Brumback, Babette; Zhang, Yi

    2017-01-01

    This article contributes to the disaster literature by measuring and connecting two concepts that are highly related but whose relationship is rarely empirically evaluated: social vulnerability and community resilience. To do so, we measure community resilience and social vulnerability in counties across the United States and find a correlation between high levels of vulnerability and low levels of resilience, indicating that the most vulnerable counties also tend to be the least resilient. We also find regional differences in the distribution of community resilience and social vulnerability, with the West being particularly vulnerable while the Southeast is prone to low levels of resilience. By looking at both social vulnerability and community resilience, we are able to map communities’ social risks for harm from threats as well as their capacities for recovering and adapting in the aftermath of hazards. This provides a more complete portrait of the communities that might need the most assistance in emergency planning and response, as well as whether such interventions will need to be tailored toward reducing damage or finding the path to recovery. PMID:29276330

  15. Assessing the Relationship Between Social Vulnerability and Community Resilience to Hazards.

    PubMed

    Bergstrand, Kelly; Mayer, Brian; Brumback, Babette; Zhang, Yi

    2015-06-01

    This article contributes to the disaster literature by measuring and connecting two concepts that are highly related but whose relationship is rarely empirically evaluated: social vulnerability and community resilience. To do so, we measure community resilience and social vulnerability in counties across the United States and find a correlation between high levels of vulnerability and low levels of resilience, indicating that the most vulnerable counties also tend to be the least resilient. We also find regional differences in the distribution of community resilience and social vulnerability, with the West being particularly vulnerable while the Southeast is prone to low levels of resilience. By looking at both social vulnerability and community resilience, we are able to map communities' social risks for harm from threats as well as their capacities for recovering and adapting in the aftermath of hazards. This provides a more complete portrait of the communities that might need the most assistance in emergency planning and response, as well as whether such interventions will need to be tailored toward reducing damage or finding the path to recovery.

  16. TB in Vulnerable Populations

    PubMed Central

    Ugarte-Gil, César; Caro, Godofredo; Aylas, Rula; Castro, César; Lema, Claudia

    2016-01-01

    Abstract This article analyzes the factors associated with vulnerability of the Ashaninka, the most populous indigenous Peruvian Amazonian people, to tuberculosis (TB). By applying a human rights-based analytical framework that assesses public policy against human rights standards and principles, and by offering a step-by-step framework for a full assessment of compliance, it provides evidence of the relationship between the incidence of TB among the Ashaninka and Peru’s poor level of compliance with its human rights obligations. The article argues that one of the main reasons for the historical vulnerability of the Ashaninka to diseases such as TB is a lack of political will on the part of the national government to increase public health spending, ensure that resources reach the most vulnerable population, and adopt and invest in a culturally appropriate health system. PMID:27780999

  17. A multi-site reconstruction algorithm for bottom-up vulnerability assessment of water resource systems to changing streamflow conditions

    NASA Astrophysics Data System (ADS)

    Nazemi, A.; Zaerpour, M.

    2016-12-01

    Current paradigm for assessing the vulnerability of water resource systems to changing streamflow conditions often involves a cascade application of climate and hydrological models to project the future states of streamflow regime, entering to a given water resource system. It is widely warned, however, that the overall uncertainty in this "top-down" modeling enterprise can be large due to the limitations in representing natural and anthropogenic processes that affect future streamflow variability and change. To address this, various types of stress-tests are suggested to assess the vulnerability of water resources systems under a wide range of possible changes in streamflow conditions. The scope of such "bottom-up" assessments can go well beyond top-down projections and therefore provide a basis for monitoring different response modes, under which water resource systems become vulnerable. Despite methodological differences, all bottom-up assessments are equipped with a systematic sampling procedure, with which different possibilities for future climate and/or streamflow conditions can be realized. Regardless of recent developments, currently available streamflow sampling algorithms are still limited, particularly in regional contexts, for which accurate representation of spatiotemporal dependencies in streamflow regime are of major importance. In this presentation, we introduce a new development that enables handling temporal and spatial dependencies in regional streamflow regimes through a unified stochastic reconstruction algorithm. We demonstrate the application of this algorithm accross various Canadian regions. By considering a real-world regional water resources system, we show how the new multi-site reconstruction algorithm can extend the practical utility of bottom-up vulnerability assessment and improve quantifying the associated risk in natural and anthropogenic water systems under unknown future conditions.

  18. Assessment of groundwater vulnerability in the Daule aquifer, Ecuador, using the susceptibility index method.

    PubMed

    Ribeiro, Luís; Pindo, Juan Carlos; Dominguez-Granda, Luis

    2017-01-01

    The Guayas region in Ecuador is economically very important, producing 68% of the national crops. The main agricultural activities threaten the groundwater therein with nitrate contamination given the large fertiliser and water needs. The present work tests the applicability of the susceptibility index assessment method in evaluating the impact of agricultural activities on groundwater quality, using as a case study an aquifer of the Guayas river basin in Ecuador. The index adapts four parameters of the DRASTIC method and incorporated a new land use parameter. Results show that the areas highly vulnerable to contamination are located in irrigation perimeters of dominant paddy fields associated with the high recharge rates in the alluvial deposits. Respectively, moderately vulnerable and low-vulnerability areas correspond to aquatic environments and forests, semi-natural zones and water bodies. One of the main contributions of the Daule aquifer vulnerability is likely its wide, flat topography. A great part of the aquifer is at high risk of contamination by nitrates if a code of good agricultural practices is not applied. Therefore the implementation of a monitoring network to control the nitrates concentrations is the first step to assure groundwater quality for drinking purposes. Copyright © 2016 Elsevier B.V. All rights reserved.

  19. Livelihood Vulnerability Approach to Assess Climate Change Impacts to Mixed Agro-Livestock Smallholders Around the Gandaki River Basin of Nepal

    NASA Astrophysics Data System (ADS)

    Panthi, J., Sr.

    2014-12-01

    Climate change vulnerability depends upon various factors and differs between places, sectors and communities. People in developing countries whose subsistence livelihood depends upon agriculture and livestock are identified as particularly vulnerable. Nepal, where the majority of people are in a mixed agro-livestock system, is identified as the world's fourth most vulnerable country to climate change. However, there are few studies on how vulnerable mixed agro-livestock smallholders are and how their vulnerability differs across different ecological regions. This study aims to test two vulnerability assessment indices, livelihood vulnerability index (LVI) and IPCC vulnerability index (VI-IPCC), around the Gandaki river basin of Nepal. A total of 543 households practicing mixed agro-livestock were surveyed from three districts (Dhading, Syangja and Kapilvastu) representing the mountain, mid-hill and lowland altitudinal belts respectively. Data on socio-demographics, livelihoods, social networks, health, food and water security, natural disasters and climate variability were collected. Both indices differed across the three districts, with mixed agro-livestock smallholders of Dhading district found to be the most vulnerable and that of Syangja least vulnerable. This vulnerability index approach may be used to monitor rural vulnerability and/or evaluate potential program/policy effectiveness in poor countries like Nepal. The present findings are intended to help in designing intervention strategies to reduce vulnerability of mixed agro-livestock smallholders and other rural people in developing countries to climate change.

  20. Joint Light Tactical Vehicle (JLTV): Background and Issues for Congress

    DTIC Science & Technology

    2017-01-10

    Joint Light Tactical Vehicle (JLTV): Background and Issues for Congress Andrew Feickert Specialist in Military Ground Forces January 10, 2017......Congressional Research Service Summary The Joint Light Tactical Vehicle (JLTV) is being developed by the Army and the Marine Corps as a successor to the High

  1. An assessment of streamflow vulnerability to climate using ...

    EPA Pesticide Factsheets

    Identifying regions with similar hydrology is useful for assessing water quality and quantity across the U.S., especially areas that are difficult or costly to monitor. For example, hydrologic landscapes (HLs) have been used to map streamflow variability and assess the spatial distribution of climatic response in Oregon, Alaska, and the Pacific Northwest. HLs have also been applied to assess historic and projected climatic impacts across the Western U.S. In this project, we summarized (1) the HL classification methodology and (2) the utility of using HLs as a tool to classify the vulnerability of streams to climatic changes in the Western U.S. During the HL classification process, we analyzed climate, seasonality, aquifer permeability, terrain, and soil permeability as the primary hydrologic drivers (and precipitation intensity as a secondary driver) associated with large scale hydrologic processes (storage, conveyance, and flow of water into or out of the watershed) in the West. We derived the dominant hydrologic pathways (surface runoff or deep or shallow groundwater) from the HL classification of different catchments to test our hypotheses: 1) Changes in climate will have greater impacts on streamflow in catchments dominated by surface runoff. 2) Catchments historically fed by surface runoff from winter snowmelt in the spring will experience greater impact if precipitation falls as rain instead of snow. We calculated S* (precipitation surplus, which includes

  2. Groundwater vulnerability mapping of Qatar aquifers

    NASA Astrophysics Data System (ADS)

    Baalousha, Husam Musa

    2016-12-01

    Qatar is one of the most arid countries in the world with limited water resources. With little rainfall and no surface water, groundwater is the only natural source of fresh water in the country. Whilst the country relies mainly on desalination of seawater to secure water supply, groundwater has extensively been used for irrigation over the last three decades, which caused adverse environmental impact. Vulnerability assessment is a widely used tool for groundwater protection and land-use management. Aquifers in Qatar are carbonate with lots of fractures, depressions and cavities. Karst aquifers are generally more vulnerable to contamination than other aquifers as any anthropogenic-sourced contaminant, especially above a highly fractured zone, can infiltrate quickly into the aquifer and spread over a wide area. The vulnerability assessment method presented in this study is based on two approaches: DRASTIC and EPIK, within the framework of Geographical Information System (GIS). Results of this study show that DRASTIC vulnerability method suits Qatar hydrogeological settings more than EPIK. The produced vulnerability map using DRASTIC shows coastal and karst areas have the highest vulnerability class. The southern part of the country is located in the low vulnerability class due to occurrence of shale formation within aquifer media, which averts downward movement of contaminants.

  3. Organizing Chaos: The Tactical Assault Kit Collaborative Mission Planner

    DTIC Science & Technology

    2018-12-01

    choice. Case studies , such as the 2017 Presidential Inauguration Collective Security Event, Operation Flaming Sword 2017, and the counter-ISIS campaign...rallied around the Tactical Assault Kit (TAK) as their mission command tool of choice. Case studies , such as the 2017 Presidential Inauguration...authorities ADA Air Defense Artillery ADM Army Design Methodology ADAPT Advanced Digital Advisor Partner Technologies ATAK Android Tactical Assault Kit

  4. Assessment of Vulnerability to Climate Change Effects on Urban Stormwater Infrastructure in City of Las Vegas, NV

    NASA Astrophysics Data System (ADS)

    Thakali, R.; Kalra, A.; Mastino, L.; Velotta, M.; Ahmad, S.

    2016-12-01

    In the spring of 2016 the City of Las Vegas and the Southern Illinois University began collaborating on a project that seeks to assess the city's current vulnerability to drought, extreme heat, and extreme precipitation patterns, as well as the response mechanisms that are already in place within its jurisdiction. The document analyzes a series of scenarios to assess to what extent the vulnerability of four Key Planning Areas will change in the long term (30-50 years), what will be the most affected city operations, and what mechanisms the City will need to put into place to adapt to such changes. As part of the vulnerability report, this study assessed the impacts of climate change in the existing stormwater system of the Gowan watershed within City of Las Vegas, NV, by assessing projected design storms. The climate change projection for the region was evaluated using the high-resolution North American Regional Climate Change Assessment Program (NARCCAP) climate model data. The design storms (6h 100y) were calculated using the best fitted probability distribution among twenty-seven distributions for the historic and future NARCCAP climate model projection. North American Regional Reanalysis (NARR) data were used to assess the performance of NARCCAP data. The projected design storms were implemented in an existing U.S. Army Corps of Engineers' Hydrologic Engineering Center Hydrologic Modeling System (HEC-HMS) model developed by Clark County Regional Flood Control District (CCRFCD), Las Vegas. The simulation results showed an increase in the design storms which exceeded the capacity of existing stormwater infrastructure.

  5. Towards a tactical nuclear weapons treaty? Is There a Role of IAEA Tools of Safeguards?

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Saunders, Emily C.; Rowberry, Ariana N.; Fearey, Bryan L.

    2012-07-12

    In recent years, there is growing interest in formal negotiations on non-strategic or tactical nuclear weapons. With the negotiations of New START, there has been much speculation that a tactical nuclear weapons treaty should be included in the follow on to New START. This paper examines the current policy environment related to tactical weapons and some of the issues surrounding the definition of tactical nuclear weapons. We then map out the steps that would need to be taken in order to begin discussions on a tactical nuclear weapons treaty. These steps will review the potential role of the IAEA inmore » verification of a tactical nuclear weapons treaty. Specifically, does IAEA involvement in various arms control treaties serve as a useful roadmap on how to overcome some of the issues pertaining to a tactical nuclear weapons treaty?« less

  6. Assessing the Agricultural Vulnerability for India under Changing Climate

    NASA Astrophysics Data System (ADS)

    Sharma, Tarul; Vardhan Murari, Harsha; Karmakar, Subhankar; Ghosh, Subimal; Singh, Jitendra

    2016-04-01

    Global climate change has proven to show majorly negative impacts for the far future. These negative impacts adversely affect almost all the fields including agriculture, water resources, tourism, and marine ecosystem. Among these, the effects on agriculture are considered to be of prime importance since its regional impacts can directly affect the global food security. Under such lines, it becomes essential to understand how climate change directs agricultural production for a region along with its vulnerability. In India, rice and wheat are considered as major staple diet and hence understanding its production loss/gain due to regional vulnerability to climate change becomes necessary. Here, an attempt has been made to understand the agricultural vulnerability for rice and wheat, considering yield as a function of temperature and precipitation during growing period. In order to accomplish this objective, the ratio of actual to potential evapo-transpiration has been considered which serves as a reliable indicator; with more this ratio towards unity, less vulnerable will be the region. The current objective needs an integration of climatic, hydrological and agricultural parameters; that can be achieved by simulating a climate data driven hydrologic (Variable Infiltration Capacity, VIC) model and a crop (Decision Support System for Agrotechnology Transfer, DSSAT) model. The proposed framework is an attempt to derive a crop vulnerability map that can facilitate in strategizing adaption practices which can reduce the adverse impacts of climate change in future.

  7. Tactics for the New Guerilla Trainer.

    ERIC Educational Resources Information Center

    Mershon, Phil

    2001-01-01

    Discusses tactics for surviving as a trainer in an unfriendly organizational atmosphere. Offers a method for demonstrating to managers the connection between quality assurance and employee empowerment. (JOW)

  8. Eco-environmental vulnerability assessment for large drinking water resource: a case study of Qiandao Lake Area, China

    NASA Astrophysics Data System (ADS)

    Gu, Qing; Li, Jun; Deng, Jinsong; Lin, Yi; Ma, Ligang; Wu, Chaofan; Wang, Ke; Hong, Yang

    2015-09-01

    The Qiandao Lake Area (QLA) is of great significance in terms of drinking water supply in East Coast China as well as a nationally renowned tourist attraction. A series of laws and regulations regarding the QLA environment have been enacted and implemented throughout the past decade with the aim of negating the harmful effects associated with expanding urbanization and industrialization. In this research, an assessment framework was developed to analyze the eco-environmental vulnerability of the QLA from 1990-2010 by integrating fuzzy analytic hierarchy process (FAHP) and geographical information systems (GIS) in an attempt to gain insights into the status quo of the QLA so as to review and evaluate the effectiveness of the related policies. After processing and analyzing the temporal and spatial variation of eco-environmental vulnerability and major environmental issues in the QLA, we found that the state of eco-environmental vulnerability of the QLA was acceptable, though a moderate deterioration was detected during the study period. Furthermore, analysis of the combination of vulnerability and water quality indicated that the water quality showed signs of declination, though the overall status remained satisfactory. It was hence concluded that the collective protection and treatment actions were effective over the study period, whereas immediately stricter measures would be required for protecting the drinking water quality from domestic sewage and industrial wastewater. Finally, the spatial variation of the eco-environmental vulnerability assessment also implied that specifically more targeted measures should be adopted in respective regions for long-term sustainable development of the QLA.

  9. Assessing social capacity and vulnerability of private households to natural hazards - integrating psychological and governance factors

    NASA Astrophysics Data System (ADS)

    Werg, J.; Grothmann, T.; Schmidt, P.

    2013-06-01

    People are unequally affected by extreme weather events in terms of mortality, morbidity and financial losses; this is the case not only for developing, but also for industrialized countries. Previous research has established indicators for identifying who is particularly vulnerable and why, focusing on socio-demographic factors such as income, age, gender, health and minority status. However, these factors can only partly explain the large disparities in the extent to which people are affected by natural hazards. Moreover, these factors are usually not alterable in the short to medium term, which limits their usefulness for strategies of reducing social vulnerability and building social capacity. Based on a literature review and an expert survey, we propose an approach for refining assessments of social vulnerability and building social capacity by integrating psychological and governance factors.

  10. Assessment of groundwater vulnerability to nitrates from agricultural sources using a GIS-compatible logic multicriteria model.

    PubMed

    Rebolledo, Boris; Gil, Antonia; Flotats, Xavier; Sánchez, José Ángel

    2016-04-15

    In the present study an overlay method to assess groundwater vulnerability is proposed. This new method based on multicriteria decision analysis (MCDA) was developed and validated using an appropriate case study in Aragon area (NE Spain). The Vulnerability Index to Nitrates from Agricultural Sources (VINAS) incorporates a novel Logic Scoring of Preferences (LSP) approach, and it has been developed using public geographic information from the European Union. VINAS-LSP identifies areas with five categories of vulnerability, taking into account the hydrogeological and environmental characteristics of the territory as a whole. The resulting LSP map is a regional screening tool that can provide guidance on the potential risk of nitrate pollution, as well as highlight areas where specific research and farming planning policies are required. Copyright © 2016 Elsevier Ltd. All rights reserved.

  11. Review and recommendations for climate change vulnerability assessment approaches with examples from the Southwest

    Treesearch

    M. Friggens; K. Bagne; D. Finch; D. Falk; J. Triepke; A. Lynch

    2013-01-01

    Climate change creates new challenges for resource managers and decision-makers with broad and often complex effects that make it difficult to accurately predict and design management actions to minimize undesirable impacts. We review pertinent information regarding methods and approaches used to conduct climate change vulnerability assessments to reveal assumptions...

  12. Brain Transcriptional Profiles of Male Alternative Reproductive Tactics and Females in Bluegill Sunfish

    PubMed Central

    Partridge, Charlyn G.; MacManes, Matthew D.; Knapp, Rosemary; Neff, Bryan D.

    2016-01-01

    Bluegill sunfish (Lepomis macrochirus) are one of the classic systems for studying male alternative reproductive tactics (ARTs) in teleost fishes. In this species, there are two distinct life histories: parental and cuckolder, encompassing three reproductive tactics, parental, satellite, and sneaker. The parental life history is fixed, whereas individuals who enter the cuckolder life history transition from sneaker to satellite tactic as they grow. For this study, we used RNAseq to characterize the brain transcriptome of the three male tactics and females during spawning to identify gene ontology (GO) categories and potential candidate genes associated with each tactic. We found that sneaker males had higher levels of gene expression differentiation compared to the other two male tactics. Sneaker males also had higher expression in ionotropic glutamate receptor genes, specifically AMPA receptors, compared to other males, which may be important for increased spatial working memory while attempting to cuckold parental males at their nests. Larger differences in gene expression also occurred among male tactics than between males and females. We found significant expression differences in several candidate genes that were previously identified in other species with ARTs and suggest a previously undescribed role for cAMP-responsive element modulator (crem) in influencing parental male behaviors during spawning. PMID:27907106

  13. Brain Transcriptional Profiles of Male Alternative Reproductive Tactics and Females in Bluegill Sunfish.

    PubMed

    Partridge, Charlyn G; MacManes, Matthew D; Knapp, Rosemary; Neff, Bryan D

    2016-01-01

    Bluegill sunfish (Lepomis macrochirus) are one of the classic systems for studying male alternative reproductive tactics (ARTs) in teleost fishes. In this species, there are two distinct life histories: parental and cuckolder, encompassing three reproductive tactics, parental, satellite, and sneaker. The parental life history is fixed, whereas individuals who enter the cuckolder life history transition from sneaker to satellite tactic as they grow. For this study, we used RNAseq to characterize the brain transcriptome of the three male tactics and females during spawning to identify gene ontology (GO) categories and potential candidate genes associated with each tactic. We found that sneaker males had higher levels of gene expression differentiation compared to the other two male tactics. Sneaker males also had higher expression in ionotropic glutamate receptor genes, specifically AMPA receptors, compared to other males, which may be important for increased spatial working memory while attempting to cuckold parental males at their nests. Larger differences in gene expression also occurred among male tactics than between males and females. We found significant expression differences in several candidate genes that were previously identified in other species with ARTs and suggest a previously undescribed role for cAMP-responsive element modulator (crem) in influencing parental male behaviors during spawning.

  14. The Effects of Tactical Vehicle Training on the Lands of Fort Carson, Colorado. An Ecological Assessment.

    DTIC Science & Technology

    1984-12-01

    Laboratory [USA-CERLI, 1974), p 13. W. D. Severinghaus, R. E. Riggins, and W. D. Coran , Effects of Tracked Vehicle Activity on Terrestrial Mammals, Birds...and Vegetation at Fort S Knox, KY, Special Report N-77/ADA073782 (USA-CERL, 1979), pp 1-64; W. D. Severinghaus and W. D. Coran , Effects of Tactical

  15. Beyond just sea-level rise: considering macroclimatic drivers within coastal wetland vulnerability assessments to climate change.

    PubMed

    Osland, Michael J; Enwright, Nicholas M; Day, Richard H; Gabler, Christopher A; Stagg, Camille L; Grace, James B

    2016-01-01

    Due to their position at the land-sea interface, coastal wetlands are vulnerable to many aspects of climate change. However, climate change vulnerability assessments for coastal wetlands generally focus solely on sea-level rise without considering the effects of other facets of climate change. Across the globe and in all ecosystems, macroclimatic drivers (e.g., temperature and rainfall regimes) greatly influence ecosystem structure and function. Macroclimatic drivers have been the focus of climate change-related threat evaluations for terrestrial ecosystems, but largely ignored for coastal wetlands. In some coastal wetlands, changing macroclimatic conditions are expected to result in foundation plant species replacement, which would affect the supply of certain ecosystem goods and services and could affect ecosystem resilience. As examples, we highlight several ecological transition zones where small changes in macroclimatic conditions would result in comparatively large changes in coastal wetland ecosystem structure and function. Our intent in this communication is not to minimize the importance of sea-level rise. Rather, our overarching aim is to illustrate the need to also consider macroclimatic drivers within vulnerability assessments for coastal wetlands. Published 2015. This article is a U.S. Government work and is in the public domain in the USA.

  16. Tactical Cyber: Building A Strategy For Cyber Support To Corps And Below

    DTIC Science & Technology

    Future U.S. Army cyber operations will need to be conducted jointly and at all echelons and must include both defensive and offensive components.1...The Army is now developing doctrine, concepts, and capabilities to conduct and support tactical cyber operations. We propose the following vision...statement: The Army will be able to employ organic cyber capabilities at the tactical echelon with dedicated personnel in support of tactical units while

  17. The Tactics of Hope

    ERIC Educational Resources Information Center

    Cytrynbaum, Pamela

    2010-01-01

    In this article, the author provides an intimate glimpse into the writing work that Joe Cytrynbaum did with students from Manley Career Academy High School in Chicago. The author's discussion of Joe's "tactics of hope" is layered and brought to life by Joe's poetry and the poetry of his students. The author presents Joe's poems and the…

  18. Tactical Communications Training Environment for Unmanned Aircraft System Operators

    DTIC Science & Technology

    2016-12-15

    communication and teamwork skills. The Night Vision Tactical Trainer - Shadow (NVTT-Shadow) was developed as a game -based desktop solution to train...advanced individual training Soldiers and UAS course instructors. The usability testing demonstrated the feasibility of interactive gaming applied to MUM...T tactical communications. Ratings and comments from both students and instructors validated the need as well as mission context, game content, and

  19. Benefit-cost assessment of the use of LORAN to mitigate GPS vulnerability for positioning, navigation, and timing services

    DOT National Transportation Integrated Search

    2004-03-30

    In 2001, a Volpe Center study assessed the vulnerability of the transportation system to : loss of the Global Positioning System (GPS).1 Subsequent to this assessment, the : Secretary of the U.S. Department of Transportation initiated an examination ...

  20. Population vulnerability to storm surge flooding in coastal Virginia, USA.

    PubMed

    Liu, Hua; Behr, Joshua G; Diaz, Rafael

    2016-07-01

    This study aims to assess the vulnerability of populations to storm surge flooding in 12 coastal localities of Virginia, USA. Population vulnerability is assessed by way of 3 physical factors (elevation, slope, and storm surge category), 3 built-up components (road availability, access to hospitals, and access to shelters), and 3 household conditions (storm preparedness, financial constraints to recovering from severe weather events, and health fragility). Fuzzy analysis is used to generate maps illustrating variation in several types of population vulnerability across the region. When considering physical factors and household conditions, the most vulnerable neighborhoods to sea level rise and storm surge flooding are largely found in urban areas. However, when considering access to critical infrastructure, we find rural residents to be more vulnerable than nonrural residents. These detailed assessments can inform both local and state governments in catastrophic planning. In addition, the methodology may be generalized to assess vulnerability in other coastal corridors and communities. The originality is highlighted by evaluating socioeconomic conditions at refined scale, incorporating a broader range of human perceptions and predispositions, and employing a geoinformatics approach combining physical, built-up, and socioeconomic conditions for population vulnerability assessment. Integr Environ Assess Manag 2016;12:500-509. © 2015 SETAC. © 2015 SETAC.

  1. Rockfall vulnerability assessment for masonry buildings

    NASA Astrophysics Data System (ADS)

    Mavrouli, Olga

    2015-04-01

    The methodologies for the quantitative risk assessment vary in function of the application scale and the available data. For fragmental rockfalls, risk calculation requires data for the expected damage of the exposed elements due to potential rock block impacts with a range of trajectories, magnitudes and intensities. Although the procedures for the quantification of the rock block characteristics in terms of magnitude-frequency relationships are well established, there are few methodologies for the calculation of the vulnerability, and these are usually empirical or judgmental. The response of buildings to rock block impacts using analytical methods has been mainly realised so far for reinforced concrete buildings, and some fragility curves have been calculated with the results, indicating the potential damage for a range of rock block characteristics. Masonry buildings, as a common structural typology in mountainous areas, are in many cases impacted by rock blocks during rockfalls. Their response presents some peculiarities in comparison with reinforced-concrete structures given the non-homogeneity and variability of the compound materials (blocks and mortar), their orthotropy, low strength in tension, the statically indeterminate load-bearing system and the non-monolithic connections. To this purpose, analytical procedures which are specifically adapted to masonry structures should be used for the evaluation of the expected damage due to rock impacts. In this contribution we discuss the application of the analytical approach for the assessment of the expected damage in rockfall prone areas and the simulation assumptions that can be made concerning the materials, geometry, loading and the relevant simplifications. The amount of uncertainties introduced during their analytical simulation is high due to the dispersion of the data for material mechanical properties and the construction techniques and quality and thus a probabilistic assessment is suggested. The

  2. Internetting tactical security sensor systems

    NASA Astrophysics Data System (ADS)

    Gage, Douglas W.; Bryan, W. D.; Nguyen, Hoa G.

    1998-08-01

    The Multipurpose Surveillance and Security Mission Platform (MSSMP) is a distributed network of remote sensing packages and control stations, designed to provide a rapidly deployable, extended-range surveillance capability for a wide variety of military security operations and other tactical missions. The baseline MSSMP sensor suite consists of a pan/tilt unit with video and FLIR cameras and laser rangefinder. With an additional radio transceiver, MSSMP can also function as a gateway between existing security/surveillance sensor systems such as TASS, TRSS, and IREMBASS, and IP-based networks, to support the timely distribution of both threat detection and threat assessment information. The MSSMP system makes maximum use of Commercial Off The Shelf (COTS) components for sensing, processing, and communications, and of both established and emerging standard communications networking protocols and system integration techniques. Its use of IP-based protocols allows it to freely interoperate with the Internet -- providing geographic transparency, facilitating development, and allowing fully distributed demonstration capability -- and prepares it for integration with the IP-based tactical radio networks that will evolve in the next decade. Unfortunately, the Internet's standard Transport layer protocol, TCP, is poorly matched to the requirements of security sensors and other quasi- autonomous systems in being oriented to conveying a continuous data stream, rather than discrete messages. Also, its canonical 'socket' interface both conceals short losses of communications connectivity and simply gives up and forces the Application layer software to deal with longer losses. For MSSMP, a software applique is being developed that will run on top of User Datagram Protocol (UDP) to provide a reliable message-based Transport service. In addition, a Session layer protocol is being developed to support the effective transfer of control of multiple platforms among multiple control

  3. Enhancing The National Map Through Tactical Planning and Performance Monitoring

    USGS Publications Warehouse

    ,

    2008-01-01

    Tactical planning and performance monitoring are initial steps toward improving 'the way The National Map works' and supporting the U.S. Geological Survey (USGS) Science Strategy. This Tactical Performance Planning Summary for The National Map combines information from The National Map 2.0 Tactical Plan and The National Map Performance Milestone Matrix. The National Map 2.0 Tactical Plan is primarily a working document to guide The National Map program's execution, production, and metrics monitoring for fiscal years (FY) 2008 and 2009. The Tactical Plan addresses data, products, and services, as well as supporting and enabling activities. The National Map's 2-year goal for FY 2008 and FY 2009 is to provide a range of geospatial products and services that further the National Spatial Data Infrastructure and underpin USGS science. To do this, the National Geospatial Program will develop a renewed understanding during FY 2008 of key customer needs and requirements, develop the infrastructure to support The National Map business model, modernize its business processes, and reengineer its workforce. Priorities for The National Map will be adjusted if necessary to respond to changes to the project that may impact resources, constrain timeframes, or change customer needs. The supporting and enabling activities that make it possible to produce the products and services of The National Map will include partnership activities, improved compatibility of systems, outreach, and integration of data themes.

  4. Applying a statewide geospatial leaching tool for assessing soil vulnerability ratings for agrochemicals across the contiguous United States.

    PubMed

    Ki, Seo Jin; Ray, Chittaranjan; Hantush, Mohamed M

    2015-06-15

    A large-scale leaching assessment tool not only illustrates soil (or groundwater) vulnerability in unmonitored areas, but also can identify areas of potential concern for agrochemical contamination. This study describes the methodology of how the statewide leaching tool in Hawaii modified recently for use with pesticides and volatile organic compounds can be extended to the national assessment of soil vulnerability ratings. For this study, the tool was updated by extending the soil and recharge maps to cover the lower 48 states in the United States (US). In addition, digital maps of annual pesticide use (at a national scale) as well as detailed soil properties and monthly recharge rates (at high spatial and temporal resolutions) were used to examine variations in the leaching (loads) of pesticides for the upper soil horizons. Results showed that the extended tool successfully delineated areas of high to low vulnerability to selected pesticides. The leaching potential was high for picloram, medium for simazine, and low to negligible for 2,4-D and glyphosate. The mass loadings of picloram moving below 0.5 m depth increased greatly in northwestern and central US that recorded its extensive use in agricultural crops. However, in addition to the amount of pesticide used, annual leaching load of atrazine was also affected by other factors that determined the intrinsic aquifer vulnerability such as soil and recharge properties. Spatial and temporal resolutions of digital maps had a great effect on the leaching potential of pesticides, requiring a trade-off between data availability and accuracy. Potential applications of this tool include the rapid, large-scale vulnerability assessments for emerging contaminants which are hard to quantify directly through vadose zone models due to lack of full environmental data. Copyright © 2015 Elsevier Ltd. All rights reserved.

  5. Effect of playing tactics on achieving score-box possessions in a random series of team possessions from Norwegian professional soccer matches.

    PubMed

    Tenga, Albin; Holme, Ingar; Ronglan, Lars Tore; Bahr, Roald

    2010-02-01

    Methods of analysis that include an assessment of opponent interactions are thought to provide a more valid means of team match performance. The purpose of this study was to examine the effect of playing tactics on achieving score-box possession by assessing opponent interactions in Norwegian elite soccer matches. We analysed a random series of 1703 team possessions from 163 of 182 (90%) matches played in the professional men's league during the 2004 season. Multidimensional qualitative data obtained from ten ordered categorical variables were used. Offensive tactics were more effective in producing score-box possessions when playing against an imbalanced defence (28.5%) than against a balanced defence (6.5%) (P < 0.001). Multiple logistic regression found that, for the main variable "team possession type", counterattacks were more effective than elaborate attacks when playing against an imbalanced defence (odds ratio: 2.69; 95% confidence interval: 1.64 to 4.43) but not against a balanced defence (odds ratio: 1.14; 95% confidence interval: 0.47 to 2.76). Assessment of opponent interactions is critical to evaluate the effectiveness of offensive playing tactics on producing score-box possessions, and improves the validity of team match-performance analysis in soccer.

  6. Evaluation of tourniquet application in a simulated tactical environment.

    PubMed

    Sanak, Tomasz; Brzozowski, Robert; Dabrowski, Marek; Kozak, Magdalena; Dabrowska, Agata; Sip, Maciej; Naylor, Katarzyna; Torres, Kamil

    2018-01-01

    Application of a tourniquet in a tactical environment is implemented in two ways: the so-called self-aid, which is the application of a tourniquet by the injured, and the so-called buddy aid, which is the application of a tourniquet by the person provide aid. This study aimed to test the quality of tourniquet use in a simulated situation, close quarter battle. The study involved 24 injured operators and 72 operators in the whole simulation, implying 12 sections of six individuals. To validate the application of tourniquets, the recommendations of the Committee of Tactical Combat Care of the Injured were used, and ultrasound with Doppler function was employed to assess the hemodynamic effect of applying tourniquets. Native flow was observed in 15 operators; in three people, a trace flow was noticed, whereas in six people, a full flow was observed. No significant difference was found between the qualities of tourniquet application by the operators themselves compared with those of tourniquet application by another person. The median distance of tourniquet application from the armpit was 9.5 cm for self-aid and buddy aid. In 16 participants the outer arrangement of tourniquets was observed, and in only eight participants tourniquets were correctly located on the internal part of the arm. In 18 participants, tourniquets were not correctly prepared for use in the tactical environment, whereas in only six participants, they were correctly prepared. Most operators with a negative ultrasound flow revealed negative distal observed pulse (DOP). Positive DOP occurred in the majority of operators with full ultrasound flow. The application of tourniquets poses a challenge even in case of specialized units; therefore, there is a need to provide regular training for implementing that procedure.

  7. A Coupled Community-Level Assessment of Social and Physical Vulnerability to Hurricane Disasters

    NASA Astrophysics Data System (ADS)

    Kim, J. H.; Sutley, E. J.; Chowdhury, A. G.; Hamideh, S.

    2017-12-01

    A significant portion of the U.S. building inventory exists in hurricane- and flood-prone regions. The accompanying storm surge and rising water levels often result in the inundation of residential homes, particularly those occupied by low income households and forcing displacement. In order to mitigate potential damages, a popular design technique is to elevate the structure using piers or piles to above the base flood elevation. This is observed for single-family and multi-family homes, including manufactured homes and post-disaster temporary housing, albeit at lower elevations. Although this design alleviates potential flood damage, it affects the wind-structure interaction by subjecting the structure to higher wind speeds due to its increased height and also having a path for the wind to pass underneath the structure potentially creating new vulnerabilities to wind loading. The current ASCE 7 Standard (2016) does not include a methodology for addressing the modified aerodynamics and estimating wind loads for elevated structures, and thus the potential vulnerability during high wind events is unaccounted for in design. Using experimentally measured wind pressures on elevated and non-elevated residential building models, tax data, and census data, a coupled vulnerability assessment is performed at the community-level. Galveston, Texas is selected as the case study community. Using the coupled assessment model, a hindcast of 2008 Hurricane Ike is used for predicting physical damage and household dislocation. The predicted results are compared with the actual outcomes of the 2008 hurricane disaster. Recommendations are made (1) for code adoption based on the experimentally measured wind loads, and (2) for mitigation actions and policies that would could decrease population dislocation and promote recovery.

  8. Assessment of Water Sustainability Index Using Reliability-Resilience-Vulnerability Criteria Considering Climatic Variation over India

    NASA Astrophysics Data System (ADS)

    Lakshmi, V.; Mondal, A.; Kundu, S.

    2016-12-01

    Abstract:Precipitation can be considered as a key factor in Water Resources Sustainability (WRS). In India, WRS varies with widely varying distribution of precipitation. The economy of the India is based on agricultural production which mainly depends on rainfall. The main focus of the paper is assessment of Water Sustainability based on Standardized Precipitation Index (SPI) method for evaluating drought and non-drought conditionsin India using a precipitation data of a long time period (1871-2014). The study area has been divided into thirty sub-regions on the basis homogeneity pattern of rainfall distribution. The performance criteria such as, Reliability, Resilience, Vulnerability and Relative Vulnerability (RV) have been applied in this study. The ranges of water sustainably (WS), vulnerability, relative vulnerability and drought resilience are 0.26 to 0.67, 0.52 to 1.06, 0.22 to 0.61 and 0.72 to 1 respectively. Specifically, WS of Gangetic West Bengal, Naga-Mani-Mizo-trip, Konkan-Goa, Chattisgarh and Kerala are less (0.26, 0.31, 0.35, 0.38 and 0.38 respectively) while Punjab, Marathwada, West Rajasthan and Vidarbha are more (0.57, 0.60, 0.67 and 0.57 respectively).Finally, WS and RV have shown negative correlation (R2=0.86) while WS and drought resilience have shown positive correlation (R2=0.60). The results have clearly illustrated a scenario of entire India, which can be helpful in agricultural management in future. Key Words: Sustainability, SPI, Reliability, Resilience, Vulnerability

  9. Assessing Hazard Vulnerability, Habitat Conservation, and Restoration for the Enhancement of Mainland China's Coastal Resilience

    NASA Astrophysics Data System (ADS)

    Sajjad, Muhammad; Li, Yangfan; Tang, Zhenghong; Cao, Ling; Liu, Xiaoping

    2018-03-01

    Worldwide, humans are facing high risks from natural hazards, especially in coastal regions with high population densities. Rising sea levels due to global warming are making coastal communities' infrastructure vulnerable to natural disasters. The present study aims to provide a coupling approach of vulnerability and resilience through restoration and conservation of lost or degraded coastal natural habitats to reclamation under different climate change scenarios. The integrated valuation of ecosystems and tradeoffs model is used to assess the current and future vulnerability of coastal communities. The model employed is based on seven different biogeophysical variables to calculate a natural hazard index and to highlight the criticality of the restoration of natural habitats. The results show that roughly 25% of the coastline and more than 5 million residents are in highly vulnerable coastal areas of mainland China, and these numbers are expected to double by 2100. Our study suggests that restoration and conservation in recently reclaimed areas have the potential to reduce this vulnerability by 45%. Hence, natural habitats have proved to be a great defense against coastal hazards and should be prioritized in coastal planning and development. The findings confirm that natural habitats are critical for coastal resilience and can act as a recovery force of coastal functionality loss. Therefore, we recommend that the Chinese government prioritizes restoration (where possible) and conservation of the remaining habitats for the sake of coastal resilience to prevent natural hazards from escalating into disasters.

  10. Heat Wave Vulnerability Mapping for India.

    PubMed

    Azhar, Gulrez; Saha, Shubhayu; Ganguly, Partha; Mavalankar, Dileep; Madrigano, Jaime

    2017-03-30

    Assessing geographic variability in heat wave vulnerability forms the basis for planning appropriate targeted adaptation strategies. Given several recent deadly heatwaves in India, heat is increasingly being recognized as a public health problem. However, to date there has not been a country-wide assessment of heat vulnerability in India. We evaluated demographic, socioeconomic, and environmental vulnerability factors and combined district level data from several sources including the most recent census, health reports, and satellite remote sensing data. We then applied principal component analysis (PCA) on 17 normalized variables for each of the 640 districts to create a composite Heat Vulnerability Index (HVI) for India. Of the total 640 districts, our analysis identified 10 and 97 districts in the very high and high risk categories (> 2SD and 2-1SD HVI) respectively. Mapping showed that the districts with higher heat vulnerability are located in the central parts of the country. On examination, these are less urbanized and have low rates of literacy, access to water and sanitation, and presence of household amenities. Therefore, we concluded that creating and mapping a heat vulnerability index is a useful first step in protecting the public from the health burden of heat. Future work should incorporate heat exposure and health outcome data to validate the index, as well as examine sub-district levels of vulnerability.

  11. A Temporal Assessment of Barrier Island Vulnerability to Extreme Wave Events, Virginia Coast Reserve

    NASA Astrophysics Data System (ADS)

    Oster, D. J.; Moore, L. J.; Doran, K. J.; Stockdon, H. F.

    2010-12-01

    Barrier island vulnerability to storm-generated waves is directly related to interactions between shoreface morphology and surf-zone dynamics. During storms, the seaward-most dune often limits the landward extent of wave energy; however, if maximum wave run-up exceeds the elevation of the top of the dune, overwash or inundation may occur. The ‘Storm Impact Scale’ presented by Sallenger (2000) classifies barrier beach vulnerability to individual storm events based on the elevation of the frontal dune crest and toe relative to maximum wave run-up. Changes to the dune and beachface can occur over a range of time scales, altering local vulnerability to extreme waves from storms, even as a storm is occurring. As sea level continues to rise, barrier beaches will become increasingly vulnerable to overwash and inundation from a greater number of storms. Our objective is to assess temporal trends in barrier island vulnerability while also exploring island-chain-wide response and recovery from two notably different storm events (Nor’Ida and Hurricane Bonnie) along the undeveloped barrier islands of the Virginia Coast Reserve (VCR). We compare shoreline position and elevations of the frontal dune crest (DHIGH) and dune toe (DLOW) across four lidar data sets collected between 1998-2010. Observed significant wave height and period from the National Data Buoy Center and the Duck, NC Field Research Facility for the time period between 1985 and 2009 are classified to represent one-year, five-year, and ten-year storm events that serve as the basis for comparison of island vulnerability through time to a range of storm severity. Initial results reveal significant spatial and temporal variation in barrier island vulnerability to storms throughout the VCR. Despite the range of variability, all three beach features (i.e., shoreline position, DHIGH and DLOW), have moved landward indicating large-scale, widespread migration, or narrowing, of VCR barrier island landforms over the

  12. Vulnerability to Climate Change in Rural Nicaragua

    NASA Astrophysics Data System (ADS)

    Byrne, T. R.; Townshend, I.; Byrne, J. M.; McDaniel, S. A.

    2013-12-01

    While there is a growing recognition of the impact that climate change may have on human development, there has been a shift in focus from an impacts-led assessment approach towards a vulnerability-led assessment approach. This research operationalizes the IPCC's definition of vulnerability in a sub-national assessment to understand how different factors that shape vulnerability to climate change vary spatially across rural Nicaragua. The research utilizes the Food and Agriculture Organization of the United Nations' (FAO UN) CropWat model to evaluate how the annual yield of two of Nicaragua's staple crops may change under projected changes in temperature and precipitation. This analysis of agricultural sensitivity under exposure to climate change is then overlain with an indicator-based assessment of adaptive capacity in rural Nicaraguan farming households. Adaptive capacity was evaluated using household survey data from the 2001 National Household Survey on Living Standards Measurement, which was provided to us by the FAO UN. The result is a map representing current vulnerability to future climate change, and can serve as a basis for targeting policy interventions in rural Nicaragua.

  13. Geological hazards, vulnerability, and risk assessment using GIS: model for Glenwood Springs, Colorado

    NASA Astrophysics Data System (ADS)

    Mejía-Navarro, Mario; Wohl, Ellen E.; Oaks, Sherry D.

    1994-08-01

    Glenwood Springs, Colorado, lies at the junction of the Roaring Fork and Colorado Rivers, surrounded by the steep peaks of the Colorado Rocky Mountains. Large parts of the region have had intensive sheet erosion, debris flows, and hyperconcentrated floods triggered by landslides and slumps. The latter come from unstable slopes in the many tributary channels on the mountainsides, causing concentration of debris in channels and a large accumulation of sediment in colluvial wedges and debris fans that line the river valleys. Many of the landslide and debris-flow deposits exist in a state resembling suspended animation, ready to be destabilized by intense precipitation and/or seismic activity. During this century urban development in the Roaring Fork River valley has increased rapidly. The city of Glenwood Springs continues to expand over unstable debris fans without any construction of hazard mitigation structures. Since 1900, Glenwood Springs has had at least 21 damaging debris flows and floods; on July 24, 1977 a heavy thunderstorm spread a debris flow over more than 80 ha of the city. This paper presents a method that uses Geographic Information Systems (GIS) to assess geological hazards, vulnerability, and risk in the Glenwood Springs area. The hazards evaluated include subsidence, rockfall, debris flows, and floods, and in this paper we focus on debris flows and subsidence. Information on topography, hydrology, precipitation, geomorphic processes, bedrock and surficial geology, structural geology, soils, vegetation, and land use, was processed for hazard assessment using a series of algorithms. ARC/INFO and GRASS GIS softwares were used to produce maps and tables in a format accessible to urban planners. After geological hazards were defined for the study area, we estimated the vulnerability ( Ve) of various elements for an event of intensity i. Risk is assessed as a function of hazard and vulnerability. We categorized the study area in 14 classes for planning

  14. Aquatic Ecosystems, Water Quality, and Global Change: Challenges of Conducting Multi-Stressor Vulnerability Assessments (Final Report)

    EPA Science Inventory

    EPA announced the availability of the final report, Aquatic Ecosystems and Global Change: The Challenges of conducting Multi-Stressor Global Change Vulnerability Assessments. This report investigates the issues and challenges associated with identifying, calculating, and ...

  15. Adapting natural resource management to climate change: The South Central Oregon and Northern Rockies Adaptation Partnerships

    NASA Astrophysics Data System (ADS)

    Halofsky, J.; Peterson, D. L.

    2015-12-01

    Concrete ways to adapt to climate change are needed to help natural resource managers take the first steps to incorporate climate change into management and take advantage of opportunities to balance the negative effects of climate change. We recently initiated two science-management climate change adaptation partnerships, one with three national forests and one national park in south central Oregon, and the other with 16 national forests, three national parks and other stakeholders in the northern Rockies region. Goals of both partnerships were to: (1) synthesize published information and data to assess the exposure, sensitivity, and adaptive capacity of key resource areas, including water use, infrastructure, fisheries, and vegetation and disturbance; (2) develop science-based adaptation strategies and tactics that will help to mitigate the negative effects of climate change and assist the transition of biological systems and management to a warmer climate; (3) ensure adaptation strategies and tactics are incorporated into relevant planning documents; and (4) foster an enduring partnership to facilitate ongoing dialogue and activities related to climate change in the partnerships regions. After an initial vulnerability assessment by agency and university scientists and local resource specialists, adaptation strategies and tactics were developed in a series of scientist-manager workshops. The final vulnerability assessments and adaptation actions are incorporated in technical reports. The partnerships produced concrete adaptation options for national forest and other natural resource managers and illustrated the utility of place-based vulnerability assessments and scientist-manager workshops in adapting to climate change.

  16. Future Carrier-Based Tactical Aircraft Study

    DOT National Transportation Integrated Search

    1996-03-01

    This report describes an aircraft database which was developed to identify technology trends for several classes of tactical naval aircraft, including subsonic attack, supersonic fighter, and supersonic multimission aircraft classes. This study used ...

  17. A Descriptive Analysis of US Prehospital Care Response to Law Enforcement Tactical Incidents.

    PubMed

    Aberle, Sara J; Lohse, Christine M; Sztajnkrycer, Matthew D

    2015-01-01

    Law enforcement tactical incidents involve high-risk operations that exceed the capabilities of regular, uniformed police. Despite the existence of tactical teams for 50 years, little is known about the frequency or nature of emergency medical services (EMS) response to tactical events in the United States. The purpose of this study was to perform a descriptive analysis of tactical events reported to a national EMS database. Descriptive analysis of the 2012 National Emergency Medical Services Information System (NEMSIS) Public Release research data set, containing EMS emergency response data from 41 states. A total of 17,479,328 EMS events were reported, of which 3,953 events were coded as "Activation-Tactical or SWAT Specialty Service/Response Team." The most common level of prehospital care present on scene was basic life support (55.2%). The majority (72.3%) of tactical incident activations involved a single patient; mass casualty incidents occurred in 0.5% of events. The most common EMS response locations were homes (48.4%), streets or highways (37.0%), and public buildings (6.3%). The mean age of treated patients was 44.1 years ± 22.0 years; 3.5% of tactical incident activation patients were aged 8 years or less. Injuries were coded as firearm assault in 14.8% and as chemical exposure in 8.9% of events. Cardiac arrest occurred in 5.1% of patients, with the majority (92.2%) occurring prior to EMS arrival. The primary symptoms reported by EMS personnel were pain (37.4%), change in responsiveness (13.1%), and bleeding (8.1%). Advanced airway procedures occurred in 30 patients. No patients were documented as receiving tourniquets or needle thoracostomy. Approximately 11 EMS responses in support of law enforcement tactical operations occur daily in the United States. The majority occur in homes and involve a single patient. Advanced airway procedures are required in a minority of patients. Cardiac arrest is rare and occurs prior to EMS response in the majority of

  18. Comparison of Three Instructional Approaches to Enhance Tactical Knowledge in Volleyball among University Students

    ERIC Educational Resources Information Center

    Vande Broek, Gert; Boen, Filip; Claessens, Manu; Feys, Jos; Ceux, Tanja

    2011-01-01

    This study investigated the decision-making process of three instructional groups (i.e., teacher-centered, student-centered with tactical questioning and student-centered without tactical questioning) in practical courses in volleyball among university students. All students (N = 122) performed a Tactical Awareness task on the correctness of the…

  19. The role of minimum supply and social vulnerability assessment for governing critical infrastructure failure: current gaps and future agenda

    NASA Astrophysics Data System (ADS)

    Garschagen, Matthias; Sandholz, Simone

    2018-04-01

    Increased attention has lately been given to the resilience of critical infrastructure in the context of natural hazards and disasters. The major focus therein is on the sensitivity of critical infrastructure technologies and their management contingencies. However, strikingly little attention has been given to assessing and mitigating social vulnerabilities towards the failure of critical infrastructure and to the development, design and implementation of minimum supply standards in situations of major infrastructure failure. Addressing this gap and contributing to a more integrative perspective on critical infrastructure resilience is the objective of this paper. It asks which role social vulnerability assessments and minimum supply considerations can, should and do - or do not - play for the management and governance of critical infrastructure failure. In its first part, the paper provides a structured review on achievements and remaining gaps in the management of critical infrastructure and the understanding of social vulnerabilities towards disaster-related infrastructure failures. Special attention is given to the current state of minimum supply concepts with a regional focus on policies in Germany and the EU. In its second part, the paper then responds to the identified gaps by developing a heuristic model on the linkages of critical infrastructure management, social vulnerability and minimum supply. This framework helps to inform a vision of a future research agenda, which is presented in the paper's third part. Overall, the analysis suggests that the assessment of socially differentiated vulnerabilities towards critical infrastructure failure needs to be undertaken more stringently to inform the scientifically and politically difficult debate about minimum supply standards and the shared responsibilities for securing them.

  20. Tactical Satellite 3

    NASA Astrophysics Data System (ADS)

    Davis, T. M.; Straight, S. D.; Lockwook, R. B.

    2008-08-01

    Tactical Satellite 3 is an Air Force Research Laboratory Science and Technology (S&T) initiative that explores the capability and technological maturity of small, low-cost satellites. It features a low cost "plug and play" modular bus and low cost militarily significant payloads - a Raytheon developed Hyperspectral imager and secondary payload data exfiltration provided by the Office of Naval Research. In addition to providing for ongoing innovation and demonstration in this important technology area, these S&T efforts also help mitigate technology risk and establish a potential concept of operations for future acquisitions. The key objectives are rapid launch and on-orbit checkout, theater commanding, and near-real time theater data integration. It will also feature a rapid development of the space vehicle and integrated payload and spacecraft bus by using components and processes developed by the satellite modular bus initiative. Planned for a late summer 2008 launch, the TacSat-3 spacecraft will collect and process images and then downlink processed data using a Common Data Link. An in-theater tactical ground station will have the capability to uplink tasking to spacecraft and will receive full data image. An international program, the United Kingdom Defence Science and Technology Laboratory (DSTL) and Australian Defence Science and Technology Organisation (DSTO) plan to participate in TacSat-3 experiments.

  1. Technical and tactical skills related to performance levels in tennis: A systematic review.

    PubMed

    Kolman, Nikki S; Kramer, Tamara; Elferink-Gemser, Marije T; Huijgen, Barbara C H; Visscher, Chris

    2018-06-11

    The aim of this systematic review is to provide an overview of outcome measures and instruments identified in the literature for examining technical and tactical skills in tennis related to performance levels. Such instruments can be used to identify talent or the specific skill development training needs of particular players. Searches for this review were conducted using the PubMed, Web of Science, and PsycInfo databases. Out of 733 publications identified through these searches, 40 articles were considered relevant and included in this study. They were divided into three categories: (1) technical skills, (2) tactical skills and (3) integrated technical and tactical skills. There was strong evidence that technical skills (ball velocity and to a lesser extent ball accuracy) and tactical skills (decision making, anticipation, tactical knowledge and visual search strategies) differed among players according to their performance levels. However, integrated measurement of these skills is required, because winning a point largely hinges on a tactical decision to perform a particular stroke (i.e., technical execution). Therefore, future research should focus on examining the relationship between these skills and tennis performance and on the development of integrated methods for measuring these skills.

  2. Applicants' preference for impression management tactic in employment interviews by Transportation Security Administration.

    PubMed

    Scudder, Joseph N; Lamude, Kevin G

    2009-04-01

    Following past findings on employment interviews, this study hypothesized applicants would have a preference for using self-promoting tactics of impression management over other focuses. Self-reports of impression management tactics were collected from 124 applicants who had interviews for screener positions with the Transportation Security Administration. Contrary to the hypothesis, analysis indicated participants reported they used more ingratiation tactics attempting to praise the interviewer than self-promotion tactics which focused on their own accomplishments. Special qualifications for security jobs which required well-developed perceptual abilities and the controlling structure of the interview context were perhaps responsible for present results differing from prior findings.

  3. Timescales for exploratory tactical behaviour in football small-sided games.

    PubMed

    Ric, Angel; Hristovski, Robert; Gonçalves, Bruno; Torres, Lorena; Sampaio, Jaime; Torrents, Carlota

    2016-09-01

    The aim of this study was to identify the dynamics of tactical behaviour emerging on different timescales in football small-sided games and to quantify short- and long-term exploratory behaviour according to the number of opponents. Two teams of four professional male footballers played small-sided games against two different teams with a variable number of opponents (3, 5 and 7). Data were collected using a combination of systematic observation and a non-differential global positioning system (15 Hz). The temporal diversity and structural flexibility of the players were determined by calculating the dynamic overlap order parameter q, entropy and trapping strength. Analysis of the exploratory dynamics revealed two different timescales, forming a different metastable landscape of action for each constraint. Fast dynamics lasted on average a few seconds and consisted of changes in tactical patterns. The long timescale corresponded to the shared tasks of offence and defence lasting tens of seconds. The players' tactical diversity decreased with an increasing number of opponents, especially in defence. Manipulating numerical imbalance is likely to promote changes in the diversity, unpredictability and flexibility of tactical solutions. The fact that the temporally nested structure of constraints shaped the emergence of tactical behaviour provides a new rationale for practice task design. The manipulation of numerical imbalance on the timescale of a few tens of seconds, on which the exploratory behaviour of players saturates, may help coaches to optimise the exploratory efficiency of the small-sided games.

  4. An assessment of groundwater potential and vulnerability in the Upper Manyame Sub-Catchment of Zimbabwe

    NASA Astrophysics Data System (ADS)

    Misi, Alfred; Gumindoga, Webster; Hoko, Zvikomborero

    2018-06-01

    Severe depletion and pollution of groundwater resources are of rising concern in the Upper Manyame Sub-Catchment (UMSC); Zimbabwe's most urbanised sub-catchment. Despite groundwater playing a pivotal role in the provision of potable water in the sub-catchment, it is under serious threat from anthropogenic stressors which include sewage effluents and leachates from landfills, among others. Inadequate scientific knowledge pertaining to the spatio-temporal variability of groundwater storage and vulnerability in the UMSC is further compromising its sustainability. Therefore, comprehensive assessments of UMSC's Groundwater Potential (GP) and vulnerability are crucial for its effective management. This study assessed GP and vulnerability in the UMSC using Geographic Information Systems and Remote Sensing techniques. Groundwater conditioning factors: geology, slope, land-use, drainage density, topographic index, altitude, recharge and rainfall were used to develop GP zones. Validation of the GP map was done by correlating estimated GP with historical borehole yields. An assessment of groundwater vulnerability was done at micro-catchment level (Marimba) using the GOD model; a three parameter Index Overlay Model. Marimba is the most urbanised and has the second highest borehole density. It also exhibits similar landuse characteristics as the UMSC. Furthermore, groundwater quality in Marimba was assessed from 15 sampling sites. Fifteen drinking water parameters were analysed based on the standard methods for Water and Wastewater Examination. The potability of groundwater was then assessed by comparing the measured water quality parameters with the Standards Association of Zimbabwe (SAZ) drinking water standards and/or WHO guidelines for drinking water. Repeated Measures ANOVA and Principal Component Analysis (PCA) were used to assess the spatio-temporal variations in groundwater quality and to identify key parameters, respectively. About 72% (2725.9 km2) of the UMSC was

  5. Impact of Terrain Features for Tactical Network Connectivity

    DTIC Science & Technology

    2013-09-01

    Impact of Terrain Features for Tactical Network Connectivity David Tate Lance Joneckis John Fregeau Corinne Kramer David Sparrow I N S T I T U...2000. I N S T I T U T E F O R D E F E N S E A N A LY S E S IDA Document NS D-5026 Impact of Terrain Features for Tactical Network Connectivity...visibility is acceptable when networks operate over flat terrain. Under our simple LOS model of connectivity, mobility has little impact in such an

  6. Mapping Water Vulnerability of the Yangtze River Basin: 1994-2013.

    PubMed

    Sun, Fengyun; Kuang, Wenhui; Xiang, Weining; Che, Yue

    2016-11-01

    A holistic understanding of the magnitude and long-term trend of water vulnerability is essential for making management decisions in a given river basin. Existing procedures to assess the spatiotemporal dynamic of water vulnerability in complex mega-scale river basins are inadequate; a new method named ensemble hydrologic assessment was proposed in this study, which allows collection of data and knowledge about many aspects of water resources to be synthesized in a useful way for vulnerability assessment. The objective of this study is to illustrate the practical utility of such an integrated approach in examining water vulnerability in the Yangtze River Basin. Overall, the results demonstrated that the ensemble hydrologic assessment model could largely explain the spatiotemporal evolution of water vulnerability. This paper improves understanding of the status and trends of water resources in the Yangtze River Basin.

  7. What if quality of damage data is poor: an Entity-Vulnerability approach for flood vulnerability assessment

    NASA Astrophysics Data System (ADS)

    Naso, Susanna; Chen, Albert S.; Djordjević, Slobodan; Aronica, Giuseppe T.

    2015-04-01

    The classical approach to flood defence, aimed at reducing the probability of flooding through hard defences, has been substituted by flood risk management approach which accepts the idea of coping with floods and aims at reducing not only the probability of flooding, but also the consequences. In this view, the concept of vulnerability becomes central, such as the (non-structural) measures for its increment. On 22 November 2011, an exceptional rainstorm hit the Longano catchment (North-East part of Sicily, Italy) producing local heavy rainfall, mud-debris flow and flash flooding. The flash flood involved property, buildings, roads and more than 100 commercial estates have suffered severe damages. Some days after the event, the municipality provided people forms to describe the damages that occurred on their properties. Unfortunately, the lack of common guidelines in compiling them, their coarseness and the impossibility to have monetary information on them (such us damage data from previous events), did not allow the implementation of a detailed damage analysis. What we're developing in this work is a method for a qualitative evaluation of the consequences of floods, based on vulnerability curves for structures and classes of entities at risk. The difficulty in deriving the vulnerability curves for different building typologies, as function of the water depth, was due to the lack of quantitative information both on damages caused by previous events and on buildings' value. To solve the problem we submitted a questionnaire to a team of experts asking for an estimation of building damages to different hypothetical inundation depths. What we wanted to obtain was deriving the vulnerability data from technicians' experience, believing in the fundamental importance of the collaboration among research and professional engineers. Through the elaboration and the synthesis of the experts' estimations we derived the vulnerability curves for different building typologies and

  8. Vulnerability of schools to floods in Nyando River catchment, Kenya.

    PubMed

    Ochola, Samuel O; Eitel, Bernhard; Olago, Daniel O

    2010-07-01

    This paper assesses the vulnerability of schools to floods in the Nyando River catchment (3,600 km(2)) in western Kenya and identifies measures needed to reduce this vulnerability. It surveys 130 schools in the lower reaches, where flooding is a recurrent phenomenon. Of the primary schools assessed, 40% were vulnerable, 48% were marginally vulnerable and 12% were not vulnerable. Of the secondary schools, 8% were vulnerable, 73% were marginally vulnerable and 19% were not vulnerable. Vulnerability to floods is due to a lack of funds, poor building standards, local topography, soil types and inadequate drainage. The Constituencies Development Fund (CDF), established in 2003, provides financial support to cover school construction and reconstruction costs; CDF Committees are expected to adopt school building standards. In an effort to promote safe and resilient construction and retrofitting to withstand floods, this paper presents vulnerability reduction strategies and recommendations for incorporating minimum standards in the on-going Primary School Infrastructure Programme Design.

  9. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes.

    PubMed

    Ali, Bako; Awad, Ali Ismail

    2018-03-08

    The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or "things" to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE) methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes.

  10. Osteoarthritis and the Tactical Athlete: A Systematic Review

    PubMed Central

    Cameron, Kenneth L.; Driban, Jeffrey B.; Svoboda, Steven J.

    2016-01-01

    Objective: Although tactical athletes (eg, military service members, law enforcement personnel, fire fighters) are exposed to several known risk factors, it remains unclear if they are at increased risk for osteoarthritis (OA). The purpose of this systematic review was to investigate the association between serving as a tactical athlete and the incidence and prevalence of OA. Data Sources: We completed a comprehensive systematic literature search in November 2014 using 12 bibliographic databases (eg, PubMed, Ovid, SportDiscus) supplemented with manual searches of reference lists. Study Selection: Studies were included if they met the following criteria: (1) an aim of the study was to investigate an association between tactical athletes and OA; (2) the outcome measure was radiographic OA, clinical OA, total joint replacement, self-reported diagnosis of OA, or placement on a waiting list for a total joint replacement; (3) the study design was a cohort study; and (4) the study was written in English. Data Extraction: One investigator extracted data from articles that met all inclusion criteria (eg, group descriptions, measures of disease burden, source of nonexposed controls). Data Synthesis: Twelve articles met the inclusion criteria and described retrospective cohort studies. Firefighters, active-duty military service members, and veteran military parachutists consistently had a higher incidence or prevalence of knee, hip, or any OA diagnosis (4 studies). Active-duty pilots and veteran military parachutists may have a higher prevalence of spine OA, but this was not statistically significant (2 studies). Occupational risk factors for OA among tactical athletes include rank and branch of military service. The risk of OA among individuals who completed mandatory national military service remains unclear (6 studies). Conclusions: The incidence of OA among tactical athletes appears to be significantly higher when compared with nonexposed controls. Further research is

  11. Assessing internal biophysical vulnerability to landslide hazards - a nested catchment approach: Xiangxi Watershed / Three Gorges Reservoir

    NASA Astrophysics Data System (ADS)

    Wiegand, Matthias; Seeber, Christoph; Hartmann, Heike; Xiang, Wei; King, Lorenz

    2010-05-01

    The Three Gorges dam construction was completed in 2006. Besides the international media, also the responsible authorities and various scholarly communities pay close attention to potential and actual environmental impacts related to the impoundment and development activities. The geo-environment within the Three Gorges region is highly conducive to landslides. Consequently, a scientific monitoring and risk mitigation system was established and is still under development. Risk analysis with regard to gravity driven mass movements is highly complex and strongly site specific - several aspects hamper a universal methodology applicable for landslide risk and site assessment. The interdisciplinary Sino-German Yangtze-Project Research co-operation aims, among others, to support the sustainable cultivation of the newly developed ecosystems within the Yangtze catchments. Land use change and increasing population growth are causing severe pressure on the scarce land resources. Landslides are acknowledged as important threat, hence vulnerability of certain landscape components have to be identified, quantified and monitored. A nested quantitative approach for vulnerability analysis is developed. The applied risk and vulnerability model understands risk as the product of hazard and vulnerability. Whereas vulnerability is characterized by: mass movement intensity and susceptibility of the respective element at risk. The watershed of Xiangxi river serves as study area. In general, catchment approaches intent and proved to be a functional geographical unit for successful integrated resources management. Several limitations with regard to data accessibility, availability and accuracy have to be considered due to restrictions of feasible scales. Comprehensive large-scale site investigations are confined to training areas for model calibration and validation. Remote sensing potentials are utilised for land use/ land cover change analysis and localization of selected elements

  12. Assessing Groundwater Contamination Vulnerability at Public Water Supply Wells in California

    NASA Astrophysics Data System (ADS)

    Moran, J. E.; Hudson, B.; Dooher, B. P.; Leif, R.; Eaton, G. F.; Davisson, L.

    2001-12-01

    The California Aquifer Susceptibility project, sponsored by the California State Water Resources Control Board, uses a probabilistic approach to assess the vulnerability of public water supply wells to contamination by anthropogenic compounds. Sources of contamination to groundwater occur near the earth's surface, and have been present mostly since WWII. Therefore, wells that receive water that has recharged in the recent past are more likely to intercept contaminants transported by advection. The parameters that the study uses to rank wells according to vulnerability are groundwater age dates (using the tritium/helium method), stable isotopes of the water molecule (for water source determination), and analysis of low level Volatile Organic Compounds (VOCs). Results of a pilot project in which 300 public water supply wells were tested for vulnerability will be presented. Basins sampled for the study include the Livermore Valley, Santa Clara Valley, and the Sacramento Basin. Methyl-tertiary-Butyl Ether (MTBE) may be a useful time marker in groundwater basins, with water recharged after the 1980's showing traces of MTBE. Low-level detections of other VOCs such as TCE and PCE can give an early warning of a contaminant plume. When employed on a basin-scale, groundwater ages are an effective tool for identifying recharge areas, defining flowpaths, and determining the rate of transport of water and associated contaminants. Examination of these parameters also helps identify 'short circuits', whereby e.g., loss of integrity in well casing allows near surface contamination to reach 'old' (recharged >50 years ago) water. This work was performed under the auspices of the U.S. Department of Energy by the University of California, Lawrence Livermore National Laboratory under contract No. W-7405-ENG-48.

  13. Organizational Political Tactics in Universities

    ERIC Educational Resources Information Center

    Nejad, Bahareh Azizi; Abbaszadeh, Mir Mohammad Seiied; Hassani, Mohammad

    2011-01-01

    The present research aimed to promote understanding of political tactics in organizations. Political behavior in nowadays-complex conditions is a process that the conflicts, contrasts and differences among interested groups are resolved. It means dialogue, attention to different goals in organizations, regarding the interest of different groups,…

  14. 78 FR 7334 - Port Authority Access to Facility Vulnerability Assessments and the Integration of Security Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-01

    ... to Facility Vulnerability Assessments and the Integration of Security Systems AGENCY: Coast Guard...-sharing measures. Security System Integration Alternatives Require each MTSA-regulated facility owner or... other forms of security system integration. Information Requested 1. We request comments on the...

  15. Tactical Versus Strategic Behavior: General Aviation Piloting in Convective Weather Scenarios

    NASA Technical Reports Server (NTRS)

    Latorella, Kara A.; Chamberlain, James P.

    2002-01-01

    We commonly describe environments and behavioral responses to environmental conditions as 'tactical' and 'strategic.' However theoretical research defining relevant environmental characteristics is rare, as are empirical investigations that would inform such theory. This paper discusses General Aviation (GA) pilots' descriptions of tactical/strategic conditions with respect to weather flying, and evaluates their ratings along a tactical/strategic scale in response to real convective weather scenarios experienced during a flight experiment with different weather information cues. Perceived risk was significantly associated with ratings for all experimental conditions. In addition, environmental characteristics were found to be predictive of ratings for Traditional IMC (instrument meteorological conditions), i.e., aural weather information only, and Traditional VMC (visual meteorological conditions), i.e., aural information and an external view. The paper also presents subjects' comments regarding use of Graphical Weather Information Systems (GWISs) to support tactical and strategic weather flying decisions and concludes with implications for the design and use of GWISs.

  16. Making a vision document tangible using "vision-tactics-metrics" tables.

    PubMed

    Drury, Ivo; Slomski, Carol

    2006-01-01

    We describe a method of making a vision document tangible by attaching specific tactics and metrics to the key elements of the vision. We report on the development and early use of a "vision-tactics-metrics" table in a department of surgery. Use of the table centered the vision in the daily life of the department and its faculty, and facilitated cultural change.

  17. Research on tactical information display technology for interactive virtual cockpit

    NASA Astrophysics Data System (ADS)

    Sun, Zhongyun; Tian, Tao; Su, Feng

    2018-04-01

    Based on a fact that traditional tactical information display technology suffers from disadvantages of a large number of data to be transferred and low plotting efficiency in an interactive virtual cockpit, a GID protocol-based simulation has been designed. This method dissolves complex tactical information screens into basic plotting units. The indication of plotting units is controlled via the plotting commands, which solves the incompatibility between the tactical information display in traditional simulation and the desktop-based virtual simulation training system. Having been used in desktop systems for helicopters, fighters, and transporters, this method proves to be scientific and reasonable in design and simple and efficient in usage, which exerts a significant value in establishing aviation equipment technology support training products.

  18. Age-dependent male mating tactics in a spider mite-A life-history perspective.

    PubMed

    Sato, Yukie; Rühr, Peter T; Schmitz, Helmut; Egas, Martijn; Blanke, Alexander

    2016-10-01

    Males often fight with rival males for access to females. However, some males display nonfighting tactics such as sneaking, satellite behavior, or female mimicking. When these mating tactics comprise a conditional strategy, they are often thought to be explained by resource holding potential (RHP), that is, nonfighting tactics are displayed by less competitive males who are more likely to lose a fight. The alternative mating tactics, however, can also be explained by life-history theory, which predicts that young males avoid fighting, regardless of their RHP, if it pays off to wait for future reproduction. Here, we test whether the sneaking tactic displayed by young males of the two-spotted spider mite can be explained by life-history theory. We tested whether young sneaker males survive longer than young fighter males after a bout of mild or strong competition with old fighter males. We also investigated whether old males have a more protective outer skin-a possible proxy for RHP-by measuring cuticle hardness and elasticity using nanoindentation. We found that young sneaker males survived longer than young fighter males after mild male competition. This difference was not found after strong male competition, which suggests that induction of sneaking tactic is affected by male density. Hardness and elasticity of the skin did not vary with male age. Given that earlier work could also not detect morphometric differences between fighter and sneaker males, we conclude that there is no apparent increase in RHP with age in the mite and age-dependent male mating tactics in the mite can be explained only by life-history theory. Because it is likely that fighting incurs a survival cost, age-dependent alternative mating tactics may be explained by life-history theory in many species when reproduction of old males is a significant factor in fitness.

  19. Assessment of Social Vulnerability Identification at Local Level around Merapi Volcano - A Self Organizing Map Approach

    NASA Astrophysics Data System (ADS)

    Lee, S.; Maharani, Y. N.; Ki, S. J.

    2015-12-01

    The application of Self-Organizing Map (SOM) to analyze social vulnerability to recognize the resilience within sites is a challenging tasks. The aim of this study is to propose a computational method to identify the sites according to their similarity and to determine the most relevant variables to characterize the social vulnerability in each cluster. For this purposes, SOM is considered as an effective platform for analysis of high dimensional data. By considering the cluster structure, the characteristic of social vulnerability of the sites identification can be fully understand. In this study, the social vulnerability variable is constructed from 17 variables, i.e. 12 independent variables which represent the socio-economic concepts and 5 dependent variables which represent the damage and losses due to Merapi eruption in 2010. These variables collectively represent the local situation of the study area, based on conducted fieldwork on September 2013. By using both independent and dependent variables, we can identify if the social vulnerability is reflected onto the actual situation, in this case, Merapi eruption 2010. However, social vulnerability analysis in the local communities consists of a number of variables that represent their socio-economic condition. Some of variables employed in this study might be more or less redundant. Therefore, SOM is used to reduce the redundant variable(s) by selecting the representative variables using the component planes and correlation coefficient between variables in order to find the effective sample size. Then, the selected dataset was effectively clustered according to their similarities. Finally, this approach can produce reliable estimates of clustering, recognize the most significant variables and could be useful for social vulnerability assessment, especially for the stakeholder as decision maker. This research was supported by a grant 'Development of Advanced Volcanic Disaster Response System considering

  20. A Multi-Hazard Vulnerability Assessment of Coastal Landmarks along Cape Hatteras National Seashore

    NASA Astrophysics Data System (ADS)

    Flynn, M. J.

    2015-12-01

    Cape Hatteras National Seashore is located along the Outer Banks, a narrow string of barrier islands in eastern North Carolina. The seashore was established to preserve cultural and natural resources of national significance, yet these islands have shoreline rates of change that are predominately erosional, frequently experience storm surge inundation driven by tropical and extra-tropical storm events, and are highly vulnerable to sea level rise. The National Park Service staff are concerned about the vulnerability of historic structures located within the park, and recognized the utility of a coastal hazard risk assessment to assist park managers with long-term planning. They formed a cooperative agreement with researchers at East Carolina University to conduct the assessment, which primarily used GIS to evaluate the susceptibility of 27 historical structures to coastal erosion, storm surge, and sea-level rise. The Digital Shoreline Analysis System was used to calculate a linear regression rate of shoreline movement based on historical shorelines. Those rates were used to simulate the future position of the shoreline along transects. The SLOSH model output was down scaled to a DEM generated from the 2014 NC QL2 LiDAR collection to determine the extent and depth of inundation that would occur from storm events. Sea level rise was modeled for various scenarios referenced to existing MHHW, and also added to each SLOSH model output to determine the effect of a storm event under those sea level rise scenarios. Risk maps were developed to include not only areal coverage for existing structures and districts, but also identify potential areas of relocation or retreat in the long-term. In addition to evaluating vulnerability, timelines for potential impacts provided scenarios for National Park Service staff to research adaption and mitigation strategies.

  1. Future integrated aquifer vulnerability assessment considering land use / land cover and climate change using DRASTIC and SWAT

    NASA Astrophysics Data System (ADS)

    Jang, W.; Engel, B.; Chaubey, I.

    2015-12-01

    Climate change causes significant changes to temperature regimes and precipitation patterns across the world. Such alterations in climate pose serious risks for not only inland freshwater ecosystems but also groundwater systems, and may adversely affect numerous critical services they provide to humans. All groundwater results from precipitation, and precipitation is affected by climate change. Climate change is also influenced by land use / land cover (LULC) change and vice versa. According to Intergovernmental Panel on Climate Change (IPCC) reports, climate change is caused by global warming which is generated by the increase of greenhouse gas (GHG) emissions in the atmosphere. LULC change is a major driving factor causing an increase in GHG emissions. LULC change data (years 2006-2100) will be produced by the Land Transformation Model (LTM) which simulates spatial patterns of LULC change over time. MIROC5 (years 2006-2100) will be obtained considering GCMs and ensemble characteristics such as resolution and trend of temperature and precipitation which is a consistency check with observed data from local weather stations and historical data from GCMs output data. Thus, MIROC5 will be used to account for future climate change scenarios and relationship between future climate change and alteration of groundwater quality in this study. For efficient groundwater resources management, integrated aquifer vulnerability assessments (= intrinsic vulnerability + hazard potential assessment) are required. DRASTIC will be used to evaluate intrinsic vulnerability, and aquifer hazard potential will be evaluated by Soil and Water Assessment Tool (SWAT) which can simulate pollution potential from surface and transport properties of contaminants. Thus, for effective integrated aquifer vulnerability assessment for LULC and climate change in the Midwestern United States, future projected LULC and climate data from the LTM and GCMs will be incorporated with DRASTIC and SWAT. It is

  2. Assessment of Coastal Vulnerability to Sea Level Rise of Bolinao, Pangasinan Using Remote Sensing and Geographic Information Systems

    NASA Astrophysics Data System (ADS)

    Reyes, S. R. C.; Blanco, A. C.

    2012-07-01

    A number of studies assessing the vulnerability of Southeast Asia to climate change have classified the Philippines as one of the vulnerable countries in the region. Bolinao, Pangasinan is a municipality located in northwestern Luzon, situated in the western part of the Lingayen Gulf and is bounded on the north and west by the South China Sea (West Philippine Sea). Recent studies have verified the varying trends in sea level across the South China Sea, which is considered as one of the largest, semi-enclosed marginal seas in the northwest Pacific Ocean. Three barangays (villages) were included in the study: (1) Luciente 1.0, (2) Concordia and (3) Germinal. The Socioeconomic Vulnerability Index (SVI) was computed based on population, age, gender, employment, source of income and household size, which were gathered through a qualitative survey in the selected barangays. The Coastal Vulnerability Index (CVI) described the physical vulnerability of these coastal communities based on recorded sea level anomalies and significant wave heights of multiple satellite altimetry missions, coastal topography derived from the 25-m SRTM digital elevation model (DEM), bathymetry from WorldView-2 and additional elevation data from terrestrial laser scanning surveys. The research utilized merged satellite altimetry data downloaded from the Radar Altimetry Database System (RADS), which covered the period from 1991-2010. The SVI and CVI were calculated and evaluated in ArcGIS. The SVI and CVI were integrated to determine the Total Vulnerability Index (TVI), which characterized the vulnerability of the three barangays in five classes, from very low to very high vulnerability.

  3. Project CHECO Southeast Asia Report. Tactical Airlift in SEA

    DTIC Science & Technology

    1972-02-15

    Air Force doctrine regarded the TALO as a member of the Tactical Air Control Party and thus responsible to the Air Liaison Officer ( ALO ) in 3 14 3...UNCLASSIFIED, I UNCLASSIFIED that area. However, the ALO was concerned with tactical air operations Isuch as delivery of ordnance and close air support...staff. Con- sequently, the TALOs and ALOs had little in common and in many instances were not collocated. Thus, the utilization of TALOs in Vietnam was

  4. Assessing the Acceptance and Functional Value of the Asymmetrical Software Kit (ASK) at the Tactical Level

    DTIC Science & Technology

    2007-12-01

    www.istheory.yorku.ca/theoryofreasonedaction.htm on 07 Dec 2007. 28 I . Ajzen , Residual Effects of Past on Later Behavior: Habituation and Reasoned...for Intelligence analysis at the Tactical level. 51 LIST OF REFERENCES Ajzen , I ., Residual Effects of Past on Later Behavior: Habituation and...Advisor: Douglas Borer Second Reader: Richard Bergin THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188

  5. Interpersonal conflict tactics and substance use among high-risk adolescents.

    PubMed

    Unger, Jennifer B; Sussman, Steve; Dent, Clyde W

    2003-07-01

    Adolescents who use aggressive tactics to handle interpersonal conflicts may be at high risk for substance use, while adolescents who possess coping strategies to avoid or manage interpersonal conflict may be at lower risk for substance use. This study examined the association between interpersonal conflict tactics and substance use among 631 continuation high school students. Items from a modified Conflict Tactics Scale formed three factors: Physical Aggression, Nonphysical Aggression, and Nonaggression. Logistic regression analyses revealed that adolescents' ways of responding to interpersonal conflicts were associated with their substance use. Use of physical aggression was associated with a higher risk of cigarette, alcohol, marijuana, and other drug use. Use of nonphysical aggression was associated with a higher risk of cigarette and alcohol use. Use of nonaggressive conflict tactics was associated with a lower risk of cigarette use. Adolescents who respond to interpersonal conflicts in an aggressive manner, whether physical or verbal/psychological, may be at increased risk for substance use, while nonaggressive conflict management skills may be protective. Possibly, teaching adolescents nonaggressive techniques for handling interpersonal conflict may be a useful strategy for preventing both interpersonal violence and substance use.

  6. Report: Results of Technical Network Vulnerability Assessment: EPA’s Erlanger Building

    EPA Pesticide Factsheets

    Report #10-P-0211, September 7, 2010. Vulnerability testing of EPA’s Erlanger Building network conducted in June 2010 identified Internet Protocol addresses with numerous high-risk and medium-risk vulnerabilities.

  7. Report: Results of Technical Network Vulnerability Assessment: EPA’s Region 4

    EPA Pesticide Factsheets

    Report #10-P-0213, September 7, 2010. Vulnerability testing of EPA’s Region 4 network conducted in June 2010 identified Internet Protocol addresses with numerous high-risk and medium-risk vulnerabilities.

  8. Marketing Tactics and Parents' Loyalty: The Mediating Role of School Image

    ERIC Educational Resources Information Center

    Li, Chung-Kai; Hung, Chia-Hung

    2009-01-01

    Purpose: This paper aims to investigate how marketing tactics can enhance parents' loyalty in the educational context. Building on extant research, it proposes an integrated framework in which perceived marketing tactics are related to school image, which in turn is related to parents' loyalty. Design/methodology/approach: Five marketing tactics…

  9. The Persuade Package Hypothesis: Further Evidence for an Influence Tactics Schema.

    ERIC Educational Resources Information Center

    Aguinis, Herman; And Others

    Researchers interested in social power in organizational contexts have focused on investigating whether situational factors affect people's preferences for types of influence tactics. The persuade package is defined as a small standard set of methods (influence tactics) that leads to a particular goal (persuade the target to do something). The…

  10. Grandparentage assignments identify unexpected adfluvial life history tactic contributing offspring to a reintroduced population.

    PubMed

    Sard, Nicholas M; Jacobson, Dave P; Banks, Michael A

    2016-10-01

    Diversity in life history tactics contributes to the persistence of a population because it helps to protect against stochastic environments by varying individuals in space and time. However, some life history tactics may not be accounted for when assessing the demographic viability of a population. One important factor in demographic viability assessments is cohort replacement rate (CRR), which is defined as the number of future adults produced by an adult. We assessed if precocial resident males (

  11. Combining particle-tracking and geochemical data to assess public supply well vulnerability to arsenic and uranium

    USGS Publications Warehouse

    Hinkle, S.R.; Kauffman, L.J.; Thomas, M.A.; Brown, C.J.; McCarthy, K.A.; Eberts, S.M.; Rosen, Michael R.; Katz, B.G.

    2009-01-01

    Flow-model particle-tracking results and geochemical data from seven study areas across the United States were analyzed using three statistical methods to test the hypothesis that these variables can successfully be used to assess public supply well vulnerability to arsenic and uranium. Principal components analysis indicated that arsenic and uranium concentrations were associated with particle-tracking variables that simulate time of travel and water fluxes through aquifer systems and also through specific redox and pH zones within aquifers. Time-of-travel variables are important because many geochemical reactions are kinetically limited, and geochemical zonation can account for different modes of mobilization and fate. Spearman correlation analysis established statistical significance for correlations of arsenic and uranium concentrations with variables derived using the particle-tracking routines. Correlations between uranium concentrations and particle-tracking variables were generally strongest for variables computed for distinct redox zones. Classification tree analysis on arsenic concentrations yielded a quantitative categorical model using time-of-travel variables and solid-phase-arsenic concentrations. The classification tree model accuracy on the learning data subset was 70%, and on the testing data subset, 79%, demonstrating one application in which particle-tracking variables can be used predictively in a quantitative screening-level assessment of public supply well vulnerability. Ground-water management actions that are based on avoidance of young ground water, reflecting the premise that young ground water is more vulnerable to anthropogenic contaminants than is old ground water, may inadvertently lead to increased vulnerability to natural contaminants due to the tendency for concentrations of many natural contaminants to increase with increasing ground-water residence time.

  12. The evolution of genetic and conditional alternative reproductive tactics

    PubMed Central

    2016-01-01

    Frequency-dependent selection may drive adaptive diversification within species. It is yet unclear why the occurrence of alternative reproductive tactics (ARTs) is highly divergent between major animal taxa. Here we aim to clarify the environmental and social conditions favouring the evolution of intra-population variance of male reproductive phenotypes. Our results suggest that genetically determined ARTs that are fixed for life evolve when there is strong selection on body size due to size-dependent competitiveness, in combination with environmental factors reducing size benefits. The latter may result from growth costs or, more generally, from age-dependent but size-independent mortality causes. This generates disruptive selection on growth trajectories underlying tactic choice. In many parameter settings, the model also predicts ARTs to evolve that are flexible and responsive to current conditions. Interestingly, the conditions favouring the evolution of flexible tactics diverge considerably from those favouring genetic variability. Nevertheless, in a restricted but relevant parameter space, our model predicts the simultaneous emergence and maintenance of a mixture of multiple tactics, both genetically and conditionally determined. Important conditions for the emergence of ARTs include size variation of competitors, which is inherently greater in species with indeterminate growth than in taxa reproducing only after reaching their terminal body size. This is probably the reason why ARTs are more common in fishes than in other major taxa. PMID:26911960

  13. Assessing the vulnerability of human and biological communities to changing ecosystem services using a GIS-based multi-criteria decision support tool

    USGS Publications Warehouse

    Villarreal, Miguel; Norman, Laura M.; Labiosa, William B.

    2012-01-01

    In this paper we describe an application of a GIS-based multi-criteria decision support web tool that models and evaluates relative changes in ecosystem services to policy and land management decisions. The Santa Cruz Watershed Ecosystem Portfolio (SCWEPM) was designed to provide credible forecasts of responses to ecosystem drivers and stressors and to illustrate the role of land use decisions on spatial and temporal distributions of ecosystem services within a binational (U.S. and Mexico) watershed. We present two SCWEPM sub-models that when analyzed together address bidirectional relationships between social and ecological vulnerability and ecosystem services. The first model employs the Modified Socio-Environmental Vulnerability Index (M-SEVI), which assesses community vulnerability using information from U.S. and Mexico censuses on education, access to resources, migratory status, housing situation, and number of dependents. The second, relating land cover change to biodiversity (provisioning services), models changes in the distribution of terrestrial vertebrate habitat based on multitemporal vegetation and land cover maps, wildlife habitat relationships, and changes in land use/land cover patterns. When assessed concurrently, the models exposed some unexpected relationships between vulnerable communities and ecosystem services provisioning. For instance, the most species-rich habitat type in the watershed, Desert Riparian Forest, increased over time in areas occupied by the most vulnerable populations and declined in areas with less vulnerable populations. This type of information can be used to identify ecological conservation and restoration targets that enhance the livelihoods of people in vulnerable communities and promote biodiversity and ecosystem health.

  14. The contribution of collective attack tactics in differentiating handball score efficiency.

    PubMed

    Rogulj, Nenad; Srhoj, Vatromir; Srhoj, Ljerka

    2004-12-01

    The prevalence of 19 elements of collective tactics in score efficient and score inefficient teams was analyzed in 90 First Croatian Handball League--Men games during the 1998-1999 season. Prediction variables were used to describe duration, continuity, system, organization and spatial direction of attacks. Analysis of the basic descriptive and distribution statistical parameters revealed normal distribution of all variables and possibility to use multivariate methods. Canonic discrimination analysis and analysis of variance showed the use of collective tactics elements on attacks to differ statistically significantly between the winning and losing teams. Counter-attacks and uninterrupted attacks predominate in winning teams. Other types of attacks such as long position attack, multiply interrupted attack, attack with one circle runner attack player/pivot, attack based on basic principles, attack based on group cooperation, attack based on independent action, attack based on group maneuvering, rightward directed attack and leftward directed attack predominate in losing teams. Winning teams were found to be clearly characterized by quick attacks against unorganized defense, whereas prolonged, interrupted position attacks against organized defense along with frequent and diverse tactical actions were characteristic of losing teams. The choice and frequency of using a particular tactical activity in position attack do not warrant score efficiency but usually are consequential to the limited anthropologic potential and low level of individual technical-tactical skills of the players in low-quality teams.

  15. Augmented Reality at the Tactical and Operational Levels of War

    DTIC Science & Technology

    2015-10-24

    benefits and challenges their personnel will experience once AR systems are fully adopted. This paper will explain these benefits and challenges as...develop, procure, and integrate systems it believes will benefit its tactical combat units and operational leaders. Ultimately, as the capabilities of...friendly forces, can also help to prevent collateral damage and civilian casualties. Beyond the immediate life-and-death benefits at the tactical

  16. The participatory vulnerability scoping diagram - deliberative risk ranking for community water systems

    USGS Publications Warehouse

    Howe, Peter D.; Yarnal, Brent; Coletti, Alex; Wood, Nathan J.

    2013-01-01

    Natural hazards and climate change present growing challenges to community water system (CWS) managers, who are increasingly turning to vulnerability assessments to identify, prioritize, and adapt to risks. Effectively assessing CWS vulnerability requires information and participation from various sources, one of which is stakeholders. In this article, we present a deliberative risk-ranking methodology, the participatory vulnerability scoping diagram (P-VSD), which allows rapid assessment and integration of multiple stakeholder perspectives of vulnerability. This technique is based on methods of deliberative risk evaluation and the vulnerability scoping diagram. The goal of the methodology is to engage CWS managers and stakeholders collectively to provide qualitative contextual risk rankings as a first step in a vulnerability assessment. We conduct an initial assessment using a case study of CWS in two U.S. counties, sites with broadly similar exposures but differences in population, land use, and other social sensitivity factors. Results demonstrate that CWS managers and stakeholders in the two case study communities all share the belief that their CWS are vulnerable to hazards but differ in how this vulnerability manifests itself in terms of the exposure, sensitivity, and adaptive capacity of the system.

  17. REGIONAL VULNERABILITY: A CONCEPTUAL FRAMEWORK

    EPA Science Inventory

    Regional vulnerability assessment, or ReVA, is an approach to place-based ecological risk assessment that is currently under development by the Office of Research and Development of the U.S. Environmental Protection Agency (EPA). The assessment is done at the scale of EPA region...

  18. Job Tactics of Women in Banking.

    ERIC Educational Resources Information Center

    Larwood, Laurie; Kaplan, Mindy

    1980-01-01

    Investigated tactics used by women branch bank officers for succeeding in management. Results showed a high degree of agreement about the importance of a number of items, including the ability to make decisions and the demonstration of competence. (Author)

  19. Assessing the ecological vulnerability of the upper reaches of the Minjiang River

    PubMed Central

    Sun, Jian; Ma, Baibing; Du, Wenpeng

    2017-01-01

    The upper reaches of the Minjiang River (URMR), located on the eastern edge of the Tibetan Plateau in southwestern China, are an important component of the ecological barrier of the Upper Yangtze River Basin. Climate change and human activities have increased the ecological sensitivity and vulnerability of the region, which may pose a threat to the ecological security of the Yangtze River Basin and have negative impacts on local social and economic development. In this study, we analyzed land use and cover change (LUCC) of the URMR between 2000 and 2010, and found that the total rate of LUCC was less than 0.50% during this period. In addition, net primary production (NPP) was employed to describe the changes in ecosystem sensitivity and vulnerability, and the results demonstrated that slightly and moderately sensitive and vulnerable zones occupied the largest area, distributed mainly in forest, shrub, and grassland ecosystems. However, compared with the period from 2000 to 2005, the ecological sensitivity and vulnerability showed a worsening trend in the period 2005–2010. Exploring the relationship between vulnerability/sensitivity and environmental factors, we found that sensitivity and vulnerability were positively correlated with precipitation (>700 mm) and aridity index (>36 mm/°C). The results highlight that the future ecological sensitivity and vulnerability of URMR should be further investigated, and that the LUCC induced by human activities and climate change have caused alteration of in ecosystem vulnerability. PMID:28753635

  20. Assessing the ecological vulnerability of the upper reaches of the Minjiang River.

    PubMed

    Zhang, Jifei; Sun, Jian; Ma, Baibing; Du, Wenpeng

    2017-01-01

    The upper reaches of the Minjiang River (URMR), located on the eastern edge of the Tibetan Plateau in southwestern China, are an important component of the ecological barrier of the Upper Yangtze River Basin. Climate change and human activities have increased the ecological sensitivity and vulnerability of the region, which may pose a threat to the ecological security of the Yangtze River Basin and have negative impacts on local social and economic development. In this study, we analyzed land use and cover change (LUCC) of the URMR between 2000 and 2010, and found that the total rate of LUCC was less than 0.50% during this period. In addition, net primary production (NPP) was employed to describe the changes in ecosystem sensitivity and vulnerability, and the results demonstrated that slightly and moderately sensitive and vulnerable zones occupied the largest area, distributed mainly in forest, shrub, and grassland ecosystems. However, compared with the period from 2000 to 2005, the ecological sensitivity and vulnerability showed a worsening trend in the period 2005-2010. Exploring the relationship between vulnerability/sensitivity and environmental factors, we found that sensitivity and vulnerability were positively correlated with precipitation (>700 mm) and aridity index (>36 mm/°C). The results highlight that the future ecological sensitivity and vulnerability of URMR should be further investigated, and that the LUCC induced by human activities and climate change have caused alteration of in ecosystem vulnerability.