Science.gov

Sample records for placa vulnerable solitaria

  1. Vulnerability

    NASA Technical Reports Server (NTRS)

    Taback, I.

    1979-01-01

    The discussion of vulnerability begins with a description of some of the electrical characteristics of fibers before definiting how vulnerability calculations are done. The vulnerability results secured to date are presented. The discussion touches on post exposure vulnerability. After a description of some shock hazard work now underway, the discussion leads into a description of the planned effort and some preliminary conclusions are presented.

  2. "Candidatus Fokinia solitaria", a Novel "Stand-Alone" Symbiotic Lineage of Midichloriaceae (Rickettsiales).

    PubMed

    Szokoli, Franziska; Sabaneyeva, Elena; Castelli, Michele; Krenek, Sascha; Schrallhammer, Martina; Soares, Carlos A G; da Silva-Neto, Inacio D; Berendonk, Thomas U; Petroni, Giulio

    2016-01-01

    Recently, the family Midichloriaceae has been described within the bacterial order Rickettsiales. It includes a variety of bacterial endosymbionts detected in different metazoan host species belonging to Placozoa, Cnidaria, Arthropoda and Vertebrata. Representatives of Midichloriaceae are also considered possible etiological agents of certain animal diseases. Midichloriaceae have been found also in protists like ciliates and amoebae. The present work describes a new bacterial endosymbiont, "Candidatus Fokinia solitaria", retrieved from three different strains of a novel Paramecium species isolated from a wastewater treatment plant in Rio de Janeiro (Brazil). Symbionts were characterized through the full-cycle rRNA approach: SSU rRNA gene sequencing and fluorescence in situ hybridization (FISH) with three species-specific oligonucleotide probes. In electron micrographs, the tiny rod-shaped endosymbionts (1.2 x 0.25-0.35 μm in size) were not surrounded by a symbiontophorous vacuole and were located in the peripheral host cytoplasm, stratified in the host cortex in between the trichocysts or just below them. Frequently, they occurred inside autolysosomes. Phylogenetic analyses of Midichloriaceae apparently show different evolutionary pathways within the family. Some genera, such as "Ca. Midichloria" and "Ca. Lariskella", have been retrieved frequently and independently in different hosts and environmental surveys. On the contrary, others, such as Lyticum, "Ca. Anadelfobacter", "Ca. Defluviella" and the presently described "Ca. Fokinia solitaria", have been found only occasionally and associated to specific host species. These last are the only representatives in their own branches thus far. Present data do not allow to infer whether these genera, which we named "stand-alone lineages", are an indication of poorly sampled organisms, thus underrepresented in GenBank, or represent fast evolving, highly adapted evolutionary lineages. PMID:26731731

  3. "Candidatus Fokinia solitaria", a Novel "Stand-Alone" Symbiotic Lineage of Midichloriaceae (Rickettsiales).

    PubMed

    Szokoli, Franziska; Sabaneyeva, Elena; Castelli, Michele; Krenek, Sascha; Schrallhammer, Martina; Soares, Carlos A G; da Silva-Neto, Inacio D; Berendonk, Thomas U; Petroni, Giulio

    2016-01-01

    Recently, the family Midichloriaceae has been described within the bacterial order Rickettsiales. It includes a variety of bacterial endosymbionts detected in different metazoan host species belonging to Placozoa, Cnidaria, Arthropoda and Vertebrata. Representatives of Midichloriaceae are also considered possible etiological agents of certain animal diseases. Midichloriaceae have been found also in protists like ciliates and amoebae. The present work describes a new bacterial endosymbiont, "Candidatus Fokinia solitaria", retrieved from three different strains of a novel Paramecium species isolated from a wastewater treatment plant in Rio de Janeiro (Brazil). Symbionts were characterized through the full-cycle rRNA approach: SSU rRNA gene sequencing and fluorescence in situ hybridization (FISH) with three species-specific oligonucleotide probes. In electron micrographs, the tiny rod-shaped endosymbionts (1.2 x 0.25-0.35 μm in size) were not surrounded by a symbiontophorous vacuole and were located in the peripheral host cytoplasm, stratified in the host cortex in between the trichocysts or just below them. Frequently, they occurred inside autolysosomes. Phylogenetic analyses of Midichloriaceae apparently show different evolutionary pathways within the family. Some genera, such as "Ca. Midichloria" and "Ca. Lariskella", have been retrieved frequently and independently in different hosts and environmental surveys. On the contrary, others, such as Lyticum, "Ca. Anadelfobacter", "Ca. Defluviella" and the presently described "Ca. Fokinia solitaria", have been found only occasionally and associated to specific host species. These last are the only representatives in their own branches thus far. Present data do not allow to infer whether these genera, which we named "stand-alone lineages", are an indication of poorly sampled organisms, thus underrepresented in GenBank, or represent fast evolving, highly adapted evolutionary lineages.

  4. Archivo de placas astrométricas del Observatorio de La Plata

    NASA Astrophysics Data System (ADS)

    di Sisto, R.; Orellana, R. B.

    Se ha realizado una base de datos con las placas fotográficas obtenidas con el Astrográfico del Observatorio de La Plata. Se han clasificado un total de 3000 placas obtenidas para asteroides y cometas. El acceso a la base de datos se hará por FTP y la misma contendrá la siguiente información: fecha y tiempo de exposición, coordenadas del centro de placa, tipo de emulsión fotográfica, estado de la placa, objeto fotografiado.

  5. Vulnerability of the Vulnerability Thesis.

    ERIC Educational Resources Information Center

    Lutz, Frank W.

    1996-01-01

    Reexamines Callahan's book, "Education and the Cult of Efficiency" (1962), and his vulnerability thesis regarding school superintendents, discussing recommendations it made and highlighting public education in the 1990s. Callahan's recommendations were well-received but not well-heeded, and the vulnerability thesis did not provide the stimulus for…

  6. Vulnerable Plaque

    MedlinePlus

    ... all vulnerable plaque ruptures, and researchers at the Texas Heart Institute are looking at ways to determine ... comments. Terms of Use and Privacy Policy © Copyright Texas Heart Institute All rights reserved.

  7. [Multidisciplinary initiative for cerebrovascular stroke care improvement in Andalucia: PLACA project].

    PubMed

    Murillo Cabezas, F; Jiménez Hernández, M D

    2005-05-01

    A comprehensive and integrating approach of all emergency medical teams implied in cerebrovascular attack (CVA) has been proposed within the framework of Emergencies Andalusian Initiative. Key action points were: the identification of CVA by emergency medical teams, the development of extrahospital care protocols for the patients up to diagnostic confirmation, the implementation of specific assistance teams, the use of trustworthy epidemiological information, and the development of a training (and information) plan for health professionals. A multidisciplinary group was set up in order to propose improvement actions applicable to these key points in the area of a public health system and, finally, a consensus document was written that constituted the basis for Andalusian Acute Stroke Initiative (PLACA project).

  8. Software Vulnerability Taxonomy Consolidation

    SciTech Connect

    Polepeddi, Sriram S.

    2004-12-07

    In today's environment, computers and networks are increasing exposed to a number of software vulnerabilities. Information about these vulnerabilities is collected and disseminated via various large publicly available databases such as BugTraq, OSVDB and ICAT. Each of these databases, individually, do not cover all aspects of a vulnerability and lack a standard format among them, making it difficult for end-users to easily compare various vulnerabilities. A central database of vulnerabilities has not been available until today for a number of reasons, such as the non-uniform methods by which current vulnerability database providers receive information, disagreement over which features of a particular vulnerability are important and how best to present them, and the non-utility of the information presented in many databases. The goal of this software vulnerability taxonomy consolidation project is to address the need for a universally accepted vulnerability taxonomy that classifies vulnerabilities in an unambiguous manner. A consolidated vulnerability database (CVDB) was implemented that coalesces and organizes vulnerability data from disparate data sources. Based on the work done in this paper, there is strong evidence that a consolidated taxonomy encompassing and organizing all relevant data can be achieved. However, three primary obstacles remain: lack of referencing a common ''primary key'', un-structured and free-form descriptions of necessary vulnerability data, and lack of data on all aspects of a vulnerability. This work has only considered data that can be unambiguously extracted from various data sources by straightforward parsers. It is felt that even with the use of more advanced, information mining tools, which can wade through the sea of unstructured vulnerability data, this current integration methodology would still provide repeatable, unambiguous, and exhaustive results. Though the goal of coalescing all available data, which would be of use to

  9. What Does Vulnerability Mean?

    ERIC Educational Resources Information Center

    Parley, Fiona F

    2011-01-01

    Protection of those deemed vulnerable has received increasing attention since 2000. This article reports on care staff views of vulnerability using original data from a research study (Parley. "Vulnerability and abuse: an exploration of views of care staff working with people who have learning disabilities," PhD Thesis, 2007) in which care staff…

  10. Medición de placas astrométricas obtenidas con el telescopio Astrográfico de La Plata

    NASA Astrophysics Data System (ADS)

    di Sisto, R. P.; Orellana, R.

    El Observatorio de La Plata cuenta con un gran número de placas de asteroides y cometas obtenidas con el telescopio astrográfico, que cubren gran parte del cielo del hemisferio sur. En 1996 se recopilaron y clasificaron 2187 placas (Beca para estudiantes de la AAA 1996) de las cuales 2031 corresponden a asteroides. Los datos de cada placa se volcaron en una base de datos creada para facilitar su manejo y preservar la información. A partir de este trabajo se revisaron los MPC electrónicos y se identificaron aquellas placas de asteroides pertenecientes a nuestra base de datos cuyos resultados no fueron publicados en los mismos. De un total de 400 placas que no aparecían publicadas sobresalía un paquete constituído por 40 placas obtenidas en 1977. Estas últimas fueron reducidas utilizando las posiciones y movimientos propios de las estrellas de referencia obtenidas del catálogo SAO 2000 dadas para el sistema FK5. Las posiciones calculadas fueron enviadas y publicadas en los Minor Planet Circulars (MPC).

  11. Simulation with PLACA/DPLACA of thermal and mechanical phenomena in monolithic and dispersed fuel plates

    SciTech Connect

    Soba, Alejandro; Denis, Alicia

    2008-07-15

    The codes PLACA and DPLACA simulate the irradiation behavior of fuels for research reactors under normal operation conditions. They represent, respectively, plate-type fuels of the monolithic and dispersed types. Both codes contain about thirty interconnected and mutually dependent models structured in a modular scheme. This characteristic gives to the codes a large versatility. To simulate U-Mo/Al dispersion fuels, where the growth of an interaction layer can provoke uncontrolled swelling, a diffusion model with two moving boundaries has been developed. It assumes that the kinetics of both layer boundaries is determined by diffusion of U and Al through the layer. The codes make possible a detailed simulation of the evolution of the more relevant physical parameters of a fuel plate during its permanence within a reactor. Both codes were applied to simulate irradiation histories for which experimental data are available. The good quality of the codes predictions reveals the correct performance of the models involved and the appropriate coupling of the ensemble. (author)

  12. Lessons about vulnerability assessments.

    SciTech Connect

    Johnston, R. G.

    2004-01-01

    The Vulnerability Assessment Team (VAT) at Los Alamos National Laboratory believes that physical security can only be optimized through the use of effective vulnerability assessments. As a result of conducting vulnerability assessments on hundreds of different security devices and systems in the last few years, we have identified some of the attributes of effective assessments. These, along with our recommendations and observations about vulnerability assessments, are summarized in this paper. While our work has primarily involved physical security (in contrast to, for example, computer, network, or information security), our experiences may have applicability to other types of security as well.

  13. Vulnerable Children and Youth.

    ERIC Educational Resources Information Center

    Willms, J. Douglas

    2002-01-01

    Findings from two studies indicate that the nature of Canadian children's environments within their families, schools, neighborhoods, and communities has very strong effects on children's development and the prevalence of childhood vulnerability. Rather than stemming primarily from poverty, childhood vulnerability may arise from the environments…

  14. Superintendent Vulnerability and Mobility.

    ERIC Educational Resources Information Center

    Parker, Phyllis

    1996-01-01

    Examined Callahan's vulnerability thesis to determine its ability to explain the mobility of superintendents in Texas between 1985 and 1990. Questionnaire and interview data indicated that, at least in Texas where superintendent mobility reached 50% in that time period, vulnerability did not appear to account for much of superintendent mobility.…

  15. Facility Environmental Vulnerability Assessment

    SciTech Connect

    Van Hoesen, S.D.

    2001-07-09

    From mid-April through the end of June 2001, a Facility Environmental Vulnerability Assessment (FEVA) was performed at Oak Ridge National Laboratory (ORNL). The primary goal of this FEVA was to establish an environmental vulnerability baseline at ORNL that could be used to support the Laboratory planning process and place environmental vulnerabilities in perspective. The information developed during the FEVA was intended to provide the basis for management to initiate immediate, near-term, and long-term actions to respond to the identified vulnerabilities. It was expected that further evaluation of the vulnerabilities identified during the FEVA could be carried out to support a more quantitative characterization of the sources, evaluation of contaminant pathways, and definition of risks. The FEVA was modeled after the Battelle-supported response to the problems identified at the High Flux Beam Reactor at Brookhaven National Laboratory. This FEVA report satisfies Corrective Action 3A1 contained in the Corrective Action Plan in Response to Independent Review of the High Flux Isotope Reactor Tritium Leak at the Oak Ridge National Laboratory, submitted to the Department of Energy (DOE) ORNL Site Office Manager on April 16, 2001. This assessment successfully achieved its primary goal as defined by Laboratory management. The assessment team was able to develop information about sources and pathway analyses although the following factors impacted the team's ability to provide additional quantitative information: the complexity and scope of the facilities, infrastructure, and programs; the significantly degraded physical condition of the facilities and infrastructure; the large number of known environmental vulnerabilities; the scope of legacy contamination issues [not currently addressed in the Environmental Management (EM) Program]; the lack of facility process and environmental pathway analysis performed by the accountable line management or facility owner; and poor

  16. Frailty and Social Vulnerability.

    PubMed

    Andrew, Melissa K

    2015-01-01

    Both intrinsic and extrinsic factors contribute to health. Intrinsic factors are familiar topics in health research and include medical conditions, medications, genetics and frailty, while extrinsic factors stem from social and physical environments. This chapter builds on others in this volume, in which a deficit accumulation approach to frailty has been described. The concept of social vulnerability is presented. Social vulnerability stems from the accumulation of multiple and varied social problems and has bidirectional importance as a risk factor for poor health outcomes and as a pragmatic consideration for health care provision and planning. Importantly, the social factors that contribute to overall social vulnerability come into play at different levels of influence (individual, family and friends, peer groups, institutions and society at large). A social ecology perspective is discussed as a useful framework for considering social vulnerability, as it allows for attention to each of these levels of influence. Tying together what we currently understand about frailty (in medical and basic science models) and social vulnerability, the scaling potential of deficit accumulation is discussed, given that deficit accumulation can be understood to occur at many levels, from the (sub-)cellular level to tissues, organisms/complex systems and societies.

  17. TB in Vulnerable Populations

    PubMed Central

    Ugarte-Gil, César; Caro, Godofredo; Aylas, Rula; Castro, César; Lema, Claudia

    2016-01-01

    Abstract This article analyzes the factors associated with vulnerability of the Ashaninka, the most populous indigenous Peruvian Amazonian people, to tuberculosis (TB). By applying a human rights-based analytical framework that assesses public policy against human rights standards and principles, and by offering a step-by-step framework for a full assessment of compliance, it provides evidence of the relationship between the incidence of TB among the Ashaninka and Peru’s poor level of compliance with its human rights obligations. The article argues that one of the main reasons for the historical vulnerability of the Ashaninka to diseases such as TB is a lack of political will on the part of the national government to increase public health spending, ensure that resources reach the most vulnerable population, and adopt and invest in a culturally appropriate health system. PMID:27780999

  18. Threats and vulnerabilities

    NASA Astrophysics Data System (ADS)

    Ahonen, Pasi; Alahuhta, Petteri; Daskala, Barbara; Delaitre, Sabine; Hert, Paul De; Lindner, Ralf; Maghiros, Ioannis; Moscibroda, Anna; Schreurs, Wim; Verlinden, Michiel

    In this chapter, we present a review of threats and vulnerabilities that could afflict society and individuals in the AmI world in the context of the key policy issues of privacy, identity, trust, security and digital divide. We define a threat as the potential for one or more unwanted consequences caused by a circumstance, capability, action or event that could be harmful to a system or person. Threats can be caused naturally, accidentally or intentionally. In essence, a threat is a ubiquitous phenomenon. A vulnerability is a flaw or weakness in a system's design, its implementation, operation or management that could be exploited to violate the system and, consequently, cause a threat. Vulnerabilities may have different dimensions: technical, functional or behavioural.1

  19. Energy vulnerability relationships

    SciTech Connect

    Shaw, B.R.; Boesen, J.L.

    1998-02-01

    The US consumption of crude oil resources has been a steadily growing indicator of the vitality and strength of the US economy. At the same time import diversity has also been a rapidly developing dimension of the import picture. In the early 1970`s, embargoes of crude oil from Organization of Producing and Exporting Countries (OPEC) created economic and political havoc due to a significant lack of diversity and a unique set of economic, political and domestic regulatory circumstances. The continued rise of imports has again led to concerns over the security of our crude oil resource but threats to this system must be considered in light of the diversity and current setting of imported oil. This report develops several important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil to the United States, (2) The US is not vulnerable to having its entire import stream disrupted, (3) Even in stable countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus on international solutions, and (5) DOE program and policy development must reflect the requirements of the diverse supply. Does this increasing proportion of imported oil create a {open_quotes}dependence{close_quotes}? Does this increasing proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations experienced during the 1970`s? Finally, what is the vulnerability of supply disruptions from the current sources of imported oil? If oil is considered to be a finite, rapidly depleting resource, then the answers to these questions must be {open_quotes}yes.{close_quotes} However, if the supply of oil is expanding, and not limited, then dependence is relative to regional supply sources.

  20. Plutonium Vulnerability Management Plan

    SciTech Connect

    1995-03-01

    This Plutonium Vulnerability Management Plan describes the Department of Energy`s response to the vulnerabilities identified in the Plutonium Working Group Report which are a result of the cessation of nuclear weapons production. The responses contained in this document are only part of an overall, coordinated approach designed to enable the Department to accelerate conversion of all nuclear materials, including plutonium, to forms suitable for safe, interim storage. The overall actions being taken are discussed in detail in the Department`s Implementation Plan in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-1. This is included as Attachment B.

  1. Biological Vulnerability to Alcoholism.

    ERIC Educational Resources Information Center

    Schuckit, Marc A.

    1987-01-01

    Reviews the role of biological factors in the risk for alcoholism. Notes the importance of the definition of primary alcoholism and highlights data indicating that this disorder is genetically influenced. In studies of men at high risk for the future development of alcoholism, vulnerability shows up in reactions to ethanol brain wave amplitude and…

  2. Delinquent Recidivists: Vulnerable Children.

    ERIC Educational Resources Information Center

    Moore, Roslyn; And Others

    1984-01-01

    This study examines the relationship between vulnerability factors and recidivism of juvenile offenders. Four factors are identified which distinguish recedivists from nonrecidivists in a sample of 96 first offenders matched by age and sex. Results are discussed from an epidemiological and early intervention perspective. (Author/BS)

  3. Inflammation and plaque vulnerability

    PubMed Central

    Hansson, G. K.; Libby, P.; Tabas, I.

    2016-01-01

    Atherosclerosis is a maladaptive, nonresolving chronic inflammatory disease that occurs at sites of blood flow disturbance. The disease usually remains silent until a breakdown of integrity at the arterial surface triggers the formation of a thrombus. By occluding the lumen, the thrombus or emboli detaching from it elicits ischaemic symptoms that may be life-threatening. Two types of surface damage can cause atherothrombosis: plaque rupture and endothelial erosion. Plaque rupture is thought to be caused by loss of mechanical stability, often due to reduced tensile strength of the collagen cap surrounding the plaque. Therefore, plaques with reduced collagen content are thought to be more vulnerable than those with a thick collagen cap. Endothelial erosion, on the other hand, may occur after injurious insults to the endothelium instigated by metabolic disturbance or immune insults. This review discusses the molecular mechanisms involved in plaque vulnerability and the development of atherothrombosis. PMID:26260307

  4. HEPA Filter Vulnerability Assessment

    SciTech Connect

    GUSTAVSON, R.D.

    2000-05-11

    This assessment of High Efficiency Particulate Air (HEPA) filter vulnerability was requested by the USDOE Office of River Protection (ORP) to satisfy a DOE-HQ directive to evaluate the effect of filter degradation on the facility authorization basis assumptions. Within the scope of this assessment are ventilation system HEPA filters that are classified as Safety-Class (SC) or Safety-Significant (SS) components that perform an accident mitigation function. The objective of the assessment is to verify whether HEPA filters that perform a safety function during an accident are likely to perform as intended to limit release of hazardous or radioactive materials, considering factors that could degrade the filters. Filter degradation factors considered include aging, wetting of filters, exposure to high temperature, exposure to corrosive or reactive chemicals, and exposure to radiation. Screening and evaluation criteria were developed by a site-wide group of HVAC engineers and HEPA filter experts from published empirical data. For River Protection Project (RPP) filters, the only degradation factor that exceeded the screening threshold was for filter aging. Subsequent evaluation of the effect of filter aging on the filter strength was conducted, and the results were compared with required performance to meet the conditions assumed in the RPP Authorization Basis (AB). It was found that the reduction in filter strength due to aging does not affect the filter performance requirements as specified in the AB. A portion of the HEPA filter vulnerability assessment is being conducted by the ORP and is not part of the scope of this study. The ORP is conducting an assessment of the existing policies and programs relating to maintenance, testing, and change-out of HEPA filters used for SC/SS service. This document presents the results of a HEPA filter vulnerability assessment conducted for the River protection project as requested by the DOE Office of River Protection.

  5. Beyond 'vulnerable groups': contexts and dynamics of vulnerability.

    PubMed

    Zarowsky, Christina; Haddad, Slim; Nguyen, Vinh-Kim

    2013-03-01

    This paper reviews approaches to vulnerability in public health, introducing a series of 10 papers addressing vulnerability in health in Africa. We understand vulnerability as simultaneously a condition and a process. Social inequalities are manifest in and exacerbate three key dimensions of vulnerability: the initial level of wellbeing, the degree of exposure to risk, and the capacity to manage risk effectively. We stress the dynamic interactions linking material and social deprivation, poverty, powerlessness and ill health: risks or shocks and their health impacts are intimately interconnected and reinforce each other in a cycle which in the absence of effective interventions, increases vulnerability. An inductive process which does not begin with an a priori definition or measurement of 'vulnerability' and which does not assume the existence of fixed 'vulnerable groups' allowed us both to re-affirm core aspects of existing conceptual frameworks, and to engage in new ways with literature specifically addressing vulnerability and resilience at the population level as well as with literature - for example in ecology, and on the concept of frailty in research on aging - with which researchers on health and poverty in Africa may not be familiar. We invite conceptual and empirical work on vulnerability in complex systems frameworks. These perspectives emphasize contexts and nonlinear causality thus supporting analyses of vulnerability and resilience as both markers and emergent properties of dynamic interactions. We accept a working definition of vulnerability, and recognize that some definable groups of people are more likely than others to suffer harm from exposure to health risks. But we suggest that the real work - at both intellectual and policy/political levels - lies in understanding and responding to the dynamics, meanings and power relations underlying actual instances and processes of vulnerability and harm.

  6. Beyond 'vulnerable groups': contexts and dynamics of vulnerability.

    PubMed

    Zarowsky, Christina; Haddad, Slim; Nguyen, Vinh-Kim

    2013-03-01

    This paper reviews approaches to vulnerability in public health, introducing a series of 10 papers addressing vulnerability in health in Africa. We understand vulnerability as simultaneously a condition and a process. Social inequalities are manifest in and exacerbate three key dimensions of vulnerability: the initial level of wellbeing, the degree of exposure to risk, and the capacity to manage risk effectively. We stress the dynamic interactions linking material and social deprivation, poverty, powerlessness and ill health: risks or shocks and their health impacts are intimately interconnected and reinforce each other in a cycle which in the absence of effective interventions, increases vulnerability. An inductive process which does not begin with an a priori definition or measurement of 'vulnerability' and which does not assume the existence of fixed 'vulnerable groups' allowed us both to re-affirm core aspects of existing conceptual frameworks, and to engage in new ways with literature specifically addressing vulnerability and resilience at the population level as well as with literature - for example in ecology, and on the concept of frailty in research on aging - with which researchers on health and poverty in Africa may not be familiar. We invite conceptual and empirical work on vulnerability in complex systems frameworks. These perspectives emphasize contexts and nonlinear causality thus supporting analyses of vulnerability and resilience as both markers and emergent properties of dynamic interactions. We accept a working definition of vulnerability, and recognize that some definable groups of people are more likely than others to suffer harm from exposure to health risks. But we suggest that the real work - at both intellectual and policy/political levels - lies in understanding and responding to the dynamics, meanings and power relations underlying actual instances and processes of vulnerability and harm. PMID:23549696

  7. Multiscale vulnerability of complex networks.

    PubMed

    Boccaletti, Stefano; Buldú, Javier; Criado, Regino; Flores, Julio; Latora, Vito; Pello, Javier; Romance, Miguel

    2007-12-01

    We present a novel approach to quantify the vulnerability of a complex network, i.e., the capacity of a graph to maintain its functional performance under random damages or malicious attacks. The proposed measure represents a multiscale evaluation of vulnerability, and makes use of combined powers of the links' betweenness. We show that the proposed approach is able to properly describe some cases for which earlier measures of vulnerability fail. The relevant applications of our method for technological network design are outlined.

  8. Markers of vulnerability in schizophrenia

    PubMed Central

    Prelipceanu, D

    2009-01-01

    Vulnerability in schizophrenia is an integrative concept, which tries to explain the development of schizophrenia as an interaction between different individual susceptibility factors and environmental risk factors. Vulnerability markers used in genetic studies include biochemical indicators, neuroanatomical, neurophysiologic, and cognitive abnormalities. Among those, the most extensive studied markers were: evoked potentials, smooth pursuit eye movements, and attentional deficits. Some of the potential indicators presented in this paper satisfy most of the criteria necessary for a vulnerability marker, but none meets all of them. Nevertheless, they represent important markers of risk to schizophrenia. Key words: vulnerability, evoked potentials, eye movements, attentional deficits PMID:20108534

  9. Common Control System Vulnerability

    SciTech Connect

    Trent Nelson

    2005-12-01

    The Control Systems Security Program and other programs within the Idaho National Laboratory have discovered a vulnerability common to control systems in all sectors that allows an attacker to penetrate most control systems, spoof the operator, and gain full control of targeted system elements. This vulnerability has been identified on several systems that have been evaluated at INL, and in each case a 100% success rate of completing the attack paths that lead to full system compromise was observed. Since these systems are employed in multiple critical infrastructure sectors, this vulnerability is deemed common to control systems in all sectors. Modern control systems architectures can be considered analogous to today's information networks, and as such are usually approached by attackers using a common attack methodology to penetrate deeper and deeper into the network. This approach often is composed of several phases, including gaining access to the control network, reconnaissance, profiling of vulnerabilities, launching attacks, escalating privilege, maintaining access, and obscuring or removing information that indicates that an intruder was on the system. With irrefutable proof that an external attack can lead to a compromise of a computing resource on the organization's business local area network (LAN), access to the control network is usually considered the first phase in the attack plan. Once the attacker gains access to the control network through direct connections and/or the business LAN, the second phase of reconnaissance begins with traffic analysis within the control domain. Thus, the communications between the workstations and the field device controllers can be monitored and evaluated, allowing an attacker to capture, analyze, and evaluate the commands sent among the control equipment. Through manipulation of the communication protocols of control systems (a process generally referred to as ''reverse engineering''), an attacker can then map out the

  10. The Vulnerability of Elderly Consumers.

    ERIC Educational Resources Information Center

    McGhee, Jerrie L.

    1983-01-01

    Reviews research on the vulnerability of the elderly to consumer fraud. Patterns of consumption, situational characteristics, education and product knowledge, psychological losses, social isolation, and psychosocial transitions influence the elderly's vulnerability and ability to cope with consumer abuse. Higher educational attainment and greater…

  11. Operationalisation of physical vulnerability to natural hazards: Vulnerability curves versus vulnerability indicators

    NASA Astrophysics Data System (ADS)

    Papathoma-Koehle, Maria

    2015-04-01

    Physical vulnerability to natural hazards is often presented as a function of the intensity of the process and the degree of loss (vulnerability or fragility curves). However, a considerable amount of studies argue that physical vulnerability assessment should focus on the identification of these variables that influence the vulnerability of an element at risk (vulnerability indicators). In this study, the focus is on the comparison between the two methods and the provision of recommendations for improved operationalisation and assessment of physical vulnerability. The comparison is illustrated through a case study in South Tyrol. The two methods have been applied at the same study area that suffered significant damages due to a debris flow event in 1987. A vulnerability curve has been developed for the buildings that suffered damages, as well as a database including physical vulnerability indicators for the same set of buildings. The comparison of the results highlight the advantages and disadvantages of the two methods showing that they should complement rather than oppose each other.

  12. Research with vulnerable human beings.

    PubMed

    Tangwa, Godfrey B

    2009-11-01

    Some categories of human beings are particularly vulnerable vis-à-vis medical research. Vulnerability could be considered as the liability to be harmed, exploited, deceived, cheated, wronged, or otherwise unfairly treated, in roughly that descending order of importance. Vulnerable human beings obviously include the incompetent (minors and mentally handicapped adults), the desperately poor, ill or ignorant, prisoners, refugees, pregnant women, subordinates in highly authoritarian systems, etc. Vulnerability in itself does not imply that no research whatsoever should be carried out with such categories of humans but only that it should be carried out only under very special conditions. In this paper I treat of vulnerability in research of particularly developing world populations; of the types of research which exploit such vulnerability, and of why and how research subjects should be protected. The aim in this paper is to stimulate practical reflection on the possible vulnerabilities of potential research subjects that researchers or investigators need to avoid exploiting rather than on an adequate theoretical treatment of the issue.

  13. Cultural vulnerability and professional narratives.

    PubMed

    Gunaratnam, Yasmin

    2011-01-01

    In this article the author draws upon research with palliative care professionals in the United Kingdom to discuss the value of a stance of cultural vulnerability in intercultural care. Cultural vulnerability recognizes the reality, but also the ethical value of uncertainty and not-knowing in care. Attentiveness to professional narratives is advocated as vital in the development of greater understanding of cultural vulnerability and its effects. The role of cultural identifications and the politics of racism in social work narratives is given specific attention.

  14. Cultural vulnerability and professional narratives.

    PubMed

    Gunaratnam, Yasmin

    2011-01-01

    In this article the author draws upon research with palliative care professionals in the United Kingdom to discuss the value of a stance of cultural vulnerability in intercultural care. Cultural vulnerability recognizes the reality, but also the ethical value of uncertainty and not-knowing in care. Attentiveness to professional narratives is advocated as vital in the development of greater understanding of cultural vulnerability and its effects. The role of cultural identifications and the politics of racism in social work narratives is given specific attention. PMID:22150178

  15. Placas and Murals

    ERIC Educational Resources Information Center

    Romotsky, Jerry; Romotsky, Sally

    1974-01-01

    Presented examples of graffiti as seen in the barrios of East Los Angeles that told of the past and demonstrated how graffiti could be used in a positive fashion reflecting the positive aspirations, interests, and identities of the residents. (Author/RK)

  16. Transgender youth: invisible and vulnerable.

    PubMed

    Grossman, Arnold H; D'Augelli, Anthony R

    2006-01-01

    This study used three focus groups to explore factors that affect the experiences of youth (ages 15 to 21) who identify as transgender. The focus groups were designed to probe transgender youths' experiences of vulnerability in the areas of health and mental health. This involved their exposure to risks, discrimination, marginalization, and their access to supportive resources. Three themes emerged from an analysis of the groups' conversations. The themes centered on gender identity and gender presentation, sexuality and sexual orientation, and vulnerability and health issues. Most youth reported feeling they were transgender at puberty, and they experienced negative reactions to their gender atypical behaviors, as well as confusion between their gender identity and sexual orientation. Youth noted four problems related to their vulnerability in health-related areas: the lack of safe environments, poor access to physical health services, inadequate resources to address their mental health concerns, and a lack of continuity of caregiving by their families and communities. PMID:16893828

  17. The vulnerability of elderly consumers.

    PubMed

    McGhee, J L

    1983-01-01

    Research interest in the vulnerability of the elderly to consumer fraud has increased in recent years. Consumer surveys and studies of complaint data permit the examination of hypothesized indicators of vulnerability for samples of older and younger consumers. A review of the research shows that patterns of consumption, situational characteristics, education and product knowledge, awareness of deception, psychological losses, social isolation, and psychosocial transitions influence the elderly's vulnerability and ability to cope with consumer abuse. Higher educational attainment and a greater skepticism toward business practices should improve the coping ability of future cohorts of elderly, yet the potential for fraud will remain for many transactions vitally important to their well-being. Implications of the research findings for intervention strategies are presented.

  18. Are Vulnerability Disclosure Deadlines Justified?

    SciTech Connect

    Miles McQueen; Jason L. Wright; Lawrence Wellman

    2011-09-01

    Vulnerability research organizations Rapid7, Google Security team, and Zero Day Initiative recently imposed grace periods for public disclosure of vulnerabilities. The grace periods ranged from 45 to 182 days, after which disclosure might occur with or without an effective mitigation from the affected software vendor. At this time there is indirect evidence that the shorter grace periods of 45 and 60 days may not be practical. However, there is strong evidence that the recently announced Zero Day Initiative grace period of 182 days yields benefit in speeding up the patch creation process, and may be practical for many software products. Unfortunately, there is also evidence that the 182 day grace period results in more vulnerability announcements without an available patch.

  19. Chronic stress-induced hippocampal vulnerability: the glucocorticoid vulnerability hypothesis.

    PubMed

    Conrad, Cheryl D

    2008-01-01

    The hippocampus, a limbic structure important in learning and memory, is particularly sensitive to chronic stress and to glucocorticoids. While glucocorticoids are essential for an effective stress response, their oversecretion was originally hypothesized to contribute to age-related hippocampal degeneration. However, conflicting findings were reported on whether prolonged exposure to elevated glucocorticoids endangered the hippocampus and whether the primate hippocampus even responded to glucocorticoids as the rodent hippocampus did. This review discusses the seemingly inconsistent findings about the effects of elevated and prolonged glucocorticoids on hippocampal health and proposes that a chronic stress history, which includes repeated elevation of glucocorticoids, may make the hippocampus vulnerable to potential injury. Studies are described to show that chronic stress or prolonged exposure to glucocorticoids can compromise the hippocampus by producing dendritic retraction, a reversible form of plasticity that includes dendritic restructuring without irreversible cell death. Conditions that produce dendritic retraction are hypothesized to make the hippocampus vulnerable to neurotoxic or metabolic challenges. Of particular interest is the finding that the hippocampus can recover from dendritic retraction without any noticeable cell loss. When conditions surrounding dendritic retraction are present, the potential for harm is increased because dendritic retraction may persist for weeks, months or even years, thereby broadening the window of time during which the hippocampus is vulnerable to harm, called the 'glucocorticoid vulnerability hypothesis'. The relevance of these findings is discussed with regard to conditions exhibiting parallels in hippocampal plasticity, including Cushing's disease, major depressive disorder (MDD), and post-traumatic stress disorder (PTSD).

  20. Molecular Imaging of Plaque Vulnerability

    PubMed Central

    Tavakoli, Sina; Vashist, Aseem; Sadeghi, Mehran M.

    2014-01-01

    Over the past decade significant progress has been made in the development of novel imaging strategies focusing on the biology of the vessel wall for identification of vulnerable plaques. While the majority of these studies are still in the preclinical stage, few techniques (e.g., 18F-FDG and 18F-NaF PET imaging) have already been evaluated in clinical studies with promising results. Here, we will briefly review the pathobiology of atherosclerosis and discuss molecular imaging strategies that have been developed to target these events, with an emphasis on mechanisms that are associated with atherosclerotic plaque vulnerability. PMID:25124827

  1. Food Chain Security and Vulnerability

    NASA Astrophysics Data System (ADS)

    Brunet, Sébastien; Delvenne, Pierre; Claisse, Frédéric

    In our contemporary societies, the food chain could be defined as a macro-technical system, which depends on a wide variety of actors and risks analysis methods. In this contribution, risks related to the food chain are defined in terms of "modern risks" (Beck 1992). The whole national economic sector of food production/distribution is vulnerable to a local accident, which can affect the functioning of food chain, the export programs and even the political system. Such a complex socio-technical environment is undoubtedly vulnerable to intentional act such as terrorism.

  2. Vulnerability in research ethics: a way forward.

    PubMed

    Lange, Margaret Meek; Rogers, Wendy; Dodds, Susan

    2013-07-01

    Several foundational documents of bioethics mention the special obligation researchers have to vulnerable research participants. However, the treatment of vulnerability offered by these documents often relies on enumeration of vulnerable groups rather than an analysis of the features that make such groups vulnerable. Recent attempts in the scholarly literature to lend philosophical weight to the concept of vulnerability are offered by Luna and Hurst. Luna suggests that vulnerability is irreducibly contextual and that Institutional Review Boards (Research Ethics Committees) can only identify vulnerable participants by carefully examining the details of the proposed research. Hurst, in contrast, defines the vulnerable as those especially at risk of incurring the wrongs to which all research ethics participants are exposed. We offer a more substantive conception of vulnerability than Luna but one that gives rise to a different rubric of responsibilities from Hurst's. While we understand vulnerability to be an ontological condition of human existence, in the context of research ethics, we take the vulnerable to be research subjects who are especially prone to harm or exploitation. Our analysis rests on developing a typology of sources of vulnerability and showing how distinct sources generate distinct obligations on the part of the researcher. Our account emphasizes that the researcher's first obligation is not to make the research participant even more vulnerable than they already are. To illustrate our framework, we consider two cases: that of a vulnerable population involved in international research and that of a domestic population of people with diminished capacity.

  3. US Vulnerability to Natural Disasters

    NASA Astrophysics Data System (ADS)

    van der Vink, G.; Apgar, S.; Batchelor, A.; Carter, C.; Gail, D.; Jarrett, A.; Levine, N.; Morgan, W.; Orlikowski, M.; Pray, T.; Raymar, M.; Siebert, A.; Shawa, T. W.; Wallace, C.

    2002-05-01

    Natural disasters result from the coincidence of natural events with the built environment. Our nation's infrastructure is growing at an exponential rate in many areas of high risk, and the Federal government's liability is increasing proportionally. By superimposing population density with predicted ground motion from earthquakes, historical hurricane tracks, historical tornado locations, and areas within the flood plain, we are able to identify locations of high vulnerability within the United States. We present a comprehensive map of disaster risk for the United States that is being produced for the Senate Natural Hazards Caucus. The map allows for the geographic comparison of natural disaster risk with past disaster declarations, the expenditure of Federal dollars for disaster relief, population increase, and variations of GDP. Every state is vulnerable to natural disasters. Although their frequency varies considerably, the annualized losses for disaster relief from hurricanes, earthquakes, and floods are approximately equivalent. While fast-growing states such as California and Florida remain highly vulnerable, changes in the occurrence of natural events combined with population increases are making areas such as Texas, North Carolina, and the East Coast increasingly vulnerable.

  4. Viability of the Vulnerability Thesis.

    ERIC Educational Resources Information Center

    Lutz, Frank W.

    1996-01-01

    Summarizes the viability of the vulnerability thesis as a tool in accounting for school superintendent behavior today, suggesting how the thesis can be built on in order to better understand the political world of superintendency. The paper suggests some social and political theories that might extend the thesis, further clarifying the…

  5. REGIONAL VULNERABILITY: A CONCEPTUAL FRAMEWORK

    EPA Science Inventory

    Regional vulnerability assessment, or ReVA, is an approach to place-based ecological risk assessment that is currently under development by the Office of Research and Development of the U.S. Environmental Protection Agency (EPA). The assessment is done at the scale of EPA region...

  6. Measuring Vulnerability to Stereotype Threat

    ERIC Educational Resources Information Center

    Barnard, Lucy; Burley, Hansel; Olivarez, Arturo; Crooks, Steven

    2008-01-01

    Introduction: In this study, we examined the psychometric properties of an instrument intended to measure vulnerability to stereotype threat. Method: We revised the instrument through assessing score reliability and then examined a domain specific model using confirmatory factor analyses. After examining the responses of the total sample…

  7. Assessing European wild fire vulnerability

    NASA Astrophysics Data System (ADS)

    Oehler, F.; Oliveira, S.; Barredo, J. I.; Camia, A.; Ayanz, J. San Miguel; Pettenella, D.; Mavsar, R.

    2012-04-01

    Wild fire vulnerability is a measure of potential socio-economic damage caused by a fire in a specific area. As such it is an important component of long-term fire risk management, helping policy-makers take informed decisions about adequate expenditures for fire prevention and suppression, and to target those regions at highest risk. This paper presents a first approach to assess wild fire vulnerability at the European level. A conservative approach was chosen that assesses the cost of restoring the previous land cover after a potential fire. Based on the CORINE Land Cover, a restoration cost was established for each land cover class at country level, and an average restoration time was assigned according to the recovery capacity of the land cover. The damage caused by fire was then assessed by discounting the cost of restoring the previous land cover over the restoration period. Three different vulnerability scenarios were considered assuming low, medium and high fire severity causing different levels of damage. Over Europe, the potential damage of wild land fires ranges from 10 - 13, 732 Euro*ha-1*yr-1 for low fire severity, 32 - 45,772 Euro*ha-1*yr-1 for medium fire severity and 54 - 77,812 Euro*ha-1*yr-1 for high fire severity. The least vulnerable are natural grasslands, moors and heathland and sclerophyllous vegetation, while the highest cost occurs for restoring broad-leaved forest. Preliminary validation comparing these estimates with official damage assessments for past fires shows reasonable results. The restoration cost approach allows for a straightforward, data extensive assessment of fire vulnerability at European level. A disadvantage is the inherent simplification of the evaluation procedure with the underestimation of non-markets goods and services. Thus, a second approach has been developed, valuing individual wild land goods and services and assessing their annual flow which is lost for a certain period of time in case of a fire event. However

  8. Vulnerability genes or plasticity genes?

    PubMed Central

    Belsky, J; Jonassaint, C; Pluess, M; Stanton, M; Brummett, B; Williams, R

    2009-01-01

    The classic diathesis–stress framework, which views some individuals as particularly vulnerable to adversity, informs virtually all psychiatric research on behavior–gene–environment (G × E) interaction. An alternative framework of ‘differential susceptibility' is proposed, one which regards those most susceptible to adversity because of their genetic make up as simultaneously most likely to benefit from supportive or enriching experiences—or even just the absence of adversity. Recent G × E findings consistent with this perspective and involving monoamine oxidase-A, 5-HTTLPR (5-hydroxytryptamine-linked polymorphic region polymorphism) and dopamine receptor D4 (DRD4) are reviewed for illustrative purposes. Results considered suggest that putative ‘vulnerability genes' or ‘risk alleles' might, at times, be more appropriately conceptualized as ‘plasticity genes', because they seem to make individuals more susceptible to environmental influences—for better and for worse. PMID:19455150

  9. Soil vulnerability for cesium transfer.

    PubMed

    Vandenhove, Hildegarde; Sweeck, Lieve

    2011-07-01

    The recent events at the Fukushima Daiichi nuclear power plant in Japan have raised questions about the accumulation of radionuclides in soils and the possible impacts on agriculture surrounding nuclear power plants. This article summarizes the knowledge gained after the nuclear power plant accident in Chernobyl, Ukraine, on how soil parameters influence soil vulnerability for radiocesium bioavailability, discusses some potential agrochemical countermeasures, and presents some predictions of radiocesium crop concentrations for areas affected by the Fukushima accident. PMID:21608116

  10. Thermal detection of vulnerable plaque.

    PubMed

    Madjid, Mohammad; Naghavi, Morteza; Malik, Basit A; Litovsky, Silvio; Willerson, James T; Casscells, Ward

    2002-11-21

    In 1996, we showed that inflamed atherosclerotic plaques give off more heat and that vulnerable plaques may be detected by measuring their temperature. Plaque temperature is correlated directly with inflammatory cell density and inversely with the distance of the cell clusters from the luminal surface. It is inversely related to the density of the smooth muscle cells. We found no significant association between temperature heterogeneity and presence of Chlamydia pneumoniae in plaque or the gross color of human atherosclerotic carotid plaques. We also found pH heterogeneity in plaques from human carotid artery and aortas of Watanabe atherosclerotic rabbits and apolipoprotein E-deficient mice. Areas with lower pH had higher temperature, and areas with a large lipid core showed lower pH with higher temperature, whereas calcified regions had lower temperature and higher pH. We also developed a thermography basket catheter and showed in vivo temperature heterogeneity in atherosclerotic lesions of atherosclerotic dogs and Watanabe rabbits. Thermal heterogeneity was later documented in human atherosclerotic coronary arteries. Temperature difference between atherosclerotic plaque and healthy vessel wall is related to clinical instability. It is correlated with systemic markers of inflammation and is a strong predictor of adverse cardiac events after percutaneous interventions. Thermography is the first in a series of novel "functional" imaging methods and is moving to clinical trials. It may be useful for a variety of clinical and research purposes, such as detection of vulnerable plaques and risk stratification of vulnerable patients.

  11. Cotton genetic resources and crop vulnerability

    Technology Transfer Automated Retrieval System (TEKTRAN)

    A report on the genetic vulnerability of cotton was provided to the National Genetic Resources Advisory Council. The report discussed crop vulnerabilities associated with emerging diseases, emerging pests, and a narrowing genetic base. To address these crop vulnerabilities, the report discussed the ...

  12. Measuring vulnerability to disaster displacement

    NASA Astrophysics Data System (ADS)

    Brink, Susan A.; Khazai, Bijan; Power, Christopher; Wenzel, Friedemann

    2015-04-01

    Large scale disasters can cause devastating impacts in terms of population displacement. Between 2008 and 2013, on average 27 million people were displaced annually by disasters (Yonetani 2014). After large events such as hurricane Katrina or the Port-au-Prince earthquake, images of inadequate public shelter and concerns about large scale and often inequitable migration have been broadcast around the world. Population displacement can often be one of the most devastating and visible impacts of a natural disaster. Despite the importance of population displacement in disaster events, measures to understand the socio-economic vulnerability of a community often use broad metrics to estimate the total socio-economic risk of an event rather than focusing on the specific impacts that a community faces in a disaster. Population displacement is complex and multi-causal with the physical impact of a disaster interacting with vulnerability arising from the response, environmental issues (e.g., weather), cultural concerns (e.g., expectations of adequate shelter), and many individual factors (e.g., mobility, risk perception). In addition to the complexity of the causes, population displacement is difficult to measure because of the wide variety of different terms and definitions and its multi-dimensional nature. When we speak of severe population displacement, we may refer to a large number of displaced people, an extended length of displacement or associated difficulties such as poor shelter quality, risk of violence and crime in shelter communities, discrimination in aid, a lack of access to employment or other difficulties that can be associated with large scale population displacement. We have completed a thorough review of the literature on disaster population displacement. Research has been conducted on historic events to understand the types of negative impacts associated with population displacement and also the vulnerability of different groups to these impacts. We

  13. Mountain torrents: Quantifying vulnerability and assessing uncertainties

    PubMed Central

    Totschnig, Reinhold; Fuchs, Sven

    2013-01-01

    Vulnerability assessment for elements at risk is an important component in the framework of risk assessment. The vulnerability of buildings affected by torrent processes can be quantified by vulnerability functions that express a mathematical relationship between the degree of loss of individual elements at risk and the intensity of the impacting process. Based on data from the Austrian Alps, we extended a vulnerability curve for residential buildings affected by fluvial sediment transport processes to other torrent processes and other building types. With respect to this goal to merge different data based on different processes and building types, several statistical tests were conducted. The calculation of vulnerability functions was based on a nonlinear regression approach applying cumulative distribution functions. The results suggest that there is no need to distinguish between different sediment-laden torrent processes when assessing vulnerability of residential buildings towards torrent processes. The final vulnerability functions were further validated with data from the Italian Alps and different vulnerability functions presented in the literature. This comparison showed the wider applicability of the derived vulnerability functions. The uncertainty inherent to regression functions was quantified by the calculation of confidence bands. The derived vulnerability functions may be applied within the framework of risk management for mountain hazards within the European Alps. The method is transferable to other mountain regions if the input data needed are available. PMID:27087696

  14. Vulnerable to HIV / AIDS. Migration.

    PubMed

    Fernandez, I

    1998-01-01

    This special report discusses the impact of globalization, patterns of migration in Southeast Asia, gender issues in migration, the links between migration and HIV/AIDS, and spatial mobility and social networks. Migrants are particularly marginalized in countries that blame migrants for transmission of infectious and communicable diseases and other social ills. Effective control of HIV/AIDS among migrant and native populations requires a multisectoral approach. Programs should critically review the privatization of health care services and challenge economic models that polarize the rich and the poor, men and women, North and South, and migrant and native. Programs should recognize the equality between locals and migrants in receipt of health services. Countermeasures should have input from migrants in order to reduce the conditions that increase vulnerability to HIV/AIDS. Gender-oriented research is needed to understand women's role in migration. Rapid assessment has obscured the human dimension of migrants' vulnerability to HIV. Condom promotion is not enough. Migration is a major consequence of globalization, which holds the promise, real or imagined, of prosperity for all. Mass migration can be fueled by explosive regional developments. In Southeast Asia, migration has been part of the process of economic development. The potential to emigrate increases with greater per capita income. "Tiger" economies have been labor importers. Safe sex is not practiced in many Asian countries because risk is not taken seriously. Migrants tend to be used as economic tools, without consideration of social adjustment and sex behavior among singles.

  15. Dynamics of immune system vulnerabilities

    NASA Astrophysics Data System (ADS)

    Stromberg, Sean P.

    The adaptive immune system can be viewed as a complex system, which adapts, over time, to reflect the history of infections experienced by the organism. Understanding its operation requires viewing it in terms of tradeoffs under constraints and evolutionary history. It typically displays "robust, yet fragile" behavior, meaning common tasks are robust to small changes but novel threats or changes in environment can have dire consequences. In this dissertation we use mechanistic models to study several biological processes: the immune response, the homeostasis of cells in the lymphatic system, and the process that normally prevents autoreactive cells from entering the lymphatic system. Using these models we then study the effects of these processes interacting. We show that the mechanisms that regulate the numbers of cells in the immune system, in conjunction with the immune response, can act to suppress autoreactive cells from proliferating, thus showing quantitatively how pathogenic infections can suppress autoimmune disease. We also show that over long periods of time this same effect can thin the repertoire of cells that defend against novel threats, leading to an age correlated vulnerability. This vulnerability is shown to be a consequence of system dynamics, not due to degradation of immune system components with age. Finally, modeling a specific tolerance mechanism that normally prevents autoimmune disease, in conjunction with models of the immune response and homeostasis we look at the consequences of the immune system mistakenly incorporating pathogenic molecules into its tolerizing mechanisms. The signature of this dynamic matches closely that of the dengue virus system.

  16. Scenarios for coastal vulnerability assessment

    USGS Publications Warehouse

    Nicholls, Robert J.; Woodroffe, Colin D.; Burkett, Virginia; Hay, John; Wong, Poh Poh; Nurse, Leonard; Wolanski, Eric; McLusky, Donald S.

    2011-01-01

    Coastal vulnerability assessments tend to focus mainly on climate change and especially on sea-level rise. Assessment of the influence of nonclimatic environmental change or socioeconomic change is less well developed and these drivers are often completely ignored. Given that the most profound coastal changes of the twentieth century due to nonclimate drivers are likely to continue through the twenty-first century, this is a major omission. It may result in not only overstating the importance of climate change but also overlooking significant interactions of climate change and other drivers. To support the development of policies relating to climate change and coastal management, integrated assessments of climatic change in coastal areas are required, including the effects of all the relevant drivers. This chapter explores the development of scenarios (or "plausible futures") of relevant climate and nonclimate drivers that can be used for coastal analysis, with an emphasis on the nonclimate drivers. It shows the importance of analyzing the impacts of climate change and sea-level rise in a broader context of coastal change and all its drivers. This will improve the analysis of impacts, key vulnerabilities, and adaptation needs and, hence, inform climate and coastal policy. Stakeholder engagement is important in the development of scenarios, and the underlying assumptions need to be explicit, transparent, and open to scientific debate concerning their uncertainties/realism and likelihood.

  17. Vulnerability of network of networks

    NASA Astrophysics Data System (ADS)

    Havlin, S.; Kenett, D. Y.; Bashan, A.; Gao, J.; Stanley, H. E.

    2014-10-01

    Our dependence on networks - be they infrastructure, economic, social or others - leaves us prone to crises caused by the vulnerabilities of these networks. There is a great need to develop new methods to protect infrastructure networks and prevent cascade of failures (especially in cases of coupled networks). Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How, and at which cost can one restructure the network such that it will become more robust against malicious attacks? The gradual increase in attacks on the networks society depends on - Internet, mobile phone, transportation, air travel, banking, etc. - emphasize the need to develop new strategies to protect and defend these crucial networks of communication and infrastructure networks. One example is the threat of liquid explosives a few years ago, which completely shut down air travel for days, and has created extreme changes in regulations. Such threats and dangers warrant the need for new tools and strategies to defend critical infrastructure. In this paper we review recent advances in the theoretical understanding of the vulnerabilities of interdependent networks with and without spatial embedding, attack strategies and their affect on such networks of networks as well as recently developed strategies to optimize and repair failures caused by such attacks.

  18. Students' vulnerability in educational research.

    PubMed

    Sykes, L M; Dullabh, H

    2012-06-01

    Dental teaching institutions in South Africa recently implemented "learner-centred" curricula and expected educators to alter their teaching styles accordingly, but perhaps without providing adequate training in this paedagogical philosophy. At the same time, the lecturers were required to conduct evidence-based research to evaluate the outcomes. Thus, clinicians/lecturers also became researchers, using their own students or student material for assessment purposes. Previously, this form of educational research, which was carried out in normal academic settings, was not subject to review by Institutional Review Boards (IRB). However, concerns have risen that learners may be a vulnerable population due to their position in the academic institution, and the power and knowledge differentials that exist between them and the lecturer/researcher. This raises ethical concerns regarding their autonomy and ability to provide free, voluntary, informed consent to be research participants. This paper questions whether educational research may lead to student vulnerability, and proposes some recommendations for educators and institutions involved in educational research.

  19. Assessing human vulnerability: Daytime residential distribution as a vulnerability indicator

    NASA Astrophysics Data System (ADS)

    Gokesch, Karin; Promper, Catrin; Papathoma-Köhle, Maria; Glade, Thomas

    2014-05-01

    Natural hazard risk management is based on detailed information on potential impacts of natural hazards. Especially concerning fast onset hazards such as flash floods, earthquakes but also debris flows and landslides, knowing potential hotspots of impact to both, assets and human lives is essential. This information is important for emergency management and decision making in the response phase of the disaster management cycle. Emergency managers are in need of information regarding not only the number of humans being potentially affected but also the respective vulnerability of the group affected based on characteristics such as age, income, health condition, mobility, etc. regarding a certain hazard. The analysis presented focuses on the distribution of the population, assuming a certain pattern of people in a certain radius of action. The method applied is based on a regular pattern of movement of different groups of people and a pattern of presence in certain units, e.g. schools, businesses or residential buildings. The distribution is calculated on a minimum of available data including the average household size, as well as information on building types. The study area is located in the Southwest of Lower Austria, Austria. The city of Waidhofen/Ybbs can be regarded as a regional center providing basic infrastructure, shops and schools. The high concentration of buildings combining shops and residential units leads to a high damage potential throughout the whole study area. The presented results indicate the population distribution within the study area on an average working day. It is clear that explicitly high numbers of people are located in specific buildings (e.g. schools and hospitals) which also include highly vulnerable groups especially to fast onset hazards. The results provide emergency services with the information that they need in order to intervene directly where large numbers of victims or people that need to be evacuated are located. In this

  20. An holistic view on aquifer vulnerability based on a distinction of different types of vulnerability

    NASA Astrophysics Data System (ADS)

    De Luca, Domenico Antonio; Lasagna, Manuela; Franchino, Elisa

    2016-04-01

    AN HOLISTIC VIEW ON AQUIFER VULNERABILITY BASED ON A DISTINCTION OF DIFFERENT TYPES OF VULNERABILITY D.A. De Luca1 , M. Lasagna1, E. Franchino1 1Department of Earth Sciences, University of Turin The concept of vulnerability is certainly useful in the field of groundwater protection. Nevertheless, within the scientific community, the definition of groundwater vulnerability is still debatable and not clear and conclusive. This is probably due to the fact that researchers often have very different experiences and education. A positive effect of it is a constant exchange of ideas, but there are also negative consequences and difficulties in deepening the issue. The different approaches are very important but they are usable only if the concept of vulnerability is standardized: thus, for the sake of clarity, a number of definitions should be laid down, based on the different types of vulnerability. These definitions can then provide the necessary holistic view for the aquifer vulnerability assessment. Nowadays vulnerability methods focus on the degree of vulnerability and the parameters needed for its evaluation, often neglecting to clarify what is the type of vulnerability the proposed methods are referred. The type of vulnerability, indeed, is both logically and hierarchically superior to the degree of vulnerability. More specifically the type of vulnerability represents the evaluation of the hydrogeological conditions considered in the vulnerability assessment and able to influence the way in which the contamination can take place. Currently the only distinction, based on of the type of vulnerability, is referred to intrinsic and specific vulnerability. Intrinsic vulnerability assesses the susceptibility of the receptor based on the natural properties of the land and subsurface; specific vulnerability also includes properties of the analyzed contaminant. This distinction is useful but not exhaustive. In addition to this, e.g., a distinction of vertical vulnerability

  1. Metadata for selecting or submitting generic seismic vulnerability functions via GEM's vulnerability database

    USGS Publications Warehouse

    Jaiswal, Kishor

    2013-01-01

    This memo lays out a procedure for the GEM software to offer an available vulnerability function for any acceptable set of attributes that the user specifies for a particular building category. The memo also provides general guidelines on how to submit the vulnerability or fragility functions to the GEM vulnerability repository, stipulating which attributes modelers must provide so that their vulnerability or fragility functions can be queried appropriately by the vulnerability database. An important objective is to provide users guidance on limitations and applicability by providing the associated modeling assumptions and applicability of each vulnerability or fragility function.

  2. Vulnerability and resilience: a critical nexus.

    PubMed

    Lotz, Mianna

    2016-02-01

    Not all forms of human fragility or vulnerability are unavoidable. Sometimes we knowingly and intentionally impose conditions of vulnerability on others; and sometimes we knowingly and intentionally enter into and assume conditions of vulnerability for ourselves (for example, when we decide to trust or forgive, enter into intimate relationships with others, become a parent, become a subject of medical or psychotherapeutic treatment, and the like). In this article, I propose a presently overlooked basis on which one might evaluate whether the imposition or assumption of vulnerability is acceptable, and on which one might ground a significant class of vulnerability-related obligations. Distinct from existing accounts of the importance of promoting autonomy in conditions of vulnerability, this article offers a preliminary exploration of the nature, role, and importance of resilience promotion, its relationship to autonomy promotion, and its prospects for improving human wellbeing in autonomy inhibiting conditions. PMID:26965682

  3. NV: Nessus Vulnerability Visualization for the Web

    SciTech Connect

    Harrison, Lane; Spahn, Riley B; Iannacone, Michael D; Downing, Evan P; Goodall, John R

    2012-01-01

    Network vulnerability is a critical component of network se- curity. Yet vulnerability analysis has received relatively lit- tle attention from the security visualization community. In this paper we describe nv, a web-based Nessus vulnerability visualization. Nv utilizes treemaps and linked histograms to allow system administrators to discover, analyze, and man- age vulnerabilities on their networks. In addition to visual- izing single Nessus scans, nv supports the analysis of sequen- tial scans by showing which vulnerabilities have been fixed, remain open, or are newly discovered. Nv was also designed to operate completely in-browser, to avoid sending sensitive data to outside servers. We discuss the design of nv, as well as provide case studies demonstrating vulnerability analysis workflows which include a multiple-node testbed and data from the 2011 VAST Challenge.

  4. Assessing the Security Vulnerabilities of Correctional Facilities

    SciTech Connect

    Morrison, G.S.; Spencer, D.S.

    1998-10-27

    The National Institute of Justice has tasked their Satellite Facility at Sandia National Laboratories and their Southeast Regional Technology Center in Charleston, South Carolina to devise new procedures and tools for helping correctional facilities to assess their security vulnerabilities. Thus, a team is visiting selected correctional facilities and performing vulnerability assessments. A vulnerability assessment helps to identi~ the easiest paths for inmate escape, for introduction of contraband such as drugs or weapons, for unexpected intrusion fi-om outside of the facility, and for the perpetration of violent acts on other inmates and correctional employees, In addition, the vulnerability assessment helps to quantify the security risks for the facility. From these initial assessments will come better procedures for performing vulnerability assessments in general at other correctional facilities, as well as the development of tools to assist with the performance of such vulnerability assessments.

  5. Vulnerability assessment of mining subsidence hazards.

    PubMed

    Deck, Olivier; Verdel, Thierry; Salmon, Romuald

    2009-10-01

    Between 1996 and 1999, five mining subsidence events occurred in the iron-ore field in Lorraine, France, and damaged several hundred buildings. Because of the thousand hectares of undermined areas, an assessment of the vulnerability of buildings and land is necessary for risk management. Risk assessment methods changed from initial risk management decisions that took place immediately after the mining subsidence to the risk assessment studies that are currently under consideration. These changes reveal much about the complexity of the vulnerability concept and about difficulties in developing simple and relevant methods for its assessment. The objective of this article is to present this process, suggest improvements on the basis of theoretical definitions of the vulnerability, and give an operational example of vulnerability assessment in the seismic field. The vulnerability is divided into three components: weakness, stakes value, and resilience. Final improvements take into account these three components and constitute an original method of assessing the vulnerability of a city to subsidence.

  6. Mining Bug Databases for Unidentified Software Vulnerabilities

    SciTech Connect

    Dumidu Wijayasekara; Milos Manic; Jason Wright; Miles McQueen

    2012-06-01

    Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been suggested in previous work that some bugs are only identified as vulnerabilities long after the bug has been made public. These vulnerabilities are known as hidden impact vulnerabilities. This paper discusses the feasibility and necessity to mine common publicly available bug databases for vulnerabilities that are yet to be identified. We present bug database analysis of two well known and frequently used software packages, namely Linux kernel and MySQL. It is shown that for both Linux and MySQL, a significant portion of vulnerabilities that were discovered for the time period from January 2006 to April 2011 were hidden impact vulnerabilities. It is also shown that the percentage of hidden impact vulnerabilities has increased in the last two years, for both software packages. We then propose an improved hidden impact vulnerability identification methodology based on text mining bug databases, and conclude by discussing a few potential problems faced by such a classifier.

  7. Flood vulnerability indices at varying spatial scales.

    PubMed

    Balica, S F; Douben, N; Wright, N G

    2009-01-01

    Populations around the world are vulnerable to natural disasters. Such disasters are occurring with increased frequency as a consequence of socio-economic and land-use developments and due to increased climate variability. This paper describes a methodology for using indicators to compute a Flood Vulnerability Index which is aimed at assessing the conditions which influence flood damage at various spatial scales: river basin, sub-catchment and urban area. The methodology developed distinguishes different characteristics at each identified spatial scale, thus allowing a more in-depth analysis and interpretation of local indicators. This also pinpoints local hotspots of flood vulnerability. The final results are presented by means of a standardised number, ranging from 0 to 1, which symbolises comparatively low or high flood vulnerability between the various spatial scales. The Flood Vulnerability Index can be used by international river basin organisations to identify and develop action plans to deal with floods and flooding or on smaller scales to improve local decision-making processes by selecting measures to reduce vulnerability at local and regional levels. In this work the methodology has been applied to various case studies at different spatial scales. This leads to some interesting observations on how flood vulnerability can be reflected by quantifiable indicators across scales, e.g. the relationship between the flood vulnerability of a sub-catchment with its river basin or the weak relation between the flood vulnerability of an urban area with the sub-catchment or river basin which it belongs to.

  8. Proliferation Vulnerability Red Team report

    SciTech Connect

    Hinton, J.P.; Barnard, R.W.; Bennett, D.E.

    1996-10-01

    This report is the product of a four-month independent technical assessment of potential proliferation vulnerabilities associated with the plutonium disposition alternatives currently under review by DOE/MD. The scope of this MD-chartered/Sandia-led study was limited to technical considerations that could reduce proliferation resistance during various stages of the disposition processes below the Stored Weapon/Spent Fuel standards. Both overt and covert threats from host nation and unauthorized parties were considered. The results of this study will be integrated with complementary work by others into an overall Nonproliferation and Arms Control Assessment in support of a Secretarial Record of Decision later this year for disposition of surplus U.S. weapons plutonium.

  9. Attack Vulnerability of Network Controllability

    PubMed Central

    2016-01-01

    Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison. It is found that the node-based strategies are often more harmful to the network controllability than the edge-based ones, and so are the recalculated strategies than their counterparts. The Barabási-Albert scale-free model, which has a highly biased structure, proves to be the most vulnerable of the tested model networks. In contrast, the Erdős-Rényi random model, which lacks structural bias, exhibits much better robustness to both node-based and edge-based attacks. We also survey the control robustness of 25 real-world networks, and the numerical results show that most real networks are control robust to random node failures, which has not been observed in the model networks. And the recalculated betweenness-based strategy is the most efficient way to harm the controllability of real-world networks. Besides, we find that the edge degree is not a good quantity to measure the importance of an edge in terms of network controllability. PMID:27588941

  10. Attack Vulnerability of Network Controllability.

    PubMed

    Lu, Zhe-Ming; Li, Xin-Feng

    2016-01-01

    Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison. It is found that the node-based strategies are often more harmful to the network controllability than the edge-based ones, and so are the recalculated strategies than their counterparts. The Barabási-Albert scale-free model, which has a highly biased structure, proves to be the most vulnerable of the tested model networks. In contrast, the Erdős-Rényi random model, which lacks structural bias, exhibits much better robustness to both node-based and edge-based attacks. We also survey the control robustness of 25 real-world networks, and the numerical results show that most real networks are control robust to random node failures, which has not been observed in the model networks. And the recalculated betweenness-based strategy is the most efficient way to harm the controllability of real-world networks. Besides, we find that the edge degree is not a good quantity to measure the importance of an edge in terms of network controllability. PMID:27588941

  11. Modeling Coastal Vulnerability through Space and Time

    PubMed Central

    2016-01-01

    Coastal ecosystems experience a wide range of stressors including wave forces, storm surge, sea-level rise, and anthropogenic modification and are thus vulnerable to erosion. Urban coastal ecosystems are especially important due to the large populations these limited ecosystems serve. However, few studies have addressed the issue of urban coastal vulnerability at the landscape scale with spatial data that are finely resolved. The purpose of this study was to model and map coastal vulnerability and the role of natural habitats in reducing vulnerability in Jamaica Bay, New York, in terms of nine coastal vulnerability metrics (relief, wave exposure, geomorphology, natural habitats, exposure, exposure with no habitat, habitat role, erodible shoreline, and surge) under past (1609), current (2015), and future (2080) scenarios using InVEST 3.2.0. We analyzed vulnerability results both spatially and across all time periods, by stakeholder (ownership) and by distance to damage from Hurricane Sandy. We found significant differences in vulnerability metrics between past, current and future scenarios for all nine metrics except relief and wave exposure. The marsh islands in the center of the bay are currently vulnerable. In the future, these islands will likely be inundated, placing additional areas of the shoreline increasingly at risk. Significant differences in vulnerability exist between stakeholders; the Breezy Point Cooperative and Gateway National Recreation Area had the largest erodible shoreline segments. Significant correlations exist for all vulnerability (exposure/surge) and storm damage combinations except for exposure and distance to artificial debris. Coastal protective features, ranging from storm surge barriers and levees to natural features (e.g. wetlands), have been promoted to decrease future flood risk to communities in coastal areas around the world. Our methods of combining coastal vulnerability results with additional data and across multiple time

  12. Design Vulnerability Assessments for Safeguards Sealing Systems

    SciTech Connect

    Brockman, Linda; Johnston, Roger; Kravtchenko, Victor; Undem, Halvor A.; Wishard, Bernard

    2010-08-11

    The International Atomic Energy Agency (the "Agency") engages in a rigorous equipment authorization process prior to deploying Safeguards instrumentation, including Safeguards sealing systems, for world-wide use. A positive result from a vulnerability assessment is one of the many requirements that must be met prior to instrumentation deployment. Given the long time period in the Safeguards instrumentation development cycle, the substantial Member State investments made, and the significant Agency staff time required, a negative result for the vulnerability assessment can result in the loss of time, considerable additional expense, or even the failure to deploy an instrument or sealing system at all. First suggested in 1998 by the General Physics Institute in Moscow, an approach that incorporates a design vulnerability assessment minimizes the risk of deployment failure by teaming a public sector vulnerability assessment team with the instrument or sealing system design team in order to identify, at the earliest possible design stage, inherent vulnerabilities. Involving the vulnerability assessors early and often in the design and development process avoids many of the problems inherent in evaluating security vulnerabilities only after the design is finalized. The disadvantages include increased costs and time to deployment. An improved pressure-sensitive adhesive label seal, called the "VOID-3 seal" was developed for the Agency using this design vulnerability assessment process.

  13. Infrastructure Vulnerability Assessment Model (I-VAM).

    PubMed

    Ezell, Barry Charles

    2007-06-01

    Quantifying vulnerability to critical infrastructure has not been adequately addressed in the literature. Thus, the purpose of this article is to present a model that quantifies vulnerability. Vulnerability is defined as a measure of system susceptibility to threat scenarios. This article asserts that vulnerability is a condition of the system and it can be quantified using the Infrastructure Vulnerability Assessment Model (I-VAM). The model is presented and then applied to a medium-sized clean water system. The model requires subject matter experts (SMEs) to establish value functions and weights, and to assess protection measures of the system. Simulation is used to account for uncertainty in measurement, aggregate expert assessment, and to yield a vulnerability (Omega) density function. Results demonstrate that I-VAM is useful to decisionmakers who prefer quantification to qualitative treatment of vulnerability. I-VAM can be used to quantify vulnerability to other infrastructures, supervisory control and data acquisition systems (SCADA), and distributed control systems (DCS). PMID:17640208

  14. Predicting Vulnerability Risks Using Software Characteristics

    ERIC Educational Resources Information Center

    Roumani, Yaman

    2012-01-01

    Software vulnerabilities have been regarded as one of the key reasons for computer security breaches that have resulted in billions of dollars in losses per year (Telang and Wattal 2005). With the growth of the software industry and the Internet, the number of vulnerability attacks and the ease with which an attack can be made have increased. From…

  15. Callahan's Vulnerability Thesis and "Dissatisfaction Theory."

    ERIC Educational Resources Information Center

    Iannaccone, Laurence

    1996-01-01

    In discussing school superintendent vulnerability, the paper addresses diverse meanings among scholars of Callahan's vulnerability thesis, highlighting other articles within this theme issue. The paper reflects on discussions of Callahan's "Education and the Cult of Efficacy" before its 1962 publication and investigates the relation between…

  16. Vulnerable Youth and Transitions to Adulthood

    ERIC Educational Resources Information Center

    Xie, Rongbing; Sen, Bisakha; Foster, E. Michael

    2014-01-01

    This chapter focuses on vulnerable youth, the challenges they face during their transitions to adulthood, and the adverse effects of limited support systems on those transitions. The authors offer recommendations on how adult educators can help facilitate smooth transitions into adulthood for vulnerable youth.

  17. Opportunistic Interruptions: Interactional Vulnerabilities Deriving from Linearization

    ERIC Educational Resources Information Center

    Gibson, David R.

    2005-01-01

    Speaking involves "linearizing" a message into a string of words. This process leaves us vulnerable to being interrupted in such a way that the aborted turn is a misrepresentation of the intended message. Further, because we linearize our messages in standard ways, we are recurrently vulnerable to interruptions at particular turn-construction…

  18. Issues in conducting research with vulnerable families.

    PubMed

    Demi, A S; Warren, N A

    1995-04-01

    This article explores methodological and ethical issues in the conduct of research with vulnerable families. Some methodological and ethical issues are common to all family research, regardless of the families' vulnerability; however, many research issues are more problematic in vulnerable families, and a few issues are relatively unique to vulnerable families. Vulnerable families are defined as families that are susceptible to harm because of their socioeconomic status, their minority status, or other stigmatizing status. Methodological issues include definition of family; recruitment and retention of participants; reliability and validity of instruments; and racism, classism, and sexism. Ethical issues include confidentiality, reporting abuse and neglect, conflict of research ethics and personal ethics, identifying problems nobody can fix, balancing demands and benefits, and interpretation of data. Examples of methodological and ethical issues are drawn from several research studies in which the primary author was or is currently involved.

  19. Amyotrophic lateral sclerosis: cell vulnerability or system vulnerability?

    PubMed Central

    Talbot, Kevin

    2014-01-01

    Amyotrophic lateral sclerosis (ALS) is a complex neurodegenerative disease with clinical, pathological and genetic overlap with frontotemporal dementia (FTD). No longer viewed as one disease with a single unified cause, ALS is now considered to be a clinicopathological syndrome resulting from a complex convergence of genetic susceptibility, age-related loss of cellular homeostasis, and possible environmental influences. The rapid increase in recent years of the number of genes in which mutations have been associated with ALS has led to in vitro and in vivo models that have generated a wealth of data indicating disruption of specific biochemical pathways and sub-cellular compartments. Data implicating pathways including protein misfolding, mRNA splicing, oxidative stress, proteosome and mitochondrial dysfunction in the pathogenesis of ALS reinforce a disease model based on selective age-dependent vulnerability of a specific population of cells. To the clinical neurologist, however, ALS presents as a disease of focal onset and contiguous spread. Characteristic regional patterns of involvement and progression suggest that the disease does not proceed randomly but via a restricted number of anatomical pathways. These clinical observations combined with electrophysiological and brain-imaging studies underpin the concept of ALS at the macroscopic level as a ‘system degeneration’. This dichotomy between cellular and systems neurobiology raises the fundamental questions of what initiates the disease process in a specific anatomical site and how the disease is propagated. Is the essence of ALS a cell-to-cell transmission of pathology with, for example, a ‘prion-like’ mechanism, or does the cellular pathology follow degeneration of specific synaptic networks? Elucidating the interaction between cellular degeneration and system level degeneration will aid modeling of the disease in the earliest phases, improve the development of sensitive markers of disease

  20. Vulnerability, Health Agency and Capability to Health.

    PubMed

    Straehle, Christine

    2016-01-01

    One of the defining features of the capability approach (CA) to health, as developed in Venkatapuram's book Health Justice, is its aim to enable individual health agency. Furthermore, the CA to health hopes to provide a strong guideline for assessing the health-enabling content of social and political conditions. In this article, I employ the recent literature on the liberal concept of vulnerability to assess the CA. I distinguish two kinds of vulnerability. Considering circumstantial vulnerability, I argue that liberal accounts of vulnerability concerned with individual autonomy, align with the CA to health. Individuals should, as far as possible, be able to make health-enabling decisions about their lives, and their capability to do so should certainly not be hindered by public policy. The CA to health and a vulnerability-based analysis then work alongside to define moral responsibilities and designate those who hold them. Both approaches demand social policy to address circumstances that hinder individuals from taking health-enabling decisions. A background condition of vulnerability, on the other hand, even though it hampers the capability for health, does not warrant the strong moral claim proposed by the CA to health to define health as a meta-capability that should guide social policy. Nothing in our designing social policy could change the challenge to health agency when we deal with background conditions of vulnerability.

  1. Vulnerability, Health Agency and Capability to Health.

    PubMed

    Straehle, Christine

    2016-01-01

    One of the defining features of the capability approach (CA) to health, as developed in Venkatapuram's book Health Justice, is its aim to enable individual health agency. Furthermore, the CA to health hopes to provide a strong guideline for assessing the health-enabling content of social and political conditions. In this article, I employ the recent literature on the liberal concept of vulnerability to assess the CA. I distinguish two kinds of vulnerability. Considering circumstantial vulnerability, I argue that liberal accounts of vulnerability concerned with individual autonomy, align with the CA to health. Individuals should, as far as possible, be able to make health-enabling decisions about their lives, and their capability to do so should certainly not be hindered by public policy. The CA to health and a vulnerability-based analysis then work alongside to define moral responsibilities and designate those who hold them. Both approaches demand social policy to address circumstances that hinder individuals from taking health-enabling decisions. A background condition of vulnerability, on the other hand, even though it hampers the capability for health, does not warrant the strong moral claim proposed by the CA to health to define health as a meta-capability that should guide social policy. Nothing in our designing social policy could change the challenge to health agency when we deal with background conditions of vulnerability. PMID:26686329

  2. Determining Vulnerability Importance in Environmental Impact Assessment

    SciTech Connect

    Toro, Javier; Duarte, Oscar; Requena, Ignacio; Zamorano, Montserrat

    2012-01-15

    The concept of vulnerability has been used to describe the susceptibility of physical, biotic, and social systems to harm or hazard. In this sense, it is a tool that reduces the uncertainties of Environmental Impact Assessment (EIA) since it does not depend exclusively on the value assessments of the evaluator, but rather is based on the environmental state indicators of the site where the projects or activities are being carried out. The concept of vulnerability thus reduces the possibility that evaluators will subjectively interpret results, and be influenced by outside interests and pressures during projects. However, up until now, EIA has been hindered by a lack of effective methods. This research study analyzes the concept of vulnerability, defines Vulnerability Importance and proposes its inclusion in qualitative EIA methodology. The method used to quantify Vulnerability Importance is based on a set of environmental factors and indicators that provide a comprehensive overview of the environmental state. The results obtained in Colombia highlight the usefulness and objectivity of this method since there is a direct relation between this value and the environmental state of the departments analyzed. - Research Highlights: Black-Right-Pointing-Pointer The concept of vulnerability could be considered defining Vulnerability Importance included in qualitative EIA methodology. Black-Right-Pointing-Pointer The use of the concept of environmental vulnerability could reduce the subjectivity of qualitative methods of EIA. Black-Right-Pointing-Pointer A method to quantify the Vulnerability Importance proposed provides a comprehensive overview of the environmental state. Black-Right-Pointing-Pointer Results in Colombia highlight the usefulness and objectivity of this method.

  3. Child development: vulnerability and resilience.

    PubMed

    Engle, P L; Castle, S; Menon, P

    1996-09-01

    Many of the challenges facing children now are a function of changing times, including increase in urbanization, political violence, changing family forms, and in some areas decreased supplies of adequate food. This review focuses particularly on those changes in which children are the victims and which induce new threats for them, rather than on problems such as child disability or mental illness. The outcome variables of interest in this paper are dimensions of children's psychosocial development, including cognitive development, psychological adjustment and aggression, whereas the companion paper in this issue (Caldwell P., Child survival: vulnerability and resilience in adversity in the European past and the contemporary Third World, Soc. Sci. Med.) [1] focuses on physical aspects of children's development. The risks that are hurdles in the process of development of a young child begin from conception and carry on into later life. To address them all would be impossible; thus, in order to do justice to the issues at hand, we have chosen those risks that, in our view, are important in a child's psychosocial development in developing countries. This paper will thus provide a discussion of the concepts of risk and resilience, then apply these concepts to the analysis of three examples of risk faced by children today: nutritional threats (e.g. malnutrition due to decline in breastfeeding); family dynamics and types of family forms (e.g. child fostering and non-traditional families); and experiences of violence (domestic or political). In each case, the same four questions will be addressed: what are the consequences of the risk factor for children, what are the etiologies and conditions of risk, are there any children who seem to cope with the risk factor successfully and what are some of the protective factors, and what interventions or programs would help support these children?

  4. Extinction vulnerability of coral reef fishes.

    PubMed

    Graham, Nicholas A J; Chabanet, Pascale; Evans, Richard D; Jennings, Simon; Letourneur, Yves; Aaron Macneil, M; McClanahan, Tim R; Ohman, Marcus C; Polunin, Nicholas V C; Wilson, Shaun K

    2011-04-01

    With rapidly increasing rates of contemporary extinction, predicting extinction vulnerability and identifying how multiple stressors drive non-random species loss have become key challenges in ecology. These assessments are crucial for avoiding the loss of key functional groups that sustain ecosystem processes and services. We developed a novel predictive framework of species extinction vulnerability and applied it to coral reef fishes. Although relatively few coral reef fishes are at risk of global extinction from climate disturbances, a negative convex relationship between fish species locally vulnerable to climate change vs. fisheries exploitation indicates that the entire community is vulnerable on the many reefs where both stressors co-occur. Fishes involved in maintaining key ecosystem functions are more at risk from fishing than climate disturbances. This finding is encouraging as local and regional commitment to fisheries management action can maintain reef ecosystem functions pending progress towards the more complex global problem of stabilizing the climate.

  5. Global health, vulnerable populations, and law.

    PubMed

    Benatar, Solomon R

    2013-01-01

    Given the fragility of individual and population wellbeing in an interdependent world threatened by many overlapping crises, the suggestion is made that new legal mechanisms have the robust potential to reduce human vulnerability locally and globally. PMID:23581656

  6. Housing concerns of vulnerable older Canadians.

    PubMed

    Weeks, Lori E; LeBlanc, Kristal

    2010-09-01

    Preparing for the future housing needs of older adults is imperative in countries with an aging population, but little is known about these issues among vulnerable older adults. This study used a qualitative approach to identify key housing concerns in this group. A total of 84 vulnerable older adults including Aboriginal elders, those with various disabilities, and ethnic minorities participated in 10 focus groups. The Canadian Mortgage and Housing Corporation's (CMHC's) standards of core housing need provided a framework for data analysis, along with the identification of additional key housing themes across and within groups of vulnerable older adults. The results provide insight into preferred housing characteristics, regardless of housing form. Additionally, the results provide insight into how to support vulnerable older adults who choose to remain in their homes and communities and how to help ensure that appropriate housing is developed that meets the needs of this diverse population. PMID:20712917

  7. Salt vulnerability assessment methodology for urban streams

    NASA Astrophysics Data System (ADS)

    Betts, A. R.; Gharabaghi, B.; McBean, E. A.

    2014-09-01

    De-icing agents such as road salts while used for winter road maintenance can cause negative effects on urban stream water quality and drinking water supplies. A new methodology using readily available spatial data to identify Salt Vulnerable Areas (SVAs) for urban streams is used to prioritize implementation of best management practices. The methodology calculates the probable chloride concentration statistics at specified points in the urban stream network and compares the results with known aquatic species exposure tolerance limits to characterize the vulnerability scores. The approach prioritizes implementation of best management practices to areas identified as vulnerable to road salt. The vulnerability assessment is performed on seven sites in four watersheds in the Greater Toronto Area and validated using the Hanlon Creek watershed in Guelph. The mean annual in-stream chloride concentration equation uses readily available spatial data - with province-wide coverage - that can be easily used in any urban watershed.

  8. [Aged woman's vulnerability related to AIDS].

    PubMed

    Silva, Carla Marins; Lopes, Fernanda Maria do Valle Martins; Vargens, Octavio Muniz da Costa

    2010-09-01

    This article is a systhematic literature review including the period from 1994 to 2009, whose objective was to discuss the aged woman's vulnerability in relation to Acquired Imunodeficiency Syndrome (Aids). The search for scientific texts was accomplished in the following databases: Biblioteca Virtual em Saúde, Scientific Eletronic Library Online (SciELO), Literatura Latino-Americana e do Caribe em Ciências da Saúde (LILACS) and Medical Literature Analysis and Retrieval System Online (MEDLINE). The descriptors used were vulnerability, woman and Aids. Eighteen texts were analyzed, including articles in scientific journals, thesis and dissertations. As a conclusion, it was noted that aged women and vulnerability to Aids are directly related, through gender characteristics including submission and that were built historical and socially. We consider as fundamental the development of studies which may generate publications accessible to women, in order to help them see themselves as persons vulnerable to Aids contagion just for being women.

  9. Camana, Peru, and Tsunami Vulnerability

    NASA Technical Reports Server (NTRS)

    2002-01-01

    A tsunami washed over the low-lying coastal resort region near Camana, southern Peru, following a strong earthquake on June 23, 2001. The earthquake was one of the most powerful of the last 35 years and had a magnitude of 8.4. After the initial quake, coastal residents witnessed a sudden drawdown of the ocean and knew a tsunami was imminent. They had less than 20 minutes to reach higher ground before the tsunami hit. Waves as high as 8 m came in four destructive surges reaching as far as 1.2 km inland. The dashed line marks the approximate area of tsunami inundation. Thousands of buildings were destroyed, and the combined earthquake and tsunami killed as many as 139 people. This image (ISS004-ESC-6128) was taken by astronauts onboard the International Space Station on 10 January 2002. It shows some of the reasons that the Camana area was so vulnerable to tsunami damage. The area has a 1 km band of coastal plain that is less than 5 m in elevation. Much of the plain can be seen by the bright green fields of irrigated agriculture that contrast with the light-colored desert high ground. Many of the tsunami-related deaths were workers in the onion fields in the coastal plain that were unwilling to leave their jobs before the end of the shift. A number of lives were spared because the tsunami occurred during the resort off-season, during the daylight when people could see the ocean drawdown, and during one of the lowest tides of the year. Information on the Tsunami that hit Camana can be found in a reports on the visit by the International Tsunami Survey Team and the USC Tsunami Research Lab. Earthquake Epicenter, Peru shows another image of the area. Image provided by the Earth Sciences and Image Analysis Laboratory at Johnson Space Center. Additional images taken by astronauts and cosmonauts can be viewed at the NASA-JSC Gateway to Astronaut Photography of Earth.

  10. Physical and economic vulnerability considering alpine hazards

    NASA Astrophysics Data System (ADS)

    Totschnig, Reinhold; Keiler, Margreth; Glade, Thomas

    2010-05-01

    The obvious increase in natural disasters in the last decades, evoked by different circumstances, emphasises the necessity of dealing with these natural hazards and correlated risks. Independent of the scientific discipline, vulnerability assessment is thereby seen as a central part within risk assessment. However, the ways in which vulnerability is understood, are manifold. Based on a theoretical framework developed within the MOVE-project (Methods for the Improvement of Vulnerability Assessment in Europe), vulnerability comprises of three factors: exposure, susceptibility or fragility, and lack of resilience. To follow a multidisciplinary approach, different dimensions of susceptibility and fragility such as the physical, the social and the ecological dimensions (among others) should be considered in vulnerability assessment. Comprehensive methods and corresponding indicators (qualitative as well as quantitative) have not yet been fully developed. The aim of the MOVE-project is to close this gap, dealing with a wide range of natural hazards. The individual partner institutions within this project work in different scientific fields, dealing with different natural hazards and different vulnerability factors. The present study has its focus on alpine hazards, using data from several test sites in South Tyrol, Italy. Alpine hazards such as avalanches, landslides as well as permafrost hazards are covered. Different methods and indicators related to exposure and the physical and economic dimensions of susceptibility were studied and enhanced. Applied GIS data were improved through field studies and tools such as simulation models and data mining methods. The aim of this study was to develop vulnerability curves on a local scale and vulnerability maps on a regional scale with a high utility value for possible end users. First results, methods and indicators as well as their application will critically be discussed.

  11. Application of PRA to HEMP vulnerability analysis

    SciTech Connect

    Mensing, R.W.

    1985-09-01

    Vulnerability analyses of large systems, e.g., control and communication centers, aircraft, ships, are subject to many uncertainties. A basic source of uncertainty is the random variation inherent in the physical world. Thus, vulnerability is appropriately described by an estimate of the probability of survival (or failure). A second source of uncertainty that also needs to be recognized is the uncertainty associated with the analysis or estimation process itself. This uncertainty, often called modeling uncertainty, has many contributors. There are the approximations introduced by using mathematical models to describe reality. Also, the appropriate values of the model parameters are derived from several sources, e.g., based on experimental or test data, based on expert judgment and opinion. In any case, these values are subject to uncertainty. This uncertainty must be considered in the description of vulnerability. Thus, the estimate of the probability of survival is not a single value but a range of values. Probabilistic risk analysis (PRA) is a methodology which deals with these uncertainty issues. This report discusses the application of PRA to HEMP vulnerability analyses. Vulnerability analysis and PRA are briefly outlined and the need to distinguish between random variation and modeling uncertainty is discussed. Then a sequence of steps appropriate for applying PRA to vulnerability problems is outlined. Finally, methods for handling modeling uncertainty are identified and discussed.

  12. Global Distributions of Vulnerability to Climate Change

    SciTech Connect

    Yohe, Gary; Malone, Elizabeth L.; Brenkert, Antoinette L.; Schlesinger, Michael; Meij, Henk; Xiaoshi, Xing

    2006-12-01

    Signatories of the United Nations Framework Convention on Climate Change (UNFCCC) have committed themselves to addressing the “specific needs and special circumstances of developing country parties, especially those that are particularly vulnerable to the adverse effects of climate change”.1 The Intergovernmental Panel on Climate Change (IPCC) has since concluded with high confidence that “developing countries will be more vulnerable to climate change than developed countries”.2 In their most recent report, however, the IPCC notes that “current knowledge of adaptation and adaptive capacity is insufficient for reliable prediction of adaptations” 3 because “the capacity to adapt varies considerably among regions, countries and socioeconomic groups and will vary over time”.4 Here, we respond to the apparent contradiction in these two statements by exploring how variation in adaptive capacity and climate impacts combine to influence the global distribution of vulnerability. We find that all countries will be vulnerable to climate change, even if their adaptive capacities are enhanced. Developing nations are most vulnerable to modest climate change. Reducing greenhouse-gas emissions would diminish their vulnerabilities significantly. Developed countries would benefit most from mitigation for moderate climate change. Extreme climate change overwhelms the abilities of all countries to adapt. These findings should inform both ongoing negotiations for the next commitment period of the Kyoto Protocol and emerging plans for implementing UNFCCC-sponsored adaptation funds.

  13. Protecting and respecting the vulnerable: existing regulations or further protections?

    PubMed

    Solomon, Stephanie R

    2013-02-01

    Scholars and policymakers continue to struggle over the meaning of the word "vulnerable" in the context of research ethics. One major reason for the stymied discussions regarding vulnerable populations is that there is no clear distinction between accounts of research vulnerabilities that exist for certain populations and discussions of research vulnerabilities that require special regulations in the context of research ethics policies. I suggest an analytic process by which to ascertain whether particular vulnerable populations should be contenders for additional regulatory protections. I apply this process to two vulnerable populations: the cognitively vulnerable and the economically vulnerable. I conclude that a subset of the cognitively vulnerable require extra protections while the economically vulnerable should be protected by implementing existing regulations more appropriately and rigorously. Unless or until the informed consent process is more adequately implemented and the distributive justice requirement of the Belmont Report is emphasized and operationalized, the economically disadvantaged will remain particularly vulnerable to the harm of exploitation in research.

  14. Drought vulnerability assesssment and mapping in Morocco

    NASA Astrophysics Data System (ADS)

    Imani, Yasmina; Lahlou, Ouiam; Bennasser Alaoui, Si; Naumann, Gustavo; Barbosa, Paulo; Vogt, Juergen

    2014-05-01

    Drought vulnerability assessment and mapping in Morocco Authors: Yasmina Imani 1, Ouiam Lahlou 1, Si Bennasser Alaoui 1 Paulo Barbosa 2, Jurgen Vogt 2, Gustavo Naumann 2 1: Institut Agronomique et Vétérinaire Hassan II (IAV Hassan II), Rabat Morocco. 2: European Commission, Joint Research Centre (JRC), Institute for Environment and Sustainability (IES), Ispra, Italy. In Morocco, nearly 50% of the population lives in rural areas. They are mostly small subsistent farmers whose production depends almost entirely on rainfall. They are therefore very sensitive to drought episodes that may dramatically affect their incomes. Although, as a consequence of the increasing frequency, length and severity of drought episodes in the late 90's, the Moroccan government decided, to move on from a crisis to a risk management approach, drought management remains in practice mainly reactive and often ineffective. The lack of effectiveness of public policy is in part a consequence of the poor understanding of drought vulnerability at the rural community level, which prevents the development of efficient mitigation actions and adaptation strategies, tailored to the needs and specificities of each rural community. Thus, the aim of this study is to assess and map drought vulnerability at the rural commune level in the Oum Er-Rbia basin which is a very heterogeneous basin, showing a big variability of climates, landscapes, cropping systems and social habits. Agricultural data collected from the provincial and local administrations of Agriculture and socio-economic data from the National Department of Statistics were used to compute a composite vulnerability index (DVI) integrating four different components: (i) the renewable natural capacity, (ii) the economic capacity, (iii) human and civic resources, and (iv) infrastructure and technology. The drought vulnerability maps that were derived from the computation of the DVI shows that except very specific areas, most of the Oum er Rbia

  15. Vulnerability synthetic indices: a literature integrative review.

    PubMed

    Schumann, Lívia Rejane Miguel Amaral; Schumann, Lívia Amaral; Moura, Leides Baroso Azevedo

    2015-07-01

    The concept of vulnerability is delimited by dynamic social and multigenerational processes involving at least three dimensions: exposure to risk trajectories, internal and external capabilities of reaction and possibilities of adaptation based on both the intensity of risk and the resilience of people. In order to identify and describe the synthetic indices of vulnerability, there was an integrative literature review. We consulted free access articles indexed in the following databases: BioMed, Bireme, PubMed, Reldalyc, SciELO and Web of Science; and we used controlled descriptors in English and Portuguese for all time slots available with selection and analysis of 47 studies that reported results of 23 synthetic indices of vulnerability. The results showed that the synthetic indices of vulnerability address four themes: social determinants of health; environmental and climatic conditions; family and course of life; territories and specific geographic areas. It was concluded that the definition of the components and indicators, as well as the methodologies adopted for the construction of synthetic indices need to be evaluated by means of the limitations and advantages of reporting the vulnerability through summary measures in policy formulation and decision-making aimed at human development. PMID:26132249

  16. Cyber/Physical Security Vulnerability Assessment Integration

    SciTech Connect

    MacDonald, Douglas G.; Clements, Samuel L.; Patrick, Scott W.; Perkins, Casey J.; Muller, George; Lancaster, Mary J.; Hutton, William J.

    2013-02-28

    Securing high value and critical assets is one of the biggest challenges facing this nation and others around the world. In modern integrated systems, there are four potential modes of attack available to an adversary: • physical only attack, • cyber only attack, • physical-enabled cyber attack, • cyber-enabled physical attack. Blended attacks involve an adversary working in one domain to reduce system effectiveness in another domain. This enables the attacker to penetrate further into the overall layered defenses. Existing vulnerability assessment (VA) processes and software tools which predict facility vulnerabilities typically evaluate the physical and cyber domains separately. Vulnerabilities which result from the integration of cyber-physical control systems are not well characterized and are often overlooked by existing assessment approaches. In this paper, we modified modification of the timely detection methodology, used for decades in physical security VAs, to include cyber components. The Physical and Cyber Risk Analysis Tool (PACRAT) prototype illustrates an integrated vulnerability assessment that includes cyber-physical interdependencies. Information about facility layout, network topology, and emplaced safeguards is used to evaluate how well suited a facility is to detect, delay, and respond to attacks, to identify the pathways most vulnerable to attack, and to evaluate how often safeguards are compromised for a given threat or adversary type. We have tested the PACRAT prototype on critical infrastructure facilities and the results are promising. Future work includes extending the model to prescribe the recommended security improvements via an automated cost-benefit analysis.

  17. Vulnerabilities in snakebites in Sao Paulo, Brazil

    PubMed Central

    Bertolozzi, Maria Rita; Scatena, Camila Morato da Conceição; França, Francisco Oscar de Siqueira

    2015-01-01

    ABSTRACT OBJECTIVE To describe elements of vulnerability of victims of snakebite. METHODS This qualitative, descriptive, cross-sectional study had, as theoretical framework, the concept of vulnerability in individual, social, and programmatic dimensions. We interviewed 21 patients admitted into a hospital specialized in the care of accidents caused by venomous animals. The interviews were analyzed according to a discourse analysis technique. RESULTS Patients were mainly young men, living in remote countryside areas, where health services frequently have limited resources. We found social and individual conditions of vulnerability, such as precarious schooling, low professional qualification, housing without access to piped water, no sewage treated, and no regular garbage collection, and lack of knowledge on this health problem. Regarding the programmatic dimension, we found limited accessibility to the health services that could affect the prognosis and the frequency of sequelae and deaths. CONCLUSIONS Considering such vulnerabilities evoke the need to improve the program for control the Accidents by Venomous Animals and the training of health workers, we highlight the potential use of the concept of vulnerability, which may amplify the understanding and the recommendations for the practice and education related to snakebites. PMID:26603351

  18. Mapping Regional Drought Vulnerability: a Case Study

    NASA Astrophysics Data System (ADS)

    Karamouz, M.; Zeynolabedin, A.; Olyaei, M. A.

    2015-12-01

    Drought is among the natural disaster that causes damages and affects many people's life in many part of the world including in Iran. Recently, some factors such as climate variability and the impact of climate change have influenced drought frequency and intensity in many parts of the world. Drought can be divided into four categories of meteorological, hydrological, agricultural and social-economic. In meteorological the important feature is lack of rainfall. In hydrological drought river flows and dam storage are considered. Lack of soil moisture is the key factor in agricultural droughts while in social-economic type of drought the relation between supply and demand and social-economic damages due to water deficiency is studied. While the first three types relates to the lack of some hydrological characteristics, social-economic type of drought is actually the consequence of other types expressed in monetary values. Many indices are used in assessing drought; each has its own advantages and disadvantages and can be used for specific types of drought. Therefore knowing the types of drought can provide a better understanding of shortages and their characteristics. Drought vulnerability is a concept which shows the likelihood of damages from hazard in a particular place by focusing on the system status prior to the disaster. Drought vulnerability has been viewed as a potential for losses in the region due to water deficiency at the time of drought. In this study the application of vulnerability concept in drought management in East Azarbaijan province in Iran is investigated by providing vulnerability maps which demonstrates spatial characteristics of drought vulnerability. In the first step, certain governing parameters in drought analysis such as precipitation, temperature, land use, topography, solar radiation and ground water elevation have been investigated in the region. They are described in details and calculated in suitable time series. Vulnerabilities

  19. Creativity and psychopathology: a shared vulnerability model.

    PubMed

    Carson, Shelley H

    2011-03-01

    Creativity is considered a positive personal trait. However, highly creative people have demonstrated elevated risk for certain forms of psychopathology, including mood disorders, schizophrenia spectrum disorders, and alcoholism. A model of shared vulnerability explains the relation between creativity and psychopathology. This model, supported by recent findings from neuroscience and molecular genetics, suggests that the biological determinants conferring risk for psychopathology interact with protective cognitive factors to enhance creative ideation. Elements of shared vulnerability include cognitive disinhibition (which allows more stimuli into conscious awareness), an attentional style driven by novelty salience, and neural hyperconnectivity that may increase associations among disparate stimuli. These vulnerabilities interact with superior meta-cognitive protective factors, such as high IQ, increased working memory capacity, and enhanced cognitive flexibility, to enlarge the range and depth of stimuli available in conscious awareness to be manipulated and combined to form novel and original ideas.

  20. Regional tsunami vulnerability analysis through ASTER imagery

    NASA Astrophysics Data System (ADS)

    Dall'Osso, Filippo; Cavalletti, Alessandra; Immordino, Francesco; Gonella, Marco

    2010-05-01

    Analysis of vulnerability to natural hazards is a key issue of prevention measures within ICZM. Knowledge of susceptibility to damage and how this is distributed along the coast allows to optimize possible prevention and mitigation actions. The present study focuses on tsunami vulnerability of a large extension of coastline: the entire westerly Thailand's coast. The work is a follow up of the CRATER project (Coastal Risk Analysis for Tsunamis and Environmental Remediation) carried out on the aftermath of the 26th December 2004 Tsunami event. Vulnerability is analyzed considering an inundation scenario given by a tsunami of seismic origin, causing a maximum run-up of 25m.. An innovative methodology have been here developed and applied, based on the combined use of ASTER (Advanced Spaceborn Thermal Emission and Reflection Radiometer) satellite imagery, SRTM v-3 (Shuttle Radar Topography Mission - version #3) DEMs and GIS. Vulnerability level has been calculated combining information on coastal geomorphology, land use, topography and distance from the shoreline. Land use has been extrapolated from ASTER images through a multi-spectral analysis (a pixel-based and supervised classification process) of ASTER bands 1 to 9, plus one band for the NDVI index (Normalized Difference Vegetation Index). Coastal geomorphology has been obtained through a photo-interpretation process. Results have been organized in a set of vectorial vulnerability maps with horizontal resolution of 90m. The proposed methodology has the great advantage of being repeatable for any case of vulnerability analysis at small-medium scale (i.e. at Regional/National level) with a moderate investment in term of costs and human resources.

  1. Climate challenges, vulnerabilities, and food security.

    PubMed

    Nelson, Margaret C; Ingram, Scott E; Dugmore, Andrew J; Streeter, Richard; Peeples, Matthew A; McGovern, Thomas H; Hegmon, Michelle; Arneborg, Jette; Kintigh, Keith W; Brewington, Seth; Spielmann, Katherine A; Simpson, Ian A; Strawhacker, Colleen; Comeau, Laura E L; Torvinen, Andrea; Madsen, Christian K; Hambrecht, George; Smiarowski, Konrad

    2016-01-12

    This paper identifies rare climate challenges in the long-term history of seven areas, three in the subpolar North Atlantic Islands and four in the arid-to-semiarid deserts of the US Southwest. For each case, the vulnerability to food shortage before the climate challenge is quantified based on eight variables encompassing both environmental and social domains. These data are used to evaluate the relationship between the "weight" of vulnerability before a climate challenge and the nature of social change and food security following a challenge. The outcome of this work is directly applicable to debates about disaster management policy.

  2. Climate challenges, vulnerabilities, and food security.

    PubMed

    Nelson, Margaret C; Ingram, Scott E; Dugmore, Andrew J; Streeter, Richard; Peeples, Matthew A; McGovern, Thomas H; Hegmon, Michelle; Arneborg, Jette; Kintigh, Keith W; Brewington, Seth; Spielmann, Katherine A; Simpson, Ian A; Strawhacker, Colleen; Comeau, Laura E L; Torvinen, Andrea; Madsen, Christian K; Hambrecht, George; Smiarowski, Konrad

    2016-01-12

    This paper identifies rare climate challenges in the long-term history of seven areas, three in the subpolar North Atlantic Islands and four in the arid-to-semiarid deserts of the US Southwest. For each case, the vulnerability to food shortage before the climate challenge is quantified based on eight variables encompassing both environmental and social domains. These data are used to evaluate the relationship between the "weight" of vulnerability before a climate challenge and the nature of social change and food security following a challenge. The outcome of this work is directly applicable to debates about disaster management policy. PMID:26712017

  3. Microbiological Food Safety for Vulnerable People

    PubMed Central

    Lund, Barbara M.

    2015-01-01

    Foodborne pathogens are more likely to cause infection and to result in serious consequences in vulnerable people than in healthy adults. People with some increase in susceptibility may form nearly 20% of the population in the UK and the USA. Conditions leading to increased susceptibility are listed. The main factors leading to foodborne disease caused by major pathogens are outlined and examples are given of outbreaks resulting from these factors. Measures to prevent foodborne disease include procedures based on Hazard Analysis Critical Control Point principles and prerequisite programmes and, especially for vulnerable people, the use of lower-risk foods in place of higher-risk products. PMID:26308030

  4. Climate challenges, vulnerabilities, and food security

    PubMed Central

    Nelson, Margaret C.; Ingram, Scott E.; Dugmore, Andrew J.; Streeter, Richard; Peeples, Matthew A.; McGovern, Thomas H.; Hegmon, Michelle; Arneborg, Jette; Brewington, Seth; Spielmann, Katherine A.; Simpson, Ian A.; Strawhacker, Colleen; Comeau, Laura E. L.; Torvinen, Andrea; Madsen, Christian K.; Hambrecht, George; Smiarowski, Konrad

    2016-01-01

    This paper identifies rare climate challenges in the long-term history of seven areas, three in the subpolar North Atlantic Islands and four in the arid-to-semiarid deserts of the US Southwest. For each case, the vulnerability to food shortage before the climate challenge is quantified based on eight variables encompassing both environmental and social domains. These data are used to evaluate the relationship between the “weight” of vulnerability before a climate challenge and the nature of social change and food security following a challenge. The outcome of this work is directly applicable to debates about disaster management policy. PMID:26712017

  5. The earthquake vulnerability of a utility system

    SciTech Connect

    Burhenn, T.A.; Hawkins, H.G.; Ostrom, D.K.; Richau, E.M. )

    1992-01-01

    This paper describes a method to assess the earthquake vulnerability of a utility system and presents an example application. First, the seismic hazard of the system is modeled. Next, the damage and operational disruption to the facilities are estimated. The approach described herein formulates the problem so that the best documented and judgmental information on the earthquake performance of a utility's components can be utilized. finally, the activities and estimates of the time necessary to restore the system to different levels of service are developed. This method of analysis provides a realistic picture of the resiliency of utility service, not just vulnerabilities of various types of equipment.

  6. Assessment of Chemical and Radiological Vulnerabilities

    SciTech Connect

    SETH, S.S.

    2000-05-17

    Following the May 14, 1997 chemical explosion at Hanford's Plutonium Reclamation Facility, the Department of Energy Richland Operations Office and its prime contractor, Fluor Hanford, Inc., completed an extensive assessment to identify and address chemical and radiological safety vulnerabilities at all facilities under the Project Hanford Management Contract. This was a challenging undertaking because of the immense size of the problem, unique technical issues, and competing priorities. This paper focuses on the assessment process, including the criteria and methodology for data collection, evaluation, and risk-based scoring. It does not provide details on the facility-specific results and corrective actions, but discusses the approach taken to address the identified vulnerabilities.

  7. [Concepts of vulnerability of psychiatric diseases].

    PubMed

    Stamm, R; Bühler, K E

    2001-07-01

    Despite intensive research in recent decades, the search for the aetiopathogenesis of psychiatric diseases is just as relevant as ever. In recent years, ideas of the aetiopathogenesis of psychotic diseases based on the concept of "vulnerability" in its diverse variations and developments have been gained increasingly ground. The publications of Zubin and associates above all have contributed to a "vulnerability model". According to this descriptive model, schizophrenic disturbances develop as a result of stimuli/irritants or stress factors under modulation of the social and physical environment as well as dependent on the premorbid personality. The increased vulnerability which gives rise to this is perceived as a threshold descensus of the individual towards stimuli/irritants (with a deficit counter--irritants impulses). Apart from that, multi-causality of vulnerability is assumed as the starting point, whereby there is the possibility of several therapy approaches. Moreover, contrary to the prevailing pessimistic view that schizophrenia is a process-type progressive disease, an episodic nature of schizophrenic psychoses is postulated with a prognosis that is indeed positive in the long term. In recent years, although often not explicitly stated, Zubin's concept of vulnerability was also indubitably subjected to various further developments (the vulnerability stress model by Nuechterlein and associates as also the integrative psycho-biological schizophrenia model by Ciompi may serve as examples). Worth mentioning are also various new concepts from system sciences (such as those from cybernetics, synergetics, the chaos theory, the communication theory, structure determinism etc.), which endeavour to clarify the problem of psychosis. The evaluation of central neurophysiological function deviations with schizophrenics and their relations has so far been oriented above all towards the vulnerability model of Zubin and Nuechterlein, which differentiates temporarily

  8. Climate vulnerability of drinking water supplies

    NASA Astrophysics Data System (ADS)

    Selmeczi, Pál; Homolya, Emese; Rotárné Szalkai, Ágnes

    2016-04-01

    Extreme weather conditions in Hungary led to difficulties in drinking water management on diverse occasions in the past. Due to reduced water resources and the coexisting high demand for drinking water in dry summer periods the availability of a number of water supplies became insufficient therefore causing limitations in water access. In some other cases, as a result of floods and flash floods over karstic areas evolving in consequence of excessive precipitation, several water supplies had to be excluded in order to avoid the risk of infections. More frequent occurrence of extreme weather conditions and further possible changes in the future induce the necessity for an analysis of the vulnerability of drinking water resources to climate change. Since 95% of the total drinking water supply in Hungary originates from subsurface layers, significance of groundwater resources is outstanding. The aim of our work carried out in the frames of the NAGiS (National Adaptation Geo-information System) project was to build up a methodology for the study and determination of the vulnerability of drinking water supplies to climate. The task covered analyses of climatic parameters influencing drinking water supplies principally and hydrogeological characteristics of the geological media that significantly determines vulnerability. Effects on drinking water resources and their reduction or exclusion may imply societal and economic consequences therefore we extended the analyses to the investigation of possibilities concerning the adaptation capacity to changed conditions. We applied the CIVAS (Climate Impact and Vulnerability Assessment Scheme) model developed in the frames of the international climate research project CLAVIER (Climate Change and Variability: Impact on Central and Eastern Europe) to characterize climate vulnerability of drinking water supplies. The CIVAS model, being based on the combined evaluation of exposure, sensitivity and adaptability, provides a unified

  9. REGIONAL VULNERABILITY ASSESSMENT: A CONCEPTUAL APPROACH

    EPA Science Inventory

    EPA's Regional Vulnerability Assessment (REVA) project is developing and testing an approach to conducting comparative ecological risk assessments at the regional scale. I't seeks an objective and quantifiable answer to answer the question, "What are the greatest threaten accompa...

  10. Interrogation and false confessions: vulnerability factors.

    PubMed

    Gudjonsson, G H

    This paper reviews the psychological factors that make some individuals susceptible to making a false confession of having committed a criminal offence. A number of 'vulnerability factors' are highlighted and it is emphasized that these need to be interpreted within the context of all circumstances surrounding the case. PMID:1591561

  11. Vulnerability to Climate Change in Rural Nicaragua

    NASA Astrophysics Data System (ADS)

    Byrne, T. R.; Townshend, I.; Byrne, J. M.; McDaniel, S. A.

    2013-12-01

    While there is a growing recognition of the impact that climate change may have on human development, there has been a shift in focus from an impacts-led assessment approach towards a vulnerability-led assessment approach. This research operationalizes the IPCC's definition of vulnerability in a sub-national assessment to understand how different factors that shape vulnerability to climate change vary spatially across rural Nicaragua. The research utilizes the Food and Agriculture Organization of the United Nations' (FAO UN) CropWat model to evaluate how the annual yield of two of Nicaragua's staple crops may change under projected changes in temperature and precipitation. This analysis of agricultural sensitivity under exposure to climate change is then overlain with an indicator-based assessment of adaptive capacity in rural Nicaraguan farming households. Adaptive capacity was evaluated using household survey data from the 2001 National Household Survey on Living Standards Measurement, which was provided to us by the FAO UN. The result is a map representing current vulnerability to future climate change, and can serve as a basis for targeting policy interventions in rural Nicaragua.

  12. Educational and Vocational Exploration in Vulnerable Youth

    ERIC Educational Resources Information Center

    Taylor, Sarah

    2011-01-01

    Though numerous studies indicate that youth and young adults who are involved in one or more social service systems have poor educational and employment outcomes, little is known about the pathways to employment and education in this population. In this qualitative study of educational and employment exploration in vulnerable youth, 11 individuals…

  13. Criminal injuries compensation: Protecting vulnerable applicants.

    PubMed

    Guthrie, Robert

    2015-09-01

    Each year large numbers of persons sustain injury as a consequence of criminal behaviour. All Australian jurisdictions provide State-funded compensation to those harmed in this way. In the case of vulnerable applicants, the Assessor must consider not simply the appropriate and fair amount of compensation, but also how a person will be affected by the payment of compensation. Often a vulnerable applicant will apply through a guardian or a public trustee, although many apply in person. This article examines the use of legislative provisions, rules, regulations and practices in the various Australian jurisdictions in relation to how vulnerable applicants may be protected and supported once an award of compensation is made in their favour. Most jurisdictions provide for a mechanism by which compensation may be held in trust where the Assessor considers that the applicant may be unable to manage his or her financial affairs in his or her best interests. This article explores what factors are taken into account by Assessors in the absence of and pursuant to legislative directions. It considers how the approach may vary across jurisdictions and creative approaches to financial protection of vulnerable applicants.

  14. Defining and Measuring Vulnerability in Young People.

    PubMed

    Arora, Shilpa Khanna; Shah, Dheeraj; Chaturvedi, Sanjay; Gupta, Piyush

    2015-01-01

    Adolescents and youth, together addressed as "young people", form the future building blocks of any society. They being most energetic and dynamic, tend to get involved in high-risk behaviors making themselves susceptible to criminal offences, accidents, physical injuries, emotional trauma, and medical problems - some of them extremely serious like transmission of human immunodeficiency virus (HIV). The concept of vulnerability is applicable to all the people who are more exposed to risks than their peers like the young people. In order to deal with social evils like criminal offences, domestic violence, sexual abuse, HIV, etc. we need to define vulnerability and understand the factors that influence it. This review also attempts to summarize the indicators of vulnerability and the data currently available to estimate its burden in India. Measuring the magnitude of vulnerability by means of certain indicators/variables might help us in devising tools to assess this poorly defined entity. This may also evolve a conceptual framework on which targeted remedial interventions can be devised and implemented. PMID:26170545

  15. Evaluating Youth Work with Vulnerable Young People.

    ERIC Educational Resources Information Center

    Furlong, Andy; Cartmel, Fred; Powney, Janet; Hall, Stuart

    This report presents the results of an 18-month research project that studied the effectiveness of youth work with vulnerable young people. The research, representing six distinct geographical areas of Scotland characterized by disadvantage, focused on young people aged 13 to 16. In each neighborhood, the project examined the experiences of young…

  16. U.S. vulnerable to major hurricane

    NASA Astrophysics Data System (ADS)

    Bell, Peter M.

    The nation is ‘in the most vulnerable position in history’ should a major hurricane strike this year, according to James P. Walsh, acting NOAA Administrator.He warned that mushrooming coastal populations, public inexperience and apathy, and limited evacuation routes could combine to create a major catastrophe.

  17. Perceived Vulnerability to Disease Predicts Environmental Attitudes

    ERIC Educational Resources Information Center

    Prokop, Pavol; Kubiatko, Milan

    2014-01-01

    Investigating predictors of environmental attitudes may bring valuable benefits in terms of improving public awareness about biodiversity degradation and increased pro-environmental behaviour. Here we used an evolutionary approach to study environmental attitudes based on disease-threat model. We hypothesized that people vulnerable to diseases may…

  18. Configuration Fuzzing for Software Vulnerability Detection

    PubMed Central

    Dai, Huning; Murphy, Christian; Kaiser, Gail

    2010-01-01

    Many software security vulnerabilities only reveal themselves under certain conditions, i.e., particular configurations of the software together with its particular runtime environment. One approach to detecting these vulnerabilities is fuzz testing, which feeds a range of randomly modified inputs to a software application while monitoring it for failures. However, typical fuzz testing makes no guarantees regarding the syntactic and semantic validity of the input, or of how much of the input space will be explored. To address these problems, in this paper we present a new testing methodology called configuration fuzzing. Configuration fuzzing is a technique whereby the configuration of the running application is randomly modified at certain execution points, in order to check for vulnerabilities that only arise in certain conditions. As the application runs in the deployment environment, this testing technique continuously fuzzes the configuration and checks “security invariants” that, if violated, indicate a vulnerability; however, the fuzzing is performed in a duplicated copy of the original process, so that it does not affect the state of the running application. In addition to discussing the approach and describing a prototype framework for implementation, we also present the results of a case study to demonstrate the approach’s efficiency. PMID:21461049

  19. Retrieval from Memory: Vulnerable or Inviolable?

    ERIC Educational Resources Information Center

    Jones, Dylan M.; Marsh, John E.; Hughes, Robert W.

    2012-01-01

    We show that retrieval from semantic memory is vulnerable even to the mere presence of speech. Irrelevant speech impairs semantic fluency--namely, lexical retrieval cued by a semantic category name--but only if it is meaningful (forward speech compared to reversed speech or words compared to nonwords). Moreover, speech related semantically to the…

  20. Consumer Vulnerability to Fraud: Influencing Factors.

    ERIC Educational Resources Information Center

    Lee, Jinkook; Soberon-Ferrer, Horacio

    1997-01-01

    A questionnaire on market knowledge and awareness of unfair business practices was completed by 464 adults aged 18-64 and by 493 over 64. Consumers were more susceptible to fraud if they were older, poor, less educated, and/or living without spouses. Gender and race were not significant predictors of vulnerability. (SK)

  1. Vulnerability--A New View of Schizophrenia

    ERIC Educational Resources Information Center

    Zubin, Joseph; Spring, Bonnie

    1977-01-01

    Although descriptive and etiological approaches to psychopathology have made notable advances, they seem to have reached a plateau. After reviewing the six approaches to etiology that now preempt the field--ecological, developmental, learning, genetic, internal environment, and neurophysiological models--a second-order model, vulnerability, is…

  2. Who's Vulnerable in Infant Child Care Centers?

    ERIC Educational Resources Information Center

    Kendall, Earline D.; Moukaddem, Virginia E.

    1992-01-01

    Maintains that infants and toddlers, parents, and child caregivers are vulnerable to a variety of infectious diseases from infant-toddler child care centers. These diseases include infectious diarrhea; rubella; cytomeglovirus; hepatitis A, and haemophilus influenza type B. Suggests ways to prevent the spread of such diseases. (BB)

  3. Defining and Measuring Vulnerability in Young People

    PubMed Central

    Arora, Shilpa Khanna; Shah, Dheeraj; Chaturvedi, Sanjay; Gupta, Piyush

    2015-01-01

    Adolescents and youth, together addressed as “young people”, form the future building blocks of any society. They being most energetic and dynamic, tend to get involved in high-risk behaviors making themselves susceptible to criminal offences, accidents, physical injuries, emotional trauma, and medical problems — some of them extremely serious like transmission of human immunodeficiency virus (HIV). The concept of vulnerability is applicable to all the people who are more exposed to risks than their peers like the young people. In order to deal with social evils like criminal offences, domestic violence, sexual abuse, HIV, etc. we need to define vulnerability and understand the factors that influence it. This review also attempts to summarize the indicators of vulnerability and the data currently available to estimate its burden in India. Measuring the magnitude of vulnerability by means of certain indicators/variables might help us in devising tools to assess this poorly defined entity. This may also evolve a conceptual framework on which targeted remedial interventions can be devised and implemented. PMID:26170545

  4. CYBER/PHYSICAL SECURITY VULNERABILITY ASSESSMENT INTEGRATION

    SciTech Connect

    MacDonald, Douglas G.; Key, Brad; Clements, Samuel L.; Hutton, William J.; Craig, Philip A.; Patrick, Scott W.; Crawford, Cary E.

    2011-07-17

    This internally funded Laboratory-Directed R&D project by the Pacific Northwest National Laboratory, in conjunction with QinetiQ North America, is intended to identify and properly assess areas of overlap (and interaction) in the vulnerability assessment process between cyber security and physical protection. Existing vulnerability analysis (VA) processes and software tools exist, and these are heavily utilized in the determination of predicted vulnerability within the physical and cyber security domains. These determinations are normally performed independently of one another, and only interact on a superficial level. Both physical and cyber security subject matter experts have come to realize that though the various interactive elements exist, they are not currently quantified in most periodic security assessments. This endeavor aims to evaluate both physical and cyber VA techniques and provide a strategic approach to integrate the interdependent relationships of each into a single VA capability. This effort will also transform the existing suite of software currently utilized in the physical protection world to more accurately quantify the risk associated with a blended attack scenario. Performance databases will be created to support the characterization of the cyber security elements, and roll them into prototype software tools. This new methodology and software capability will enable analysts to better identify and assess the overall risk during a vulnerability analysis.

  5. Chemical Safety Vulnerability Working Group Report

    SciTech Connect

    Not Available

    1994-09-01

    This report marks the culmination of a 4-month review conducted to identify chemical safety vulnerabilities existing at DOE facilities. This review is an integral part of DOE's efforts to raise its commitment to chemical safety to the same level as that for nuclear safety.

  6. Criminal injuries compensation: Protecting vulnerable applicants.

    PubMed

    Guthrie, Robert

    2015-09-01

    Each year large numbers of persons sustain injury as a consequence of criminal behaviour. All Australian jurisdictions provide State-funded compensation to those harmed in this way. In the case of vulnerable applicants, the Assessor must consider not simply the appropriate and fair amount of compensation, but also how a person will be affected by the payment of compensation. Often a vulnerable applicant will apply through a guardian or a public trustee, although many apply in person. This article examines the use of legislative provisions, rules, regulations and practices in the various Australian jurisdictions in relation to how vulnerable applicants may be protected and supported once an award of compensation is made in their favour. Most jurisdictions provide for a mechanism by which compensation may be held in trust where the Assessor considers that the applicant may be unable to manage his or her financial affairs in his or her best interests. This article explores what factors are taken into account by Assessors in the absence of and pursuant to legislative directions. It considers how the approach may vary across jurisdictions and creative approaches to financial protection of vulnerable applicants. PMID:26554206

  7. Cosmopolitan Sensitivities, Vulnerability, and Global Englishes

    ERIC Educational Resources Information Center

    Jacobsen, Ushma Chauhan

    2015-01-01

    This paper is the outcome of an afterthought that assembles connections between three elements: the ambitions of cultivating cosmopolitan sensitivities that circulate vibrantly in connection with the internationalization of higher education, a course on Global Englishes at a Danish university and the sensation of vulnerability. It discusses the…

  8. A physical approach on flood risk vulnerability

    NASA Astrophysics Data System (ADS)

    Mazzorana, Bruno; Fuchs, Sven; Keiler, Margreth

    2013-04-01

    The design of efficient flood risk mitigation strategies and their subsequent implementation relies on a careful vulnerability analysis of the elements exposed to flood hazard. Recently, extensive research efforts were undertaken to develop and refine empirical relationships linking the structural vulnerability of buildings to the intensity of the impacting water-related hazard processes. These empirical vulnerability functions allow for an estimation of the expected direct losses as a result of the hazard scenario on the basis of a spatially explicit representation of the process patterns and the elements at risk, and improve both risk assessments and cost-benefit analyses of planned mitigation strategies. However, due to the underlying empiricism of such vulnerability functions, the physics of the damage generating mechanisms remain unveiled, and, as such, the applicability of the empirical approach for planning hazard-proof residential buildings is rather limited. Therefore, we propose a conceptual assessment scheme to close this gap. This assessment scheme comprises distinct analytical steps: (a) modelling the process intensity and (b) the impact on the element at risk exposed, (c) the physical response of the building envelope, (d) the damage accounting and (f) the economic damage valuation. This dynamic assessment supports all relevant planning activities with respect to a minimisation of flood hazard losses, and can be implemented in the operational risk assessment procedure.

  9. Seismic vulnerability assessments in risk analysis

    NASA Astrophysics Data System (ADS)

    Frolova, Nina; Larionov, Valery; Bonnin, Jean; Ugarov, Alexander

    2013-04-01

    The assessment of seismic vulnerability is a critical issue within natural and technological risk analysis. In general, there are three common types of methods used for development of vulnerability functions of different elements at risk: empirical, analytical and expert estimations. The paper addresses the empirical methods for seismic vulnerability estimation for residential buildings and industrial facilities. The results of engineering analysis of past earthquake consequences, as well as the statistical data on buildings behavior during strong earthquakes presented in the different seismic intensity scales, are used to verify the regional parameters of mathematical models in order to simulate physical and economic vulnerability for different building types classified according to seismic scale MMSK-86. Verified procedure has been used to estimate the physical and economic vulnerability of buildings and constructions against earthquakes for the Northern Caucasus Federal region of the Russian Federation and Krasnodar area, which are characterized by rather high level of seismic activity and high population density. In order to estimate expected damage states to buildings and constructions in the case of the earthquakes according to the OSR-97B (return period T=1,000 years) within big cities and towns, they were divided into unit sites and their coordinates were presented as dots located in the centers of unit sites. Then the indexes obtained for each unit site were summed up. The maps of physical vulnerability zoning for Northern Caucasus Federal region of the Russian Federation and Krasnodar area includes two elements: percent of different damage states for settlements with number of inhabitants less than 1,000 and vulnerability for cities and towns with number of inhabitants more than 1,000. The hypsometric scale is used to represent both elements on the maps. Taking into account the size of oil pipe line systems located in the highly active seismic zones in

  10. Aircraft vulnerability analysis by modeling and simulation

    NASA Astrophysics Data System (ADS)

    Willers, Cornelius J.; Willers, Maria S.; de Waal, Alta

    2014-10-01

    Infrared missiles pose a significant threat to civilian and military aviation. ManPADS missiles are especially dangerous in the hands of rogue and undisciplined forces. Yet, not all the launched missiles hit their targets; the miss being either attributable to misuse of the weapon or to missile performance restrictions. This paper analyses some of the factors affecting aircraft vulnerability and demonstrates a structured analysis of the risk and aircraft vulnerability problem. The aircraft-missile engagement is a complex series of events, many of which are only partially understood. Aircraft and missile designers focus on the optimal design and performance of their respective systems, often testing only in a limited set of scenarios. Most missiles react to the contrast intensity, but the variability of the background is rarely considered. Finally, the vulnerability of the aircraft depends jointly on the missile's performance and the doctrine governing the missile's launch. These factors are considered in a holistic investigation. The view direction, altitude, time of day, sun position, latitude/longitude and terrain determine the background against which the aircraft is observed. Especially high gradients in sky radiance occur around the sun and on the horizon. This paper considers uncluttered background scenes (uniform terrain and clear sky) and presents examples of background radiance at all view angles across a sphere around the sensor. A detailed geometrical and spatially distributed radiometric model is used to model the aircraft. This model provides the signature at all possible view angles across the sphere around the aircraft. The signature is determined in absolute terms (no background) and in contrast terms (with background). It is shown that the background significantly affects the contrast signature as observed by the missile sensor. A simplified missile model is constructed by defining the thrust and mass profiles, maximum seeker tracking rate, maximum

  11. Vendor System Vulnerability Testing Test Plan

    SciTech Connect

    James R. Davidson

    2005-01-01

    The Idaho National Laboratory (INL) prepared this generic test plan to provide clients (vendors, end users, program sponsors, etc.) with a sense of the scope and depth of vulnerability testing performed at the INL’s Supervisory Control and Data Acquisition (SCADA) Test Bed and to serve as an example of such a plan. Although this test plan specifically addresses vulnerability testing of systems applied to the energy sector (electric/power transmission and distribution and oil and gas systems), it is generic enough to be applied to control systems used in other critical infrastructures such as the transportation sector, water/waste water sector, or hazardous chemical production facilities. The SCADA Test Bed is established at the INL as a testing environment to evaluate the security vulnerabilities of SCADA systems, energy management systems (EMS), and distributed control systems. It now supports multiple programs sponsored by the U.S. Department of Energy, the U.S. Department of Homeland Security, other government agencies, and private sector clients. This particular test plan applies to testing conducted on a SCADA/EMS provided by a vendor. Before performing detailed vulnerability testing of a SCADA/EMS, an as delivered baseline examination of the system is conducted, to establish a starting point for all-subsequent testing. The series of baseline tests document factory delivered defaults, system configuration, and potential configuration changes to aid in the development of a security plan for in depth vulnerability testing. The baseline test document is provided to the System Provider,a who evaluates the baseline report and provides recommendations to the system configuration to enhance the security profile of the baseline system. Vulnerability testing is then conducted at the SCADA Test Bed, which provides an in-depth security analysis of the Vendor’s system.b a. The term System Provider replaces the name of the company/organization providing the system

  12. Empirical Estimates and Observations of 0Day Vulnerabilities

    SciTech Connect

    Miles A. McQueen; Trevor A. McQueen; Wayne F. Boyer; May R. Chaffin

    2009-01-01

    We define a 0Day vulnerability to be any vulnerability, in deployed software, that has been discovered by at least one person but has not yet been publicly announced or patched. These 0Day vulnerabilities are of particular interest when assessing the risk to a system from exploit of vulnerabilities which are not generally known to the public or, most importantly, to the owners of the system. Using the 0Day definition given above, we analyzed the 0Day lifespans of 491 vulnerabilities and conservatively estimated that in the worst year there were on average 2500 0Day vulnerabilities in existence on any given day. Then using a small but intriguing set of 15 0Day vulnerability lifespans representing the time from actual discovery to public disclosure, we made a more aggressive estimate. In this case, we estimated that in the worst year there were, on average, 4500 0Day vulnerabilities in existence on any given day.

  13. Evaluation of Equipment Vulnerability and Potential Shock Hazards. [carbon fibers

    NASA Technical Reports Server (NTRS)

    Taback, I.

    1980-01-01

    The vulnerability of electric equipment to carbon fibers released from aircraft accidents is investigated and the parameters affecting vulnerability are discussed. The shock hazard for a hypothetical set of accidents is computed.

  14. Psychological Vulnerability to Completed Suicide: A Review of Empirical Studies.

    ERIC Educational Resources Information Center

    Conner, Kenneth R.; Duberstein, Paul R.; Conwell, Yeates; Seidlitz, Larry; Caine, Eric D.

    2001-01-01

    This article reviews empirical literature on psychological vulnerability to completed suicide. Five constructs have been consistently associated with completed suicide: impulsivity/aggression; depression; anxiety; hopelessness; and self-consciousness/social disengagement. Current knowledge of psychological vulnerability could inform social…

  15. Vulnerability curves vs. vulnerability indicators: application of an indicator-based methodology for debris-flow hazards

    NASA Astrophysics Data System (ADS)

    Papathoma-Köhle, Maria

    2016-08-01

    The assessment of the physical vulnerability of elements at risk as part of the risk analysis is an essential aspect for the development of strategies and structural measures for risk reduction. Understanding, analysing and, if possible, quantifying physical vulnerability is a prerequisite for designing strategies and adopting tools for its reduction. The most common methods for assessing physical vulnerability are vulnerability matrices, vulnerability curves and vulnerability indicators; however, in most of the cases, these methods are used in a conflicting way rather than in combination. The article focuses on two of these methods: vulnerability curves and vulnerability indicators. Vulnerability curves express physical vulnerability as a function of the intensity of the process and the degree of loss, considering, in individual cases only, some structural characteristics of the affected buildings. However, a considerable amount of studies argue that vulnerability assessment should focus on the identification of these variables that influence the vulnerability of an element at risk (vulnerability indicators). In this study, an indicator-based methodology (IBM) for mountain hazards including debris flow (Kappes et al., 2012) is applied to a case study for debris flows in South Tyrol, where in the past a vulnerability curve has been developed. The relatively "new" indicator-based method is being scrutinised and recommendations for its improvement are outlined. The comparison of the two methodological approaches and their results is challenging since both methodological approaches deal with vulnerability in a different way. However, it is still possible to highlight their weaknesses and strengths, show clearly that both methodologies are necessary for the assessment of physical vulnerability and provide a preliminary "holistic methodological framework" for physical vulnerability assessment showing how the two approaches may be used in combination in the future.

  16. Noninvasive diagnosis of vulnerable coronary plaque

    PubMed Central

    Pozo, Eduardo; Agudo-Quilez, Pilar; Rojas-González, Antonio; Alvarado, Teresa; Olivera, María José; Jiménez-Borreguero, Luis Jesús; Alfonso, Fernando

    2016-01-01

    Myocardial infarction and sudden cardiac death are frequently the first manifestation of coronary artery disease. For this reason, screening of asymptomatic coronary atherosclerosis has become an attractive field of research in cardiovascular medicine. Necropsy studies have described histopathological changes associated with the development of acute coronary events. In this regard, thin-cap fibroatheroma has been identified as the main vulnerable coronary plaque feature. Hence, many imaging techniques, such as coronary computed tomography, cardiac magnetic resonance or positron emission tomography, have tried to detect noninvasively these histomorphological characteristics with different approaches. In this article, we review the role of these diagnostic tools in the detection of vulnerable coronary plaque with particular interest in their advantages and limitations as well as the clinical implications of the derived findings. PMID:27721935

  17. Information systems vulnerability: A systems analysis perspective

    SciTech Connect

    Wyss, G.D.; Daniel, S.L.; Schriner, H.K.; Gaylor, T.R.

    1996-07-01

    Vulnerability analyses for information systems are complicated because the systems are often geographically distributed. Sandia National Laboratories has assembled an interdisciplinary team to explore the applicability of probabilistic logic modeling (PLM) techniques (including vulnerability and vital area analysis) to examine the risks associated with networked information systems. The authors have found that the reliability and failure modes of many network technologies can be effectively assessed using fault trees and other PLM methods. The results of these models are compatible with an expanded set of vital area analysis techniques that can model both physical locations and virtual (logical) locations to identify both categories of vital areas simultaneously. These results can also be used with optimization techniques to direct the analyst toward the most cost-effective security solution.

  18. Vulnerability of community businesses to environmental disasters.

    PubMed

    Zhang, Yang; Lindell, Michael K; Prater, Carla S

    2009-03-01

    Business plays important roles in community functioning. However, disaster research has been disproportionately focused on units of analysis such as families, households and government agencies. This paper synthesises the major findings within the business development research field and the disaster research field. It constructs a framework for evaluating business vulnerability to natural disasters. Our theoretical integration of the research conducted to date addresses five major issues. First, it defines the ways in which businesses are subject to the impacts of natural disasters. Second, it identifies the factors that determine the magnitude of business impacts after a disaster. Third, it identifies how and when businesses return to their pre-disaster level in the disaster stricken community. Fourth, it describes measures that can be taken by individual firms and community planners to reduce the impacts of environmental disasters. Fifth, it identifies needs for public policy and future research to reduce business vulnerability to environmental disasters.

  19. Modernization, weather variability, and vulnerability to famine.

    PubMed

    D'Alessandro, Simone

    2011-01-01

    This paper shows that under weather variability the transformation from a rural to an incomplete market economy can increase the vulnerability of peasants to famine. This can occur even if improvements in technology have raised agricultural productivity and made production less responsive to weather variability. Indeed, negative environmental shocks can produce a drop in wages that outweighs the increase in wages due to an equivalent positive environmental shock. Consequently, the amount of grain stored increases more slowly in good seasons than it decreases in bad ones. This paper gives new insights on the catastrophic effects produced by widespread droughts in India during the second half of the 19th century. Notwithstanding the introduction of new modes of production and the modernization of infrastructures, the interaction between environmental variability and new institutional arrangements might have contributed to increase the vulnerability of peasants to famine. PMID:22164874

  20. Space Station Program threat and vulnerability analysis

    NASA Technical Reports Server (NTRS)

    Van Meter, Steven D.; Veatch, John D.

    1987-01-01

    An examination has been made of the physical security of the Space Station Program at the Kennedy Space Center in a peacetime environment, in order to furnish facility personnel with threat/vulnerability information. A risk-management approach is used to prioritize threat-target combinations that are characterized in terms of 'insiders' and 'outsiders'. Potential targets were identified and analyzed with a view to their attractiveness to an adversary, as well as to the consequentiality of the resulting damage.

  1. Seaside, Oregon, Tsunami Vulnerability Assessment Pilot Study

    NASA Astrophysics Data System (ADS)

    Dunbar, P. K.; Dominey-Howes, D.; Varner, J.

    2006-12-01

    The results of a pilot study to assess the risk from tsunamis for the Seaside-Gearhart, Oregon region will be presented. To determine the risk from tsunamis, it is first necessary to establish the hazard or probability that a tsunami of a particular magnitude will occur within a certain period of time. Tsunami inundation maps that provide 100-year and 500-year probabilistic tsunami wave height contours for the Seaside-Gearhart, Oregon, region were developed as part of an interagency Tsunami Pilot Study(1). These maps provided the probability of the tsunami hazard. The next step in determining risk is to determine the vulnerability or degree of loss resulting from the occurrence of tsunamis due to exposure and fragility. The tsunami vulnerability assessment methodology used in this study was developed by M. Papathoma and others(2). This model incorporates multiple factors (e.g. parameters related to the natural and built environments and socio-demographics) that contribute to tsunami vulnerability. Data provided with FEMA's HAZUS loss estimation software and Clatsop County, Oregon, tax assessment data were used as input to the model. The results, presented within a geographic information system, reveal the percentage of buildings in need of reinforcement and the population density in different inundation depth zones. These results can be used for tsunami mitigation, local planning, and for determining post-tsunami disaster response by emergency services. (1)Tsunami Pilot Study Working Group, Seaside, Oregon Tsunami Pilot Study--Modernization of FEMA Flood Hazard Maps, Joint NOAA/USGS/FEMA Special Report, U.S. National Oceanic and Atmospheric Administration, U.S. Geological Survey, U.S. Federal Emergency Management Agency, 2006, Final Draft. (2)Papathoma, M., D. Dominey-Howes, D.,Y. Zong, D. Smith, Assessing Tsunami Vulnerability, an example from Herakleio, Crete, Natural Hazards and Earth System Sciences, Vol. 3, 2003, p. 377-389.

  2. NASA's Research in Aircraft Vulnerability Mitigation

    NASA Technical Reports Server (NTRS)

    Allen, Cheryl L.

    2005-01-01

    Since its inception in 1958, the National Aeronautics and Space Administration s (NASA) role in civil aeronautics has been to develop high-risk, high-payoff technologies to meet critical national aviation challenges. Following the events of Sept. 11, 2001, NASA recognized that it now shared the responsibility for improving homeland security. The NASA Strategic Plan was modified to include requirements to enable a more secure air transportation system by investing in technologies and collaborating with other agencies, industry, and academia. NASA is conducting research to develop and advance innovative and commercially viable technologies that will reduce the vulnerability of aircraft to threats or hostile actions, and identify and inform users of potential vulnerabilities in a timely manner. Presented in this paper are research plans and preliminary status for mitigating the effects of damage due to direct attacks on civil transport aircraft. The NASA approach to mitigation includes: preventing loss of an aircraft due to a hit from man-portable air defense systems; developing fuel system technologies that prevent or minimize in-flight vulnerability to small arms or other projectiles; providing protection from electromagnetic energy attacks by detecting directed energy threats to aircraft and on/off-board systems; and minimizing the damage due to high-energy attacks (explosions and fire) by developing advanced lightweight, damage-resistant composites and structural concepts. An approach to preventing aircraft from being used as weapons of mass destruction will also be discussed.

  3. Growth of Necrotic Cores in Vulnerable Plaque

    NASA Astrophysics Data System (ADS)

    Fok, Pak-Wing

    2011-03-01

    Plaques are fatty deposits that grow mainly in arteries and develop as a result of a chronic inflammatory response. Plaques are called vulnerable when they are prone to mechanical rupture. Vulnerable Plaques (VPs) are characterized by lipid-rich, necrotic cores that are heavily infiltrated with macrophages. The rupture of VPs releases thrombogenic agents into the bloodstream, usually resulting in myocardial infarctions. We propose a quantitative model to predict the development of a plaque's necrotic core. By solving coupled reaction-diffusion equations for macrophages and dead cells, we explore the joint effects of hypoxic cell death and chemo-attraction to Ox-LDL, a molecule that is strongly linked to atherosclerosis. Our model predicts cores that have approximately the right size and shape. Normal mode analysis and subsequent calculation of the smallest eigenvalues allow us to compute the times required for the system to reach its steady state. This study allows us to make quantitative predictions for how quickly vulnerable plaques develop and how their growth depends on system parameters such as chemotactic coefficients and cell death rates.

  4. Environment, vulnerability, and gender in Andean ethnomedicine.

    PubMed

    Larme, A C

    1998-10-01

    In Cuyo Cuyo, in the southern Peruvian highlands, ethnomedicine is rife with images of human vulnerability to a hostile and unpredictable environment. This is represented in the ethnomedical system by a focus on wayras, air- or wind-borne illnesses that enter through vulnerable body openings such as the head, orifices, lower back, and feet. Women are viewed to be more vulnerable, or débil, than men to illness because they have an extra orifice, the vagina, they lose copious amounts of blood, which is thought to be irreplaceable, during childbirth. and because they suffer more negative emotions, which are thought to attract wayras and other illnesses to the body. The relationship of ethnomedical beliefs to the Andean physical and political economic environment is explored within the context of social and economic change. Negative beliefs about women's bodies have negative effects on women's roles and position vis-à-vis men in present day Cuyo Cuyo. Ethnomedical beliefs reflect and reinforce gender inequalities in present day Peru and are part of a cultural ideology that in general devalues women. This case study demonstrates that power is a key dimension in the cultural construction of medical knowledge. whether in non-Western or Western societies.

  5. Reconceptualizing Vulnerability in Personal Narrative Writing with Youths

    ERIC Educational Resources Information Center

    Johnson, Elisabeth

    2014-01-01

    Through a student/teacher classroom conflict, the author explores ways adults produce student writers as vulnerable. Drawing on post-structural concepts of adolescence, identity production, interrogation, and vulnerability, the author details how an English teacher invited students to perform vulnerability in personal narratives about issues like…

  6. An Empirical Measure of Computer Security Strength for Vulnerability Remediation

    ERIC Educational Resources Information Center

    Villegas, Rafael

    2010-01-01

    Remediating all vulnerabilities on computer systems in a timely and cost effective manner is difficult given that the window of time between the announcement of a new vulnerability and an automated attack has decreased. Hence, organizations need to prioritize the vulnerability remediation process on their computer systems. The goal of this…

  7. 6 CFR 27.215 - Security vulnerability assessments.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.215 Security vulnerability...-risk, the facility must complete a Security Vulnerability Assessment. A Security Vulnerability... in meeting the applicable Risk-Based Performance Standards; (4) Risk Assessment, including...

  8. 6 CFR 27.215 - Security vulnerability assessments.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.215 Security vulnerability...-risk, the facility must complete a Security Vulnerability Assessment. A Security Vulnerability... in meeting the applicable Risk-Based Performance Standards; (4) Risk Assessment, including...

  9. Unified Approach to Vulnerability Analysis of Web Applications

    NASA Astrophysics Data System (ADS)

    Le, H. T.; Loh, P. K. K.

    2008-11-01

    Web vulnerabilities in web-based applications may be detected, classified and documented. Several Web scanners exist for vulnerabilities in Web applications implemented via different technologies. However, none of them provides the technology-independent, generic coverage of possible vulnerabilities. In this project that is funded by Mindef Singapore, we propose a new approach for Web application security and vulnerability analysis. The design addresses the categorization of scanner results with a generic data model and the design of a language-independent rule-based engine that detects, analyses and reports suspected vulnerabilities in web-based applications.

  10. Vulnerability of Coastal Communities from Storm Surge and Flood Disasters.

    PubMed

    Bathi, Jejal Reddy; Das, Himangshu S

    2016-02-01

    Disasters in the form of coastal storms and hurricanes can be very destructive. Preparing for anticipated effects of such disasters can help reduce the public health and economic burden. Identifying vulnerable population groups can help prioritize resources for the most needed communities. This paper presents a quantitative framework for vulnerability measurement that incorporates both socioeconomic and flood inundation vulnerability. The approach is demonstrated for three coastal communities in Mississippi with census tracts being the study unit. The vulnerability results are illustrated as thematic maps for easy usage by planners and emergency responders to assist in prioritizing their actions to vulnerable populations during storm surge and flood disasters. PMID:26907313

  11. Vulnerability of Coastal Communities from Storm Surge and Flood Disasters

    PubMed Central

    Bathi, Jejal Reddy; Das, Himangshu S.

    2016-01-01

    Disasters in the form of coastal storms and hurricanes can be very destructive. Preparing for anticipated effects of such disasters can help reduce the public health and economic burden. Identifying vulnerable population groups can help prioritize resources for the most needed communities. This paper presents a quantitative framework for vulnerability measurement that incorporates both socioeconomic and flood inundation vulnerability. The approach is demonstrated for three coastal communities in Mississippi with census tracts being the study unit. The vulnerability results are illustrated as thematic maps for easy usage by planners and emergency responders to assist in prioritizing their actions to vulnerable populations during storm surge and flood disasters. PMID:26907313

  12. Vulnerability of Coastal Communities from Storm Surge and Flood Disasters.

    PubMed

    Bathi, Jejal Reddy; Das, Himangshu S

    2016-02-19

    Disasters in the form of coastal storms and hurricanes can be very destructive. Preparing for anticipated effects of such disasters can help reduce the public health and economic burden. Identifying vulnerable population groups can help prioritize resources for the most needed communities. This paper presents a quantitative framework for vulnerability measurement that incorporates both socioeconomic and flood inundation vulnerability. The approach is demonstrated for three coastal communities in Mississippi with census tracts being the study unit. The vulnerability results are illustrated as thematic maps for easy usage by planners and emergency responders to assist in prioritizing their actions to vulnerable populations during storm surge and flood disasters.

  13. Technological solution for vulnerable communities: How does its approach matter?

    NASA Astrophysics Data System (ADS)

    Sianipar, C. P. M.; Dowaki, K.; Yudoko, G.

    2014-06-01

    Vulnerability is an emerging term for both scientific communities and practitioners. Vulnerabilities attributed to a particular community are then aggregated to state it as a vulnerable community. Vulnerability-related study is recognized as an interdisciplinary one due to the complex characteristics of vulnerabilities in each contextual situation. In common understandings, technology is recognized as an interdisciplinary solution, making it possible for supporting any activity in eradicating vulnerability. This study aims to observe such possibilities. Literature survey is taken to investigate the interconnection between vulnerability eradication and technology. Brief comparison between several developing countries and particular focus on Indonesia become a medium of further investigation to reveal issues surrounding technology-related efforts for vulnerability eradication in vulnerable communities. The study reveals that developing countries, particularly Indonesia, tend to adopt approaches from Northern hemisphere, including transferring technologies from developed countries without proper propagation. It means that local knowledge and power are largely ignored in the pursuit of local problem solving for vulnerability eradication. These facts become a signpost to emphasize that approach in implementing technological solution for such purpose is the critical mechanism to ensure the success in every contextual situation. Then, looking at the results of this brief study, its emphasis indicates further requirements to shift the paradigm of typical community development to contextual community empowerment in order to ensure the continuity of every technological solution for a consistent eradication of local vulnerabilities, including possible changes of required approach alongside the shift.

  14. Karst morphology and groundwater vulnerability of high alpine karst plateaus

    NASA Astrophysics Data System (ADS)

    Plan, Lukas; Decker, Kurt; Faber, Robert; Wagreich, Michael; Grasemann, Bernhard

    2009-07-01

    High alpine karst plateaus are recharge areas for major drinking water resources in the Alps and many other regions. Well-established methods for the vulnerability mapping of groundwater to contamination have not been applied to such areas yet. The paper characterises this karst type and shows that two common vulnerability assessment methods (COP and PI) classify most of the areas with high vulnerability classes. In the test site on the Hochschwab plateau (Northern Calcareous Alps, Austria), overlying layers are mostly absent, not protective or even enhance point recharge, where they have aquiclude character. The COP method classifies 82% of the area as highly or extremely vulnerable. The resulting maps are reasonable, but do not differentiate vulnerabilities to the extent that the results can be used for protective measures. An extension for the upper end of the vulnerability scale is presented that allows identifying ultra vulnerable areas. The proposed enhancement of the conventional approach points out that infiltration conditions are of key importance for vulnerability. The method accounts for karst genetical and hydrologic processes using qualitative and quantitative properties of karst depressions and sinking streams including parameters calculated from digital elevations models. The method is tested on the Hochschwab plateau where 1.7% of the area is delineated as ultra vulnerable. This differentiation could not be reached by the COP and PI methods. The resulting vulnerability map highlights spots of maximum vulnerability and the combination with a hazard map enables protective measures for a manageable area and number of sites.

  15. Evaluating regional vulnerability to climate change: purposes and methods

    SciTech Connect

    Malone, Elizabeth L.; Engle, Nathan L.

    2011-03-15

    As the emphasis in climate change research, international negotiations, and developing-country activities has shifted from mitigation to adaptation, vulnerability has emerged as a bridge between impacts on one side and the need for adaptive changes on the other. Still, the term vulnerability remains abstract, its meaning changing with the scale, focus, and purpose of each assessment. Understanding regional vulnerability has advanced over the past several decades, with studies using a combination of indicators, case studies and analogues, stakeholder-driven processes, and scenario-building methodologies. As regions become increasingly relevant scales of inquiry for bridging the aggregate and local, for every analysis, it is perhaps most appropriate to ask three “what” questions: “What/who is vulnerable?,” “What is vulnerability?,” and “Vulnerable to what?” The answers to these questions will yield different definitions of vulnerability as well as different methods for assessing it.

  16. Cultural knowledge and local vulnerability in African American communities

    NASA Astrophysics Data System (ADS)

    Miller Hesed, Christine D.; Paolisso, Michael

    2015-07-01

    Policymakers need to know what factors are most important in determining local vulnerability to facilitate effective adaptation to climate change. Quantitative vulnerability indices are helpful in this endeavour but are limited in their ability to capture subtle yet important aspects of vulnerability such as social networks, knowledge and access to resources. Working with three African American communities on Maryland’s Eastern Shore, we systematically elicit local cultural knowledge on climate change and connect it with a scientific vulnerability framework. The results of this study show that: a given social-ecological factor can substantially differ in the way in which it affects local vulnerability, even among communities with similar demographics and climate-related risks; and social and political isolation inhibits access to sources of adaptive capacity, thereby exacerbating local vulnerability. These results show that employing methods for analysing cultural knowledge can yield new insights to complement those generated by quantitative vulnerability indices.

  17. Coping with seismic vulnerability: small manufacturing firms in western Athens.

    PubMed

    Sapountzaki, Kalliopi

    2005-06-01

    This paper attempts to contribute to international discourse on the responsibility of macro structures (economic and political) and private agencies for the production and distribution of vulnerability. It does so by focusing on an individual economic entity, small manufacturing firms (SMFs), in a specific location, western Athens, Greece. By evaluating the losses that SMFs sustained in the earthquake of 7 September 1999, the paper points to variations in vulnerability levels among such firms and highlights the 'sources' of vulnerability they confront. Furthermore, the SMF recovery cycle is systematically monitored in parallel with relevant public policies and state reactions to private recovery methods. The analysis illustrates processes that externalise recovery costs, alter the relationship between physical and socio-economic vulnerability and shift the vulnerability load from macro structures to individual agencies or vice versa. It is based on two methodological approaches: the division of vulnerability into three constituent components (exposure, resistance and resilience); and the conceptual split between producers and carriers of vulnerability.

  18. Extending Vulnerability Assessment to Include Life Stages Considerations

    PubMed Central

    Hodgson, Emma E.; Essington, Timothy E.; Kaplan, Isaac C.

    2016-01-01

    Species are experiencing a suite of novel stressors from anthropogenic activities that have impacts at multiple scales. Vulnerability assessment is one tool to evaluate the likely impacts that these stressors pose to species so that high-vulnerability cases can be identified and prioritized for monitoring, protection, or mitigation. Commonly used semi-quantitative methods lack a framework to explicitly account for differences in exposure to stressors and organism responses across life stages. Here we propose a modification to commonly used spatial vulnerability assessment methods that includes such an approach, using ocean acidification in the California Current as an illustrative case study. Life stage considerations were included by assessing vulnerability of each life stage to ocean acidification and were used to estimate population vulnerability in two ways. We set population vulnerability equal to: (1) the maximum stage vulnerability and (2) a weighted mean across all stages, with weights calculated using Lefkovitch matrix models. Vulnerability was found to vary across life stages for the six species explored in this case study: two krill–Euphausia pacifica and Thysanoessa spinifera, pteropod–Limacina helicina, pink shrimp–Pandalus jordani, Dungeness crab–Metacarcinus magister and Pacific hake–Merluccius productus. The maximum vulnerability estimates ranged from larval to subadult and adult stages with no consistent stage having maximum vulnerability across species. Similarly, integrated vulnerability metrics varied greatly across species. A comparison showed that some species had vulnerabilities that were similar between the two metrics, while other species’ vulnerabilities varied substantially between the two metrics. These differences primarily resulted from cases where the most vulnerable stage had a low relative weight. We compare these methods and explore circumstances where each method may be appropriate. PMID:27416031

  19. Extending Vulnerability Assessment to Include Life Stages Considerations.

    PubMed

    Hodgson, Emma E; Essington, Timothy E; Kaplan, Isaac C

    2016-01-01

    Species are experiencing a suite of novel stressors from anthropogenic activities that have impacts at multiple scales. Vulnerability assessment is one tool to evaluate the likely impacts that these stressors pose to species so that high-vulnerability cases can be identified and prioritized for monitoring, protection, or mitigation. Commonly used semi-quantitative methods lack a framework to explicitly account for differences in exposure to stressors and organism responses across life stages. Here we propose a modification to commonly used spatial vulnerability assessment methods that includes such an approach, using ocean acidification in the California Current as an illustrative case study. Life stage considerations were included by assessing vulnerability of each life stage to ocean acidification and were used to estimate population vulnerability in two ways. We set population vulnerability equal to: (1) the maximum stage vulnerability and (2) a weighted mean across all stages, with weights calculated using Lefkovitch matrix models. Vulnerability was found to vary across life stages for the six species explored in this case study: two krill-Euphausia pacifica and Thysanoessa spinifera, pteropod-Limacina helicina, pink shrimp-Pandalus jordani, Dungeness crab-Metacarcinus magister and Pacific hake-Merluccius productus. The maximum vulnerability estimates ranged from larval to subadult and adult stages with no consistent stage having maximum vulnerability across species. Similarly, integrated vulnerability metrics varied greatly across species. A comparison showed that some species had vulnerabilities that were similar between the two metrics, while other species' vulnerabilities varied substantially between the two metrics. These differences primarily resulted from cases where the most vulnerable stage had a low relative weight. We compare these methods and explore circumstances where each method may be appropriate. PMID:27416031

  20. Ruptures of vulnerability: Linda Stein's Knight Series.

    PubMed

    Bible, Ann Vollmann

    2010-01-01

    Drawing on the work of Monique Wittig, this article understands Linda Stein's Knight Series as a lacunary writing communicating both her challenges to come to representation and her creative registration of subjectivity. The argument is grounded in an exploration of the rich interplay of power and vulnerability across the series as against the discourse of escapist fashion. Specifically, Stein's critical contradictions of inside and outside, conflated temporality, disjunctions between decoration and abstraction, and fluidity of sex and gender are examined. The discussion is elaborated through consideration of the work of Julia Kristeva, Elizabeth Grosz, and Hayao Miyazaki.

  1. Research with protected populations--vulnerable participants.

    PubMed

    Rogers, Bonnie

    2005-04-01

    Workers as study participants are a vulnerable population and additional considerations for their protection in research are needed. Issues related to invasion of privacy and coercion to participate in research studies must be carefully weighed and closely monitored. Worker autonomy must be fostered with respect to assuring that informed consent is given, meaning the information transferred is understood. Research will add to the body of knowledge and advance nursing practice, but one must always remember that risks and benefits must be balanced to achieve appropriate end results.

  2. Modelling farm vulnerability to flooding: A step toward vulnerability mitigation policies appraisal

    NASA Astrophysics Data System (ADS)

    Brémond, P.; Abrami, G.; Blanc, C.; Grelot, F.

    2009-04-01

    Recent catastrophic flood events such as Elbe in 2002 or Rhône in 2003 have shown limits of flood management policies relying on dykes protection: worsening of flood impacts downstream, increased damage by dykes rupture. Those events, among others, contributes to radical changes on the philosophy of flood prevention, with the promotion of new orientations for mitigating flood exposition. Two new trends may have a significant impact on rural areas: floodplain restoration and vulnerability mitigation. The Rhône River program, which is an contract of objectives signed between French Government and local collectivites, is highly illustrative of these new trends and their impact on agricultural sector. In this program, it appears that areas to be concerned by floodplain restoration are agricultural ones, because their supposed vulnerability to flood is expected to be less important to urban areas. As a consequence, agricultural sector is particularly concerned by planned actions on mitigation of assets vulnerability, an important part of the program (financial support of European Union of 7.5 Million euros). Mitigation of agricultural assets vulnerability reveals particularly interesting for two following reasons. Firstly, it is a way to maintain agricultural activities in floodplains yet existing, without promoting flood protection. Secondly, in case of floodplain restoration, vulnerability mitigation is a way for local authorities to compensate over-flooding impacts. In practice, local authorities may financially support farmers for implementing measures to mitigate their farm vulnerability. On the Rhône River, an important work has already been done to identify farm vulnerability to flooding, and propose measures to mitigate it. More than 3 000 farms exposed to flood risk have been identified representing 88 690 ha of agricultural areas which is estimated to generate damage between 400 and 800 Million euros depending on the season of occurrence for a catastrophic

  3. The perils of protection: vulnerability and women in clinical research.

    PubMed

    Schonfeld, Toby

    2013-06-01

    Subpart B of 45 Code of Federal Regulations Part 46 (CFR) identifies the criteria according to which research involving pregnant women, human fetuses, and neonates can be conducted ethically in the United States. As such, pregnant women and fetuses fall into a category requiring "additional protections," often referred to as "vulnerable populations." The CFR does not define vulnerability, but merely gives examples of vulnerable groups by pointing to different categories of potential research subjects needing additional protections. In this paper, I assess critically the role of this categorization of pregnant women involved in research as "vulnerable," both as separate entities and in combination with the fetuses they carry. In particular, I do three things: (1) demonstrate that pregnant women qua pregnancy are either not "vulnerable" according to any meaningful definition of that term or that such vulnerability is irrelevant to her status as a research participant; (2) argue that while a fetus may be vulnerable in terms of dependency, this categorization does not equate to the vulnerability of the pregnant woman; and (3) suggest that any vulnerability that appends to women is precisely the result of federal regulations and dubious public perceptions about pregnant women. I conclude by demonstrating how this erroneous characterization of pregnant women as "vulnerable" and its associated protections have not only impeded vital research for pregnant women and their fetuses, but have also negatively affected the inclusion of all women in clinical research.

  4. A socioeconomic profile of vulnerable land to desertification in Italy.

    PubMed

    Salvati, Luca

    2014-01-01

    Climate changes, soil vulnerability, loss in biodiversity, and growing human pressure are threatening Mediterranean-type ecosystems which are increasingly considered as a desertification hotspot. In this region, land vulnerability to desertification strongly depends on the interplay between natural and anthropogenic factors. The present study proposes a multivariate exploratory analysis of the relationship between the spatial distribution of land vulnerability to desertification and the socioeconomic contexts found in three geographical divisions of Italy (north, center and south) based on statistical indicators. A total of 111 indicators describing different themes (demography, human settlements, labor market and human capital, rural development, income and wealth) were used to discriminate vulnerable from non-vulnerable areas. The resulting socioeconomic profile of vulnerable areas in northern and southern Italy diverged significantly, the importance of demographic and economic indicators being higher in southern Italy than in northern Italy. On the contrary, human settlement indicators were found more important to discriminate vulnerable and non-vulnerable areas in northern Italy, suggesting a role for peri-urbanization in shaping the future vulnerable areas. An in-depth knowledge of the socioeconomic characteristics of vulnerable land may contribute to scenarios' modeling and the development of more effective policies to combat desertification.

  5. Perspectives on plant vulnerabilities & other plant and containment improvements

    SciTech Connect

    LaChance, J.; Kolaczkowski, A.; Kahn, J.

    1996-01-01

    The primary goal of the Individual Plant Examination (IPE) Program was for licensees to identify plant-unique vulnerabilities and actions to address these vulnerabilities. A review of these vulnerabilities and plant improvements that were identified in the IPEs was performed as part of the IPE Insights Program sponsored by the U.S. Nuclear Regulatory Commission (NRC). The purpose of this effort was to characterize the identified vulnerabilities and the impact of suggested plant improvements. No specific definition for {open_quotes}vulnerability{close_quotes} was provided in NRC Generic Letter 88-20 or in the subsequent NRC IPE submittal guidance documented in NUREG-1335. Thus licensees were left to use their own definitions. Only 20% of the plants explicitly stated that they had vulnerabilities. However, most licensees identified other plant improvements to address issues not explicitly classified as vulnerabilities, but pertaining to areas in which overall plant safety could potentially be increased. The various definitions of {open_quotes}vulnerability{close_quotes} used by the licensees, explicitly identified vulnerabilities, proposed plant improvements to address these vulnerabilities, and other plant improvements are summarized and discussed.

  6. Perspectives on contextual vulnerability in discourses of climate conflict

    NASA Astrophysics Data System (ADS)

    Okpara, U. T.; Stringer, L. C.; Dougill, A. J.

    2015-12-01

    The science of climate security and conflict is replete with controversies. Yet the increasing vulnerability of politically fragile countries to the security consequences of climate change is widely acknowledged. Although climate conflict reflects a continuum of conditional forces that coalesce around the notion of vulnerability, how different portrayals of vulnerability influence the discursive formation of climate conflict relations remains an exceptional but under-researched issue. This paper combines a systematic discourse analysis with a vulnerability interpretation diagnostic tool to explore: (i) how discourses of climate conflict are constructed and represented, (ii) how vulnerability is communicated across discourse lines, and (iii) the strength of contextual vulnerability against a deterministic narrative of scarcity-induced conflict, such as that pertaining to land. Systematically characterising climate conflict discourses based on the central issues constructed, assumptions about mechanistic relationships, implicit normative judgements and vulnerability portrayals, provides a useful way of understanding where discourses differ. While discourses show a wide range of opinions "for" and "against" climate conflict relations, engagement with vulnerability has been less pronounced - except for the dominant context centrism discourse concerned about human security (particularly in Africa). In exploring this discourse, we observe an increasing sense of contextual vulnerability that is oriented towards a concern for complexity rather than predictability. The article concludes by illustrating that a turn towards contextual vulnerability thinking will help advance a constructivist theory-informed climate conflict scholarship that recognises historicity, specificity and variability as crucial elements of contextual totalities of any area affected by climate conflict.

  7. Perspectives on contextual vulnerability in discourses of climate conflict

    NASA Astrophysics Data System (ADS)

    Okpara, U. T.; Stringer, L. C.; Dougill, A. J.

    2016-02-01

    The science of climate security and conflict is replete with controversies. Yet the increasing vulnerability of politically fragile countries to the security consequences of climate change is widely acknowledged. Although climate conflict reflects a continuum of conditional forces that coalesce around the notion of vulnerability, how different portrayals of vulnerability influence the discursive formation of climate conflict relations remains an exceptional but under-researched issue. This paper combines a systematic discourse analysis with a vulnerability interpretation diagnostic tool to explore (i) how discourses of climate conflict are constructed and represented, (ii) how vulnerability is communicated across discourse lines, and (iii) the strength of contextual vulnerability against a deterministic narrative of scarcity-induced conflict, such as that pertaining to land. Systematically characterising climate conflict discourses based on the central issues constructed, assumptions about mechanistic relationships, implicit normative judgements and vulnerability portrayals, provides a useful way of understanding where discourses differ. While discourses show a wide range of opinions "for" and "against" climate conflict relations, engagement with vulnerability has been less pronounced - except for the dominant context centrism discourse concerned about human security (particularly in Africa). In exploring this discourse, we observe an increasing sense of contextual vulnerability that is oriented towards a concern for complexity rather than predictability. The article concludes by illustrating that a turn towards contextual vulnerability thinking will help advance a constructivist theory-informed climate conflict scholarship that recognises historicity, specificity, and variability as crucial elements of contextual totalities of any area affected by climate conflict.

  8. Framework for Vulnerability Assessment of Coastal Infrastructure

    NASA Astrophysics Data System (ADS)

    Obrien, P. S.; Moritz, H. R.; White, K. D.

    2015-12-01

    Coastal infrastructure can be highly vulnerable to changing climate, including increasing sea levels and altered frequency and intensity of coastal storms. Existing coastal infrastructure may be of a sufficient age that it is already experiencing noticeable impacts from global sea level rise, and require a variety of potential preparedness and resilience measures to adapt to changing climate. Methods to determine vulnerability to changing sea level and support planning of potential future adaptation measures are needed for application to projects having multiple purposes (e.g., navigation, coastal risk reduction). Here we describe a potential framework for assessing projects with several components typical of existing coastal infrastructure spanning a range of engineering disciplines (e.g., hydrology, geotechnical, structural, electrical, and mechanical). The US Army Corps of Engineers (USACE) Climate Preparedness and Resilience Register (CPRR) framework is currently under development. It takes a tiered approach as described in earlier USACE guidance (Engineer Technical Letter 1100-2-1) using the three scenarios prescribed by Engineer Regulation ER 1100-2-8162. Level 1 is a qualitative assessment defining the major sea level change-related impacts and ranks them in order of soonest occurrence. Level 2 is a quantitative evaluation that analyzes current and future performance of individual project components, including electrical, mechanical and structural components and functions using the sea level change scenarios prescribed by ER 1100-2-8162. Level 3 proposes adaptation measures per ETL 1100-2-1 and evaluates changes in sea level change-related impacts.

  9. Vulnerabilities to misinformation in online pharmaceutical marketing.

    PubMed

    De Freitas, Julian; Falls, Brian A; Haque, Omar S; Bursztajn, Harold J

    2013-05-01

    Given the large percentage of Internet users who search for health information online, pharmaceutical companies have invested significantly in online marketing of their products. Although online pharmaceutical marketing can potentially benefit both physicians and patients, it can also harm these groups by misleading them. Indeed, some pharmaceutical companies have been guilty of undue influence, which has threatened public health and trust. We conducted a review of the available literature on online pharmaceutical marketing, undue influence and the psychology of decision-making, in order to identify factors that contribute to Internet users' vulnerability to online pharmaceutical misinformation. We find five converging factors: Internet dependence, excessive trust in the veracity of online information, unawareness of pharmaceutical company influence, social isolation and detail fixation. As the Internet continues to change, it is important that regulators keep in mind not only misinformation that surrounds new web technologies and their contents, but also the factors that make Internet users vulnerable to misinformation in the first place. Psychological components are a critical, although often neglected, risk factor for Internet users becoming misinformed upon exposure to online pharmaceutical marketing. Awareness of these psychological factors may help Internet users attentively and safely navigate an evolving web terrain.

  10. Mapping of earthquakes vulnerability area in Papua

    NASA Astrophysics Data System (ADS)

    Muhammad Fawzy Ismullah, M.; Massinai, Muh. Altin

    2016-05-01

    Geohazard is a geological occurrence which may lead to a huge loss for human. A mitigation of these natural disasters is one important thing to be done properly in order to reduce the risks. One of the natural disasters that frequently occurs in the Papua Province is the earthquake. This study applies the principle of Geospatial and its application for mapping the earthquake-prone area in the Papua region. It uses earthquake data, which is recorded for 36 years (1973-2009), fault location map, and ground acceleration map of the area. The earthquakes and fault map are rearranged into an earthquake density map, as well as an earthquake depth density map and fault density map. The overlaid data of these three maps onto ground acceleration map are then (compiled) to obtain an earthquake unit map. Some districts area, such as Sarmi, Nabire, and Dogiyai, are identified by a high vulnerability index. In the other hand, Waropen, Puncak, Merauke, Asmat, Mappi, and Bouven Digoel area shows lower index. Finally, the vulnerability index in other places is detected as moderate.

  11. Market mechanisms protect the vulnerable brain

    PubMed Central

    Ramchandran, Kanchna; Nayakankuppam, Dhananjay; Berg, Joyce; Tranel, Daniel

    2011-01-01

    Markets are mechanisms of social exchange, intended to facilitate trading. However, the question remains as to whether markets would help or hurt individuals with decision-makings deficits, as is frequently encountered in the case of cognitive aging. Essential for predicting future gains and losses in monetary and social domains, the striatal nuclei in the brain undergo structural, neurochemical, and functional decline with age. We correlated the efficacy of market mechanisms with dorsal striatal decline in an aging population, by using market based trading in the context of the 2008 U.S Presidential Elections (primary cycle). Impaired decision-makers displayed higher prediction error (difference between their prediction and actual outcome). Lower in vivo caudate volume was also associated with higher prediction error. Importantly, market-based trading protected older adults with lower caudate volume to a greater extent from their own poorly calibrated predictions. Counterintuitive to the traditional public perception of the market as a fickle, risky proposition where vulnerable traders are most surely to be burned, we suggest that market-based mechanisms protect individuals with brain-based decision-making vulnerabilities. PMID:21600226

  12. Evaluating operating system vulnerability to memory errors.

    SciTech Connect

    Ferreira, Kurt Brian; Bridges, Patrick G.; Pedretti, Kevin Thomas Tauke; Mueller, Frank; Fiala, David; Brightwell, Ronald Brian

    2012-05-01

    Reliability is of great concern to the scalability of extreme-scale systems. Of particular concern are soft errors in main memory, which are a leading cause of failures on current systems and are predicted to be the leading cause on future systems. While great effort has gone into designing algorithms and applications that can continue to make progress in the presence of these errors without restarting, the most critical software running on a node, the operating system (OS), is currently left relatively unprotected. OS resiliency is of particular importance because, though this software typically represents a small footprint of a compute node's physical memory, recent studies show more memory errors in this region of memory than the remainder of the system. In this paper, we investigate the soft error vulnerability of two operating systems used in current and future high-performance computing systems: Kitten, the lightweight kernel developed at Sandia National Laboratories, and CLE, a high-performance Linux-based operating system developed by Cray. For each of these platforms, we outline major structures and subsystems that are vulnerable to soft errors and describe methods that could be used to reconstruct damaged state. Our results show the Kitten lightweight operating system may be an easier target to harden against memory errors due to its smaller memory footprint, largely deterministic state, and simpler system structure.

  13. Airport vulnerability assessment: an analytical approach

    NASA Astrophysics Data System (ADS)

    Lazarick, Richard T.

    1998-12-01

    The Airport Vulnerability Assessment Project (AVAP) is the direct result of congressional funding of recommendation 3.13 of the White House Commission on Aviation Safety and Security. This project takes a new approach to the assessment of U.S. commercial airports. AVAP uses automation, analytical methods and tools to evaluate vulnerability and risk, and to analyze cost/benefits in a more quantitative manner. This paper addresses both the process used to conduct this program, as well as a generalized look at the results, which have been achieved for the initial airport assessments. The process description covers the acquisition approach, the project structure, and a review of the various methodologies and tools being used by the sever performing organizations (Abacus Technology, Battelle, CTI, Lockwood Greene, Naval Facilities Engineering Service Center, SAIC, and Science & Engineering Associates). The tools described include ASSESS, SAM, RiskWatch, CASRAP, and AVAT. Included in the process is the utilization of an advisory panel made up predominantly of experts from the National Laboratories 9Sandia, Oak Ridge, Argonne and Brookhaven). The results portion addresses the findings and products resulting from the initial airport assessments. High level (unrestricted) summaries of the results are presented, along with initial trends in commonly recommended security improvements (countermeasures). Opportunities for the application of optics technology are identified.

  14. Reducing societal vulnerability to drought: A methodology

    SciTech Connect

    Wilhite, D.A.

    1995-12-31

    Given worldwide experience with drought during the past several decades and the magnitude of associated impacts, it is apparent that vulnerability to extended periods of water shortage is escalating. Developing a national or provincial drought policy and preparedness plan is a complicated but essential first step toward reducing societal vulnerability. Until recently, nations had devoted little effort to drought preparedness, preferring instead the reactive or crisis management approach. Presently, an increasing number of nations are pursuing a more proactive approach that emphasizes the principles of risk management and sustainable development. Because of the multitude of impacts associated with drought and the numerous governmental agencies that have responsibility for some aspect of monitoring, assessment, mitigation, and planning, developing a policy and plan must be an integrated process within and between levels of government. This paper outlines a generic process that can be adopted by governments that desire to develop a more comprehensive and long-term approach to drought management and planning. Countries and states or provincial authorities that have adopted this approach is presented as case studies. This process is timely, given the declaration of the 1990s as the International Decade for Natural Disaster Reduction and the recent International Convention to Combat Desertification and Drought (June, 1994), an offshoot of deliberations at the United Nations Conference on Environment and Development.

  15. A network approach to evaluate ecosystem vulnerability

    NASA Astrophysics Data System (ADS)

    Goodwell, Allison; Kumar, Praveen

    2016-04-01

    Ecohydrologic systems exhibit shifts in behavior due to natural or human induced perturbations or stresses. These shifts result from changes in dependencies between many interacting components. A framework that defines a system based on these shifting interactions is needed to holistically evaluate properties such as resilience, vulnerability, or health that cannot be reached through the isolated study of component behaviors. This study uses a network approach in which ecohydrologic time-series data are nodes, and information theoretic measures that capture various aspects of time dependencies are links. It has been shown that an information decomposition approach can be used to determine the relative redundant (shared by multiple source nodes to a target), synergistic (arising only from the knowledge of multiple source nodes), or unique (only provided by an individual source node) information within a given detected link. We construct networks from flux tower and ecohydrologic model output nodes and evaluate how these evolve in terms of connectivity, dominant time scales of interactions, link uniqueness, and link stability over time windows ranging from several hours to several weeks as ecosystems respond to shifting environmental conditions. We associate these network properties with simulated and observed vegetation responses, and show that a network framework can be used to detect critical interactions that dictate ecosystem vulnerabilities to extremes.

  16. Vulnerability of housing buildings in Bucharest, Romania

    NASA Astrophysics Data System (ADS)

    Bostenaru, M.

    2009-04-01

    The author participates to the World Housing Encyclopedia project (www.world-housing.net), an internet based database of housing buildings in earthquake prone areas of the world. This is a voluntary project run by the Earthquake Engineering Research Institute, Oakland, California and the International Association of Earthquake Engineering, financial means being available only for the website where the information is shared. For broader dissemination in 2004 a summary publication of the reports to date was published. The database can be querried for various parameters and browsed after geographic distribution. Participation is open to any housing experts. Between 2003 and 2006 the author was also member of the editorial board. The author contributed numerous reports about building types in Romania, and each one about building types in Germany and Switzerland. This presentation will be about the contributed reports on building types in Romania. To the Encyclopedia eight reports on building types from Bucharest were contributed, while in further research of the author one more was similarly described regarding the vulnerability and the seismic retrofit. The selection of these types was done considering the historic development of the built substance in Bucharest from 1850 on, time from which a representative amount of housing buildings which can be classified in typologies can be found in Bucharest. While the structural types are not necessarily characteristic for the style, since the style has other time limits, often appearing before the type became common and then remaining being practiced also after another style gained ground, a historic succession can be seen also in this case. The nine types considered can be grouped in seven time categories: - the time 1850-1880, for a vernacular housing type with masonry load bearing walls and timber floors, - the time 1880-1920, for the type of two storey or multi-storey house with masonry walls and timber floors (in which

  17. Social vulnerability assessment: a growing practice in Europe?

    NASA Astrophysics Data System (ADS)

    Tapsell, S.; McC arthy, S.

    2012-04-01

    This paper builds upon work on social vulnerability from the CapHaz-Net consortium, an ongoing research project funded by the European Commission in its 7th Framework Programme. The project focuses on the social dimensions of natural hazards, as well as on regional practices of risk prevention and management, and aims at improving the resilience of European societies to natural hazards, paying particular attention to social capacity building. The topic of social vulnerability is one of seven themes being addressed in the project. There are various rationales for examining the relevance of social vulnerability to natural hazards. Vulnerability assessment has now been accepted as a requirement for the effective development of emergency management capability, and assessment of social vulnerability has been recognised as being integral to understanding the risk to natural hazards. The aim of our research was to examine social vulnerability, how it might be understood in the context of natural hazards in Europe, and how social vulnerability can be addressed to increase social capacity. The work comprised a review of research on social vulnerability to different natural hazards within Europe and included concepts and definitions of social vulnerability (and related concepts), the purpose of vulnerability assessment and who decides who is vulnerable, different approaches to assessing or measuring social vulnerability (such as the use of 'classical' quantitative vulnerability indicators and qualitative community-based approaches, along with the advantages and disadvantages of both), conceptual frameworks for assessing social vulnerability and three case studies of social vulnerability studies within Europe: flash floods in the Italian Alps, fluvial flooding in Germany and heat waves in Spain. The review reveals variable application of social vulnerability analysis across Europe and there are indications why this might be the case. Reasons could range from the scale of

  18. Social vulnerability indicators as a sustainable planning tool

    SciTech Connect

    Lee, Yung-Jaan

    2014-01-15

    In the face of global warming and environmental change, the conventional strategy of resource centralization will not be able to cope with a future of increasingly extreme climate events and related disasters. It may even contribute to inter-regional disparities as a result of these events. To promote sustainable development, this study offers a case study of developmental planning in Chiayi, Taiwan and a review of the relevant literature to propose a framework of social vulnerability indicators at the township level. The proposed framework can not only be used to measure the social vulnerability of individual townships in Chiayi, but also be used to capture the spatial developmental of Chiayi. Seventeen social vulnerability indicators provide information in five dimensions. Owing to limited access to relevant data, the values of only 13 indicators were calculated. By simply summarizing indicators without using weightings and by using zero-mean normalization to standardize the indicators, this study calculates social vulnerability scores for each township. To make social vulnerability indicators more useful, this study performs an overlay analysis of social vulnerability and patterns of risk associated with national disasters. The social vulnerability analysis draws on secondary data for 2012 from Taiwan's National Geographic Information System. The second layer of analysis consists of the flood potential ratings of the Taiwan Water Resources Agency as an index of biophysical vulnerability. The third layer consists of township-level administrative boundaries. Analytical results reveal that four out of the 18 townships in Chiayi not only are vulnerable to large-scale flooding during serious flood events, but also have the highest degree of social vulnerability. Administrative boundaries, on which social vulnerability is based, do not correspond precisely to “cross-administrative boundaries,” which are characteristics of the natural environment. This study adopts

  19. Susceptibility to mountain hazards in Austria - paradigms of vulnerability revisited

    NASA Astrophysics Data System (ADS)

    Fuchs, Sven

    2010-05-01

    The concept of vulnerability is pillared by multiple disciplinary theories underpinning either a technical or a social origin of the concept and resulting in a range of paradigms for either a qualitative or quantitative assessment of vulnerability. However, efforts to reduce susceptibility to hazards and to create disaster-resilient communities require intersections among these theories, since human activity cannot be seen independently from the environmental setting. Acknowledging different roots of disciplinary paradigms, issues determining structural, economic, institutional and social vulnerability are discussed with respect to mountain hazards in Austria. The underlying idea of taking such an integrative viewpoint was the cognition that human action in mountain environments affects the state of vulnerability, and the state of vulnerability in turn shapes the possibilities of human action. It is argued that structural vulnerability as originator results in considerable economic vulnerability, generated by the institutional settings of dealing with natural hazards and shaped by the overall societal framework. Hence, the vulnerability of a specific location and within a considered point of time is triggered by the hazardous event and the related physical susceptibility of structures, such as buildings located on a torrent fan. Depending on the specific institutional settings, economic vulnerability of individuals or of the society results, above all with respect to imperfect loss compensation mechanisms in the areas under investigation. While this potential for harm can be addressed as social vulnerability, the concept of institutional vulnerability has been developed with respect to the overall political settings of governmental risk management. As a result, the concept of vulnerability, as being used in natural sciences, can be extended by integration of possible reasons why such physical susceptibility of structures exists, and by integration of compensation

  20. Benchmark analysis for quantifying urban vulnerability to terrorist incidents.

    PubMed

    Piegorsch, Walter W; Cutter, Susan L; Hardisty, Frank

    2007-12-01

    We describe a quantitative methodology to characterize the vulnerability of U.S. urban centers to terrorist attack, using a place-based vulnerability index and a database of terrorist incidents and related human casualties. Via generalized linear statistical models, we study the relationships between vulnerability and terrorist events, and find that our place-based vulnerability metric significantly describes both terrorist incidence and occurrence of human casualties from terrorist events in these urban centers. We also introduce benchmark analytic technologies from applications in toxicological risk assessment to this social risk/vulnerability paradigm, and use these to distinguish levels of high and low urban vulnerability to terrorism. It is seen that the benchmark approach translates quite flexibly from its biological roots to this social scientific archetype.

  1. Intravascular probe for detection of vulnerable plaque

    NASA Astrophysics Data System (ADS)

    Patt, Bradley E.; Iwanczyk, Jan S.; MacDonald, Lawrence R.; Yamaguchi, Yuko; Tull, Carolyn R.; Janecek, Martin; Hoffman, Edward J.; Strauss, H. William; Tsugita, Ross; Ghazarossian, Vartan

    2001-12-01

    Coronary angiography is unable to define the status of the atheroma, and only measures the luminal dimensions of the blood vessel, without providing information about plaque content. Up to 70% of heart attacks are caused by minimally obstructive vulnerable plaques, which are too small to be detected adequately by angiography. We have developed an intravascular imaging detector to identify vulnerable coronary artery plaques. The detector works by sensing beta or conversion electron radiotracer emissions from plaque-binding radiotracers. The device overcomes the technical constraints of size, sensitivity and conformance to the intravascular environment. The detector at the distal end of the catheter uses six 7mm long by 0.5mm diameter scintillation fibers coupled to 1.5m long plastic fibers. The fibers are offset from each other longitudinally by 6mm and arranged spirally around a guide wire in the catheter. At the proximal end of the catheter the optical fibers are coupled to an interface box with a snap on connector. The interface box contains a position sensitive photomultiplier tube (PSPMT) to decode the individual fibers. The whole detector assembly fits into an 8-French (2.7 mm in diameter) catheter. The PSPMT image is further decoded with software to give a linear image, the total instantaneous count rate and an audio output whose tone corresponds to the count rate. The device was tested with F-18 and Tl-204 sources. Spectrometric response, spatial resolution, sensitivity and beta to background ratio were measured. System resolution is 6 mm and the sensitivity is >500 cps / micrometers Ci when the source is 1 mm from the detector. The beta to background ratio was 11.2 for F-18 measured on a single fiber. The current device will lead to a system allowing imaging of labeled vulnerable plaque in coronary arteries. This type of signature is expected to enable targeted and cost effective therapies to prevent acute coronary artery diseases such as: unstable angina

  2. Cyber / Physical Security Vulnerability Assessment Integration

    SciTech Connect

    MacDonald, Douglas G.; Simpkins, Bret E.

    2012-07-28

    Abstract Both physical protection and cyber security domains offer solutions for the discovery of vulnerabilities through the use of various assessment processes and software tools. Each vulnerability assessment (VA) methodology provides the ability to identify and categorize vulnerabilities, and quantifies the risks within their own areas of expertise. Neither approach fully represents the true potential security risk to a site and/or a facility, nor comprehensively assesses the overall security posture. The technical approach to solving this problem was to identify methodologies and processes that blend the physical and cyber security assessments, and develop tools to accurately quantify the unaccounted for risk. SMEs from both the physical and the cyber security domains developed the blending methodologies, and cross trained each other on the various aspects of the physical and cyber security assessment processes. A local critical infrastructure entity volunteered to host a proof of concept physical/cyber security assessment, and the lessons learned have been leveraged by this effort. The four potential modes of attack an adversary can use in approaching a target are; Physical Only Attack, Cyber Only Attack, Physical Enabled Cyber Attack, and the Cyber Enabled Physical Attack. The Physical Only and the Cyber Only pathway analysis are two of the most widely analyzed attack modes. The pathway from an off-site location to the desired target location is dissected to ensure adversarial activity can be detected and neutralized by the protection strategy, prior to completion of a predefined task. This methodology typically explores a one way attack from the public space (or common area) inward towards the target. The Physical Enabled Cyber Attack and the Cyber Enabled Physical Attack are much more intricate. Both scenarios involve beginning in one domain to affect change in the other, then backing outward to take advantage of the reduced system effectiveness, before

  3. Cyber Security Vulnerability Impact on I&C Reliability

    SciTech Connect

    Hadley, Mark D.; McBride, Justin B.

    2006-11-01

    We present a discussion of the cyber security vulnerability impact on instrument and control reliability. In the discussion we demonstrate the likely vector of attack and vulnerabilities associated with commodity hardware, protocols and communication media. The current fleet of nuclear power plants in the United States utilizes aging analog instrument and control systems which are more frequently suffering from obsolescence and failure. The commodity equipment available now and in the near future incorporates features from information technology systems which compound cyber vulnerabilities.

  4. Tripartite Governance: Enabling Successful Implementations with Vulnerable Populations.

    PubMed

    Kennedy, Margaret Ann

    2016-01-01

    Vulnerable populations are often at a distinct disadvantage when it comes to the implementation of health information systems in an equitable, appropriate, and timely manner. The disadvantages experienced by vulnerable populations are innumerable and include lack of representation, lack of appropriate levels of funding, lack of resources and capacity, and lack of representation. Increasingly, models of representation for complex implementations involve a tripartite project governance model. This tripartite partnership distributes accountability across all partners, and ensures that vulnerable populations have an equitable contribution to the direction of implementation according to their needs. This article shares lessons learned and best practices from complex tripartite partnerships supporting implementations with vulnerable populations in Canada. PMID:27332182

  5. Assessing Vulnerability to Drought on a pan-European scale

    NASA Astrophysics Data System (ADS)

    Urquijo, Julia; De Stefano, Lucia; González-Tánago, Itziar; Blauhut, Veit; Stahl, Kerstin

    2014-05-01

    During the past decade, a number of theoretical frameworks have been defined within the Disaster Risk Reduction and Climate Change communities to assess drought vulnerability at different scales, sectors, socio-political contexts, and geo-climatic conditions. However, there is still little consensus around the criteria, dimensions and factors used in these assessments; and none of them has been applied at a pan-European scale. This is due to a triple complexity. Firstly, drought as a natural hazard is a complex phenomenon due to the difficulty of determining its onset and its multiscale, multifaceted and dynamic nature. Secondly, there is an on-going debate regarding the concept of vulnerability and its constitutive elements, together with an important diversity of theoretical approaches to assess it. Finally, Europe's diversity in bioclimatic conditions, national water use practice and water use policies adds a challenging characteristic for working on pan-European scale. This work addresses the challenge of defining a methodological approach to the assessment of vulnerability factors to drought at a pan-European scale. For this purpose, we first review existing conceptual frameworks as well as of past initiatives for drought vulnerability assessment. The literature review showed that the high complexity of drought vulnerability assessment requires a clear definition of the concept of vulnerability and the associated terms, and that, before undertaking any assessment, it is necessary to clearly define the "vulnerable unit" i.e. replying to the questions 'whose vulnerability is being assessed?' and 'vulnerability to what type of impact?'. In this context, this work proposes the application of a factor-based approach, consisting in the analysis of significant factors that influence vulnerability in the context of specific situations of potential vulnerability. Those situations are framed within the specific drought characteristics of four different geoclimatic macro

  6. Modelling homogeneous regions of social vulnerability to malaria in Rwanda.

    PubMed

    Bizimana, Jean Pierre; Kienberger, Stefan; Hagenlocher, Michael; Twarabamenye, Emmanuel

    2016-03-31

    Despite the decline in malaria incidence due to intense interventions, potentials for malaria transmission persist in Rwanda. To eradicate malaria in Rwanda, strategies need to expand beyond approaches that focus solely on malaria epidemiology and also consider the socioeconomic, demographic and biological/disease-related factors that determine the vulnerability of potentially exposed populations. This paper analyses current levels of social vulnerability to malaria in Rwanda by integrating a set of weighted vulnerability indicators. The paper uses regionalisation techniques as a spatially explicit approach for delineating homogeneous regions of social vulnerability to malaria. This overcomes the limitations of administrative boundaries for modelling the trans-boundary social vulnerability to malaria. The utilised approach revealed high levels of social vulnerability to malaria in the highland areas of Rwanda, as well as in remote areas where populations are more susceptible. Susceptibility may be due to the populations' lacking the capacity to anticipate mosquito bites, or lacking resilience to cope with or recover from malaria infection. By highlighting the most influential indicators of social vulnerability to malaria, the applied approach indicates which vulnerability domains need to be addressed, and where appropriate interventions are most required. Interventions to improve the socioeconomic development in highly vulnerable areas could prove highly effective, and provide sustainable outcomes against malaria in Rwanda. This would ultimately increase the resilience of the population and their capacity to better anticipate, cope with, and recover from possible infection.

  7. Modelling homogeneous regions of social vulnerability to malaria in Rwanda.

    PubMed

    Bizimana, Jean Pierre; Kienberger, Stefan; Hagenlocher, Michael; Twarabamenye, Emmanuel

    2016-01-01

    Despite the decline in malaria incidence due to intense interventions, potentials for malaria transmission persist in Rwanda. To eradicate malaria in Rwanda, strategies need to expand beyond approaches that focus solely on malaria epidemiology and also consider the socioeconomic, demographic and biological/disease-related factors that determine the vulnerability of potentially exposed populations. This paper analyses current levels of social vulnerability to malaria in Rwanda by integrating a set of weighted vulnerability indicators. The paper uses regionalisation techniques as a spatially explicit approach for delineating homogeneous regions of social vulnerability to malaria. This overcomes the limitations of administrative boundaries for modelling the trans-boundary social vulnerability to malaria. The utilised approach revealed high levels of social vulnerability to malaria in the highland areas of Rwanda, as well as in remote areas where populations are more susceptible. Susceptibility may be due to the populations' lacking the capacity to anticipate mosquito bites, or lacking resilience to cope with or recover from malaria infection. By highlighting the most influential indicators of social vulnerability to malaria, the applied approach indicates which vulnerability domains need to be addressed, and where appropriate interventions are most required. Interventions to improve the socioeconomic development in highly vulnerable areas could prove highly effective, and provide sustainable outcomes against malaria in Rwanda. This would ultimately increase the resilience of the population and their capacity to better anticipate, cope with, and recover from possible infection. PMID:27063738

  8. Empirical Estimates of 0Day Vulnerabilities in Control Systems

    SciTech Connect

    Miles A. McQueen; Wayne F. Boyer; Sean M. McBride; Trevor A. McQueen

    2009-01-01

    We define a 0Day vulnerability to be any vulnerability, in deployed software, which has been discovered by at least one person but has not yet been publicly announced or patched. These 0Day vulnerabilities are of particular interest when assessing the risk to well managed control systems which have already effectively mitigated the publicly known vulnerabilities. In these well managed systems the risk contribution from 0Days will have proportionally increased. To aid understanding of how great a risk 0Days may pose to control systems, an estimate of how many are in existence is needed. Consequently, using the 0Day definition given above, we developed and applied a method for estimating how many 0Day vulnerabilities are in existence on any given day. The estimate is made by: empirically characterizing the distribution of the lifespans, measured in days, of 0Day vulnerabilities; determining the number of vulnerabilities publicly announced each day; and applying a novel method for estimating the number of 0Day vulnerabilities in existence on any given day using the number of vulnerabilities publicly announced each day and the previously derived distribution of 0Day lifespans. The method was first applied to a general set of software applications by analyzing the 0Day lifespans of 491 software vulnerabilities and using the daily rate of vulnerability announcements in the National Vulnerability Database. This led to a conservative estimate that in the worst year there were, on average, 2500 0Day software related vulnerabilities in existence on any given day. Using a smaller but intriguing set of 15 0Day software vulnerability lifespans representing the actual time from discovery to public disclosure, we then made a more aggressive estimate. In this case, we estimated that in the worst year there were, on average, 4500 0Day software vulnerabilities in existence on any given day. We then proceeded to identify the subset of software applications likely to be used in some

  9. Vulnerable Subjects: Why Does Informed Consent Matter?

    PubMed

    Goodwin, Michele

    2016-09-01

    This special issue of the Journal Law, Medicine & Ethics takes up the concern of informed consent, particularly in times of controversy. The dominant moral dilemmas that frame traditional bioethical concerns address medical experimentation on vulnerable subjects; physicians assisting their patients in suicide or euthanasia; scarce resource allocation and medical futility; human trials to develop drugs; organ and tissue donation; cloning; xenotransplantation; abortion; human enhancement; mandatory vaccination; and much more. The term "bioethics" provides a lens, language, and guideposts to the study of medical ethics. It is worth noting, however, that medical experimentation is neither new nor exclusive to one country. Authors in this issue address thorny subjects that span borders and patients: from matters dealing with children and vaccination to the language and perception of consent.

  10. Exploiting epigenetic vulnerabilities for cancer therapeutics.

    PubMed

    Mair, Barbara; Kubicek, Stefan; Nijman, Sebastian M B

    2014-03-01

    Epigenetic deregulation is a hallmark of cancer, and there has been increasing interest in therapeutics that target chromatin-modifying enzymes and other epigenetic regulators. The rationale for applying epigenetic drugs to treat cancer is twofold. First, epigenetic changes are reversible, and drugs could therefore be used to restore the normal (healthy) epigenetic landscape. However, it is unclear whether drugs can faithfully restore the precancerous epigenetic state. Second, chromatin regulators are often mutated in cancer, making them attractive drug targets. However, in most instances it is unknown whether cancer cells are addicted to these mutated chromatin proteins, or whether their mutation merely results in epigenetic instability conducive to the selection of secondary aberrations. An alternative incentive for targeting chromatin regulators is the exploitation of cancer-specific vulnerabilities, including synthetic lethality, caused by epigenetic deregulation. We review evidence for the hypothesis that mechanisms other than oncogene addiction are a basis for the application of epigenetic drugs, and propose future research directions.

  11. Method and tool for network vulnerability analysis

    DOEpatents

    Swiler, Laura Painton; Phillips, Cynthia A.

    2006-03-14

    A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

  12. MODELING UNDERGROUND STRUCTURE VULNERABILITY IN JOINTED ROCK

    SciTech Connect

    R. SWIFT; D. STEEDMAN

    2001-02-01

    The vulnerability of underground structures and openings in deep jointed rock to ground shock attack is of chief concern to military planning and security. Damage and/or loss of stability to a structure in jointed rock, often manifested as brittle failure and accompanied with block movement, can depend significantly on jointed properties, such as spacing, orientation, strength, and block character. We apply a hybrid Discrete Element Method combined with the Smooth Particle Hydrodynamics approach to simulate the MIGHTY NORTH event, a definitive high-explosive test performed on an aluminum lined cylindrical opening in jointed Salem limestone. Representing limestone with discrete elements having elastic-equivalence and explicit brittle tensile behavior and the liner as an elastic-plastic continuum provides good agreement with the experiment and damage obtained with finite-element simulations. Extending the approach to parameter variations shows damage is substantially altered by differences in joint geometry and liner properties.

  13. Trust, vulnerable populations, and genetic data sharing

    PubMed Central

    Arias, Jalayne J.; Pham-Kanter, Genevieve; Gonzalez, Rosa; Campbell, Eric G.

    2015-01-01

    Recent policies and proposed regulations, including the Notice of Proposed Rulemaking for the Common Rule and the 2014 NIH Genetic Data Sharing Policy, seek to improve research subject protections. Protections for subjects whose genetic data is shared are critical to reduce risks such as loss of confidentiality, stigma, and discrimination. In the article ‘It depends whose data are being shared: considerations for genomic data sharing policies’, Robinson et al. provide a response to our article, ‘The Growth and Gaps of Genetic Data Sharing Policies’. Robinson et al. highlight the importance of individual and group preferences. In this article, we extend the conversation on models for improving protections which will mitigate consequences for individuals and groups that are vulnerable to stigma and discrimination. PMID:27774227

  14. Vulnerable Subjects: Why Does Informed Consent Matter?

    PubMed

    Goodwin, Michele

    2016-09-01

    This special issue of the Journal Law, Medicine & Ethics takes up the concern of informed consent, particularly in times of controversy. The dominant moral dilemmas that frame traditional bioethical concerns address medical experimentation on vulnerable subjects; physicians assisting their patients in suicide or euthanasia; scarce resource allocation and medical futility; human trials to develop drugs; organ and tissue donation; cloning; xenotransplantation; abortion; human enhancement; mandatory vaccination; and much more. The term "bioethics" provides a lens, language, and guideposts to the study of medical ethics. It is worth noting, however, that medical experimentation is neither new nor exclusive to one country. Authors in this issue address thorny subjects that span borders and patients: from matters dealing with children and vaccination to the language and perception of consent. PMID:27587443

  15. Disability pornography: the fetishization of women's vulnerabilities.

    PubMed

    Elman, R A

    1997-06-01

    This paper offers a critical exploration of a form of pornography consisting in sexual abuse and exploitation of women and girls with disabilities. This practice allows men to create and maintain their sexual dominance over the female gender. Disability pornography, like all other forms of pornography, but in its own way, contributes to the second-class status of all women, particularly those who are suffering from limitations in mobility and other disabilities. By promoting the castrating, dominant, violent image of women, pornography allows men to justify their abusive behaviors toward women. This form of pornography preys on the vulnerability of disabled women and increases the possibility that they will be abused. The sexually explicit lack of physical mobility is as celebrated in disability pornography as the political mobility of women is condemned in all genres of pornography. Amputee pornography is just one example of this brutal practice.

  16. Protection of vulnerable adults: an interdisciplinary workshop.

    PubMed

    Day, Mary Rose; Bantry-White, Eleanor; Glavin, Pauline

    2010-09-01

    This paper reports on the development, delivery, content and student evaluation of a comprehensive elder abuse and self-neglect workshop for public health nursing and social work students.The workshop provided an interdisciplinary shared learning experience for the students to prepare them for their critical role in safeguarding vulnerable adults. The aim of the workshop was to increase knowledge, awareness and understanding of roles and responsibilities and critical practice problems in the prevention and management of elder abuse and self-neglect. The shared learning approach provided clarity on roles and responsibility, valuing and respecting the contribution of each team member. The importance of building communication and trust with team members and clients was seen as critical. Through case studies and group discussion, assessment and practice skills were developed and awareness heightened on the complexity of the critical practice problems and ethical issues.

  17. Global trends and vulnerabilities of mangrove forests

    NASA Astrophysics Data System (ADS)

    Simard, M.; Fatoyinbo, T. E.; Rivera-Monroy, V. H.; Castaneda, E.; Roy Chowdhury, R.

    2015-12-01

    Mangrove forests are located along Earth's coastlines and estuaries within tropical and subtropical latitudes. They provide numerous services functioning as an extraordinary carbon sequestration system and serving as habitat and nursery for fish, crustaceans and amphibians. To coastal populations, they provide livelihood, food, lumber and act as an effective protection against tsunamis, storm surges and hurricanes. Their vulnerability to sea level rise is strongly related to their extraordinary ability to accumulate soils, which is in part related to their productivity and therefore canopy structure. As a first step to understand their vulnerability, we seek to understand mangrove dependencies on environmental and geophysical setting. To achieve this, we mapped mangrove canopy height and above ground biomass (AGB) at the Global scale. To identify mangrove forests, existing maps derived from a collection of Landsat data around the 2000 era were used. Using the Shuttle Radar Topography Mission elevation data collected in February of 2000, we produced a Global map of mangrove canopy height. The estimated heights were validated with the ICESat/Geoscience Altimeter System (GLAS) and in situ field data. Most importantly, field data were also used to derive relationships between canopy height and AGB. While the geographical coverage of in situ data is limited, ICESat/GLAS data provided extensive geographical coverage with independent estimates of maximum canopy height. These estimates were used to calibrate SRTM-estimates of height at the Global scale. We found the difference between GLAS RH100 and SRTM resulted from several sources of uncertainty that are difficult to isolate. These include natural variations of canopy structure with time, system errors from GLAS and SRTM, geo-location errors and discrepancies in spatial resolution. The Global canopy height map was trnasormed into AGB using the field-derived allometry. Depending on the scale of analysis and geographical

  18. Assessing Hydro-Ecological Vulnerability from Space

    NASA Astrophysics Data System (ADS)

    Stampoulis, D.; Andreadis, K.; Granger, S. L.; Fisher, J. B.; Turk, F. J.; Behrangi, A.; Das, N. N.; Ines, A.

    2015-12-01

    The main driver of economic growth in East Africa is agriculture. However, climate change and the resulting intensification of the hydrologic cycle will increase water limitation in this already drought-burdened region, and the challenge of ensuring food security is bound to become critical. Efforts must, therefore, be made to develop appropriate adaptation strategies for agriculture in such regions. Assessing and predicting ecosystem responses to global environmental change can advance management and decision support systems that would improve food security and economic development. The current study uses a plethora of multi-year remote sensing earth observations to study the hydro-ecological vulnerability of the various ecosystems in the water-stressed East African region to droughts. More specifically, we assess the hydrologic sensitivity and resilience of soil moisture and vegetation water content (derived from NRL's WindSat radiometer), during dry spells, for different dry-period durations, and for various vegetation categories. Spatiotemporal patterns and characteristics of the response of the two aforementioned variables to sustained precipitation deficits (derived from TRMM 3B42 V7), as well as their persistence in maintaining their stability are identified. We also assess changes, in space and time, in the normalized radar surface-backscattering cross-sections from NASA's QuikSCAT Scatterometer, to obtain information on the vegetation regimes, as well as changes in vegetation phenometrics using the enhanced vegetation index (EVI) derived from MODIS. Quantifying the response and characterizing the resilience of the two aforementioned major hydrological attributes using various remote sensing techniques that complement each other, can provide critical insight into the region's vulnerability and adaptive capacity with respect to rainfall variability.

  19. Ecosystems Vulnerability Challenge and Prize Competition

    NASA Astrophysics Data System (ADS)

    Smith, J. H.; Frame, M. T.; Ferriter, O.; Recker, J.

    2014-12-01

    Stimulating innovation and private sector entrepreneurship is an important way to advance the preparedness of communities, businesses and individuals for the impacts of climate change on certain aspects of ecosystems, such as: fire regimes; water availability; carbon sequestration; biodiversity conservation; weather-related hazards, and the spread of invasive species. The creation of tools is critical to help communities and natural resource managers better understand the impacts of climate change on ecosystems and the potential resulting implications for ecosystem services and conservation efforts. The Department of the Interior is leading an interagency effort to develop the Ecosystems Vulnerability theme as part of the President's Climate Action Plan. This effort will provide seamless access to relevant datasets that can help address such issues as: risk of wildfires to local communities and federal lands; water sensitivity to climate change; and understanding the role of ecosystems in a changing climate. This session will provide an overview of the proposed Ecosystem Vulnerability Challenge and Prize Competition, outlining the intended audience, scope, goals, and overall timeline. The session will provide an opportunity for participants to offer new ideas. Through the Challenge, access will be made available to critical datasets for software developers, engineers, scientists, students, and researchers to develop and submit applications addressing critical science issues facing our Nation today. Application submission criteria and guidelines will also be discussed. The Challenge will be open to all sectors and organizations (i.e. federal, non-federal, private sector, non-profits, and universities) within the United States. It is anticipated the Challenge will run from early January 2015 until spring of 2015.

  20. An Integrated Approach for Urban Earthquake Vulnerability Analyses

    NASA Astrophysics Data System (ADS)

    Düzgün, H. S.; Yücemen, M. S.; Kalaycioglu, H. S.

    2009-04-01

    The earthquake risk for an urban area has increased over the years due to the increasing complexities in urban environments. The main reasons are the location of major cities in hazard prone areas, growth in urbanization and population and rising wealth measures. In recent years physical examples of these factors are observed through the growing costs of major disasters in urban areas which have stimulated a demand for in-depth evaluation of possible strategies to manage the large scale damaging effects of earthquakes. Understanding and formulation of urban earthquake risk requires consideration of a wide range of risk aspects, which can be handled by developing an integrated approach. In such an integrated approach, an interdisciplinary view should be incorporated into the risk assessment. Risk assessment for an urban area requires prediction of vulnerabilities related to elements at risk in the urban area and integration of individual vulnerability assessments. However, due to complex nature of an urban environment, estimating vulnerabilities and integrating them necessities development of integrated approaches in which vulnerabilities of social, economical, structural (building stock and infrastructure), cultural and historical heritage are estimated for a given urban area over a given time period. In this study an integrated urban earthquake vulnerability assessment framework, which considers vulnerability of urban environment in a holistic manner and performs the vulnerability assessment for the smallest administrative unit, namely at neighborhood scale, is proposed. The main motivation behind this approach is the inability to implement existing vulnerability assessment methodologies for countries like Turkey, where the required data are usually missing or inadequate and decision makers seek for prioritization of their limited resources in risk reduction in the administrative districts from which they are responsible. The methodology integrates socio

  1. Social Vulnerability and Ebola Virus Disease in Rural Liberia

    PubMed Central

    2015-01-01

    The Ebola virus disease (EVD) epidemic that has stricken thousands of people in the three West African countries of Liberia, Sierra Leone, and Guinea highlights the lack of adaptive capacity in post-conflict countries. The scarcity of health services in particular renders these populations vulnerable to multiple interacting stressors including food insecurity, climate change, and the cascading effects of disease epidemics such as EVD. However, the spatial distribution of vulnerable rural populations and the individual stressors contributing to their vulnerability are unknown. We developed a Social Vulnerability Classification using census indicators and mapped it at the district scale for Liberia. According to the Classification, we estimate that districts having the highest social vulnerability lie in the north and west of Liberia in Lofa, Bong, Grand Cape Mount, and Bomi Counties. Three of these counties together with the capital Monrovia and surrounding Montserrado and Margibi counties experienced the highest levels of EVD infections in Liberia. Vulnerability has multiple dimensions and a classification developed from multiple variables provides a more holistic view of vulnerability than single indicators such as food insecurity or scarcity of health care facilities. Few rural Liberians are food secure and many cannot reach a medical clinic in <80 minutes. Our results illustrate how census and household survey data, when displayed spatially at a sub-county level, may help highlight the location of the most vulnerable households and populations. Our results can be used to identify vulnerability hotspots where development strategies and allocation of resources to address the underlying causes of vulnerability in Liberia may be warranted. We demonstrate how social vulnerability index approaches can be applied in the context of disease outbreaks, and our methods are relevant elsewhere. PMID:26325519

  2. Landslide vulnerability criteria: a case study from Umbria, central Italy.

    PubMed

    Galli, Mirco; Guzzetti, Fausto

    2007-10-01

    Little is known about the vulnerability to landslides, despite landslides causing frequent and widespread damage to the population and the built-up environment in many areas of the world. Lack of information about vulnerability to landslides limits our ability to determine landslide risk. This paper provides information on the vulnerability of buildings and roads to landslides in Umbria, central Italy. Information on 103 landslides of the slide and slide-earth flow types that have resulted in damage to buildings and roads at 90 sites in Umbria is used to establish dependencies between the area of the landslide and the vulnerability to landslides. The dependencies obtained are applied in the hills surrounding the town of Collazzone, in central Umbria, an area for which a detailed landslide inventory map is available. By exploiting the landslide inventory and the established vulnerability curves, the geographical distribution of the vulnerability to landslides is mapped and statistics of the expected damage are calculated. Reliability and limits of the vulnerability thresholds and of the obtained vulnerability assessment are discussed.

  3. Development and Demography of Perceived Vulnerability in Youngsters.

    ERIC Educational Resources Information Center

    Gochman, David S.

    In order to assess children's perceived vulnerability to health problems, a longitudinal study was designed to observe third and seventh graders at five intervals over a 2-year period. The hypotheses tested concerned relationships between perceived vulnerability to health problems and age, sex, and socioeconomic status. Data were obtained from a…

  4. Temporal and spatial changes in social vulnerability to natural hazards

    PubMed Central

    Cutter, Susan L.; Finch, Christina

    2008-01-01

    During the past four decades (1960–2000), the United States experienced major transformations in population size, development patterns, economic conditions, and social characteristics. These social, economic, and built-environment changes altered the American hazardscape in profound ways, with more people living in high-hazard areas than ever before. To improve emergency management, it is important to recognize the variability in the vulnerable populations exposed to hazards and to develop place-based emergency plans accordingly. The concept of social vulnerability identifies sensitive populations that may be less likely to respond to, cope with, and recover from a natural disaster. Social vulnerability is complex and dynamic, changing over space and through time. This paper presents empirical evidence on the spatial and temporal patterns in social vulnerability in the United States from 1960 to the present. Using counties as our study unit, we found that those components that consistently increased social vulnerability for all time periods were density (urban), race/ethnicity, and socioeconomic status. The spatial patterning of social vulnerability, although initially concentrated in certain geographic regions, has become more dispersed over time. The national trend shows a steady reduction in social vulnerability, but there is considerable regional variability, with many counties increasing in social vulnerability during the past five decades. PMID:18268336

  5. The Naïve nurse: revisiting vulnerability for nursing

    PubMed Central

    2012-01-01

    Background Nurses in the Western world have given considerable attention to the concept of vulnerability in recent decades. However, nurses have tended to view vulnerability from an individualistic perspective, and have rarely taken into account structural or collective dimensions of the concept. As the need grows for health workers to engage in the global health agenda, nurses must broaden earlier works on vulnerability, noting that conventional conceptualizations and practical applications on the notion of vulnerability warrant extension to include more collective conceptualizations thereby making a more complete understanding of vulnerability in nursing discourse. Discussion The purpose of this paper is to examine nursing contributions to the concept of vulnerability and consider how a broader perspective that includes socio-political dimensions may assist nurses to reach beyond the immediate milieu of the patient into the dominant social, political, and economic structures that produce and sustain vulnerability. Summary By broadening nurse’s conceptualization of vulnerability, nurses can obtain the consciousness needed to move beyond a peripheral role of nursing that has been dominantly situated within institutional settings to contribute in the larger arena of social, economic, political and global affairs. PMID:22520841

  6. Social Vulnerability Scale for Older Adults: Validation Study

    ERIC Educational Resources Information Center

    Pinsker, Donna M.; Stone, Valerie; Pachana, Nancy; Greenspan, Stephen

    2006-01-01

    The Social Vulnerability Scale (SVS), an informant-report of social vulnerability for older adults, was piloted in a sample of 167 undergraduate students (63 male, 104 female) from the University of Queensland. Participants aged 18 - 53 (M = 25.53 years, SD = 7.83 years) completed the SVS by rating a relative or friend aged [greater than or equal…

  7. A framework for understanding old-age vulnerabilities

    PubMed Central

    SCHRÖDER-BUTTERFILL, ELISABETH; MARIANTI, RULY

    2007-01-01

    Identifying vulnerable older people and understanding the causes and consequences of their vulnerability is of human concern and an essential task of social policy. To date, vulnerability in old age has mainly been approached by identifying high risk groups, like the poor, childless, frail or isolated. Yet vulnerability is the outcome of complex interactions of discrete risks, namely of being exposed to a threat, of a threat materialising, and of lacking the defences or resources to deal with a threat. In this article, we review approaches to vulnerability in various disciplines in order to develop a systematic framework for approaching vulnerability. This framework distinguishes and examines the interactions among the domains of exposure, threats, coping capacities and outcomes. Drawing on European and Asian gerontological literature, we discuss what might be meant by these domains and their place in the understanding of vulnerability in old age. Two case studies are presented - one on homelessness in Britain, the other on familial care provision in Indonesia - to illustrate the ways in which specific vulnerabilities are created and distributed over the lifecourse. PMID:23750062

  8. Consistency in Children's Perceptions of Vulnerability to Health Problems.

    ERIC Educational Resources Information Center

    Gochman, David S.; And Others

    This study continued to replicate and extend research dealing with children's perceptions of vulnerability to health problems. Responses of 774 children, 8 to 17 years old, to 15 questions about the likelihood of encountering various health problems confirmed previous results indicating that perceived vulnerability is consistent across health…

  9. Scenario-based Storm Surge Vulnerability Assessment of Catanduanes

    NASA Astrophysics Data System (ADS)

    Suarez, J. K. B.

    2015-12-01

    After the devastating storm surge effect of Typhoon Haiyan, the public recognized an improved communication about risks, vulnerabilities and what is threatened by storm surge. This can be provided by vulnerability maps which allow better visual presentations and understanding of the risks and vulnerabilities. Local implementers can direct the resources needed for protection of these areas. Moreover, vulnerability and hazard maps are relevant in all phases of disaster management designed by the National Disaster Risk Reduction Council (NDRRMC) - disaster preparedness, prevention and mitigation and response and recovery and rehabilitation. This paper aims to analyze the vulnerability of Catanduanes, a coastal province in the Philippines, to storm surges in terms of four parameters: population, built environment, natural environment and agricultural production. The vulnerability study relies on the storm surge inundation maps based on the Department of Science and Technology Nationwide Operational Assessment of Hazards' (DOST-Project NOAH) proposed four Storm Surge Advisory (SSA) scenarios (1-2, 3, 4, and 5 meters) for predicting storm surge heights. To determine total percent affected for each parameter elements, an overlay analysis was performed in ArcGIS Desktop. Moreover, vulnerability and hazard maps are generated as a final output and a tool for visualizing the impacts of storm surge event at different surge heights. The result of this study would help the selected province to know their present condition and adapt strategies to strengthen areas where they are found to be most vulnerable in order to prepare better for the future.

  10. Regional vulnerability of longitudinal cortical association connectivity

    PubMed Central

    Ceschin, Rafael; Lee, Vince K.; Schmithorst, Vince; Panigrahy, Ashok

    2015-01-01

    Preterm born children with spastic diplegia type of cerebral palsy and white matter injury or periventricular leukomalacia (PVL), are known to have motor, visual and cognitive impairments. Most diffusion tensor imaging (DTI) studies performed in this group have demonstrated widespread abnormalities using averaged deterministic tractography and voxel-based DTI measurements. Little is known about structural network correlates of white matter topography and reorganization in preterm cerebral palsy, despite the availability of new therapies and the need for brain imaging biomarkers. Here, we combined novel post-processing methodology of probabilistic tractography data in this preterm cohort to improve spatial and regional delineation of longitudinal cortical association tract abnormalities using an along-tract approach, and compared these data to structural DTI cortical network topology analysis. DTI images were acquired on 16 preterm children with cerebral palsy (mean age 5.6 ± 4) and 75 healthy controls (mean age 5.7 ± 3.4). Despite mean tract analysis, Tract-Based Spatial Statistics (TBSS) and voxel-based morphometry (VBM) demonstrating diffusely reduced fractional anisotropy (FA) reduction in all white matter tracts, the along-tract analysis improved the detection of regional tract vulnerability. The along-tract map-structural network topology correlates revealed two associations: (1) reduced regional posterior–anterior gradient in FA of the longitudinal visual cortical association tracts (inferior fronto-occipital fasciculus, inferior longitudinal fasciculus, optic radiation, posterior thalamic radiation) correlated with reduced posterior–anterior gradient of intra-regional (nodal efficiency) metrics with relative sparing of frontal and temporal regions; and (2) reduced regional FA within frontal–thalamic–striatal white matter pathways (anterior limb/anterior thalamic radiation, superior longitudinal fasciculus and cortical spinal tract) correlated

  11. Vulnerable subjects? The case of nonhuman animals in experimentation.

    PubMed

    Johnson, Jane

    2013-12-01

    The concept of vulnerability is deployed in bioethics to, amongst other things, identify and remedy harms to participants in research, yet although nonhuman animals in experimentation seem intuitively to be vulnerable, this concept and its attendant protections are rarely applied to research animals. I want to argue, however, that this concept is applicable to nonhuman animals and that a new taxonomy of vulnerability developed in the context of human bioethics can be applied to research animals. This taxonomy does useful explanatory work, helping to pinpoint the limitations of the 3Rs/welfare approach currently adopted in the context of animal experimentation. On this account, the 3Rs/welfare approach fails to deliver for nonhuman animals in experimentation because it effectively addresses only one element of their vulnerability (inherent) and paradoxically through the institution of Animal Ethics Committees intended to protect experimental animals in fact generates new vulnerabilities that exacerbate their already precarious situation.

  12. Assessing girls' HIV vulnerability: evidence from Botswana, Malawi and Mozambique.

    PubMed

    Underwood, Carol R; Schwandt, Hilary M

    2016-07-01

    Past research documents multiple factors associated with girls' susceptibility to human immunodeficiency virus transmission; yet a literature review found no systematic approach to measure vulnerability. This study characterized, developed and tested a set of indicators to measure girls' vulnerability, resulting in the vulnerable girls index (VGI). A quasi- experimental, separate-sample pre-/post-test design was used to test the index. Adolescent girls were randomly drawn for the pre-test (2277 respondents) and post-test (1418 respondents) from 16 purposively selected communities in Botswana, Malawi and Mozambique. The higher the VGI score-or the more vulnerable the girl-the more likely she was to report premarital sexual experience across the three countries and the more likely she was to report low agency to insist upon condom use in Botswana and Mozambique. The VGI can be used to assess girls' vulnerability levels across time and space for policy and programme planning purposes, and as part of programme evaluations.

  13. [Assessment of eco-environmental vulnerability of Hainan Island, China].

    PubMed

    Huang, Bao-rong; Ouyang, Zhi-yun; Zhang, Hui-zhi; Zhang, Li-hua; Zheng, Hua

    2009-03-01

    Based on the assessment method of environmental vulnerability constructed by SOPAC and UNEP, this paper constructed an indicator system from three sub-themes including hazard, resistance, and damage to assess the eco-environmental vulnerability of Hainan Island. The results showed that Hainan Island was suffering a middling level eco-environmental hazard, and the main hazards came from some intensive human activities such as intensive agriculture, mass tourism, mining, and a mass of solid wastes thrown by islanders and tourists. Some geographical characters such as larger land area, larger altitude range, integrated geographical form, and abundant habitat types endowed Hainan Island higher resistance to environmental hazards. However, disturbed by historical accumulative artificial and natural hazards, the Island ecosystem had showed serious ecological damage, such as soil degradation and biodiversity loss. Comprehensively considered hazard, resistance, damage, and degradation, the comprehensive environmental vulnerability of the Island was at a middling level. Some indicators showed lower vulnerability, but some showed higher vulnerability.

  14. Analyses Of Two End-User Software Vulnerability Exposure Metrics

    SciTech Connect

    Jason L. Wright; Miles McQueen; Lawrence Wellman

    2012-08-01

    The risk due to software vulnerabilities will not be completely resolved in the near future. Instead, putting reliable vulnerability measures into the hands of end-users so that informed decisions can be made regarding the relative security exposure incurred by choosing one software package over another is of importance. To that end, we propose two new security metrics, average active vulnerabilities (AAV) and vulnerability free days (VFD). These metrics capture both the speed with which new vulnerabilities are reported to vendors and the rate at which software vendors fix them. We then examine how the metrics are computed using currently available datasets and demonstrate their estimation in a simulation experiment using four different browsers as a case study. Finally, we discuss how the metrics may be used by the various stakeholders of software and to software usage decisions.

  15. The meaning of vulnerability to nurses caring for older people.

    PubMed

    Stenbock-Hult, Bettina; Sarvimäki, Anneli

    2011-01-01

    Research concerning work on caring for older people shows that care providers experience a variety of consuming emotions and stress. They can be said to be in a vulnerable position. It is not known, however, how the care providers themselves understand vulnerability. The aim of this study was to illuminate the meaning of vulnerability to care providers caring for older people. A qualitative interpretive approach was adopted. Data were collected through tape-recorded interviews with 16 female registered and practical nurses who were experienced in caring for older people. Qualitative analysis resulted in one core theme and six themes with subthemes. The core theme showed that, for the participating nurses, vulnerability essentially meant being human. The meanings of being human were illustrated by the six themes: having feelings; experiencing moral indignation; being harmed; having courage; protecting oneself; and maturing and developing. Analysis showed that vulnerability was a resource as well as a burden. PMID:21285195

  16. Mobilising "vulnerability" in the public health response to pandemic influenza.

    PubMed

    Stephenson, Niamh; Davis, Mark; Flowers, Paul; MacGregor, Casimir; Waller, Emily

    2014-02-01

    Analysis of public health's growing interest in "vulnerability" has largely focused on health policy, with little interrogation of how vulnerability is being actively appropriated, countered, ignored or reworked by the publics whose health such policy is designed to protect. Once the assemblage of public health is understood as comprised of different forms of expertise and actors, including publics, addressing this gap matters. We examine the use of vulnerability in the specific context of pandemic influenza preparedness. Pandemic preparedness raises some familiar dilemmas for public health governance: how to engage with publics without fuelling social divisions and disruption; and whether to invoke publics as passive recipients of public health advice or to recognise publics as collective agents responding to the threat of pandemic influenza. Thus, we ask how the mobilisation of vulnerability connects with these dilemmas. To examine vulnerability in pandemic preparedness, two forms of qualitative data are analysed: 1) interviews and focus groups with "vulnerable" and "healthy" people (conducted 2011-12) discussing seasonal and pandemic influenza and; 2) international, Australian national and state level pandemic plans (1999-2013). Vulnerability is variously used in plans as a way to identify groups at particular risk of infection because of pre-existing clinical conditions, and as a free-floating social category that could apply to a broad range of people potentially involved in the social disruption a pandemic might entail. Our interview and focus group data indicate that healthy people rework the free-floating extension of vulnerability, and that people designated vulnerable encounter an absence of any collective responsibility for the threat of pandemic influenza. Our analysis suggests that vulnerability's mobilisation in pandemic preparedness limits the connection between public health governance and its publics: here, the openness and unpredictability of

  17. A new species of Loxosomatidae (Entoprocta, Solitaria) from the White Sea: Loxosomella unicornis sp. nov.

    PubMed

    Borisanova, Anastasiya O; Krylova, Elena M

    2014-09-15

    A new solitary entoproct, Loxosomella unicornis sp. nov., is described. The species was found on the gymnolaemate bryozoans Cribrilina sp. and Electra sp. in Kandalaksha Bay, White Sea. Loxosomella unicornis sp. nov. is a medium-sized species with a total length up to 650 µm, eight tentacles and a conspicuous horn-shaped appendage on the top part of calyx. 

  18. A new species of Loxosomatidae (Entoprocta, Solitaria) from the White Sea: Loxosomella unicornis sp. nov.

    PubMed

    Borisanova, Anastasiya O; Krylova, Elena M

    2014-01-01

    A new solitary entoproct, Loxosomella unicornis sp. nov., is described. The species was found on the gymnolaemate bryozoans Cribrilina sp. and Electra sp. in Kandalaksha Bay, White Sea. Loxosomella unicornis sp. nov. is a medium-sized species with a total length up to 650 µm, eight tentacles and a conspicuous horn-shaped appendage on the top part of calyx.  PMID:25283409

  19. Tsunami survivors' perspectives on vulnerability and vulnerability reduction: evidence from Koh Phi Phi Don and Khao Lak, Thailand.

    PubMed

    Steckley, Marylynn; Doberstein, Brent

    2011-07-01

    This paper presents the results of primary research with 40 survivors of the 2004 Indian Ocean tsunami in two communities: Khao Lak (n=20) and Koh Phi Phi Don (n=20), Thailand. It traces tsunami survivors' perceptions of vulnerability, determines whether residents felt that the tsunami affected different communities differently, identifies the populations and sub-community groups that survivors distinguished as being more vulnerable than others, highlights community-generated ideas about vulnerability reduction, and pinpoints a range of additional vulnerability reduction actions. Tsunami survivors most consistently identified the 'most vulnerable' community sub-populations as women, children, the elderly, foreigners, and the poor. In Khao Lak, however, respondents added 'Burmese migrants' to this list, whereas in Koh Phi Phi Don, they added 'Thai Muslims'. Results suggest that the two case study communities, both small, coastal, tourism-dominated communities no more than 100 kilometres apart, have differing vulnerable sub-groups and environmental vulnerabilities, requiring different post-disaster vulnerability reduction efforts.

  20. Tsunami survivors' perspectives on vulnerability and vulnerability reduction: evidence from Koh Phi Phi Don and Khao Lak, Thailand.

    PubMed

    Steckley, Marylynn; Doberstein, Brent

    2011-07-01

    This paper presents the results of primary research with 40 survivors of the 2004 Indian Ocean tsunami in two communities: Khao Lak (n=20) and Koh Phi Phi Don (n=20), Thailand. It traces tsunami survivors' perceptions of vulnerability, determines whether residents felt that the tsunami affected different communities differently, identifies the populations and sub-community groups that survivors distinguished as being more vulnerable than others, highlights community-generated ideas about vulnerability reduction, and pinpoints a range of additional vulnerability reduction actions. Tsunami survivors most consistently identified the 'most vulnerable' community sub-populations as women, children, the elderly, foreigners, and the poor. In Khao Lak, however, respondents added 'Burmese migrants' to this list, whereas in Koh Phi Phi Don, they added 'Thai Muslims'. Results suggest that the two case study communities, both small, coastal, tourism-dominated communities no more than 100 kilometres apart, have differing vulnerable sub-groups and environmental vulnerabilities, requiring different post-disaster vulnerability reduction efforts. PMID:21083848

  1. Quantum key distribution: vulnerable if imperfectly implemented

    NASA Astrophysics Data System (ADS)

    Leuchs, G.

    2013-10-01

    We report several vulnerabilities found in Clavis2, the flagship quantum key distribution (QKD) system from ID Quantique. We show the hacking of a calibration sequence run by Clavis2 to synchronize the Alice and Bob devices before performing the secret key exchange. This hack induces a temporal detection efficiency mismatch in Bob that can allow Eve to break the security of the cryptosystem using faked states. We also experimentally investigate the superlinear behaviour in the single-photon detectors (SPDs) used by Bob. Due to this superlinearity, the SPDs feature an actual multi-photon detection probability which is generally higher than the theoretically-modelled value. We show how this increases the risk of detector control attacks on QKD systems (including Clavis2) employing such SPDs. Finally, we review the experimental feasibility of Trojan-horse attacks. In the case of Clavis2, the objective is to read Bob's phase modulator to acquire knowledge of his basis choice as this information suffices for constructing the raw key in the Scarani-Acin-Ribordy-Gisin 2004 (SARG04) protocol. We work in close collaboration with ID Quantique and for all these loopholes, we notified them in advance. Wherever possible, we or ID Quantique proposed countermeasures and they implemented suitable patches and upgrade their systems.

  2. Environmental deterioration increases tadpole vulnerability to predation.

    PubMed

    Squires, Zoe E; Bailey, Paul C E; Reina, Richard D; Wong, Bob B M

    2008-08-23

    Human-induced environmental change is occurring at an unprecedented rate and scale. Many freshwater habitats, in particular, have been degraded as a result of increased salinity. Little is known about the effects of anthropogenic salinization on freshwater organisms, especially at sublethal concentrations, where subtle behavioural changes can have potentially drastic fitness consequences. Using a species of Australian frog (Litoria ewingii), we experimentally examined the effects of salinization on tadpole behaviour and their vulnerability to a predatory dragonfly nymph (Hemianax papuensis). We found that tadpoles exposed to an ecologically relevant concentration of salt (15% seawater, SW) were less active than those in our freshwater control (0.4% SW). Tadpoles in elevated salinity also experienced a higher risk of predation, even though the strike rate of the predator did not differ between salt and freshwater treatments. In a separate experiment testing the burst-speed performance of tadpoles, we found that tadpoles in saltwater were slower than those in freshwater. Thus, it would appear that salt compromised the anti-predator response of tadpoles and made them more susceptible to being captured. Our results demonstrate that environmentally relevant concentrations of aquatic contaminants can, even at sublethal levels, severely undermine the fitness of exposed organisms. PMID:18492650

  3. Tracking Nile Delta vulnerability to Holocene change.

    PubMed

    Marriner, Nick; Flaux, Clément; Morhange, Christophe; Stanley, Jean-Daniel

    2013-01-01

    Understanding deltaic resilience in the face of Holocene climate change and human impacts is an important challenge for the earth sciences in characterizing the full range of present and future wetland responses to global warming. Here, we report an 8000-year mass balance record from the Nile Delta to reconstruct when and how this sedimentary basin has responded to past hydrological shifts. In a global Holocene context, the long-term decrease in Nile Delta accretion rates is consistent with insolation-driven changes in the 'monsoon pacemaker', attested throughout the mid-latitude tropics. Following the early to mid-Holocene growth of the Nile's deltaic plain, sediment losses and pronounced erosion are first recorded after ~4000 years ago, the corollaries of falling sediment supply and an intensification of anthropogenic impacts from the Pharaonic period onwards. Against the backcloth of the Saharan 'depeopling', reduced river flow underpinned by a weakening of monsoonal precipitation appears to have been particularly conducive to the expansion of human activities on the delta by exposing productive floodplain lands for occupation and irrigation agriculture. The reconstruction suggests that the Nile Delta has a particularly long history of vulnerability to extreme events (e.g. floods and storms) and sea-level rise, although the present sediment-starved system does not have a direct Holocene analogue. This study highlights the importance of the world's deltas as sensitive archives to investigate Holocene geosystem responses to climate change, risks and hazards, and societal interaction.

  4. Vulnerability of streams to legacy nitrate sources

    USGS Publications Warehouse

    Tesoriero, Anthony J.; Duff, John H.; Saad, David A.; Spahr, Norman E.; Wolock, David M.

    2013-01-01

    The influence of hydrogeologic setting on the susceptibility of streams to legacy nitrate was examined at seven study sites having a wide range of base flow index (BFI) values. BFI is the ratio of base flow to total streamflow volume. The portion of annual stream nitrate loads from base flow was strongly correlated with BFI. Furthermore, dissolved oxygen concentrations in streambed pore water were significantly higher in high BFI watersheds than in low BFI watersheds suggesting that geochemical conditions favor nitrate transport through the bed when BFI is high. Results from a groundwater-surface water interaction study at a high BFI watershed indicate that decades old nitrate-laden water is discharging to this stream. These findings indicate that high nitrate levels in this stream may be sustained for decades to come regardless of current practices. It is hypothesized that a first approximation of stream vulnerability to legacy nutrients may be made by geospatial analysis of watersheds with high nitrogen inputs and a strong connection to groundwater (e.g., high BFI).

  5. Hunger mapping: food insecurity and vulnerability information.

    PubMed

    1997-12-01

    Save the Children Foundation (SCF), a nongovernmental organization (NGO), developed the "household food economy analysis" to assess the needs of an area or population facing acute food insecurity. This method considers all of the ways people secure access to food and illustrates the distribution of various food supplies in pie charts that allow comparison of the percentage contribution of each option during a normal year and a "bad" year. Data are gathered through the use of key informants, and the analysis permits identification of ways to support local initiatives and to target assistance. As a result of this work, SCF and another NGO, Helen Keller International, attended a March 1997 expert consultation organized by the UN Food and Agriculture Organization (FAO) to create a workplan for the Food Insecurity and Vulnerability Information and Mapping System (FIVIMS) called for in the World Food Summit Plan of Action. The consultation adopted use of the FAO's food and balance sheet approach, despite its limitations, and determined that indicators should be location- and time-specific as well as 1) simple and reliable, 2) readily available, 3) social and anthropometric, and 4) found at all levels. The consultation also recommended combination of the key informant and the indicator approach to data collection. Finally, the consultation identified appropriate actions that should be accomplished before the 1998 meeting of the FAO's Committee on World Food Security.

  6. EDITORIAL: Groundwater resources, climate and vulnerability Groundwater resources, climate and vulnerability

    NASA Astrophysics Data System (ADS)

    Bovolo, C. Isabella; Parkin, Geoff; Sophocleous, Marios

    2009-09-01

    Groundwater is an important component of the freshwater system and its role is becoming even more prominent as the more accessible surface water resources become increasingly exploited to support increasing populations and development. Yet despite its significance, there has been comparatively little research conducted on groundwater relative to surface water resources, particularly in the context of climate change impact assessment. This focus issue has therefore been assembled to expand upon the currently limited knowledge of groundwater systems and their links with climate. Many of the papers included here explore the interrelated issues of groundwater resources, climate-related changes and vulnerabilities at a regional scale in different continents and globally. See the PDF for the full text of the editorial. Focus on Groundwater Resources, Climate and Vulnerability Contents Groundwater: from mystery to management T N Narasimhan Simulated response of groundwater to predicted recharge in a semi-arid region using a scenario of modelled climate change M W Toews and D M Allen Long-term climatic change and sustainable ground water resources management Hugo A Loáiciga Climate change and groundwater: India's opportunities for mitigation and adaptation Tushaar Shah Vulnerability to the impact of climate change on renewable groundwater resources: a global-scale assessment Petra Döll Influence of soil heterogeneity on evapotranspiration under shallow water table conditions: transient, stochastic simulations Stefan J Kollet Nutrient cycling and N2O emissions in a changing climate: the subsurface water system role Georgia Destouni and Amélie Darracq Rainfall intensity and groundwater recharge: empirical evidence from the Upper Nile Basin M Owor, R G Taylor, C Tindimugaya and D Mwesigwa This focus issue is not yet complete, there are still letters at press and in review.

  7. EDITORIAL: Groundwater resources, climate and vulnerability Groundwater resources, climate and vulnerability

    NASA Astrophysics Data System (ADS)

    Bovolo, C. Isabella; Parkin, Geoff; Sophocleous, Marios

    2009-09-01

    Groundwater is an important component of the freshwater system and its role is becoming even more prominent as the more accessible surface water resources become increasingly exploited to support increasing populations and development. Yet despite its significance, there has been comparatively little research conducted on groundwater relative to surface water resources, particularly in the context of climate change impact assessment. This focus issue has therefore been assembled to expand upon the currently limited knowledge of groundwater systems and their links with climate. Many of the papers included here explore the interrelated issues of groundwater resources, climate-related changes and vulnerabilities at a regional scale in different continents and globally. See the PDF for the full text of the editorial. Focus on Groundwater Resources, Climate and Vulnerability Contents Groundwater: from mystery to management T N Narasimhan Simulated response of groundwater to predicted recharge in a semi-arid region using a scenario of modelled climate change M W Toews and D M Allen Long-term climatic change and sustainable ground water resources management Hugo A Loáiciga Climate change and groundwater: India's opportunities for mitigation and adaptation Tushaar Shah Vulnerability to the impact of climate change on renewable groundwater resources: a global-scale assessment Petra Döll Influence of soil heterogeneity on evapotranspiration under shallow water table conditions: transient, stochastic simulations Stefan J Kollet Nutrient cycling and N2O emissions in a changing climate: the subsurface water system role Georgia Destouni and Amélie Darracq Rainfall intensity and groundwater recharge: empirical evidence from the Upper Nile Basin M Owor, R G Taylor, C Tindimugaya and D Mwesigwa

  8. Soil compaction vulnerability at Organ Pipe Cactus National Monument, Arizona

    USGS Publications Warehouse

    Webb, Robert H.; Nussear, Kenneth E.; Carmichael, Shinji; Esque, Todd C.

    2014-01-01

    Compaction vulnerability of different types of soils by hikers and vehicles is poorly known, particularly for soils of arid and semiarid regions. Engineering analyses have long shown that poorly sorted soils (for example, sandy loams) compact to high densities, whereas well-sorted soils (for example, eolian sand) do not compact, and high gravel content may reduce compaction. Organ Pipe Cactus National Monument (ORPI) in southwestern Arizona, is affected greatly by illicit activities associated with the United States–Mexico border, and has many soils that resource managers consider to be highly vulnerable to compaction. Using geospatial soils data for ORPI, compaction vulnerability was estimated qualitatively based on the amount of gravel and the degree of sorting of sand and finer particles. To test this qualitative assessment, soil samples were collected from 48 sites across all soil map units, and undisturbed bulk densities were measured. A scoring system was used to create a vulnerability index for soils on the basis of particle-size sorting, soil properties derived from Proctor compaction analyses, and the field undisturbed bulk densities. The results of the laboratory analyses indicated that the qualitative assessments of soil compaction vulnerability underestimated the area of high vulnerability soils by 73 percent. The results showed that compaction vulnerability of desert soils, such as those at ORPI, can be quantified using laboratory tests and evaluated using geographic information system analyses, providing a management tool that managers potentially could use to inform decisions about activities that reduce this type of soil disruption in protected areas.

  9. Groundwater vulnerability to pollution mapping of Ranchi district using GIS

    PubMed Central

    Krishna, R.; Iqbal, J.; Pathak, G.; Tuluri, F.; Tchounwou, P. B.

    2015-01-01

    Groundwater pollution due to anthropogenic activities is one of the major environmental problems in urban and industrial areas. The present study demonstrates the integrated approach with GIS and DRASTIC model to derive a groundwater vulnerability to pollution map. The model considers the seven hydrogeological factors [Depth to water table (D), net recharge (R), aquifer media (A), soil media (S), topography or slope (T), impact of vadose zone (I) and hydraulic Conductivity(C)] for generating the groundwater vulnerability to pollution map. The model was applied for assessing the groundwater vulnerability to pollution in Ranchi district, Jharkhand, India. The model was validated by comparing the model output (vulnerability indices) with the observed nitrate concentrations in groundwater in the study area. The reason behind the selection of nitrate is that the major sources of nitrate in groundwater are anthropogenic in nature. Groundwater samples were collected from 30 wells/tube wells distributed in the study area. The samples were analyzed in the laboratory for measuring the nitrate concentrations in groundwater. A sensitivity analysis of the integrated model was performed to evaluate the influence of single parameters on groundwater vulnerability index. New weights were computed for each input parameters to understand the influence of individual hydrogeological factors in vulnerability indices in the study area. Aquifer vulnerability maps generated in this study can be used for environmental planning and groundwater management. PMID:26557470

  10. Calcium Is a Major Determinant of Xylem Vulnerability to Cavitation

    PubMed Central

    Herbette, Stephane; Cochard, Herve

    2010-01-01

    Xylem vulnerability to cavitation is a key parameter in the drought tolerance of trees, but little is known about the control mechanisms involved. Cavitation is thought to occur when an air bubble penetrates through a pit wall, and would hence be influenced by the wall's porosity. We first tested the role of wall-bound calcium in vulnerability to cavitation in Fagus sylvatica. Stems perfused with solutions of oxalic acid, EGTA, or sodium phosphate (NaPO4) were found to be more vulnerable to cavitation. The NaPO4-induced increase in vulnerability to cavitation was linked to calcium removal from the wall. In contrast, xylem hydraulic conductance was unaffected by the chemical treatments, demonstrating that the mechanisms controlling vulnerability to cavitation and hydraulic resistance are uncoupled. The NaPO4 solution was then perfused into stems from 13 tree species possessing highly contrasted vulnerability to cavitation. Calcium was found to be a major determinant of between-species differences in vulnerability to cavitation. This was evidenced in angiosperms as well as conifer species, thus supporting the hypothesis of a common mechanism in drought-induced cavitation. PMID:20547703

  11. Groundwater vulnerability to pollution mapping of Ranchi district using GIS

    NASA Astrophysics Data System (ADS)

    Krishna, R.; Iqbal, J.; Gorai, A. K.; Pathak, G.; Tuluri, F.; Tchounwou, P. B.

    2015-12-01

    Groundwater pollution due to anthropogenic activities is one of the major environmental problems in urban and industrial areas. The present study demonstrates the integrated approach with GIS and DRASTIC model to derive a groundwater vulnerability to pollution map. The model considers the seven hydrogeological factors [Depth to water table ( D), net recharge ( R), aquifer media ( A), soil media ( S), topography or slope ( T), impact of vadose zone ( I) and hydraulic Conductivity( C)] for generating the groundwater vulnerability to pollution map. The model was applied for assessing the groundwater vulnerability to pollution in Ranchi district, Jharkhand, India. The model was validated by comparing the model output (vulnerability indices) with the observed nitrate concentrations in groundwater in the study area. The reason behind the selection of nitrate is that the major sources of nitrate in groundwater are anthropogenic in nature. Groundwater samples were collected from 30 wells/tube wells distributed in the study area. The samples were analyzed in the laboratory for measuring the nitrate concentrations in groundwater. A sensitivity analysis of the integrated model was performed to evaluate the influence of single parameters on groundwater vulnerability index. New weights were computed for each input parameters to understand the influence of individual hydrogeological factors in vulnerability indices in the study area. Aquifer vulnerability maps generated in this study can be used for environmental planning and groundwater management.

  12. Risk assessment by dynamic representation of vulnerability, exploitation, and impact

    NASA Astrophysics Data System (ADS)

    Cam, Hasan

    2015-05-01

    Assessing and quantifying cyber risk accurately in real-time is essential to providing security and mission assurance in any system and network. This paper presents a modeling and dynamic analysis approach to assessing cyber risk of a network in real-time by representing dynamically its vulnerabilities, exploitations, and impact using integrated Bayesian network and Markov models. Given the set of vulnerabilities detected by a vulnerability scanner in a network, this paper addresses how its risk can be assessed by estimating in real-time the exploit likelihood and impact of vulnerability exploitation on the network, based on real-time observations and measurements over the network. The dynamic representation of the network in terms of its vulnerabilities, sensor measurements, and observations is constructed dynamically using the integrated Bayesian network and Markov models. The transition rates of outgoing and incoming links of states in hidden Markov models are used in determining exploit likelihood and impact of attacks, whereas emission rates help quantify the attack states of vulnerabilities. Simulation results show the quantification and evolving risk scores over time for individual and aggregated vulnerabilities of a network.

  13. Population vulnerability to storm surge flooding in coastal Virginia, USA.

    PubMed

    Liu, Hua; Behr, Joshua G; Diaz, Rafael

    2016-07-01

    This study aims to assess the vulnerability of populations to storm surge flooding in 12 coastal localities of Virginia, USA. Population vulnerability is assessed by way of 3 physical factors (elevation, slope, and storm surge category), 3 built-up components (road availability, access to hospitals, and access to shelters), and 3 household conditions (storm preparedness, financial constraints to recovering from severe weather events, and health fragility). Fuzzy analysis is used to generate maps illustrating variation in several types of population vulnerability across the region. When considering physical factors and household conditions, the most vulnerable neighborhoods to sea level rise and storm surge flooding are largely found in urban areas. However, when considering access to critical infrastructure, we find rural residents to be more vulnerable than nonrural residents. These detailed assessments can inform both local and state governments in catastrophic planning. In addition, the methodology may be generalized to assess vulnerability in other coastal corridors and communities. The originality is highlighted by evaluating socioeconomic conditions at refined scale, incorporating a broader range of human perceptions and predispositions, and employing a geoinformatics approach combining physical, built-up, and socioeconomic conditions for population vulnerability assessment. Integr Environ Assess Manag 2016;12:500-509. © 2015 SETAC.

  14. Predicting vulnerability to sleep deprivation using diffusion model parameters.

    PubMed

    Patanaik, Amiya; Zagorodnov, Vitali; Kwoh, Chee Keong; Chee, Michael W L

    2014-10-01

    We used diffusion modelling to predict vulnerability to decline in psychomotor vigilance task (PVT) performance following a night of total sleep deprivation (SD). A total of 135 healthy young adults (69 women, age = 21.9 ± 1.7 years) participated in several within-subject cross-over design studies that incorporated the PVT. Participants were classified as vulnerable (lower tertile) or non-vulnerable (upper tertile) according to their change in lapse rate [lapse = reaction time (RT) ≥ 500 ms] between the evening before (ESD) and the morning after SD. RT data were fitted using Ratcliff's diffusion model. Although both groups showed significant change in RT during SD, there was no significant group difference in RT during the ESD session. In contrast, during ESD, the mean diffusion drift of vulnerable subjects was significantly lower than for non-vulnerable subjects. Mean drift and non-decision times were both adversely affected by sleep deprivation. Both mean drift and non-decision time showed significant state × vulnerability interaction. Diffusion modelling appears to have promise in predicting vulnerability to vigilance decline induced by a night of total sleep deprivation.

  15. Rural Nevada and climate change: vulnerability, beliefs, and risk perception.

    PubMed

    Safi, Ahmad Saleh; Smith, William James; Liu, Zhnongwei

    2012-06-01

    In this article, we present the results of a study investigating the influence of vulnerability to climate change as a function of physical vulnerability, sensitivity, and adaptive capacity on climate change risk perception. In 2008/2009, we surveyed Nevada ranchers and farmers to assess their climate change-related beliefs, and risk perceptions, political orientations, and socioeconomic characteristics. Ranchers' and farmers' sensitivity to climate change was measured through estimating the proportion of their household income originating from highly scarce water-dependent agriculture to the total income. Adaptive capacity was measured as a combination of the Social Status Index and the Poverty Index. Utilizing water availability and use, and population distribution GIS databases; we assessed water resource vulnerability in Nevada by zip code as an indicator of physical vulnerability to climate change. We performed correlation tests and multiple regression analyses to examine the impact of vulnerability and its three distinct components on risk perception. We find that vulnerability is not a significant determinant of risk perception. Physical vulnerability alone also does not impact risk perception. Both sensitivity and adaptive capacity increase risk perception. While age is not a significant determinant of it, gender plays an important role in shaping risk perception. Yet, general beliefs such as political orientations and climate change-specific beliefs such as believing in the anthropogenic causes of climate change and connecting the locally observed impacts (in this case drought) to climate change are the most prominent determinants of risk perception.

  16. An Extreme-Value Approach to Anomaly Vulnerability Identification

    NASA Technical Reports Server (NTRS)

    Everett, Chris; Maggio, Gaspare; Groen, Frank

    2010-01-01

    The objective of this paper is to present a method for importance analysis in parametric probabilistic modeling where the result of interest is the identification of potential engineering vulnerabilities associated with postulated anomalies in system behavior. In the context of Accident Precursor Analysis (APA), under which this method has been developed, these vulnerabilities, designated as anomaly vulnerabilities, are conditions that produce high risk in the presence of anomalous system behavior. The method defines a parameter-specific Parameter Vulnerability Importance measure (PVI), which identifies anomaly risk-model parameter values that indicate the potential presence of anomaly vulnerabilities, and allows them to be prioritized for further investigation. This entails analyzing each uncertain risk-model parameter over its credible range of values to determine where it produces the maximum risk. A parameter that produces high system risk for a particular range of values suggests that the system is vulnerable to the modeled anomalous conditions, if indeed the true parameter value lies in that range. Thus, PVI analysis provides a means of identifying and prioritizing anomaly-related engineering issues that at the very least warrant improved understanding to reduce uncertainty, such that true vulnerabilities may be identified and proper corrective actions taken.

  17. Assessing the vulnerability of buildings to tsunami in Sydney

    NASA Astrophysics Data System (ADS)

    Dall'Osso, F.; Gonella, M.; Gabbianelli, G.; Withycombe, G.; Dominey-Howes, D.

    2009-12-01

    Australia is vulnerable to the impacts of tsunamis and exposure along the SE coast of New South Wales is especially high. Significantly, this is the same area reported to have been affected by repeated large magnitude tsunamis during the Holocene. Efforts are under way to complete probabilistic risk assessments for the region but local government planners and emergency risk managers need information now about building vulnerability in order to develop appropriate risk management strategies. We use the newly revised PTVA-3 Model (Dall'Osso et al., 2009) to assess the relative vulnerability of buildings to damage from a "worst case tsunami" defined by our latest understanding of regional risk - something never before undertaken in Australia. We present selected results from an investigation of building vulnerability within the local government area of Manly - an iconic coastal area of Sydney. We show that a significant proportion of buildings (in particular, residential structures) are classified as having "High" and "Very High" Relative Vulnerability Index scores. Furthermore, other important buildings (e.g., schools, nursing homes and transport structures) are also vulnerable to damage. Our results have serious implications for immediate emergency risk management, longer-term land-use zoning and development, and building design and construction standards. Based on the work undertaken here, we recommend further detailed assessment of the vulnerability of coastal buildings in at risk areas, development of appropriate risk management strategies and a detailed program of community engagement to increase overall resilience.

  18. Vulnerability of the Ecuador's Agricultural Sector as part of an Integrated Climate Change Vulnerability Study

    NASA Astrophysics Data System (ADS)

    Flores-Lopez, F.; Depsky, N. J.

    2014-12-01

    Earlier this year SEI, in conjunction with the Environmental Secretary of Quito, concluded a vulnerability analysis for the Metropolitan District of Quito (DMQ). The study analyzed future anthropogenic and natural hazards, and how these threats may be potentially exacerbated by a changing climate over the next 40 years. The focus of this abstract is specifically on the vulnerability of the agricultural sector.Overall, there is a lack of consensus amongst the results of long-term trends of precipitation in the Quito region. However, there is much more confidence in the trends of mean air temperature increase, and therefore this analysis focused specifically upon the effects of increasing temperatures upon Quito's agricultural sector. Effects of a roughly 2°C increase in mean air temperature by 2050 (corresponding to a relative CO2 concentration pathway within the GCMs of 8.5) was evaluated with respect to its potential effects upon the length of growing season for principal crops, and which of these crops are most vulnerable to the increased heat stress. Also studied was the potential expansion of agriculture into higher elevation areas, namely the sensitive 'paramo' alpine ecosystem, due to increasing arability of these areas as temperatures rise. The extent of cultivation of 'paramos' areas was estimated in order to assess the likely diminutive effects upon local hydrology and ecosystem well-being.Our results show that in fact it is expected that the increase in temperature would have a positive effect on the development of some crops, though the growing seasons would likely be shortened, which may be problematic given soil and rainfall constraints.Regarding expansion of agriculture into the 'paramo' highlands, results showed that each 200m zone above 3400masl would experience a marked increase in agricultural land conversion, ranging from 15 - 55km2, depending upon the zone. The lowest zones are expectedly the most vulnerable as they already exist at the

  19. Examining dimensions of vulnerability among children in Uganda.

    PubMed

    Kalibala, Samuel; Schenk, Katie D; Weiss, Deborah C; Elson, Lynne

    2012-01-01

    Insufficient data on the nature and extent of children's vulnerability in Uganda has challenged government and donors in priority setting, resource allocation and developing effective approaches to improve well-being. We conducted a population-based survey among a nationally representative sample of 2551 households, covering a total of 7946 children. We engaged national stakeholders in a priority-setting exercise to develop a scoring system to assess dimensions of children's vulnerability. The exercise identified individual and household characteristics to assess vulnerability--many of which had not been measured previously--to which numerical weights representing vulnerability level were assigned. Highly weighted characteristics included maternal death, disability, child labour and pregnancy before age 17. Psychosocial elements included living apart from siblings, having nobody to talk to and never visiting a living parent. According to this approach, an estimated 51.1% of children in Uganda (weighted for national population distribution) are considered critically or moderately vulnerable. It is to these children, equivalent to a national total of 8.7 million, that support services should be prioritised. However, survey data suggest that the most critically vulnerable children are under-represented in several types of support services. This pioneering, participatory methodology provides a rudimentary, but valuable, first step towards quantifying the vulnerability of children in Uganda and assessing their resource needs. It has been used by the Government of Uganda to determine subcategories of vulnerability for resource allocation. A major advantage is that it uses local contextual knowledge of child vulnerability rather than generic criteria applied in international surveys. Further analytical work is required to validate the methodology, link it to child well-being outcomes and devise a practical tool for service providers to refine programme targeting. The

  20. Volcanic risk assessment: Quantifying physical vulnerability in the built environment

    NASA Astrophysics Data System (ADS)

    Jenkins, S. F.; Spence, R. J. S.; Fonseca, J. F. B. D.; Solidum, R. U.; Wilson, T. M.

    2014-04-01

    This paper presents structured and cost-effective methods for assessing the physical vulnerability of at-risk communities to the range of volcanic hazards, developed as part of the MIA-VITA project (2009-2012). An initial assessment of building and infrastructure vulnerability has been carried out for a set of broadly defined building types and infrastructure categories, with the likelihood of damage considered separately for projectile impact, ash fall loading, pyroclastic density current dynamic pressure and earthquake ground shaking intensities. In refining these estimates for two case study areas: Kanlaon volcano in the Philippines and Fogo volcano in Cape Verde, we have developed guidelines and methodologies for carrying out physical vulnerability assessments in the field. These include identifying primary building characteristics, such as construction material and method, as well as subsidiary characteristics, for example the size and prevalence of openings, that may be important in assessing eruption impacts. At-risk buildings around Kanlaon were found to be dominated by timber frame buildings that exhibit a high vulnerability to pyroclastic density currents, but a low vulnerability to failure from seismic shaking. Around Fogo, the predominance of unreinforced masonry buildings with reinforced concrete slab roofs suggests a high vulnerability to volcanic earthquake but a low vulnerability to ash fall loading. Given the importance of agriculture for local livelihoods around Kanlaon and Fogo, we discuss the potential impact of infrastructure vulnerability for local agricultural economies, with implications for volcanic areas worldwide. These methodologies and tools go some way towards offering a standardised approach to carrying out future vulnerability assessments for populated volcanic areas.

  1. Young women most vulnerable to HIV infection.

    PubMed

    1993-12-01

    It is estimated that 70% of the 3000 women who are infected with HIV each day are 15-24 years old. This pattern of increased prevalence among young women has been noted since a 1986 report that AIDS cases in Zaire were equally divided among men and women, but that the women were an average of 10 years younger than the men, and cases in women peaked at age 20-29. Despite this information, the HIV research and program agenda has failed to address the gender issues that place young women at risk of infection. Societies that do not provide young women with information about reproductive anatomy and sex or with reproductive health services, that allow men to have multiple sex partners, and that condone condom use only for illicit intercourse, leave young girls and women at risk of forced and unprotected sexual intercourse. Studies have also shown that early marriage practices also increase the risk of women becoming infected (usually by their older and more "experienced" husbands). In some parts of Africa, older men seek out virgins in the belief that having sex with a virgin will cure them of sexually transmitted diseases. Poverty also drives women to barter sex for money or goods. In addition to these social and behavioral risk factors, young women appear to have a greater physiological susceptibility to infection than more mature women. Possible factors for this increased risk include the facts that, in younger women, the lining of the vagina is thinner, vaginal mucus may be less profuse, ovulation (which seems to have a protective effect against infection) is infrequent, and a transition zone of cells ringing the cervical opening is more exposed. Thus, biologic, social, and behavioral factors increase the vulnerability of young women. To protect young women, societies will have to change cultural and sexual norms, values, and practices.

  2. Ultrasound Tissue Characterization of Vulnerable Atherosclerotic Plaque

    PubMed Central

    Picano, Eugenio; Paterni, Marco

    2015-01-01

    A thrombotic occlusion of the vessel fed by ruptured coronary atherosclerotic plaque may result in unstable angina, myocardial infarction or death, whereas embolization from a plaque in carotid arteries may result in transient ischemic attack or stroke. The atherosclerotic plaque prone to such clinical events is termed high-risk or vulnerable plaque, and its identification in humans before it becomes symptomatic has been elusive to date. Ultrasonic tissue characterization of the atherosclerotic plaque is possible with different techniques—such as vascular, transesophageal, and intravascular ultrasound—on a variety of arterial segments, including carotid, aorta, and coronary districts. The image analysis can be based on visual, video-densitometric or radiofrequency methods and identifies three distinct textural patterns: hypo-echoic (corresponding to lipid- and hemorrhage-rich plaque), iso- or moderately hyper-echoic (fibrotic or fibro-fatty plaque), and markedly hyperechoic with shadowing (calcific plaque). Hypoechoic or dishomogeneous plaques, with spotty microcalcification and large plaque burden, with plaque neovascularization and surface irregularities by contrast-enhanced ultrasound, are more prone to clinical complications than hyperechoic, extensively calcified, homogeneous plaques with limited plaque burden, smooth luminal plaque surface and absence of neovascularization. Plaque ultrasound morphology is important, along with plaque geometry, in determining the atherosclerotic prognostic burden in the individual patient. New quantitative methods beyond backscatter (to include speed of sound, attenuation, strain, temperature, and high order statistics) are under development to evaluate vascular tissues. Although not yet ready for widespread clinical use, tissue characterization is listed by the American Society of Echocardiography roadmap to 2020 as one of the most promising fields of application in cardiovascular ultrasound imaging, offering unique

  3. Sea Level Rise Impacts On Infrastructure Vulnerability

    NASA Astrophysics Data System (ADS)

    Pasqualini, D.; Mccown, A. W.; Backhaus, S.; Urban, N. M.

    2015-12-01

    Increase of global sea level is one of the potential consequences of climate change and represents a threat for the U.S.A coastal regions, which are highly populated and home of critical infrastructures. The potential danger caused by sea level rise may escalate if sea level rise is coupled with an increase in frequency and intensity of storms that may strike these regions. These coupled threats present a clear risk to population and critical infrastructure and are concerns for Federal, State, and particularly local response and recovery planners. Understanding the effect of sea level rise on the risk to critical infrastructure is crucial for long planning and for mitigating potential damages. In this work we quantify how infrastructure vulnerability to a range of storms changes due to an increase of sea level. Our study focuses on the Norfolk area of the U.S.A. We assess the direct damage of drinking water and wastewater facilities and the power sector caused by a distribution of synthetic hurricanes. In addition, our analysis estimates indirect consequences of these damages on population and economic activities accounting also for interdependencies across infrastructures. While projections unanimously indicate an increase in the rate of sea level rise, the scientific community does not agree on the size of this rate. Our risk assessment accounts for this uncertainty simulating a distribution of sea level rise for a specific climate scenario. Using our impact assessment results and assuming an increase of future hurricanes frequencies and intensities, we also estimate the expected benefits for critical infrastructure.

  4. Vulnerability of critical infrastructures : identifying critical nodes.

    SciTech Connect

    Cox, Roger Gary; Robinson, David Gerald

    2004-06-01

    The objective of this research was the development of tools and techniques for the identification of critical nodes within critical infrastructures. These are nodes that, if disrupted through natural events or terrorist action, would cause the most widespread, immediate damage. This research focuses on one particular element of the national infrastructure: the bulk power system. Through the identification of critical elements and the quantification of the consequences of their failure, site-specific vulnerability analyses can be focused at those locations where additional security measures could be effectively implemented. In particular, with appropriate sizing and placement within the grid, distributed generation in the form of regional power parks may reduce or even prevent the impact of widespread network power outages. Even without additional security measures, increased awareness of sensitive power grid locations can provide a basis for more effective national, state and local emergency planning. A number of methods for identifying critical nodes were investigated: small-world (or network theory), polyhedral dynamics, and an artificial intelligence-based search method - particle swarm optimization. PSO was found to be the only viable approach and was applied to a variety of industry accepted test networks to validate the ability of the approach to identify sets of critical nodes. The approach was coded in a software package called Buzzard and integrated with a traditional power flow code. A number of industry accepted test networks were employed to validate the approach. The techniques (and software) are not unique to power grid network, but could be applied to a variety of complex, interacting infrastructures.

  5. Early Brain Vulnerability in Wolfram Syndrome

    PubMed Central

    Hershey, Tamara; Lugar, Heather M.; Shimony, Joshua S.; Rutlin, Jerrel; Koller, Jonathan M.; Perantie, Dana C.; Paciorkowski, Alex R.; Eisenstein, Sarah A.; Permutt, M. Alan

    2012-01-01

    Wolfram Syndrome (WFS) is a rare autosomal recessive disease characterized by insulin-dependent diabetes mellitus, optic nerve atrophy, diabetes insipidus, deafness, and neurological dysfunction leading to death in mid-adulthood. WFS is caused by mutations in the WFS1 gene, which lead to endoplasmic reticulum (ER) stress-mediated cell death. Case studies have found widespread brain atrophy in late stage WFS. However, it is not known when in the disease course these brain abnormalities arise, and whether there is differential vulnerability across brain regions and tissue classes. To address this limitation, we quantified regional brain abnormalities across multiple imaging modalities in a cohort of young patients in relatively early stages of WFS. Children and young adults with WFS were evaluated with neurological, cognitive and structural magnetic resonance imaging measures. Compared to normative data, the WFS group had intact cognition, significant anxiety and depression, and gait abnormalities. Compared to healthy and type 1 diabetic control groups, the WFS group had smaller intracranial volume and preferentially affected gray matter volume and white matter microstructural integrity in the brainstem, cerebellum and optic radiations. Abnormalities were detected in even the youngest patients with mildest symptoms, and some measures did not follow the typical age-dependent developmental trajectory. These results establish that WFS is associated with smaller intracranial volume with specific abnormalities in the brainstem and cerebellum, even at the earliest stage of clinical symptoms. This pattern of abnormalities suggests that WFS has a pronounced impact on early brain development in addition to later neurodegenerative effects, representing a significant new insight into the WFS disease process. Longitudinal studies will be critical for confirming and expanding our understanding of the impact of ER stress dysregulation on brain development. PMID:22792385

  6. Tracking Nile Delta Vulnerability to Holocene Change

    PubMed Central

    Marriner, Nick; Flaux, Clément; Morhange, Christophe; Stanley, Jean-Daniel

    2013-01-01

    Understanding deltaic resilience in the face of Holocene climate change and human impacts is an important challenge for the earth sciences in characterizing the full range of present and future wetland responses to global warming. Here, we report an 8000-year mass balance record from the Nile Delta to reconstruct when and how this sedimentary basin has responded to past hydrological shifts. In a global Holocene context, the long-term decrease in Nile Delta accretion rates is consistent with insolation-driven changes in the ‘monsoon pacemaker’, attested throughout the mid-latitude tropics. Following the early to mid-Holocene growth of the Nile’s deltaic plain, sediment losses and pronounced erosion are first recorded after ~4000 years ago, the corollaries of falling sediment supply and an intensification of anthropogenic impacts from the Pharaonic period onwards. Against the backcloth of the Saharan ‘depeopling’, reduced river flow underpinned by a weakening of monsoonal precipitation appears to have been particularly conducive to the expansion of human activities on the delta by exposing productive floodplain lands for occupation and irrigation agriculture. The reconstruction suggests that the Nile Delta has a particularly long history of vulnerability to extreme events (e.g. floods and storms) and sea-level rise, although the present sediment-starved system does not have a direct Holocene analogue. This study highlights the importance of the world’s deltas as sensitive archives to investigate Holocene geosystem responses to climate change, risks and hazards, and societal interaction. PMID:23922692

  7. Migration in Vulnerable Deltas: A Research Strategy

    NASA Astrophysics Data System (ADS)

    Hutton, C.; Nicholls, R. J.; Allan, A.

    2015-12-01

    C. Hutton1, & R. J. Nicholls1, , 1 University of Southampton, University Road, Southampton, Hampshire, United Kingdom, SO17 1BJ. cwh@geodata. soton.ac.ukAbstractGlobally, deltas contain 500 million people and with rising sea levels often linked to large number of forced migrants are expected in the coming century. However, migration is already a major process in deltas, such as the growth of major cities such as Dhaka and Kolkata. Climate and environmental change interacts with a range of catchment and delta level drivers, which encompass a nexus of sea-level rise, storms, freshwater and sediment supply from the catchment, land degradation, subsidence, agricultural loss and socio-economic stresses. DECCMA (Deltas, Vulnerability and Climate Change: Migration and Adaptation/CARRIA) is investigating migration in the Ganges-Brahmaputra-Meghna (GBM), Mahanadi and Volta Deltas, including the influence of climate change. The research will explore migration from a range of perspectives including governance and stakeholder analysis, demographic analysis, household surveys of sending and receiving areas, macro-economic analysis, and hazards and hotspot analysis both historically and into the future. Migration under climate change will depend on other adaptation in the deltas and this will be examined. Collectively, integrated analysis will be developed to examine migration, other adaptation and development pathways with a particular focus on the implications for the poorest. This will require the development of input scenarios, including expert-derived exogenous scenarios (e.g., climate change) and endogenous scenarios of the delta developed in a participatory manner. This applied research will facilitate decision support methods for the development of deltas under climate change, with a focus on migration and other adaptation strategies.

  8. Rockfall vulnerability assessment for masonry buildings

    NASA Astrophysics Data System (ADS)

    Mavrouli, Olga

    2015-04-01

    The methodologies for the quantitative risk assessment vary in function of the application scale and the available data. For fragmental rockfalls, risk calculation requires data for the expected damage of the exposed elements due to potential rock block impacts with a range of trajectories, magnitudes and intensities. Although the procedures for the quantification of the rock block characteristics in terms of magnitude-frequency relationships are well established, there are few methodologies for the calculation of the vulnerability, and these are usually empirical or judgmental. The response of buildings to rock block impacts using analytical methods has been mainly realised so far for reinforced concrete buildings, and some fragility curves have been calculated with the results, indicating the potential damage for a range of rock block characteristics. Masonry buildings, as a common structural typology in mountainous areas, are in many cases impacted by rock blocks during rockfalls. Their response presents some peculiarities in comparison with reinforced-concrete structures given the non-homogeneity and variability of the compound materials (blocks and mortar), their orthotropy, low strength in tension, the statically indeterminate load-bearing system and the non-monolithic connections. To this purpose, analytical procedures which are specifically adapted to masonry structures should be used for the evaluation of the expected damage due to rock impacts. In this contribution we discuss the application of the analytical approach for the assessment of the expected damage in rockfall prone areas and the simulation assumptions that can be made concerning the materials, geometry, loading and the relevant simplifications. The amount of uncertainties introduced during their analytical simulation is high due to the dispersion of the data for material mechanical properties and the construction techniques and quality and thus a probabilistic assessment is suggested. The

  9. Automated Vulnerability Detection for Compiled Smart Grid Software

    SciTech Connect

    Prowell, Stacy J; Pleszkoch, Mark G; Sayre, Kirk D; Linger, Richard C

    2012-01-01

    While testing performed with proper experimental controls can provide scientifically quantifiable evidence that software does not contain unintentional vulnerabilities (bugs), it is insufficient to show that intentional vulnerabilities exist, and impractical to certify devices for the expected long lifetimes of use. For both of these needs, rigorous analysis of the software itself is essential. Automated software behavior computation applies rigorous static software analysis methods based on function extraction (FX) to compiled software to detect vulnerabilities, intentional or unintentional, and to verify critical functionality. This analysis is based on the compiled firmware, takes into account machine precision, and does not rely on heuristics or approximations early in the analysis.

  10. Drought vulnerability assessment for prioritising drought warning implementation

    NASA Astrophysics Data System (ADS)

    Naumann, Gustavo; Faneca Sànchez, Marta; Mwangi, Emmah; Barbosa, Paulo; Iglesias, Ana; Garrote, Luis; Werner, Micha

    2014-05-01

    Drought warning provides a potentially efficient approach to mitigation of drought impacts, and should be targeted at areas most vulnerable to being adversely impacted. Assessing drought vulnerability is, however, complex and needs to consider susceptibility to drought impact as well as the capacity to cope with drought. In this paper a Drought Vulnerability Index (DVI) is proposed that considers four primary components that reflect the capacity of society to adapt to drought; the renewable natural capital, the economic capacity, the human and civic resources, and the available infrastructure and technology. The DVI is established as a weighted combination of these four components, each a composite of selected indicators. Constituent indicators are calculated based on national and/or regional census data and statistics, and while the resulting DVI should not be considered an absolute measure of drought vulnerability it does provide for a prioritisation of areas that can be used to target drought warning efforts. Sensitivity analysis of weights applied show the established DVI to be robust. Through the DVI the development of drought forecasting and warning can be targeted at the most vulnerable areas. The proposed DVI is applied at both the continental scale in Africa to assess drought vulnerability of the different nations across Africa, and at the national level in Kenya, allowing for prioritisation of the counties within Kenya to drought vulnerability. Results show the relative vulnerability of countries and counties vulnerable to drought. At the continental scale, Somalia, Burundi, Niger, Ethiopia, Mali and Chad are found to be the countries most vulnerable to drought. At the national level, the relative vulnerability of the counties across Kenya is found, with counties in the North-East of Kenya having the highest values of DVI. At the country level results were compared with drought disaster information from the EM-DAT disaster database, showing a good

  11. Vulnerability of Rural Hospitals to Medicare Outpatient Payment Reform

    PubMed Central

    Mohr, Penny E.; Franco, Sheila J.; Blanchfield, Bonnie B.; Cheng, C. Michael; Evans, William N.

    1999-01-01

    Because the Balanced Budget Act (BBA) of 1997 requires implementation of a Medicare prospective payment system (PPS) for hospital outpatient services, the authors evaluated the potential impact of outpatient PPS on rural hospitals. Areas examined include: (1) How dependent are rural hospitals on outpatient revenue? (2) Are they more likely than urban hospitals to be vulnerable to payment reform? (3) What types of rural hospitals will be most vulnerable to reform? Using Medicare cost report data, the authors found that small size and government ownership are more common among rural than urban hospitals and are the most important determinants of vulnerability to payment reform. PMID:11481724

  12. SOCIAL COMPETENCE AND PSYCHOLOGICAL VULNERABILITY: THE MEDIATING ROLE OF FLOURISHING.

    PubMed

    Uysal, Recep

    2015-10-01

    This study examined whether flourishing mediated the social competence and psychological vulnerability. Participants were 259 university students (147 women, 112 men; M age = 21.3 yr., SD = 1.7) who completed the Turkish versions of the Perceived Social Competence Scale, the Flourishing Scale, and the Psychological Vulnerability Scale. Mediation models were tested using the bootstrapping method to examine indirect effects. Consistent with the hypotheses, the results indicated a positive relationship between social competence and flourishing, and a negative relationship between social competence and psychological vulnerability. Results of the bootstrapping method revealed that flourishing significantly mediated the relationship between social competence and psychological vulnerability. The significance and limitations of the results were discussed. PMID:26340049

  13. Scientists ID Key Fetal Cells Vulnerable to Zika

    MedlinePlus

    ... html Scientists ID Key Fetal Cells Vulnerable to Zika Lab study suggests possible mechanism for birth defects ... 29, 2016 (HealthDay News) -- The devastating mosquito-borne Zika virus can infect cells that play a role ...

  14. Assessing node risk and vulnerability in epidemics on networks

    NASA Astrophysics Data System (ADS)

    Rogers, T.

    2015-01-01

    Which nodes are most vulnerable to an epidemic spreading through a network, and which carry the highest risk of causing a major outbreak if they are the source of the infection? Here we show how these questions can be answered to good approximation using the cavity method. Several curious properties of node vulnerability and risk are explored: some nodes are more vulnerable than others to weaker infections, yet less vulnerable to stronger ones; a node is always more likely to be caught in an outbreak than it is to start one, except when the disease has a deterministic lifetime; the rank order of node risk depends on the details of the distribution of infectious periods.

  15. Vulnerability of Oregon hydrologic landscapes and streamflow to climate change

    EPA Science Inventory

    Hydrologic classification systems can provide a basis for broadscale assessments of the hydrologic functions of landscapes and watersheds and their responses to stressors. Such assessments could be particularly useful in determining hydrologic vulnerability from climate change. ...

  16. Soft Error Vulnerability of Iterative Linear Algebra Methods

    SciTech Connect

    Bronevetsky, G; de Supinski, B

    2008-01-19

    Devices are increasingly vulnerable to soft errors as their feature sizes shrink. Previously, soft error rates were significant primarily in space and high-atmospheric computing. Modern architectures now use features so small at sufficiently low voltages that soft errors are becoming important even at terrestrial altitudes. Due to their large number of components, supercomputers are particularly susceptible to soft errors. Since many large scale parallel scientific applications use iterative linear algebra methods, the soft error vulnerability of these methods constitutes a large fraction of the applications overall vulnerability. Many users consider these methods invulnerable to most soft errors since they converge from an imprecise solution to a precise one. However, we show in this paper that iterative methods are vulnerable to soft errors, exhibiting both silent data corruptions and poor ability to detect errors. Further, we evaluate a variety of soft error detection and tolerance techniques, including checkpointing, linear matrix encodings, and residual tracking techniques.

  17. Spectroscopy to improve identification of vulnerable plaques in cardiovascular disease.

    PubMed

    Bruggink, Janneke L M; Meerwaldt, Robbert; van Dam, Gooitzen M; Lefrandt, Joop D; Slart, Riemer H J A; Tio, René A; Smit, Andries J; Zeebregts, Clark J

    2010-01-01

    Many apparent healthy persons die from cardiovascular disease, despite major advances in prevention and treatment of cardiovascular disease. Traditional cardiovascular risk factors are able to predict cardiovascular events in the long run, but fail to assess current disease activity or nearby cardiovascular events. There is a clear relation between the occurrence of cardiovascular events and the presence of so-called vulnerable plaques. These vulnerable plaques are characterized by active inflammation, a thin cap and a large lipid pool. Spectroscopy is an optical imaging technique which depicts the interaction between light and tissues, and thereby shows the biochemical composition of tissues. In recent years, impressive advances have been made in spectroscopy technology and intravascular spectroscopy is able to assess the composition of plaques of interest and thereby to identify and actually quantify plaque vulnerability. This review summarizes the current evidence for spectroscopy as a measure of plaque vulnerability and discusses the potential role of intravascular spectroscopic imaging techniques. PMID:19760516

  18. Looming vulnerability to threat: a cognitive paradigm for anxiety.

    PubMed

    Riskind, J H

    1997-08-01

    The concept that perceived threat or danger is a cognitive antecedent of anxiety is central in clinical psychology, personality psychology, and social psychology. The aim in the current article is to review this concept and present a new conception called the looming vulnerability model. Looming vulnerability is conceptualized as an important cognitive component of threat or danger that elicits anxiety, sensitizes the individual to signs of movement and threat, biases cognitive processing, and makes the anxiety more persistent and less likely to habituate. In addition, it is postulated as a principal theme that discriminates anxiety and focal fears from depression. The looming vulnerability model integrates a disparate collection of findings and integrates the conceptualization of anxiety and fear with ethological and developmental observations. The social-cognitive and evolutionary basis of the sense of looming vulnerability are discussed, as well as its roots in cognitive schemata (fear scripts), its state elicitation by several potential classes of antecedent conditions, and possible treatment implications.

  19. Measuring vulnerability to natural hazards: a macro framework.

    PubMed

    Joseph, Jacquleen

    2013-04-01

    The measurement of vulnerability--defined here as the asymmetric response of disaster occurrences to hazardous events--signifies a key step towards effective disaster risk reduction and the promotion of a culture of disaster resilience. One of the reasons for not being able to do the same in a wider context is related to conceptual, definitional, and operational issues. This paper presents an operationally feasible framework for conducting this task and measures revealed macro vulnerability as a function of disaster risk and hazard probability. The probabilities of hazard and its perceived disaster risk were obtained from past data and from probability distributions. In this paper, the corresponding analytical framework is constructed using the case study of floods in Assam, India. The proposed indicator will help policymakers to draw on available macro-level data to identify the regions that are vulnerable to disasters, where micro-level disaster vulnerability assessments could be performed in greater detail.

  20. Spectroscopy to improve identification of vulnerable plaques in cardiovascular disease.

    PubMed

    Bruggink, Janneke L M; Meerwaldt, Robbert; van Dam, Gooitzen M; Lefrandt, Joop D; Slart, Riemer H J A; Tio, René A; Smit, Andries J; Zeebregts, Clark J

    2010-01-01

    Many apparent healthy persons die from cardiovascular disease, despite major advances in prevention and treatment of cardiovascular disease. Traditional cardiovascular risk factors are able to predict cardiovascular events in the long run, but fail to assess current disease activity or nearby cardiovascular events. There is a clear relation between the occurrence of cardiovascular events and the presence of so-called vulnerable plaques. These vulnerable plaques are characterized by active inflammation, a thin cap and a large lipid pool. Spectroscopy is an optical imaging technique which depicts the interaction between light and tissues, and thereby shows the biochemical composition of tissues. In recent years, impressive advances have been made in spectroscopy technology and intravascular spectroscopy is able to assess the composition of plaques of interest and thereby to identify and actually quantify plaque vulnerability. This review summarizes the current evidence for spectroscopy as a measure of plaque vulnerability and discusses the potential role of intravascular spectroscopic imaging techniques.

  1. Assessing vulnerability to drought: identifying underlying factors across Europe

    NASA Astrophysics Data System (ADS)

    Urquijo, Julia; Gonzalez Tánago, Itziar; Ballesteros, Mario; De Stefano, Lucia

    2015-04-01

    Drought is considered one of the most severe and damaging natural hazards in terms of people and sectors affected and associated losses. Drought is a normal and recurrent climatic phenomenon that occurs worldwide, although its spatial and temporal characteristics vary significantly among climates. In the case of Europe, in the last thirty years, the region has suffered several drought events that have caused estimated economic damages over a €100 billion and have affected almost 20% of its territory and population. In recent years, there has been a growing awareness among experts and authorities of the need to shift from a reactive crisis approach to a drought risk management approach, as well as of the importance of designing and implementing policies, strategies and plans at country and river basin levels to deal with drought. The identification of whom and what is vulnerable to drought is a central aspect of drought risk mitigation and planning and several authors agree that societal vulnerability often determines drought risk more than the actual precipitation shortfalls. The final aim of a drought vulnerability assessment is to identify the underlying sources of drought impact, in order to develop policy options that help to enhance coping capacity and therefore to prevent drought impact. This study identifies and maps factors underlying vulnerability to drought across Europe. The identification of factors influencing vulnerability starts from the analysis of past drought impacts in four European socioeconomic sectors. This analysis, along with an extensive literature review, led to the selection of vulnerability factors that are both relevant and adequate for the European context. Adopting the IPCC model, vulnerability factors were grouped to describe exposure, sensitivity and adaptive capacity. The aggregation of these components has resulted in the mapping of vulnerability to drought across Europe at NUTS02 level. Final results have been compared with

  2. Population Evacuation: Assessing Biophysical Risk and Social Vulnerability to Floods

    NASA Astrophysics Data System (ADS)

    Sim, S.; Lee, D. H.

    2014-12-01

    A relatively new topic of environmental hazards research revolves around vulnerability to disasters. These studies focused separately on biophysical and social vulnerability perspectives. Only recently, community-based vulnerability studies have become common because of the recognition that combining social and biophysical components is important and practical (Cutter, et al., 2000; Cutter, et al., 2003; Turner, et al., 2003). Researchers have modeled vulnerability to analyze its spatial variation (Montz, Cross, and Cutter, 2006). This study aimed at developing a technical framework for community-based vulnerability to the specific hazards of floods. Developing a technical framework in this research used a "vulnerability of place" method (Hebb & Mortsch, 2007). The data reduction technique used was Principal Components Analysis (PCA) which allows for each variable to explain part of the vulnerability. The case study was on flooding in the Tennessee River Basin. The initial run with all 46 variables produced 13 components that explained 69.77% of the variance. Because of the relative homogeneity across the county (i.e., land use and soil types most vulnerable to flooding being located away from heavily populated areas) biophysical variables became less important in this region in creating overall risk scores. This is made all the more obvious by the number of social variables (17) compared to the number of biophysical variables (8) in the final components. The lowest risk block groups are located within the cities: central Florence, central, and central Madison. The highest risk block groups are in rural areas covered predominately with pasture and agricultural land or forests. They also lie near or within the 100 year floodplain.

  3. Physical vulnerability of reinforced concrete buildings impacted by snow avalanches

    NASA Astrophysics Data System (ADS)

    Bertrand, D.; Naaim, M.; Brun, M.

    2010-07-01

    This paper deals with the assessment of physical vulnerability of civil engineering structures to snow avalanche loadings. In this case, the vulnerability of the element at risk is defined by its damage level expressed on a scale from 0 (no damage) to 1 (total destruction). The vulnerability of a building depends on its structure and flow features (geometry, mechanical properties, type of avalanche, topography, etc.). This makes it difficult to obtain vulnerability relations. Most existing vulnerability relations have been built from field observations. This approach suffers from the scarcity of well documented events. Moreover, the back analysis is based on both rough descriptions of the avalanche and the structure. To overcome this problem, numerical simulations of reinforced concrete structures loaded by snow avalanches are carried out. Numerical simulations allow to study, in controlled conditions, the structure behavior under snow avalanche loading. The structure is modeled in 3-D by the finite element method (FEM). The elasto-plasticity framework is used to represent the mechanical behavior of both materials (concrete and steel bars) and the transient feature of the avalanche loading is taken into account in the simulation. Considering a reference structure, several simulation campaigns are conducted in order to assess its snow avalanches vulnerability. Thus, a damage index is defined and is based on global and local parameters of the structure. The influence of the geometrical features of the structure, the compressive strength of the concrete, the density of steel inside the composite material and the maximum impact pressure on the damage index are studied and analyzed. These simulations allow establishing the vulnerability as a function of the impact pressure and the structure features. The derived vulnerability functions could be used for risk analysis in a snow avalanche context.

  4. The hack attack - Increasing computer system awareness of vulnerability threats

    NASA Technical Reports Server (NTRS)

    Quann, John; Belford, Peter

    1987-01-01

    The paper discusses the issue of electronic vulnerability of computer based systems supporting NASA Goddard Space Flight Center (GSFC) by unauthorized users. To test the security of the system and increase security awareness, NYMA, Inc. employed computer 'hackers' to attempt to infiltrate the system(s) under controlled conditions. Penetration procedures, methods, and descriptions are detailed in the paper. The procedure increased the security consciousness of GSFC management to the electronic vulnerability of the system(s).

  5. Reliability of groundwater vulnerability maps obtained through statistical methods.

    PubMed

    Sorichetta, Alessandro; Masetti, Marco; Ballabio, Cristiano; Sterlacchini, Simone; Beretta, Giovanni Pietro

    2011-04-01

    Statistical methods are widely used in environmental studies to evaluate natural hazards. Within groundwater vulnerability in particular, statistical methods are used to support decisions about environmental planning and management. The production of vulnerability maps obtained by statistical methods can greatly help decision making. One of the key points in all of these studies is the validation of the model outputs, which is performed through the application of various techniques to analyze the quality and reliability of the final results and to evaluate the model having the best performance. In this study, a groundwater vulnerability assessment to nitrate contamination was performed for the shallow aquifer located in the Province of Milan (Italy). The Weights of Evidence modeling technique was used to generate six model outputs, each one with a different number of input predictive factors. Considering that a vulnerability map is meaningful and useful only if it represents the study area through a limited number of classes with different degrees of vulnerability, the spatial agreement of different reclassified maps has been evaluated through the kappa statistics and a series of validation procedures has been proposed and applied to evaluate the reliability of the reclassified maps. Results show that performance is not directly related to the number of input predictor factors and that is possible to identify, among apparently similar maps, those best representing groundwater vulnerability in the study area. Thus, vulnerability maps generated using statistical modeling techniques have to be carefully handled before they are disseminated. Indeed, the results may appear to be excellent and final maps may perform quite well when, in fact, the depicted spatial distribution of vulnerability is greatly different from the actual one. For this reason, it is necessary to carefully evaluate the obtained results using multiple statistical techniques that are capable of

  6. Vulnerability-attention analysis for space-related activities

    NASA Technical Reports Server (NTRS)

    Ford, Donnie; Hays, Dan; Lee, Sung Yong; Wolfsberger, John

    1988-01-01

    Techniques for representing and analyzing trouble spots in structures and processes are discussed. Identification of vulnerable areas usually depends more on particular and often detailed knowledge than on algorithmic or mathematical procedures. In some cases, machine inference can facilitate the identification. The analysis scheme proposed first establishes the geometry of the process, then marks areas that are conditionally vulnerable. This provides a basis for advice on the kinds of human attention or machine sensing and control that can make the risks tolerable.

  7. Evaluation Of The Seismic Vulnerability of Fortified Structures

    SciTech Connect

    Baratta, Alessandro; Corbi, Ileana; Coppari, Sandro

    2008-07-08

    In the paper a prompt method to evaluate the seismic vulnerability of an ancient structure has been applied to the seismic vulnerability of the fortified structures in Italy, having as basics the elaboration of rather gross information about the state, the consistency and the history of the considered population of fabrics. The procedure proves to be rather effective and able to produce reliable results, despite the poor initial data.

  8. Parental overprotection and its relation to perceived child vulnerability.

    PubMed

    Thomasgard, M; Metz, W P

    1997-04-01

    A study of 280 parents with a child age 5-10 years examined the relation between and correlates of parental overprotection (less education, younger child age, being an only child) and parental perception of increased child vulnerability (history of life-threatening illness, child medical condition, first child). One-third of parents who considered their child vulnerable were also considered overprotective. PMID:9142367

  9. Vulnerability assessment of atmospheric environment driven by human impacts.

    PubMed

    Zhang, Yang; Shen, Jing; Ding, Feng; Li, Yu; He, Li

    2016-11-15

    Atmospheric environment quality worsening is a substantial threat to public health worldwide, and in many places, air pollution due to the intensification of the human activity is increasing dramatically. However, no studies have been investigated the integration of vulnerability assessment and atmospheric environment driven by human impacts. The objective of this study was to identify and prioritize the undesirable environmental changes as an early warning system for environment managers and decision makers in term of human, atmospheric environment, and social economic elements. We conduct a vulnerability assessment method of atmospheric environment associated with human impact, this method integrates spatial context of Geographic Information System (GIS) tool, multi-criteria decision analysis (MCDA) method, ordered weighted averaging (OWA) operators under the Exposure-Sensitivity- Adaptive Capacity (ESA) framework. Decision makers can find out relevant vulnerability assessment results with different vulnerable attitudes. In the Beijing-Tianjin-Hebei (BTH) region, China, we further applied this developed method and proved it to be reliable and consistent with the China Environmental Status Bulletin. Results indicate that the vulnerability of atmospheric environment in the BTH region is not optimistic, and environment managers should do more about air pollution. Thus, the most appropriate strategic decision and development program of city or state can be picked out assisting by the vulnerable results. PMID:27424115

  10. The Vulnerable Plaque: the Real Villain in Acute Coronary Syndromes

    PubMed Central

    Liang, Michael; Puri, Aniket; Devlin, Gerard

    2011-01-01

    The term "vulnerable plaque" refers to a vascular lesion that is prone to rupture and may result in life-threatening events which include myocardial infarction. It consists of thin-cap fibroatheroma and a large lipid core which is highly thrombogenic. Acute coronary syndromes often result from rupture of vulnerable plaques which frequently are only moderately stenosed and not visible by conventional angiography. Several invasive and non-invasive strategies have been developed to assess the burden of vulnerable plaques. Intravascular ultrasound provides a two-dimensional cross-sectional image of the arterial wall and can help assess the plaque burden and composition. Optical coherent tomography offers superior resolution over intravascular ultrasound. High-resolution magnetic resonance imaging provides non-invasive imaging for visualizing fibrous cap thickness and rupture in plaques. In addition, it may be of value in assessing the effects of treatments, such as lipid-lowering therapy. Technical issues however limit its clinical applicability. The role of multi-slice computed tomography, a well established screening tool for coronary artery disease, remains to be determined. Fractional flow reserve (FFR) may provide physiological functional assessment of plaque vulnerability; however, its role in the management of vulnerable plaque requires further studies. Treatment of the vulnerable patient may involve systemic therapy which currently include statins, ACE inhibitors, beta-blockers, aspirin, and calcium-channel blockers and in the future local therapeutic options such as drug-eluting stents or photodynamic therapy. PMID:21673834

  11. Forest climate change Vulnerability and Adaptation Assessment in Himalayas

    NASA Astrophysics Data System (ADS)

    Chitale, V. S.; Shrestha, H. L.; Agarwal, N. K.; Choudhurya, D.; Gilani, H.; Dhonju, H. K.; Murthy, M. S. R.

    2014-11-01

    Forests offer an important basis for creating and safeguarding more climate-resilient communities over Hindu Kush Himalayan region. The forest ecosystem vulnerability assessment to climate change and developing knowledge base to identify and support relevant adaptation strategies is realized as an urgent need. The multi scale adaptation strategies portray increasing complexity with the increasing levels in terms of data requirements, vulnerability understanding and decision making to choose a particular adaptation strategy. We present here how such complexities could be addressed and adaptation decisions could be either directly supported by open source remote sensing based forestry products or geospatial analysis and modelled products. The forest vulnerability assessment under climate change scenario coupled with increasing forest social dependence was studied using IPCC Landscape scale Vulnerability framework in Chitwan-Annapurna Landscape (CHAL) situated in Nepal. Around twenty layers of geospatial information on climate, forest biophysical and forest social dependence data was used to assess forest vulnerability and associated adaptation needs using self-learning decision tree based approaches. The increase in forest fires, evapotranspiration and reduction in productivity over changing climate scenario was observed. The adaptation measures on enhancing productivity, improving resilience, reducing or avoiding pressure with spatial specificity are identified to support suitable decision making. The study provides spatial analytical framework to evaluate multitude of parameters to understand vulnerabilities and assess scope for alternative adaptation strategies with spatial explicitness.

  12. Study on vulnerability assessment of cable-stayed bridges

    NASA Astrophysics Data System (ADS)

    Chang, C. C.; Yan, D.

    2006-03-01

    A structure is vulnerable if any small damage will trigger disproportionately large consequences, even leads to a cascade of failure events and progressive collapse. The structural vulnerability performance depends upon the properties, locations of damaged components and the way they are connected to the rest of the structure. In this paper, progressive failure analysis method is utilized for the vulnerability study of cable-stayed bridges. The goal of it is to identify various failure scenarios initiated from the sudden damage of some bridge components. Based on the analysis results, assuming that the behaviors of damaged components can be modeled using plastic hinges, the hybrid element model is introduced to derived the modified stiffness matrix considering both of the effects of bending moments and shear forces. Furthermore, the vulnerability index in terms of the nodal stiffness degradation can be analytically quantified, which could be regarded as an index to determine the bridge failure consequences, so that the vulnerability distribution graph for the whole bridge can be sketched to evaluate the bridge performances from vulnerability viewpoints. This quantitative approach is applicable for structural evaluation under unforeseen attack and illustrated on a typical long-span cable-stayed bridge.

  13. Latin hypercube approach to estimate uncertainty in ground water vulnerability.

    PubMed

    Gurdak, Jason J; McCray, John E; Thyne, Geoffrey; Qi, Sharon L

    2007-01-01

    A methodology is proposed to quantify prediction uncertainty associated with ground water vulnerability models that were developed through an approach that coupled multivariate logistic regression with a geographic information system (GIS). This method uses Latin hypercube sampling (LHS) to illustrate the propagation of input error and estimate uncertainty associated with the logistic regression predictions of ground water vulnerability. Central to the proposed method is the assumption that prediction uncertainty in ground water vulnerability models is a function of input error propagation from uncertainty in the estimated logistic regression model coefficients (model error) and the values of explanatory variables represented in the GIS (data error). Input probability distributions that represent both model and data error sources of uncertainty were simultaneously sampled using a Latin hypercube approach with logistic regression calculations of probability of elevated nonpoint source contaminants in ground water. The resulting probability distribution represents the prediction intervals and associated uncertainty of the ground water vulnerability predictions. The method is illustrated through a ground water vulnerability assessment of the High Plains regional aquifer. Results of the LHS simulations reveal significant prediction uncertainties that vary spatially across the regional aquifer. Additionally, the proposed method enables a spatial deconstruction of the prediction uncertainty that can lead to improved prediction of ground water vulnerability. PMID:17470124

  14. Vulnerability assessment of atmospheric environment driven by human impacts.

    PubMed

    Zhang, Yang; Shen, Jing; Ding, Feng; Li, Yu; He, Li

    2016-11-15

    Atmospheric environment quality worsening is a substantial threat to public health worldwide, and in many places, air pollution due to the intensification of the human activity is increasing dramatically. However, no studies have been investigated the integration of vulnerability assessment and atmospheric environment driven by human impacts. The objective of this study was to identify and prioritize the undesirable environmental changes as an early warning system for environment managers and decision makers in term of human, atmospheric environment, and social economic elements. We conduct a vulnerability assessment method of atmospheric environment associated with human impact, this method integrates spatial context of Geographic Information System (GIS) tool, multi-criteria decision analysis (MCDA) method, ordered weighted averaging (OWA) operators under the Exposure-Sensitivity- Adaptive Capacity (ESA) framework. Decision makers can find out relevant vulnerability assessment results with different vulnerable attitudes. In the Beijing-Tianjin-Hebei (BTH) region, China, we further applied this developed method and proved it to be reliable and consistent with the China Environmental Status Bulletin. Results indicate that the vulnerability of atmospheric environment in the BTH region is not optimistic, and environment managers should do more about air pollution. Thus, the most appropriate strategic decision and development program of city or state can be picked out assisting by the vulnerable results.

  15. Multimodal spectroscopy detects features of vulnerable atherosclerotic plaque

    NASA Astrophysics Data System (ADS)

    Šćepanović, Obrad R.; Fitzmaurice, Maryann; Miller, Arnold; Kong, Chae-Ryon; Volynskaya, Zoya; Dasari, Ramachandra R.; Kramer, John R.; Feld, Michael S.

    2011-01-01

    Early detection and treatment of rupture-prone vulnerable atherosclerotic plaques is critical to reducing patient mortality associated with cardiovascular disease. The combination of reflectance, fluorescence, and Raman spectroscopy-termed multimodal spectroscopy (MMS)-provides detailed biochemical information about tissue and can detect vulnerable plaque features: thin fibrous cap (TFC), necrotic core (NC), superficial foam cells (SFC), and thrombus. Ex vivo MMS spectra are collected from 12 patients that underwent carotid endarterectomy or femoral bypass surgery. Data are collected by means of a unitary MMS optical fiber probe and a portable clinical instrument. Blinded histopathological analysis is used to assess the vulnerability of each spectrally evaluated artery lesion. Modeling of the ex vivo MMS spectra produce objective parameters that correlate with the presence of vulnerable plaque features: TFC with fluorescence parameters indicative of collagen presence; NC/SFC with a combination of diffuse reflectance β-carotene/ceroid absorption and the Raman spectral signature of lipids; and thrombus with its Raman signature. Using these parameters, suspected vulnerable plaques can be detected with a sensitivity of 96% and specificity of 72%. These encouraging results warrant the continued development of MMS as a catheter-based clinical diagnostic technique for early detection of vulnerable plaques.

  16. Coastal vulnerability: climate change and natural hazards perspectives

    NASA Astrophysics Data System (ADS)

    Romieu, E.; Vinchon, C.

    2009-04-01

    Introduction Studying coastal zones as a territorial concept (Integrated coastal zone management) is an essential issue for managers, as they have to consider many different topics (natural hazards, resources management, tourism, climate change…). The recent approach in terms of "coastal vulnerability" studies (since the 90's) is the main tool used nowadays to help them in evaluating impacts of natural hazards on coastal zones, specially considering climate change. This present communication aims to highlight the difficulties in integrating this concept in risk analysis as it is usually practiced in natural hazards sciences. 1) Coastal vulnerability as a recent issue The concept of coastal vulnerability mainly appears in the International panel on climate change works of 1992 (IPCC. 2001), where it is presented as essential for climate change adaptation. The concept has been defined by a common methodology which proposes the assessment of seven indicators, in regards to a sea level rise of 1m in 2100: people affected, people at risk, capital value at loss, land at loss, wetland at loss, potential adaptation costs, people at risk assuming this adaptation. Many national assessments have been implemented (Nicholls, et al. 1995) and a global assessment was proposed for three indicators (Nicholls, et al. 1999). The DINAS-Coast project reuses this methodology to produce the DIVA-tool for coastal managers (Vafeidis, et al. 2004). Besides, many other methodologies for national or regional coastal vulnerability assessments have been developed (review by (UNFCCC. 2008). The use of aggregated vulnerability indicators (including geomorphology, hydrodynamics, climate change…) is widespread: the USGS coastal vulnerability index is used worldwide and was completed by a social vulnerability index (Boruff, et al. 2005). Those index-based methods propose a vulnerability mapping which visualise indicators of erosion, submersion and/or socio economic sensibility in coastal zones

  17. Seawater intrusion vulnerability indicators for freshwater lenses in strip islands

    NASA Astrophysics Data System (ADS)

    Morgan, L.; Werner, A. D.

    2014-12-01

    Freshwater lenses on small islands have been described as some of the most vulnerable aquifer systems in the world. Yet, little guidance is available regarding methods for rapidly assessing the vulnerability of freshwater lenses to the potential effects of climate change. To address this gap we employ a steady-state analytic modelling approach to develop seawater intrusion (SWI) vulnerability indicator equations. The vulnerability indicator equations quantify the propensity for SWI to occur in strip islands due to both recharge change and sea-level rise (SLR) (incorporating the effect of land surface inundation (LSI)). This work extends that of Werner et al. (2012) who developed SWI vulnerability indicator equations for unconfined and confined continental aquifers, and did not consider LSI. Flux-controlled and head-controlled conceptualisations of freshwater lenses are adopted. Under flux-controlled conditions the water table is able to rise unencumbered by land surface effects. Under head-controlled conditions the head is fixed at the centre of the lens due to, for example, centrally located topographic controls, surface water features or pumping. A number of inferences about SWI vulnerability in freshwater lenses can be made from the analysis: (1) SWI vulnerability indicators for SLR (under flux-controlled conditions) are proportional to lens thickness (or volume) and the rate of LSI and inversely proportional to island width; (2) SWI vulnerability indicators for recharge change (under flux-controlled conditions) are proportional to lens thickness (or volume) and inversely proportional to recharge; (3) SLR has greater impact under head-controlled conditions rather than flux-controlled conditions, whereas the opposite is the case for LSI and recharge change. Example applications to several case studies illustrate use of the method for rapidly ranking lenses according to vulnerability, thereby allowing for prioritisation of areas where further and more detailed SWI

  18. Coastal vulnerability: climate change and natural hazards perspectives

    NASA Astrophysics Data System (ADS)

    Romieu, E.; Vinchon, C.

    2009-04-01

    Introduction Studying coastal zones as a territorial concept (Integrated coastal zone management) is an essential issue for managers, as they have to consider many different topics (natural hazards, resources management, tourism, climate change…). The recent approach in terms of "coastal vulnerability" studies (since the 90's) is the main tool used nowadays to help them in evaluating impacts of natural hazards on coastal zones, specially considering climate change. This present communication aims to highlight the difficulties in integrating this concept in risk analysis as it is usually practiced in natural hazards sciences. 1) Coastal vulnerability as a recent issue The concept of coastal vulnerability mainly appears in the International panel on climate change works of 1992 (IPCC. 2001), where it is presented as essential for climate change adaptation. The concept has been defined by a common methodology which proposes the assessment of seven indicators, in regards to a sea level rise of 1m in 2100: people affected, people at risk, capital value at loss, land at loss, wetland at loss, potential adaptation costs, people at risk assuming this adaptation. Many national assessments have been implemented (Nicholls, et al. 1995) and a global assessment was proposed for three indicators (Nicholls, et al. 1999). The DINAS-Coast project reuses this methodology to produce the DIVA-tool for coastal managers (Vafeidis, et al. 2004). Besides, many other methodologies for national or regional coastal vulnerability assessments have been developed (review by (UNFCCC. 2008). The use of aggregated vulnerability indicators (including geomorphology, hydrodynamics, climate change…) is widespread: the USGS coastal vulnerability index is used worldwide and was completed by a social vulnerability index (Boruff, et al. 2005). Those index-based methods propose a vulnerability mapping which visualise indicators of erosion, submersion and/or socio economic sensibility in coastal zones

  19. Vulnerability to climate change: people, place and exposure to hazard

    NASA Astrophysics Data System (ADS)

    Hutton, C. W.; Kienberger, S.; Amoako Johnson, F.; Allan, A.; Giannini, V.; Allen, R.

    2011-04-01

    The Human Dimension of the Twinning European and South Asian River Basins to Enhance Capacity and Implement Adaptive Management Approaches Project (EC-Project BRAHMATWINN) is aimed at developing socio-economic tools and context for the effective inclusion of the "Human Dimension" or socio-economic vulnerability into the overall assessment of climate risk in the twinned basins of the Upper Brahmaputra River Basin (UBRB), and the Upper Danube River Basin (UDRB) . This work is conducted in the light of stakeholder/actor analysis and the prevailing legal framework. In order to effectively achieve this end, four key research and associated activities were defined: 1. Identifying stakeholders and actors including: implement an approach to ensure a broad spread of appropriate stakeholder input to the assessment of vulnerability undertaken in Asia and Europe within the research activities of the project. 2. Contextualising legal framework: to provide an assessment of the governance framework relating to socio-environmental policy development within the study site administrative areas leading to the specific identification of related policy and legal recommendations. 3. Spatial analysis and mapping of vulnerability: providing a spatial assessment of the variation of vulnerability to pre-determined environmental stressors across the study areas with an additional specific focus on gender. 4. Inclusion of findings with the broader context of the BRAHMATWINN risk of climate change study through scenarios of hazard and vulnerability (subsequent chapters). This study utilises stakeholder inputs to effectively identify and map relative weightings of vulnerability domains, such as health and education in the context of pre-specified hazards such as flood. The process is underpinned by an adaptation of the IPCC (2001) which characterizes Risk as having the components of Hazard (physiographic component) and Vulnerability (socio-economic component).

  20. Defining and Measuring Coastal Vulnerability and Resilience to Natural Hazards

    NASA Astrophysics Data System (ADS)

    Becker, M. K.; Hoagland, P.

    2014-12-01

    Accounting for an estimated 23 percent of the world's population, coastal communities face many types of natural hazards. In particular, they may be vulnerable to the effects of tropical cyclones, flooding due to tsunamis or storm surges, erosion, saltwater intrusion, and subsidence. These coastal hazards are further exacerbated by population growth and climate change. There is a lack of consensus in the literature about what constitutes vulnerability (negative impacts) and resilience (recovery from negative impacts) and how to measure these phenomena. While some important work has focused on the long-term effects of coastal hazards on economic growth, little has been done to understand, in quantitative terms, the extent to which coastal communities may be vulnerable to such hazards and, if so, whether they can be resilient. We surveyed nine indicators of human well-being in order to determine their potential suitability as measures of coastal vulnerability or resilience. Some measures, such as the Gross Domestic Product, the Human Development Index, and the Gini coefficient, comprise economic or distributional indicators of human welfare; others, such as the Social Vulnerability Index, are more complex and difficult to interpret. We selected per capita personal income as the most viable indicator, due largely to its simplicity and its availability over several decades. We used it to examine human community vulnerability and resilience to a specific coastal hazard—significant storm surges from major coastal hurricanes—in several US coastal metropolitan areas. We compiled data on per capita personal income from the US Bureau of Economic Analysis for 15 to 20 years prior and subsequent to four major hurricanes: Hugo, which hit the Charleston, South Carolina, metropolitan area in 1989; Bob, Cape Cod, Massachusetts, in 1991; Andrew, Miami, Florida, in 1992; and Opal, Pensacola, Florida, in 1995. Intervention analysis using linear regression suggests that these

  1. Potential of 3D City Models to assess flood vulnerability

    NASA Astrophysics Data System (ADS)

    Schröter, Kai; Bochow, Mathias; Schüttig, Martin; Nagel, Claus; Ross, Lutz; Kreibich, Heidi

    2016-04-01

    Vulnerability, as the product of exposure and susceptibility, is a key factor of the flood risk equation. Furthermore, the estimation of flood loss is very sensitive to the choice of the vulnerability model. Still, in contrast to elaborate hazard simulations, vulnerability is often considered in a simplified manner concerning the spatial resolution and geo-location of exposed objects as well as the susceptibility of these objects at risk. Usually, area specific potential flood loss is quantified on the level of aggregated land-use classes, and both hazard intensity and resistance characteristics of affected objects are represented in highly simplified terms. We investigate the potential of 3D City Models and spatial features derived from remote sensing data to improve the differentiation of vulnerability in flood risk assessment. 3D City Models are based on CityGML, an application scheme of the Geography Markup Language (GML), which represents the 3D geometry, 3D topology, semantics and appearance of objects on different levels of detail. As such, 3D City Models offer detailed spatial information which is useful to describe the exposure and to characterize the susceptibility of residential buildings at risk. This information is further consolidated with spatial features of the building stock derived from remote sensing data. Using this database a spatially detailed flood vulnerability model is developed by means of data-mining. Empirical flood damage data are used to derive and to validate flood susceptibility models for individual objects. We present first results from a prototype application in the city of Dresden, Germany. The vulnerability modeling based on 3D City Models and remote sensing data is compared i) to the generally accepted good engineering practice based on area specific loss potential and ii) to a highly detailed representation of flood vulnerability based on a building typology using urban structure types. Comparisons are drawn in terms of

  2. Coastal Vulnerability to Erosion Processes: Study Cases from Different Countries

    NASA Astrophysics Data System (ADS)

    Anfuso, Giorgio; Martinez Del Pozo, Jose Angel; Rangel-Buitrago, Nelson

    2010-05-01

    When natural processes affect or threaten human activities or infrastructures they become a natural hazard. In order to prevent the natural hazards impact and the associated economic and human losses, coastal managers need to know the intrinsic vulnerability of the littoral, using information on the physical and ecological coastal features, human occupation and present and future shoreline trends. The prediction of future coastline positions can be based on the study of coastal changes which have occurred over recent decades. Vertical aerial photographs, satellite imagery and maps are very useful data sources for the reconstruction of coast line changes at long (>60 years) and medium (between 60 and 10 years) temporal and spatial scales. Vulnerability maps have been obtained for several coastal sectors around the world through the use of Geographical Information Systems (GIS), computer-assisted multivariate analysis and numerical models. In the USA, "Flood Insurance Rate Maps" have been created by the government and "Coastal Zone Hazard Maps" have been prepared for coastal stretches affected by hurricane Hugo. In Spain, the vulnerability of the Ebro and an Andalusia coastal sector were investigated over different time scales. McLaughlin et al., (2002) developed a GIS based coastal vulnerability index for the Northern Ireland littoral that took into account socio-economic activities and coastal resistance to erosion and energetic characteristics. Lizárraga et al., (2001) combined beach reduction at Rosario (Mexico) with the probability of damage to landward structures, obtaining a vulnerability matrix. In this work several coastal vulnerability maps have also been created by comparing data on coastal erosion/accretion and land use along different coastal sectors in Italy, Morocco and Colombia. Keywords: Hazard, Vulnerability, Coastal Erosion, Italy, Morocco, Colombia.

  3. Prediction of individualized therapeutic vulnerabilities in cancer from genomic profiles

    PubMed Central

    Aksoy, Bülent Arman; Demir, Emek; Babur, Özgün; Wang, Weiqing; Jing, Xiaohong; Schultz, Nikolaus; Sander, Chris

    2014-01-01

    Motivation: Somatic homozygous deletions of chromosomal regions in cancer, while not necessarily oncogenic, may lead to therapeutic vulnerabilities specific to cancer cells compared with normal cells. A recently reported example is the loss of one of the two isoenzymes in glioblastoma cancer cells such that the use of a specific inhibitor selectively inhibited growth of the cancer cells, which had become fully dependent on the second isoenzyme. We have now made use of the unprecedented conjunction of large-scale cancer genomics profiling of tumor samples in The Cancer Genome Atlas (TCGA) and of tumor-derived cell lines in the Cancer Cell Line Encyclopedia, as well as the availability of integrated pathway information systems, such as Pathway Commons, to systematically search for a comprehensive set of such epistatic vulnerabilities. Results: Based on homozygous deletions affecting metabolic enzymes in 16 TCGA cancer studies and 972 cancer cell lines, we identified 4104 candidate metabolic vulnerabilities present in 1019 tumor samples and 482 cell lines. Up to 44% of these vulnerabilities can be targeted with at least one Food and Drug Administration-approved drug. We suggest focused experiments to test these vulnerabilities and clinical trials based on personalized genomic profiles of those that pass preclinical filters. We conclude that genomic profiling will in the future provide a promising basis for network pharmacology of epistatic vulnerabilities as a promising therapeutic strategy. Availability and implementation: A web-based tool for exploring all vulnerabilities and their details is available at http://cbio.mskcc.org/cancergenomics/statius/ along with supplemental data files. Contact: statius@cbio.mskcc.org Supplementary information: Supplementary data are available at Bioinformatics online. PMID:24665131

  4. A Preliminary Tsunami Vulnerability Analysis for Yenikapi Region in Istanbul

    NASA Astrophysics Data System (ADS)

    Ceren Cankaya, Zeynep; Suzen, Lutfi; Cevdet Yalciner, Ahmet; Kolat, Cagil; Aytore, Betul; Zaytsev, Andrey

    2015-04-01

    One of the main requirements during post disaster recovery operations is to maintain proper transportation and fluent communication at the disaster areas. Ports and harbors are the main transportation hubs which must work with proper performance at all times especially after the disasters. Resilience of coastal utilities after earthquakes and tsunamis have major importance for efficient and proper rescue and recovery operations soon after the disasters. Istanbul is a mega city with its various coastal utilities located at the north coast of the Sea of Marmara. At Yenikapi region of Istanbul, there are critical coastal utilities and vulnerable coastal structures and critical activities occur daily. Fishery ports, commercial ports, small craft harbors, passenger terminals of intercity maritime transportation, water front commercial and/or recreational structures are some of the examples of coastal utilization which are vulnerable against marine disasters. Therefore their vulnerability under tsunami or any other marine hazard to Yenikapi region of Istanbul is an important issue. In this study, a methodology of vulnerability analysis under tsunami attack is proposed with the applications to Yenikapi region. In the study, high resolution (1m) GIS database of Istanbul Metropolitan Municipality (IMM) is used and analyzed by using GIS implementation. The bathymetry and topography database and the vector dataset containing all buildings/structures/infrastructures in the study area are obtained for tsunami numerical modeling for the study area. GIS based tsunami vulnerability assessment is conducted by applying the Multi-criteria Decision Making Analysis (MCDA). The tsunami parameters from deterministically defined worst case scenarios are computed from the simulations using tsunami numerical model NAMI DANCE. The vulnerability parameters in the region due to two different classifications i) vulnerability of buildings/structures and ii) vulnerability of (human) evacuation

  5. Probabilistic seismic vulnerability and risk assessment of stone masonry structures

    NASA Astrophysics Data System (ADS)

    Abo El Ezz, Ahmad

    Earthquakes represent major natural hazards that regularly impact the built environment in seismic prone areas worldwide and cause considerable social and economic losses. The high losses incurred following the past destructive earthquakes promoted the need for assessment of the seismic vulnerability and risk of the existing buildings. Many historic buildings in the old urban centers in Eastern Canada such as Old Quebec City are built of stone masonry and represent un-measurable architectural and cultural heritage. These buildings were built to resist gravity loads only and generally offer poor resistance to lateral seismic loads. Seismic vulnerability assessment of stone masonry buildings is therefore the first necessary step in developing seismic retrofitting and pre-disaster mitigation plans. The objective of this study is to develop a set of probability-based analytical tools for efficient seismic vulnerability and uncertainty analysis of stone masonry buildings. A simplified probabilistic analytical methodology for vulnerability modelling of stone masonry building with systematic treatment of uncertainties throughout the modelling process is developed in the first part of this study. Building capacity curves are developed using a simplified mechanical model. A displacement based procedure is used to develop damage state fragility functions in terms of spectral displacement response based on drift thresholds of stone masonry walls. A simplified probabilistic seismic demand analysis is proposed to capture the combined uncertainty in capacity and demand on fragility functions. In the second part, a robust analytical procedure for the development of seismic hazard compatible fragility and vulnerability functions is proposed. The results are given by sets of seismic hazard compatible vulnerability functions in terms of structure-independent intensity measure (e.g. spectral acceleration) that can be used for seismic risk analysis. The procedure is very efficient for

  6. Assessing groundwater vulnerability to agrichemical contamination in the Midwest US

    USGS Publications Warehouse

    Burkart, M.R.; Kolpin, D.W.; James, D.E.

    1999-01-01

    Agrichemicals (herbicides and nitrate) are significant sources of diffuse pollution to groundwater. Indirect methods are needed to assess the potential for groundwater contamination by diffuse sources because groundwater monitoring is too costly to adequately define the geographic extent of contamination at a regional or national scale. This paper presents examples of the application of statistical, overlay and index, and process-based modeling methods for groundwater vulnerability assessments to a variety of data from the Midwest U.S. The principles for vulnerability assessment include both intrinsic (pedologic, climatologic, and hydrogeologic factors) and specific (contaminant and other anthropogenic factors) vulnerability of a location. Statistical methods use the frequency of contaminant occurrence, contaminant concentration, or contamination probability as a response variable. Statistical assessments are useful for defining the relations among explanatory and response variables whether they define intrinsic or specific vulnerability. Multivariate statistical analyses are useful for ranking variables critical to estimating water quality responses of interest. Overlay and index methods involve intersecting maps of intrinsic and specific vulnerability properties and indexing the variables by applying appropriate weights. Deterministic models use process-based equations to simulate contaminant transport and are distinguished from the other methods in their potential to predict contaminant transport in both space and time. An example of a one-dimensional leaching model linked to a geographic information system (GIS) to define a regional metamodel for contamination in the Midwest is included.

  7. Climate variability and climate change vulnerability and adaptation. Workshop summary

    SciTech Connect

    Bhatti, N.; Cirillo, R.R.; Dixon, R.K.

    1995-12-31

    Representatives from fifteen countries met in Prague, Czech Republic, on September 11-15, 1995, to share results from the analysis of vulnerability and adaptation to global climate change. The workshop focused on the issues of global climate change and its impacts on various sectors of a national economy. The U.N. Framework Convention on Climate Change (FCCC), which has been signed by more than 150 governments worldwide, calls on signatory parties to develop and communicate measures they are implementing to respond to global climate change. An analysis of a country`s vulnerability to changes in the climate helps it identify suitable adaptation measures. These analyses are designed to determine the extent of the impacts of global climate change on sensitive sectors such as agricultural crops, forests, grasslands and livestock, water resources, and coastal areas. Once it is determined how vulnerable a country may be to climate change, it is possible to identify adaptation measures for ameliorating some or all of the effects.The objectives of the vulnerability and adaptation workshop were to: The objectives of the vulnerability and adaptation workshop were to: Provide an opportunity for countries to describe their study results; Encourage countries to learn from the experience of the more complete assessments and adjust their studies accordingly; Identify issues and analyses that require further investigation; and Summarize results and experiences for governmental and intergovernmental organizations.

  8. Assessing the Agricultural Vulnerability for India under Changing Climate

    NASA Astrophysics Data System (ADS)

    Sharma, Tarul; Vardhan Murari, Harsha; Karmakar, Subhankar; Ghosh, Subimal; Singh, Jitendra

    2016-04-01

    Global climate change has proven to show majorly negative impacts for the far future. These negative impacts adversely affect almost all the fields including agriculture, water resources, tourism, and marine ecosystem. Among these, the effects on agriculture are considered to be of prime importance since its regional impacts can directly affect the global food security. Under such lines, it becomes essential to understand how climate change directs agricultural production for a region along with its vulnerability. In India, rice and wheat are considered as major staple diet and hence understanding its production loss/gain due to regional vulnerability to climate change becomes necessary. Here, an attempt has been made to understand the agricultural vulnerability for rice and wheat, considering yield as a function of temperature and precipitation during growing period. In order to accomplish this objective, the ratio of actual to potential evapo-transpiration has been considered which serves as a reliable indicator; with more this ratio towards unity, less vulnerable will be the region. The current objective needs an integration of climatic, hydrological and agricultural parameters; that can be achieved by simulating a climate data driven hydrologic (Variable Infiltration Capacity, VIC) model and a crop (Decision Support System for Agrotechnology Transfer, DSSAT) model. The proposed framework is an attempt to derive a crop vulnerability map that can facilitate in strategizing adaption practices which can reduce the adverse impacts of climate change in future.

  9. A Heat Vulnerability Index and Adaptation Solutions for Pittsburgh, Pennsylvania.

    PubMed

    Bradford, Kathryn; Abrahams, Leslie; Hegglin, Miriam; Klima, Kelly

    2015-10-01

    With increasing evidence of global warming, many cities have focused attention on response plans to address their populations' vulnerabilities. Despite expected increased frequency and intensity of heat waves, the health impacts of such events in urban areas can be minimized with careful policy and economic investments. We focus on Pittsburgh, Pennsylvania and ask two questions. First, what are the top factors contributing to heat vulnerability and how do these characteristics manifest geospatially throughout Pittsburgh? Second, assuming the City wishes to deploy additional cooling centers, what placement will optimally address the vulnerability of the at risk populations? We use national census data, ArcGIS geospatial modeling, and statistical analysis to determine a range of heat vulnerability indices and optimal cooling center placement. We find that while different studies use different data and statistical calculations, all methods tested locate additional cooling centers at the confluence of the three rivers (Downtown), the northeast side of Pittsburgh (Shadyside/Highland Park), and the southeast side of Pittsburgh (Squirrel Hill). This suggests that for Pittsburgh, a researcher could apply the same factor analysis procedure to compare data sets for different locations and times; factor analyses for heat vulnerability are more robust than previously thought.

  10. The influence of transport network vulnerability for maritime ports

    NASA Astrophysics Data System (ADS)

    Ruscă, F.; Roşca, E.; Rusca, A.; Roşca, M.; Burciu, S.

    2015-11-01

    The concepts of reliability and vulnerability are quite important in assessing the ability of transport networks from land to provide continuity in operation tacking in consideration the relation with seaports. Transport infrastructure modernizing and extension according to land use and sustainable development requirements still represents a challenging issue among policy makers, regional/local communities and scientists. The interest for the researches reliability and vulnerability for transport networks who connect maritime ports with interior city's is generate by the natural disasters, the terrorist acts, unconventional war, etc.. Transport network modelling enable the development of mathematical models used in evaluating the reliability and vulnerability. Nodes or link disruption could have an important impact over transport network users. In our paper we investigates the Romanian road network vulnerability related to Danube crossing versus maritime ports (Constanta and Mangalia) and its mitigation by improving network topology. We use Visum software to promote a methodology to assess road transport network vulnerability versus Romanian seaports and we propose some solutions to reduce probability of road transport network to fail.

  11. Larger brain size indirectly increases vulnerability to extinction in mammals.

    PubMed

    Gonzalez-Voyer, Alejandro; González-Suárez, Manuela; Vilà, Carles; Revilla, Eloy

    2016-06-01

    Although previous studies have addressed the question of why large brains evolved, we have limited understanding of potential beneficial or detrimental effects of enlarged brain size in the face of current threats. Using novel phylogenetic path analysis, we evaluated how brain size directly and indirectly, via its effects on life history and ecology, influences vulnerability to extinction across 474 mammalian species. We found that larger brains, controlling for body size, indirectly increase vulnerability to extinction by extending the gestation period, increasing weaning age, and limiting litter sizes. However, we found no evidence of direct, beneficial, or detrimental effects of brain size on vulnerability to extinction, even when we explicitly considered the different types of threats that lead to vulnerability. Order-specific analyses revealed qualitatively similar patterns for Carnivora and Artiodactyla. Interestingly, for Primates, we found that larger brain size was directly (and indirectly) associated with increased vulnerability to extinction. Our results indicate that under current conditions, the constraints on life history imposed by large brains outweigh the potential benefits, undermining the resilience of the studied mammals. Contrary to the selective forces that have favored increased brain size throughout evolutionary history, at present, larger brains have become a burden for mammals. PMID:27159368

  12. A unified framework for addiction: Vulnerabilities in the decision process

    PubMed Central

    Redish, A. David; Jensen, Steve; Johnson, Adam

    2013-01-01

    The understanding of decision-making systems has come together in recent years to form a unified theory of decision-making in the mammalian brain as arising from multiple, interacting systems (a planning system, a habit system, and a situation-recognition system). This unified decision-making system has multiple potential access points through which it can be driven to make maladaptive choices, particularly choices that entail seeking of certain drugs or behaviors. We identify 10 key vulnerabilities in the system: (1) moving away from homeostasis, (2) changing allostatic set points, (3) euphorigenic “reward-like” signals, (4) overvaluation in the planning system, (5) incorrect search of situation-action-outcome relationships, (6) misclassification of situations, (7) overvaluation in the habit system, (8) a mismatch in the balance of the two decision systems, (9) over-fast discounting processes, and (10) changed learning rates. These vulnerabilities provide a taxonomy of potential problems with decision-making systems. Although each vulnerability can drive an agent to return to the addictive choice, each vulnerability also implies a characteristic symptomology. Different drugs, different behaviors, and different individuals are likely to access different vulnerabilities. This has implications for an individual’s susceptibility to addiction and the transition to addiction, for the potential for relapse, and for the potential for treatment. PMID:18662461

  13. Larger brain size indirectly increases vulnerability to extinction in mammals.

    PubMed

    Gonzalez-Voyer, Alejandro; González-Suárez, Manuela; Vilà, Carles; Revilla, Eloy

    2016-06-01

    Although previous studies have addressed the question of why large brains evolved, we have limited understanding of potential beneficial or detrimental effects of enlarged brain size in the face of current threats. Using novel phylogenetic path analysis, we evaluated how brain size directly and indirectly, via its effects on life history and ecology, influences vulnerability to extinction across 474 mammalian species. We found that larger brains, controlling for body size, indirectly increase vulnerability to extinction by extending the gestation period, increasing weaning age, and limiting litter sizes. However, we found no evidence of direct, beneficial, or detrimental effects of brain size on vulnerability to extinction, even when we explicitly considered the different types of threats that lead to vulnerability. Order-specific analyses revealed qualitatively similar patterns for Carnivora and Artiodactyla. Interestingly, for Primates, we found that larger brain size was directly (and indirectly) associated with increased vulnerability to extinction. Our results indicate that under current conditions, the constraints on life history imposed by large brains outweigh the potential benefits, undermining the resilience of the studied mammals. Contrary to the selective forces that have favored increased brain size throughout evolutionary history, at present, larger brains have become a burden for mammals.

  14. A Heat Vulnerability Index and Adaptation Solutions for Pittsburgh, Pennsylvania.

    PubMed

    Bradford, Kathryn; Abrahams, Leslie; Hegglin, Miriam; Klima, Kelly

    2015-10-01

    With increasing evidence of global warming, many cities have focused attention on response plans to address their populations' vulnerabilities. Despite expected increased frequency and intensity of heat waves, the health impacts of such events in urban areas can be minimized with careful policy and economic investments. We focus on Pittsburgh, Pennsylvania and ask two questions. First, what are the top factors contributing to heat vulnerability and how do these characteristics manifest geospatially throughout Pittsburgh? Second, assuming the City wishes to deploy additional cooling centers, what placement will optimally address the vulnerability of the at risk populations? We use national census data, ArcGIS geospatial modeling, and statistical analysis to determine a range of heat vulnerability indices and optimal cooling center placement. We find that while different studies use different data and statistical calculations, all methods tested locate additional cooling centers at the confluence of the three rivers (Downtown), the northeast side of Pittsburgh (Shadyside/Highland Park), and the southeast side of Pittsburgh (Squirrel Hill). This suggests that for Pittsburgh, a researcher could apply the same factor analysis procedure to compare data sets for different locations and times; factor analyses for heat vulnerability are more robust than previously thought. PMID:26333158

  15. A Heat Vulnerability Index and Adaptation Solutions for Pittsburgh, Pennsylvania

    NASA Astrophysics Data System (ADS)

    Klima, K.; Abrahams, L.; Bradford, K.; Hegglin, M.

    2015-12-01

    With increasing evidence of global warming, many cities have focused attention on response plans to address their populations' vulnerabilities. Despite expected increased frequency and intensity of heat waves, the health impacts of such events in urban areas can be minimized with careful policy and economic investments. We focus on Pittsburgh, Pennsylvania and ask two questions. First, what are the top factors contributing to heat vulnerability and how do these characteristics manifest geospatially throughout Pittsburgh? Second, assuming the City wishes to deploy additional cooling centers, what placement will optimally address the vulnerability of the at risk populations? We use national census data, ArcGIS geospatial modeling, and statistical analysis to determine a range of heat vulnerability indices and optimal cooling center placement. We find that while different studies use different data and statistical calculations, all methods tested locate additional cooling centers at the confluence of the three rivers (Downtown), the northeast side of Pittsburgh (Shadyside/ Highland Park), and the southeast side of Pittsburgh (Squirrel Hill). This suggests that for Pittsburgh, a researcher could apply the same factor analysis procedure to compare datasets for different locations and times; factor analyses for heat vulnerability are more robust than previously thought.

  16. Soft Error Vulnerability of Iterative Linear Algebra Methods

    SciTech Connect

    Bronevetsky, G; de Supinski, B

    2007-12-15

    Devices become increasingly vulnerable to soft errors as their feature sizes shrink. Previously, soft errors primarily caused problems for space and high-atmospheric computing applications. Modern architectures now use features so small at sufficiently low voltages that soft errors are becoming significant even at terrestrial altitudes. The soft error vulnerability of iterative linear algebra methods, which many scientific applications use, is a critical aspect of the overall application vulnerability. These methods are often considered invulnerable to many soft errors because they converge from an imprecise solution to a precise one. However, we show that iterative methods can be vulnerable to soft errors, with a high rate of silent data corruptions. We quantify this vulnerability, with algorithms generating up to 8.5% erroneous results when subjected to a single bit-flip. Further, we show that detecting soft errors in an iterative method depends on its detailed convergence properties and requires more complex mechanisms than simply checking the residual. Finally, we explore inexpensive techniques to tolerate soft errors in these methods.

  17. Defining Resilience and Vulnerability Based on Ontology Engineering Approach

    NASA Astrophysics Data System (ADS)

    Kumazawa, T.; Matsui, T.; Endo, A.

    2014-12-01

    It is necessary to reflect the concepts of resilience and vulnerability into the assessment framework of "Human-Environmental Security", but it is also in difficulty to identify the linkage between both concepts because of the difference of the academic community which has discussed each concept. The authors have been developing the ontology which deals with the sustainability of the social-ecological systems (SESs). Resilience and vulnerability are also the concepts in the target world which this ontology covers. Based on this point, this paper aims at explicating the semantic relationship between the concepts of resilience and vulnerability based on ontology engineering approach. For this purpose, we first examine the definitions of resilience and vulnerability which the existing literatures proposed. Second, we incorporate the definitions in the ontology dealing with sustainability of SESs. Finally, we focus on the "Water-Energy-Food Nexus Index" to assess Human-Environmental Security, and clarify how the concepts of resilience and vulnerability are linked semantically through the concepts included in these index items.

  18. Physical vulnerability modelling in natural hazard risk assessment

    NASA Astrophysics Data System (ADS)

    Douglas, J.

    2007-04-01

    An evaluation of the risk to an exposed element from a hazardous event requires a consideration of the element's vulnerability, which expresses its propensity to suffer damage. This concept allows the assessed level of hazard to be translated to an estimated level of risk and is often used to evaluate the risk from earthquakes and cyclones. However, for other natural perils, such as mass movements, coastal erosion and volcanoes, the incorporation of vulnerability within risk assessment is not well established and consequently quantitative risk estimations are not often made. This impedes the study of the relative contributions from different hazards to the overall risk at a site. Physical vulnerability is poorly modelled for many reasons: the cause of human casualties (from the event itself rather than by building damage); lack of observational data on the hazard, the elements at risk and the induced damage; the complexity of the structural damage mechanisms; the temporal and geographical scales; and the ability to modify the hazard level. Many of these causes are related to the nature of the peril therefore for some hazards, such as coastal erosion, the benefits of considering an element's physical vulnerability may be limited. However, for hazards such as volcanoes and mass movements the modelling of vulnerability should be improved by, for example, following the efforts made in earthquake risk assessment. For example, additional observational data on induced building damage and the hazardous event should be routinely collected and correlated and also numerical modelling of building behaviour during a damaging event should be attempted.

  19. A vulnerability analysis for a drought vulnerable catchment in South-Eastern Austria

    NASA Astrophysics Data System (ADS)

    Hohmann, Clara; Kirchengast, Gottfried; Birk, Steffen

    2016-04-01

    To detect uncertainties and thresholds in a drought vulnerable region we focus on a typical river catchment of the Austrian South-Eastern Alpine forelands with good data availability, the Raab valley. This mid-latitude region in the south-east of the Austrian state Styria (˜ 47° N, ˜ 16° E) exhibits a strong temperature increase over the last decades. Especially the mean summer temperatures (June to August) show a strong increase (˜ 0.7 °C per decade) over the last decades (1971 - 2015) (Kabas et al., Meteorol. Z. 20, 277-289, 2011; pers. comm., 2015). The Styrian Raab valley, with a catchment size of 986 km2, has already struggled with drought periods (e.g., summers of 1992, 2001 and 2003). Thus, it is important to know what happens if warm and dry periods occur more frequently. Therefore we analyze which sensitivities and related uncertainties exist, which thresholds might be crossed, and what the effects on the different components of the water balance equation are, in particular on runoff, soil moisture, groundwater recharge, and evapotranspiration. We use the mainly physics-based hydrological Water Flow and Balance Simulation Model (WaSiM), developed at ETH Zurich (Schulla, Diss., ETH Zurich, CH, 1997). The model is well established and widely used for hydrological modeling at a diversity of spatial and temporal resolutions. We choose a model set up which is as simple as possible but as complex as necessary to perform sensitivity studies on uncertainties and thresholds in the context of climate change. In order to assess the model performance under a wide range of conditions, the calibration and validation is performed with a split sample for dry and wet periods. With the calibrated and validated model we perform a low-flow vulnerability analysis ("stress test"), with focus on drought-related conditions. Therefore we simulate changes in weather and climate (e.g., 20% and 50% less precipitation, 2 °C and 5 °C higher temperature), changes in land use and

  20. Urban flood risk mitigation: from vulnerability assessment to resilient city

    NASA Astrophysics Data System (ADS)

    Serre, D.; Barroca, B.

    2009-04-01

    Urban flood risk mitigation: from vulnerability assessment to resilient city Bruno Barroca1, Damien Serre2 1Laboratory of Urban Engineering, Environment and Building (L G U E H) - Université de Marne-la-Vallée - Pôle Ville, 5, Bd Descartes - Bâtiment Lavoisier - 77454 Marne la Vallée Cedex 2 - France 2City of Paris Engineering School, Construction - Environment Department, 15 rue Fénelon, 75010 Paris, France In France, as in Europe and more generally throughout the world, river floods have been increasing in frequency and severity over the last ten years, and there are more instances of rivers bursting their banks, aggravating the impact of the flooding of areas supposedly protected by flood defenses. Despite efforts made to well maintain the flood defense assets, we often observe flood defense failures leading to finally increase flood risk in protected area during major flood events. Furthermore, flood forecasting models, although they benefit continuous improvements, remain partly inaccurate due to uncertainties populated all along data calculation processes. These circumstances obliged stakeholders and the scientific communities to manage flood risk by integrating new concepts like stakes management, vulnerability assessments and more recently urban resilience development. Definitively, the goal is to reduce flood risk by managing of course flood defenses and improving flood forecasting models, but also stakes and vulnerability of flooded areas to achieve urban resilience face to flood events. Vulnerability to flood is essentially concentrated in urban areas. Assessing vulnerability of a city is very difficult. Indeed, urban area is a complex system composed by a sum of technical sub-systems as complex as the urban area itself. Assessing city vulnerability consists in talking into account each sub system vulnerability and integrating all direct and indirect impacts generally depending from city shape and city spatial organization. At this time, although

  1. Comparison of four Vulnerability Approaches to Mapping of Shallow Aquifers of Eastern Dahomey Basin of Nigeria

    NASA Astrophysics Data System (ADS)

    Oke, Saheed; Vermeulen, Danie

    2016-04-01

    This study presents the outcome of mapping the shallow aquifers of the eastern Dahomey Basin of southwestern Nigeria vulnerability studies. The basin is a coastal transboundary aquifer extending from eastern Ghana to southwestern Nigeria. The study aimed to examine the most suitable method for mapping the basin shallow aquifers by comparing the results of four different vulnerability approaches. This is most important due to differences in vulnerability assessment parameters, approaches and results derived from most vulnerability methods on a particular aquifer. The methodology involves using vulnerability techniques that assess the intrinsic properties of the aquifer. Two methods from travel time approach (AVI and RTt) and index approach (DRASTIC and PI) were employed in the mapping of the basin. The results show the AVI has the least mapping parameters with 75% of the basin classified as very high vulnerability and 25% with high vulnerability. The DRASTIC mapping shows 18% as low vulnerability, 61% as moderate vulnerability and 21% reveal high vulnerability. Mapping with the PI method which has highest parameters shows 66% of the aquifer as low vulnerability and 34% reveal moderate vulnerability. The RTt method shows 18% as very high vulnerability, 8% as high vulnerability, 64% as moderate vulnerability and 10% reveal very low vulnerability. Further analysis involving correlation plots shows the highest correlation of 62% between the RTt and DRASTIC method than within any others methods. The analysis shows that the PI method is the mildest of all the vulnerability methods while the AVI method is the strictest of the methods considered in this vulnerability mapping. The significance of using four different approaches to the mapping of the shallow aquifers of the eastern Dahomey Basin will guide in the recommendation of the best vulnerability method for subsequent future assessment of this and other shallow aquifers. Keywords: Aquifer vulnerability, Dahomey Basin

  2. Economic vulnerability of timber resources to forest fires.

    PubMed

    y Silva, Francisco Rodríguez; Molina, Juan Ramón; González-Cabán, Armando; Machuca, Miguel Ángel Herrera

    2012-06-15

    The temporal-spatial planning of activities for a territorial fire management program requires knowing the value of forest ecosystems. In this paper we extend to and apply the economic valuation principle to the concept of economic vulnerability and present a methodology for the economic valuation of the forest production ecosystems. The forest vulnerability is analyzed from criteria intrinsically associated to the forest characterization, and to the potential behavior of surface fires. Integrating a mapping process of fire potential and analytical valuation algorithms facilitates the implementation of fire prevention planning. The availability of cartography of economic vulnerability of the forest ecosystems is fundamental for budget optimization, and to help in the decision making process. PMID:22343614

  3. Climate volatility deepens poverty vulnerability in developing countries

    NASA Astrophysics Data System (ADS)

    Ahmed, Syud A.; Diffenbaugh, Noah S.; Hertel, Thomas W.

    2009-07-01

    Extreme climate events could influence poverty by affecting agricultural productivity and raising prices of staple foods that are important to poor households in developing countries. With the frequency and intensity of extreme climate events predicted to change in the future, informed policy design and analysis requires an understanding of which countries and groups are going to be most vulnerable to increasing poverty. Using a novel economic-climate analysis framework, we assess the poverty impacts of climate volatility for seven socio-economic groups in 16 developing countries. We find that extremes under present climate volatility increase poverty across our developing country sample—particularly in Bangladesh, Mexico, Indonesia, and Africa—with urban wage earners the most vulnerable group. We also find that global warming exacerbates poverty vulnerability in many nations.

  4. Vulnerability of coastal livelihoods to shrimp farming: Insights from Mozambique.

    PubMed

    Blythe, Jessica; Flaherty, Mark; Murray, Grant

    2015-05-01

    Millions of people around the world depend on shrimp aquaculture for their livelihoods. Yet, the phenomenal growth of shrimp farming has often given rise to considerable environmental and social damage. This article examines the impacts of commercial, export-oriented shrimp aquaculture on local livelihood vulnerability by comparing the exposure, sensitivity, and adaptive capacity of shrimp farm employees with non-farm employees in rural Mozambique. Exposure to stressors was similar between the two groups. Shrimp farm employees had higher assets and higher adaptive capacity than non-farm employees. However, because their income is heavily dependent on a single commodity, shrimp farm employees were highly susceptible to the boom crop nature of intensive shrimp farming. The implications for aquaculture policy and vulnerability research are discussed. The article argues that coastal vulnerability is dynamic, variable, and influenced by multiple processes operating at multiple scales.

  5. Reducing Soft-error Vulnerability of Caches using Data Compression

    SciTech Connect

    Vetter, Jeffrey S

    2016-01-01

    With ongoing chip miniaturization and voltage scaling, particle strike-induced soft errors present increasingly severe threat to the reliability of on-chip caches. In this paper, we present a technique to reduce the vulnerability of caches to soft-errors. Our technique uses data compression to reduce the number of vulnerable data bits in the cache and performs selective duplication of more critical data-bits to provide extra protection to them. Microarchitectural simulations have shown that our technique is effective in reducing architectural vulnerability factor (AVF) of the cache and outperforms another technique. For single and dual-core system configuration, the average reduction in AVF is 5.59X and 8.44X, respectively. Also, the implementation and performance overheads of our technique are minimal and it is useful for a broad range of workloads.

  6. Vulnerability Analysis and Evaluation of Urban Road System in Tianjin

    NASA Astrophysics Data System (ADS)

    Liu, Y. Q.; Wu, X.

    In recent years, with the development of economy, the road construction of our country has entered into a period of rapid growth. The road transportation network has been expanding and the risk of disasters is increasing. In this paper we study the vulnerability of urban road system in Tianjin. After analyzed many risk factors of the urban road system security, including road construction, road traffic and the natural environment, we proposed an evaluation index of vulnerability of urban road system and established the corresponding evaluation index system. Based on the results of analysis and comprehensive evaluation, appropriate improvement measures and suggestions which may reduce the vulnerability of the road system and improve the safety and reliability of the road system are proposed.

  7. Assessing the nutritional vulnerability of older people in developing countries.

    PubMed

    1997-12-01

    The nutrition of older people in developing countries, and the effect of their nutritional status on the quality of life, have not received sufficient attention. A 1997 symposium held at the London (England) School of Hygiene and Tropical Medicine addressed the assessment of nutritional vulnerability in older people in rural and urban settings. Reported were the results of a collaborative study conducted in the urban slums of Mumbai, India; a refugee camp for Rwandans in Karagwe, Tanzania; and rural communities in Malawi. Physical impairment was highest in India and increased with both age and deteriorating nutritional status in all three settings. Among the risk factors for nutritional vulnerability identified through the study to date are living alone, social isolation, reduced food intake, illiteracy, low socioeconomic status, and certain diseases. A field handbook to assess nutritional vulnerability has been prepared based on the research program and will be published in 1988. PMID:12293175

  8. Properties of ecosystems that are vulnerable during eco-fusion

    PubMed Central

    Yoshida, Katsuhiko; Tokita, Kei

    2015-01-01

    When two ecosystems with separate evolutionary histories come into contact (eco-fusion), reciprocal invasions occur during their fusion. Asymmetries in the migration direction or extinction rate then occur (e.g., during the Great American Biotic Interchange, GABI). Hypotheses have been proposed to describe this process, but the ecosystem properties have not been adequately discussed. To identify the ecosystem properties that create vulnerability to species loss during eco-fusion, we conducted computer simulations of the fusion of ecosystems with independent evolutionary histories. With asymmetrical species extinction rates, the ecosystem with a higher extinction rate had a shorter food chain, a higher ratio of animal species to plant species, and a lower ratio of carnivores to herbivores. Most ecosystems that have undergone isolated evolution are vulnerable. These results may explain the vulnerability of South America's ecosystem during the GABI and that of modern Australia. PMID:25631294

  9. An holistic approach to beach erosion vulnerability assessment.

    PubMed

    Alexandrakis, George; Poulos, Serafim Ε

    2014-01-01

    Erosion is a major threat for coasts worldwide, beaches in particular, which constitute one of the most valuable coastal landforms. Vulnerability assessments related to beach erosion may contribute to planning measures to counteract erosion by identifying, quantifying and ranking vulnerability. Herein, we present a new index, the Beach Vulnerability Index (BVI), which combines simplicity in calculations, easily obtainable data and low processing capacity. This approach provides results not only for different beaches, but also for different sectors of the same beach and enables the identification of the relative significance of the processes involved. It functions through the numerical approximation of indicators that correspond to the mechanisms related to the processes that control beach evolution, such as sediment availability, wave climate, beach morhodynamics and sea level change. The BVI is also intended to be used as a managerial tool for beach sustainability, including resilience to climate change impact on beach erosion. PMID:25123815

  10. Betweenness as a Tool of Vulnerability Analysis of Power System

    NASA Astrophysics Data System (ADS)

    Rout, Gyanendra Kumar; Chowdhury, Tamalika; Chanda, Chandan Kumar

    2016-06-01

    Complex network theory finds its application in analysis of power grid as both share some common characteristics. By using this theory finding critical elements in power network can be achieved. As vulnerabilities of elements of the network decide the vulnerability of the total network, in this paper, vulnerability of each element is studied using two complex network models—betweenness centrality and extended betweenness. The betweenness centrality considers only topological structure of power system whereas extended betweenness is based on both topological and physical properties of the system. In the latter case, some of the electrical properties such as electrical distance, line flow limits, transmission capacities of lines and PTDF matrix are included. The standard IEEE 57 bus system has been studied based upon the above mentioned indices and following conclusions have been discussed.

  11. Chemical Safety Vulnerability Working Group report. Volume 1

    SciTech Connect

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains the Executive summary; Introduction; Summary of vulnerabilities; Management systems weaknesses; Commendable practices; Summary of management response plan; Conclusions; and a Glossary of chemical terms.

  12. Modelling the elements of country vulnerability to earthquake disasters.

    PubMed

    Asef, M R

    2008-09-01

    Earthquakes have probably been the most deadly form of natural disaster in the past century. Diversity of earthquake specifications in terms of magnitude, intensity and frequency at the semicontinental scale has initiated various kinds of disasters at a regional scale. Additionally, diverse characteristics of countries in terms of population size, disaster preparedness, economic strength and building construction development often causes an earthquake of a certain characteristic to have different impacts on the affected region. This research focuses on the appropriate criteria for identifying the severity of major earthquake disasters based on some key observed symptoms. Accordingly, the article presents a methodology for identification and relative quantification of severity of earthquake disasters. This has led to an earthquake disaster vulnerability model at the country scale. Data analysis based on this model suggested a quantitative, comparative and meaningful interpretation of the vulnerability of concerned countries, and successfully explained which countries are more vulnerable to major disasters.

  13. Assessing and managing freshwater ecosystems vulnerable to global change

    USGS Publications Warehouse

    Angeler, David G.; Allen, Craig R.; Birge, Hannah E.; Drakare, Stina; McKie, Brendan G.; Johnson, Richard K.

    2014-01-01

    Freshwater ecosystems are important for global biodiversity and provide essential ecosystem services. There is consensus in the scientific literature that freshwater ecosystems are vulnerable to the impacts of environmental change, which may trigger irreversible regime shifts upon which biodiversity and ecosystem services may be lost. There are profound uncertainties regarding the management and assessment of the vulnerability of freshwater ecosystems to environmental change. Quantitative approaches are needed to reduce this uncertainty. We describe available statistical and modeling approaches along with case studies that demonstrate how resilience theory can be applied to aid decision-making in natural resources management. We highlight especially how long-term monitoring efforts combined with ecological theory can provide a novel nexus between ecological impact assessment and management, and the quantification of systemic vulnerability and thus the resilience of ecosystems to environmental change.

  14. Corticosterone levels determine individual vulnerability to amphetamine self-administration.

    PubMed Central

    Piazza, P V; Maccari, S; Deminière, J M; Le Moal, M; Mormède, P; Simon, H

    1991-01-01

    Individual vulnerability to the reinforcing properties of drugs appears to be an essential characteristic predisposing humans to addiction. In animals, a greater behavioral reactivity to a mild stress, such as exposure to a novel environment, is an index of the vulnerability to acquire amphetamine self-administration. Biological responses to stress as well as behavioral reactivity may predict such a vulnerability. In the present study, rats with a longer duration of corticosterone secretion after exposure to novelty showed facilitation of acquisition of amphetamine self-administration. Furthermore, corticosterone administration in nonpredisposed individuals increased the reinforcing value of the drug and facilitated the acquisition of amphetamine self-administration. These results indicate that the stress-related activity of the hypothalamic-pituitary-adrenal axis may play a role in the pathogenesis of psychostimulant addiction. PMID:2006148

  15. DoD energy vulnerabilities: potential problems and observations

    SciTech Connect

    Freiwald, D A; Berger, M E; Roach, J F

    1982-08-01

    The Department of Defense is almost entirely dependent on civilian energy supplies to meet its needs in both peacetime and periods of heightened conflict. There are a number of potential vulnerabilities to the continual and timely supply of energy to both the civilian and military sectors. These include denial of the energy resources themselves, disruption of critical transportation networks, destruction of storage facilities, and interruption of electrical power. This report briefly reviews the present situation for provision of energy from the civilian sector to the military. General vulnerabilities of the existing energy supply system are identified, along with the potential for armed aggression (including terrorist and sabotage activities) against the energy network. Conclusions and some tentative observations are made as to a proper response to the existing vulnerabilities.

  16. Imaging of coronary atherosclerosis and identification of the vulnerable plaque

    PubMed Central

    de Feyter, P.J.; Serruys, P. W.; Nieman, K.; Mollet, N.; Cademartiri, F.; van Geuns, R. J.; Slager, C.; van der Steen, A.F.W.; Krams, R.; Schaar, J.A.; Wielopolski, P.; Pattynama, P.M.T.; Arampatzis, A.; van der Lugt, A.; Regar, E.; Ligthart, J.; Smits, P.

    2003-01-01

    Identification of the vulnerable plaque responsible for the occurrence of acute coronary syndromes and acute coronary death is a prerequisite for the stabilisation of this vulnerable plaque. Comprehensive coronary atherosclerosis imaging in clinical practice should involve visualisation of the entire coronary artery tree and characterisation of the plaque, including the three-dimensional morphology of the plaque, encroachment of the plaque on the vessel lumen, the major tissue components of the plaque, remodelling of the vessel and presence of inflammation. Obviously, no single diagnostic modality is available that provides such comprehensive imaging and unfortunately no diagnostic tool is available that unequivocally identifies the vulnerable plaque. The objective of this article is to discuss experience with currently available diagnostic modalities for coronary atherosclerosis imaging. In addition, a number of evolving techniques will be briefly discussed. ImagesFigure 1Figure 2Figure 3Figure 4Figure 5Figure 6Figure 7 PMID:25696244

  17. Research on vulnerability assessments of the Huanghe (Yellow River) delta

    NASA Astrophysics Data System (ADS)

    qiao, shuqing; shi, xuefa

    2014-05-01

    Coastal zone located at the juncture of the sea, river and land, and under the influence of both land and ocean (including atmosphere), especially the sea-level rise and human activities, are vulnerable to environment and ecology. At highest risk are coastal zone of South, Southeast and East Asia with dense populations, low elevations and inadequate adaptive capacity. In China, more than 40% of the population live on the 15% of the land in coastal area and more than 70% cities located around the coastal area. The Chinese coastal region, especially river delta area has been experienced erosion, seawater intrusion and decrease in biodiversity under the combined influence of sea-level rise, tectonic subsidence and flooding. Furthermore, some kinds of human activity, such as land use, building, dam construction, reclamation from the sea and waste dumping strengthen the vulnerability of environment and ecosystem in coastal region. The coastal hazards (e.g. coastal erosion, seawater intrusion, land subsidence) and vulnerability of the Huanghe (Yelllow River) delta area are studied during the past several years. A systematic coastal assessment index is built and an evaluation model is developed using the development platform of Visual studio.Net 2005. The assessment index system includes two parts, inherent (sea level rise rate, elevation, morphology, water and sediment discharge, mean tidal range, mean wave height etc) and specific vulnerability index (population density, GDP, land utilization, protection structures etc). The assessment index are determined the weight using Analytic hierarchy process (AHP) method. Based on the research results, we better understand the current status and future change of coastal vulnerability and hazards, discuss the impact of the natural possess and human activities. Furthermore, we provide defending strategies for coastal zone vulnerability and typical coastal hazards.

  18. Improvements to the DRASTIC ground-water vulnerability mapping method

    USGS Publications Warehouse

    Rupert, Michael G.

    1999-01-01

    Ground-water vulnerability maps are designed to show areas of greatest potential for ground-water contamination on the basis of hydrogeologic and anthropogenic (human) factors. The maps are developed by using computer mapping hardware and software called a geographic information system (GIS) to combine data layers such as land use, soils, and depth to water. Usually, ground-water vulnerability is determined by assigning point ratings to the individual data layers and then adding the point ratings together when those layers are combined into a vulnerability map. Probably the most widely used ground-water vulnerability mapping method is DRASTIC, named for the seven factors considered in the method: Depth to water, net Recharge, Aquifer media, Soil media, Topography, Impact of vadose zone media, and hydraulic Conductivity of the aquifer (Aller and others, 1985, p. iv). The DRASTIC method has been used to develop ground-water vulnerability maps in many parts of the Nation; however, the effectiveness of the method has met with mixed success (Koterba and others, 1993, p. 513; U.S. Environmental Protection Agency, 1993; Barbash and Resek, 1996; Rupert, 1997). DRASTIC maps usually are not calibrated to measured contaminant concentrations. The DRASTIC ground-water vulnerability mapping method was improved by calibrating the point rating scheme to measured nitrite plus nitrate as nitrogen (NO2+NO3–N) concentrations in ground water on the basis of statistical correlations between NO2+NO3–N concentrations and land use, soils, and depth to water (Rupert, 1997). This report describes the calibration method developed by Rupert and summarizes the improvements in results of this method over those of the uncalibrated DRASTIC method applied by Rupert and others (1991) in the eastern Snake River Plain, Idaho.

  19. Flood hazard, vulnerability, and risk assessment for human life

    NASA Astrophysics Data System (ADS)

    Pan, T.; Chang, T.; Lai, J.; Hsieh, M.; Tan, Y.; Lin, Y.

    2011-12-01

    Flood risk assessment is an important issue for the countries suffering tropical cyclones and monsoon. Taiwan is located in the hot zone of typhoon tracks in the Western Pacific. There are three to five typhoons landing Taiwan every year. Typhoons and heavy rainfalls often cause inundation disaster rising with the increase of population and the development of social economy. The purpose of this study is to carry out the flood hazard, vulnerability and risk in term of human life. Based on the concept that flood risk is composed by flood hazard and vulnerability, a inundation simulation is performed to evaluate the factors of flood hazard for human life according to base flood (100-year return period). The flood depth, velocity and rising ratio are the three factors of flood hazards. Furthermore, the factors of flood vulnerability are identified in terms of human life that are classified into two main factors, residents and environment. The sub factors related to residents are the density of population and the density of vulnerable people including elders, youngers and disabled persons. The sub factors related to environment include the the number of building floors, the locations of buildings, the and distance to rescue center. The analytic hierarchy process (AHP) is adopted to determine the weights of these factors. The risk matrix is applied to show the risk from low to high based on the evaluation of flood hazards and vulnerabilities. The Tseng-Wen River watershed is selected as the case study because a serious flood was induced by Typhoon Morakot in 2009, which produced a record-breaking rainfall of 2.361mm in 48 hours in the last 50 years. The results of assessing the flood hazard, vulnerability and risk in term of human life could improve the emergency operation for flood disaster to prepare enough relief goods and materials during typhoon landing.

  20. Vulnerability Analysis Considerations for the Transportation of Special Nuclear Material

    SciTech Connect

    Nicholson, Lary G.; Purvis, James W.

    1999-07-21

    The vulnerability analysis methodology developed for fixed nuclear material sites has proven to be extremely effective in assessing associated transportation issues. The basic methods and techniques used are directly applicable to conducting a transportation vulnerability analysis. The purpose of this paper is to illustrate that the same physical protection elements (detection, delay, and response) are present, although the response force plays a dominant role in preventing the theft or sabotage of material. Transportation systems are continuously exposed to the general public whereas the fixed site location by its very nature restricts general public access.

  1. Intensified tuberculosis case finding amongst vulnerable communities in southern India.

    PubMed

    Reddy, K K; Ananthakrishnan, R; Jacob, A G; Das, M; Isaakidis, P; Kumar, A M V

    2015-12-21

    India mainly uses passive case finding to detect tuberculosis (TB) patients through the Revised National Tuberculosis Control Programme (RNTCP). An intensified case finding (ICF) intervention was conducted among vulnerable communities in two districts of Karnataka during July-December 2013; 658 sputum smear-positive TB cases were detected. The number of smear-positive cases detected increased by 8.8% relative to the pre-intervention period (July-December 2012) in intervention communities as compared to an 8.6% decrease in communities without the ICF intervention. ICF activities brought TB services closer to vulnerable communities, moderately increasing TB case detection rates.

  2. Integrating Science and Engineering to Reduce Vulnerability to Climate Extremes

    NASA Astrophysics Data System (ADS)

    Jones, Mari R.; Holland, Greg J.; Done, James M.

    2013-12-01

    How does our built environment make society vulnerable to climate extremes such as flooding? What knowledge is required by engineering designers and risk managers to address the associated risks? How can engineering/scientific approaches be adapted to reduce vulnerability to weather and climate extremes? These were some of the key questions posed during a recent workshop at the National Center for Atmospheric Research (NCAR), which was attended by climate scientists, civil engineering practitioners, and governmental departments. Engineering design encompasses a broad range of applications; to focus discussions, this workshop targeted the specific theme of water resources.

  3. Simple model of population vulnerability during crisis relocation. Final report

    SciTech Connect

    Schmidt, L.A.

    1983-01-01

    The objective of the study is to estimate the cost in survivors of short warning leading to attack during full nationwide crises relocation. A simulation model of traffic flow over the national interstate road network was developed to predict population vulnerability during a crisis relocation. The model predicts large initial rates of reduction in nationwide vulnerability (half the at-risk population is evacuated in 21 hours) due to the large number of risk areas, reception areas, and over the road network to achieve the traffic plan assumptions of the model are discussed. No unreasonable problems are uncovered in achieving the major production of the model.

  4. Assessment of Coronary Plaque Vulnerability with Optical Coherence Tomography

    PubMed Central

    Uemura, Shiro; Soeda, Tsunenari; Sugawara, Yu; Ueda, Tomoya; Watanabe, Makoto; Saito, Yoshihiko

    2014-01-01

    Several catheter-based imaging modalities have been developed over the past 2 decades for visualizing the morphological features of coronary atherosclerotic plaques that are susceptible to future development of serious cardiovascular events. Optical coherence tomography (OCT) is a new high-resolution intracoronary imaging modality based on near-infrared interferometry, and it has been shown to be able to identify various components of atheromatous plaques. In this review, we examine the histopathology of vulnerable plaques as a target for imaging technology, and discuss the evidence of OCT in identifying vulnerable atherosclerotic lesions in patients with coronary artery disease. PMID:27122761

  5. Validating vulnerability functions for buildings exposed to Alpine torrent processes

    NASA Astrophysics Data System (ADS)

    Totschnig, R.; Fuchs, S.

    2012-04-01

    Vulnerability assessment is generally seen as an important component in the framework of risk assessment. Focusing on the physical vulnerability and following a natural science perspective, vulnerability functions can be used to quantify vulnerability by setting up a mathematical relationship between the degree of loss of an element at risk exposed and the corresponding intensity of the hazardous process. The examined elements at risk were defined as those buildings that were firstly located on the torrent fans of individual Austrian test sites and secondly characterised by mixed types of construction composed from brick masonry and concrete, however used for different purposes (private residential and commercial accommodation buildings). The degree of loss was calculated as the ratio between the damage and the reconstruction value of the corresponding building. The damage was quantitatively registered in terms of monetary loss after the event by professional damage appraisers. The reconstruction values were calculated based on an insurance approach using unit prices per m2. The intensity of the process (fluvial sediment transport and debris flow) was proxied for each individual building in terms of deposition height. Additionally, a relative intensity, composed from a ratio between the deposition height and the height of the affected building, was used to compensate the influence of different building heights on the degree of loss at a given process intensity. The determination of the degree of loss as well as the corresponding intensity yields a scatterplot of vulnerability values for each individual building; illustrating both the degree of loss (ordinate) and the process intensity (abscissa). Nonlinear regression approaches in terms of cumulative distribution functions were applied to derive the mathematical relation between process intensities and degrees of loss. The corresponding parameters were estimated by using a sequential quadratic programming algorithm

  6. International Student-Workers in Australia: A New Vulnerable Workforce

    ERIC Educational Resources Information Center

    Nyland, Chris; Forbes-Mewett, Helen; Marginson, Simon; Ramia, Gaby; Sawir, Erlenawati; Smith, Sharon

    2009-01-01

    In the period immediately preceding the 2007 Australian election, much attention was accorded to the impact of the nation's labour laws on vulnerable employees. This debate centred on specific groups including women, youth, migrants and workers on individual employment contracts. International students, by contrast, were ignored in the debate.…

  7. Overseas trained nurses left vulnerable by 457 visa.

    PubMed

    2008-12-01

    A recent review of our overseas worker visa has acknowledged that trained nurses employed temporarily in Australia have been left vulnerable by their sponsors. The Federal government review into the Visa Subclass 457 (457 Visa) has exposed considerable integrity and exploitation issues with the visa, writes the QNU Legal Team.

  8. Vulnerability Assessment of Water Supply Systems: Status, Gaps and Opportunities

    NASA Astrophysics Data System (ADS)

    Wheater, H. S.

    2015-12-01

    Conventional frameworks for assessing the impacts of climate change on water resource systems use cascades of climate and hydrological models to provide 'top-down' projections of future water availability, but these are subject to high uncertainty and are model and scenario-specific. Hence there has been recent interest in 'bottom-up' frameworks, which aim to evaluate system vulnerability to change in the context of possible future climate and/or hydrological conditions. Such vulnerability assessments are generic, and can be combined with updated information from top-down assessments as they become available. While some vulnerability methods use hydrological models to estimate water availability, fully bottom-up schemes have recently been proposed that directly map system vulnerability as a function of feasible changes in water supply characteristics. These use stochastic algorithms, based on reconstruction or reshuffling methods, by which multiple water supply realizations can be generated under feasible ranges of change in water supply conditions. The paper reports recent successes, and points to areas of future improvement. Advances in stochastic modeling and optimization can address some technical limitations in flow reconstruction, while various data mining and system identification techniques can provide possibilities to better condition realizations for consistency with top-down scenarios. Finally, we show that probabilistic and Bayesian frameworks together can provide a potential basis to combine information obtained from fully bottom-up analyses with projections available from climate and/or hydrological models in a fully integrated risk assessment framework for deep uncertainty.

  9. 40 CFR 1400.4 - Vulnerable zone indicator system.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 33 2011-07-01 2011-07-01 false Vulnerable zone indicator system. 1400.4 Section 1400.4 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY AND DEPARTMENT OF JUSTICE ACCIDENTAL RELEASE PREVENTION REQUIREMENTS; RISK MANAGEMENT PROGRAMS UNDER THE CLEAN AIR ACT SECTION...

  10. 40 CFR 1400.4 - Vulnerable zone indicator system.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 32 2010-07-01 2010-07-01 false Vulnerable zone indicator system. 1400.4 Section 1400.4 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY AND DEPARTMENT OF JUSTICE ACCIDENTAL RELEASE PREVENTION REQUIREMENTS; RISK MANAGEMENT PROGRAMS UNDER THE CLEAN AIR ACT SECTION...

  11. Effect of whiskey on atrial vulnerability and "holiday heart".

    PubMed

    Engel, T R; Luck, J C

    1983-03-01

    Vulnerability to atrial fibrillation and flutter was examined in 11 alcohol abusers who did not have cardiomyopathy or manifest heart failure. Atrial extrastimulation was done with rapid pacing (drive cycle length 500 ms) to facilitate induction of atrial vulnerability, seen in four alcohol abusers. The remaining seven were retested 30 minutes after drinking 60 to 120 ml of 86 proof whiskey (ethanol blood levels were 49 to 101 mg/100 ml but pulmonary capillary wedge pressure remained normal in all) and atrial fibrillation or flutter was induced in three of the drinkers. Three nondrinkers, symptomatic with sinus bradycardia but not in heart failure, were found not to be vulnerable to atrial fibrillation or flutter, but flutter was induced in two of the three after drinking whiskey. Whiskey did not alter atrial functional refractory periods (mean +/- standard error of the mean 297 +/- 14 to 290 +/- 12 ms) or widen the dispersion among three disparate right atrial sites (57 +/- 13 to 47 +/- 12 ms). Thus, whiskey enhanced vulnerability to atrial fibrillation and flutter in patients without heart failure or cardiomyopathy, substantiating the "holiday heart" syndrome.

  12. The Vulnerable Researcher: Some Unanticipated Challenges of Doctoral Fieldwork

    ERIC Educational Resources Information Center

    Ballamingie, Patricia; Johnson, Sherrill

    2011-01-01

    This paper draws explicitly on the field experiences of two doctoral researchers in geography to elucidate some of the challenges and issues related to researcher vulnerability that are especially acute for graduate students. In spite of significant differences in context, both researchers experienced an unanticipated degree of professional…

  13. 6 CFR 27.400 - Chemical-terrorism vulnerability information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 6 Domestic Security 1 2012-01-01 2012-01-01 false Chemical-terrorism vulnerability information. 27.400 Section 27.400 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL... Secretary shall administer this section consistent with section 550(c) of the Homeland...

  14. 6 CFR 27.400 - Chemical-terrorism vulnerability information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 6 Domestic Security 1 2011-01-01 2011-01-01 false Chemical-terrorism vulnerability information. 27.400 Section 27.400 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL... Secretary shall administer this section consistent with section 550(c) of the Homeland...

  15. Sex-driven vulnerability in stress and drug abuse.

    PubMed

    Berry, Alessandra; Raggi, Carla; Borgi, Marta; Cirulli, Francesca

    2016-01-01

    A growing body of literature shows that a link exists between substance abuse and stress and that the crosstalk of sex hormones with the neuroendocrine system might differently prime vulnerability to drug addiction in male and female subjects. Thus, understanding the neurobiological mechanisms of addiction and the identification of sex-driven determinants in vulnerability to drug abuse may help to better devise and/or implement strategic (pharmacological, behavioural, social) interventions to prevent or face the issue of addiction. Differences between sexes can be found at all stages of life (in both the animal model and human studies) and may account for genetic, epigenetic and environmental/hormonal factors that in turn affect the functionality of the whole organism leading also to a sex-driven differential vulnerability or resilience to non-communicable pathologies. These include the onset and precipitation of stress-related psychiatric disorders as well as "substance-related and addictive disorders" (as defined in the DSM-V). This paper reviews the scientific literature highlighting significant differences in male and female subjects in stress and neuroendocrine function and the implications for sex-dependent differential vulnerability to drug addiction. PMID:27364390

  16. Teachers' Professional Vulnerability and Cultural Tradition: A Chinese Paradox

    ERIC Educational Resources Information Center

    Gao, Xuesong

    2008-01-01

    The paper explores the issue of teachers' professional vulnerability using a range of messages from an online teachers' community on the Chinese mainland. The study reveals how macro changes at policy level impact on teachers' professional relationships and in turn their professional identities in teacher discussants' perceptions. Furthermore, the…

  17. The Linneweil Affair: A Study in Adolescent Vulnerability.

    ERIC Educational Resources Information Center

    Isser, Natalie

    1984-01-01

    Details the case of Elizabeth Linneweil, a Jewish child who was persuaded by her guardians to convert to Catholicism. The motives of the emotionally vulnerable adolescent--desire to conform, to please guardians, and to cement social bonding in the community--are discussed. (JAC)

  18. Linking degradation status with ecosystem vulnerability to environmental change

    USGS Publications Warehouse

    Angeler, David G.; Baho, Didier L.; Allen, Craig R.; Johnson, Richard K.

    2015-01-01

    Environmental change can cause regime shifts in ecosystems, potentially threatening ecosystem services. It is unclear if the degradation status of ecosystems correlates with their vulnerability to environmental change, and thus the risk of future regime shifts. We assessed resilience in acidified (degraded) and circumneutral (undegraded) lakes with long-term data (1988–2012), using time series modeling. We identified temporal frequencies in invertebrate assemblages, which identifies groups of species whose population dynamics vary at particular temporal scales. We also assessed species with stochastic dynamics, those whose population dynamics vary irregularly and unpredictably over time. We determined the distribution of functional feeding groups of invertebrates within and across the temporal scales identified, and in those species with stochastic dynamics, and assessed attributes hypothesized to contribute to resilience. Three patterns of temporal dynamics, consistent across study lakes, were identified in the invertebrates. The first pattern was one of monotonic change associated with changing abiotic lake conditions. The second and third patterns appeared unrelated to the environmental changes we monitored. Acidified and the circumneutral lakes shared similar levels and patterns of functional richness, evenness, diversity, and redundancy for species within and across the observed temporal scales and for stochastic species groups. These similar resilience characteristics suggest that both lake types did not differ in vulnerability to the environmental changes observed here. Although both lake types appeared equally vulnerable in this study, our approach demonstrates how assessing systemic vulnerability by quantifying ecological resilience can help address uncertainty in predicting ecosystem responses to environmental change across ecosystems.

  19. Vulnerability analysis for complex networks using aggressive abstraction.

    SciTech Connect

    Colbaugh, Richard; Glass, Kristin L.

    2010-06-01

    Large, complex networks are ubiquitous in nature and society, and there is great interest in developing rigorous, scalable methods for identifying and characterizing their vulnerabilities. This paper presents an approach for analyzing the dynamics of complex networks in which the network of interest is first abstracted to a much simpler, but mathematically equivalent, representation, the required analysis is performed on the abstraction, and analytic conclusions are then mapped back to the original network and interpreted there. We begin by identifying a broad and important class of complex networks which admit vulnerability-preserving, finite state abstractions, and develop efficient algorithms for computing these abstractions. We then propose a vulnerability analysis methodology which combines these finite state abstractions with formal analytics from theoretical computer science to yield a comprehensive vulnerability analysis process for networks of realworld scale and complexity. The potential of the proposed approach is illustrated with a case study involving a realistic electric power grid model and also with brief discussions of biological and social network examples.

  20. Early Detection Monitoring for Vulnerable Great Lakes Coastal Ecosystems

    EPA Science Inventory

    Great Lakes harbors/embayments are vulnerable to introduction of aquatic invasive species. Monitoring is needed to inform on new introductions, as well as to track success of prevention programs intended to limit spread. We have completed a pilot field case study in the Duluth-...

  1. Assessing the Vulnerability of Older Americans to Climate Change

    EPA Science Inventory

    This project is comprised of a series of activities – listening sessions, literature reviews, and an expert elicitation research agenda-setting workshop – designed to examine and characterize the vulnerability of older adults to climate change and opportunities for adaptation. ...

  2. American Indian Adolescent Girls: Vulnerability to Sex Trafficking, Intervention Strategies

    ERIC Educational Resources Information Center

    Pierce, Alexandra

    2012-01-01

    The Minnesota Indian Women's Resource Center offers harm reduction programming to at-risk adolescent American Indian girls, including outreach, case management, advocacy, healthy sexuality education, and support groups. To evaluate program impact, participants are assessed at intake and every 6 months afterward for current vulnerability to…

  3. Validating the soil vulnerability index for a claypan watershed

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Assessment studies of conservation efforts have shown that best management practices were not always implemented in the most vulnerable areas where they are most needed. While complex computer simulation models can be used to identify these areas, resources needed for using such models are beyond re...

  4. Special human vulnerability to low-cost collective punishment.

    PubMed

    Ross, Don

    2012-02-01

    Guala notes that low-cost punishment is the main mechanism that deters free-riding in small human communities. This mechanism is complemented by unusual human vulnerability to gossip. Defenders of an evolutionary discontinuity supporting human sociality might seize on this as an alternative to enjoyment of moralistic aggression as a special adaptation. However, the more basic adaptation of language likely suffices.

  5. Critiquing War in the Classroom: Professor Positionality, Vulnerability, and Possibility

    ERIC Educational Resources Information Center

    Taber, Nancy

    2014-01-01

    This article describes an analytic autoethnographical research study focusing on my experiences developing, delivering, and evaluating course content critiquing war from a feminist anti-militarist perspective as a pre-tenured faculty member. Themes include: professional vulnerability, student resistance, pedagogical possibility, and scholarly…

  6. EPA'S REGIONAL VULNERABILITY ASSESSMENT PROGRAM (REVA) DEMONSTRATING RESULTS THROUGH PARTNERSHIPS

    EPA Science Inventory

    EPA's Regional Vulnerability Assessment (ReVA) program, a regional-scale comparative risk research effort, has been under development since 1998 with a pilot study focused on the Mid- Atlantic region. ReVA is part of the interagency Integrated Science for Ecosystem Challenges ini...

  7. Our Shared Future: Social Media, Leadership, Vulnerability, and Digital Identity

    ERIC Educational Resources Information Center

    Stoller, Eric

    2013-01-01

    Social media have challenged us in our journey to support our students. Administrators have entered into new web-based conversations with one another and with their students. Personal branding has created a sense of performativity that conflicts with a growing trend towards online vulnerability. Our leaders have increasingly been engaged in…

  8. Spatial vulnerability of Australian urban populations to extreme heat events

    NASA Astrophysics Data System (ADS)

    Loughnan, Margaret; Tapper, Nigel; Phan, Thu; Lynch, Kellie; McInnes, Judith

    2013-04-01

    Extreme heat events pose a risk to the health of all individuals, especially the elderly and the chronically ill, and are associated with an increased demand for healthcare services. In order to address this problem, policy makers' need information about temperatures above which mortality and morbidity of the exposed population is likely to increase, where the vulnerable groups in the community are located, and how the risks from extreme heat events are likely to change in the future. This study identified threshold temperatures for all Australian capital cities, developed a spatial index of population vulnerability, and used climate model output to predict changes in the number of days exceeding temperature thresholds in the future, as well as changes in risk related to changes in urban density and an ageing population. The study has shown that daily maximum and minimum temperatures from the Bureau of Meteorology forecasts can be used to calculate temperature thresholds for heat alert days. The key risk factors related to adverse health outcomes were found to be areas with intense urban heat islands, areas with higher proportions of older people, and areas with ethnic communities. Maps of spatial vulnerability have been developed to provide information to assist emergency managers, healthcare professionals, and ancillary services develop heatwave preparedness plans at a local scale that target vulnerable groups and address heat-related health risks. The numbers of days exceeding current heat thresholds are predicted to increase over the next 20 to 40 years in all Australian capital cities.

  9. Youth Work with Vulnerable Young People. Interchange No. 51.

    ERIC Educational Resources Information Center

    Powney, Janet; Furlong, Andy; Cartmel, Fred; Hall, Stuart

    Research was conducted in Scotland to evaluate the effectiveness of youth work with vulnerable young people, primarily between the ages of 13 and 16. Four complementary methods were adopted: (1) a survey of secondary school students; (2) a series of focus group interviews with young people with experience of youth work; (3) interviews with…

  10. CONFU: Configuration Fuzzing Testing Framework for Software Vulnerability Detection

    PubMed Central

    Dai, Huning; Murphy, Christian; Kaiser, Gail

    2010-01-01

    Many software security vulnerabilities only reveal themselves under certain conditions, i.e., particular configurations and inputs together with a certain runtime environment. One approach to detecting these vulnerabilities is fuzz testing. However, typical fuzz testing makes no guarantees regarding the syntactic and semantic validity of the input, or of how much of the input space will be explored. To address these problems, we present a new testing methodology called Configuration Fuzzing. Configuration Fuzzing is a technique whereby the configuration of the running application is mutated at certain execution points, in order to check for vulnerabilities that only arise in certain conditions. As the application runs in the deployment environment, this testing technique continuously fuzzes the configuration and checks “security invariants” that, if violated, indicate a vulnerability. We discuss the approach and introduce a prototype framework called ConFu (CONfiguration FUzzing testing framework) for implementation. We also present the results of case studies that demonstrate the approach’s feasibility and evaluate its performance. PMID:21037923

  11. Development of hazard-compatible building fragility and vulnerability models

    USGS Publications Warehouse

    Karaca, E.; Luco, N.

    2008-01-01

    We present a methodology for transforming the structural and non-structural fragility functions in HAZUS into a format that is compatible with conventional seismic hazard analysis information. The methodology makes use of the building capacity (or pushover) curves and related building parameters provided in HAZUS. Instead of the capacity spectrum method applied in HAZUS, building response is estimated by inelastic response history analysis of corresponding single-degree-of-freedom systems under a large number of earthquake records. Statistics of the building response are used with the damage state definitions from HAZUS to derive fragility models conditioned on spectral acceleration values. Using the developed fragility models for structural and nonstructural building components, with corresponding damage state loss ratios from HAZUS, we also derive building vulnerability models relating spectral acceleration to repair costs. Whereas in HAZUS the structural and nonstructural damage states are treated as if they are independent, our vulnerability models are derived assuming "complete" nonstructural damage whenever the structural damage state is complete. We show the effects of considering this dependence on the final vulnerability models. The use of spectral acceleration (at selected vibration periods) as the ground motion intensity parameter, coupled with the careful treatment of uncertainty, makes the new fragility and vulnerability models compatible with conventional seismic hazard curves and hence useful for extensions to probabilistic damage and loss assessment.

  12. 6 CFR 27.400 - Chemical-terrorism vulnerability information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... record contains Chemical-terrorism Vulnerability Information controlled by 6 CFR 27.400. Do not disclose to persons without a “need to know” in accordance with 6 CFR 27.400(e). Unauthorized release may... shall be treated as classified information in accordance with 6 CFR 27.400(h) and (i). (4) Other...

  13. 6 CFR 27.400 - Chemical-terrorism vulnerability information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... record contains Chemical-terrorism Vulnerability Information controlled by 6 CFR 27.400. Do not disclose to persons without a “need to know” in accordance with 6 CFR 27.400(e). Unauthorized release may... shall be treated as classified information in accordance with 6 CFR 27.400(h) and (i). (4) Other...

  14. Selective Prevention: Addressing Vulnerability to Problem Drug Use in Europe

    ERIC Educational Resources Information Center

    Burkhart, Gregor; Gyarmathy, V. Anna; Bo, Alessandra

    2011-01-01

    Following the 2003 publication of the European Union (EU) Council Recommendations and the 2005-2008 and 2009-2012 EU Drugs Action Plans, increasing attention has been given in EU member states' drug policies to populations that are vulnerable to problem drug use (PDU). Monitoring data reported to the EMCDDA by designated agencies from 30 countries…

  15. Psychological Distress and Mortality: Are Women More Vulnerable?

    ERIC Educational Resources Information Center

    Ferraro, Kenneth F.; Nuriddin, Tariqah A.

    2006-01-01

    Does psychological distress increase mortality risk? If it does, are women more vulnerable than men to the effect of distress on mortality? Drawing from cumulative disadvantage theory, these questions are addressed with data from a 20-year follow-up of a national sample of adults ages 25-74. Event history analyses were performed to examine…

  16. Regulatory Guide on Conducting a Security Vulnerability Assessment

    SciTech Connect

    Ek, David R.

    2016-01-01

    This document will provide guidelines on conducting a security vulnerability assessment at a facility regulated by the Radiation Protection Centre. The guidelines provide a performance approach assess security effectiveness. The guidelines provide guidance for a review following the objectives outlined in IAEA NSS#11 for Category 1, 2, & 3 sources.

  17. The vulnerability index calculation for determination of groundwater quality

    SciTech Connect

    Kurtz, D.A.; Parizek, R.R.

    1995-12-01

    Non-point source pollutants, such as pesticides, enter groundwater systems in a variety of means at wide-ranging concentrations. Risks in using groundwater in human consumption vary depending on the amounts of contaminants, the type of groundwater aquifer, and various use factors. We have devised a method of determining the vulnerability of an aquifer towards contamination with the Vulnerability Index. The Index can be used either as a comparative or an absolute index (comparative with a pure water source or aquifer spring or without comparison, assuming no peaks in the compared sample). Data for the calculation is obtained by extraction of a given water sample followed by analysis with a nitrogen/phosphorus detector on gas chromatography. The calculation uses the sum of peak heights as its determination. An additional peak number factor is added to emphasize higher numbers of compounds found in a given sample. Karst aquifers are considered to be highly vulnerable due to the large solution openings in its structure. Examples will be given of Vulnerability Indices taken from springs emanating from karst, intermediate, and diffuse flow aquifers taken at various times of the 1992 sampling year and compared with rainfall during that time. Comparisons will be made of the Index vs. rainfall events and vs. pesticide application data. The risk of using contaminated drinking water sources can be evaluated with the use of this index.

  18. Vulnerability of the US to future sea level rise

    SciTech Connect

    Gornitz, V. . Goddard Inst. for Space Studies); White, T.W.; Cushman, R.M. )

    1991-01-01

    The differential vulnerability of the conterminous United States to future sea level rise from greenhouse climate warming is assessed, using a coastal hazards data base. This data contains information on seven variables relating to inundation and erosion risks. High risk shorelines are characterized by low relief, erodible substrate, subsidence, shoreline retreat, and high wave/tide energies. Very high risk shorelines on the Atlantic Coast (Coastal Vulnerability Index {ge}33.0) include the outer coast of the Delmarva Peninsula, northern Cape Hatteras, and segments of New Jersey, Georgia and South Carolina. Louisiana and sections of Texas are potentially the most vulnerable, due to anomalously high relative sea level rise and erosion, coupled with low elevation and mobile sediments. Although the Pacific Coast is generally the least vulnerable, because of its rugged relief and erosion-resistant substrate, the high geographic variability leads to several exceptions, such as the San Joaquin-Sacramento Delta area, the barrier beaches of Oregon and Washington, and parts of the Puget Sound Lowlands. 31 refs., 2 figs., 3 tabs.

  19. Reflecting on a Difficult Life: Narrative Construction in Vulnerable Adolescents

    ERIC Educational Resources Information Center

    McLean, Kate C.; Wood, Becky; Breen, Andrea V.

    2013-01-01

    We examined narrative processes of identity development as they related to desistance from delinquent behavior in a sample of vulnerable adolescents. Building on a robust theoretical and empirical foundation in the field of narrative identity, we examined processes of meaning-making and agency in relation to desistance. Thirty-one adolescents were…

  20. Autobiographical Memory as a Predictor of Depression Vulnerability in Girls

    ERIC Educational Resources Information Center

    Hipwell, Alison E.; Sapotichne, Brenna; Klostermann, Susan; Battista, Deena; Keenan, Kate

    2011-01-01

    Overgeneral autobiographical memory (AM), the tendency to recall categories of events when asked to provide specific instances from one's life, is purported to be a marker of depression vulnerability that develops in childhood. Although early adolescence is a period of risk for depression onset especially among girls, prospective examination of…

  1. Extreme seismicity and disaster risks: Hazard versus vulnerability (Invited)

    NASA Astrophysics Data System (ADS)

    Ismail-Zadeh, A.

    2013-12-01

    Although the extreme nature of earthquakes has been known for millennia due to the resultant devastation from many of them, the vulnerability of our civilization to extreme seismic events is still growing. It is partly because of the increase in the number of high-risk objects and clustering of populations and infrastructure in the areas prone to seismic hazards. Today an earthquake may affect several hundreds thousand lives and cause significant damage up to hundred billion dollars; it can trigger an ecological catastrophe if occurs in close vicinity to a nuclear power plant. Two types of extreme natural events can be distinguished: (i) large magnitude low probability events, and (ii) the events leading to disasters. Although the first-type events may affect earthquake-prone countries directly or indirectly (as tsunamis, landslides etc.), the second-type events occur mainly in economically less-developed countries where the vulnerability is high and the resilience is low. Although earthquake hazards cannot be reduced, vulnerability to extreme events can be diminished by monitoring human systems and by relevant laws preventing an increase in vulnerability. Significant new knowledge should be gained on extreme seismicity through observations, monitoring, analysis, modeling, comprehensive hazard assessment, prediction, and interpretations to assist in disaster risk analysis. The advanced disaster risk communication skill should be developed to link scientists, emergency management authorities, and the public. Natural, social, economic, and political reasons leading to disasters due to earthquakes will be discussed.

  2. AN OVERVIEW OF EPA'S REGIONAL VULNERABILITY ASSESSMENT (REVA) PROGRAM

    EPA Science Inventory

    Regional Vulnerability Assessment (ReVA) is a, approach to place-based ecological risk assessment that is currently under development by ORD. The pilot assessment will be done for the Mid-Atlantic region and builds on data collected for EMAP. ReVA is being developed to identify t...

  3. Emergency presentations by vulnerable road users: implications for injury prevention

    PubMed Central

    Meuleners, L B; Lee, A H; Haworth, C

    2006-01-01

    Most emergency presentations by vulnerable road users were the result of collisions that did not involve a motor vehicle. Many injuries occurred off‐road without police attendance. Hence, reliance on official police records would underestimate the magnitude and scope of these injuries. Suggestions to provide a safer road environment are given. PMID:16461413

  4. 6 CFR 27.215 - Security vulnerability assessments.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... identification of existing layers of protection; (2) Threat Assessment, which includes a description of possible... 6 Domestic Security 1 2010-01-01 2010-01-01 false Security vulnerability assessments. 27.215... FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.215 Security...

  5. Stressful Segregation Housing and Psychosocial Vulnerability in Prison Suicide Ideators

    ERIC Educational Resources Information Center

    Bonner, Ronald L.

    2006-01-01

    Psychosocially vulnerable prisoners under stressful conditions of confinement are ill prepared to cope and at risk for developing suicide intention. The present study examined the relationships of depression, hopelessness, reasons for living, mental health problem history, suicide attempt lethality history, and stressful segregation housing with…

  6. Opening Pathways for Vulnerable Young People in Patagonia

    ERIC Educational Resources Information Center

    Hamilton, Mary Agnes; Hamilton, Stephen F.; Bianchi, Lucia; Bran, Jacqui

    2013-01-01

    New and improved institutions are needed to support the transition to adulthood of vulnerable young people. Existing institutions that should provide that support demonstrate structural lag: they have not adapted to changing circumstances. Action research was conducted in Por un Manana, an employment training program for low-income youth and young…

  7. Childhood Cancer and Vulnerability for Significant Academic Underachievement.

    ERIC Educational Resources Information Center

    Ott, Jeanne S.; And Others

    1982-01-01

    Learning difficulties related to childhood cancer were examined by comparison of 22 oncology patients and 22 children (6 to 17 years old) referred for psychiatric/psychological evaluation. Findings demonstrated, among children undergoing treatment of cancer, some academic vulnerabilities for which psychosocial aspects may not fully account.…

  8. Exploring Faculty Perceptions toward Working with Academically Vulnerable College Students

    ERIC Educational Resources Information Center

    Quick, Robin L.

    2013-01-01

    This study is an exploratory study of faculty members' knowledge and perceptions toward of with academically vulnerable college students who are specifically experiencing reading and writing difficulties. Data were gathered from 174 college faculty at six higher education institutions throughout northwestern Pennsylvania via an online…

  9. Intergenerational Transmission of Sexual Victimization Vulnerability as Mediated via Parenting

    ERIC Educational Resources Information Center

    Testa, Maria; Hoffman, Joseph H.; Livingston, Jennifer A.

    2011-01-01

    Objectives: Previous research suggests that women's early sexual victimization experiences may influence their parenting behaviors and increase the vulnerability of their children to being sexually victimized. The current study considered whether mother's sexual victimization experiences, in childhood and after age 14, were associated with the…

  10. Dyadic Vulnerability and Risk Profiling for Elder Neglect

    ERIC Educational Resources Information Center

    Fulmer, Terry; Paveza, Gregory; VandeWeerd, Carla; Fairchild, Susan; Guadagno, Lisa; Bolton-Blatt, Marguarette; Norman, Robert

    2005-01-01

    Purpose: Neglect of older adults accounts for 60% to 70% of all elder-mistreatment reports made to adult protective services. The purpose of this article is to report data from research, using a risk-and-vulnerability model, that captures the independent contributions of both the elder and the caregiver as they relate to the outcome of neglect.…

  11. 40 CFR 1400.4 - Vulnerable zone indicator system.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 34 2013-07-01 2013-07-01 false Vulnerable zone indicator system. 1400.4 Section 1400.4 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY AND DEPARTMENT OF JUSTICE ACCIDENTAL RELEASE PREVENTION REQUIREMENTS; RISK MANAGEMENT PROGRAMS UNDER THE CLEAN AIR ACT SECTION...

  12. 40 CFR 1400.4 - Vulnerable zone indicator system.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 33 2014-07-01 2014-07-01 false Vulnerable zone indicator system. 1400.4 Section 1400.4 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY AND DEPARTMENT OF JUSTICE ACCIDENTAL RELEASE PREVENTION REQUIREMENTS; RISK MANAGEMENT PROGRAMS UNDER THE CLEAN AIR ACT SECTION...

  13. 40 CFR 1400.4 - Vulnerable zone indicator system.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 34 2012-07-01 2012-07-01 false Vulnerable zone indicator system. 1400.4 Section 1400.4 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY AND DEPARTMENT OF JUSTICE ACCIDENTAL RELEASE PREVENTION REQUIREMENTS; RISK MANAGEMENT PROGRAMS UNDER THE CLEAN AIR ACT SECTION...

  14. Assessing application vulnerability to radiation-induced SEUs in memory

    NASA Technical Reports Server (NTRS)

    Springer, P. L.

    2001-01-01

    One of the goals of the Remote Exploration and Experimentation (REE) project at JPL is to determine how vulnerable applications are to single event upsets (SEUs) when run in low radiation space environments using commercial-off-the-shelf (COTS) components.

  15. Cognitive Vulnerability to Depression in Canadian and Chinese Adolescents

    ERIC Educational Resources Information Center

    Auerbach, Randy P.; Eberhart, Nicole K.; Abela, John R. Z.

    2010-01-01

    The goal of the current study was to compare diathesis-stress and transactional models of cognitive vulnerability to depression in samples of Canadian (n = 118) and Chinese (n = 405) adolescents. We utilized a six-month multi-wave, longitudinal design in order to examine whether (a) perceived control moderated the association between the…

  16. Assessment of climate vulnerability in the Norwegian built environment

    NASA Astrophysics Data System (ADS)

    Hygen, H. O.; Øyen, C. F.; Almâs, A. J.

    2010-09-01

    The main trends expected for the change of Norwegian climate for this century are increasing temperatures, precipitation and wind. This indicates a probable increase of climate related risks to the Norwegian built environment. Previous assessments of climate vulnerability of the built environment have been based on general terms and experiences. The report "Climate and vulnerability analysis for Norwegian built environment; Basis elucidation for the Official Norwegian Report (NOU) on climate adaptation (in Norwegian only)" has used previously defined indexes to quantify the future vulnerability and thus estimated the impact of future climate strain to the existing built environment. The method used to do this assessment has been to create national geolocated maps of relevant climate indexes. Climate indexes for this analysis are: * Wood decay, * Temperature and heating degree days, * Snow load and wet winter precipitation, * Precipitation, flood and extreme precipitation * Wind and wind-driven rain * Frost decay * Frost amount * Perma frost Most of these indexes have been established both for the normal period 1961 - 1990 and projected climate of 2071 - 2100. To compensate for uncertainties in the projection, a set of three projections has been used. These indexes have been combined with geolocated information for Norway's 3.9 million buildings, by imposing GIS digitalized building information to the geolocated maps. The result of this combination is a synopsis of the number of buildings in Norway vulnerable to the displayed present climate parameters and to the projected changes. Consequenses for the Norwegian buildings stock and actions to be taken by the government are also discussed.

  17. Vulnerabilities of children admitted to a pediatric inpatient care unit☆

    PubMed Central

    de Oliveira, Larissa Natacha; Breigeiron, Márcia Koja; Hallmann, Sofia; Witkowski, Maria Carolina

    2014-01-01

    OBJECTIVE: To identify the vulnerabilities of children admitted to a pediatric inpatient unit of a university hospital. METHODS: Cross-sectional, descriptive study from April to September 2013 with36 children aged 30 days to 12 years old, admitted to medical-surgical pediatric inpatient units of a university hospital and their caregivers. Data concerning sociocultural, socioeconomic and clinical context of children and their families were collected by interview with the child caregiver and from patients, records, and analyzed by descriptive statistics. RESULTS: Of the total sample, 97.1% (n=132) of children had at least one type of vulnerability, the majority related to the caregiver's level of education, followed by caregiver's financial situation, health history of the child, caregiver's family situation, use of alcohol, tobacco, and illicit drugs by the caregiver, family's living conditions, caregiver's schooling, and bonding between the caregiver and the child. Only 2.9% (n=4) of the children did not show any criteria to be classified in a category of vulnerability. CONCLUSIONS: Most children were classified has having a social vulnerability. It is imperative to create networks of support between the hospital and the primary healthcare service to promote healthcare practices directed to the needs of the child and family. PMID:25511001

  18. Early Markers of Vulnerable Language Skill Development in Galactosaemia

    ERIC Educational Resources Information Center

    Lewis, Fiona M.; Coman, David J.; Syrmis, Maryanne

    2014-01-01

    There are no known biomedical or genetic markers to identify which infants with galactosaemia (GAL) are most at risk of poor language skill development, yet pre-linguistic communicative "red flag" behaviours are recognised as early identifiers of heightened vulnerability to impaired language development. We report on pre-linguistic…

  19. Vulnerability to shocks in the global seafood trade network

    NASA Astrophysics Data System (ADS)

    Gephart, Jessica A.; Rovenskaya, Elena; Dieckmann, Ulf; Pace, Michael L.; Brännström, Åke

    2016-03-01

    Trade can allow countries to overcome local or regional losses (shocks) to their food supply, but reliance on international food trade also exposes countries to risks from external perturbations. Countries that are nutritionally or economically dependent on international trade of a commodity may be adversely affected by such shocks. While exposure to shocks has been studied in financial markets, communication networks, and some infrastructure systems, it has received less attention in food-trade networks. Here, we develop a forward shock-propagation model to quantify how trade flows are redistributed under a range of shock scenarios and assess the food-security outcomes by comparing changes in national fish supplies to indices of each country’s nutritional fish dependency. Shock propagation and distribution among regions are modeled on a network of historical bilateral seafood trade data from UN Comtrade using 205 reporting territories grouped into 18 regions. In our model exposure to shocks increases with total imports and the number of import partners. We find that Central and West Africa are the most vulnerable to shocks, with their vulnerability increasing when a willingness-to-pay proxy is included. These findings suggest that countries can reduce their overall vulnerability to shocks by reducing reliance on imports and diversifying food sources. As international seafood trade grows, identifying these types of potential risks and vulnerabilities is important to build a more resilient food system.

  20. 6 CFR 27.400 - Chemical-terrorism vulnerability information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... inspection or audits under § 27.250; (6) Any records required to be created or retained under § 27.255; (7... record contains Chemical-terrorism Vulnerability Information controlled by 6 CFR 27.400. Do not disclose to persons without a “need to know” in accordance with 6 CFR 27.400(e). Unauthorized release...

  1. Doubly Vulnerable: The Paradox of Disability and Teaching

    ERIC Educational Resources Information Center

    Stewart, Meredith

    2010-01-01

    Parker Palmer's comment that teaching is a "daily exercise in vulnerability" might just as easily be said about living with a disability. As much as the person with a disability might want to hide his or her differences, it is often difficult to do so. Something as commonplace as walking through a grocery store without being stared at is often…

  2. Vulnerability Assessment of Selected Buildings Designated as Shelters: Anguilla.

    ERIC Educational Resources Information Center

    Gibbs, Tony

    Educational facilities in the Caribbean often serve roles as shelters during natural hazards, but they often sustain as much damage as other buildings. This study investigated the physical vulnerability of schools located on Anguilla to wind forces, torrential rain, and seismic forces in order to provide relevant local agencies with some of the…

  3. Vulnerability Assessment of Selected Buildings Designated as Shelters: Dominica.

    ERIC Educational Resources Information Center

    Agency for International Development (IDCA), Washington, DC.

    Educational facilities in the Caribbean often serve roles as shelters during natural hazards, but they often sustain as much damage as other buildings. This study investigated the physical vulnerability of schools located on Dominica to wind forces, torrential rain, and seismic forces in order to provide relevant local agencies with some of the…

  4. Vulnerability Assessment of Selected Buildings Designated as Shelters: Grenada.

    ERIC Educational Resources Information Center

    Gibbs, Tony

    Educational facilities in the Caribbean often serve as shelters during natural hazards, but they often sustain as much damage as other buildings. This study investigated the physical vulnerability of schools, located in Grenada, to wind forces, torrential rain, and seismic forces in order to provide relevant local agencies with some of the input…

  5. A physical approach on flood risk vulnerability of buildings

    NASA Astrophysics Data System (ADS)

    Mazzorana, B.; Simoni, S.; Scherer, C.; Gems, B.; Fuchs, S.; Keiler, M.

    2014-09-01

    The design of efficient hydrological risk mitigation strategies and their subsequent implementation relies on a careful vulnerability analysis of the elements exposed. Recently, extensive research efforts were undertaken to develop and refine empirical relationships linking the structural vulnerability of buildings to the impact forces of the hazard processes. These empirical vulnerability functions allow estimating the expected direct losses as a result of the hazard scenario based on spatially explicit representation of the process patterns and the elements at risk classified into defined typological categories. However, due to the underlying empiricism of such vulnerability functions, the physics of the damage-generating mechanisms for a well-defined element at risk with its peculiar geometry and structural characteristics remain unveiled, and, as such, the applicability of the empirical approach for planning hazard-proof residential buildings is limited. Therefore, we propose a conceptual assessment scheme to close this gap. This assessment scheme encompasses distinct analytical steps: modelling (a) the process intensity, (b) the impact on the element at risk exposed and (c) the physical response of the building envelope. Furthermore, these results provide the input data for the subsequent damage evaluation and economic damage valuation. This dynamic assessment supports all relevant planning activities with respect to a minimisation of losses, and can be implemented in the operational risk assessment procedure.

  6. A physical approach on flood risk vulnerability of buildings

    NASA Astrophysics Data System (ADS)

    Mazzorana, B.; Simoni, S.; Scherer, C.; Gems, B.; Fuchs, S.; Keiler, M.

    2014-02-01

    The design of efficient hydrological risk mitigation strategies and their subsequent implementation relies on a careful vulnerability analysis of the elements exposed. Recently, extensive research efforts were undertaken to develop and refine empirical relationships linking the structural vulnerability of buildings to the impact forces of the hazard processes. These empirical vulnerability functions allow estimating the expected direct losses as a result of the hazard scenario based on spatially explicit representation of the process patterns and the elements at risk classified into defined typological categories. However, due to the underlying empiricism of such vulnerability functions, the physics of the damage generating mechanisms for a well-defined element at risk with its peculiar geometry and structural characteristics remain unveiled, and, as such, the applicability of the empirical approach for planning hazard-proof residential buildings is limited. Therefore, we propose a conceptual assessment scheme to close this gap. This assessment scheme encompasses distinct analytical steps: modelling (a) the process intensity, (b) the impact on the element at risk exposed and (c) the physical response of the building envelope. Furthermore, these results provide the input data for the subsequent damage evaluation and economic damage valuation. This dynamic assessment supports all relevant planning activities with respect to a minimisation of losses, and can be implemented in the operational risk assessment procedure.

  7. Vulnerability analysis for a drought Early Warning System

    NASA Astrophysics Data System (ADS)

    Angeluccetti, Irene; Demarchi, Alessandro; Perez, Francesca

    2014-05-01

    Early Warning Systems (EWS) for drought are often based on risk models that do not, or marginally, take into account the vulnerability factor. The multifaceted nature of drought (hydrological, meteorological, and agricultural) is source of coexistence for different ways to measure this phenomenon and its effects. The latter, together with the complexity of impacts generated by this hazard, causes the current underdevelopment of drought EWS compared to other hazards. In Least Developed Countries, where drought events causes the highest numbers of affected people, the importance of correct monitoring and forecasting is considered essential. Existing early warning and monitoring systems for drought produced at different geographic levels, provide only in a few cases an actual spatial model that tries to describe the cause-effect link between where the hazard is detected and where impacts occur. Integrate vulnerability information in such systems would permit to better estimate affected zones and livelihoods, improving the effectiveness of produced hazard-related datasets and maps. In fact, the need of simplification and, in general, of a direct applicability of scientific outputs is still a matter of concern for field experts and early warning products end-users. Even if the surplus of hazard related information produced right after catastrophic events has, in some cases, led to the creation of specific data-sharing platforms, the conveyed meaning and usefulness of each product has not yet been addressed. The present work is an attempt to fill this gap which is still an open issue for the scientific community as well as for the humanitarian aid world. The study aims at conceiving a simplified vulnerability model to embed into an existing EWS for drought, which is based on the monitoring of vegetation phenological parameters and the Standardized Precipitation Index, both produced using free satellite derived datasets. The proposed vulnerability model includes (i) a

  8. Vulnerability Assessment of Rainfall-Induced Debris Flow

    NASA Astrophysics Data System (ADS)

    Lu, G. Y.; Wong, D. W.; Chiu, L. S.

    2006-05-01

    Debris flow is a common hazard triggered by large amount of rainfall over mountainous areas. A debris flow event results from a complex interaction between rainfall and topographical properties of watersheds. Heavy rainfall facilitates this process by increasing pore water pressure, seepage force and reducing effective stress of soils (normal stress carried by soil particles at the points of contact). Since debris flow events are closely related to topography and rainfall, the goal of this research is to assess debris flow vulnerability related to these two factors. Objectives of this research are to: (1) examine new spatial interpolation techniques to estimate high spatial rainfall data relevant to debris flows. (2) develop topographical factors using Geography Information System (GIS) and remote sensing (RS) approaches and (3) combine the estimated rainfall and topographical factors to assess the vulnerability of debris flow. We examined three spatial interpolation techniques: adaptive inversed distance weight (AIDW), simple kriging and spatial disaggregation using wind induced-topographic effect that incorporates gauge measurements, satellite remote sensing data (TRMM). The topographical factors are derived from high resolution digital elevation model (DEM), and adopt fuzzy-based topographical models proposed by Tseng (2004). Estimated rainfall and topographical factors are processed by self-organizing maps (SOM) to provide vulnerability assessment. To demonstrate our technique, rainfall data collected by 39 rain gauges in the central part of Taiwan during the passage of Typhoon Tori-Ji around July 29, 2001 were used. Results indicate that the proposed spatial interpolation methods outperform existing methods (i.e. kriging, inverse distance weight, and co-kriging methods). The vulnerability assessment of 187 debris flows watersheds in the study area will be presented. Keyword: Debris flow, spatial interpolation, adaptive inverse distance weight, TRMM, self

  9. Assessing tsunami vulnerability, an example from Herakleio, Crete

    NASA Astrophysics Data System (ADS)

    Papathoma, M.; Dominey-Howes, D.; Zong, Y.; Smith, D.

    Recent tsunami have caused massive loss of life, destruction of coastal infrastructures and disruption to economic activity. To date, tsunami hazard studies have concentrated on determining the frequency and magnitude of events and in the production of simplistic flood maps. In general, such maps appear to have assumed a uniform vulnerability of population, infrastructure and business. In reality however, a complex set of factors interact to produce a pattern of vulnerability that varies spatially and temporally. A new vulnerability assessment approach is described, that incorporates multiple factors (e.g. parameters relating to the natural and built environments and socio-demographics) that contribute to tsunami vulnerability. The new methodology is applied on a coastal segment in Greece and, in particular, in Crete, westof the city of Herakleio. The results are presented within a Geographic Information System (GIS). The application of GIS ensures the approach is novel for tsunami studies, since it permits interrogation of the primary database by several different end-users. For example, the GIS may be used: (1) to determine immediate post-tsunami disaster response needs by the emergency services; (2) to preplan tsunami mitigation measures by disaster planners; (3) as a tool for local planning by the municipal authorities or; (4) as a basis for catastrophe modelling by insurance companies. We show that population density varies markedly with the time of the year and that 30% of buildings within the inundation zone are only single story thus increasing the vulnerability of their occupants. Within the high inundation depth zone, 11% of buildings are identified as in need of reinforcement and this figure rises to 50% within the medium inundation depth zone. 10% of businesses are located within the high inundation depth zone and these may need to consider their level of insurance cover to protect against primary building damage, contents loss and business interruption

  10. An assessment of fire vulnerability for aged electrical relays

    SciTech Connect

    Vigil, R.A. |; Nowlen, S.P.

    1995-03-01

    There has been some concern that, as nuclear power plants age, protective measures taken to control and minimize the impact of fire may become ineffective, or significantly less effective, and hence result in an increased fire risk. One objective of the Fire Vulnerability of Aged Electrical Components Program is to assess the effects of aging and service wear on the fire vulnerability of electrical equipment. An increased fire vulnerability of components may lead to an overall increase in fire risk to the plant. Because of their widespread use in various electrical safety systems, electromechanical relays were chosen to be the initial components for evaluation. This test program assessed the impact of operational and thermal aging on the vulnerability of these relays to fire-induced damage. Only thermal effects of a fire were examined in this test program. The impact of smoke, corrosive materials, or fire suppression effects on relay performance were not addressed in this test program. The purpose of this test program was to assess whether the fire vulnerability of electrical relays increased with aging. The sequence followed for the test program was to: identify specific relay types, develop three fire scenarios, artificially age several relays, test the unaged and aged relays in the fire exposure scenarios, and compare the results. The relays tested were Agastat GPI, General Electric (GE) HMA, HGA, and HFA. At least two relays of each type were artificially aged and at least two relays of each type were new. Relays were operationally aged by cycling the relay under rated load for 2,000 operations. These relays were then thermally aged for 60 days with their coil energized.

  11. A comparison of data-driven groundwater vulnerability assessment methods.

    PubMed

    Sorichetta, Alessandro; Ballabio, Cristiano; Masetti, Marco; Robinson, Gilpin R; Sterlacchini, Simone

    2013-01-01

    Increasing availability of geo-environmental data has promoted the use of statistical methods to assess groundwater vulnerability. Nitrate is a widespread anthropogenic contaminant in groundwater and its occurrence can be used to identify aquifer settings vulnerable to contamination. In this study, multivariate Weights of Evidence (WofE) and Logistic Regression (LR) methods, where the response variable is binary, were used to evaluate the role and importance of a number of explanatory variables associated with nitrate sources and occurrence in groundwater in the Milan District (central part of the Po Plain, Italy). The results of these models have been used to map the spatial variation of groundwater vulnerability to nitrate in the region, and we compare the similarities and differences of their spatial patterns and associated explanatory variables. We modify the standard WofE method used in previous groundwater vulnerability studies to a form analogous to that used in LR; this provides a framework to compare the results of both models and reduces the effect of sampling bias on the results of the standard WofE model. In addition, a nonlinear Generalized Additive Model has been used to extend the LR analysis. Both approaches improved discrimination of the standard WofE and LR models, as measured by the c-statistic. Groundwater vulnerability probability outputs, based on rank-order classification of the respective model results, were similar in spatial patterns and identified similar strong explanatory variables associated with nitrate source (population density as a proxy for sewage systems and septic sources) and nitrate occurrence (groundwater depth).

  12. Patterns of Freshwater Species Richness, Endemism, and Vulnerability in California

    PubMed Central

    Furnish, Joseph; Gardali, Thomas; Grantham, Ted; Katz, Jacob V. E.; Kupferberg, Sarah; McIntyre, Patrick; Moyle, Peter B.; Ode, Peter R.; Peek, Ryan; Quiñones, Rebecca M.; Rehn, Andrew C.; Santos, Nick; Schoenig, Steve; Serpa, Larry; Shedd, Jackson D.; Slusark, Joe; Viers, Joshua H.; Wright, Amber; Morrison, Scott A.

    2015-01-01

    The ranges and abundances of species that depend on freshwater habitats are declining worldwide. Efforts to counteract those trends are often hampered by a lack of information about species distribution and conservation status and are often strongly biased toward a few well-studied groups. We identified the 3,906 vascular plants, macroinvertebrates, and vertebrates native to California, USA, that depend on fresh water for at least one stage of their life history. We evaluated the conservation status for these taxa using existing government and non-governmental organization assessments (e.g., endangered species act, NatureServe), created a spatial database of locality observations or distribution information from ~400 data sources, and mapped patterns of richness, endemism, and vulnerability. Although nearly half of all taxa with conservation status (n = 1,939) are vulnerable to extinction, only 114 (6%) of those vulnerable taxa have a legal mandate for protection in the form of formal inclusion on a state or federal endangered species list. Endemic taxa are at greater risk than non-endemics, with 90% of the 927 endemic taxa vulnerable to extinction. Records with spatial data were available for a total of 2,276 species (61%). The patterns of species richness differ depending on the taxonomic group analyzed, but are similar across taxonomic level. No particular taxonomic group represents an umbrella for all species, but hotspots of high richness for listed species cover 40% of the hotspots for all other species and 58% of the hotspots for vulnerable freshwater species. By mapping freshwater species hotspots we show locations that represent the top priority for conservation action in the state. This study identifies opportunities to fill gaps in the evaluation of conservation status for freshwater taxa in California, to address the lack of occurrence information for nearly 40% of freshwater taxa and nearly 40% of watersheds in the state, and to implement adequate

  13. Patterns of Freshwater Species Richness, Endemism, and Vulnerability in California.

    PubMed

    Howard, Jeanette K; Klausmeyer, Kirk R; Fesenmyer, Kurt A; Furnish, Joseph; Gardali, Thomas; Grantham, Ted; Katz, Jacob V E; Kupferberg, Sarah; McIntyre, Patrick; Moyle, Peter B; Ode, Peter R; Peek, Ryan; Quiñones, Rebecca M; Rehn, Andrew C; Santos, Nick; Schoenig, Steve; Serpa, Larry; Shedd, Jackson D; Slusark, Joe; Viers, Joshua H; Wright, Amber; Morrison, Scott A

    2015-01-01

    The ranges and abundances of species that depend on freshwater habitats are declining worldwide. Efforts to counteract those trends are often hampered by a lack of information about species distribution and conservation status and are often strongly biased toward a few well-studied groups. We identified the 3,906 vascular plants, macroinvertebrates, and vertebrates native to California, USA, that depend on fresh water for at least one stage of their life history. We evaluated the conservation status for these taxa using existing government and non-governmental organization assessments (e.g., endangered species act, NatureServe), created a spatial database of locality observations or distribution information from ~400 data sources, and mapped patterns of richness, endemism, and vulnerability. Although nearly half of all taxa with conservation status (n = 1,939) are vulnerable to extinction, only 114 (6%) of those vulnerable taxa have a legal mandate for protection in the form of formal inclusion on a state or federal endangered species list. Endemic taxa are at greater risk than non-endemics, with 90% of the 927 endemic taxa vulnerable to extinction. Records with spatial data were available for a total of 2,276 species (61%). The patterns of species richness differ depending on the taxonomic group analyzed, but are similar across taxonomic level. No particular taxonomic group represents an umbrella for all species, but hotspots of high richness for listed species cover 40% of the hotspots for all other species and 58% of the hotspots for vulnerable freshwater species. By mapping freshwater species hotspots we show locations that represent the top priority for conservation action in the state. This study identifies opportunities to fill gaps in the evaluation of conservation status for freshwater taxa in California, to address the lack of occurrence information for nearly 40% of freshwater taxa and nearly 40% of watersheds in the state, and to implement adequate

  14. Respect for Human Vulnerability: The Emergence of a New Principle in Bioethics.

    PubMed

    ten Have, Henk

    2015-09-01

    Vulnerability has become a popular though controversial topic in bioethics, notably since 2000. As a result, a common body of knowledge has emerged (1) distinguishing between different types of vulnerability, (2) criticizing the categorization of populations as vulnerable, and (3) questioning the practical implications. It is argued that two perspectives on vulnerability, i.e., the philosophical and political, pose challenges to contemporary bioethics discourse: they re-examine the significance of human agency, the primacy of the individual person, and the negativity of vulnerability. As a phenomenon of globalization, vulnerability can only be properly addressed in a global bioethics that takes the social dimension of human existence seriously.

  15. Vulnerability assessment and risk perception: the case of the Arieş River Middle Basin

    NASA Astrophysics Data System (ADS)

    Ozunu, Al.; Botezan, C.

    2012-04-01

    Vulnerability assessment is influenced by a number of factors, including risk perception. This paper investigates the vulnerability of people living in the middle basin of the Aries river region, a former mining area, to natural and technologic hazards. The mining industry lead to significant environmental changes, which combined with the social problems caused by its decline (high unemployment rate, low income and old age) raised the level of the vulnerability in the area. This case study is unique, as it includes an evaluation of risk perception and its influence on the social vulnerability and resilience of local communities to disasters. Key words: vulnerability assessment, natural hazards, social vulnerability, risk perception

  16. User friendly tools to target vulnerable areas at watershed scale: evaluation of the soil vulnerability and conductivity claypan indices

    Technology Transfer Automated Retrieval System (TEKTRAN)

    One finding of the Conservation Effects Assessment Program (CEAP) watershed studies was that Best Management practices (BMPs) were not always installed where most needed: in many watersheds, only a fraction of BMPs were implemented in the most vulnerable areas. While complex computer simulation mode...

  17. What if quality of damage data is poor: an Entity-Vulnerability approach for flood vulnerability assessment

    NASA Astrophysics Data System (ADS)

    Naso, Susanna; Chen, Albert S.; Djordjević, Slobodan; Aronica, Giuseppe T.

    2015-04-01

    The classical approach to flood defence, aimed at reducing the probability of flooding through hard defences, has been substituted by flood risk management approach which accepts the idea of coping with floods and aims at reducing not only the probability of flooding, but also the consequences. In this view, the concept of vulnerability becomes central, such as the (non-structural) measures for its increment. On 22 November 2011, an exceptional rainstorm hit the Longano catchment (North-East part of Sicily, Italy) producing local heavy rainfall, mud-debris flow and flash flooding. The flash flood involved property, buildings, roads and more than 100 commercial estates have suffered severe damages. Some days after the event, the municipality provided people forms to describe the damages that occurred on their properties. Unfortunately, the lack of common guidelines in compiling them, their coarseness and the impossibility to have monetary information on them (such us damage data from previous events), did not allow the implementation of a detailed damage analysis. What we're developing in this work is a method for a qualitative evaluation of the consequences of floods, based on vulnerability curves for structures and classes of entities at risk. The difficulty in deriving the vulnerability curves for different building typologies, as function of the water depth, was due to the lack of quantitative information both on damages caused by previous events and on buildings' value. To solve the problem we submitted a questionnaire to a team of experts asking for an estimation of building damages to different hypothetical inundation depths. What we wanted to obtain was deriving the vulnerability data from technicians' experience, believing in the fundamental importance of the collaboration among research and professional engineers. Through the elaboration and the synthesis of the experts' estimations we derived the vulnerability curves for different building typologies and

  18. Free and Open Source Software for land degradation vulnerability assessment

    NASA Astrophysics Data System (ADS)

    Imbrenda, Vito; Calamita, Giuseppe; Coluzzi, Rosa; D'Emilio, Mariagrazia; Lanfredi, Maria Teresa; Perrone, Angela; Ragosta, Maria; Simoniello, Tiziana

    2013-04-01

    Nowadays the role of FOSS software in scientific research is becoming increasingly important. Besides the important issues of reduced costs for licences, legality and security there are many other reasons that make FOSS software attractive. Firstly, making the code opened is a warranty of quality permitting to thousands of developers around the world to check the code and fix bugs rather than rely on vendors claims. FOSS communities are usually enthusiastic about helping other users for solving problems and expand or customize software (flexibility). Most important for this study, the interoperability allows to combine the user-friendly QGIS with the powerful GRASS-GIS and the richness of statistical methods of R in order to process remote sensing data and to perform geo-statistical analysis in one only environment. This study is focused on the land degradation (i.e. the reduction in the capacity of the land to provide ecosystem goods and services and assure its functions) and in particular on the estimation of the vulnerability levels in order to suggest appropriate policy actions to reduce/halt land degradation impacts, using the above mentioned software. The area investigated is the Basilicata Region (Southern Italy) where large natural areas are mixed with anthropized areas. To identify different levels of vulnerability we adopted the Environmentally Sensitive Areas (ESAs) model, based on the combination of indicators related to soil, climate, vegetation and anthropic stress. Such indicators were estimated by using the following data-sources: - Basilicata Region Geoportal to assess soil vulnerability; - DESERTNET2 project to evaluate potential vegetation vulnerability and climate vulnerability; - NDVI-MODIS satellite time series (2000-2010) with 250m resolution, available as 16-day composite from the NASA LP DAAC to characterize the dynamic component of vegetation; - Agricultural Census data 2010, Corine Land Cover 2006 and morphological information to assess

  19. Groundwater vulnerability mapping in Guadalajara aquifers system (Western Mexico)

    NASA Astrophysics Data System (ADS)

    Rizo-Decelis, L. David; Marín, Ana I.; Andreo, Bartolomé

    2016-04-01

    Groundwater vulnerability mapping is a practical tool to implement strategies for land-use planning and sustainable socioeconomic development coherent with groundwater protection. The objective of vulnerability mapping is to identify the most vulnerable zones of catchment areas and to provide criteria for protecting the groundwater used for drinking water supply. The delineation of protection zones in fractured aquifers is a challenging task due to the heterogeneity and anisotropy of hydraulic conductivities, which makes difficult prediction of groundwater flow organization and flow velocities. Different methods of intrinsic groundwater vulnerability mapping were applied in the Atemajac-Toluquilla groundwater body, an aquifers system that covers around 1300 km2. The aquifer supplies the 30% of urban water resources of the metropolitan area of Guadalajara (Mexico), where over 4.6 million people reside. Study area is located in a complex neotectonic active volcanic region in the Santiago River Basin (Western Mexico), which influences the aquifer system underneath the city. Previous works have defined the flow dynamics and identified the origin of recharge. In addition, the mixture of fresh groundwater with hydrothermal and polluted waters have been estimated. Two main aquifers compose the multilayer system. The upper aquifer is unconfined and consists of sediments and pyroclastic materials. Recharge of this aquifer comes from rainwater and ascending vertical fluids from the lower aquifer. The lower aquifer consists of fractured basalts of Pliocene age. Formerly, the main water source has been the upper unit, which is a porous and unconsolidated unit, which acts as a semi-isotropic aquifer. Intense groundwater usage has resulted in lowering the water table in the upper aquifer. Therefore, the current groundwater extraction is carried out from the deeper aquifer and underlying bedrock units, where fracture flow predominates. Pollution indicators have been reported in

  20. Do the Most Vulnerable People Live in the Worst Slums? A Spatial Analysis of Accra, Ghana

    PubMed Central

    Jankowska, Marta M.; Weeks, John R.; Engstrom, Ryan

    2011-01-01

    Slums are examples of localized communities within third world urban systems representing a range of vulnerabilities and adaptive capacities. This study examines vulnerability in relation to flooding, environmental degradation, social-status, demographics, and health in the slums of Accra, Ghana by utilizing a place-based approach informed by fieldwork, remote sensing, census data, and geographically weighted regression. The study objectives are threefold: (1) to move slums from a dichotomous into a continuous classification and examine the spatial patterns of the gradient, (2) develop measures of vulnerability for a developing world city and model the relationship between slums and vulnerability, and (3) to assess if the most vulnerable individuals live in the worst slums. A previously developed slum index is utilized, and four new measures of vulnerability are developed through principle components analysis, including a novel component of health vulnerability based on child mortality. Visualizations of the vulnerability measures assess spatial patterns of vulnerability in Accra. Ordinary least squares, spatial, and geographically weighted regression model the ability of the slum index to predict the four vulnerability measures. The slum index performs well for three of the four vulnerability measures, but is least able to predict health vulnerability underscoring the complex relationship between slums and child mortality in Accra. Finally, quintile analysis demonstrates the elevated prevalence of high vulnerability in places with high slum index scores. PMID:22379509

  1. Climate Change and Infrastructure, Urban Systems, and Vulnerabilities

    SciTech Connect

    Wilbanks, Thomas J; Fernandez, Steven J

    2014-01-01

    This Technical Report on Climate Change and Infrastructure, Urban Systems, and Vulnerabilities has been prepared for the U.S. Department of Energy by the Oak Ridge National Laboratory in support of the U.S. National Climate Assessment (NCA). It is a summary of the currently existing knowledge base on its topic, nested within a broader framing of issues and questions that need further attention in the longer run. The report arrives at a number of assessment findings, each associated with an evaluation of the level of consensus on that issue within the expert community, the volume of evidence available to support that judgment, and the section of the report that provides an explanation for the finding. Cross-sectoral issues related to infrastructures and urban systems have not received a great deal of attention to date in research literatures in general and climate change assessments in particular. As a result, this technical report is breaking new ground as a component of climate change vulnerability and impact assessments in the U.S., which means that some of its assessment findings are rather speculative, more in the nature of propositions for further study than specific conclusions that are offered with a high level of confidence and research support. But it is a start in addressing questions that are of interest to many policymakers and stakeholders. A central theme of the report is that vulnerabilities and impacts are issues beyond physical infrastructures themselves. The concern is with the value of services provided by infrastructures, where the true consequences of impacts and disruptions involve not only the costs associated with the clean-up, repair, and/or replacement of affected infrastructures but also economic, social, and environmental effects as supply chains are disrupted, economic activities are suspended, and/or social well-being is threatened. Current knowledge indicates that vulnerability concerns tend to be focused on extreme weather events

  2. Vulnerability assessment at a national level in Georgia

    NASA Astrophysics Data System (ADS)

    Tsereteli, N.; Arabidze, V.; Varazanashvili, O.; Gugeshashvili, T.

    2012-04-01

    Vulnerability assessment at a national level in Georgia Nino Tsereteli, Vakhtang Arabidze, Otar Varazanashvili, Tengiz Gugeshashvili The risk always exists when cities are built on. Population growth in cities and urbanization in natural hazard-prone zones leads to infrastructure expansion. The goal of the society is to construct natural hazards resistant infrastructure and minimize the expected losses. This is a complicated task as there is always knowledge deficiency on real seismic hazard and vulnerability. Assessment of vulnerability is vital in risk analysis, as vulnerability is defined in many different ways. Work presented here mostly deals with assessment of infrastructure's and population vulnerability at national level in Georgia. This work was initiated by NATO SFP project "seismic Hazard and Risk Assessment for Southern Caucasus - Eastern Turkey Energy Corridors" and the two work packages WP4 (seismic risk) and WP5 (city scenarios) of risk module of EMME (Earthquake Model of the Middle East Region) project. First step was creation databases (inventory) of elements at risk in GIS. Element at risk were the buildings, population, pipelines. The inventories was studied and Created in GIS for the following categories: Building material, number of stories, number of entrances, condition of building, building period. For pipelines pipe tipe (continous or segmented), material, pipe diameter. Very important is to estimate the initial cost of building for assessment of economic losses. From this purpose the attempt was done and the algorithm of this estimation were prepared taking into account obtained the inventory. Build quality, reliability and durability are of special importance to corresponding state agencies and include different aesthetic, engineering, practical, social, technological and economical aspects. The necessity that all of these aspects satisfy existing normative requirements becomes evident as the building and structures come into exploitation

  3. A Preliminary Tsunami vulnerability analysis for Bakirkoy district in Istanbul

    NASA Astrophysics Data System (ADS)

    Tufekci, Duygu; Lutfi Suzen, M.; Cevdet Yalciner, Ahmet; Zaytsev, Andrey

    2016-04-01

    Resilience of coastal utilities after earthquakes and tsunamis has major importance for efficient and proper rescue and recovery operations soon after the disasters. Vulnerability assessment of coastal areas under extreme events has major importance for preparedness and development of mitigation strategies. The Sea of Marmara has experienced numerous earthquakes as well as associated tsunamis. There are variety of coastal facilities such as ports, small craft harbors, and terminals for maritime transportation, water front roads and business centers mainly at North Coast of Marmara Sea in megacity Istanbul. A detailed vulnerability analysis for Yenikapi region and a detailed resilience analysis for Haydarpasa port in Istanbul have been studied in previously by Cankaya et al., (2015) and Aytore et al., (2015) in SATREPS project. In this study, the methodology of vulnerability analysis under tsunami attack given in Cankaya et al., (2015) is modified and applied to Bakirkoy district of Istanbul. Bakirkoy district is located at western part of Istanbul and faces to the North Coast of Marmara Sea from 28.77oE to 28.89oE. High resolution spatial dataset of Istanbul Metropolitan Municipality (IMM) is used and analyzed. The bathymetry and topography database and the spatial dataset containing all buildings/structures/infrastructures in the district are collated and utilized for tsunami numerical modeling and following vulnerability analysis. The tsunami parameters from deterministically defined worst case scenarios are computed from the simulations using tsunami numerical model NAMI DANCE. The vulnerability assessment parameters in the district according to vulnerability and resilience are defined; and scored by implementation of a GIS based TVA with appropriate MCDA methods. The risk level is computed using tsunami intensity (level of flow depth from simulations) and TVA results at every location in Bakirkoy district. The preliminary results are presented and discussed

  4. Hippocampal developmental vulnerability to methylmercury extends into prepubescence

    PubMed Central

    Obiorah, Maryann; McCandlish, Elizabeth; Buckley, Brian; DiCicco-Bloom, Emanuel

    2015-01-01

    The developing brain is sensitive to environmental toxicants such as methylmercury (MeHg), to which humans are exposed via contaminated seafood. Prenatal exposure in children is associated with learning, memory and IQ deficits, which can result from hippocampal dysfunction. To explore underlying mechanisms, we have used the postnatal day (P7) rat to model the third trimester of human gestation. We previously showed that a single low exposure (0.6 μg/gbw) that approaches human exposure reduced hippocampal neurogenesis in the dentate gyrus (DG) 24 h later, producing later proliferation and memory deficits in adolescence. Yet, the vulnerable stem cell population and period of developmental vulnerability remain undefined. In this study, we find that P7 exposure of stem cells has long-term consequences for adolescent neurogenesis. It reduced the number of mitotic S-phase cells (BrdU), especially those in the highly proliferative Tbr2+ population, and immature neurons (Doublecortin) in adolescence, suggesting partial depletion of the later stem cell pool. To define developmental vulnerability to MeHg in prepubescent (P14) and adolescent (P21) rats, we examined acute 24 h effects of MeHg exposure on mitosis and apoptosis. We found that low exposure did not adversely impact neurogenesis at either age, but that a higher exposure (5 μg/gbw) at P14 reduced the total number of neural stem cells (Sox2+) by 23% and BrdU+ cells by 26% in the DG hilus, suggesting that vulnerability diminishes with age. To determine whether these effects reflect changes in MeHg transfer across the blood brain barrier (BBB), we assessed Hg content in the hippocampus after peripheral injection and found that similar levels (~800 ng/gm) were obtained at 24 h at both P14 and P21, declining in parallel, suggesting that changes in vulnerability depend more on local tissue and cellular mechanisms. Together, we show that MeHg vulnerability declines with age, and that early exposure impairs later

  5. MINIMIZING THE VULNERABILITY OF WATER SUPPLIES TO NATURAL AND TERRORIST THREATS

    EPA Science Inventory

    There is increasing concern that drinking water utilities may be vulnerable to attacks by terrorists. In the US the President's Commission on Critical Infrastructure Protection has concluded the US drinking water utilities are vulnerable to physical, cyber and biological terroris...

  6. Assessment of composite index methods for agricultural vulnerability to climate change.

    PubMed

    Wiréhn, Lotten; Danielsson, Åsa; Neset, Tina-Simone S

    2015-06-01

    A common way of quantifying and communicating climate vulnerability is to calculate composite indices from indicators, visualizing these as maps. Inherent methodological uncertainties in vulnerability assessments, however, require greater attention. This study examines Swedish agricultural vulnerability to climate change, the aim being to review various indicator approaches for assessing agricultural vulnerability to climate change and to evaluate differences in climate vulnerability depending on the weighting and summarizing methods. The reviewed methods are evaluated by being tested at the municipal level. Three weighting and summarizing methods, representative of climate vulnerability indices in general, are analysed. The results indicate that 34 of 36 method combinations differ significantly from each other. We argue that representing agricultural vulnerability in a single composite index might be insufficient to guide climate adaptation. We emphasize the need for further research into how to measure and visualize agricultural vulnerability and into how to communicate uncertainties in both data and methods.

  7. Social vulnerability and bullying in children with Asperger syndrome.

    PubMed

    Sofronoff, Kate; Dark, Elizabeth; Stone, Valerie

    2011-05-01

    Children with Asperger syndrome (AS) have IQ within the normal range but specific impairments in theory of mind, social interaction and communication skills. The majority receive education in mainstream schools and research suggests they are bullied more than typically developing peers. The current study aimed to evaluate factors that predict bullying for such children and also to examine a new measure, the Social Vulnerability Scale (SVS). One hundred and thirty three parents of children with AS completed the SVS and of these 92 parents completed both the SVS and questionnaires measuring anxiety, anger, behaviour problems, social skills and bullying. Regression analyses revealed that these variables together strongly predicted bullying, but that social vulnerability was the strongest predictor. Test-re-test and internal consistency analyses of the SVS demonstrated sound psychometric properties and factor analyses revealed two sub-scales: gullibility and credulity. Limitations of the study are acknowledged and suggestions for future research discussed.

  8. Vulnerability of complex networks under path-based attacks

    NASA Astrophysics Data System (ADS)

    Pu, Cun-Lai; Cui, Wei

    2015-02-01

    We investigate vulnerability of complex networks including model networks and real-world networks subject to path-based attacks. Specifically, we remove approximately the longest simple path from a network iteratively until there are no paths left in the network. We propose two algorithms, the random augmenting approach (RPA) and the Hamilton-path based approach (HPA), for finding the approximately longest simple path in a network. Results demonstrate that steps of longest-path attacks increase with network density linearly for random networks, while exponentially increasing for scale-free networks. The more homogeneous the degree distribution is, the more fragile the network, which is different from the previous results of node or edge attacks. HPA is generally more efficient than RPA in the longest-path attacks of complex networks. These findings further help us understand the vulnerability of complex systems, better protect complex systems, and design more tolerant complex systems.

  9. [Human vulnerability under cosmetic surgery. A bioethic analysis].

    PubMed

    Ramos-Rocha de Viesca, Mariablanca

    2012-01-01

    Cosmetic surgery is one of the best examples of the current health empowerment. Aesthetic surgical interventions have been criticized because they expose the healthy individual to an unnecessary risk. In modern society the body has turned into a beauty depository with a commercial value. In published bioethics papers, analyses of the cosmetic problem pointed their attention on the freedom, autonomy and distributive justice. Mexico occupies fifth place in the world of cosmetic surgeries. Vulnerability is an inherent condition of man's existence and marks the limit of human dignity. UNESCO agrees that some populations are more inclined to vulnerability. The aim of this work is to demonstrate that those who wish to make a physical change had given up to social coercion and psychological problems.

  10. Humanitarian responses to mass violence perpetrated against vulnerable populations.

    PubMed Central

    Gellert, G. A.

    1995-01-01

    This multidisciplinary review links three areas of legitimate inquiry for practitioners of medicine and public health. The first is occurrences of mass violence or genocide perpetrated against vulnerable populations, with a focus on the failure of national and international mechanisms to prevent or predict such violence. The second is evolving concepts of national sovereignty and an emerging framework in which the imperative to assist vulnerable populations supersedes a state's right to self determination. The last is how medical, public health, and other systems of surveillance and rapid assessment of mass violence can accelerate public awareness and facilitate structured, consistent political decision making to prevent mass violence and to provide international humanitarian assistance. Images p1000-a PMID:7580643

  11. Geomorphological hazard and tourist vulnerability along Portofino Park trails (Italy)

    NASA Astrophysics Data System (ADS)

    Brandolini, P.; Faccini, F.; Piccazzo, M.

    2006-06-01

    The many trails existing in the coastal area of Portofino Promontory are used by tourists for trekking or as pathways to small villages and beaches. The aim of this paper is to define geomorphological hazard and tourist vulnerability in this area, within the framework of the management and planning of hiking activities in Portofino Natural Park. In particular, processes triggered by gravity, running waters and wave motion, affecting the slopes and the cliff, are considered. The typology of the trails and trail maintenance are also taken into account in relation to weather conditions that can make the excursion routes dangerous for tourists. In conclusion, an operative model is applied for the definition of possible risk scenarios. This model is founded on an inventory and the quantification of geomorphological hazards and tourist vulnerability, in comparison with trail rescue data. The model can be applied to other environments and tourist areas.

  12. Service learning with vulnerable populations: review of the literature.

    PubMed

    Gillis, Angela; Mac Lellan, Marian

    2010-01-01

    The service learning model has been touted as a powerful pedagogical approach, a reasonable option for providing care to vulnerable and diverse populations, and a vehicle for educating nursing students to become agents of social change. The literature on service learning with vulnerable populations in nursing education is reviewed and synthesized in this article. A description of service learning experiences, identification of knowledge and skills learned, opportunities for critical thinking and reflection, and a discussion of factors that act as enablers and barriers to service learning are explored. Recommendations for successful integration of service learning into educational settings are provided for nurse educators, academic institutions and community partners. As the service learning model spreads across nursing education it is suggested that it offers promise to foster social change and produce graduates who are fully engaged citizens and professionals. PMID:21126228

  13. Ecosystem vulnerability to climate change in the southeastern United States

    USGS Publications Warehouse

    Cartwright, Jennifer M.; Costanza, Jennifer

    2016-08-11

    Two recent investigations of climate-change vulnerability for 19 terrestrial, aquatic, riparian, and coastal ecosystems of the southeastern United States have identified a number of important considerations, including potential for changes in hydrology, disturbance regimes, and interspecies interactions. Complementary approaches using geospatial analysis and literature synthesis integrated information on ecosystem biogeography and biodiversity, climate projections, vegetation dynamics, soil and water characteristics, anthropogenic threats, conservation status, sea-level rise, and coastal flooding impacts. Across a diverse set of ecosystems—ranging in size from dozens of square meters to thousands of square kilometers—quantitative and qualitative assessments identified types of climate-change exposure, evaluated sensitivity, and explored potential adaptive capacity. These analyses highlighted key gaps in scientific understanding and suggested priorities for future research. Together, these studies help create a foundation for ecosystem-level analysis of climate-change vulnerability to support effective biodiversity conservation in the southeastern United States.

  14. Diversity Strategies to Mitigate Postulated Common Cause Failure Vulnerabilities

    SciTech Connect

    Wood, Richard Thomas

    2010-01-01

    This paper describes an approach to establish effective mitigating strategies that can resolve potential common-cause failure (CCF) vulnerabilities in instrumentation and control (I&C) systems at nuclear power plants. A particular objective in the development of these strategies, which consist of combinations of diversity attributes and their associated criteria, is to address the unique characteristics of digital technology that can contribute to CCF concerns. The research approach employed to establish diversity strategies involves investigation of available documentation on diversity usage and experience from nuclear power and non-nuclear industries, capture of expert knowledge and lessons learned, determination of common practices, and assessment of the nature of CCFs and compensating diversity attributes. The resulting diversity strategies address considerations such as the effect of technology choices, the nature of CCF vulnerabilities, and the prospective impact of each diversity type. In particular, the impact of each attribute and criterion on the purpose, process, product, and performance aspects of diverse systems are considered.

  15. Vulnerability of a killer whale social network to disease outbreaks

    NASA Astrophysics Data System (ADS)

    Guimarães, Paulo R., Jr.; de Menezes, Márcio Argollo; Baird, Robin W.; Lusseau, David; Guimarães, Paulo; Dos Reis, Sérgio F.

    2007-10-01

    Emerging infectious diseases are among the main threats to conservation of biological diversity. A crucial task facing epidemiologists is to predict the vulnerability of populations of endangered animals to disease outbreaks. In this context, the network structure of social interactions within animal populations may affect disease spreading. However, endangered animal populations are often small and to investigate the dynamics of small networks is a difficult task. Using network theory, we show that the social structure of an endangered population of mammal-eating killer whales is vulnerable to disease outbreaks. This feature was found to be a consequence of the combined effects of the topology and strength of social links among individuals. Our results uncover a serious challenge for conservation of the species and its ecosystem. In addition, this study shows that the network approach can be useful to study dynamical processes in very small networks.

  16. Comprehensive care for vulnerable elderly veterans during disasters.

    PubMed

    Claver, Maria; Dobalian, Aram; Fickel, Jacqueline J; Ricci, Karen A; Mallers, Melanie Horn

    2013-01-01

    Despite problematic evacuation and sheltering of nursing home residents during Hurricanes Katrina and Rita, an exploration of the experiences of Veterans Health Administration (VHA) nursing homes (VANHs) is necessary for a comprehensive examination of the healthcare community's response to these disasters. VANH evacuations during these hurricanes have not been widely studied. This exploratory project aimed to provide information about the evacuation experiences and characteristics of vulnerable nursing home residents. Interviews with key informants from VHA facilities with nursing home staff and representatives revealed that physical harm, psychological distress, cognitive decline and increased social isolation were areas that deserved special attention for this vulnerable population. Moreover, physical, psychological and social needs were interconnected in that each influenced the others. Findings contribute to the general conversation about meeting the biopsychosocial needs of nursing home residents in an integrated healthcare delivery system and more broadly, the role of long-term care facilities in general in planning for future disasters. PMID:22901664

  17. Learning the requirements for compassionate practice: student vulnerability and courage.

    PubMed

    Curtis, Katherine

    2014-03-01

    Student nurses' professional development arises through socialisation in nursing knowledge, values and behaviours. Students are expected to demonstrate compassion; however, compassion is a complex concept, one that creates emotional challenges. A grounded theory study was undertaken to explore student nurse socialisation in compassionate practice. In-depth interviews were undertaken with 19 students in the north of England during 2009-2010, and their concerns and concern management emerged. Students expressed several concerns, one being their emotional vulnerability and uncertainty of the emotional requirements for compassionate practice. A core category of 'balancing future intentions' was identified: that students managed feelings of vulnerability and uncertainty through balancing their intentions towards and away from engagement in compassionate practice, depending upon perceived impact on their emotional well-being. The findings are discussed in relation to emotional labour and moral distress, and courage, resilience and self-compassion are explored as a means to enable sustainable compassionate practice.

  18. Vulnerability and adaptation of US shellfisheries to ocean acidification

    NASA Astrophysics Data System (ADS)

    Ekstrom, Julia A.; Suatoni, Lisa; Cooley, Sarah R.; Pendleton, Linwood H.; Waldbusser, George G.; Cinner, Josh E.; Ritter, Jessica; Langdon, Chris; van Hooidonk, Ruben; Gledhill, Dwight; Wellman, Katharine; Beck, Michael W.; Brander, Luke M.; Rittschof, Dan; Doherty, Carolyn; Edwards, Peter E. T.; Portela, Rosimeiry

    2015-03-01

    Ocean acidification is a global, long-term problem whose ultimate solution requires carbon dioxide reduction at a scope and scale that will take decades to accomplish successfully. Until that is achieved, feasible and locally relevant adaptation and mitigation measures are needed. To help to prioritize societal responses to ocean acidification, we present a spatially explicit, multidisciplinary vulnerability analysis of coastal human communities in the United States. We focus our analysis on shelled mollusc harvests, which are likely to be harmed by ocean acidification. Our results highlight US regions most vulnerable to ocean acidification (and why), important knowledge and information gaps, and opportunities to adapt through local actions. The research illustrates the benefits of integrating natural and social sciences to identify actions and other opportunities while policy, stakeholders and scientists are still in relatively early stages of developing research plans and responses to ocean acidification.

  19. Assessing the Vulnerability of Agriculture to Climate Change in Jordan

    NASA Astrophysics Data System (ADS)

    Khresat, Sa'eb; Shraidaeh, Fadi; Maddat, Amer

    2015-04-01

    Climate change represents one of the greatest environmental, social and economic threats facing Jordan. In particular, the combined effects of climate change and water scarcity threaten to affect food and water resources that are critical for livelihoods in Jordan. This is especially true for those communities who live in the dryland area in the country and who rely wholly on rain-fed agriculture. The exact nature and extent of the impact of climate change on temperature and precipitation distribution pattern remain uncertain and it is the poor and vulnerable who will be the most susceptible to climate change adverse effects. A vulnerability assessment of rain fed agriculture to climate change and variability in semi-arid parts of Jordan was conducted in 2014. The purpose of this study is to assess the vulnerability and resilience of the most vulnerable groups where rainfed and irrigated agriculture is practiced. Also, the study focused on quantifying the impacts on agricultural productivity in response to climate change. This will help policymakers and researchers better understand and anticipate the likely impacts of climate change on agriculture and on vulnerable communities in Jordan. Also, it will provide them with tools to identify and implement appropriate adaptation strategies. The data used includes; Representative Concentration Pathways (RCPs), RCP 4.5 and RCP 8.5 adopted by the IPCC for its fifth Assessment Report (AR5). Those pathways were used for climate modeling. A decision support system (DSSAT) for agricultural production was used to assess the impact of climate changes on agricultural production. This approach was used for the Identification of climate change risk and their impacts on Agriculture. Outputs from models are used to assess the vulnerability of farmers and crops to climate and socio-economic change by estimating their sensitivity and capacity to adapt to external factors as a means of identifying what causes the differences in their

  20. [Nurses' autonomy and vulnerability in the Nursing Assistance Systematization practice].

    PubMed

    Menezes, Silvia Regina Tamae; Priel, Margareth Rose; Pereira, Luciane Lucio

    2011-08-01

    The objective of this study was to recognize the autonomy and vulnerability of nurses in the implementation of the Sistema da Assistência de Enfermagem (SAE) Nursing Care System through an integrative literature review, using content analysis. A survey was conducted, and 40 articles published between 1998 and 2008 were selected based on their relevance. Results showed two main categories of meaning: Benefits associated to the SAE practice (to patients, to the profession and to the institution) and Determinants for the Implementation of SAE (nurse's competence, training and education, record-instruments, infrastructure and collective sharing-construction). From the integration of the two categories, the highlights were the autonomy in acting with freedom and responsibility, science-based decision-making, and being valued for their social work, as well as the vulnerability expressed by interpersonal relationships, the wear generated by professional stress and the risk inherent to the service. PMID:21876898

  1. Cyclone disaster vulnerability and response experiences in coastal Bangladesh.

    PubMed

    Alam, Edris; Collins, Andrew E

    2010-10-01

    For generations, cyclones and tidal surges have frequently devastated lives and property in coastal and island Bangladesh. This study explores vulnerability to cyclone hazards using first-hand coping recollections from prior to, during and after these events. Qualitative field data suggest that, beyond extreme cyclone forces, localised vulnerability is defined in terms of response processes, infrastructure, socially uneven exposure, settlement development patterns, and livelihoods. Prior to cyclones, religious activities increase and people try to save food and valuable possessions. Those in dispersed settlements who fail to reach cyclone shelters take refuge in thatched-roof houses and big-branch trees. However, women and children are affected more despite the modification of traditional hierarchies during cyclone periods. Instinctive survival strategies and intra-community cooperation improve coping post cyclone. This study recommends that disaster reduction programmes encourage cyclone mitigation while being aware of localised realities, endogenous risk analyses, and coping and adaptation of affected communities (as active survivors rather than helpless victims).

  2. Comprehensive care for vulnerable elderly veterans during disasters.

    PubMed

    Claver, Maria; Dobalian, Aram; Fickel, Jacqueline J; Ricci, Karen A; Mallers, Melanie Horn

    2013-01-01

    Despite problematic evacuation and sheltering of nursing home residents during Hurricanes Katrina and Rita, an exploration of the experiences of Veterans Health Administration (VHA) nursing homes (VANHs) is necessary for a comprehensive examination of the healthcare community's response to these disasters. VANH evacuations during these hurricanes have not been widely studied. This exploratory project aimed to provide information about the evacuation experiences and characteristics of vulnerable nursing home residents. Interviews with key informants from VHA facilities with nursing home staff and representatives revealed that physical harm, psychological distress, cognitive decline and increased social isolation were areas that deserved special attention for this vulnerable population. Moreover, physical, psychological and social needs were interconnected in that each influenced the others. Findings contribute to the general conversation about meeting the biopsychosocial needs of nursing home residents in an integrated healthcare delivery system and more broadly, the role of long-term care facilities in general in planning for future disasters.

  3. High shear stress induces atherosclerotic vulnerable plaque formation through angiogenesis

    PubMed Central

    Wang, Yi; Qiu, Juhui; Luo, Shisui; Xie, Xiang; Zheng, Yiming; Zhang, Kang; Ye, Zhiyi; Liu, Wanqian; Gregersen, Hans; Wang, Guixue

    2016-01-01

    Rupture of atherosclerotic plaques causing thrombosis is the main cause of acute coronary syndrome and ischemic strokes. Inhibition of thrombosis is one of the important tasks developing biomedical materials such as intravascular stents and vascular grafts. Shear stress (SS) influences the formation and development of atherosclerosis. The current review focuses on the vulnerable plaques observed in the high shear stress (HSS) regions, which localizes at the proximal region of the plaque intruding into the lumen. The vascular outward remodelling occurs in the HSS region for vascular compensation and that angiogenesis is a critical factor for HSS which induces atherosclerotic vulnerable plaque formation. These results greatly challenge the established belief that low shear stress is important for expansive remodelling, which provides a new perspective for preventing the transition of stable plaques to high-risk atherosclerotic lesions. PMID:27482467

  4. [Nurses' autonomy and vulnerability in the Nursing Assistance Systematization practice].

    PubMed

    Menezes, Silvia Regina Tamae; Priel, Margareth Rose; Pereira, Luciane Lucio

    2011-08-01

    The objective of this study was to recognize the autonomy and vulnerability of nurses in the implementation of the Sistema da Assistência de Enfermagem (SAE) Nursing Care System through an integrative literature review, using content analysis. A survey was conducted, and 40 articles published between 1998 and 2008 were selected based on their relevance. Results showed two main categories of meaning: Benefits associated to the SAE practice (to patients, to the profession and to the institution) and Determinants for the Implementation of SAE (nurse's competence, training and education, record-instruments, infrastructure and collective sharing-construction). From the integration of the two categories, the highlights were the autonomy in acting with freedom and responsibility, science-based decision-making, and being valued for their social work, as well as the vulnerability expressed by interpersonal relationships, the wear generated by professional stress and the risk inherent to the service.

  5. Cognitive vulnerability in moderate, mild, and low seasonality.

    PubMed

    Rohan, Kelly J; Nillni, Yael I; Mahon, Jennifer N; Roecklein, Kathryn A; Sitnikov, Lilya; Haaga, David A F

    2011-12-01

    This study examined the association between cognitive vulnerability factors and seasonality. Students (N = 88), classified based on the Seasonal Pattern Assessment Questionnaire as experiencing moderate (n = 26) or mild (n = 32) seasonality, and nondepressed, low-seasonality controls (n = 30) completed explicit (i.e., dysfunctional attitudes, automatic negative thoughts, seasonal attitudes, and rumination) and implicit (i.e., implicit associations test) measures of cognitive vulnerability at one winter and one nonwinter assessment. Relative to low- and mild-seasonality participants, moderate-seasonality participants endorsed more automatic thoughts and rumination in winter and more dysfunctional attitudes across both seasons. Moderate- and mild-seasonality participants endorsed more maladaptive seasonal attitudes than did low-seasonality participants. All groups demonstrated increased dysfunctional attitudes, automatic thoughts, and rumination and stronger implicit associations about light and dark during the winter. The findings support a possible cognitive mechanism of winter depression onset and/or maintenance unique to individuals with moderate, as opposed to mild, seasonality.

  6. Mitigations for Security Vulnerabilities Found in Control System Networks

    SciTech Connect

    Trent D. Nelson

    2006-05-01

    Industry is aware of the need for Control System (CS) security, but in on-site assessments, Idaho National Laboratory (INL) has observed that security procedures and devices are not consistently and effectively implemented. The Department of Homeland Security (DHS), National Cyber Security Division (NCSD), established the Control Systems Security Center (CSSC) at INL to help industry and government improve the security of the CSs used in the nation's critical infrastructures. One of the main CSSC objectives is to identify control system vulnerabilities and develop effective mitigations for them. This paper discusses common problems and vulnerabilities seen in on-site CS assessments and suggests mitigation strategies to provide asset owners with the information they need to better protect their systems from common security flows.

  7. CARVE: The Carbon in Arctic Reservoirs Vulnerability Experiment

    NASA Technical Reports Server (NTRS)

    Miller, Charles E.; Dinardo, Steven J.

    2012-01-01

    The Carbon in Arctic Reservoirs Vulnerability Experiment (CARVE) is a NASA Earth Ventures (EV-1) investigation designed to quantify correlations between atmospheric and surface state variables for the Alaskan terrestrial ecosystems through intensive seasonal aircraft campaigns, ground-based observations, and analysis sustained over a 5-year mission. CARVE bridges critical gaps in our knowledge and understanding of Arctic ecosystems, linkages between the Arctic hydrologic and terrestrial carbon cycles, and the feedbacks from fires and thawing permafrost. CARVE's objectives are to: (1) Directly test hypotheses attributing the mobilization of vulnerable Arctic carbon reservoirs to climate warming; (2) Deliver the first direct measurements and detailed maps of CO2 and CH4 sources on regional scales in the Alaskan Arctic; and (3) Demonstrate new remote sensing and modeling capabilities to quantify feedbacks between carbon fluxes and carbon cycle-climate processes in the Arctic (Figure 1). We describe the investigation design and results from 2011 test flights in Alaska.

  8. Overestimation of marsh vulnerability to sea level rise

    NASA Astrophysics Data System (ADS)

    Kirwan, Matthew L.; Temmerman, Stijn; Skeehan, Emily E.; Guntenspergen, Glenn R.; Fagherazzi, Sergio

    2016-03-01

    Coastal marshes are considered to be among the most valuable and vulnerable ecosystems on Earth, where the imminent loss of ecosystem services is a feared consequence of sea level rise. However, we show with a meta-analysis that global measurements of marsh elevation change indicate that marshes are generally building at rates similar to or exceeding historical sea level rise, and that process-based models predict survival under a wide range of future sea level scenarios. We argue that marsh vulnerability tends to be overstated because assessment methods often fail to consider biophysical feedback processes known to accelerate soil building with sea level rise, and the potential for marshes to migrate inland.

  9. Overestimation of marsh vulnerability to sea level rise

    USGS Publications Warehouse

    Kirwan, Matthew L.; Temmerman, Stijn; Skeehan, Emily E.; Guntenspergen, Glenn R.; Fagherazzi, Sergio

    2016-01-01

    Coastal marshes are considered to be among the most valuable and vulnerable ecosystems on Earth, where the imminent loss of ecosystem services is a feared consequence of sea level rise. However, we show with a meta-analysis that global measurements of marsh elevation change indicate that marshes are generally building at rates similar to or exceeding historical sea level rise, and that process-based models predict survival under a wide range of future sea level scenarios. We argue that marsh vulnerability tends to be overstated because assessment methods often fail to consider biophysical feedback processes known to accelerate soil building with sea level rise, and the potential for marshes to migrate inland.

  10. Vulnerability, Sensitivity, and Coping/Adaptive Capacity Worldwide

    SciTech Connect

    Malone, Elizabeth L.; Brenkert, Antoinette L.

    2009-10-01

    Research and analyses have repeatedly shown that impacts of climate change will be unevenly distributed and will affect various societies in various ways. The severity of impacts will depend in part on ability to cope in the short term and adapt in the longer term. However, it has been difficult to find a comparative basis on which to assess differential impacts of climate change. This chapter describes the Vulnerability-Resilience Indicator Model that uses 18 proxy indicators, grouped into 8 elements, to assess on a quantitative basis the comparative potential vulnerability and resilience of countries to climate change. The model integrates socioeconomic and environmental information such as land use, crop production, water availability, per capita GDP, inequality, and health status. Comparative results for 160 countries are presented and analyzed.

  11. VuWiki: An Ontology-Based Semantic Wiki for Vulnerability Assessments

    NASA Astrophysics Data System (ADS)

    Khazai, Bijan; Kunz-Plapp, Tina; Büscher, Christian; Wegner, Antje

    2014-05-01

    The concept of vulnerability, as well as its implementation in vulnerability assessments, is used in various disciplines and contexts ranging from disaster management and reduction to ecology, public health or climate change and adaptation, and a corresponding multitude of ideas about how to conceptualize and measure vulnerability exists. Three decades of research in vulnerability have generated a complex and growing body of knowledge that challenges newcomers, practitioners and even experienced researchers. To provide a structured representation of the knowledge field "vulnerability assessment", we have set up an ontology-based semantic wiki for reviewing and representing vulnerability assessments: VuWiki, www.vuwiki.org. Based on a survey of 55 vulnerability assessment studies, we first developed an ontology as an explicit reference system for describing vulnerability assessments. We developed the ontology in a theoretically controlled manner based on general systems theory and guided by principles for ontology development in the field of earth and environment (Raskin and Pan 2005). Four key questions form the first level "branches" or categories of the developed ontology: (1) Vulnerability of what? (2) Vulnerability to what? (3) What reference framework was used in the vulnerability assessment?, and (4) What methodological approach was used in the vulnerability assessment? These questions correspond to the basic, abstract structure of the knowledge domain of vulnerability assessments and have been deduced from theories and concepts of various disciplines. The ontology was then implemented in a semantic wiki which allows for the classification and annotation of vulnerability assessments. As a semantic wiki, VuWiki does not aim at "synthesizing" a holistic and overarching model of vulnerability. Instead, it provides both scientists and practitioners with a uniform ontology as a reference system and offers easy and structured access to the knowledge field of

  12. Young, vulnerable and pregnant: family support in practice.

    PubMed

    Halliday, Joyce; Wilkinson, Tina

    2009-10-01

    Intervention in the early years, including family support, can reduce inequality and disadvantage across the life course. This paper reports on an evaluation of a local project, which aims to increase resilience and avert crisis among vulnerable young mothers. It suggests that paraprofessional link workers, spanning the antenatal-postnatal period, may contribute to maternal health and wellbeing and increase use of support services and networks. However, challenges for inter-agency and interprofessional working remain.

  13. Vulnerability to mild predator stress in serotonin transporter knockout mice.

    PubMed

    Adamec, Robert; Burton, Paul; Blundell, Jacqueline; Murphy, Dennis L; Holmes, Andrew

    2006-06-01

    Effect of predator stress on rat and mouse anxiety-like behavior may model aspects of post traumatic stress disorder (PTSD). A single cat exposure of wild type (C57, CFW) mice can produce lasting anxiety-like effects in the elevated plus maze, light/dark box tests and startle. In addition, female but not male C57 mice are made more anxious in the plus maze by exposure to predator odors alone, suggesting differential vulnerability to predator stressors of differing intensity. There is a link between genetic variation in the serotonin (5-HT) transporter (SERT) and anxiety in humans. This prompted the generation of SERT knockout mice [see Holmes A, Murphy DL, Crawley, JN. Biol Psychiatry 2003;54(10):953-9]. Present work used these mice to determine if there was a link between vulnerability to the anxiogenic effects of predator odors and abnormalities of 5-HT transmission induced by a life long reduction in 5-HT reuptake. Wild type (WT, C57 background), heterozygous (SERT +/-, HET) mice and homozygous knockout (SERT -/-, KO) were assigned to handled control groups or groups exposed for 10 min to a large testing room rich in cat odor. One week after handling or room exposure, anxiety testing took place in the dark phase of the light/dark cycle, in red light. Predator odor exposure was selectively anxiogenic in the plus maze and light/dark box tests in SERT -/- mice. Exposure to predator odor did not potentiate startle. Findings suggest a role for abnormalities in 5-HT transmission in vulnerability to some of the lasting anxiogenic effects of species relevant stressors and possibly in vulnerability to PTSD. PMID:16546269

  14. Special human vulnerability to low-cost collective punishment.

    PubMed

    Ross, Don

    2012-02-01

    Guala notes that low-cost punishment is the main mechanism that deters free-riding in small human communities. This mechanism is complemented by unusual human vulnerability to gossip. Defenders of an evolutionary discontinuity supporting human sociality might seize on this as an alternative to enjoyment of moralistic aggression as a special adaptation. However, the more basic adaptation of language likely suffices. PMID:22289327

  15. Temperature-based Instanton Analysis: Identifying Vulnerability in Transmission Networks

    SciTech Connect

    Kersulis, Jonas; Hiskens, Ian; Chertkov, Michael; Backhaus, Scott N.; Bienstock, Daniel

    2015-04-08

    A time-coupled instanton method for characterizing transmission network vulnerability to wind generation fluctuation is presented. To extend prior instanton work to multiple-time-step analysis, line constraints are specified in terms of temperature rather than current. An optimization formulation is developed to express the minimum wind forecast deviation such that at least one line is driven to its thermal limit. Results are shown for an IEEE RTS-96 system with several wind-farms.

  16. Poverty, vulnerability, and provision of healthcare in Afghanistan.

    PubMed

    Trani, Jean-Francois; Bakhshi, Parul; Noor, Ayan A; Lopez, Dominique; Mashkoor, Ashraf

    2010-06-01

    This paper presents findings on conditions of healthcare delivery in Afghanistan. There is an ongoing debate about barriers to healthcare in low-income as well as fragile states. In 2002, the Government of Afghanistan established a Basic Package of Health Services (BPHS), contracting primary healthcare delivery to non-state providers. The priority was to give access to the most vulnerable groups: women, children, disabled persons, and the poorest households. In 2005, we conducted a nationwide survey, and using a logistic regression model, investigated provider choice. We also measured associations between perceived availability and usefulness of healthcare providers. Our results indicate that the implementation of the package has partially reached its goal: to target the most vulnerable. The pattern of use of healthcare provider suggests that disabled people, female-headed households, and poorest households visited health centres more often (during the year preceding the survey interview). But these vulnerable groups faced more difficulties while using health centres, hospitals as well as private providers and their out-of-pocket expenditure was higher than other groups. In the model of provider choice, time to travel reduces the likelihood for all Afghans of choosing health centres and hospitals. We situate these findings in the larger context of current debates regarding healthcare delivery for vulnerable populations in fragile state environments. The 'scaling-up process' is faced with several issues that jeopardize the objective of equitable access: cost of care, coverage of remote areas, and competition from profit-orientated providers. To overcome these structural barriers, we suggest reinforcing processes of transparency, accountability and participation. PMID:20359809

  17. Hypertension and vulnerability to hemorrhagic shock in a rat model.

    PubMed

    Reynolds, Penny S; Song, Kyle Seokhan; Tamariz, Francisco J; Wayne Barbee, R

    2015-02-01

    Trauma mortality may be increased in the presence of preexisting diseases such as chronic hypertension. We hypothesized that systemic and microvascular alterations accompanying chronic hypertension would increase the vulnerability to hemorrhage relative to normotensive controls in a rat model of hemorrhagic shock. We present a novel comparative hemorrhage model of shock vulnerability, quantified by "vulnerability curves" expressing physiological response to hemorrhage as a function of three matched shock metrics: cumulative blood volume, mean arterial pressure (MAP), and oxygen delivery (Do2). Responses were central hemodynamics and respiratory and muscle oxygenation obtained for one hypertensive (spontaneously hypertensive [SHR]) and two normotensive (Sprague-Dawley, Wistar-Kyoto) rat strains. Hemorrhagic shock was induced by incremental (0.5 mL) hemorrhage to cardiovascular collapse in anesthetized and mechanically ventilated animals. Shock vulnerability of SHR rats was primarily pressure-driven; in general, SHR exhibited the expected patterns of more rapid deterioration in MAP and Vo2 over smaller ranges of blood loss and Do2. Sternotomy-related depression of CO and thus Do2 in SHR meant that we could not test hypotheses related to the role of Do2 and contribution to perfusion differences between normotensive and hypertensive subjects. Insensitivity of lactate to strain effects suggests that lactate may be a reliable biomarker of shock status. Unexpected similarities between Wistar-Kyoto and SHR suggest strain-related effects other than those related to hypertension per se contribute to hemorrhage response; body size effects and genetic relationships could not be ruled out. Future studies should incorporate phylogenetically based methods to examine the role of hypertension and physiological response to hemorrhage across multiple strains.

  18. Vulnerable populations: Hurricane Katrina as a case study.

    PubMed

    Zoraster, Richard M

    2010-01-01

    Mitigating disaster impact requires identifying risk factors. The increased vulnerability of the physically fragile is easily understood. Less obvious are the socio-economic risk factors, especially within relatively affluent societies. Hurricane Katrina demonstrated many of these risks within the United States. These factors include poverty, home ownership, poor English language proficiency, ethnic minorities, immigrant status, and high-density housing. These risk factors must be considered when planning for disaster preparation, mitigation, and response.

  19. [Precarity, vulnerability, anticipating end-of-life care at home].

    PubMed

    Bonneval, Camille

    2016-02-01

    Many patients want to end their life at home. Care teams adapt to these wishes and organise a form of treatment which blends safety of care and the respect of the expectations of the patients and family members. When factors of precarity increase the vulnerability inherent to the end of life, caregivers anticipate and support as best as they can the difficulties encountered as testified by a hospital at home team in Dax. PMID:26861082

  20. A vulnerability function for Mediterranean flash flood risk assessment

    NASA Astrophysics Data System (ADS)

    Karagiorgos, Konstantinos; Hübl, Johannes; Thaler, Thomas; Fuchs, Sven

    2014-05-01

    Flood risk is a major type of environmental hazard jeopardizing human development, and is usually defined as a functional relation between the hazard, such as the physical and statistical aspects of flooding (e.g. return period of a certain flow height, spatial extend of inundation), and the associated vulnerability, i.e. the exposure of people and assets to floods and the susceptibility of the elements at risk to suffer from flood damage. The assessment of vulnerability -from the quantitative point of view- expresses vulnerability as the expected degree of loss for a given element at risk as a consequence of a certain event. It is ranges on a scale from 0 (no damage) to 1 (complete destruction) and focuses on direct flood loss which is estimated by damage or loss functions. A methodology for the development of a vulnerability curve for Mediterranean flash flood risk assessment is presented. This curve is based on a relationship between the intensity of the process and the associated degree of loss of elements at risk. The computation procedure is based on a method combining spatially explicit loss data, data on the value of exposed elements at risk and data on flood intensities on an individual building scale (local scale). The developed methodology is applied for the district of East Attica in Greece, a Mediterranean region influenced by mountain and coastal characteristics of land development. The aim of the study is to provide a valuable tool for the local authorities and the decision makers, a necessary implementation of flood risk management emerging from the requirements laid down in the European Flood Directive, as well as for an assessment of potential costs emerging from future flood events in order to protect individual households.

  1. Impact of Degree Heterogeneity on Attack Vulnerability of Interdependent Networks

    PubMed Central

    Sun, Shiwen; Wu, Yafang; Ma, Yilin; Wang, Li; Gao, Zhongke; Xia, Chengyi

    2016-01-01

    The study of interdependent networks has become a new research focus in recent years. We focus on one fundamental property of interdependent networks: vulnerability. Previous studies mainly focused on the impact of topological properties upon interdependent networks under random attacks, the effect of degree heterogeneity on structural vulnerability of interdependent networks under intentional attacks, however, is still unexplored. In order to deeply understand the role of degree distribution and in particular degree heterogeneity, we construct an interdependent system model which consists of two networks whose extent of degree heterogeneity can be controlled simultaneously by a tuning parameter. Meanwhile, a new quantity, which can better measure the performance of interdependent networks after attack, is proposed. Numerical simulation results demonstrate that degree heterogeneity can significantly increase the vulnerability of both single and interdependent networks. Moreover, it is found that interdependent links between two networks make the entire system much more fragile to attacks. Enhancing coupling strength between networks can greatly increase the fragility of both networks against targeted attacks, which is most evident under the case of max-max assortative coupling. Current results can help to deepen the understanding of structural complexity of complex real-world systems. PMID:27609483

  2. Rapid Assessment of Seismic Vulnerability in Palestinian Refugee Camps

    NASA Astrophysics Data System (ADS)

    Al-Dabbeek, Jalal N.; El-Kelani, Radwan J.

    Studies of historical and recorded earthquakes in Palestine demonstrate that damaging earthquakes are occurring frequently along the Dead Sea Transform: Earthquake of 11 July 1927 (ML 6.2), Earthquake of 11 February 2004 (ML 5.2). In order to reduce seismic vulnerability of buildings, losses in lives, properties and infrastructures, an attempt was made to estimate the percentage of damage degrees and losses at selected refugee camps: Al Ama`ri, Balata and Dhaishe. Assessing the vulnerability classes of building structures was carried out according to the European Macro-Seismic Scale 1998 (EMS-98) and the Fedral Emergency Management Agency (FEMA). The rapid assessment results showed that very heavy structural and non structural damages will occur in the common buildings of the investigated Refugee Camps (many buildings will suffer from damages grades 4 and 5). Bad quality of buildings in terms of design and construction, lack of uniformity, absence of spaces between the building and the limited width of roads will definitely increase the seismic vulnerability under the influence of moderate-strong (M 6-7) earthquakes in the future.

  3. A critical postnatal period of heightened vulnerability to lipopolysaccharide.

    PubMed

    Rourke, Kyle S; Mayer, Catherine A; MacFarlane, Peter M

    2016-10-01

    Evidence of respiratory abnormalities and vulnerability to infection during a critical period of development have been implicated in Sudden Infant Death Syndrome (SIDS). Here we investigated whether the acute hypoxic ventilatory response (HVR) exhibits a heightened vulnerability to the endotoxin lipopolysaccharide (LPS) during a critical period of development. The acute HVR was measured 2h after an i.p. injection of saline or LPS (0.1mg/kg) at various postnatal (P) ages (P5, P10, or P20days). LPS attenuated the early (1-2min) and late (4-6min) phase of the acute HVR in P10 but not P5 or P20 rats. The P10 age group exhibited the largest increase in brainstem TNFα and iNOS mRNA expression following LPS. LPS also caused a higher mortality rate in P10 rats (48%) compared to P5 (12%) and P20 (0%) age groups. After stratifying LPS treated P10 rats into survivors vs non-survivors, only the latter exhibited an attenuated HVR (specifically the early phase). Thus, the heightened vulnerability to endotoxin exposure during this critical period of development is characterized by a depression of the ventilatory response to acute hypoxia in association with an increased incidence of mortality. These data share similarities with some of the circumstances surrounding a SIDS scenario, including evidence of infection, increased brainstem cytokine expression, a disturbance in respiratory control, and a peak incidence of mortality during a critical period of development.

  4. An approach for modeling vulnerability of the network of networks

    NASA Astrophysics Data System (ADS)

    Zhang, Jianhua; Song, Bo; Zhang, Zhaojun; Liu, Haikuan

    2014-10-01

    In this paper, a framework is given to model the network of networks and to investigate the vulnerability of the network of networks subjected to failures. Because there are several redundant systems in infrastructure systems, the dependent intensity between two networks is introduced and adopted to discuss the vulnerability of the interdependent infrastructure networks subjected to failures. Shanghai electrified rail transit network is used to illustrate the feasibility and effectiveness of the proposed framework. Because the rail network is dependent on the power grid and communication network, the corresponding power grid and communication network are also included in this system. Meanwhile the failures to the power grid and communication network are utilized to investigate the vulnerability of the rail network. The results show that the rail network strongly depends on the power grid and weakly depends on the communication network, and the transport functionality loss of the rail network increases with the increase of dependent intensity. Meanwhile the highest betweenness node-based attack to the power grid and the largest degree node-based attack to the communication network can result in the most functionality losses to the rail network. Moreover, the functionality loss of the rail network has the smallest value when the tolerance parameter of the power grid equals 0.75 and the critical nodes of the power grid and communication network can be obtained by simulations.

  5. Climate Change Vulnerability Assessment for Idaho National Laboratory

    SciTech Connect

    Christopher P. Ischay; Ernest L. Fossum; Polly C. Buotte; Jeffrey A. Hicke; Alexander Peterson

    2014-10-01

    The University of Idaho (UI) was asked to participate in the development of a climate change vulnerability assessment for Idaho National Laboratory (INL). This report describes the outcome of that assessment. The climate change happening now, due in large part to human activities, is expected to continue in the future. UI and INL used a common framework for assessing vulnerability that considers exposure (future climate change), sensitivity (system or component responses to climate), impact (exposure combined with sensitivity), and adaptive capacity (capability of INL to modify operations to minimize climate change impacts) to assess vulnerability. Analyses of climate change (exposure) revealed that warming that is ongoing at INL will continue in the coming decades, with increased warming in later decades and under scenarios of greater greenhouse gas emissions. Projections of precipitation are more uncertain, with multi model means exhibiting somewhat wetter conditions and more wet days per year. Additional impacts relevant to INL include estimates of more burned area and increased evaporation and transpiration, leading to reduced soil moisture and plant growth.

  6. Improving delivery of primary care for vulnerable migrants

    PubMed Central

    Pottie, Kevin; Batista, Ricardo; Mayhew, Maureen; Mota, Lorena; Grant, Karen

    2014-01-01

    Abstract Objective To identify and prioritize innovative strategies to address the health concerns of vulnerable migrant populations. Design Modified Delphi consensus process. Setting Canada. Participants Forty-one primary care practitioners, including family physicians and nurse practitioners, who provided care for migrant populations. Methods We used a modified Delphi consensus process to identify and prioritize innovative strategies that could potentially improve the delivery of primary health care for vulnerable migrants. Forty-one primary care practitioners from various centres across Canada who cared for migrant populations proposed strategies and participated in the consensus process. Main findings The response rate was 93% for the first round. The 3 most highly ranked practice strategies to address delivery challenges for migrants were language interpretation, comprehensive interdisciplinary care, and evidence-based guidelines. Training and mentorship for practitioners, intersectoral collaboration, and immigrant community engagement ranked fourth, fifth, and sixth, respectively, as strategies to address delivery challenges. These strategies aligned with strategies coming out of the United States, Europe, and Australia, with the exception of the proposed evidence-based guidelines. Conclusion Primary health care practices across Canada now need to evolve to address the challenges inherent in caring for vulnerable migrants. The selected strategies provide guidance for practices and health systems interested in improving health care delivery for migrant populations. PMID:24452576

  7. Molecular Imaging of Vulnerable Atherosclerotic Plaques in Animal Models

    PubMed Central

    Gargiulo, Sara; Gramanzini, Matteo; Mancini, Marcello

    2016-01-01

    Atherosclerosis is characterized by intimal plaques of the arterial vessels that develop slowly and, in some cases, may undergo spontaneous rupture with subsequent heart attack or stroke. Currently, noninvasive diagnostic tools are inadequate to screen atherosclerotic lesions at high risk of acute complications. Therefore, the attention of the scientific community has been focused on the use of molecular imaging for identifying vulnerable plaques. Genetically engineered murine models such as ApoE−/− and ApoE−/−Fbn1C1039G+/− mice have been shown to be useful for testing new probes targeting biomarkers of relevant molecular processes for the characterization of vulnerable plaques, such as vascular endothelial growth factor receptor (VEGFR)-1, VEGFR-2, intercellular adhesion molecule (ICAM)-1, P-selectin, and integrins, and for the potential development of translational tools to identify high-risk patients who could benefit from early therapeutic interventions. This review summarizes the main animal models of vulnerable plaques, with an emphasis on genetically altered mice, and the state-of-the-art preclinical molecular imaging strategies. PMID:27618031

  8. Trajectory of adolescent cannabis use on addiction vulnerability.

    PubMed

    Hurd, Yasmin L; Michaelides, Michael; Miller, Michael L; Jutras-Aswad, Didier

    2014-01-01

    The adolescent brain is a period of dynamic development making it vulnerable to environmental factors such as drug exposure. Of the illicit drugs, cannabis is most used by teenagers since it is perceived by many to be of little harm. This perception has led to a growing number of states approving its legalization and increased accessibility. Most of the debates and ensuing policies regarding cannabis were done without consideration of its impact on one of the most vulnerable population, namely teens, or without consideration of scientific data. We provide an overview of the endocannabinoid system in relation to adolescent cannabis exposure and provide insights regarding factors such as genetics and behavioral traits that confer risk for subsequent addiction. While it is clear that more systematic scientific studies are needed to understand the long-term impact of adolescent cannabis exposure on brain and behavior, the current evidence suggests that it has a far-reaching influence on adult addictive behaviors particularly for certain subsets of vulnerable individuals. This article is part of a Special Issue entitled 'NIDA 40th Anniversary Issue'.

  9. Report to Congress on Insular Area energy vulnerability

    SciTech Connect

    Not Available

    1994-05-01

    This report was prepared in response to Section 1406 of the Energy Policy Act of 1992 (Public Law 102-486), which directed the Department of Energy (DOE) to ``conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption,`` and to ``outline how the insular areas shall gain access to vital oil supplies during times of national emergency.`` The Act defines the insular areas to be the US Virgin Islands and Puerto Rico in the Caribbean, and Guam, American Samoa, the Commonwealth of the Northern Mariana Islands (CNMI), and Palau in the Pacific. In the study, ``unique vulnerabilities`` were defined as susceptibility to: (1) more frequent or more likely interruptions of oil supplies compared to the US Mainland, and/or (2) disproportionately larger or more likely economic losses in the event of an oil supply disruption. In order to assess unique vulnerabilities, the study examined the insular areas` experience during past global disruptions of oil supplies and during local emergencies caused by natural disasters. The effects of several possible future global disruptions and local emergencies were also analyzed. Analyses were based on historical data, simulations using energy and economic models, and interviews with officials in the insular governments and the energy industry.

  10. Vulnerability to schizophrenia and lack of common sense.

    PubMed

    Stanghellini, G

    2000-01-01

    This article explores the hypothesis that the relational deficit in schizophrenia is not a consequence of acute symptoms and course but instead is a fundamental aspect of schizophrenic vulnerability. This basic relational deficit could be better understood as disconnectedness from common sense. Common sense is a tool for adaptation whose main scope is establishing cause-and-effect and motivational relationships in the physical and social realms. The common sense deficit appears to involve a lack of intuitive attunement (impaired capacity to accurately typify the mental states of other persons because of the incapacity to be involved in their mental lives) and a damaged social knowledge network (disorders of the background of knowledge useful for organizing everyday experiences). Three dimensions of schizophrenic vulnerability can be distinguished: the sensory, conceptualization, and attitudinal dimensions. Sensory disorders are aberrations of self, body, and world perceptions. Conceptualization disorders are disturbances in the attribution of meanings and intentions. Attitudinal disorders consist of eccentricities in the individual's structure of values and beliefs, characterized by distrust toward conventional knowledge and attunement. This article describes the present state and possible future directions of qualitative analyses and empirical investigations relevant to assessing the interplay between vulnerability dimensions and disorders of common sense.

  11. Assessment of floodplain vulnerability during extreme Mississippi River flood 2011.

    PubMed

    Goodwell, Allison E; Zhu, Zhenduo; Dutta, Debsunder; Greenberg, Jonathan A; Kumar, Praveen; Garcia, Marcelo H; Rhoads, Bruce L; Holmes, Robert R; Parker, Gary; Berretta, David P; Jacobson, Robert B

    2014-01-01

    Regional change in the variability and magnitude of flooding could be a major consequence of future global climate change. Extreme floods have the capacity to rapidly transform landscapes and expose landscape vulnerabilities through highly variable spatial patterns of inundation, erosion, and deposition. We use the historic activation of the Birds Point-New Madrid Floodway during the Mississippi and Ohio River Flooding of 2011 as a scientifically unique stress experiment to analyze indicators of floodplain vulnerability. We use pre- and postflood airborne Light Detection and Ranging data sets to locate erosional and depositional hotspots over the 540 km(2) agricultural Floodway. While riparian vegetation between the river and the main levee breach likely prevented widespread deposition, localized scour and deposition occurred near the levee breaches. Eroded gullies nearly 1 km in length were observed at a low ridge of a relict meander scar of the Mississippi River. Our flow modeling and spatial mapping analysis attributes this vulnerability to a combination of erodible soils, flow acceleration associated with legacy fluvial landforms, and a lack of woody vegetation to anchor soil and enhance flow resistance. Results from this study could guide future mitigation and adaptation measures in cases of extreme flooding.

  12. Impact of Degree Heterogeneity on Attack Vulnerability of Interdependent Networks

    NASA Astrophysics Data System (ADS)

    Sun, Shiwen; Wu, Yafang; Ma, Yilin; Wang, Li; Gao, Zhongke; Xia, Chengyi

    2016-09-01

    The study of interdependent networks has become a new research focus in recent years. We focus on one fundamental property of interdependent networks: vulnerability. Previous studies mainly focused on the impact of topological properties upon interdependent networks under random attacks, the effect of degree heterogeneity on structural vulnerability of interdependent networks under intentional attacks, however, is still unexplored. In order to deeply understand the role of degree distribution and in particular degree heterogeneity, we construct an interdependent system model which consists of two networks whose extent of degree heterogeneity can be controlled simultaneously by a tuning parameter. Meanwhile, a new quantity, which can better measure the performance of interdependent networks after attack, is proposed. Numerical simulation results demonstrate that degree heterogeneity can significantly increase the vulnerability of both single and interdependent networks. Moreover, it is found that interdependent links between two networks make the entire system much more fragile to attacks. Enhancing coupling strength between networks can greatly increase the fragility of both networks against targeted attacks, which is most evident under the case of max-max assortative coupling. Current results can help to deepen the understanding of structural complexity of complex real-world systems.

  13. Vulnerability to temperature-related mortality in Seoul, Korea

    NASA Astrophysics Data System (ADS)

    Son, Ji-Young; Lee, Jong-Tae; Anderson, G. Brooke; Bell, Michelle L.

    2011-07-01

    Studies indicate that the mortality effects of temperature may vary by population and region, although little is known about the vulnerability of subgroups to these risks in Korea. This study examined the relationship between temperature and cause-specific mortality for Seoul, Korea, for the period 2000-7, including whether some subgroups are particularly vulnerable with respect to sex, age, education and place of death. The authors applied time-series models allowing nonlinear relationships for heat- and cold-related mortality, and generated exposure-response curves. Both high and low ambient temperatures were associated with increased risk for daily mortality. Mortality risk was 10.2% (95% confidence interval 7.43, 13.0%) higher at the 90th percentile of daily mean temperatures (25 °C) compared to the 50th percentile (15 °C). Mortality risk was 12.2% (3.69, 21.3%) comparing the 10th (-1 °C) and 50th percentiles of temperature. Cardiovascular deaths showed a higher risk to cold, whereas respiratory deaths showed a higher risk to heat effect, although the differences were not statistically significant. Susceptible populations were identified such as females, the elderly, those with no education, and deaths occurring outside of a hospital for heat- and cold-related total mortality. Our findings provide supportive evidence of a temperature-mortality relationship in Korea and indicate that some subpopulations are particularly vulnerable.

  14. Molecular Imaging of Vulnerable Atherosclerotic Plaques in Animal Models.

    PubMed

    Gargiulo, Sara; Gramanzini, Matteo; Mancini, Marcello

    2016-01-01

    Atherosclerosis is characterized by intimal plaques of the arterial vessels that develop slowly and, in some cases, may undergo spontaneous rupture with subsequent heart attack or stroke. Currently, noninvasive diagnostic tools are inadequate to screen atherosclerotic lesions at high risk of acute complications. Therefore, the attention of the scientific community has been focused on the use of molecular imaging for identifying vulnerable plaques. Genetically engineered murine models such as ApoE(-/-) and ApoE(-/-)Fbn1C1039G(+/-) mice have been shown to be useful for testing new probes targeting biomarkers of relevant molecular processes for the characterization of vulnerable plaques, such as vascular endothelial growth factor receptor (VEGFR)-1, VEGFR-2, intercellular adhesion molecule (ICAM)-1, P-selectin, and integrins, and for the potential development of translational tools to identify high-risk patients who could benefit from early therapeutic interventions. This review summarizes the main animal models of vulnerable plaques, with an emphasis on genetically altered mice, and the state-of-the-art preclinical molecular imaging strategies. PMID:27618031

  15. The hippocampus in aging and disease: From plasticity to vulnerability.

    PubMed

    Bartsch, T; Wulff, P

    2015-11-19

    The hippocampus has a pivotal role in learning and in the formation and consolidation of memory and is critically involved in the regulation of emotion, fear, anxiety, and stress. Studies of the hippocampus have been central to the study of memory in humans and in recent years, the regional specialization and organization of hippocampal functions have been elucidated in experimental models and in human neurological and psychiatric diseases. The hippocampus has long been considered a classic model for the study of neuroplasticity as many examples of synaptic plasticity such as long-term potentiation and -depression have been identified and demonstrated in hippocampal circuits. Neuroplasticity is the ability to adapt and reorganize the structure or function to internal or external stimuli and occurs at the cellular, population, network or behavioral level and is reflected in the cytological and network architecture as well as in intrinsic properties of hippocampal neurons and circuits. The high degree of hippocampal neuroplasticity might, however, be also negatively reflected in the pronounced vulnerability of the hippocampus to deleterious conditions such as ischemia, epilepsy, chronic stress, neurodegeneration and aging targeting hippocampal structure and function and leading to cognitive deficits. Considering this framework of plasticity and vulnerability, we here review basic principles of hippocampal anatomy and neuroplasticity on various levels as well as recent findings regarding the functional organization of the hippocampus in light of the regional vulnerability in Alzheimer's disease, ischemia, epilepsy, neuroinflammation and aging. PMID:26241337

  16. Assessment of floodplain vulnerability during extreme Mississippi River flood 2011.

    PubMed

    Goodwell, Allison E; Zhu, Zhenduo; Dutta, Debsunder; Greenberg, Jonathan A; Kumar, Praveen; Garcia, Marcelo H; Rhoads, Bruce L; Holmes, Robert R; Parker, Gary; Berretta, David P; Jacobson, Robert B

    2014-01-01

    Regional change in the variability and magnitude of flooding could be a major consequence of future global climate change. Extreme floods have the capacity to rapidly transform landscapes and expose landscape vulnerabilities through highly variable spatial patterns of inundation, erosion, and deposition. We use the historic activation of the Birds Point-New Madrid Floodway during the Mississippi and Ohio River Flooding of 2011 as a scientifically unique stress experiment to analyze indicators of floodplain vulnerability. We use pre- and postflood airborne Light Detection and Ranging data sets to locate erosional and depositional hotspots over the 540 km(2) agricultural Floodway. While riparian vegetation between the river and the main levee breach likely prevented widespread deposition, localized scour and deposition occurred near the levee breaches. Eroded gullies nearly 1 km in length were observed at a low ridge of a relict meander scar of the Mississippi River. Our flow modeling and spatial mapping analysis attributes this vulnerability to a combination of erodible soils, flow acceleration associated with legacy fluvial landforms, and a lack of woody vegetation to anchor soil and enhance flow resistance. Results from this study could guide future mitigation and adaptation measures in cases of extreme flooding. PMID:24512322

  17. Community clusters of tsunami vulnerability in the US Pacific Northwest

    USGS Publications Warehouse

    Wood, Nathan J.; Jones, Jeanne M.; Spielman, Seth; Schmidtlein, Mathew C.

    2015-01-01

    Many coastal communities throughout the world are threatened by local (or near-field) tsunamis that could inundate low-lying areas in a matter of minutes after generation. Although the hazard and sustainability literature often frames vulnerability conceptually as a multidimensional issue involving exposure, sensitivity, and resilience to a hazard, assessments often focus on one element or do not recognize the hazard context. We introduce an analytical framework for describing variations in population vulnerability to tsunami hazards that integrates (i) geospatial approaches to identify the number and characteristics of people in hazard zones, (ii) anisotropic path distance models to estimate evacuation travel times to safety, and (iii) cluster analysis to classify communities with similar vulnerability. We demonstrate this approach by classifying 49 incorporated cities, 7 tribal reservations, and 17 counties from northern California to northern Washington that are directly threatened by tsunami waves associated with a Cascadia subduction zone earthquake. Results suggest three primary community groups: (i) relatively low numbers of exposed populations with varied demographic sensitivities, (ii) high numbers of exposed populations but sufficient time to evacuate before wave arrival, and (iii) moderate numbers of exposed populations but insufficient time to evacuate. Results can be used to enhance general hazard-awareness efforts with targeted interventions, such as education and outreach tailored to local demographics, evacuation training, and/or vertical evacuation refuges.

  18. Assessment of floodplain vulnerability during extreme Mississippi River flood 2011

    USGS Publications Warehouse

    Goodwell, Allison E.; Zhu, Zhenduo; Dutta, Debsunder; Greenberg, Jonathan A.; Kumar, Praveen; Garcia, Marcelo H.; Rhoads, Bruce L.; Holmes, Jr., Robert R.; Parker, Gary; Berretta, David P.; Jacobson, Robert B.

    2014-01-01

    Regional change in the variability and magnitude of flooding could be a major consequence of future global climate change. Extreme floods have the capacity to rapidly transform landscapes and expose landscape vulnerabilities through highly variable spatial patterns of inundation, erosion, and deposition. We use the historic activation of the Birds Point-New Madrid Floodway during the Mississippi and Ohio River Flooding of 2011 as a scientifically unique stress experiment to analyze indicators of floodplain vulnerability. We use pre- and postflood airborne Light Detection and Ranging data sets to locate erosional and depositional hotspots over the 540 km2 agricultural Floodway. While riparian vegetation between the river and the main levee breach likely prevented widespread deposition, localized scour and deposition occurred near the levee breaches. Eroded gullies nearly 1 km in length were observed at a low ridge of a relict meander scar of the Mississippi River. Our flow modeling and spatial mapping analysis attributes this vulnerability to a combination of erodible soils, flow acceleration associated with legacy fluvial landforms, and a lack of woody vegetation to anchor soil and enhance flow resistance. Results from this study could guide future mitigation and adaptation measures in cases of extreme flooding.

  19. Trajectory of Adolescent Cannabis Use on Addiction Vulnerability

    PubMed Central

    Hurd, Yasmin L.; Michaelides, Michael; Miller, Michael L.; Jutras-Aswad, Didier

    2013-01-01

    The adolescent brain is a period of dynamic development making it vulnerable to environmental factors such as drug exposure. Of the illicit drugs, cannabis is most used by teenagers since it is perceived by many to be of little harm. This perception has led to a growing number of states approving its legalization and increased accessibility. Most of the debates and ensuing policies regarding cannabis were done without consideration of its impact on one of the most vulnerable population, namely teens, or without consideration of scientific data. We provide an overview of the endocannabinoid system in relation to adolescent cannabis exposure and provide insights regarding factors such as genetics and behavioral traits that confer risk for subsequent addiction. While it is clear that more systematic scientific studies are needed to understand the long-term impact of adolescent cannabis exposure on brain and behavior, the current evidence suggests that it has a far-reaching influence on adult addictive behaviors particularly for certain subsets of vulnerable individuals. PMID:23954491

  20. Impact of Degree Heterogeneity on Attack Vulnerability of Interdependent Networks.

    PubMed

    Sun, Shiwen; Wu, Yafang; Ma, Yilin; Wang, Li; Gao, Zhongke; Xia, Chengyi

    2016-09-09

    The study of interdependent networks has become a new research focus in recent years. We focus on one fundamental property of interdependent networks: vulnerability. Previous studies mainly focused on the impact of topological properties upon interdependent networks under random attacks, the effect of degree heterogeneity on structural vulnerability of interdependent networks under intentional attacks, however, is still unexplored. In order to deeply understand the role of degree distribution and in particular degree heterogeneity, we construct an interdependent system model which consists of two networks whose extent of degree heterogeneity can be controlled simultaneously by a tuning parameter. Meanwhile, a new quantity, which can better measure the performance of interdependent networks after attack, is proposed. Numerical simulation results demonstrate that degree heterogeneity can significantly increase the vulnerability of both single and interdependent networks. Moreover, it is found that interdependent links between two networks make the entire system much more fragile to attacks. Enhancing coupling strength between networks can greatly increase the fragility of both networks against targeted attacks, which is most evident under the case of max-max assortative coupling. Current results can help to deepen the understanding of structural complexity of complex real-world systems.

  1. The hippocampus in aging and disease: From plasticity to vulnerability.

    PubMed

    Bartsch, T; Wulff, P

    2015-11-19

    The hippocampus has a pivotal role in learning and in the formation and consolidation of memory and is critically involved in the regulation of emotion, fear, anxiety, and stress. Studies of the hippocampus have been central to the study of memory in humans and in recent years, the regional specialization and organization of hippocampal functions have been elucidated in experimental models and in human neurological and psychiatric diseases. The hippocampus has long been considered a classic model for the study of neuroplasticity as many examples of synaptic plasticity such as long-term potentiation and -depression have been identified and demonstrated in hippocampal circuits. Neuroplasticity is the ability to adapt and reorganize the structure or function to internal or external stimuli and occurs at the cellular, population, network or behavioral level and is reflected in the cytological and network architecture as well as in intrinsic properties of hippocampal neurons and circuits. The high degree of hippocampal neuroplasticity might, however, be also negatively reflected in the pronounced vulnerability of the hippocampus to deleterious conditions such as ischemia, epilepsy, chronic stress, neurodegeneration and aging targeting hippocampal structure and function and leading to cognitive deficits. Considering this framework of plasticity and vulnerability, we here review basic principles of hippocampal anatomy and neuroplasticity on various levels as well as recent findings regarding the functional organization of the hippocampus in light of the regional vulnerability in Alzheimer's disease, ischemia, epilepsy, neuroinflammation and aging.

  2. Maternal deprivation specifically enhances vulnerability to opiate dependence.

    PubMed

    Vazquez, Vincent; Giros, Bruno; Daugé, Valérie

    2006-12-01

    Maternal deprivation has been shown to increase vulnerability to morphine dependence and to disturb the enkephalinergic system in adulthood. To study whether or not this vulnerability to opiates is a specific feature, we examined oral self-administration behaviour of various reinforcing substances. Experiments were performed with morphine (25 mg/l), ethanol (10%), amphetamine (25 mg/l) and cocaine (100 mg/l). Drugs were available in a continuous free choice paradigm during 3 months. Cocaine and ethanol consumption and preference were similar in both deprived and control rats. Deprived rats greatly increased their morphine consumption and 78% of them showed a progressive decrease in morphine aversion. Only a slight, but significant, increase in oral amphetamine consumption was observed in deprived rats when compared with control rats. The difference in amphetamine self-administration in control and deprived rats cannot be explained by a modification of dopamine transporter expression measured by immunoautoradiography. Altogether, we conclude that maternal deprivation worsens inherent susceptibility to dependence, specifically for opiates, and therefore represents a highly valuable model to study environmentally triggered interindividual vulnerability to opiate addiction. PMID:17110797

  3. Neural Vulnerability Factors that Increase Risk for Future Weight Gain

    PubMed Central

    Stice, Eric; Yokum, Sonja

    2015-01-01

    Theorists have proposed several neural vulnerability factors that may increase overeating and consequent weight gain. Early cross-sectional imaging studies could not determine whether aberrant neural responsivity was a precursor or consequence of overeating. However, recent prospective imaging studies examining predictors of future weight gain and response to obesity treatment, and repeated-measures imaging studies before and after weight gain and loss have advanced knowledge of etiologic processes and neural plasticity resulting from weight change. The present article reviews evidence from prospective studies using imaging and behavioral measures reflecting neural function, as well as randomized experiments with humans and animals that are consistent or inconsistent with five neural vulnerability theories for excessive weight gain. Extant data provide strong support for the incentive sensitization theory of obesity and moderate support for the reward surfeit theory, inhibitory control deficit theory, and dynamic vulnerability model of obesity, which attempted to synthesize the former theories into a single etiologic model. However, existing data provide only minimal support for the reward deficit theory. Findings are synthesized into a new working etiologic model that is based on current scientific knowledge. Important directions for future studies, which have the potential to support or refute this working etiologic model, are delineated. PMID:26854866

  4. Climate Change and Water in Vulnerable Agriculture: Impacts - Mitigation - Adaptation

    NASA Astrophysics Data System (ADS)

    Dalezios, Nicolas; Tarquis, Ana Maria

    2016-04-01

    Agriculture highly depends on climate and is adversely affected by climate extremes caused mainly by anthropogenic climate change and increasing climate variability. Moreover, agricultural production risks and vulnerability of agriculture may become an issue in several regions around the world, since they are likely to increase the incidence of crop failure. The aim of this paper is to present the water availability and requirements in Southern Europe and specifically in the Mediterranean region, which is characterized by vulnerable agriculture. Indeed, the climatic trend in the 21st century for this region indicates temperature increase, precipitation decrease combined with an increase in the frequency of climate extremes, such as droughts, heat waves and forest fires. The three major components of climate change are examined, namely impacts, mitigation and adaptation. In particular, precipitation frequency analysis has already indicated a reduction in the precipitation amounts and a shift towards more intense rainstorms. Moreover, time series of drought indices are presented in affected areas. The importance of climate change mitigation measures is also highlighted. Finally, an adaptation scheme for agriculture from climate change in vulnerable and water scarce areas is presented.

  5. Community clusters of tsunami vulnerability in the US Pacific Northwest.

    PubMed

    Wood, Nathan J; Jones, Jeanne; Spielman, Seth; Schmidtlein, Mathew C

    2015-04-28

    Many coastal communities throughout the world are threatened by local (or near-field) tsunamis that could inundate low-lying areas in a matter of minutes after generation. Although the hazard and sustainability literature often frames vulnerability conceptually as a multidimensional issue involving exposure, sensitivity, and resilience to a hazard, assessments often focus on one element or do not recognize the hazard context. We introduce an analytical framework for describing variations in population vulnerability to tsunami hazards that integrates (i) geospatial approaches to identify the number and characteristics of people in hazard zones, (ii) anisotropic path distance models to estimate evacuation travel times to safety, and (iii) cluster analysis to classify communities with similar vulnerability. We demonstrate this approach by classifying 49 incorporated cities, 7 tribal reservations, and 17 counties from northern California to northern Washington that are directly threatened by tsunami waves associated with a Cascadia subduction zone earthquake. Results suggest three primary community groups: (i) relatively low numbers of exposed populations with varied demographic sensitivities, (ii) high numbers of exposed populations but sufficient time to evacuate before wave arrival, and (iii) moderate numbers of exposed populations but insufficient time to evacuate. Results can be used to enhance general hazard-awareness efforts with targeted interventions, such as education and outreach tailored to local demographics, evacuation training, and/or vertical evacuation refuges. PMID:25870283

  6. Vulnerability of coastal aquifers to groundwater use and climate change

    NASA Astrophysics Data System (ADS)

    Ferguson, Grant; Gleeson, Tom

    2012-05-01

    Climate change and human population growth are expected to have substantial impacts on global water resources throughout the twenty-first century. Coastal aquifers are a nexus of the world's oceanic and hydrologic ecosystems and provide a water source for the more than one billion people living in coastal regions. Saltwater intrusion caused by excessive groundwater extraction is already impacting diverse regions of the globe. Synthesis studies and detailed simulations have predicted that rising sea levels could negatively impact coastal aquifers through saltwater intrusion and/or inundation of coastal regions. However, the relative vulnerability of coastal aquifers to groundwater extraction and sea-level rise has not been systematically examined. Here we show that coastal aquifers are more vulnerable to groundwater extraction than to predicted sea-level rise under a wide range of hydrogeologic conditions and population densities. Only aquifers with very low hydraulic gradients are more vulnerable to sea-level rise and these regions will be impacted by saltwater inundation before saltwater intrusion. Human water use is a key driver in the hydrology of coastal aquifers, and efforts to adapt to sea-level rise at the expense of better water management are misguided.

  7. Can friends protect genetically vulnerable children from depression?

    PubMed

    Brendgen, Mara; Vitaro, Frank; Bukowski, William M; Dionne, Ginette; Tremblay, Richard E; Boivin, Michel

    2013-05-01

    The study examined whether reciprocal friendship quantity or quality can mitigate genetic vulnerability for depression symptoms in children. The sample comprised 168 monozygotic twin pairs and 126 same-sex dizygotic twin pairs assessed in Grade 4 (mean age = 10.04 years). Friendship participation was measured via reciprocal nominations of close friendships within the classroom. Friendship quality was measured through self-reports. Depression symptoms were measured through teacher and peer reports. Genetic vulnerability for depression symptoms was unrelated to friendship participation or the number of reciprocal friends, but it was negatively related to positive friendship quality. In line with gene-environment interaction, genetic risk effects on depression symptoms were mitigated in girls who had at least one close reciprocal friend. In boys, only moderate main effects of genetic vulnerability and friendship participation were found but no interaction between them. However, among boys with at least one reciprocal friend, a greater number of friends was related to fewer depression symptoms whereas no cumulative effect of friendship was found for girls. Finally, positive friendship quality was related to fewer depression symptoms in girls and boys even when controlling for genetic risk. The findings emphasize the importance of teaching social interactional skills that promote high-quality friendship relations to help prevent the development of depression symptoms in children.

  8. Community clusters of tsunami vulnerability in the US Pacific Northwest

    PubMed Central

    Wood, Nathan J.; Jones, Jeanne; Spielman, Seth; Schmidtlein, Mathew C.

    2015-01-01

    Many coastal communities throughout the world are threatened by local (or near-field) tsunamis that could inundate low-lying areas in a matter of minutes after generation. Although the hazard and sustainability literature often frames vulnerability conceptually as a multidimensional issue involving exposure, sensitivity, and resilience to a hazard, assessments often focus on one element or do not recognize the hazard context. We introduce an analytical framework for describing variations in population vulnerability to tsunami hazards that integrates (i) geospatial approaches to identify the number and characteristics of people in hazard zones, (ii) anisotropic path distance models to estimate evacuation travel times to safety, and (iii) cluster analysis to classify communities with similar vulnerability. We demonstrate this approach by classifying 49 incorporated cities, 7 tribal reservations, and 17 counties from northern California to northern Washington that are directly threatened by tsunami waves associated with a Cascadia subduction zone earthquake. Results suggest three primary community groups: (i) relatively low numbers of exposed populations with varied demographic sensitivities, (ii) high numbers of exposed populations but sufficient time to evacuate before wave arrival, and (iii) moderate numbers of exposed populations but insufficient time to evacuate. Results can be used to enhance general hazard-awareness efforts with targeted interventions, such as education and outreach tailored to local demographics, evacuation training, and/or vertical evacuation refuges. PMID:25870283

  9. Socioeconomic Factors and Vulnerability to Outbreaks of Leptospirosis in Nicaragua

    PubMed Central

    Bacallao, Jorge; Schneider, Maria Cristina; Najera, Patricia; Aldighieri, Sylvain; Soto, Aida; Marquiño, Wilmer; Sáenz, Carlos; Jiménez, Eduardo; Moreno, Gilberto; Chávez, Octavio; Galan, Deise I.; Espinal, Marcos A.

    2014-01-01

    Leptospirosis is an epidemic-prone zoonotic disease that occurs worldwide, with more than 500,000 human cases reported annually. It is influenced by environmental and socioeconomic factors that affect the occurrence of outbreaks and the incidence of the disease. Critical areas and potential drivers for leptospirosis outbreaks have been identified in Nicaragua, where several conditions converge and create an appropriate scenario for the development of leptospirosis. The objectives of this study were to explore possible socioeconomic variables related to leptospirosis critical areas and to construct and validate a vulnerability index based on municipal socioeconomic indicators. Municipalities with lower socioeconomic status (greater unsatisfied basic needs for quality of the household and for sanitary services, and higher extreme poverty and illiteracy rates) were identified with the highest leptospirosis rates. The municipalities with highest local vulnerability index should be the priority for intervention. A distinction between risk given by environmental factors and vulnerability to risk given by socioeconomic conditions was shown as important, which also applies to the “causes of outbreaks” and “causes of cases”. PMID:25153463

  10. Experimental approach to individual vulnerability to psychostimulant addiction.

    PubMed

    Deminiere, J M; Piazza, P V; Le Moal, M; Simon, H

    1989-01-01

    Vulnerability to the development of drug-intake has been studied by using the acquisition of intravenous amphetamine self-administration in the rat. In a series of neurobiological experiments we provoked imbalances in the functioning of the dopaminergic (DA) network by performing lesions of the DA cell bodies in the ventral tegmental area, DA terminals in the amygdala or median raphe nucleus. These imbalances which resulted in enhanced DA transmission ratio between the nucleus accumbens and the prefrontal cortex led to an increase in the rapidity of self-administration acquisition. With a psychobiological approach, we showed that individual differences in vulnerability to develop self-administration in rats of the same strain were correlated with locomotor responses to stress and to an acute injection of amphetamine. Moreover, activation of DA transmission by repeated amphetamine injections changed animals resistant to drug-intake into vulnerable ones. It is suggested that some inherited or acquired factors, at least in part by affecting the activity of DA network, can predispose individuals to drug abuse. PMID:2682400

  11. Impact of Degree Heterogeneity on Attack Vulnerability of Interdependent Networks.

    PubMed

    Sun, Shiwen; Wu, Yafang; Ma, Yilin; Wang, Li; Gao, Zhongke; Xia, Chengyi

    2016-01-01

    The study of interdependent networks has become a new research focus in recent years. We focus on one fundamental property of interdependent networks: vulnerability. Previous studies mainly focused on the impact of topological properties upon interdependent networks under random attacks, the effect of degree heterogeneity on structural vulnerability of interdependent networks under intentional attacks, however, is still unexplored. In order to deeply understand the role of degree distribution and in particular degree heterogeneity, we construct an interdependent system model which consists of two networks whose extent of degree heterogeneity can be controlled simultaneously by a tuning parameter. Meanwhile, a new quantity, which can better measure the performance of interdependent networks after attack, is proposed. Numerical simulation results demonstrate that degree heterogeneity can significantly increase the vulnerability of both single and interdependent networks. Moreover, it is found that interdependent links between two networks make the entire system much more fragile to attacks. Enhancing coupling strength between networks can greatly increase the fragility of both networks against targeted attacks, which is most evident under the case of max-max assortative coupling. Current results can help to deepen the understanding of structural complexity of complex real-world systems. PMID:27609483

  12. Subjectivity and vulnerability: reflections on the foundation of ethical sensibility.

    PubMed

    Nortvedt, Per

    2003-10-01

    This paper investigates the possibility of understanding the rudimentary elements of clinical sensitivity by investigating the works of Edmund Husserl and Emmanuel Levinas on sensibility. Husserl's theory of intentionality offers significant reflections on the role of pre-reflective and affective intuition as a condition for intentionality and reflective consciousness. These early works of Husserl, in particular his works on the constitution of phenomenological time and subjective time-consciousness, prove to be an important basis for Levinas' works on an ethics of alterity and infinite responsibility for the other person. In fact, it is difficult to understand the core of Levinasian ethics, of vulnerability as proximity, of ethical sensitivity as passivity and a suffering for the suffering of another, without understanding the influence from Husserl's work. Crucially, the paper will, on the basis of Levinasian ethics, establish an understanding of sensibility as vulnerability and receptivity that is fundamental also for understanding significant intuitions in clinical nursing. Clinical sensitivity and carefulness in nursing are shaped by the concrete and also bodily expressions of vulnerabilities in a receptivity that is pre-reflective and pre-ontological.

  13. 76 FR 55673 - Vulnerability Assessments in Support of the Climate Ready Estuaries Program: A Novel Approach...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-08

    ... AGENCY Vulnerability Assessments in Support of the Climate Ready Estuaries Program: A Novel Approach... period for the draft documents titled, Vulnerability Assessments in Support of the Climate Ready... Partnership (EPA/600/R-11/ 058a) and Vulnerability Assessments in Support of the Climate Ready...

  14. 75 FR 51806 - Climate Change Vulnerability Assessment: Four Case Studies of Water Utility Practices

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-23

    ... AGENCY Climate Change Vulnerability Assessment: Four Case Studies of Water Utility Practices AGENCY...-day public comment period for the draft document titled, ``Climate Change Vulnerability Assessment... utilities to assess their vulnerability to future climate change. The report is intended to illustrate...

  15. Vulnerable Children, Communities and Schools: Lessons from Three HIV/AIDS Affected Areas

    ERIC Educational Resources Information Center

    Kendall, Nancy; O'Gara, Chloe

    2007-01-01

    The growing number of children made vulnerable by HIV/AIDS threatens the achievement of Education for All (EFA) and Millennium Development goals. Policy recommendations assign schools key roles in meeting the needs of vulnerable children, but there is a dearth of evidence about how vulnerable children and schools interact in AIDS affected…

  16. A preliminary analysis of quantifying computer security vulnerability data in "the wild"

    NASA Astrophysics Data System (ADS)

    Farris, Katheryn A.; McNamara, Sean R.; Goldstein, Adam; Cybenko, George

    2016-05-01

    A system of computers, networks and software has some level of vulnerability exposure that puts it at risk to criminal hackers. Presently, most vulnerability research uses data from software vendors, and the National Vulnerability Database (NVD). We propose an alternative path forward through grounding our analysis in data from the operational information security community, i.e. vulnerability data from "the wild". In this paper, we propose a vulnerability data parsing algorithm and an in-depth univariate and multivariate analysis of the vulnerability arrival and deletion process (also referred to as the vulnerability birth-death process). We find that vulnerability arrivals are best characterized by the log-normal distribution and vulnerability deletions are best characterized by the exponential distribution. These distributions can serve as prior probabilities for future Bayesian analysis. We also find that over 22% of the deleted vulnerability data have a rate of zero, and that the arrival vulnerability data is always greater than zero. Finally, we quantify and visualize the dependencies between vulnerability arrivals and deletions through a bivariate scatterplot and statistical observations.

  17. Assessment of human-natural system characteristics influencing global freshwater supply vulnerability

    NASA Astrophysics Data System (ADS)

    Padowski, Julie C.; Gorelick, Steven M.; Thompson, Barton H.; Rozelle, Scott; Fendorf, Scott

    2015-10-01

    Global freshwater vulnerability is a product of environmental and human dimensions, however, it is rarely assessed as such. Our approach identifies freshwater vulnerability using four broad categories: endowment, demand, infrastructure, and institutions, to capture impacts on natural and managed water systems within the coupled human-hydrologic environment. These categories are represented by 19 different endogenous and exogenous characteristics affecting water supply vulnerability. By evaluating 119 lower per capita income countries (<10 725), we find that every nation experiences some form of vulnerability. Institutional vulnerability is experienced most commonly, occurring in 44 nations, and 23 countries suffer deficiencies in all four categories. Of these highly vulnerable countries, Jordan is the most vulnerable, reporting the greatest number of characteristics (5 of 19) at critical vulnerability levels, with Yemen and Djibouti nearly as vulnerable. Surprising similarities in vulnerability were also found among geographically disparate nations such as Vietnam, Sri Lanka, and Guatemala. Determining shared patterns of freshwater vulnerability provides insights into why water supply vulnerabilities are manifested in human-water systems at the national scale.

  18. Understanding Young Women's Sexual Relationship Experiences: The Nature and Role of Vulnerability

    ERIC Educational Resources Information Center

    Maxwell, Claire

    2006-01-01

    This paper seeks to operationalise the concept of social "vulnerability" and explore its usefulness as a framework for understanding sexual relationships. Data from 30 vulnerable and less vulnerable young women in one UK city were collected through in-depth interviews and focus groups. An analysis of differences and similarities in participants'…

  19. Perceptions of Vulnerability to HIV/AIDS: A Comparison of Two College Cohorts, 1990 and 2005

    ERIC Educational Resources Information Center

    Teague, Susan M.

    2009-01-01

    Theories of preventive health behavior posit that perceived vulnerability to health threats motivates self-protective behavior. Fifteen years after an initial study of college students' perceptions of their vulnerability to HIV, a replication was conducted on the same campus in 2005. Comparisons between cohorts on vulnerability judgements were…

  20. Social vulnerability to climate change in primary producers: A typology approach

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Adaptation in agro-ecological systems will be important for moderating the impacts of climate change. Vulnerability assessments provide the basis for developing strategies to reduce social vulnerability and plan for climate adaptation. Primary industries have been identified as the most vulnerable i...

  1. Local spatial and temporal factors influencing population and societal vulnerability to natural disasters.

    PubMed

    Zhou, Yang; Li, Ning; Wu, Wenxiang; Wu, Jidong; Shi, Peijun

    2014-04-01

    The identification of societal vulnerable counties and regions and the factors contributing to social vulnerability are crucial for effective disaster risk management. Significant advances have been made in the study of social vulnerability over the past two decades, but we still know little regarding China's societal vulnerability profiles, especially at the county level. This study investigates the county-level spatial and temporal patterns in social vulnerability in China from 1980 to 2010. Based on China's four most recent population censuses of 2,361 counties and their corresponding socioeconomic data, a social vulnerability index for each county was created using factor analysis. Exploratory spatial data analysis, including global and local autocorrelations, was applied to reveal the spatial patterns of county-level social vulnerability. The results demonstrate that the dynamic characteristics of China's county-level social vulnerability are notably distinct, and the dominant contributors to societal vulnerability for all of the years studied were rural character, development (urbanization), and economic status. The spatial clustering patterns of social vulnerability to natural disasters in China exhibited a gathering-scattering-gathering pattern over time. Further investigations indicate that many counties in the eastern coastal area of China are experiencing a detectable increase in social vulnerability, whereas the societal vulnerability of many counties in the western and northern areas of China has significantly decreased over the past three decades. These findings will provide policymakers with a sound scientific basis for disaster prevention and mitigation decisions.

  2. Mapping human vulnerability to chemical accidents in the vicinity of chemical industry parks.

    PubMed

    Li, Fengying; Bi, Jun; Huang, Lei; Qu, Changsheng; Yang, Jie; Bu, Quanmin

    2010-07-15

    China is suffering from severe pollution accidents which may have catastrophic impacts on the local population and environment. Some questions are unclear to local governments and industry operators like "who are vulnerable to the chemical risks?" and "what is the magnitude of vulnerability?". This paper concentrates on exploring the concepts of human vulnerability and the methodology of analyzing human vulnerability to chemical accidents in the vicinity of chemical industry parks. A conceptual model of human vulnerability to chemical accidents is developed, revealing the roots of human vulnerability and emphasizing its role in risk management. A geographical information system (GIS)-based methodology for mapping vulnerability is proposed and applied to the Nanjing Chemical Industry Park in China. By combining physical vulnerability and social vulnerability spatially, the total vulnerability is revealed to better respond to accidents. It is proposed to improve traffic lines and allocation of medical services, and include vulnerability assessment in land-use planning to reduce future risks. In other words, it seems feasible and effective to reveal physical, social and total vulnerability of residents in the vicinity of chemical risk sources.

  3. Accounting for the Impact of Impermeable Soil Layers on Pesticide Runoff and Leaching in a Landscape Vulnerability Model

    Technology Transfer Automated Retrieval System (TEKTRAN)

    A regional-scale model that estimates landscape vulnerability of pesticide leaching and runoff (solution and particle adsorbed) underestimated runoff vulnerability and overestimated leaching vulnerability compared to measured data when applied to a gently rolling landscape in northeast Missouri. Man...

  4. [Cross-cultural adaptation of the Vulnerable Elders Survey-13 (VES-13): helping in the identification of vulnerable older people].

    PubMed

    Maia, Flávia de Oliveira Motta; Duarte, Yeda Aparecida de Oliveira; Secoli, Silvia Regina; Santos, Jair Lício Ferreira; Lebrão, Maria Lúcia

    2012-10-01

    To use the VES-13 a tool for identifying vulnerable older people cultural adaptation was performed, a process that seeks the equivalence between the original instrument and its version in another culture. The evaluation of semantic, idiomatic, cultural and conceptual equivalence obtained a general average agreement of 78%, 78%, 97.0% and 94.0% respectively. Kappa coefficient was used to verify the agreement in test-retest reliability, where variables were significant. The analysis of internal consistency was measured by using Cronbach's alpha coefficient, where 70% of the phenomenon under study are represented in the VES-13. The VES-13, translated and adapted, is a reliable instrument with respect to stability and internal consistency of their measurements. Its simple structure and easy to use may therefore contribute to the identification of vulnerable older people, thus contributing to the prioritization of monitoring health services.

  5. Spectral CT imaging of vulnerable plaque with two independent biomarkers

    NASA Astrophysics Data System (ADS)

    Baturin, Pavlo; Alivov, Yahya; Molloi, Sabee

    2012-07-01

    The purpose of this paper is to investigate the feasibility of a novel four-material decomposition technique for assessing the vulnerability of plaque with two contrast materials spectral computer tomography (CT) using two independent markers: plaque's inflammation and spotty calcification. A simulation study was conducted using an energy-sensitive photon-counting detector for k-edge imaging of the coronary arteries. In addition to detecting the inflammation status, which is known as a biological marker of a plaque's vulnerability, we use spotty calcium concentration as an independent marker to test a plaque's vulnerability. We have introduced a new method for detecting and quantifying calcium concentrations in the presence of two contrast materials (iodine and gold), calcium and soft tissue background. In this method, four-material decomposition was performed on a pixel-by-pixel basis, assuming there was an arbitrary mixture of materials in the voxel. The concentrations of iodine and gold were determined by the k-edge material decomposition based on the maximum likelihood method. The calibration curves of the attenuation coefficients, with respect to the concentrations of different materials, were used to separate the calcium signal from both contrast materials and different soft tissues in the mixtures. Three different materials (muscle, blood and lipid) were independently used as soft tissue. The simulations included both ideal and more realistic energy resolving detectors to measure the polychromatic photon spectrum in single slice parallel beam geometry. The ideal detector was used together with a 3 cm diameter digital phantom to demonstrate the decomposition method while a more realistic detector and a 33 × 24 cm2 digital chest phantom were simulated to validate the vulnerability assessment technique. A 120 kVp spectrum was generated to produce photon flux sufficient for detecting contrast materials above the k-edges of iodine (33.2 keV) and gold (80.7 ke

  6. European information on climate change impacts, vulnerability and adaptation

    NASA Astrophysics Data System (ADS)

    Jol, A.; Isoard, S.

    2010-09-01

    Vulnerability to natural and technological disasters is increasing due to a combination of intensifying land use, increasing industrial development, further urban expansion and expanding infrastructure and also climate change. At EU level the European Commission's White Paper on adaptation to climate change (published in 2009) highlights that adaptation actions should be focused on the most vulnerable areas and communities in Europe (e.g. mountains, coastal areas, river flood prone areas, Mediterranean, Arctic). Mainstreaming of climate change into existing EU policies will be a key policy, including within the Water Framework Directive, Marine Strategy Framework Directive, Nature protection and biodiversity policies, integrated coastal zone management, other (sectoral) policies (agriculture, forestry, energy, transport, health) and disaster risk prevention. 2010 is the international year on biodiversity and the Conference of Parties of the biodiversity convention will meet in autumn 2010 (Japan) to discuss amongst other post-2010 strategies, objectives and indicators. Both within the Biodiversity Convention (CBD) and the Climate Change Convention (UNFCCC) there is increasing recognition of the need for integration of biodiversity conservation into climate change mitigation and adaptation activities. Furthermore a number of European countries and also some regions have started to prepare and/or have adopted national adaptation plans or frameworks. Sharing of good practices on climate change vulnerability methods and adaptation actions is so far limited, but is essential to improve such plans, at national, sub national and local level where much of the adaptation action is already taking place and will be expanding in future, also involving increasingly the business community. The EU Clearinghouse on CC impacts, vulnerability and adaptation should address these needs and it is planned to be operational end of 2011. The EEA is expected to have a role in its

  7. Hydropower and sustainability: resilience and vulnerability in China's powersheds.

    PubMed

    McNally, Amy; Magee, Darrin; Wolf, Aaron T

    2009-07-01

    Large dams represent a whole complex of social, economic and ecological processes, perhaps more than any other large infrastructure project. Today, countries with rapidly developing economies are constructing new dams to provide energy and flood control to growing populations in riparian and distant urban communities. If the system is lacking institutional capacity to absorb these physical and institutional changes there is potential for conflict, thereby threatening human security. In this paper, we propose analyzing sustainability (political, socioeconomic, and ecological) in terms of resilience versus vulnerability, framed within the spatial abstraction of a powershed. The powershed framework facilitates multi-scalar and transboundary analysis while remaining focused on the questions of resilience and vulnerability relating to hydropower dams. Focusing on examples from China, this paper describes the complex nature of dams using the sustainability and powershed frameworks. We then analyze the roles of institutions in China to understand the relationships between power, human security and the socio-ecological system. To inform the study of conflicts over dams China is a particularly useful case study because we can examine what happens at the international, national and local scales. The powershed perspective allows us to examine resilience and vulnerability across political boundaries from a dynamic, process-defined analytical scale while remaining focused on a host of questions relating to hydro-development that invoke drivers and impacts on national and sub-national scales. The ability to disaggregate the affects of hydropower dam construction from political boundaries allows for a deeper analysis of resilience and vulnerability. From our analysis we find that reforms in China's hydropower sector since 1996 have been motivated by the need to create stability at the national scale rather than resilient solutions to China's growing demand for energy and water

  8. Trait-Like Vulnerability to Total and Partial Sleep Loss

    PubMed Central

    Rupp, Tracy L.; Wesensten, Nancy J.; Balkin, Thomas J.

    2012-01-01

    Objective: To determine the extent to which individual differences in vulnerability to total sleep deprivation also reflect individual differences in vulnerability to multiple nights of sleep restriction. Design: Two sleep loss conditions (order counterbalanced) separated by 2 to 4 weeks: (a) total sleep deprivation (TSD) of 2 nights (63 h continuous wakefulness); (b) sleep restriction (SR) of 7 nights of 3 h nightly time in bed (TIB). Both conditions were preceded by 7 in-laboratory nights with 10 h nightly TIB; and followed by 3 recovery nights with 8 h nightly TIB. Measures of cognitive performance (psychomotor vigilance, working memory [1-Back], and mathematical processing), objective alertness, subjective sleepiness, and mood were obtained at regular intervals under both conditions. Intra-class correlation coefficients (ICC) were computed using outcome metrics averaged over the last day (08:00-20:00) of TSD and SR. Setting: Residential sleep/performance testing facility. Participants: Nineteen healthy adults (ages 18-39; 11 males, 8 females). Interventions: 2 nights of TSD and 7 nights SR (3 h nightly TIB). Results: Volunteers who displayed greater vulnerability to TSD displayed greater vulnerability to SR on cognitive performance tasks (ICC: PVT lapses = 0.89; PVT speed = 0.86; 1-Back = 0.88; mathematical processing = 0.68, Ps < 0.05). In addition, trait-like responsivity to TSD/SR was found for mood variables vigor (ICC = 0.91), fatigue (ICC = 0.73), and happiness (ICC = 0.85) (all Ps < 0.05). Conclusion: Resilience to sleep loss is a trait-like characteristic that reflects an individual's ability to maintain performance during both types of sleep loss (SR and TSD). Whether the findings extend to sleep schedules other than those investigated here (63 h of TSD and 7 nights of 3 h nightly TIB) will be the focus of future studies. Citation: Rupp TL; Wesensten NJ; Balkin TJ. Trait-like vulnerability to total and partial sleep loss. SLEEP 2012

  9. Hydropower and sustainability: resilience and vulnerability in China's powersheds.

    PubMed

    McNally, Amy; Magee, Darrin; Wolf, Aaron T

    2009-07-01

    Large dams represent a whole complex of social, economic and ecological processes, perhaps more than any other large infrastructure project. Today, countries with rapidly developing economies are constructing new dams to provide energy and flood control to growing populations in riparian and distant urban communities. If the system is lacking institutional capacity to absorb these physical and institutional changes there is potential for conflict, thereby threatening human security. In this paper, we propose analyzing sustainability (political, socioeconomic, and ecological) in terms of resilience versus vulnerability, framed within the spatial abstraction of a powershed. The powershed framework facilitates multi-scalar and transboundary analysis while remaining focused on the questions of resilience and vulnerability relating to hydropower dams. Focusing on examples from China, this paper describes the complex nature of dams using the sustainability and powershed frameworks. We then analyze the roles of institutions in China to understand the relationships between power, human security and the socio-ecological system. To inform the study of conflicts over dams China is a particularly useful case study because we can examine what happens at the international, national and local scales. The powershed perspective allows us to examine resilience and vulnerability across political boundaries from a dynamic, process-defined analytical scale while remaining focused on a host of questions relating to hydro-development that invoke drivers and impacts on national and sub-national scales. The ability to disaggregate the affects of hydropower dam construction from political boundaries allows for a deeper analysis of resilience and vulnerability. From our analysis we find that reforms in China's hydropower sector since 1996 have been motivated by the need to create stability at the national scale rather than resilient solutions to China's growing demand for energy and water

  10. The arctic water resource vulnerability index: an integrated assessment tool for community resilience and vulnerability with respect to freshwater.

    PubMed

    Alessa, Lilian; Kliskey, Andrew; Lammers, Richard; Arp, Chris; White, Dan; Hinzman, Larry; Busey, Robert

    2008-09-01

    People in the Arctic face uncertainty in their daily lives as they contend with environmental changes at a range of scales from local to global. Freshwater is a critical resource to people, and although water resource indicators have been developed that operate from regional to global scales and for midlatitude to equatorial environments, no appropriate index exists for assessing the vulnerability of Arctic communities to changing water resources at the local scale. The Arctic Water Resource Vulnerability Index (AWRVI) is proposed as a tool that Arctic communities can use to assess their relative vulnerability-resilience to changes in their water resources from a variety of biophysical and socioeconomic processes. The AWRVI is based on a social-ecological systems perspective that includes physical and social indicators of change and is demonstrated in three case study communities/watersheds in Alaska. These results highlight the value of communities engaging in the process of using the AWRVI and the diagnostic capability of examining the suite of constituent physical and social scores rather than the total AWRVI score alone.

  11. The arctic water resource vulnerability index: An integrated assessment tool for community resilience and vulnerability with respect to freshwater

    USGS Publications Warehouse

    Alessa, L.; Kliskey, A.; Lammers, R.; Arp, C.; White, D.; Hinzman, L.; Busey, R.

    2008-01-01

    People in the Arctic face uncertainty in their daily lives as they contend with environmental changes at a range of scales from local to global. Freshwater is a critical resource to people, and although water resource indicators have been developed that operate from regional to global scales and for midlatitude to equatorial environments, no appropriate index exists for assessing the vulnerability of Arctic communities to changing water resources at the local scale. The Arctic Water Resource Vulnerability Index (AWRVI) is proposed as a tool that Arctic communities can use to assess their relative vulnerability-resilience to changes in their water resources from a variety of biophysical and socioeconomic processes. The AWRVI is based on a social-ecological systems perspective that includes physical and social indicators of change and is demonstrated in three case study communities/watersheds in Alaska. These results highlight the value of communities engaging in the process of using the AWRVI and the diagnostic capability of examining the suite of constituent physical and social scores rather than the total AWRVI score alone. ?? 2008 Springer Science+Business Media, LLC.

  12. Predictive role of authenticity on psychological vulnerability in Turkish university students.

    PubMed

    Satici, Seydi Ahmet; Kayis, Ahmet Rifat; Akin, Ahmet

    2013-04-01

    Authenticity is associated with adaptive psychological characteristics and may be predictive of psychological vulnerability. The study was conducted with Turkish university students (N = 303; 158 women, 145 men; M age = 20.1 yr.). Participants completed the Turkish version of Authenticity Scale and the Psychological Vulnerability Scale. Psychological vulnerability was correlated positively with two subfactors of authenticity, accepting external influence and self-alienation, and negatively with the authentic living factor of authenticity. Self-alienation, accepting external influence, and authentic living were related to psychological vulnerability, accounting for 33% of the variance collectively. Authenticity is an important predictor of psychological vulnerability.

  13. General vulnerability to stuttering: The experience of stuttering and conditions bringing about invulnerability.

    PubMed

    Briley, P M; Kalinowski, J S

    2016-08-01

    General vulnerability to stuttering is the broad awareness of stuttering and the ever-present, experiential sense of a person who stutters (PWS). It is defined by stuttering in all its forms and the awareness of its presence, both in moments of stuttering and moments of perceivably fluent speech. Under the heading of general vulnerability to stuttering is specific vulnerability to stuttering, which includes the actual events of stuttering (i.e., overt symptoms, covert symptoms, subperceptual stuttering, and anticipation of stuttering). The differentiation between the two is that specific vulnerability requires a specific moment of stuttering where general vulnerability does not. PMID:27372857

  14. Putting vulnerability to climate change on the map: a review of approaches, benefits, and risks

    SciTech Connect

    Preston, Benjamin L

    2011-01-01

    There is growing demand among stakeholders across public and private institutions for spatially-explicit information regarding vulnerability to climate change at the local scale. However, the challenges associated with mapping the geography of climate change vulnerability are non-trivial, both conceptually and technically, suggesting the need for more critical evaluation of this practice. Here, we review climate change vulnerability mapping in the context of four key questions that are fundamental to assessment design. First, what are the goals of the assessment? A review of published assessments yields a range of objective statements that emphasize problem orientation or decision-making about adaptation actions. Second, how is the assessment of vulnerability framed? Assessments vary with respect to what values are assessed (vulnerability of what) and the underlying determinants of vulnerability that are considered (vulnerability to what). The selected frame ultimately influences perceptions of the primary driving forces of vulnerability as well as preferences regarding management alternatives. Third, what are the technical methods by which an assessment is conducted? The integration of vulnerability determinants into a common map remains an emergent and subjective practice associated with a number of methodological challenges. Fourth, who participates in the assessment and how will it be used to facilitate change? Assessments are often conducted under the auspices of benefiting stakeholders, yet many lack direct engagement with stakeholders. Each of these questions is reviewed in turn by drawing on an illustrative set of 45 vulnerability mapping studies appearing in the literature. A number of pathways for placing vulnerability

  15. Federal interpretation and enforcement of protections for vulnerable participants in human research.

    PubMed

    Iltis, Ana S; Wall, Anji; Lesandrini, Jason; Rangel, Erica K; Chibnall, John T

    2009-03-01

    REGULATIONS AND POLICIES GOVERNING research, codes of ethics, and the research ethics literature reflect the need to provide special protections to vulnerable research participants. Nevertheless, there is disagreement about who is vulnerable and why, what protections are appropriate, and when to disallow research involving vulnerable persons. The Common Rule (CR) governs much of the human research conducted in the United States and the Office for Human Research Protections (OHRP) oversees much of this research. The CR requires special protections for pregnant women, fetuses, neonates, prisoners, and children. Although it also requires that researchers employ "additional safeguards" to protect other vulnerable persons, it does not define vulnerability or identify appropriate "safeguards." Very little is known about how OHRP interprets the "additional safeguards" requirement. We examined all letters of determination posted on the OHRP website between July 1, 2000 and December 31, 2006 (n = 636) to study the extent to which OHRP addressed, in its audits and investigations, the requirement to protect vulnerable persons. The letters did not reveal guidance on understanding vulnerability, determining whether a study includes vulnerable persons or protecting vulnerable participants. If institutions and investigators are to fulfill the ethical obligation to provide appropriate safeguards when conducting research on vulnerable persons, they must develop and implement mechanisms to identify and address vulnerability. PMID:19374484

  16. The influence of selection for vulnerability to angling on foraging ecology in largemouth bass Micropterus salmoides.

    PubMed

    Nannini, M A; Wahl, D H; Philipp, D P; Cooke, S J

    2011-10-01

    Several traits related to foraging behaviour were assessed in young-of-the-year produced from largemouth bass Micropterus salmoides that had been exposed to four generations of artificial selection for vulnerability to angling. As recreational angling may target foraging ability, this study tested the hypothesis that selection for vulnerability to angling would affect behaviours associated with foraging ecology and prey capture success. Fish selected for low vulnerability to angling captured more prey and attempted more captures than high vulnerability fish. The higher capture attempts, however, ultimately resulted in a lower capture success for low vulnerability fish. Low vulnerability fish also had higher prey rejection rates, marginally shorter reactive distance and were more efficient at converting prey consumed into growth than their high vulnerability counterparts. Selection due to recreational fishing has the potential to affect many aspects of the foraging ecology of the targeted population and highlights the importance of understanding evolutionary effects and how these need to be considered when managing populations.

  17. Assessment model of ecoenvironmental vulnerability based on improved entropy weight method.

    PubMed

    Zhang, Xianqi; Wang, Chenbo; Li, Enkuan; Xu, Cundong

    2014-01-01

    Assessment of ecoenvironmental vulnerability plays an important role in the guidance of regional planning, the construction and protection of ecological environment, which requires comprehensive consideration on regional resources, environment, ecology, society and other factors. Based on the driving mechanism and evolution characteristics of ecoenvironmental vulnerability in cold and arid regions of China, a novel evaluation index system on ecoenvironmental vulnerability is proposed in this paper. For the disadvantages of conventional entropy weight method, an improved entropy weight assessment model on ecoenvironmental vulnerability is developed and applied to evaluate the ecoenvironmental vulnerability in western Jilin Province of China. The assessing results indicate that the model is suitable for ecoenvironmental vulnerability assessment, and it shows more reasonable evaluation criterion, more distinct insights and satisfactory results combined with the practical conditions. The model can provide a new method for regional ecoenvironmental vulnerability evaluation. PMID:25133260

  18. Assessment Model of Ecoenvironmental Vulnerability Based on Improved Entropy Weight Method

    PubMed Central

    Zhang, Xianqi; Wang, Chenbo; Li, Enkuan; Xu, Cundong

    2014-01-01

    Assessment of ecoenvironmental vulnerability plays an important role in the guidance of regional planning, the construction and protection of ecological environment, which requires comprehensive consideration on regional resources, environment, ecology, society and other factors. Based on the driving mechanism and evolution characteristics of ecoenvironmental vulnerability in cold and arid regions of China, a novel evaluation index system on ecoenvironmental vulnerability is proposed in this paper. For the disadvantages of conventional entropy weight method, an improved entropy weight assessment model on ecoenvironmental vulnerability is developed and applied to evaluate the ecoenvironmental vulnerability in western Jilin Province of China. The assessing results indicate that the model is suitable for ecoenvironmental vulnerability assessment, and it shows more reasonable evaluation criterion, more distinct insights and satisfactory results combined with the practical conditions. The model can provide a new method for regional ecoenvironmental vulnerability evaluation. PMID:25133260

  19. [Vulnerability to depression in children and adolescents: update and perspectives].

    PubMed

    Purper-Ouakil, D; Michel, G; Mouren-Siméoni, M-C

    2002-01-01

    Depression in children and adolescents is associated with poor psychosocial functioning, high psychiatric comorbidity, risk of recurrent episodes or onset of bipolar disorder. These findings emphasize the importance of early identification of children and adolescents having elevated risk for future depression and further development, evaluation and greater availability of prevention strategies. Our review aims an update about depressive vulnerability in children and adolescents in the perspective of better identification of at-risk populations and targeting of prevention programs. Psychopathology, in particular anxiety and disruptive disorders are well identified risk-factors for later depression. Subclinical depressive symptomatology, also termed "demoralization", also identifies high-risk populations, likely to become incident cases of depression. It is still unclear whether this condition is prodromal depression, a specific clinical entity or the expression of biological and/or cognitive vulnerability. Familial risk for depressive disorders involves both genetic and psychosocial factors. Marital discord, poor communication and dysfunctional parenting practices are often present in families with affective disorders and can be implicated in increased depressive vulnerability in the offspring. Research on individual vulnerability in children and adolescents has focused on temperamental and cognitive characteristics. Temperament traits describe individual differences in reactivity and behavior. High emotionality, defined as the tendency to become upset easily and intensely has been associated with an increased risk for subsequent major depression. However, as the majority of high scorers will not become depressive cases, emotionality should not be the only criterion for selection of at-risk populations. Cognitive style including poor self esteem, low social competence and negative attributions are also associated with increased likelihood of depressive symptoms, but

  20. Groundwater Resource Vulnerability for Small Island Developing States

    NASA Astrophysics Data System (ADS)

    Allen, D. M.; Holding, S.

    2015-12-01

    Groundwater constitutes the majority of naturally-occurring freshwater supply on many small islands. However, in addition to potential impacts of climate change and population growth that may compromise water supply and demand on small islands, Small Island Developing States (SIDS) often lack hydrogeological data for characterizing aquifers and have limited institutional means for managing the groundwater resource. As part of UNESCO-IHP's Transboundary Water Assessment Programme (TWAP), an assessment of groundwater systems on 43 SIDS was undertaken. This SIDS assessment represents the first baseline global assessment of the status of groundwater in SIDS, covering all major island states of the world with an area less than 50,000 km2. As many SIDS comprise multiple islands with different hydrogeologic settings, a representative island from each SIDS was chosen to represent the majority of the population. Data were compiled from publications, accessible datasets and a questionnaire distributed to collect local expertise. A total of 74 variables were defined for each SIDS, according to the level of confidence in the data (i.e. high confidence when based on specific studies and low confidence when inferred). These variables represent the current hydrogeologic conditions for each island and were used to define indicators that characterise vulnerability. Recharge was modelled for both current and future projected climate change for the 2060s using regionally downscaled data for each SIDS to identify islands likely to experience significant stress due to changes in recharge. The assessment results were categorized based on island type to identify trends in hydrogeologic conditions and vulnerability for similar island types. Despite limitations and uncertainty in the data used in the assessment, the results provide a broad assessment of current and future groundwater resource vulnerability for SIDS throughout the world.