Sample records for single point vulnerability

  1. Redefining the endophenotype concept to accommodate transdiagnostic vulnerabilities and etiological complexity.

    PubMed

    Beauchaine, Theodore P; Constantino, John N

    2017-09-11

    In psychopathology research, endophenotypes are a subset of biomarkers that indicate genetic vulnerability independent of clinical state. To date, an explicit expectation is that endophenotypes be specific to single disorders. We evaluate this expectation considering recent advances in psychiatric genetics, recognition that transdiagnostic vulnerability traits are often more useful than clinical diagnoses in psychiatric genetics, and appreciation for etiological complexity across genetic, neural, hormonal and environmental levels of analysis. We suggest that the disorder-specificity requirement of endophenotypes be relaxed, that neural functions are preferable to behaviors as starting points in searches for endophenotypes, and that future research should focus on interactive effects of multiple endophenotypes on complex psychiatric disorders, some of which are 'phenocopies' with distinct etiologies.

  2. Structural Analysis of Single-Point Mutations Given an RNA Sequence: A Case Study with RNAMute

    NASA Astrophysics Data System (ADS)

    Churkin, Alexander; Barash, Danny

    2006-12-01

    We introduce here for the first time the RNAMute package, a pattern-recognition-based utility to perform mutational analysis and detect vulnerable spots within an RNA sequence that affect structure. Mutations in these spots may lead to a structural change that directly relates to a change in functionality. Previously, the concept was tried on RNA genetic control elements called "riboswitches" and other known RNA switches, without an organized utility that analyzes all single-point mutations and can be further expanded. The RNAMute package allows a comprehensive categorization, given an RNA sequence that has functional relevance, by exploring the patterns of all single-point mutants. For illustration, we apply the RNAMute package on an RNA transcript for which individual point mutations were shown experimentally to inactivate spectinomycin resistance in Escherichia coli. Functional analysis of mutations on this case study was performed experimentally by creating a library of point mutations using PCR and screening to locate those mutations. With the availability of RNAMute, preanalysis can be performed computationally before conducting an experiment.

  3. A national assessment of underground natural gas storage: identifying wells with designs likely vulnerable to a single-point-of-failure

    NASA Astrophysics Data System (ADS)

    Michanowicz, Drew R.; Buonocore, Jonathan J.; Rowland, Sebastian T.; Konschnik, Katherine E.; Goho, Shaun A.; Bernstein, Aaron S.

    2017-05-01

    The leak of processed natural gas (PNG) from October 2015 to February 2016 from the Aliso Canyon storage facility, near Los Angeles, California, was the largest single accidental release of greenhouse gases in US history. The Interagency Task Force on Natural Gas Storage Safety and California regulators recently recommended operators phase out single-point-of-failure (SPF) well designs. Here, we develop a national dataset of UGS well activity in the continental US to assess regulatory data availability and uncertainty, and to assess the prevalence of certain well design deficiencies including single-point-of-failure designs. We identified 14 138 active UGS wells associated with 317 active UGS facilities in 29 states using regulatory and company data. State-level wellbore datasets contained numerous reporting inconsistencies that limited data concatenation. We identified 2715 active UGS wells across 160 facilities that, like the failed well at Aliso Canyon, predated the storage facility, and therefore were not originally designed for gas storage. The majority (88%) of these repurposed wells are located in OH, MI, PA, NY, and WV. Repurposed wells have a median age of 74 years, and the 2694 repurposed wells constructed prior to 1979 are particularly likely to exhibit design-related deficiencies. An estimated 210 active repurposed wells were constructed before 1917—before cement zonal isolation methods were utilized. These wells are located in OH, PA, NY, and WV and represent the highest priority related to potential design deficiencies that could lead to containment loss. This national baseline assessment identifies regulatory data uncertainties, highlights a potentially widespread vulnerability of the natural gas supply chain, and can aid in prioritization and oversight for high-risk wells and facilities.

  4. The relationship between parental depressive symptoms, family type, and adolescent functioning.

    PubMed

    Sieh, Dominik Sebastian; Sieh, Dominik Sebstian; Visser-Meily, Johanna Maria Augusta; Meijer, Anne Marie

    2013-01-01

    It is evident that parental depressive symptoms negatively influence adolescent behavior and various psychosocial outcomes. Certain family types like families with a chronically ill parent and single parent families are more vulnerable to parental depressive symptoms. However, the relationship between these symptoms, family type, and adolescent functioning remains largely unclear. This study examined relations between self-report of parental depressive symptoms and adolescent functioning in 86 two-parent families including a parent with a chronic medical condition, 94 families with healthy single parents, and 69 families with 2 healthy parents (comparison group). Parents completed the Beck Depression Inventory. Adolescents filled in the Youth Self-Report measuring problem behavior, and other instruments measuring psychosocial outcomes (stress, grade point average, school problems, and self-esteem). Multilevel analyses were used to examine the effects of family type, parental depressive symptoms, adolescents' gender and age, and interaction effects on adolescent functioning. The results indicated that adolescents with chronically ill and single parents had a lower grade point average (p<.01) than the comparison group. Adolescents of single parents reported more internalizing problems (p<.01) and externalizing problems (p<.05) than children from the other family types. Parental depressive symptoms were strongly related to child report of stress (p<.001). Adolescents of depressed chronically ill parents were particularly vulnerable to internalizing problems (interaction effect, p<.05). Older children and girls, and especially older girls, displayed more internalizing problems and stress. It can be concluded that growing up with a chronically ill parent in a family with 2 parents may have less impact on adolescent problem behavior than growing up in a single parent family. Health practitioners are encouraged to be attentive to the unique and combined influence of family type and parental depressive symptoms on adolescent functioning. Older and female adolescents deserve particular attention.

  5. "Is the doctor God to punish me?!" An intersectional examination of disrespectful and abusive care during childbirth against single mothers in Tunisia.

    PubMed

    Amroussia, Nada; Hernandez, Alison; Vives-Cases, Carmen; Goicolea, Isabel

    2017-03-04

    Disrespectful and abusive treatment during childbirth is a violation of women's right to dignified, respectful healthcare throughout pregnancy and childbirth. Although reports point out that marginalized groups in society such as single mothers are particularly vulnerable to abusive and disrespectful care, there is a lack of in-depth research exploring single mothers' encounters at the maternal healthcare facilities, especially in Tunisia. In Tunisia, single mothers are particularly vulnerable due to their social stigmatization and socio-economic marginalization. This study examines the self-perceptions and childbirth experiences of single mothers at the public healthcare facilities in Tunisia. This study follows a qualitative design. Eleven single mothers were interviewed in regard to their experiences with maternal healthcare services and their perceptions of the attitudes of the health workers towards them. The interviews also addressed the barriers faced by the participants in accessing adequate maternal healthcare services, and their self-perceptions as single mothers. The data were analyzed using an inductive thematic approach guided by the feminist intersectional approach. Emergent codes were grouped into three final themes. Three themes emerged during the data analysis: 1) Experiencing disrespect and abuse, 2) Perceptions of regret and shame attributed to being a single mother, and 3) The triad of vulnerability: stigma, social challenges, and health system challenges. The study highlights that the childbirth experiences of single mothers are shaped by intersectional factors that go beyond the health system. Gender plays a major role in constructing these experiences while intersecting with other social structures. The participants had experienced disrespectful and discriminatory practices and even violence when they sought maternal healthcare services at the public healthcare facilities in Tunisia. Those experiences reflect not only the poor quality of maternal health services but also how health system practices translate the stigma culturally associated with single motherhood in this setting. Social stigma did not only affect how single mothers were treated during the childbirth, but also how they perceived themselves and how they perceived their care. Ensuring women's right to dignified, respectful healthcare during childbirth requires tackling the underlying causes of social inequalities leading to women's marginalization and discrimination.

  6. Family vulnerability index to disability and dependence (FVI-DD), by social and health conditions.

    PubMed

    Amendola, Fernanda; Alvarenga, Márcia Regina Martins; Latorre, Maria do Rosário Dias de Oliveira; Oliveira, Maria Amélia de Campos

    2017-06-01

    The Family Vulnerability Index to Disability and Dependence (FVI-DD) aims to summarize the dimensions of vulnerability to disability and dependence using family data monitored by Family Health Strategy (ESF) teams. This study aims to analyze the FVI-DD according to the social and health vulnerability, to validate and extract a cutoff point for each dimension. The FVI-DD was built with a sample of 248 families living in a region of São Paulo. The dimension related to health conditions was validated with good internal consistency, with respect to the Katz Index and the Lawton Scale, whereas the dimension related to social conditions was only validated in relation to Lawton Scale. Thus, a vulnerable family was defined as one with 15 or more points in the Total FVI-DD, and a vulnerable family in health conditions that with a score of 6 or more points in that dimension. Therefore, it is possible to classify families as not vulnerable, vulnerable in the social aspects, vulnerable in the health aspects and the more vulnerable family (social and health) using social indicators of empowerment and wear and health indicators related not only to the biological sphere, but also in the access to health services, health self-assessment and existing vulnerable groups.

  7. Vulnerability and risk of deltaic social-ecological systems exposed to multiple hazards.

    PubMed

    Hagenlocher, Michael; Renaud, Fabrice G; Haas, Susanne; Sebesvari, Zita

    2018-08-01

    Coastal river deltas are hotspots of global change impacts. Sustainable delta futures are increasingly threatened due to rising hazard exposure combined with high vulnerabilities of deltaic social-ecological systems. While the need for integrated multi-hazard approaches has been clearly articulated, studies on vulnerability and risk in deltas either focus on local case studies or single hazards and do not apply a social-ecological systems perspective. As a result, vulnerabilities and risks in areas with strong social and ecological coupling, such as coastal deltas, are not fully understood and the identification of risk reduction and adaptation strategies are often based on incomplete assumptions. To overcome these limitations, we propose an innovative modular indicator library-based approach for the assessment of multi-hazard risk of social-ecological systems across and within coastal deltas globally, and apply it to the Amazon, Ganges-Brahmaputra-Meghna (GBM), and Mekong deltas. Results show that multi-hazard risk is highest in the GBM delta and lowest in the Amazon delta. The analysis reveals major differences between social and environmental vulnerability across the three deltas, notably in the Mekong and the GBM deltas where environmental vulnerability is significantly higher than social vulnerability. Hotspots and drivers of risk vary spatially, thus calling for spatially targeted risk reduction and adaptation strategies within the deltas. Ecosystems have been identified as both an important element at risk as well as an entry point for risk reduction and adaptation strategies. Copyright © 2018. Published by Elsevier B.V.

  8. Vulnerability of Forests in India: A National Scale Assessment.

    PubMed

    Sharma, Jagmohan; Upgupta, Sujata; Jayaraman, Mathangi; Chaturvedi, Rajiv Kumar; Bala, Govindswamy; Ravindranath, N H

    2017-09-01

    Forests are subjected to stress from climatic and non-climatic sources. In this study, we have reported the results of inherent, as well as climate change driven vulnerability assessments for Indian forests. To assess inherent vulnerability of forests under current climate, we have used four indicators, namely biological richness, disturbance index, canopy cover, and slope. The assessment is presented as spatial profile of inherent vulnerability in low, medium, high and very high vulnerability classes. Fourty percent forest grid points in India show high or very high inherent vulnerability. Plantation forests show higher inherent vulnerability than natural forests. We assess the climate change driven vulnerability by combining the results of inherent vulnerability assessment with the climate change impact projections simulated by the Integrated Biosphere Simulator dynamic global vegetation model. While 46% forest grid points show high, very high, or extremely high vulnerability under future climate in the short term (2030s) under both representative concentration pathways 4.5 and 8.5, such grid points are 49 and 54%, respectively, in the long term (2080s). Generally, forests in the higher rainfall zones show lower vulnerability as compared to drier forests under future climate. Minimizing anthropogenic disturbance and conserving biodiversity can potentially reduce forest vulnerability under climate change. For disturbed forests and plantations, adaptive management aimed at forest restoration is necessary to build long-term resilience.

  9. Vulnerability of Forests in India: A National Scale Assessment

    NASA Astrophysics Data System (ADS)

    Sharma, Jagmohan; Upgupta, Sujata; Jayaraman, Mathangi; Chaturvedi, Rajiv Kumar; Bala, Govindswamy; Ravindranath, N. H.

    2017-09-01

    Forests are subjected to stress from climatic and non-climatic sources. In this study, we have reported the results of inherent, as well as climate change driven vulnerability assessments for Indian forests. To assess inherent vulnerability of forests under current climate, we have used four indicators, namely biological richness, disturbance index, canopy cover, and slope. The assessment is presented as spatial profile of inherent vulnerability in low, medium, high and very high vulnerability classes. Fourty percent forest grid points in India show high or very high inherent vulnerability. Plantation forests show higher inherent vulnerability than natural forests. We assess the climate change driven vulnerability by combining the results of inherent vulnerability assessment with the climate change impact projections simulated by the Integrated Biosphere Simulator dynamic global vegetation model. While 46% forest grid points show high, very high, or extremely high vulnerability under future climate in the short term (2030s) under both representative concentration pathways 4.5 and 8.5, such grid points are 49 and 54%, respectively, in the long term (2080s). Generally, forests in the higher rainfall zones show lower vulnerability as compared to drier forests under future climate. Minimizing anthropogenic disturbance and conserving biodiversity can potentially reduce forest vulnerability under climate change. For disturbed forests and plantations, adaptive management aimed at forest restoration is necessary to build long-term resilience.

  10. The Relationship between Parental Depressive Symptoms, Family Type, and Adolescent Functioning

    PubMed Central

    Sieh, Dominik Sebstian; Visser-Meily, Johanna Maria Augusta; Meijer, Anne Marie

    2013-01-01

    It is evident that parental depressive symptoms negatively influence adolescent behavior and various psychosocial outcomes. Certain family types like families with a chronically ill parent and single parent families are more vulnerable to parental depressive symptoms. However, the relationship between these symptoms, family type, and adolescent functioning remains largely unclear. This study examined relations between self-report of parental depressive symptoms and adolescent functioning in 86 two-parent families including a parent with a chronic medical condition, 94 families with healthy single parents, and 69 families with 2 healthy parents (comparison group). Parents completed the Beck Depression Inventory. Adolescents filled in the Youth Self-Report measuring problem behavior, and other instruments measuring psychosocial outcomes (stress, grade point average, school problems, and self-esteem). Multilevel analyses were used to examine the effects of family type, parental depressive symptoms, adolescents' gender and age, and interaction effects on adolescent functioning. The results indicated that adolescents with chronically ill and single parents had a lower grade point average (p<.01) than the comparison group. Adolescents of single parents reported more internalizing problems (p<.01) and externalizing problems (p<.05) than children from the other family types. Parental depressive symptoms were strongly related to child report of stress (p<.001). Adolescents of depressed chronically ill parents were particularly vulnerable to internalizing problems (interaction effect, p<.05). Older children and girls, and especially older girls, displayed more internalizing problems and stress. It can be concluded that growing up with a chronically ill parent in a family with 2 parents may have less impact on adolescent problem behavior than growing up in a single parent family. Health practitioners are encouraged to be attentive to the unique and combined influence of family type and parental depressive symptoms on adolescent functioning. Older and female adolescents deserve particular attention. PMID:24260457

  11. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Toro, Javier, E-mail: jjtoroca@unal.edu.co; Duarte, Oscar, E-mail: ogduartev@unal.edu.co; Requena, Ignacio, E-mail: requena@decsai.ugr.es

    The concept of vulnerability has been used to describe the susceptibility of physical, biotic, and social systems to harm or hazard. In this sense, it is a tool that reduces the uncertainties of Environmental Impact Assessment (EIA) since it does not depend exclusively on the value assessments of the evaluator, but rather is based on the environmental state indicators of the site where the projects or activities are being carried out. The concept of vulnerability thus reduces the possibility that evaluators will subjectively interpret results, and be influenced by outside interests and pressures during projects. However, up until now, EIAmore » has been hindered by a lack of effective methods. This research study analyzes the concept of vulnerability, defines Vulnerability Importance and proposes its inclusion in qualitative EIA methodology. The method used to quantify Vulnerability Importance is based on a set of environmental factors and indicators that provide a comprehensive overview of the environmental state. The results obtained in Colombia highlight the usefulness and objectivity of this method since there is a direct relation between this value and the environmental state of the departments analyzed. - Research Highlights: Black-Right-Pointing-Pointer The concept of vulnerability could be considered defining Vulnerability Importance included in qualitative EIA methodology. Black-Right-Pointing-Pointer The use of the concept of environmental vulnerability could reduce the subjectivity of qualitative methods of EIA. Black-Right-Pointing-Pointer A method to quantify the Vulnerability Importance proposed provides a comprehensive overview of the environmental state. Black-Right-Pointing-Pointer Results in Colombia highlight the usefulness and objectivity of this method.« less

  12. [A systemic risk analysis of hospital management processes by medical employees--an effective basis for improving patient safety].

    PubMed

    Sobottka, Stephan B; Eberlein-Gonska, Maria; Schackert, Gabriele; Töpfer, Armin

    2009-01-01

    Due to the knowledge gap that exists between patients and health care staff the quality of medical treatment usually cannot be assessed securely by patients. For an optimization of safety in treatment-related processes of medical care, the medical staff needs to be actively involved in preventive and proactive quality management. Using voluntary, confidential and non-punitive systematic employee surveys, vulnerable topics and areas in patient care revealing preventable risks can be identified at an early stage. Preventive measures to continuously optimize treatment quality can be defined by creating a risk portfolio and a priority list of vulnerable topics. Whereas critical incident reporting systems are suitable for continuous risk assessment by detecting safety-relevant single events, employee surveys permit to conduct a systematic risk analysis of all treatment-related processes of patient care at any given point in time.

  13. A pragmatic analysis of vulnerability in clinical research.

    PubMed

    Wendler, David

    2017-09-01

    Identifying which subjects are vulnerable, and implementing safeguards to protect them, is widely regarded as essential to clinical research. Commentators have endorsed a number of responses to these challenges and have thereby made significant progress in understanding vulnerability in clinical research. At the same time, this literature points to a central contradiction which calls into question its potential to protect vulnerable subjects in practice. Specifically, analysis suggests that all human subjects are vulnerable and vulnerability in clinical research is comparative and context dependent, in the sense that individuals are vulnerable relative to others and in some contexts only. Yet, if everyone is vulnerable, there seems to be no point in citing the vulnerability of some individuals. Moreover, the conclusion that everyone is vulnerable seems inconsistent with the claims that vulnerability is comparative and context dependent, raising concern over whether it will be possible to develop a comprehensive account of vulnerability that is internally consistent. The solution to this dilemma lies in recognition of the fact that the practical significance of claims regarding vulnerability depends on the context in which they are used. The claims that appear to lead to the central contradiction are in fact accurate conclusions that follow from different uses of the term 'vulnerability'. The present manuscript describes this 'pragmatic' approach to vulnerability in clinical research and considers its implications for ensuring that subjects receive appropriate protection. Published 2017. This article is a U.S. Government work and is in the public domain in the USA.

  14. Longitudinal Outcomes of Home Care in Korea to Manage Pressure Ulcers.

    PubMed

    Lee, Eunhee

    2017-06-01

    Home care provides preventive, support, and treatment services to economically vulnerable community populations. In this study, we examined the outcomes of a home care program for pressure ulcers (PrUs) in an economically vulnerable group. The 184 participants were admitted with PrUs and received services from a home care agency in South Korea during a study window of 5 years. The changes in PrU staging over time were analyzed in relation to the agency's home care data and the participants' health data. At enrollment, approximately 60% had a single ulcer; 40% had two or more. Most patients' ulcers were at stages 3 or 4, and most patients were bedridden. The maximum odds of reduced ulcer size from one measurement point to the next was estimated at 14.3% for ulcers in stages 1 and 2, 33.4% of those in stage 3, and 25.5% of those in stage 4; more than 10% of ulcers healed completely within a year. PrUs were a serious problem in this community-dwelling economically vulnerable group, and home care played a critical role in providing health care to this population. © 2017 Wiley Periodicals, Inc. © 2017 Wiley Periodicals, Inc.

  15. [Mapping environmental vulnerability from ETM + data in the Yellow River Mouth Area].

    PubMed

    Wang, Rui-Yan; Yu, Zhen-Wen; Xia, Yan-Ling; Wang, Xiang-Feng; Zhao, Geng-Xing; Jiang, Shu-Qian

    2013-10-01

    The environmental vulnerability retrieval is important to support continuing data. The spatial distribution of regional environmental vulnerability was got through remote sensing retrieval. In view of soil and vegetation, the environmental vulnerability evaluation index system was built, and the environmental vulnerability of sampling points was calculated by the AHP-fuzzy method, then the correlation between the sampling points environmental vulnerability and ETM + spectral reflectance ratio including some kinds of conversion data was analyzed to determine the sensitive spectral parameters. Based on that, models of correlation analysis, traditional regression, BP neural network and support vector regression were taken to explain the quantitative relationship between the spectral reflectance and the environmental vulnerability. With this model, the environmental vulnerability distribution was retrieved in the Yellow River Mouth Area. The results showed that the correlation between the environmental vulnerability and the spring NDVI, the September NDVI and the spring brightness was better than others, so they were selected as the sensitive spectral parameters. The model precision result showed that in addition to the support vector model, the other model reached the significant level. While all the multi-variable regression was better than all one-variable regression, and the model accuracy of BP neural network was the best. This study will serve as a reliable theoretical reference for the large spatial scale environmental vulnerability estimation based on remote sensing data.

  16. Topological Vulnerability Analysis

    NASA Astrophysics Data System (ADS)

    Jajodia, Sushil; Noel, Steven

    Traditionally, network administrators rely on labor-intensive processes for tracking network configurations and vulnerabilities. This requires a great deal of expertise, and is error prone because of the complexity of networks and associated security data. The interdependencies of network vulnerabilities make traditional point-wise vulnerability analysis inadequate. We describe a Topological Vulnerability Analysis (TVA) approach that analyzes vulnerability dependencies and shows all possible attack paths into a network. From models of the network vulnerabilities and potential attacker exploits, we compute attack graphs that convey the impact of individual and combined vulnerabilities on overall security. TVA finds potential paths of vulnerability through a network, showing exactly how attackers may penetrate a network. From this, we identify key vulnerabilities and provide strategies for protection of critical network assets.

  17. Root hydraulic vulnerability regulation of whole-plant conductance along hillslope gradients within subalpine and montane forests

    NASA Astrophysics Data System (ADS)

    Beverly, D.; Speckman, H. N.; Ewers, B. E.

    2017-12-01

    Ecosystem-scale models often rely on root vulnerability or whole-plant conductance for simulating seasonal evapotranspiration declines via constraints of water uptake and vegetation mortality. Further, many of these ecosystem models rely on single, unvarying, hydraulic parameter estimates for modeling large areas. Ring-porous species have shown seasonal variability in root vulnerability (percent loss of conductivity; PLC) and whole-plant conductance (Kw) but simulations of coniferous forest typically rely on point measurements. This assumption for coniferous forest is not likely true because of seasonal variability caused by phenology and environmental stresses and the potential for cavitation fatigue is not considered. Moreover, many of these dynamics have only been considered for stems even though roots are often the most vulnerable segments of the pathway for conifers. We hypothesized that seasonally dynamic whole-plant conductance along hillslope gradients in coniferous forests are regulated by cavitation fatigue within the roots resulting in seasonal increases in vulnerability. To test the hypothesis, a subalpine mixed forest (3000 m.a.s.l) and montane forest (2550 m.a.s.l.) were monitored between 2015-2017 to quantify PLC and Kw along the hillslope gradients of 300 m and 50 m, respectively. Forest plots were instrumented with 35 Granier-type sapflow sensors. Seasonal sampling campaigns occurred to quantify PLC through centrifuge techniques and Kw through Darcy's law approximations with pre-dawn and diurnal leaf water potentials. Downslope roots exhibit a 33% decrease in maximal conductivity corresponding to the approximately 50% decrease in whole-plant conductance suggesting seasonal soil dry-down limitations within the downslope stands. Upslope stands had no to little change in root vulnerability or decrease in whole-plant conductance as soil water limitations occur immediately following snowmelt, thus limiting hydraulic conductance throughout the growing season. Integrating temporal and topographical variation for dynamic root vulnerability and whole-plant conductance estimates into ecosystem-scale models can decrease the uncertainty of evapotranspiration estimates in seasonally varying forests.

  18. Associations between social vulnerabilities and dietary patterns in European children: the Identification and prevention of Dietary- and lifestyle-induced health EFfects In Children and infantS (IDEFICS) study.

    PubMed

    Iguacel, Isabel; Fernández-Alvira, Juan M; Bammann, Karin; De Clercq, Bart; Eiben, Gabriele; Gwozdz, Wencke; Molnar, Dénes; Pala, Valeria; Papoutsou, Stalo; Russo, Paola; Veidebaum, Toomas; Wolters, Maike; Börnhorst, Claudia; Moreno, Luis A

    2016-10-01

    Socio-economic inequalities in childhood can determine dietary patterns, and therefore future health. This study aimed to explore associations between social vulnerabilities and dietary patterns assessed at two time points, and to investigate the association between accumulation of vulnerabilities and dietary patterns. A total of 9301 children aged 2-9 years participated at baseline and 2-year follow-up examinations of the Identification and prevention of Dietary- and lifestyle-induced health EFfects In Children and infantS study. In all, three dietary patterns were identified at baseline and follow-up by applying the K-means clustering algorithm based on a higher frequency of consumption of snacks and fast food (processed), sweet foods and drinks (sweet), and fruits and vegetables (healthy). Vulnerable groups were defined at baseline as follows: children whose parents lacked a social network, children from single-parent families, children of migrant origin and children with unemployed parents. Multinomial mixed models were used to assess the associations between social vulnerabilities and children's dietary patterns at baseline and follow-up. Children whose parents lacked a social network (OR 1·31; 99 % CI 1·01, 1·70) and migrants (OR 1·45; 99 % CI 1·15, 1·83) were more likely to be in the processed cluster at baseline and follow-up. Children whose parents were homemakers (OR 0·74; 99 % CI 0·60, 0·92) were less likely to be in the processed cluster at baseline. A higher number of vulnerabilities was associated with a higher probability of children being in the processed cluster (OR 1·78; 99 % CI 1·21, 2·62). Therefore, special attention should be paid to children of vulnerable groups as they present unhealthier dietary patterns.

  19. Vulnerability of dynamic systems

    NASA Technical Reports Server (NTRS)

    Siljak, D. D.

    1976-01-01

    Directed graphs are associated with dynamic systems in order to determine in any given system if each state can be reached by at least one input (input reachability), or can each state reach at least one output (output reachability). Then, the structural perturbations of a dynamic system are identified as lines or points removals from the corresponding digraph, and a system is considered vulnerable at those lines or points of the digraph whose removal destroys its input or output reachability. A suitable framework is formulated for resolving the problems of reachability and vulnerability which applies to both linear and nonlinear systems alike.

  20. Multi-INT fusion to support port and harbor security and general maritime awareness

    NASA Astrophysics Data System (ADS)

    Von Kahle, Louis; Alexander, Robert

    2006-05-01

    The international community's focus on deterring terrorism has identified many vulnerabilities to a country's borders. These vulnerabilities include not only airports and rail lines but also the ports, harbors and miles of coastline which many countries must protect. In seeking to address this challenge, many technologies, processes and procedures have been identified that utilize single point or single source INT's (i.e., sources of intelligence - signals: SIGINT, imagery: IMINT, and open-source: INTERNET). These single source data sets include the information gleaned from shipping lines, port arrival and departure information and information from shipboard based electronic systems like the Automatic Identification System (AIS). Typically these are evaluated and incorporated into products or decisions in a singular manner and not with any reference or relationship to each other. In this work, an identification and analysis of these data sets will be performed in order to determine: •Any commonality between these data sets, •The ability to fuse information between these data sets, •The ability to determine relationships between these data sets, and •The ability to present any fused information or relationships in a timely manner In summary, the work served as a means for determining the data sets that were of the highest value and for determining the fusion method for producing a product of value. More work can be done to define the data sets that have the most commonality and thus will help to produce a fused product in the most timely and efficient manner.

  1. Lightning and surge protection of large ground facilities

    NASA Astrophysics Data System (ADS)

    Stringfellow, Michael F.

    1988-04-01

    The vulnerability of large ground facilities to direct lightning strikes and to lightning-induced overvoltages on the power distribution, telephone and data communication lines are discussed. Advanced electrogeometric modeling is used for the calculation of direct strikes to overhead power lines, buildings, vehicles and objects within the facility. Possible modes of damage, injury and loss are discussed. Some appropriate protection methods for overhead power lines, structures, vehicles and aircraft are suggested. Methods to mitigate the effects of transients on overhead and underground power systems as well as within buildings and other structures are recommended. The specification and location of low-voltage surge suppressors for the protection of vulnerable hardware such as computers, telecommunication equipment and radar installations are considered. The advantages and disadvantages of commonly used grounding techniques, such as single point, multiple and isolated grounds are compared. An example is given of the expected distribution of lightning flashes to a large airport, its buildings, structures and facilities, as well as to vehicles on the ground.

  2. In the Ethos of the Safety Net: An Expanded Role for Clinical Ethics Mediation.

    PubMed

    McGreevy, Jolion

    2015-01-01

    Clinical ethics mediation is invaluable for resolving intractable disputes in the hospital. But it is also a critical day-to-day skill for clinicians, especially those who serve a disproportionate number of vulnerable patients. While mediation is typically reserved for intractable cases, there are two important opportunities to expand its use. First is preventative mediation, in which clinicians incorporate clinical ethics mediation into their daily routine in order to address value-laden conflicts before they reach the point at which outside consultation becomes necessary. Second is guided mediation, in which clinical teams resolve conflicts with patients or surrogates with guidance from an ethics consultant, who operates at some distance from the conflict and, rather than recommending a single action, counsels clinicians on the process they can use to resolve the conflict on their own. These approaches build the capacity of all clinicians to use clinical ethics mediation to improve the care of vulnerable patients. Copyright 2015 The Journal of Clinical Ethics. All rights reserved.

  3. Microseismicity of Blawan hydrothermal complex, Bondowoso, East Java, Indonesia

    NASA Astrophysics Data System (ADS)

    Maryanto, S.

    2018-03-01

    Peak Ground Acceleration (PGA), hypocentre, and epicentre of Blawan hydrothermal complex have been analysed in order to investigate its seismicity. PGA has been determined based on Fukushima-Tanaka method and the source location of microseismic estimated using particle motion method. PGA ranged between 0.095-0.323 g and tends to be higher in the formation that containing not compacted rocks. The seismic vulnerability index region indicated that the zone with high PGA also has a high seismic vulnerability index. This was because the rocks making up these zones were inclined soft and low-density rocks. For seismic sources around the area, epicentre and hypocentre, have estimated base on seismic particle motion method of single station. The stations used in this study were mobile stations identified as BL01, BL02, BL03, BL05, BL06, BL07 and BL08. The results of the analysis particle motion obtained 44 points epicentre and the depth of the sources about 15 – 110 meters below ground surface.

  4. Temperature Dependence Of Single-Event Effects

    NASA Technical Reports Server (NTRS)

    Coss, James R.; Nichols, Donald K.; Smith, Lawrence S.; Huebner, Mark A.; Soli, George A.

    1990-01-01

    Report describes experimental study of effects of temperature on vulnerability of integrated-circuit memories and other electronic logic devices to single-event effects - spurious bit flips or latch-up in logic state caused by impacts of energetic ions. Involved analysis of data on 14 different device types. In most cases examined, vulnerability to these effects increased or remain constant with temperature.

  5. Acquisition of the syntax–discourse interface: The expression of point of view

    PubMed Central

    Lillo-Martin, Diane; de Quadros, Ronice Müller

    2011-01-01

    This study examines the proposal that the syntax–discourse interface is particularly vulnerable, and therefore components of this interface are acquired later than those of the syntax–semantics interface. The proposal is examined using data from the native language acquisition of markers of point of view in American Sign Language and Brazilian Sign Language, known as constructed action (CA). CA was observed in the spontaneous production of two case studies from as early as 1 year, 7 months of age, with the correct eye-gaze, facial expression, and manner of movement. However, the children sometimes failed to indicate the referent whose point of view was being expressed, and were not skilled at maintaining point of view marking across discourse. The results are interpreted as providing support for the vulnerability of the syntax–discourse interface, and for the interpretation of this vulnerability in connection with children’s relatively poor ability to assume an identical discourse context with their interlocutor. PMID:21528016

  6. Predation by the isopod Saduria entomon on the amphipods Monoporeia affinis and Pontoporeia femorata: experiments on prey vulnerability.

    PubMed

    Hill, Cathy; Elmgren, Ragnar

    1992-08-01

    Predation by Saduria entomon on the depositfeeding amphipods Monoporeia (=Pontoporeia) affinis and Pontoporeia femorata was studied in laboratory experiments. Prey vulnerabilities were compared in singleprey treatments and in mixed-prey treatments, where the proportions of the two species were varied at one total density. In a pilot experiment, P. femorata was the more vulnerable prey, both in single-prey and mixed-prey treatments. In later experiments, the amphipod species were equally vulnerable in single-prey treatments, while in mixed-prey treatments Saduria preyed preferentially on M. affinis, even when this prey was rare, i.e. it did not "switch". We suggest that the different result in the later experiments may have been due to a change in the search mode of the isopods.

  7. Cumulative Stress and Substantiated Maltreatment: The Importance of Caregiver Vulnerability and Adult Partner Violence

    ERIC Educational Resources Information Center

    Wekerle, Christine; Wall, Anne-Marie; Leung, Eman; Trocme, Nico

    2007-01-01

    Objective: Our goal is to assess the effect of caregiver vulnerabilities, singly and in combination, on the substantiation of child abuse (physical, sexual) and neglect, while controlling for relevant background variables. We test the moderator role of adult partner violence in qualifying the relationship between caregiver vulnerabilities and…

  8. Improvements to the DRASTIC ground-water vulnerability mapping method

    USGS Publications Warehouse

    Rupert, Michael G.

    1999-01-01

    Ground-water vulnerability maps are designed to show areas of greatest potential for ground-water contamination on the basis of hydrogeologic and anthropogenic (human) factors. The maps are developed by using computer mapping hardware and software called a geographic information system (GIS) to combine data layers such as land use, soils, and depth to water. Usually, ground-water vulnerability is determined by assigning point ratings to the individual data layers and then adding the point ratings together when those layers are combined into a vulnerability map. Probably the most widely used ground-water vulnerability mapping method is DRASTIC, named for the seven factors considered in the method: Depth to water, net Recharge, Aquifer media, Soil media, Topography, Impact of vadose zone media, and hydraulic Conductivity of the aquifer (Aller and others, 1985, p. iv). The DRASTIC method has been used to develop ground-water vulnerability maps in many parts of the Nation; however, the effectiveness of the method has met with mixed success (Koterba and others, 1993, p. 513; U.S. Environmental Protection Agency, 1993; Barbash and Resek, 1996; Rupert, 1997). DRASTIC maps usually are not calibrated to measured contaminant concentrations. The DRASTIC ground-water vulnerability mapping method was improved by calibrating the point rating scheme to measured nitrite plus nitrate as nitrogen (NO2+NO3–N) concentrations in ground water on the basis of statistical correlations between NO2+NO3–N concentrations and land use, soils, and depth to water (Rupert, 1997). This report describes the calibration method developed by Rupert and summarizes the improvements in results of this method over those of the uncalibrated DRASTIC method applied by Rupert and others (1991) in the eastern Snake River Plain, Idaho.

  9. Vulnerability, life events and depression amongst Moslem Malaysian women: comparing those married and those divorced or separated.

    PubMed

    Abdul Kadir, Nor Ba'yah; Bifulco, Antonia

    2011-09-01

    The experiences of married and single mothers were compared in an investigation of psychosocial vulnerability, stress and depression in a community-based study of Moslem mothers in Malaysia. For the first time, a model of vulnerability-provoking agent originally developed by Brown et al. in the UK was tested in a Malaysian context. A cross-sectional study was carried out in the district of Johor Bahru, Malaysia. Of the 1,200 women approached from membership of community associations, 1,002 (84%) completed the questionnaires. Severe life events Recent Life Events Questionnaire (Brugha and Cragg in Acta Psychiatr Scand 82:77-81, 1990) and psychosocial vulnerability (VDQ) (Moran et al. in Br J Clin Psychol 40:411-427, 2001) were used to measure vulnerability factors. Depression was measured by the General Health Questionnaire (GHQ-30) (Havenaar et al. in Soc Psychiatry Psychiatr Epidemiol 43:209-215, 2008). Single mothers had significantly higher rates of depression than those married (60.5 vs. 39.5%), as well as higher rates of severe life events and Negative Elements in Close Relationships (lack of support and conflict with children). However, married mothers had greater Negative Evaluation of Self. The two vulnerability factors were correlated to each other and to severe life events and social adversity. Logistic regression showed an interaction between severe life events in the material and relationship domains and joint vulnerability for depression outcome. The results are discussed in relation to the low recognition of psychosocial risks for depression in single mothers in Malaysia, as well as lack of appropriate services.

  10. Understanding Data Needs for Vulnerability Assessment and Decision Making to Manage Vulnerability of Department of Defense Installations to Climate Change

    DTIC Science & Technology

    2016-02-01

    frequency...................................................................... 81 Figure 46. Return period analysis at Sewell’s Point (across the mouth ...Return period analysis at Sewell’s Point (across the mouth of the James River from both Langley AFB and Fort Eustis with sea level rise projections...a digital elevation model as an input and calculates the water level necessary to fill each grid cell. In other words , the fill tool takes into

  11. Initial subjective reward to alcohol in Sprague-Dawley rats.

    PubMed

    Nentwig, Todd B; Myers, Kevin P; Grisel, Judith E

    2017-02-01

    Initial subjective response to the rewarding properties of alcohol predicts voluntary consumption and the risk for alcohol use disorders. We assessed the initial subjective reward to alcohol in rats using a single exposure conditioned place preference (SE-CPP) paradigm. Sprague-Dawley rats demonstrate preference for a context paired with a single systemic injection of ethanol (1.0 g/kg, delivered intraperitoneally). However, expression of SE-CPP in males depended on pairing ethanol with the first exposure of two (ethanol; saline) to the conditioning apparatus and procedures, while conditioning day did not appreciably affect SE-CPP in females, consistent with the view that females experience heightened addiction vulnerability. This model offers researchers a high throughput assay for investigating factors that influence alcohol reward and may point the way toward more effective prevention and treatment efforts. Copyright © 2016 Elsevier Inc. All rights reserved.

  12. A unified framework for addiction: Vulnerabilities in the decision process

    PubMed Central

    Redish, A. David; Jensen, Steve; Johnson, Adam

    2013-01-01

    The understanding of decision-making systems has come together in recent years to form a unified theory of decision-making in the mammalian brain as arising from multiple, interacting systems (a planning system, a habit system, and a situation-recognition system). This unified decision-making system has multiple potential access points through which it can be driven to make maladaptive choices, particularly choices that entail seeking of certain drugs or behaviors. We identify 10 key vulnerabilities in the system: (1) moving away from homeostasis, (2) changing allostatic set points, (3) euphorigenic “reward-like” signals, (4) overvaluation in the planning system, (5) incorrect search of situation-action-outcome relationships, (6) misclassification of situations, (7) overvaluation in the habit system, (8) a mismatch in the balance of the two decision systems, (9) over-fast discounting processes, and (10) changed learning rates. These vulnerabilities provide a taxonomy of potential problems with decision-making systems. Although each vulnerability can drive an agent to return to the addictive choice, each vulnerability also implies a characteristic symptomology. Different drugs, different behaviors, and different individuals are likely to access different vulnerabilities. This has implications for an individual’s susceptibility to addiction and the transition to addiction, for the potential for relapse, and for the potential for treatment. PMID:18662461

  13. COMPLEXITY AND HETEROGENEITY: WHAT DRIVES THE EVER-CHANGING BRAIN IN HUNTINGTONS DISEASE?

    PubMed Central

    Rosas, H. Diana; Salat, David H; Lee, Stephanie Y; Zaleta, Alexandra K; Hevelone, Nathanael; Hersch, Steven M.

    2008-01-01

    Significant advances are being made in our understanding of basic pathophyiological and biochemical mechanisms that cause HuntingtonÕs disease (HD). There is increasing reason to believe that pathologic alterations occur in the brain for years before symptoms manifest. The “classic” hallmark of neuropathology in HD is selective neurodegeneration in which vulnerable populations of neurons degenerate while less vulnerable populations are spared. While, the earliest and most striking neuropathologic changes have been found in the neostriatum, neuronal loss has been identified in many other regions of the brain. We report topologically selective, early, and progressive changes in the cortex, striatum, extra-striatal brain structures and white matter throughout the spectrum of disease. Our growing understanding of HD underscores the reality that points to the complexity of HD. A single, well-defined genetic mutation causes a cascade of events whose final result is an aggregate insult of the homeostatic process. We explore possible explanations for the selective vulnerability of the brain in HD. The ultimate goal in HD is to develop disease-modifying therapies that will prevent the onset of clinical symptoms in those individuals who are at risk and slow the progression of symptoms in those individuals already affected with symptoms. Understanding changes in brain morphometry and their relationship to clinical symptoms may provide important new and important insights into basic pathophysiological mechanisms at play in the disease. PMID:19076442

  14. Development and implementation of a Bayesian-based aquifer vulnerability assessment in Florida

    USGS Publications Warehouse

    Arthur, J.D.; Wood, H.A.R.; Baker, A.E.; Cichon, J.R.; Raines, G.L.

    2007-01-01

    The Florida Aquifer Vulnerability Assessment (FAVA) was designed to provide a tool for environmental, regulatory, resource management, and planning professionals to facilitate protection of groundwater resources from surface sources of contamination. The FAVA project implements weights-of-evidence (WofE), a data-driven, Bayesian-probabilistic model to generate a series of maps reflecting relative aquifer vulnerability of Florida's principal aquifer systems. The vulnerability assessment process, from project design to map implementation is described herein in reference to the Floridan aquifer system (FAS). The WofE model calculates weighted relationships between hydrogeologic data layers that influence aquifer vulnerability and ambient groundwater parameters in wells that reflect relative degrees of vulnerability. Statewide model input data layers (evidential themes) include soil hydraulic conductivity, density of karst features, thickness of aquifer confinement, and hydraulic head difference between the FAS and the watertable. Wells with median dissolved nitrogen concentrations exceeding statistically established thresholds serve as training points in the WofE model. The resulting vulnerability map (response theme) reflects classified posterior probabilities based on spatial relationships between the evidential themes and training points. The response theme is subjected to extensive sensitivity and validation testing. Among the model validation techniques is calculation of a response theme based on a different water-quality indicator of relative recharge or vulnerability: dissolved oxygen. Successful implementation of the FAVA maps was facilitated by the overall project design, which included a needs assessment and iterative technical advisory committee input and review. Ongoing programs to protect Florida's springsheds have led to development of larger-scale WofE-based vulnerability assessments. Additional applications of the maps include land-use planning amendments and prioritization of land purchases to protect groundwater resources. ?? International Association for Mathematical Geology 2007.

  15. Can we use the q-Gaussian of ambient noise fluctuations as a vulnerability index? A case study in Cultural Heritage buildings

    NASA Astrophysics Data System (ADS)

    Vallianatos, Filippos; Koutalonis, Ioannis; Moisidi, Margarita; Chatzopoulos, Georgios

    2018-05-01

    In this work we study in terms of Tsallis statistical mechanics the properties of microtremors' fluctuations in two church bell towers, which are monuments of cultural heritage, in the city of Chania (Crete, Greece). We have shown that fluctuations of ambient vibrations recordings in the Church tower bells follow a q-Gaussian distribution. The behavior of Tsallis q parameter with the level (high) of the measuring point within the tower and the amplification factors at that points as extracted from horizontal-to-vertical (HVSR) spectral ratios are presented and discussed. Since q decreases as the amplification factor increases, we could suggest q as a vulnerability index, where, as q decreases approaching unity, then the structural system is getting more vulnerable. The latter approach suggests that introducing ideas of Tsallis statistics could be useful in characterizing extremely complex processes as that governed the estimation of seismic vulnerability in which a multidisciplinary approach is required.

  16. Assessing application vulnerability to radiation-induced SEUs in memory

    NASA Technical Reports Server (NTRS)

    Springer, P. L.

    2001-01-01

    One of the goals of the Remote Exploration and Experimentation (REE) project at JPL is to determine how vulnerable applications are to single event upsets (SEUs) when run in low radiation space environments using commercial-off-the-shelf (COTS) components.

  17. Use of tracers and isotopes to evaluate vulnerability of water in domestic wells to septic waste

    USGS Publications Warehouse

    Verstraeten, Ingrid M.; Fetterman, G.S.; Meyer, M.J.; Bullen, T.; Sebree, S.K.

    2005-01-01

    In Nebraska, a large number (>200) of shallow sand-point and cased wells completed in coarse alluvial sediments along rivers and lakes still are used to obtain drinking water for human consumption, even though construction of sand-point wells for consumptive uses has been banned since 1987. The quality of water from shallow domestic wells potentially vulnerable to seepage from septic systems was evaluated by analyzing for the presence of tracers and multiple isotopes. Samples were collected from 26 sand-point and perforated, cased domestic wells and were analyzed for bacteria, coliphages, nitrogen species, nitrogen and boron isotopes, dissolved organic carbon (DOC), prescription and nonprescription drugs, or organic waste water contaminants. At least 13 of the 26 domestic well samples showed some evidence of septic system effects based on the results of several tracers including DOC, coliphages, NH4+, NO3-, N2, ?? 15N[NO3-] and boron isotopes, and antibiotics and other drugs. Sand-point wells within 30 m of a septic system and <14 m deep in a shallow, thin aquifer had the most tracers detected and the highest values, indicating the greatest vulnerability to contamination from septic waste. Copyright ?? 2005 National Ground Water Association.

  18. The Relationship between Grandiose and Vulnerable (Hypersensitive) Narcissism

    PubMed Central

    Jauk, Emanuel; Weigle, Elena; Lehmann, Konrad; Benedek, Mathias; Neubauer, Aljoscha C.

    2017-01-01

    Narcissistic grandiosity is characterized by overt expressions of feelings of superiority and entitlement, while narcissistic vulnerability reflects hypersensitivity and introversive self-absorbedness. Clinical evidence suggests that grandiosity is accompanied by vulnerable aspects, pointing to a common foundation. Subclinical personality research, however, views grandiose and vulnerable narcissism as independent traits. Grandiose narcissism displays substantial correlation with extraversion, while vulnerable narcissism correlates highly with introversion. We investigated if (1) controlling for intro-/extraversion might reveal a “common core” of grandiose and vulnerable narcissism, and if (2) the correlation between both aspects might be higher at higher levels of narcissism. Latent variable structural equation modeling and segmented regression analysis confirmed these hypotheses in a large non-clinical sample (N = 1,006). Interindividual differences in intro-/extraversion mask the common core of grandiose and vulnerable narcissism. The association between both aspects increases at high levels (upper 10%) of grandiose narcissism, which suggests a possible transition to clinically relevant (pathological) narcissism. PMID:28955288

  19. NV: Nessus Vulnerability Visualization for the Web

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Harrison, Lane; Spahn, Riley B; Iannacone, Michael D

    2012-01-01

    Network vulnerability is a critical component of network se- curity. Yet vulnerability analysis has received relatively lit- tle attention from the security visualization community. In this paper we describe nv, a web-based Nessus vulnerability visualization. Nv utilizes treemaps and linked histograms to allow system administrators to discover, analyze, and man- age vulnerabilities on their networks. In addition to visual- izing single Nessus scans, nv supports the analysis of sequen- tial scans by showing which vulnerabilities have been fixed, remain open, or are newly discovered. Nv was also designed to operate completely in-browser, to avoid sending sensitive data to outside servers.more » We discuss the design of nv, as well as provide case studies demonstrating vulnerability analysis workflows which include a multiple-node testbed and data from the 2011 VAST Challenge.« less

  20. Assessment of composite index methods for agricultural vulnerability to climate change.

    PubMed

    Wiréhn, Lotten; Danielsson, Åsa; Neset, Tina-Simone S

    2015-06-01

    A common way of quantifying and communicating climate vulnerability is to calculate composite indices from indicators, visualizing these as maps. Inherent methodological uncertainties in vulnerability assessments, however, require greater attention. This study examines Swedish agricultural vulnerability to climate change, the aim being to review various indicator approaches for assessing agricultural vulnerability to climate change and to evaluate differences in climate vulnerability depending on the weighting and summarizing methods. The reviewed methods are evaluated by being tested at the municipal level. Three weighting and summarizing methods, representative of climate vulnerability indices in general, are analysed. The results indicate that 34 of 36 method combinations differ significantly from each other. We argue that representing agricultural vulnerability in a single composite index might be insufficient to guide climate adaptation. We emphasize the need for further research into how to measure and visualize agricultural vulnerability and into how to communicate uncertainties in both data and methods. Copyright © 2015 Elsevier Ltd. All rights reserved.

  1. Assessment of coastal vulnerability through the use of GIS tools in South Sicily (Italy).

    PubMed

    Anfuso, Giorgio; Martínez Del Pozo, José Angel

    2009-03-01

    This study assessed coastal erosion vulnerability along a 90-km sector, which included both erosional and accretionary beaches, and different levels of human occupation. Two aerial photogrammetric flights were used to reconstruct coastal evolution between 1977 and 1999. During this period, extensive accretion was recorded updrift of human structures at harbors and ports, e.g., Scoglitti (105.6 m), Donnalucata (52.8 m), and Pozzallo (94.6 m). Conversely, erosion was recorded in downdrift areas, with maximum values at Modica Stream mouth (63.8 m) and Point Castellazzo (35.2 m). Assessments were subsequently divided into four categories ranging from "high erosion" to "accretion." Several sources were examined to assess human activities and land use. The latter was mapped and divided into four categories, ranging from "very high" to "no capital" land use. Subsequently, coastal erosion vulnerability was assessed by combining land use categories with recorded coastline behavior. Results showed "very high" to "high" vulnerability along 5.8% and 16.6%, respectively, of the littoral, while 20.9% and 56.7%, respectively, was found to exhibit "medium" and "low/very low" vulnerability. A very good agreement between predicted coastal vulnerability and coastal trend had been observed over recent years. Furthermore, several human structures and activities are located within the "imminent collapse zone (ICZ)" which reached maximum values of 17.5 m at Modica Stream and 13.5 m at Point Braccetto.

  2. Food for Thought - The Use of Hazard and Critical Control Point Analysis to Assess Vulnerability of Food to Terrorist Attack in Deployment Locations, A Case Study

    DTIC Science & Technology

    1997-01-01

    employing food have not kept pace with the potential threat to food safety . Recommendations to potentially decrease the vulnerability of the United States military food supply to intentional contamination are also provided.

  3. Cumulative stress and substantiated maltreatment: the importance of caregiver vulnerability and adult partner violence.

    PubMed

    Wekerle, Christine; Wall, Anne-Marie; Leung, Eman; Trocmé, Nico

    2007-04-01

    Our goal is to assess the effect of caregiver vulnerabilities, singly and in combination, on the substantiation of child abuse (physical, sexual) and neglect, while controlling for relevant background variables. We test the moderator role of adult partner violence in qualifying the relationship between caregiver vulnerabilities and maltreatment substantiation. Secondary analyses of the 1998 Canadian Incidence Study of Reported Child Maltreatment (CIS) are used to predict child protective service investigation substantiation versus non-substantiation from a range of caregiver vulnerability factors. Involvement in partner violence was examined as a moderator in the relation between caregiver vulnerabilities and maltreatment substantiation. The CIS is an epidemiological survey of first-reported cases to child protective services, using a random sample of child welfare agencies across Canada. Child welfare workers completed a research form on the child, primary caregiver, family, perpetrator, severity and type of maltreatment, as well as services and court outcomes. All maltreatment classifications were assigned according to the Canadian legal definition of child abuse and neglect. Hierarchical logistic regression analyses were used, with stepped entry of: (1) demographic factors, socioeconomic disadvantage, and caregiver's own history of maltreatment; (2) caregiver vulnerability factors; (3) involvement in partner violence; (4) the interaction between caregiver vulnerability and partner violence. Caregiver substance abuse was found to be the single most potent kind of caregiver vulnerability in predicting maltreatment substantiation. When the total number of vulnerabilities was used as the predictor, prediction across all types of maltreatment increased, especially for substantiated neglect. Analyses also showed that the presence of partner violence in the home exacerbated the effect of caregiver vulnerability on substantiation. The total number of caregiver vulnerabilities was the best predictor of the substantiation of child abuse and neglect. This relationship was moderated by the existence of partner violence: high caregiver vulnerability and high partner violence increased the likelihood of substantiation versus non-substantiation. These results suggest that caregiver issues should be considered in tandem with partner relationships. Among child welfare cases, caregiver vulnerability and partner violence are critical targets for child maltreatment prevention and early child protective services intervention.

  4. Coping with seismic vulnerability: small manufacturing firms in western Athens.

    PubMed

    Sapountzaki, Kalliopi

    2005-06-01

    This paper attempts to contribute to international discourse on the responsibility of macro structures (economic and political) and private agencies for the production and distribution of vulnerability. It does so by focusing on an individual economic entity, small manufacturing firms (SMFs), in a specific location, western Athens, Greece. By evaluating the losses that SMFs sustained in the earthquake of 7 September 1999, the paper points to variations in vulnerability levels among such firms and highlights the 'sources' of vulnerability they confront. Furthermore, the SMF recovery cycle is systematically monitored in parallel with relevant public policies and state reactions to private recovery methods. The analysis illustrates processes that externalise recovery costs, alter the relationship between physical and socio-economic vulnerability and shift the vulnerability load from macro structures to individual agencies or vice versa. It is based on two methodological approaches: the division of vulnerability into three constituent components (exposure, resistance and resilience); and the conceptual split between producers and carriers of vulnerability.

  5. A cognitive vulnerability model on sleep and mood in adolescents under naturalistically restricted and extended sleep opportunities.

    PubMed

    Bei, Bei; Wiley, Joshua F; Allen, Nicholas B; Trinder, John

    2015-03-01

    School terms and vacations represent naturally occurring periods of restricted and extended sleep opportunities. A cognitive model of the relationships among objective sleep, subjective sleep, and negative mood was tested across these periods, with sleep-specific (i.e., dysfunctional beliefs and attitudes about sleep) and global (i.e., dysfunctional attitudes) cognitive vulnerabilities as moderators. Longitudinal study over the last week of a school term (Time-E), the following 2-w vacation (Time-V), and the first week of the next term (Time-S). General community. 146 adolescents, 47.3% male, mean age =16.2 years (standard deviation +/- 1 year). N/A. Objective sleep was measured continuously by actigraphy. Sociodemographics and cognitive vulnerabilities were assessed at Time-E; subjective sleep, negative mood (anxiety and depressive symptoms), and academic stress were measured at each time point. Controlling for academic stress and sex, subjective sleep quality mediated the relationship between objective sleep and negative mood at all time points. During extended (Time-V), but not restricted (Time-E and Time-S) sleep opportunity, this mediation was moderated by global cognitive vulnerability, with the indirect effects stronger with higher vulnerability. Further, at Time-E and Time-V, but not Time-S, greater sleep-specific and global cognitive vulnerabilities were associated with poorer subjective sleep quality and mood, respectively. Results highlighted the importance of subjective sleep perception in the development of sleep related mood problems, and supported the role of cognitive vulnerabilities as potential mechanisms in the relationships between objective sleep, subjective sleep, and negative mood. Adolescents with higher cognitive vulnerability are more susceptible to perceived poor sleep and sleep related mood problems. These findings have practical implications for interventions. © 2015 Associated Professional Sleep Societies, LLC.

  6. Outside-Xylem Vulnerability, Not Xylem Embolism, Controls Leaf Hydraulic Decline during Dehydration1[CC-BY

    PubMed Central

    Townes, Shatara V.; Bartlett, Megan K.; Buckley, Thomas N.; McElrone, Andrew J.; Sack, Lawren

    2017-01-01

    Leaf hydraulic supply is crucial to maintaining open stomata for CO2 capture and plant growth. During drought-induced dehydration, the leaf hydraulic conductance (Kleaf) declines, which contributes to stomatal closure and, eventually, to leaf death. Previous studies have tended to attribute the decline of Kleaf to embolism in the leaf vein xylem. We visualized at high resolution and quantified experimentally the hydraulic vulnerability of xylem and outside-xylem pathways and modeled their respective influences on plant water transport. Evidence from all approaches indicated that the decline of Kleaf during dehydration arose first and foremost due to the vulnerability of outside-xylem tissues. In vivo x-ray microcomputed tomography of dehydrating leaves of four diverse angiosperm species showed that, at the turgor loss point, only small fractions of leaf vein xylem conduits were embolized, and substantial xylem embolism arose only under severe dehydration. Experiments on an expanded set of eight angiosperm species showed that outside-xylem hydraulic vulnerability explained 75% to 100% of Kleaf decline across the range of dehydration from mild water stress to beyond turgor loss point. Spatially explicit modeling of leaf water transport pointed to a role for reduced membrane conductivity consistent with published data for cells and tissues. Plant-scale modeling suggested that outside-xylem hydraulic vulnerability can protect the xylem from tensions that would induce embolism and disruption of water transport under mild to moderate soil and atmospheric droughts. These findings pinpoint outside-xylem tissues as a central locus for the control of leaf and plant water transport during progressive drought. PMID:28049739

  7. Novel Analytic Methods Needed for Real-Time Continuous Core Body Temperature Data

    PubMed Central

    Hertzberg, Vicki; Mac, Valerie; Elon, Lisa; Mutic, Nathan; Mutic, Abby; Peterman, Katherine; Tovar-Aguilar, J. Antonio; Economos, Jeannie; Flocks, Joan; McCauley, Linda

    2017-01-01

    Affordable measurement of core body temperature, Tc, in a continuous, real-time fashion is now possible. With this advance comes a new data analysis paradigm for occupational epidemiology. We characterize issues arising after obtaining Tc data over 188 workdays for 83 participating farmworkers, a population vulnerable to effects of rising temperatures due to climate change. We describe a novel approach to these data using smoothing and functional data analysis. This approach highlights different data aspects compared to describing Tc at a single time point or summaries of the time course into an indicator function (e.g., did Tc ever exceed 38°C, the threshold limit value for occupational heat exposure). Participants working in ferneries had significantly higher Tc at some point during the workday compared to those working in nurseries, despite a shorter workday for fernery participants. Our results typify the challenges and opportunities in analyzing big data streams from real-time physiologic monitoring. PMID:27756853

  8. Novel Analytic Methods Needed for Real-Time Continuous Core Body Temperature Data.

    PubMed

    Hertzberg, Vicki; Mac, Valerie; Elon, Lisa; Mutic, Nathan; Mutic, Abby; Peterman, Katherine; Tovar-Aguilar, J Antonio; Economos, Eugenia; Flocks, Joan; McCauley, Linda

    2016-10-18

    Affordable measurement of core body temperature (T c ) in a continuous, real-time fashion is now possible. With this advance comes a new data analysis paradigm for occupational epidemiology. We characterize issues arising after obtaining T c data over 188 workdays for 83 participating farmworkers, a population vulnerable to effects of rising temperatures due to climate change. We describe a novel approach to these data using smoothing and functional data analysis. This approach highlights different data aspects compared with describing T c at a single time point or summaries of the time course into an indicator function (e.g., did T c ever exceed 38 °C, the threshold limit value for occupational heat exposure). Participants working in ferneries had significantly higher T c at some point during the workday compared with those working in nurseries, despite a shorter workday for fernery participants. Our results typify the challenges and opportunities in analyzing big data streams from real-time physiologic monitoring. © The Author(s) 2016.

  9. A Cognitive Vulnerability Model of Sleep and Mood in Adolescents under Naturalistically Restricted and Extended Sleep Opportunities

    PubMed Central

    Bei, Bei; Wiley, Joshua F.; Allen, Nicholas B.; Trinder, John

    2015-01-01

    Study Objectives: School terms and vacations represent naturally occurring periods of restricted and extended sleep opportunities. A cognitive model of the relationships among objective sleep, subjective sleep, and negative mood was tested across these periods, with sleep-specific (i.e., dysfunctional beliefs and attitudes about sleep) and global (i.e., dysfunctional attitudes) cognitive vulnerabilities as moderators. Design: Longitudinal study over the last week of a school term (Time-E), the following 2-w vacation (Time-V), and the first week of the next term (Time-S). Setting: General community. Participants: 146 adolescents, 47.3% male, mean age = 16.2 years (standard deviation ± 1 year). Interventions: N/A. Measurements and Results: Objective sleep was measured continuously by actigraphy. Sociodemographics and cognitive vulnerabilities were assessed at Time-E; subjective sleep, negative mood (anxiety and depressive symptoms), and academic stress were measured at each time point. Controlling for academic stress and sex, subjective sleep quality mediated the relationship between objective sleep and negative mood at all time points. During extended (Time-V), but not restricted (Time-E and Time-S) sleep opportunity, this mediation was moderated by global cognitive vulnerability, with the indirect effects stronger with higher vulnerability. Further, at Time-E and Time-V, but not Time-S, greater sleep-specific and global cognitive vulnerabilities were associated with poorer subjective sleep quality and mood, respectively. Conclusions: Results highlighted the importance of subjective sleep perception in the development of sleep related mood problems, and supported the role of cognitive vulnerabilities as potential mechanisms in the relationships between objective sleep, subjective sleep, and negative mood. Adolescents with higher cognitive vulnerability are more susceptible to perceived poor sleep and sleep related mood problems. These findings have practical implications for interventions. Citation: Bei B, Wiley JF, Allen NB, Trinder J. A cognitive vulnerability model of sleep and mood in adolescents under naturalistically restricted and extended sleep opportunities. SLEEP 2015;38(3):453–461. PMID:25325471

  10. Laboratory test of a novel structural model of anxiety sensitivity and panic vulnerability.

    PubMed

    Bernstein, Amit; Zvolensky, Michael J; Zvolensky, Michael J; Schmidt, Norman B

    2009-06-01

    The current study evaluated a novel latent structural model of anxiety sensitivity (AS) in relation to panic vulnerability among a sample of young adults (N=216). AS was measured using the 16-item Anxiety Sensitivity Index (ASI; Reiss, Peterson, Gursky, & McNally, 1986), and panic vulnerability was indexed by panic attack responding to a single administration of a 4-minute, 10% CO(2) challenge. As predicted, vulnerability for panic attack responding to biological challenge was associated with dichotomous individual differences between taxonic AS classes and continuous within-taxon class individual differences in AS physical concerns. Findings supported the AS taxonic-dimensional hypothesis of AS latent structure and panic vulnerability. These findings are discussed in terms of their theoretical and clinical implications.

  11. Assessment of Coastal Vulnerability Through the Use of GIS Tools in South Sicily (Italy)

    NASA Astrophysics Data System (ADS)

    Anfuso, Giorgio; Martínez Del Pozo, José Ángel

    2009-03-01

    This study assessed coastal erosion vulnerability along a 90-km sector, which included both erosional and accretionary beaches, and different levels of human occupation. Two aerial photogrammetric flights were used to reconstruct coastal evolution between 1977 and 1999. During this period, extensive accretion was recorded updrift of human structures at harbors and ports, e.g., Scoglitti (105.6 m), Donnalucata (52.8 m), and Pozzallo (94.6 m). Conversely, erosion was recorded in downdrift areas, with maximum values at Modica Stream mouth (63.8 m) and Point Castellazzo (35.2 m). Assessments were subsequently divided into four categories ranging from “high erosion” to “accretion.” Several sources were examined to assess human activities and land use. The latter was mapped and divided into four categories, ranging from “very high” to “no capital” land use. Subsequently, coastal erosion vulnerability was assessed by combining land use categories with recorded coastline behavior. Results showed “very high” to “high” vulnerability along 5.8% and 16.6%, respectively, of the littoral, while 20.9% and 56.7%, respectively, was found to exhibit “medium” and “low/very low” vulnerability. A very good agreement between predicted coastal vulnerability and coastal trend had been observed over recent years. Furthermore, several human structures and activities are located within the “imminent collapse zone (ICZ)” which reached maximum values of 17.5 m at Modica Stream and 13.5 m at Point Braccetto.

  12. Genetic k-Means Clustering Approach for Mapping Human Vulnerability to Chemical Hazards in the Industrialized City: A Case Study of Shanghai, China

    PubMed Central

    Shi, Weifang; Zeng, Weihua

    2013-01-01

    Reducing human vulnerability to chemical hazards in the industrialized city is a matter of great urgency. Vulnerability mapping is an alternative approach for providing vulnerability-reducing interventions in a region. This study presents a method for mapping human vulnerability to chemical hazards by using clustering analysis for effective vulnerability reduction. Taking the city of Shanghai as the study area, we measure human exposure to chemical hazards by using the proximity model with additionally considering the toxicity of hazardous substances, and capture the sensitivity and coping capacity with corresponding indicators. We perform an improved k-means clustering approach on the basis of genetic algorithm by using a 500 m × 500 m geographical grid as basic spatial unit. The sum of squared errors and silhouette coefficient are combined to measure the quality of clustering and to determine the optimal clustering number. Clustering result reveals a set of six typical human vulnerability patterns that show distinct vulnerability dimension combinations. The vulnerability mapping of the study area reflects cluster-specific vulnerability characteristics and their spatial distribution. Finally, we suggest specific points that can provide new insights in rationally allocating the limited funds for the vulnerability reduction of each cluster. PMID:23787337

  13. Outside-Xylem Vulnerability, Not Xylem Embolism, Controls Leaf Hydraulic Decline during Dehydration.

    PubMed

    Scoffoni, Christine; Albuquerque, Caetano; Brodersen, Craig R; Townes, Shatara V; John, Grace P; Bartlett, Megan K; Buckley, Thomas N; McElrone, Andrew J; Sack, Lawren

    2017-02-01

    Leaf hydraulic supply is crucial to maintaining open stomata for CO 2 capture and plant growth. During drought-induced dehydration, the leaf hydraulic conductance (K leaf ) declines, which contributes to stomatal closure and, eventually, to leaf death. Previous studies have tended to attribute the decline of K leaf to embolism in the leaf vein xylem. We visualized at high resolution and quantified experimentally the hydraulic vulnerability of xylem and outside-xylem pathways and modeled their respective influences on plant water transport. Evidence from all approaches indicated that the decline of K leaf during dehydration arose first and foremost due to the vulnerability of outside-xylem tissues. In vivo x-ray microcomputed tomography of dehydrating leaves of four diverse angiosperm species showed that, at the turgor loss point, only small fractions of leaf vein xylem conduits were embolized, and substantial xylem embolism arose only under severe dehydration. Experiments on an expanded set of eight angiosperm species showed that outside-xylem hydraulic vulnerability explained 75% to 100% of K leaf decline across the range of dehydration from mild water stress to beyond turgor loss point. Spatially explicit modeling of leaf water transport pointed to a role for reduced membrane conductivity consistent with published data for cells and tissues. Plant-scale modeling suggested that outside-xylem hydraulic vulnerability can protect the xylem from tensions that would induce embolism and disruption of water transport under mild to moderate soil and atmospheric droughts. These findings pinpoint outside-xylem tissues as a central locus for the control of leaf and plant water transport during progressive drought. © 2017 The author(s). All Rights Reserved.

  14. Transformative Inquiry While Learning-Teaching: Entry Points Through Mentor-Mentee Vulnerability

    ERIC Educational Resources Information Center

    Tanaka, Michele T. D.; Farish, Maureen; Nicholson, Diana; Tse, Vanessa; Doll, Jenn; Archer, Elizabeth

    2014-01-01

    In Transformative Inquiry (TI), pre-service teachers explore issues about which they are personally passionate in order to enter into the delicate work of transformation. We examine how shared vulnerability within three mentor-mentee pairs leads to new pedagogical possibilities. Michele and Vanessa discuss poetry as a way of entering into TI and…

  15. Autonomy and its vulnerability: Ricoeur's view on justice as a contribution to care ethics.

    PubMed

    Hettema, Theo L

    2014-11-01

    We examine an article of Paul Ricoeur on autonomy and vulnerability. Ricoeur presents the two notions in the field of justice as intricately woven into each other. He analyzes their interdependence on three levels of human agency. Ricoeur's exposition has a focus on judicial judgment. After presenting Ricoeur's argument and an analysis of his main points, the author argues that Ricoeur's reflection lines up with some essential intentions of care ethics. Ricoeur's contribution to care ethics is given in a delicate balance of autonomy and its vulnerability.

  16. The New Multi-HAzard and MulTi-RIsK Assessment MethodS for Europe (MATRIX) Project - An overview of its major findings

    NASA Astrophysics Data System (ADS)

    Fleming, Kevin; Zschau, Jochen; Gasparini, Paolo

    2014-05-01

    Recent major natural disasters, such as the 2011 Tōhoku earthquake, tsunami and subsequent Fukushima nuclear accident, have raised awareness of the frequent and potentially far-reaching interconnections between natural hazards. Such interactions occur at the hazard level, where an initial hazard may trigger other events (e.g., an earthquake triggering a tsunami) or several events may occur concurrently (or nearly so), e.g., severe weather around the same time as an earthquake. Interactions also occur at the vulnerability level, where the initial event may make the affected community more susceptible to the negative consequences of another event (e.g., an earthquake weakens buildings, which are then damaged further by windstorms). There is also a temporal element involved, where changes in exposure may alter the total risk to a given area. In short, there is the likelihood that the total risk estimated when considering multiple hazard and risks and their interactions is greater than the sum of their individual parts. It is with these issues in mind that the European Commission, under their FP7 program, supported the New Multi-HAzard and MulTi-RIsK Assessment MethodS for Europe or MATRIX project (10.2010 to 12.2013). MATRIX set out to tackle multiple natural hazards (i.e., those of concern to Europe, namely earthquakes, landslides, volcanos, tsunamis, wild fires, storms and fluvial and coastal flooding) and risks within a common theoretical framework. The MATRIX work plan proceeded from an assessment of single-type risk methodologies (including how uncertainties should be treated), cascade effects within a multi-hazard environment, time-dependent vulnerability, decision making and support for multi-hazard mitigation and adaption, and an assessment of how the multi-hazard and risk viewpoint may be integrated into current decision making and risk mitigation programs, considering the existing single-hazard and risk focus. Three test sites were considered during the project: Naples, Cologne, and the French West Indies. In addition, a software platform, the MATRIX-Common IT sYstem (MATRIX-CITY), was developed to allow the evaluation of characteristic multi-hazard and risk scenarios in comparison to single-type analyses. This presentation therefore outlines the more significant outcomes of the project, in particular those dealing with the harmonization of single-type hazards, cascade event analysis, time-dependent vulnerability changes and the response of the disaster management community to the MATRIX point of view.

  17. Beyond the single species climate envelope: A multifaceted approach to mapping climate change vulnerability

    Treesearch

    Christopher S. Balzotti; Stanley G. Kitchen; Clinton McCarthy

    2016-01-01

    Federal land management agencies and conservation organizations have begun incorporating climate change vulnerability assessments (CCVAs) as an important component in the management and conservation of landscapes. It is often a challenge to translate that knowledge into management plans and actions, even when research infers species risk. Predictive maps can...

  18. The stressors and vulnerabilities of young single childless women with breast cancer: a qualitative study.

    PubMed

    Corney, Roslyn; Puthussery, Shuby; Swinglehurst, Jane

    2014-02-01

    Marital or partnership status is seldom investigated as a primary contributing factor to women's wellbeing after a diagnosis of breast cancer. It has been suggested, however, that single childless women with breast cancer may face unique stressors. This paper explores the stressors and vulnerabilities of young single childless women with a first episode of breast cancer. A qualitative descriptive method was used. As part of a larger study examining fertility concerns of young childless women with first episode of breast cancer, in-depth semi-structured interviews were conducted with 10 single women. Recorded interviews were analysed using the framework approach. Findings cover three main themes: partnership worries; fertility concerns; and views about emotional and practical support received. Partnership worries included concerns about having to undergo treatment without a partner to support them; the fear of rejection by potential partners; and feelings about the precious time lost in diagnosis and treatment. Fertility concerns included dilemmas about having children and feelings about the options of pursuing Assisted Reproductive Techniques. Views about the emotional and practical support received included the overall support received as well as perceptions about the attitudes of health professionals towards fertility issues. Findings indicate that single childless women with breast cancer face additional vulnerabilities and may benefit from tailored support from health care professionals and interventions specifically targeted at them. Copyright © 2013 Elsevier Ltd. All rights reserved.

  19. Nobody’s perfect: can irregularities in pit structure influence vulnerability to cavitation?

    PubMed Central

    Plavcová, Lenka; Jansen, Steven; Klepsch, Matthias; Hacke, Uwe G.

    2013-01-01

    Recent studies have suggested that species-specific pit properties such as pit membrane thickness, pit membrane porosity, torus-to-aperture diameter ratio and pit chamber depth influence xylem vulnerability to cavitation. Despite the indisputable importance of using mean pit characteristics, considerable variability in pit structure within a single species or even within a single pit field should be acknowledged. According to the rare pit hypothesis, a single pit that is more air-permeable than many neighboring pits is sufficient to allow air-seeding. Therefore, any irregularities or morphological abnormalities in pit structure allowing air-seeding should be associated with increased vulnerability to cavitation. Considering the currently proposed models of air-seeding, pit features such as rare, large pores in the pit membrane, torus extensions, and plasmodesmatal pores in a torus can represent potential glitches. These aberrations in pit structure could either result from inherent developmental flaws, or from damage caused to the pit membrane by chemical and physical agents. This suggests the existence of interesting feedbacks between abiotic and biotic stresses in xylem physiology. PMID:24273549

  20. Insecure attachment style as a vulnerability factor for depression: recent findings in a community-based study of Malay single and married mothers.

    PubMed

    Abdul Kadir, Nor Ba'yah; Bifulco, Antonia

    2013-12-30

    The role of marital breakdown in women's mental health is of key concern in Malaysia and internationally. A cross-sectional questionnaire study of married and separated/divorced and widowed women examined insecure attachment style as an associated risk factor for depression among 1002 mothers in an urban community in Malaysia. A previous report replicated a UK-based vulnerability-provoking agent model of depression involving negative evaluation of self (NES) and negative elements in close relationships (NECRs) interacting with severe life events to model depression. This article reports on the additional contribution of insecure attachment style to the model using the Vulnerable Attachment Style Questionnaire (VASQ). The results showed that VASQ scores were highly correlated with NES, NECR and depression. A multiple regression analysis of depression with backward elimination found that VASQ scores had a significant additional effect. Group comparisons showed different risk patterns for single and married mothers. NES was the strongest risk factor for both groups, with the 'anxious style' subset of the VASQ being the best additional predictor for married mothers and the total VASQ score (general attachment insecurity) for single mothers. The findings indicate that attachment insecurity adds to a psychosocial vulnerability model of depression among mothers cross-culturally and is important in understanding and identifying risk. © 2013 Elsevier Ireland Ltd. All rights reserved.

  1. Vulnerabilities, Influences and Interaction Paths: Failure Data for Integrated System Risk Analysis

    NASA Technical Reports Server (NTRS)

    Malin, Jane T.; Fleming, Land

    2006-01-01

    We describe graph-based analysis methods for identifying and analyzing cross-subsystem interaction risks from subsystem connectivity information. By discovering external and remote influences that would be otherwise unexpected, these methods can support better communication among subsystem designers at points of potential conflict and to support design of more dependable and diagnosable systems. These methods identify hazard causes that can impact vulnerable functions or entities if propagated across interaction paths from the hazard source to the vulnerable target. The analysis can also assess combined impacts of And-Or trees of disabling influences. The analysis can use ratings of hazards and vulnerabilities to calculate cumulative measures of the severity and importance. Identification of cross-subsystem hazard-vulnerability pairs and propagation paths across subsystems will increase coverage of hazard and risk analysis and can indicate risk control and protection strategies.

  2. Factor weighting in DRASTIC modeling.

    PubMed

    Pacheco, F A L; Pires, L M G R; Santos, R M B; Sanches Fernandes, L F

    2015-02-01

    Evaluation of aquifer vulnerability comprehends the integration of very diverse data, including soil characteristics (texture), hydrologic settings (recharge), aquifer properties (hydraulic conductivity), environmental parameters (relief), and ground water quality (nitrate contamination). It is therefore a multi-geosphere problem to be handled by a multidisciplinary team. The DRASTIC model remains the most popular technique in use for aquifer vulnerability assessments. The algorithm calculates an intrinsic vulnerability index based on a weighted addition of seven factors. In many studies, the method is subject to adjustments, especially in the factor weights, to meet the particularities of the studied regions. However, adjustments made by different techniques may lead to markedly different vulnerabilities and hence to insecurity in the selection of an appropriate technique. This paper reports the comparison of 5 weighting techniques, an enterprise not attempted before. The studied area comprises 26 aquifer systems located in Portugal. The tested approaches include: the Delphi consensus (original DRASTIC, used as reference), Sensitivity Analysis, Spearman correlations, Logistic Regression and Correspondence Analysis (used as adjustment techniques). In all cases but Sensitivity Analysis, adjustment techniques have privileged the factors representing soil characteristics, hydrologic settings, aquifer properties and environmental parameters, by leveling their weights to ≈4.4, and have subordinated the factors describing the aquifer media by downgrading their weights to ≈1.5. Logistic Regression predicts the highest and Sensitivity Analysis the lowest vulnerabilities. Overall, the vulnerability indices may be separated by a maximum value of 51 points. This represents an uncertainty of 2.5 vulnerability classes, because they are 20 points wide. Given this ambiguity, the selection of a weighting technique to integrate a vulnerability index may require additional expertise to be set up satisfactorily. Following a general criterion that weights must be proportional to the range of the ratings, Correspondence Analysis may be recommended as the best adjustment technique. Copyright © 2014 Elsevier B.V. All rights reserved.

  3. Mapping human vulnerability to climate change in the Brazilian Amazon: The construction of a municipal vulnerability index

    PubMed Central

    Confalonieri, Ulisses; Madureira, Ana Paula; Duval, Isabela de Brito; dos Santos, Rhavena Barbosa; Margonari, Carina

    2018-01-01

    Vulnerability, understood as the propensity to be adversely affected, has attained importance in the context of climate change by helping to understand what makes populations and territories predisposed to its impacts. Conditions of vulnerability may vary depending on the characteristics of each territory studied—social, environmental, infrastructural, public policies, among others. Thus, the present study aimed to evaluate what makes the municipalities of the state of Amazonas, Brazil, vulnerable to climate change in the context of the largest tropical forest in the world, and which regions of the State are the most susceptible. A Municipal Vulnerability Index was developed, which was used to associate current socio-environmental characteristics of municipalities with climate change scenarios in order to identify those that may be most affected by climate change. The results showed that poor adaptive capacity and poverty had the most influence on current vulnerability of the municipalities of Amazonas with the most vulnerable areas being the southern, northern, and eastern regions of the state. When current vulnerability was related to future climate change projections, the most vulnerable areas were the northern, northeastern, extreme southern, and southwestern regions. From a socio-environmental and climatic point of view, these regions should be a priority for public policy efforts to reduce their vulnerability and prepare them to cope with the adverse aspects of climate change. PMID:29444086

  4. Mapping human vulnerability to climate change in the Brazilian Amazon: The construction of a municipal vulnerability index.

    PubMed

    Menezes, Júlia Alves; Confalonieri, Ulisses; Madureira, Ana Paula; Duval, Isabela de Brito; Santos, Rhavena Barbosa Dos; Margonari, Carina

    2018-01-01

    Vulnerability, understood as the propensity to be adversely affected, has attained importance in the context of climate change by helping to understand what makes populations and territories predisposed to its impacts. Conditions of vulnerability may vary depending on the characteristics of each territory studied-social, environmental, infrastructural, public policies, among others. Thus, the present study aimed to evaluate what makes the municipalities of the state of Amazonas, Brazil, vulnerable to climate change in the context of the largest tropical forest in the world, and which regions of the State are the most susceptible. A Municipal Vulnerability Index was developed, which was used to associate current socio-environmental characteristics of municipalities with climate change scenarios in order to identify those that may be most affected by climate change. The results showed that poor adaptive capacity and poverty had the most influence on current vulnerability of the municipalities of Amazonas with the most vulnerable areas being the southern, northern, and eastern regions of the state. When current vulnerability was related to future climate change projections, the most vulnerable areas were the northern, northeastern, extreme southern, and southwestern regions. From a socio-environmental and climatic point of view, these regions should be a priority for public policy efforts to reduce their vulnerability and prepare them to cope with the adverse aspects of climate change.

  5. South African AIDS Orphans: Examining Assumptions around Vulnerability from the Perspective of Rural Children and Youth

    ERIC Educational Resources Information Center

    Henderson, Patricia C.

    2006-01-01

    The article examines assumptions circulating in development or interventionist discourse concerning the vulnerabilities of AIDS orphans in South Africa. Ongoing ethnographic research, begun in March 2003, with 31 rural children and youth between the ages of 14 and 22, in Magangangozi, KwaZulu-Natal, points to the ways in which global terms may…

  6. Calibration of the DRASTIC ground water vulnerability mapping method

    USGS Publications Warehouse

    Rupert, M.G.

    2001-01-01

    Ground water vulnerability maps developed using the DRASTIC method have been produced in many parts of the world. Comparisons of those maps with actual ground water quality data have shown that the DRASTIC method is typically a poor predictor of ground water contamination. This study significantly improved the effectiveness of a modified DRASTIC ground water vulnerability map by calibrating the point rating schemes to actual ground water quality data by using nonparametric statistical techniques and a geographic information system. Calibration was performed by comparing data on nitrite plus nitrate as nitrogen (NO2 + NO3-N) concentrations in ground water to land-use, soils, and depth to first-encountered ground water data. These comparisons showed clear statistical differences between NO2 + NO3-N concentrations and the various categories. Ground water probability point ratings for NO2 + NO3-N contamination were developed from the results of these comparisons, and a probability map was produced. This ground water probability map was then correlated with an independent set of NO2 + NO3-N data to demonstrate its effectiveness in predicting elevated NO2 + NO3-N concentrations in ground water. This correlation demonstrated that the probability map was effective, but a vulnerability map produced with the uncalibrated DRASTIC method in the same area and using the same data layers was not effective. Considerable time and expense have been outlaid to develop ground water vulnerability maps with the DRASTIC method. This study demonstrates a cost-effective method to improve and verify the effectiveness of ground water vulnerability maps.

  7. A Structural Approach to Unresolved Mourning in Single Parent Family Systems.

    ERIC Educational Resources Information Center

    Fulmer, Richard H.

    1983-01-01

    Considers the mother's depression as a special problem in therapy of single-parent families, resulting from unresolved mourning maintained by the family system. Offers reasons why the single-parent family's structure seems inherently vulnerable to unresolved mourning. Suggests techniques of Structural Family Therapy to facilitate mourning in such…

  8. Defining Resilience and Vulnerability Based on Ontology Engineering Approach

    NASA Astrophysics Data System (ADS)

    Kumazawa, T.; Matsui, T.; Endo, A.

    2014-12-01

    It is necessary to reflect the concepts of resilience and vulnerability into the assessment framework of "Human-Environmental Security", but it is also in difficulty to identify the linkage between both concepts because of the difference of the academic community which has discussed each concept. The authors have been developing the ontology which deals with the sustainability of the social-ecological systems (SESs). Resilience and vulnerability are also the concepts in the target world which this ontology covers. Based on this point, this paper aims at explicating the semantic relationship between the concepts of resilience and vulnerability based on ontology engineering approach. For this purpose, we first examine the definitions of resilience and vulnerability which the existing literatures proposed. Second, we incorporate the definitions in the ontology dealing with sustainability of SESs. Finally, we focus on the "Water-Energy-Food Nexus Index" to assess Human-Environmental Security, and clarify how the concepts of resilience and vulnerability are linked semantically through the concepts included in these index items.

  9. Pressure Points in Reading Comprehension: A Quantile Multiple Regression Analysis

    ERIC Educational Resources Information Center

    Logan, Jessica

    2017-01-01

    The goal of this study was to examine how selected pressure points or areas of vulnerability are related to individual differences in reading comprehension and whether the importance of these pressure points varies as a function of the level of children's reading comprehension. A sample of 245 third-grade children were given an assessment battery…

  10. Current Single Event Effects Results for Candidate Spacecraft Electronics for NASA

    NASA Technical Reports Server (NTRS)

    OBryan, Martha V.; Seidleck, Christina M.; Carts, Martin A.; LaBel, Kenneth A.; Marshall, Cheryl J.; Reed, Robert A.; Sanders, Anthony B.; Hawkins, Donald K.; Cox, Stephen R.; Kniffin, Scott D.

    2004-01-01

    We present data on the vulnerability of a variety of candidate spacecraft electronics to proton and heavy ion induced single event effects. Devices tested include digital, analog, linear bipolar, and hybrid devices, among others.

  11. Single Event Effects Results for Candidate Spacecraft Electronics for NASA

    NASA Technical Reports Server (NTRS)

    O'Bryan, Martha; LaBel, Kenneth A.; Kniffin, Scott D.; Howard, James W., Jr.; Poivey, Christian; Ladbury, Ray L.; Buchner, Stephen P.; Xapsos, Michael; Reed, Robert A.; Sanders, Anthony B.

    2003-01-01

    We present data on the vulnerability of a variety of candidate spacecraft electronics to proton and heavy ion induced single event effects. Devices tested include digital, analog, linear bipolar, and hybrid devices, among others.

  12. Safety in Urban Environment and Emergency Notice Boards

    NASA Astrophysics Data System (ADS)

    Confortini, Claudia; Tira, Maurizio

    2008-07-01

    Reliable and safe urban system conditions have to be a crucial goal of ordinary planning activities. Among planning goals, priority must be given to indications relating to the safety levels to be achieved and to the amount of resources to be directed towards reducing the vulnerability of urban systems and therefore of the measures to be taken. Uban vulnerability cannot in fact be reduced to the sum of the vulnerability of single buildings or to the physical vulnerability of its various components. This research work consists of identifying those urban sub-areas that are important for safety in relation to natural risks, ambits that should be highlighted by means of permanent emergency notice boards/billboards. What are the hazard notices relating to all natural hazards and related risks? Where are they located? Are they clear and straightforward so that all residents and visitors are able to understand them, as it is already the case for road signs (or at least it should be)? What urban sub-areas are worth highlighting in relation to natural risks, acting for example as escape routes or meeting points? How is information for the public managed in order that people are immediately, easily and regularly notified? What is the relation of such signals to ordinary traffic signals? Research into the state of the art of permanent notice boards/billboards of this type, currently distinguished only by sporadic and local initiatives, aims at carrying out a census of and recognizing urban elements already considered as important for reducing the vulnerability of the urban system to different natural calamities and at providing new highlights as regards the identification of new ones. The next step is to work out a decision and common-language strategy for planning these elements and for their adequate signposting, so as to be able to live in the urban environment with awareness, safety and confidence, including with respect to more remote and therefore often neglected natural risks. The paper deals with literature in the field and shows the results of the few relevant case studies at work.

  13. Vulnerability to re-entry in simulated two-dimensional cardiac tissue: effects of electrical restitution and stimulation sequence.

    PubMed

    Tran, Diana X; Yang, Ming-Jim; Weiss, James N; Garfinkel, Alan; Qu, Zhilin

    2007-12-01

    Ventricular fibrillation is a lethal arrhythmia characterized by multiple wavelets usually starting from a single or figure-of-eight re-entrant circuit. Understanding the factors regulating vulnerability to the re-entry is essential for developing effective therapeutic strategies to prevent ventricular fibrillation. In this study, we investigated how pre-existing tissue heterogeneities and electrical restitution properties affect the initiation of re-entry by premature extrastimuli in two-dimensional cardiac tissue models. We studied two pacing protocols for inducing re-entry following the "sinus" rhythm (S1) beat: (1) a single premature (S2) extrastimulus in heterogeneous tissue; (2) two premature extrastimuli (S2 and S3) in homogeneous tissue. In the first case, the vulnerable window of re-entry is determined by the spatial dimension and extent of the heterogeneity, and is also affected by electrical restitution properties and the location of the premature stimulus. The vulnerable window first increases as the action potential duration (APD) difference between the inside and outside of the heterogeneous region increases, but then decreases as this difference increases further. Steeper APD restitution reduces the vulnerable window of re-entry. In the second case, electrical restitution plays an essential role. When APD restitution is flat, no re-entry can be induced. When APD restitution is steep, re-entry can be induced by an S3 over a range of S1S2 intervals, which is also affected by conduction velocity restitution. When APD restitution is even steeper, the vulnerable window is reduced due to collision of the spiral tips.

  14. Do Single Mothers Take Their Share?: FAFSA Completion among Aid-Eligible Female Students

    ERIC Educational Resources Information Center

    Radey, Melissa; Cheatham, Leah P.

    2013-01-01

    Approximately 17% of college students are single mothers, a growing and vulnerable subpopulation of women (Miller, Gault, & Thorman, 2011). Although postsecondary education promotes poverty exit, many single mothers--40% of whom live below the poverty line--lack the financial resources for attendance. The Free Application for Federal Student…

  15. The perils of protection: vulnerability and women in clinical research.

    PubMed

    Schonfeld, Toby

    2013-06-01

    Subpart B of 45 Code of Federal Regulations Part 46 (CFR) identifies the criteria according to which research involving pregnant women, human fetuses, and neonates can be conducted ethically in the United States. As such, pregnant women and fetuses fall into a category requiring "additional protections," often referred to as "vulnerable populations." The CFR does not define vulnerability, but merely gives examples of vulnerable groups by pointing to different categories of potential research subjects needing additional protections. In this paper, I assess critically the role of this categorization of pregnant women involved in research as "vulnerable," both as separate entities and in combination with the fetuses they carry. In particular, I do three things: (1) demonstrate that pregnant women qua pregnancy are either not "vulnerable" according to any meaningful definition of that term or that such vulnerability is irrelevant to her status as a research participant; (2) argue that while a fetus may be vulnerable in terms of dependency, this categorization does not equate to the vulnerability of the pregnant woman; and (3) suggest that any vulnerability that appends to women is precisely the result of federal regulations and dubious public perceptions about pregnant women. I conclude by demonstrating how this erroneous characterization of pregnant women as "vulnerable" and its associated protections have not only impeded vital research for pregnant women and their fetuses, but have also negatively affected the inclusion of all women in clinical research.

  16. Importance of biometrics to addressing vulnerabilities of the U.S. infrastructure

    NASA Astrophysics Data System (ADS)

    Arndt, Craig M.; Hall, Nathaniel A.

    2004-08-01

    Human identification technologies are important threat countermeasures in minimizing select infrastructure vulnerabilities. Properly targeted countermeasures should be selected and integrated into an overall security solution based on disciplined analysis and modeling. Available data on infrastructure value, threat intelligence, and system vulnerabilities are carefully organized, analyzed and modeled. Prior to design and deployment of an effective countermeasure; the proper role and appropriateness of technology in addressing the overall set of vulnerabilities is established. Deployment of biometrics systems, as with other countermeasures, introduces potentially heightened vulnerabilities into the system. Heightened vulnerabilities may arise from both the newly introduced system complexities and an unfocused understanding of the set of vulnerabilities impacted by the new countermeasure. The countermeasure's own inherent vulnerabilities and those introduced by the system's integration with the existing system are analyzed and modeled to determine the overall vulnerability impact. The United States infrastructure is composed of government and private assets. The infrastructure is valued by their potential impact on several components: human physical safety, physical/information replacement/repair cost, potential contribution to future loss (criticality in weapons production), direct productivity output, national macro-economic output/productivity, and information integrity. These components must be considered in determining the overall impact of an infrastructure security breach. Cost/benefit analysis is then incorporated in the security technology deployment decision process. Overall security risks based on system vulnerabilities and threat intelligence determines areas of potential benefit. Biometric countermeasures are often considered when additional security at intended points of entry would minimize vulnerabilities.

  17. Vulnerability assessment of medieval civic towers as a tool for retrofitting design

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Casciati, Sara; Faravelli, Lucia

    2008-07-08

    The seismic vulnerability of an ancient civic bell-tower is studied. Rather than seeing it as an intermediate stage toward a risk analysis, the assessment of vulnerability is here pursued for the purpose of optimizing the retrofit design. The vulnerability curves are drawn by carrying out a single time history analysis of a model calibrated on the basis of experimental data. From the results of this analysis, the medians of three selected performance parameters are estimated, and they are used to compute, for each of them, the probability of exceeding or attaining the three corresponding levels of light, moderate and severemore » damage. The same numerical model is then used to incorporate the effects of several retrofitting solutions and to re-estimate the associated vulnerability curves. The ultimate goal is to provide a numerical tool able to drive the optimization process of a retrofit design by the comparison of the vulnerability estimates associated with the different retrofitting solutions.« less

  18. Region 9 - Social Vulnerability Index

    EPA Pesticide Factsheets

    The Social Vulnerability Index is derived from the 2000 US Census data. The fields included are percent minority, median household income, age (under 18 and over 64), population without a high school diploma, linguistically isolated households, and single female head of households with own children under 18 (single moms). The data is at the block group level. Each field for each block group is assigned an index score of 0-3, based on whether the value of that dataset falls in the top quartile (score=3), second quartile (score=2), third quartile (score=1), or bottom quartile (score=0). The scores for each field are then added together to assign a comprehensive score to each block group (0-21). The highest scores are block groups that have the highest percentage of sensitive populations (highest percent minority, lowest per capita income, highest percent of population under 18 and over 64, highest percentage of population without a high school degree, highest percent of linguistically isolated households, and highest percent of single female head of households). Zoe Heller of the US EPA Region 9's Communities and Ecosystems Division, is responsible for the design and development of the Social Vulnerability Index data set.

  19. Arizona - Social Vulnerability Index

    EPA Pesticide Factsheets

    The Social Vulnerability Index is derived from the 2000 US Census data. The fields included are percent minority, median household income, age (under 18 and over 64), population without a high school diploma, linguistically isolated households, and single female head of households with own children under 18 (single moms). The data is at the block group level. Each field for each block group is assigned an index score of 0-3, based on whether the value of that dataset falls in the top quartile (score=3), second quartile (score=2), third quartile (score=1), or bottom quartile (score=0). The scores for each field are then added together to assign a comprehensive score to each block group (0-21). The highest scores are block groups that have the highest percentage of sensitive populations (highest percent minority, lowest per capita income, highest percent of population under 18 and over 64, highest percentage of population without a high school degree, highest percent of linguistically isolated households, and highest percent of single female head of households). Zoe Heller of the US EPA Region 9's Communities and Ecosystems Division, is responsible for the design and development of the Social Vulnerability Index data set.

  20. Quantitative assessment of key parameters in qualitative vulnerability methods applied in karst systems based on an integrated numerical modelling approach

    NASA Astrophysics Data System (ADS)

    Doummar, Joanna; Kassem, Assaad

    2017-04-01

    In the framework of a three-year PEER (USAID/NSF) funded project, flow in a Karst system in Lebanon (Assal) dominated by snow and semi arid conditions was simulated and successfully calibrated using an integrated numerical model (MIKE-She 2016) based on high resolution input data and detailed catchment characterization. Point source infiltration and fast flow pathways were simulated by a bypass function and a high conductive lens respectively. The approach consisted of identifying all the factors used in qualitative vulnerability methods (COP, EPIK, PI, DRASTIC, GOD) applied in karst systems and to assess their influence on recharge signals in the different hydrological karst compartments (Atmosphere, Unsaturated zone and Saturated zone) based on the integrated numerical model. These parameters are usually attributed different weights according to their estimated impact on Groundwater vulnerability. The aim of this work is to quantify the importance of each of these parameters and outline parameters that are not accounted for in standard methods, but that might play a role in the vulnerability of a system. The spatial distribution of the detailed evapotranspiration, infiltration, and recharge signals from atmosphere to unsaturated zone to saturated zone was compared and contrasted among different surface settings and under varying flow conditions (e.g., in varying slopes, land cover, precipitation intensity, and soil properties as well point source infiltration). Furthermore a sensitivity analysis of individual or coupled major parameters allows quantifying their impact on recharge and indirectly on vulnerability. The preliminary analysis yields a new methodology that accounts for most of the factors influencing vulnerability while refining the weights attributed to each one of them, based on a quantitative approach.

  1. GRiP - A flexible approach for calculating risk as a function of consequence, vulnerability, and threat.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Whitfield, R. G.; Buehring, W. A.; Bassett, G. W.

    2011-04-08

    Get a GRiP (Gravitational Risk Procedure) on risk by using an approach inspired by the physics of gravitational forces between body masses! In April 2010, U.S. Department of Homeland Security Special Events staff (Protective Security Advisors [PSAs]) expressed concern about how to calculate risk given measures of consequence, vulnerability, and threat. The PSAs believed that it is not 'right' to assign zero risk, as a multiplicative formula would imply, to cases in which the threat is reported to be extremely small, and perhaps could even be assigned a value of zero, but for which consequences and vulnerability are potentially high.more » They needed a different way to aggregate the components into an overall measure of risk. To address these concerns, GRiP was proposed and developed. The inspiration for GRiP is Sir Isaac Newton's Universal Law of Gravitation: the attractive force between two bodies is directly proportional to the product of their masses and inversely proportional to the squares of the distance between them. The total force on one body is the sum of the forces from 'other bodies' that influence that body. In the case of risk, the 'other bodies' are the components of risk (R): consequence, vulnerability, and threat (which we denote as C, V, and T, respectively). GRiP treats risk as if it were a body within a cube. Each vertex (corner) of the cube represents one of the eight combinations of minimum and maximum 'values' for consequence, vulnerability, and threat. The risk at each of the vertices is a variable that can be set. Naturally, maximum risk occurs when consequence, vulnerability, and threat are at their maximum values; minimum risk occurs when they are at their minimum values. Analogous to gravitational forces among body masses, the GRiP formula for risk states that the risk at any interior point of the box depends on the squares of the distances from that point to each of the eight vertices. The risk value at an interior (movable) point will be dominated by the value of one vertex as that point moves closer and closer to that one vertex. GRiP is a visualization tool that helps analysts better understand risk and its relationship to consequence, vulnerability, and threat. Estimates of consequence, vulnerability, and threat are external to GRiP; however, the GRiP approach can be linked to models or data that provide estimates of consequence, vulnerability, and threat. For example, the Enhanced Critical Infrastructure Program/Infrastructure Survey Tool produces a vulnerability index (scaled from 0 to 100) that can be used for the vulnerability component of GRiP. We recognize that the values used for risk components can be point estimates and that, in fact, there is uncertainty regarding the exact values of C, V, and T. When we use T = t{sub o} (where t{sub o} is a value of threat in its range), we mean that threat is believed to be in an interval around t{sub o}. Hence, a value of t{sub o} = 0 indicates a 'best estimate' that the threat level is equal to zero, but still allows that it is not impossible for the threat to occur. When t{sub o} = 0 but is potentially small and not exactly zero, there will be little impact on the overall risk value as long as the C and V components are not large. However, when C and/or V have large values, there can be large differences in risk given t{sub o} = 0, and t{sub o} = epsilon (where epsilon is small but greater than a value of zero). We believe this scenario explains the PSA's intuition that risk is not equal to zero when t{sub o} = 0 and C and/or V have large values. (They may also be thinking that if C has an extremely large value, it is unlikely that T is equal to 0; in the terrorist context, T would likely be dependent on C when C is extremely large.) The PSAs are implicitly recognizing the potential that t{sub o} = epsilon. One way to take this possible scenario into account is to replace point estimates for risk with interval values that reflect the uncertainty in the risk components. In fact, one could argue that T never equals zero for a man-made hazard. This paper describes the thought process that led to the GRiP approach and the mathematical formula for GRiP and presents a few examples that will provide insights about how to use GRiP and interpret its results.« less

  2. Graph modeling systems and methods

    DOEpatents

    Neergaard, Mike

    2015-10-13

    An apparatus and a method for vulnerability and reliability modeling are provided. The method generally includes constructing a graph model of a physical network using a computer, the graph model including a plurality of terminating vertices to represent nodes in the physical network, a plurality of edges to represent transmission paths in the physical network, and a non-terminating vertex to represent a non-nodal vulnerability along a transmission path in the physical network. The method additionally includes evaluating the vulnerability and reliability of the physical network using the constructed graph model, wherein the vulnerability and reliability evaluation includes a determination of whether each terminating and non-terminating vertex represents a critical point of failure. The method can be utilized to evaluate wide variety of networks, including power grid infrastructures, communication network topologies, and fluid distribution systems.

  3. Fault Lines in New Labour's Education Project: Points for Intervention and Resistance

    ERIC Educational Resources Information Center

    Coles, Jane

    2006-01-01

    This article argues that New Labour's third term education policies are riddled with internal contradictions. The author explores key tension points and suggests that fractures might be opened up where the government is most vulnerable to critical scrutiny and interventions by grassroots resistance.

  4. Injury protection and accident causation parameters for vulnerable road users based on German In-Depth Accident Study GIDAS.

    PubMed

    Otte, Dietmar; Jänsch, Michael; Haasper, Carl

    2012-01-01

    Within a study of accident data from GIDAS (German In-Depth Accident Study), vulnerable road users are investigated regarding injury risk in traffic accidents. GIDAS is the largest in-depth accident study in Germany. Due to a well-defined sampling plan, representativeness with respect to the federal statistics is also guaranteed. A hierarchical system ACASS (Accident Causation Analysis with Seven Steps) was developed in GIDAS, describing the human causation factors in a chronological sequence. The accordingly classified causation factors - derived from the systematic of the analysis of human accident causes ("7 steps") - can be used to describe the influence of accident causes on the injury outcome. The bases of the study are accident documentations over ten years from 1999 to 2008 with 8204 vulnerable road users (VRU), of which 3 different groups were selected as pedestrians n=2041, motorcyclists n=2199 and bicyclists n=3964, and analyzed on collisions with cars and trucks as well as vulnerable road users alone. The paper will give a description of the injury pattern and injury mechanisms of accidents. The injury frequencies and severities are pointed out considering different types of VRU and protective measures of helmet and clothes of the human body. The impact points are demonstrated on the car, following to conclusion of protective measures on the vehicle. Existing standards of protection devices as well as interdisciplinary research, including accident and injury statistics, are described. With this paper, a summarization of the existing possibilities on protective measures for pedestrians, bicyclists and motorcyclists is given and discussed by comparison of all three groups of vulnerable road users. Also the relevance of special impact situations and accident causes mainly responsible for severe injuries are pointed out, given the new orientation of research for the avoidance and reduction of accident patterns. 2010 Elsevier Ltd. All rights reserved.

  5. Thin-film optoacoustic transducers for subcellular Brillouin oscillation imaging of individual biological cells.

    PubMed

    Pérez-Cota, Fernando; Smith, Richard J; Moradi, Emilia; Marques, Leonel; Webb, Kevin F; Clark, Matt

    2015-10-01

    At low frequencies ultrasound is a valuable tool to mechanically characterize and image biological tissues. There is much interest in using high-frequency ultrasound to investigate single cells. Mechanical characterization of vegetal and biological cells by measurement of Brillouin oscillations has been demonstrated using ultrasound in the GHz range. This paper presents a method to extend this technique from the previously reported single-point measurements and line scans into a high-resolution acoustic imaging tool. Our technique uses a three-layered metal-dielectric-metal film as a transducer to launch acoustic waves into the cell we want to study. The design of this transducer and measuring system is optimized to overcome the vulnerability of a cell to the exposure of laser light and heat without sacrificing the signal-to-noise ratio. The transducer substrate shields the cell from the laser radiation, efficiently generates acoustic waves, facilitates optical detection in transmission, and aids with heat dissipation away from the cell. This paper discusses the design of the transducers and instrumentation and presents Brillouin frequency images on phantom, fixed, and living cells.

  6. Missouri River Flood 2011 Vulnerabilities Assessment Report. Volume 2 - Technical Report

    DTIC Science & Technology

    2012-10-01

    202 Figure 98. Dams damage/erosion: Gavins Point - Excess debris led to clogging of water intake at Hydropower Plant (under...and a description of the economic vulnerabilities related to Missouri River flooding, even beyond the impacts from 2011. 2.4.1.1 Geographic Extent...Database, 2011. Two nuclear power plants are located within the floodplain, which poses potential risks to health and safety of nearby populations as a

  7. Clarifying the prospective relationships between social anxiety and eating disorder symptoms and underlying vulnerabilities

    PubMed Central

    Levinson, Cheri A.; Rodebaugh, Thomas L.

    2016-01-01

    Social anxiety and eating disorders are highly comorbid. Several explanations for these high levels of comorbidity have been theorized. First, social anxiety might be a vulnerability factor for eating disorders. Second, eating disorders might be a vulnerability factor for social anxiety. Third, the two kinds of disorders may have common, shared psychological vulnerabilities. The current study (N = 300 undergraduate women) investigates a model of social anxiety and eating disorder symptoms that examines each of these possibilities across two time points (Time 1 and six months later). We do not find support for either social anxiety or eating disorder symptoms per se predicting each other across time. Instead, we find that some underlying vulnerabilities prospectively predict symptoms of both disorders, whereas other vulnerabilities are specific to symptoms of one disorder. Specifically we find that maladaptive perfectionism is a shared prospective vulnerability for social anxiety and eating disorder symptoms. Alternatively, we find that social appearance anxiety is specific for eating disorder symptoms, whereas high standards is specific for social anxiety symptoms. These data help clarify our understanding of how and why social anxiety and eating disorder symptoms frequently co-occur. PMID:27444957

  8. Transactional relationships among cognitive vulnerabilities, stressors, and depressive symptoms in adolescence.

    PubMed

    Calvete, Esther; Orue, Izaskun; Hankin, Benjamin L

    2013-04-01

    The transactional cognitive vulnerability to stress model Hankin & Abramson (Psychological Bulletin, 127:773-796, 2001) extends the traditional diathesis-stress model by proposing that the relationships among cognitions, depressive symptoms, and stressors are dynamic and bidirectional. In this study three different pathways among these variables were assessed simultaneously: (1) cognitive vulnerabilities and stressors as predictors of depressive symptoms (vulnerability model), (2) depressive symptoms and cognitive vulnerabilities as predictors of stressors (stress generation model), and (3) depressive symptoms and stressors as predictors of cognitive vulnerabilities (consequence model). A fully cross-lagged design panel was employed with 1,187 adolescents (545 girls and 642 boys, Mean Age = 13.42 years) who were assessed at two time points separated by 6 months. They completed measures of cognitive vulnerabilities (maladaptive schema domains and negative inferential style), stressors, and depressive symptoms. Inferential style and schemas of the disconnection and rejection domain predicted prospective increases in depressive symptoms. Initial levels of depressive symptoms and most cognitive vulnerabilities predicted greater stress generation. Initial levels of stressors and depressive symptoms predicted an increase in negative inferential style and maladaptive schema domains over time. These bidirectional relationships were mostly similar for boys and girls, although there were a few gender differences. The findings support a transactional model with reciprocal relationships among stress, depressive symptoms, and cognitive vulnerabilities. Transactional implications for depression interventions among adolescents are discussed.

  9. Factors associated with resilience to and recovery from burnout: a prospective, multi-institutional study of US medical students.

    PubMed

    Dyrbye, Liselotte N; Power, David V; Massie, F Stanford; Eacker, Anne; Harper, William; Thomas, Matthew R; Szydlo, Daniel W; Sloan, Jeff A; Shanafelt, Tait D

    2010-10-01

    Burnout is prevalent among medical students and is a predictor of subsequent serious consideration of dropping out of medical school and suicide ideation. Understanding of the factors that protect against burnout is needed to guide student wellness programmes. A total of 1321 medical students attending five institutions were studied longitudinally (2006-2007). The surveys included standardised instruments to evaluate burnout, quality of life, fatigue and stress. Additional items explored social support, learning climate, life events, employment status and demographics. Students who did not have burnout at either time-point (resilient students) were compared with those who indicated burnout at one or both time-points (vulnerable students) using a Wilcoxon-Mann-Whitney test or Fisher's exact test. Similarly, the differences between those who recovered and those who were chronically burned out were also compared in students with burnout at the first time-point. Logistic regression modelling was employed to evaluate associations between the independent variables and resiliency to and recovery from burnout. Overall, 792 (60.0%) students completed the burnout inventory at both time-points. No differences in demographic characteristics were observed between resilient (290/792 [36.6%]) and vulnerable (502/792 [63.4%]) students. Resilient students were less likely to experience depression, had a higher quality of life, were less likely to be employed, had experienced fewer stressful life events, reported higher levels of social support, perceived their learning climate more positively and experienced less stress and fatigue (all p < 0.05) than vulnerable students. On multivariable analysis, perceiving student education as a priority for faculty staff, experiencing less stress, not being employed and being a minority were factors independently associated with recovery from burnout. Modifiable individual factors and learning climate characteristics including employment status, stress level and perceptions of the prioritising of student education by faculty members relate to medical students' vulnerability to burnout. © Blackwell Publishing Ltd 2010.

  10. Multidimensional Approach for Tsunami Vulnerability Assessment: Framing the Territorial Impacts in Two Municipalities in Portugal.

    PubMed

    Tavares, Alexandre Oliveira; Barros, José Leandro; Santos, Angela

    2017-04-01

    This study presents a new multidimensional methodology for tsunami vulnerability assessment that combines the morphological, structural, social, and tax component of vulnerability. This new approach can be distinguished from previous methodologies that focused primarily on the evaluation of potentially affected buildings and did not use tsunami numerical modeling. The methodology was applied to the Figueira da Foz and Vila do Bispo municipalities in Portugal. For each area, the potential tsunami-inundated areas were calculated considering the 1755 Lisbon tsunami, which is the greatest disaster caused by natural hazards that ever occurred in Portugal. Furthermore, the four components of the vulnerability were calculated to obtain a composite vulnerability index. This methodology enables us to differentiate the two areas in their vulnerability, highlighting the characteristics of the territory components. This methodology can be a starting point for the creation of a local assessment framework at the municipal scale related to tsunami risk. In addition, the methodology is an important support for the different local stakeholders. © 2016 Society for Risk Analysis.

  11. Microbiological Food Safety for Vulnerable People

    PubMed Central

    Lund, Barbara M.

    2015-01-01

    Foodborne pathogens are more likely to cause infection and to result in serious consequences in vulnerable people than in healthy adults. People with some increase in susceptibility may form nearly 20% of the population in the UK and the USA. Conditions leading to increased susceptibility are listed. The main factors leading to foodborne disease caused by major pathogens are outlined and examples are given of outbreaks resulting from these factors. Measures to prevent foodborne disease include procedures based on Hazard Analysis Critical Control Point principles and prerequisite programmes and, especially for vulnerable people, the use of lower-risk foods in place of higher-risk products. PMID:26308030

  12. Topological Analysis of Wireless Networks (TAWN)

    DTIC Science & Technology

    2016-05-31

    transmissions from any other node. Definition 1. A wireless network vulnerability is its susceptibility to becoming disconnected when a single source of...19b. TELEPHONE NUMBER (Include area code) 31-05-2016 FINAL REPORT 12-02-2015 -- 31-05-2016 Topological Analysis of Wireless Networks (TAWN) Robinson...Release, Distribution Unlimited) N/A The goal of this project was to develop topological methods to detect and localize vulnerabilities of wireless

  13. Inductionless or limited shock testing is possible in most patients with implantable cardioverter- defibrillators/cardiac resynchronization therapy defibrillators: results of the multicenter ASSURE Study (Arrhythmia Single Shock Defibrillation Threshold Testing Versus Upper Limit of Vulnerability: Risk Reduction Evaluation With Implantable Cardioverter-Defibrillator Implantations).

    PubMed

    Day, John D; Doshi, Rahul N; Belott, Peter; Birgersdotter-Green, Ulrika; Behboodikhah, Mahnaz; Ott, Peter; Glatter, Kathryn A; Tobias, Serge; Frumin, Howard; Lee, Byron K; Merillat, John; Wiener, Isaac; Wang, Samuel; Grogin, Harlan; Chun, Sung; Patrawalla, Rob; Crandall, Brian; Osborn, Jeffrey S; Weiss, J Peter; Lappe, Donald L; Neuman, Stacey

    2007-05-08

    Implantable cardioverter-defibrillators and cardiac resynchronization therapy defibrillators have relied on multiple ventricular fibrillation (VF) induction/defibrillation tests at implantation to ensure that the device can reliably sense, detect, and convert VF. The ASSURE Study (Arrhythmia Single Shock Defibrillation Threshold Testing Versus Upper Limit of Vulnerability: Risk Reduction Evaluation With Implantable Cardioverter-Defibrillator Implantations) is the first large, multicenter, prospective trial comparing vulnerability safety margin testing versus defibrillation safety margin testing with a single VF induction/defibrillation. A total of 426 patients receiving an implantable cardioverter-defibrillator or cardiac resynchronization therapy defibrillator underwent vulnerability safety margin or defibrillation safety margin screening at 14 J in a randomized order. After this, patients underwent confirmatory testing, which required 2 VF conversions without failure at < or = 21 J. Patients who passed their first 14-J and confirmatory tests, irrespective of the results of their second 14-J test, had their devices programmed to a 21-J shock for ventricular tachycardia (VT) or VF > or = 200 bpm and were followed up for 1 year. Of 420 patients who underwent 14-J vulnerability safety margin screening, 322 (76.7%) passed. Of these, 317 (98.4%) also passed 21-J confirmatory tests. Of 416 patients who underwent 14-J defibrillation safety margin screening, 343 (82.5%) passed, and 338 (98.5%) also passed 21-J confirmatory tests. Most clinical VT/VF episodes (32 of 37, or 86%) were terminated by the first shock, with no difference in first shock success. In all observed cases in which the first shock was unsuccessful, subsequent shocks terminated VT/VF without complication. Although spontaneous episodes of fast VT/VF were limited, there was no difference in the odds of first shock efficacy between groups. Screening with vulnerability safety margin or defibrillation safety margin may allow for inductionless or limited shock testing in most patients.

  14. Risk of the residents, infrastructure and water bodies by flash floods and sediment transport - assessment for scale of the Czech Republic

    NASA Astrophysics Data System (ADS)

    Dostál, Tomáš; Krása, Josef; Bauer, Miroslav; Strouhal, Luděk; Jáchymová, Barbora; Devátý, Jan; David, Václav; Koudelka, Petr; Dočkal, Martin

    2015-04-01

    Pluvial and flash floods, related to massive sediment transport become phenomenon nowadays, under conditions of climate changes. Storm events, related to material damages appear at unexpected places and their effective control is only possible in form of prevention. To apply preventive measures, there have to be defined localities with reasonable reliability, which are endangered by surface runoff and sediment transport produced in the subcatchments, often at agriculturally used landscape. Classification of such localities, concerning of potential damages and magnitude of sediment transport shall be also included within the analyses, to design control measures effectively. Large scale project for whole territory of the Czech Republic (ca 80.000 km2) has therefore been granted b the Ministry of Interior of the Czech Republic, with the aim to define critical points, where interaction between surface runoff connected to massive sediment transport and infrastructure or vulnerable water bodies can occur and to classify them according to potential risk. Advanced GIS routines, based on analyses of land use, soil conditions and morphology had been used to determine the critical points - points, where significant surface runoff occurs and interacts with infrastructure and vulnerable water bodies, based exclusively on the contributing area - flow accumulation. In total, ca 150.000 critical points were determined within the Czech Republic. For each of critical points, its subcatchment had then been analyzed in detail, concerning of soil loss and sediment transport, using simulation model WATEM/SEDEM. The results were used for classification of potential risk of individual critical points, based on mean soil loss within subcatchment, total sediment transport trough the outlet point and subcatchment area. The classification has been done into 5 classes. The boundaries were determined by calibration survey and statistical analysis, performed at three experimental catchments area of 100 km2 each. Concentrated flow trajectory had then been analyzed trough urban areas and potential vulnerability of incident structures has been determined. Total hazard of infrastructure has been classified again into 5 categories for each individual critical point using risk matrix, combining threat and vulnerability features. Generalized control measures (changes in land-use, changes in agrotechnology, diverting linear measures or retention structures) were then introduced into mathematical model WATEM/SEDEM in number of scenarios, to allow effective design of control measures against surface runoff and sediment transport for each individual critical point. Result of the project will be public available by WEB application and shall be useful for government, local decision makers, for planning of development of communities and also optimization of effective design of flash floods control measures. The research has been supported by the research project VG20122015092.

  15. Combining structure-from-motion derived point clouds from satellites and unmanned aircraft systems images with ground-truth data to create high-resolution digital elevation models

    NASA Astrophysics Data System (ADS)

    Palaseanu, M.; Thatcher, C.; Danielson, J.; Gesch, D. B.; Poppenga, S.; Kottermair, M.; Jalandoni, A.; Carlson, E.

    2016-12-01

    Coastal topographic and bathymetric (topobathymetric) data with high spatial resolution (1-meter or better) and high vertical accuracy are needed to assess the vulnerability of Pacific Islands to climate change impacts, including sea level rise. According to the Intergovernmental Panel on Climate Change reports, low-lying atolls in the Pacific Ocean are extremely vulnerable to king tide events, storm surge, tsunamis, and sea-level rise. The lack of coastal topobathymetric data has been identified as a critical data gap for climate vulnerability and adaptation efforts in the Republic of the Marshall Islands (RMI). For Majuro Atoll, home to the largest city of RMI, the only elevation dataset currently available is the Shuttle Radar Topography Mission data which has a 30-meter spatial resolution and 16-meter vertical accuracy (expressed as linear error at 90%). To generate high-resolution digital elevation models (DEMs) in the RMI, elevation information and photographic imagery have been collected from field surveys using GNSS/total station and unmanned aerial vehicles for Structure-from-Motion (SfM) point cloud generation. Digital Globe WorldView II imagery was processed to create SfM point clouds to fill in gaps in the point cloud derived from the higher resolution UAS photos. The combined point cloud data is filtered and classified to bare-earth and georeferenced using the GNSS data acquired on roads and along survey transects perpendicular to the coast. A total station was used to collect elevation data under tree canopies where heavy vegetation cover blocked the view of GNSS satellites. A subset of the GPS / total station data was set aside for error assessment of the resulting DEM.

  16. Advanced Fault Diagnosis Methods in Molecular Networks

    PubMed Central

    Habibi, Iman; Emamian, Effat S.; Abdi, Ali

    2014-01-01

    Analysis of the failure of cell signaling networks is an important topic in systems biology and has applications in target discovery and drug development. In this paper, some advanced methods for fault diagnosis in signaling networks are developed and then applied to a caspase network and an SHP2 network. The goal is to understand how, and to what extent, the dysfunction of molecules in a network contributes to the failure of the entire network. Network dysfunction (failure) is defined as failure to produce the expected outputs in response to the input signals. Vulnerability level of a molecule is defined as the probability of the network failure, when the molecule is dysfunctional. In this study, a method to calculate the vulnerability level of single molecules for different combinations of input signals is developed. Furthermore, a more complex yet biologically meaningful method for calculating the multi-fault vulnerability levels is suggested, in which two or more molecules are simultaneously dysfunctional. Finally, a method is developed for fault diagnosis of networks based on a ternary logic model, which considers three activity levels for a molecule instead of the previously published binary logic model, and provides equations for the vulnerabilities of molecules in a ternary framework. Multi-fault analysis shows that the pairs of molecules with high vulnerability typically include a highly vulnerable molecule identified by the single fault analysis. The ternary fault analysis for the caspase network shows that predictions obtained using the more complex ternary model are about the same as the predictions of the simpler binary approach. This study suggests that by increasing the number of activity levels the complexity of the model grows; however, the predictive power of the ternary model does not appear to be increased proportionally. PMID:25290670

  17. [Environmental, social, and roadway vulnerability in accidents involving transportation of hazardous products: a case study of the BR-101 highway between Osório and Torres in Rio Grande do Sul State, Brazil].

    PubMed

    Tinoco, Maria Auxiliadora Cannarozzo; Nodari, Christine Tessele; Pereira, Kimberllyn Rosa da Silva

    2016-09-19

    This study aimed to assess the environmental and social vulnerability and identify critical highway stretches for accidents involving transportation of hazardous products on the BR-101 highway between the cities of Osório and Torres in Rio Grande do Sul State, Brazil. The study's approach consisted of a multiple-criteria analysis combining highway safety analysis and environmental and social vulnerability analysis in the occurrence of accidents with hazardous products, plus cartographic analysis techniques. Thirty-eight kilometers of the highway showed high vulnerability, of which 8 kilometers with critical vulnerability, associated with bridges over rivers, water uptake points, a tunnel, environmental preservation areas, and an urban area. These stretches should be prioritized when developing action plans for accident mitigation and development of public policies for this highway. This proved to be an unprecedented approach when compared to existing studies and a potentially useful tool for decision-making in emergency operations.

  18. CONFU: Configuration Fuzzing Testing Framework for Software Vulnerability Detection

    PubMed Central

    Dai, Huning; Murphy, Christian; Kaiser, Gail

    2010-01-01

    Many software security vulnerabilities only reveal themselves under certain conditions, i.e., particular configurations and inputs together with a certain runtime environment. One approach to detecting these vulnerabilities is fuzz testing. However, typical fuzz testing makes no guarantees regarding the syntactic and semantic validity of the input, or of how much of the input space will be explored. To address these problems, we present a new testing methodology called Configuration Fuzzing. Configuration Fuzzing is a technique whereby the configuration of the running application is mutated at certain execution points, in order to check for vulnerabilities that only arise in certain conditions. As the application runs in the deployment environment, this testing technique continuously fuzzes the configuration and checks “security invariants” that, if violated, indicate a vulnerability. We discuss the approach and introduce a prototype framework called ConFu (CONfiguration FUzzing testing framework) for implementation. We also present the results of case studies that demonstrate the approach’s feasibility and evaluate its performance. PMID:21037923

  19. Groundwater vulnerability and risk mapping using GIS, modeling and a fuzzy logic tool.

    PubMed

    Nobre, R C M; Rotunno Filho, O C; Mansur, W J; Nobre, M M M; Cosenza, C A N

    2007-12-07

    A groundwater vulnerability and risk mapping assessment, based on a source-pathway-receptor approach, is presented for an urban coastal aquifer in northeastern Brazil. A modified version of the DRASTIC methodology was used to map the intrinsic and specific groundwater vulnerability of a 292 km(2) study area. A fuzzy hierarchy methodology was adopted to evaluate the potential contaminant source index, including diffuse and point sources. Numerical modeling was performed for delineation of well capture zones, using MODFLOW and MODPATH. The integration of these elements provided the mechanism to assess groundwater pollution risks and identify areas that must be prioritized in terms of groundwater monitoring and restriction on use. A groundwater quality index based on nitrate and chloride concentrations was calculated, which had a positive correlation with the specific vulnerability index.

  20. Socio-economic vulnerability of coastal communities in southern Thailand: the development of adaptation strategies

    NASA Astrophysics Data System (ADS)

    Willroth, P.; Massmann, F.; Wehrhahn, R.; Revilla Diez, J.

    2012-08-01

    The tsunami of December 2004 impacted large areas of Thailand's coastline and caused severe human and economic losses. The recovery period revealed differences in the vulnerabilities of communities affected. An understanding of the causal factors of vulnerability is crucial for minimising the negative effects of future threats and developing adaptive capacities. This paper analyses the vulnerabilities and the development of adaptation strategies in the booming tourist area of Khao Lak and in the predominantly fishing and agricultural area of Ban Nam Khem through a comprehensive vulnerability framework. The results show that social networks played a crucial role in coping with the disaster. Social cohesion is important for strengthening the community and developing successful adaptation strategies. The development of tourism and the turning away from traditional activities have a significant positive influence on the income situation, but create a dependency on a single business sector. It could be shown that households generating their income in the tourism sector were vulnerable unless they had diversified their income previously. Income diversification decreased the vulnerability in the study areas. Adaptation strategies and processes developed in the aftermath clearly address these issues.

  1. Can mother-infant interaction produce vulnerability to schizophrenia?

    PubMed

    Brody, E B

    1981-02-01

    Schizophrenia is regarded as a final common behavioral syndrome which may be arrived at though a variety of routes. Even with a probably genotype, environmental influence seems necessary for the phenotype to appear. The problem concerns the likelihood of an early experience-induced sequence of events within the person of infant and later adult vs. a continuing pathogenic environment. Either may or may not interact with a continuing genic factor(s) as a source of vulnerability. Vulnerability is here, then, viewed as epigenetically evolving via individual-environment transactions throughout life (although with major impacts from conception through adolescence). At any point, therapeutic intervention may preclude or minimize the actualization of the pathogenic potential. It may begin during pregnancy, with attention to such factors as diet, drugs, physical stress, and illness, influencing fetal development and obstetrical manipulations and the birth process. All influence earliest mother-infant interaction from the point of view both of the infant's evocation of maternal behavior and maternal responsivity. Therapeutic interventions also include attention to the multigenerational context of earliest interaction, with special reference to a woman's relationships with her own mother. At every point, nonspecific protective or pathogenic factors such as social support or stressful precipitating events may become important. Socioeconomic status appears to have a powerful nonspecific influence as the core of a cluster of factors which exert an enduring influence from infancy to adulthood. A continuing specific factor may reside in distorted communicative reciprocity between parent an child rooted in the preverbal period of infant development. Context-mediated cerebral deficits may influence learning capacity, hedonic capacity, behavioral rigidity, and many other factors leading ultimately to impaired social competence and increased vulnerability.

  2. Paint it Black: Using Change-Point Analysis to Investigate Increasing Vulnerability to Depression towards the End of Vincent van Gogh's Life.

    PubMed

    van Emmerik, Arnold A P; Hamaker, Ellen L

    2017-09-04

    This study investigated whether Vincent van Gogh became increasingly self-focused-and thus vulnerable to depression-towards the end of his life, through a quantitative analysis of his written pronoun use over time. A change-point analysis was conducted on the time series formed by the pronoun use in Van Gogh's letters. We used time as a predictor to see whether there was evidence for increased self-focus towards the end of Van Gogh's life, and we compared this to the pattern in the letters written before his move to Arles. Specifically, we examined Van Gogh's use of first person singular pronouns (FPSP) and first person plural pronouns (FPPP) in the 415 letters he wrote while working as an artist before his move to Arles, and in the next 248 letters he wrote after his move to Arles until his death in Auvers-sur-Oise. During the latter period, Van Gogh's use of FPSP showed an annual increase of 0.68% ( SE = 0.15, p < 0.001) and his use of FPPP showed an annual decrease of 0.23% ( SE = 0.04, p < 0.001), indicating increasing self-focus and vulnerability to depression. This trend differed from Van Gogh's pronoun use in the former period (which showed no significant trend in FPSP, and an annual increase of FPPP of 0.03%, SE = 0.02, p = 0.04). This study suggests that Van Gogh's death was preceded by a gradually increasing self-focus and vulnerability to depression. It also illustrates how existing methods (i.e., quantitative linguistic analysis and change-point analysis) can be combined to study specific research questions in innovative ways.

  3. Paint it Black: Using Change-Point Analysis to Investigate Increasing Vulnerability to Depression towards the End of Vincent van Gogh’s Life

    PubMed Central

    van Emmerik, Arnold A. P.; Hamaker, Ellen L.

    2017-01-01

    This study investigated whether Vincent van Gogh became increasingly self-focused—and thus vulnerable to depression—towards the end of his life, through a quantitative analysis of his written pronoun use over time. A change-point analysis was conducted on the time series formed by the pronoun use in Van Gogh’s letters. We used time as a predictor to see whether there was evidence for increased self-focus towards the end of Van Gogh’s life, and we compared this to the pattern in the letters written before his move to Arles. Specifically, we examined Van Gogh’s use of first person singular pronouns (FPSP) and first person plural pronouns (FPPP) in the 415 letters he wrote while working as an artist before his move to Arles, and in the next 248 letters he wrote after his move to Arles until his death in Auvers-sur-Oise. During the latter period, Van Gogh’s use of FPSP showed an annual increase of 0.68% (SE = 0.15, p < 0.001) and his use of FPPP showed an annual decrease of 0.23% (SE = 0.04, p < 0.001), indicating increasing self-focus and vulnerability to depression. This trend differed from Van Gogh’s pronoun use in the former period (which showed no significant trend in FPSP, and an annual increase of FPPP of 0.03%, SE = 0.02, p = 0.04). This study suggests that Van Gogh’s death was preceded by a gradually increasing self-focus and vulnerability to depression. It also illustrates how existing methods (i.e., quantitative linguistic analysis and change-point analysis) can be combined to study specific research questions in innovative ways. PMID:28869542

  4. Herb Hydraulics: Inter- and Intraspecific Variation in Three Ranunculus Species.

    PubMed

    Nolf, Markus; Rosani, Andrea; Ganthaler, Andrea; Beikircher, Barbara; Mayr, Stefan

    2016-04-01

    The requirements of the water transport system of small herbaceous species differ considerably from those of woody species. Despite their ecological importance for many biomes, knowledge regarding herb hydraulics remains very limited. We compared key hydraulic features (vulnerability to drought-induced hydraulic decline, pressure-volume relations, onset of cellular damage, in situ variation of water potential, and stomatal conductance) of three Ranunculus species differing in their soil humidity preferences and ecological amplitude. All species were very vulnerable to water stress (50% reduction in whole-leaf hydraulic conductance [kleaf] at -0.2 to -0.8 MPa). In species with narrow ecological amplitude, the drought-exposed Ranunculus bulbosus was less vulnerable to desiccation (analyzed via loss of kleaf and turgor loss point) than the humid-habitat Ranunculus lanuginosus Accordingly, water stress-exposed plants from the broad-amplitude Ranunculus acris revealed tendencies toward lower vulnerability to water stress (e.g. osmotic potential at full turgor, cell damage, and stomatal closure) than conspecific plants from the humid site. We show that small herbs can adjust to their habitat conditions on interspecific and intraspecific levels in various hydraulic parameters. The coordination of hydraulic thresholds (50% and 88% loss of kleaf, turgor loss point, and minimum in situ water potential) enabled the study species to avoid hydraulic failure and damage to living cells. Reversible recovery of hydraulic conductance, desiccation-tolerant seeds, or rhizomes may allow them to prioritize toward a more efficient but vulnerable water transport system while avoiding the severe effects that water stress poses on woody species. © 2016 American Society of Plant Biologists. All Rights Reserved.

  5. Herb Hydraulics: Inter- and Intraspecific Variation in Three Ranunculus Species1[OPEN

    PubMed Central

    Ganthaler, Andrea; Beikircher, Barbara

    2016-01-01

    The requirements of the water transport system of small herbaceous species differ considerably from those of woody species. Despite their ecological importance for many biomes, knowledge regarding herb hydraulics remains very limited. We compared key hydraulic features (vulnerability to drought-induced hydraulic decline, pressure-volume relations, onset of cellular damage, in situ variation of water potential, and stomatal conductance) of three Ranunculus species differing in their soil humidity preferences and ecological amplitude. All species were very vulnerable to water stress (50% reduction in whole-leaf hydraulic conductance [kleaf] at −0.2 to −0.8 MPa). In species with narrow ecological amplitude, the drought-exposed Ranunculus bulbosus was less vulnerable to desiccation (analyzed via loss of kleaf and turgor loss point) than the humid-habitat Ranunculus lanuginosus. Accordingly, water stress-exposed plants from the broad-amplitude Ranunculus acris revealed tendencies toward lower vulnerability to water stress (e.g. osmotic potential at full turgor, cell damage, and stomatal closure) than conspecific plants from the humid site. We show that small herbs can adjust to their habitat conditions on interspecific and intraspecific levels in various hydraulic parameters. The coordination of hydraulic thresholds (50% and 88% loss of kleaf, turgor loss point, and minimum in situ water potential) enabled the study species to avoid hydraulic failure and damage to living cells. Reversible recovery of hydraulic conductance, desiccation-tolerant seeds, or rhizomes may allow them to prioritize toward a more efficient but vulnerable water transport system while avoiding the severe effects that water stress poses on woody species. PMID:26896395

  6. Plant responses, climate pivot points, and trade-offs in water-limited ecosystems

    NASA Astrophysics Data System (ADS)

    Munson, S. M.; Bunting, E.

    2017-12-01

    Ecosystem transitions and thresholds are conceptually well-defined and have become a framework to address vegetation response to climate change and land-use intensification, yet there are few approaches to define the environmental conditions which can lead to them. We demonstrate a novel climate pivot point approach using long-term monitoring data from a broad network of permanent plots, satellite imagery, and experimental treatments across the southwestern U.S. The climate pivot point identifies conditions that lead to decreased plant performance and serves as an early warning sign of increased vulnerability of crossing a threshold into an altered ecosystem state. Plant responses and climate pivot points aligned with the lifespan and structural characteristics of species, were modified by soil and landscape attributes of a site, and had non-linear dynamics in some cases. Species with strong increases in abundance when water was available were most susceptible to losses during water shortages, reinforcing plant energetic and physiological tradeoffs. Future research to uncover the heterogeneity of plant responses and climate pivot points at multiple scales can lead to greater understanding of shifts in ecosystem productivity and vulnerability to climate change.

  7. A Framework for Programming and Budgeting for Cybersecurity

    DTIC Science & Technology

    2016-01-01

    environment in which hackers operate and extends beyond the confines of a single organization. Reducing the incen- tive for hacking and availability of...convey- ing to hackers that going after their organization entails a great deal of frustration (deterrence by denial) or risk (e.g., via hack -backs...components in the network: Systems are hacked because they have vulnerabilities (although a vulnerability-free system may be encounter risks from protocol

  8. Long-term drivers of vulnerability and resilience to drought in the Zambezi-Save area of southern Africa, 1505-1830

    NASA Astrophysics Data System (ADS)

    Hannaford, Matthew J.

    2018-07-01

    Historical studies of human interaction with climate are one approach through which to understand responses to environmental stress today. Most studies of vulnerability are based upon short timeframes in the recent past and so may focus on its symptoms rather than its underlying causes, or derive exclusively from systems-based approaches that can present historical change without recourse to human agency. This paper makes extensive use of the historical written record to analyse the comparative root-causes of the vulnerability and resilience of rural farming communities to drought over a period of three centuries (1505-1830) in the area between the Zambezi and Save rivers in southern Africa. The paper first considers vulnerability, resilience and adaptation as temporal frameworks, and analyses evidence for drought and its impacts in the pre-colonial past. It then reconstructs agro-ecosystem, livelihood and institutional vulnerability for six societies and settlements over the long-run using an indicator approach. The resultant trajectories of vulnerability are discussed in the context of the differential impacts of past drought, through which the decisive drivers and constraints of vulnerability and resilience are identified. The paper concludes with a number of key themes from this long-run analysis for contemporary vulnerability and adaptation to climate change, and points to the importance of institutional adaptation, normative goals, and uneven distributions of power.

  9. Social Vulnerability and Ebola Virus Disease in Rural Liberia.

    PubMed

    Stanturf, John A; Goodrick, Scott L; Warren, Melvin L; Charnley, Susan; Stegall, Christie M

    2015-01-01

    The Ebola virus disease (EVD) epidemic that has stricken thousands of people in the three West African countries of Liberia, Sierra Leone, and Guinea highlights the lack of adaptive capacity in post-conflict countries. The scarcity of health services in particular renders these populations vulnerable to multiple interacting stressors including food insecurity, climate change, and the cascading effects of disease epidemics such as EVD. However, the spatial distribution of vulnerable rural populations and the individual stressors contributing to their vulnerability are unknown. We developed a Social Vulnerability Classification using census indicators and mapped it at the district scale for Liberia. According to the Classification, we estimate that districts having the highest social vulnerability lie in the north and west of Liberia in Lofa, Bong, Grand Cape Mount, and Bomi Counties. Three of these counties together with the capital Monrovia and surrounding Montserrado and Margibi counties experienced the highest levels of EVD infections in Liberia. Vulnerability has multiple dimensions and a classification developed from multiple variables provides a more holistic view of vulnerability than single indicators such as food insecurity or scarcity of health care facilities. Few rural Liberians are food secure and many cannot reach a medical clinic in <80 minutes. Our results illustrate how census and household survey data, when displayed spatially at a sub-county level, may help highlight the location of the most vulnerable households and populations. Our results can be used to identify vulnerability hotspots where development strategies and allocation of resources to address the underlying causes of vulnerability in Liberia may be warranted. We demonstrate how social vulnerability index approaches can be applied in the context of disease outbreaks, and our methods are relevant elsewhere.

  10. Calibration of groundwater vulnerability mapping using the generalized reduced gradient method.

    PubMed

    Elçi, Alper

    2017-12-01

    Groundwater vulnerability assessment studies are essential in water resources management. Overlay-and-index methods such as DRASTIC are widely used for mapping of groundwater vulnerability, however, these methods mainly suffer from a subjective selection of model parameters. The objective of this study is to introduce a calibration procedure that results in a more accurate assessment of groundwater vulnerability. The improvement of the assessment is formulated as a parameter optimization problem using an objective function that is based on the correlation between actual groundwater contamination and vulnerability index values. The non-linear optimization problem is solved with the generalized-reduced-gradient (GRG) method, which is numerical algorithm based optimization method. To demonstrate the applicability of the procedure, a vulnerability map for the Tahtali stream basin is calibrated using nitrate concentration data. The calibration procedure is easy to implement and aims the maximization of correlation between observed pollutant concentrations and groundwater vulnerability index values. The influence of each vulnerability parameter in the calculation of the vulnerability index is assessed by performing a single-parameter sensitivity analysis. Results of the sensitivity analysis show that all factors are effective on the final vulnerability index. Calibration of the vulnerability map improves the correlation between index values and measured nitrate concentrations by 19%. The regression coefficient increases from 0.280 to 0.485. It is evident that the spatial distribution and the proportions of vulnerability class areas are significantly altered with the calibration process. Although the applicability of the calibration method is demonstrated on the DRASTIC model, the applicability of the approach is not specific to a certain model and can also be easily applied to other overlay-and-index methods. Copyright © 2017 Elsevier B.V. All rights reserved.

  11. Calibration of groundwater vulnerability mapping using the generalized reduced gradient method

    NASA Astrophysics Data System (ADS)

    Elçi, Alper

    2017-12-01

    Groundwater vulnerability assessment studies are essential in water resources management. Overlay-and-index methods such as DRASTIC are widely used for mapping of groundwater vulnerability, however, these methods mainly suffer from a subjective selection of model parameters. The objective of this study is to introduce a calibration procedure that results in a more accurate assessment of groundwater vulnerability. The improvement of the assessment is formulated as a parameter optimization problem using an objective function that is based on the correlation between actual groundwater contamination and vulnerability index values. The non-linear optimization problem is solved with the generalized-reduced-gradient (GRG) method, which is numerical algorithm based optimization method. To demonstrate the applicability of the procedure, a vulnerability map for the Tahtali stream basin is calibrated using nitrate concentration data. The calibration procedure is easy to implement and aims the maximization of correlation between observed pollutant concentrations and groundwater vulnerability index values. The influence of each vulnerability parameter in the calculation of the vulnerability index is assessed by performing a single-parameter sensitivity analysis. Results of the sensitivity analysis show that all factors are effective on the final vulnerability index. Calibration of the vulnerability map improves the correlation between index values and measured nitrate concentrations by 19%. The regression coefficient increases from 0.280 to 0.485. It is evident that the spatial distribution and the proportions of vulnerability class areas are significantly altered with the calibration process. Although the applicability of the calibration method is demonstrated on the DRASTIC model, the applicability of the approach is not specific to a certain model and can also be easily applied to other overlay-and-index methods.

  12. Spatially integrative metrics reveal hidden vulnerability of microtidal salt marshes

    USGS Publications Warehouse

    Ganju, Neil K.; Defne, Zafer; Kirwan, Matthew L.; Fagherazzi, Sergio; D'Alpaos, Andrea; Carniello, Luca

    2017-01-01

    Salt marshes are valued for their ecosystem services, and their vulnerability is typically assessed through biotic and abiotic measurements at individual points on the landscape. However, lateral erosion can lead to rapid marsh loss as marshes build vertically. Marsh sediment budgets represent a spatially integrated measure of competing constructive and destructive forces: a sediment surplus may result in vertical growth and/or lateral expansion, while a sediment deficit may result in drowning and/or lateral contraction. Here we show that sediment budgets of eight microtidal marsh complexes consistently scale with areal unvegetated/vegetated marsh ratios (UVVR) suggesting these metrics are broadly applicable indicators of microtidal marsh vulnerability. All sites are exhibiting a sediment deficit, with half the sites having projected lifespans of less than 350 years at current rates of sea-level rise and sediment availability. These results demonstrate that open-water conversion and sediment deficits are holistic and sensitive indicators of salt marsh vulnerability.

  13. Spatially integrative metrics reveal hidden vulnerability of microtidal salt marshes

    PubMed Central

    Ganju, Neil K.; Defne, Zafer; Kirwan, Matthew L.; Fagherazzi, Sergio; D'Alpaos, Andrea; Carniello, Luca

    2017-01-01

    Salt marshes are valued for their ecosystem services, and their vulnerability is typically assessed through biotic and abiotic measurements at individual points on the landscape. However, lateral erosion can lead to rapid marsh loss as marshes build vertically. Marsh sediment budgets represent a spatially integrated measure of competing constructive and destructive forces: a sediment surplus may result in vertical growth and/or lateral expansion, while a sediment deficit may result in drowning and/or lateral contraction. Here we show that sediment budgets of eight microtidal marsh complexes consistently scale with areal unvegetated/vegetated marsh ratios (UVVR) suggesting these metrics are broadly applicable indicators of microtidal marsh vulnerability. All sites are exhibiting a sediment deficit, with half the sites having projected lifespans of less than 350 years at current rates of sea-level rise and sediment availability. These results demonstrate that open-water conversion and sediment deficits are holistic and sensitive indicators of salt marsh vulnerability. PMID:28112167

  14. Spatially integrative metrics reveal hidden vulnerability of microtidal salt marshes.

    PubMed

    Ganju, Neil K; Defne, Zafer; Kirwan, Matthew L; Fagherazzi, Sergio; D'Alpaos, Andrea; Carniello, Luca

    2017-01-23

    Salt marshes are valued for their ecosystem services, and their vulnerability is typically assessed through biotic and abiotic measurements at individual points on the landscape. However, lateral erosion can lead to rapid marsh loss as marshes build vertically. Marsh sediment budgets represent a spatially integrated measure of competing constructive and destructive forces: a sediment surplus may result in vertical growth and/or lateral expansion, while a sediment deficit may result in drowning and/or lateral contraction. Here we show that sediment budgets of eight microtidal marsh complexes consistently scale with areal unvegetated/vegetated marsh ratios (UVVR) suggesting these metrics are broadly applicable indicators of microtidal marsh vulnerability. All sites are exhibiting a sediment deficit, with half the sites having projected lifespans of less than 350 years at current rates of sea-level rise and sediment availability. These results demonstrate that open-water conversion and sediment deficits are holistic and sensitive indicators of salt marsh vulnerability.

  15. A Case Study of a Combat Helicopter’s Single Unit Vulnerability.

    DTIC Science & Technology

    1987-03-01

    22 2.6 Generic Fault Tree Diagram ----------------------- 24 2.7 Example Kill Diagram ----------------------------- 25 2.8 Example EEA Summary...that of the vulnerability program, a susceptibility program is subdivided into three major tasks. First is an essential elements analysis ( EEA ...which leads to the 27 i final undesired event in much the same manner as a FTA. An example EEA is provided in Figure 2.8. [Ref.l:p226] The

  16. Feasibility of Isolating Vulnerable Equipment of the Electric Power System from Sources of EMP

    DTIC Science & Technology

    1978-03-01

    Utilities, Colorado Springs, Colorado . Mr. Hugh Chastain, LaPlata Electric Association, Durango , Colcrado. Mr. Robert Kerger and Mr. James Ware...electric power systems, and (b) single-line diagrams for powar systems In the State of Colorado . 2. Determine the feanibility of manual isolation of...vulnerable equipment upon receipt ot’ attack warning. Feasibility should be studied in Colorado Syrings (risk area) and Fr-eemont County (host area) of

  17. Groundwater vulnerability to pollution mapping of Ranchi district using GIS

    NASA Astrophysics Data System (ADS)

    Krishna, R.; Iqbal, J.; Gorai, A. K.; Pathak, G.; Tuluri, F.; Tchounwou, P. B.

    2015-12-01

    Groundwater pollution due to anthropogenic activities is one of the major environmental problems in urban and industrial areas. The present study demonstrates the integrated approach with GIS and DRASTIC model to derive a groundwater vulnerability to pollution map. The model considers the seven hydrogeological factors [Depth to water table ( D), net recharge ( R), aquifer media ( A), soil media ( S), topography or slope ( T), impact of vadose zone ( I) and hydraulic Conductivity( C)] for generating the groundwater vulnerability to pollution map. The model was applied for assessing the groundwater vulnerability to pollution in Ranchi district, Jharkhand, India. The model was validated by comparing the model output (vulnerability indices) with the observed nitrate concentrations in groundwater in the study area. The reason behind the selection of nitrate is that the major sources of nitrate in groundwater are anthropogenic in nature. Groundwater samples were collected from 30 wells/tube wells distributed in the study area. The samples were analyzed in the laboratory for measuring the nitrate concentrations in groundwater. A sensitivity analysis of the integrated model was performed to evaluate the influence of single parameters on groundwater vulnerability index. New weights were computed for each input parameters to understand the influence of individual hydrogeological factors in vulnerability indices in the study area. Aquifer vulnerability maps generated in this study can be used for environmental planning and groundwater management.

  18. Groundwater vulnerability to pollution mapping of Ranchi district using GIS.

    PubMed

    Krishna, R; Iqbal, J; Gorai, A K; Pathak, G; Tuluri, F; Tchounwou, P B

    2015-12-01

    Groundwater pollution due to anthropogenic activities is one of the major environmental problems in urban and industrial areas. The present study demonstrates the integrated approach with GIS and DRASTIC model to derive a groundwater vulnerability to pollution map. The model considers the seven hydrogeological factors [Depth to water table ( D ), net recharge ( R ), aquifer media ( A ), soil media ( S ), topography or slope ( T ), impact of vadose zone ( I ) and hydraulic Conductivity( C )] for generating the groundwater vulnerability to pollution map. The model was applied for assessing the groundwater vulnerability to pollution in Ranchi district, Jharkhand, India. The model was validated by comparing the model output (vulnerability indices) with the observed nitrate concentrations in groundwater in the study area. The reason behind the selection of nitrate is that the major sources of nitrate in groundwater are anthropogenic in nature. Groundwater samples were collected from 30 wells/tube wells distributed in the study area. The samples were analyzed in the laboratory for measuring the nitrate concentrations in groundwater. A sensitivity analysis of the integrated model was performed to evaluate the influence of single parameters on groundwater vulnerability index. New weights were computed for each input parameters to understand the influence of individual hydrogeological factors in vulnerability indices in the study area. Aquifer vulnerability maps generated in this study can be used for environmental planning and groundwater management.

  19. A problem-oriented approach to understanding adaptation: lessons learnt from Alpine Shire, Victoria Australia.

    NASA Astrophysics Data System (ADS)

    Roman, Carolina

    2010-05-01

    Climate change is gaining attention as a significant strategic issue for localities that rely on their business sectors for economic viability. For businesses in the tourism sector, considerable research effort has sought to characterise the vulnerability to the likely impacts of future climate change through scenarios or ‘end-point' approaches (Kelly & Adger, 2000). Whilst useful, there are few demonstrable case studies that complement such work with a ‘start-point' approach that seeks to explore contextual vulnerability (O'Brien et al., 2007). This broader approach is inclusive of climate change as a process operating within a biophysical system and allows recognition of the complex interactions that occur in the coupled human-environmental system. A problem-oriented and interdisciplinary approach was employed at Alpine Shire, in northeast Victoria Australia, to explore the concept of contextual vulnerability and adaptability to stressors that include, but are not limited to climatic change. Using a policy sciences approach, the objective was to identify factors that influence existing vulnerabilities and that might consequently act as barriers to effective adaptation for the Shire's business community involved in the tourism sector. Analyses of results suggest that many threats, including the effects climate change, compete for the resources, strategy and direction of local tourism management bodies. Further analysis of conditioning factors revealed that many complex and interacting factors define the vulnerability and adaptive capacity of the Shire's tourism sector to the challenges of global change, which collectively have more immediate implications for policy and planning than long-term future climate change scenarios. An approximation of the common interest, i.e. enhancing capacity in business acumen amongst tourism operators, would facilitate adaptability and sustainability through the enhancement of social capital in this business community. Kelly, P. M., & Adger, W. N. (2000). Theory and practice in assessing vulnerability to climatic change and facilitating adaptation. Climatic Change, 47, 325-352. O'Brien, K., Eriksen, S., Nygaard, L. P., & Schjolden, A. (2007). Why different interpretations of vulnerability matter in climate change discourses. Climate Policy, 7, 73-88.

  20. Mapping social-ecological vulnerability to inform local decision making.

    PubMed

    Thiault, Lauric; Marshall, Paul; Gelcich, Stefan; Collin, Antoine; Chlous, Frédérique; Claudet, Joachim

    2018-04-01

    An overarching challenge of natural resource management and biodiversity conservation is that relationships between people and nature are difficult to integrate into tools that can effectively guide decision making. Social-ecological vulnerability offers a valuable framework for identifying and understanding important social-ecological linkages, and the implications of dependencies and other feedback loops in the system. Unfortunately, its implementation at local scales has hitherto been limited due at least in part to the lack of operational tools for spatial representation of social-ecological vulnerability. We developed a method to map social-ecological vulnerability based on information on human-nature dependencies and ecosystem services at local scales. We applied our method to the small-scale fishery of Moorea, French Polynesia, by combining spatially explicit indicators of exposure, sensitivity, and adaptive capacity of both the resource (i.e., vulnerability of reef fish assemblages to fishing) and resource users (i.e., vulnerability of fishing households to the loss of fishing opportunity). Our results revealed that both social and ecological vulnerabilities varied considerably through space and highlighted areas where sources of vulnerability were high for both social and ecological subsystems (i.e., social-ecological vulnerability hotspots) and thus of high priority for management intervention. Our approach can be used to inform decisions about where biodiversity conservation strategies are likely to be more effective and how social impacts from policy decisions can be minimized. It provides a new perspective on human-nature linkages that can help guide sustainability management at local scales; delivers insights distinct from those provided by emphasis on a single vulnerability component (e.g., exposure); and demonstrates the feasibility and value of operationalizing the social-ecological vulnerability framework for policy, planning, and participatory management decisions. © 2017 Society for Conservation Biology.

  1. Comparing plasma and X-ray exposure and identifying vulnerable cell parts

    NASA Astrophysics Data System (ADS)

    Graham, Bill

    2012-10-01

    Here two issues in plasma medicine that are being addressed in a collaboration between the Centre of Plasma Physics and the School of Pharmacy at Queen's University Belfast and the Plasma Institute at York University UK will be discussed. Recent measurements of the interaction of plasmas created directly in DMEM cell medium and MDAMB-231, a human breast cancer cell line, showed evidence of reduced cell viability and of DNA damage. The same set of experiments were undertaken but with X-ray exposure. A correlation of the dependence on plasma exposure time and X-ray dose was observed which might point the way to dose definition in plasma medicine. We have also been working to identify the cell parts most vulnerable to plasma exposure. In this study a 10 kHz atmospheric pressure non-thermal plasma jet, operating in He/0.5%O2 and characterized to determine the behavior of many of the plasma species, was incident onto the surface of media containing either bacterial strains, in their planktonic and biofilm forms, or isolated bacterial plasmid DNA. The results of measurements to look for changes in plasmid structural conformation, rates of single and double strand breaks, the catalytic activity of certain bacterial enzymes, the peroxidation of lipid content of the bacterial cells, the leakage of ATP and Scanning Electron Microscope (SEM) images will be discussed.

  2. Hydraulic safety margins and air-seeding thresholds in roots, trunks, branches and petioles of four northern hardwood trees.

    PubMed

    Wason, Jay W; Anstreicher, Katherine S; Stephansky, Nathan; Huggett, Brett A; Brodersen, Craig R

    2018-04-16

    During drought, xylem sap pressures can approach or exceed critical thresholds where gas embolisms form and propagate through the xylem network, leading to systemic hydraulic dysfunction. The vulnerability segmentation hypothesis (VSH) predicts that low-investment organs (e.g. leaf petioles) should be more vulnerable to embolism spread compared to high-investment, perennial organs (e.g. trunks, stems), as a means of mitigating embolism spread and excessive negative pressures in the perennial organs. We tested this hypothesis by measuring air-seeding thresholds using the single-vessel air-injection method and calculating hydraulic safety margins in four northern hardwood tree species of the northeastern United States, in both saplings and canopy height trees, and at five points along the soil-plant-atmosphere continuum. Acer rubrum was the most resistant to air-seeding and generally supported the VSH. However, Fagus grandifolia, Fraxinus americana and Quercus rubra showed little to no variation in air-seeding thresholds across organ types within each species. Leaf-petiole xylem operated at water potentials close to or exceeding their hydraulic safety margins in all species, whereas roots, trunks and stems of A. rubrum, F. grandifolia and Q. rubra operated within their safety margins, even during the third-driest summer in the last 100 yr. © 2018 The Authors. New Phytologist © 2018 New Phytologist Trust.

  3. PRMT1-Mediated Translation Regulation is a Crucial Vulnerability of Cancer | Office of Cancer Genomics

    Cancer.gov

    Through an shRNA screen, we identified the protein arginine methyltransferase Prmt1 as a vulnerable intervention point in murine p53/Rb-null osteosarcomas, the human counterpart of which lacks effective therapeutic options. Depletion of Prmt1 in p53-deficient cells impaired tumor initiation and maintenance in vitro and in vivo Mechanistic studies reveal that translation-associated pathways were enriched for Prmt1 downstream targets, implicating Prmt1 in translation control.

  4. Susceptibility to mountain hazards in Austria - paradigms of vulnerability revisited

    NASA Astrophysics Data System (ADS)

    Fuchs, Sven

    2010-05-01

    The concept of vulnerability is pillared by multiple disciplinary theories underpinning either a technical or a social origin of the concept and resulting in a range of paradigms for either a qualitative or quantitative assessment of vulnerability. However, efforts to reduce susceptibility to hazards and to create disaster-resilient communities require intersections among these theories, since human activity cannot be seen independently from the environmental setting. Acknowledging different roots of disciplinary paradigms, issues determining structural, economic, institutional and social vulnerability are discussed with respect to mountain hazards in Austria. The underlying idea of taking such an integrative viewpoint was the cognition that human action in mountain environments affects the state of vulnerability, and the state of vulnerability in turn shapes the possibilities of human action. It is argued that structural vulnerability as originator results in considerable economic vulnerability, generated by the institutional settings of dealing with natural hazards and shaped by the overall societal framework. Hence, the vulnerability of a specific location and within a considered point of time is triggered by the hazardous event and the related physical susceptibility of structures, such as buildings located on a torrent fan. Depending on the specific institutional settings, economic vulnerability of individuals or of the society results, above all with respect to imperfect loss compensation mechanisms in the areas under investigation. While this potential for harm can be addressed as social vulnerability, the concept of institutional vulnerability has been developed with respect to the overall political settings of governmental risk management. As a result, the concept of vulnerability, as being used in natural sciences, can be extended by integration of possible reasons why such physical susceptibility of structures exists, and by integration of compensation mechanisms and coping strategies being developed within social sciences. If vulnerability and its counterpart, resilience, is analysed and evaluated by using a comprehensive approach, a better understanding of the vulnerability-influencing parameters could be achieved, taking into account the interdependencies and interactions between the disciplinary foci. Thereby the overall aim of this work is not to develop another integrative approach for vulnerability assessment, different approaches are rather applied by using a vulnerability-of-place criterion, and key issues of vulnerability are reconsidered aiming at a general illustration of the situation in a densely populated mountain region of Europe.

  5. Spatial-explicit modeling of social vulnerability to malaria in East Africa

    PubMed Central

    2014-01-01

    Background Despite efforts in eradication and control, malaria remains a global challenge, particularly affecting vulnerable groups. Despite the recession in malaria cases, previously malaria free areas are increasingly confronted with epidemics as a result of changing environmental and socioeconomic conditions. Next to modeling transmission intensities and probabilities, integrated spatial methods targeting the complex interplay of factors that contribute to social vulnerability are required to effectively reduce malaria burden. We propose an integrative method for mapping relative levels of social vulnerability in a spatially explicit manner to support the identification of intervention measures. Methods Based on a literature review, a holistic risk and vulnerability framework has been developed to guide the assessment of social vulnerability to water-related vector-borne diseases (VBDs) in the context of changing environmental and societal conditions. Building on the framework, this paper applies spatially explicit modeling for delineating homogeneous regions of social vulnerability to malaria in eastern Africa, while taking into account expert knowledge for weighting the single vulnerability indicators. To assess the influence of the selected indicators on the final index a local sensitivity analysis is carried out. Results Results indicate that high levels of malaria vulnerability are concentrated in the highlands, where immunity within the population is currently low. Additionally, regions with a lack of access to education and health services aggravate vulnerability. Lower values can be found in regions with relatively low poverty, low population pressure, low conflict density and reduced contributions from the biological susceptibility domain. Overall, the factors characterizing vulnerability vary spatially in the region. The vulnerability index reveals a high level of robustness in regard to the final choice of input datasets, with the exception of the immunity indicator which has a marked impact on the composite vulnerability index. Conclusions We introduce a conceptual framework for modeling risk and vulnerability to VBDs. Drawing on the framework we modeled social vulnerability to malaria in the context of global change using a spatially explicit approach. The results provide decision makers with place-specific options for targeting interventions that aim at reducing the burden of the disease amongst the different vulnerable population groups. PMID:25127688

  6. Physio-climatic controls on vulnerability of watersheds to climate and land use change across the U. S.

    NASA Astrophysics Data System (ADS)

    Deshmukh, Ankit; Singh, Riddhi

    2016-11-01

    Understanding how a watershed's physio-climatic characteristics affect its vulnerability to environmental (climatic and land use) change is crucial for managing these complex systems. In this study, we combine the strengths of recently developed exploratory modeling frameworks and comparative hydrology to quantify the relationship between watershed's vulnerability and its physio-climatic characteristics. We propose a definition of vulnerability that can be used by a diverse range of water system managers and is useful in the presence of large uncertainties in drivers of environmental change. This definition is related to adverse climate change and land use thresholds that are quantified using a recently developed exploratory modeling approach. In this way, we estimate the vulnerability of 69 watersheds in the United States to climate and land use change. We explore definitions of vulnerability that describe average or extreme flow conditions, as well as others that are relevant from the point of view of instream organisms. In order to understand the dominant controls on vulnerability, we correlate these indices with watershed's characteristics describing its topography, geology, drainage, climate, and land use. We find that mean annual flow is more vulnerable to reductions in precipitation in watersheds with lower average soil permeability, lower baseflow index, lower forest cover, higher topographical wetness index, and vice-versa. Our results also indicate a potential mediation of climate change impacts by regional groundwater systems. By developing such relationships across a large range of watersheds, such information can potentially be used to assess the vulnerability of ungauged watersheds to uncertain environmental change.

  7. Longitudinal assessment of maternal parenting capacity variables and child adjustment outcomes in pediatric cancer.

    PubMed

    Fedele, David A; Mullins, Larry L; Wolfe-Christensen, Cortney; Carpentier, Melissa Y

    2011-04-01

    This preliminary investigation aimed to longitudinally examine parenting capacity variables, namely parental overprotection, perceived child vulnerability, and parenting stress and their relation to child adjustment in mothers of children on treatment for cancer. As part of a larger study, biological mothers (N=22) completed measures of parental overprotection, perceived child vulnerability, parenting stress, and child adjustment at Time 1 and a follow-up time point. Analyses were conducted to determine whether (1) levels of parental overprotection, perceived child vulnerability, and parenting stress declined from Time 1 to follow-up and (2) if Time 1 parenting capacity variables were associated with child adjustment at follow-up. Results revealed that parental overprotection, perceived child vulnerability, and parenting stress declined from Time 1 to follow-up, and levels of parental overprotection, perceived child vulnerability, and parenting stress at Time 1 were significantly related to child adjustment at follow-up. Collectively, the preliminary findings of this study indicate that mothers of children with cancer evidence improved parenting capacity over time. Furthermore, it seems that Time 1 parenting capacity variables are significantly related to later child adjustment.

  8. Shame and guilt as shared vulnerability factors: Shame, but not guilt, prospectively predicts both social anxiety and bulimic symptoms.

    PubMed

    Levinson, Cheri A; Byrne, Meghan; Rodebaugh, Thomas L

    2016-08-01

    Social anxiety disorder (SAD) and bulimia nervosa (BN) are highly comorbid. However, little is known about the shared vulnerability factors that prospectively predict both SA and BN symptoms. Two potential factors that have not yet been tested are shame and guilt. In the current study we tested if shame and guilt were shared vulnerability factors for SA and BN symptoms. Women (N=300) completed measures of SA symptoms, BN symptoms, state shame and guilt, and trait negative affect at two time points, two months apart. Utilizing structural equation modeling we tested a cross-sectional and prospective model of SA and BN vulnerability. We found that shame prospectively predicted both SA and BN symptoms. We did not find that guilt prospectively predicted SA or BN symptoms. However, higher levels of both BN and SA symptoms predicted increased guilt over time. We found support for shame as a shared prospective vulnerability factor between BN and SA symptoms. Interventions that focus on decreasing shame could potentially alleviate symptoms of BN and SA in one protocol. Copyright © 2016 Elsevier Ltd. All rights reserved.

  9. The Lipid-Rich Plaque Study of vulnerable plaques and vulnerable patients: Study design and rationale.

    PubMed

    Waksman, Ron; Torguson, Rebecca; Spad, Mia-Ashley; Garcia-Garcia, Hector; Ware, James; Wang, Rui; Madden, Sean; Shah, Priti; Muller, James

    2017-10-01

    It has been hypothesized that the outcome post-PCI could be improved by the detection and subsequent treatment of vulnerable patients and lipid-rich vulnerable coronary plaques (LRP). A near-infrared spectroscopy (NIRS) catheter capable of detecting LRP is being evaluated in The Lipid-Rich Plaque Study. The LRP Study is an international, multicenter, prospective cohort study conducted in patients with suspected coronary artery disease (CAD) who underwent cardiac catheterization with possible ad hoc PCI for an index event. Patient level and plaque level events were detected by follow-up in the subsequent 2 years. Enrollment began in February 2014 and was completed in March 2016; a total of 1,562 patients were enrolled. Adjudication of new coronary event occurrence and de novo culprit lesion location during the 2-year follow-up is performed by an independent clinical end-points committee (CEC) blinded to NIRS-IVUS findings. The first analysis of the results will be performed when at least 20 de novo events have occurred for which follow-up angiographic data and baseline NIRS-IVUS measurements are available. It is expected that results of the study will be announced in 2018. The LRP Study will test the hypotheses that NIRS-IVUS imaging to detect LRP in patients can identify vulnerable patients and vulnerable plaques. Identification of vulnerable patients will assist future studies of novel systemic therapies; identification of localized vulnerable plaques would enhance future studies of possible preventive measures. Copyright © 2017 Elsevier Inc. All rights reserved.

  10. Cognitive Impairments Are Different in Single-Incidence and Multi-Incidence ADHD Families

    ERIC Educational Resources Information Center

    Oerlemans, Anoek M.; Hartman, Catharina A.; Bruijn, Yvette G. E.; Franke, Barbara; Buitelaar, Jan K.; Rommelse, Nanda N. J.

    2015-01-01

    Background: We may improve our understanding of the role of common versus unique risk factors in attention-deficit/hyperactivity disorder (ADHD) by examining ADHD-related cognitive deficits in single- (SPX), and multi-incidence (MPX) families. Given that individuals from multiplex (MPX) families are likely to share genetic vulnerability for the…

  11. Self-Injurious Behavior in People with Profound Intellectual Disabilities: A Meta-Analysis of Single-Case Studies

    ERIC Educational Resources Information Center

    Denis, Jo; Van den Noortgate, Wim; Maes, Bea

    2011-01-01

    The limitations people with profound intellectual disabilities experience in functioning contribute to a vulnerability to self-injurious behavior. Since this problem behavior has important negative consequences for people concerned, examining the effectiveness of treatments is important. In the current meta-analysis, single-case studies…

  12. Modeling Coastal Vulnerability through Space and Time.

    PubMed

    Hopper, Thomas; Meixler, Marcia S

    2016-01-01

    Coastal ecosystems experience a wide range of stressors including wave forces, storm surge, sea-level rise, and anthropogenic modification and are thus vulnerable to erosion. Urban coastal ecosystems are especially important due to the large populations these limited ecosystems serve. However, few studies have addressed the issue of urban coastal vulnerability at the landscape scale with spatial data that are finely resolved. The purpose of this study was to model and map coastal vulnerability and the role of natural habitats in reducing vulnerability in Jamaica Bay, New York, in terms of nine coastal vulnerability metrics (relief, wave exposure, geomorphology, natural habitats, exposure, exposure with no habitat, habitat role, erodible shoreline, and surge) under past (1609), current (2015), and future (2080) scenarios using InVEST 3.2.0. We analyzed vulnerability results both spatially and across all time periods, by stakeholder (ownership) and by distance to damage from Hurricane Sandy. We found significant differences in vulnerability metrics between past, current and future scenarios for all nine metrics except relief and wave exposure. The marsh islands in the center of the bay are currently vulnerable. In the future, these islands will likely be inundated, placing additional areas of the shoreline increasingly at risk. Significant differences in vulnerability exist between stakeholders; the Breezy Point Cooperative and Gateway National Recreation Area had the largest erodible shoreline segments. Significant correlations exist for all vulnerability (exposure/surge) and storm damage combinations except for exposure and distance to artificial debris. Coastal protective features, ranging from storm surge barriers and levees to natural features (e.g. wetlands), have been promoted to decrease future flood risk to communities in coastal areas around the world. Our methods of combining coastal vulnerability results with additional data and across multiple time periods have considerable potential to provide valuable predictions that resource managers can effectively use to identify areas for restoration and protection.

  13. Modeling Coastal Vulnerability through Space and Time

    PubMed Central

    2016-01-01

    Coastal ecosystems experience a wide range of stressors including wave forces, storm surge, sea-level rise, and anthropogenic modification and are thus vulnerable to erosion. Urban coastal ecosystems are especially important due to the large populations these limited ecosystems serve. However, few studies have addressed the issue of urban coastal vulnerability at the landscape scale with spatial data that are finely resolved. The purpose of this study was to model and map coastal vulnerability and the role of natural habitats in reducing vulnerability in Jamaica Bay, New York, in terms of nine coastal vulnerability metrics (relief, wave exposure, geomorphology, natural habitats, exposure, exposure with no habitat, habitat role, erodible shoreline, and surge) under past (1609), current (2015), and future (2080) scenarios using InVEST 3.2.0. We analyzed vulnerability results both spatially and across all time periods, by stakeholder (ownership) and by distance to damage from Hurricane Sandy. We found significant differences in vulnerability metrics between past, current and future scenarios for all nine metrics except relief and wave exposure. The marsh islands in the center of the bay are currently vulnerable. In the future, these islands will likely be inundated, placing additional areas of the shoreline increasingly at risk. Significant differences in vulnerability exist between stakeholders; the Breezy Point Cooperative and Gateway National Recreation Area had the largest erodible shoreline segments. Significant correlations exist for all vulnerability (exposure/surge) and storm damage combinations except for exposure and distance to artificial debris. Coastal protective features, ranging from storm surge barriers and levees to natural features (e.g. wetlands), have been promoted to decrease future flood risk to communities in coastal areas around the world. Our methods of combining coastal vulnerability results with additional data and across multiple time periods have considerable potential to provide valuable predictions that resource managers can effectively use to identify areas for restoration and protection. PMID:27732674

  14. Single-Fiber Optical Link For Video And Control

    NASA Technical Reports Server (NTRS)

    Galloway, F. Houston

    1993-01-01

    Single optical fiber carries control signals to remote television cameras and video signals from cameras. Fiber replaces multiconductor copper cable, with consequent reduction in size. Repeaters not needed. System works with either multimode- or single-mode fiber types. Nonmetallic fiber provides immunity to electromagnetic interference at suboptical frequencies and much less vulnerable to electronic eavesdropping and lightning strikes. Multigigahertz bandwidth more than adequate for high-resolution television signals.

  15. Imaging of coronary atherosclerosis and identification of the vulnerable plaque

    PubMed Central

    de Feyter, P.J.; Serruys, P. W.; Nieman, K.; Mollet, N.; Cademartiri, F.; van Geuns, R. J.; Slager, C.; van der Steen, A.F.W.; Krams, R.; Schaar, J.A.; Wielopolski, P.; Pattynama, P.M.T.; Arampatzis, A.; van der Lugt, A.; Regar, E.; Ligthart, J.; Smits, P.

    2003-01-01

    Identification of the vulnerable plaque responsible for the occurrence of acute coronary syndromes and acute coronary death is a prerequisite for the stabilisation of this vulnerable plaque. Comprehensive coronary atherosclerosis imaging in clinical practice should involve visualisation of the entire coronary artery tree and characterisation of the plaque, including the three-dimensional morphology of the plaque, encroachment of the plaque on the vessel lumen, the major tissue components of the plaque, remodelling of the vessel and presence of inflammation. Obviously, no single diagnostic modality is available that provides such comprehensive imaging and unfortunately no diagnostic tool is available that unequivocally identifies the vulnerable plaque. The objective of this article is to discuss experience with currently available diagnostic modalities for coronary atherosclerosis imaging. In addition, a number of evolving techniques will be briefly discussed. ImagesFigure 1Figure 2Figure 3Figure 4Figure 5Figure 6Figure 7 PMID:25696244

  16. Analysis of the intraocular jet flows and pressure gradients induced by air and fluid infusion: mechanism of focal chorioretinal damage.

    PubMed

    Kim, Yong Joon; Jo, Sungkil; Moon, Daruchi; Joo, Youngcheol; Choi, Kyung Seek

    2014-05-01

    To comprehend the mechanism of focal chorioretinal damage by analysis of the pressure distribution and dynamic pressure induced by infused air during fluid-air exchange. A precise simulation featuring a model eye and a fluid circuit was designed to analyze fluid-air exchange. The pressure distribution, flow velocity, and dynamic pressure induced by infusion of air into an air-filled eye were analyzed using an approach based on fluid dynamics. The size of the port and the infusion pressure were varied during simulated iterations. We simulated infusion of an air-filled eye with balanced salt solution (BSS) to better understand the mechanism of chorioretinal damage induced by infused air. Infused air was projected straight toward a point on the retina contralateral to the infusion port (the "vulnerable point"). The highest pressure was evident at the vulnerable point, and the lowest pressure was recorded on most retinal areas. Simulations using greater infusion pressure and a port of larger size were associated with elevations in dynamic pressure and the pressure gradient. The pressure gradients were 2.8 and 5.1 mm Hg, respectively, when infusion pressures of 30 and 50 mm Hg were delivered through a 20-gauge port. The pressure gradient associated with BSS infusion was greater than that created by air, but lasted for only a moment. Our simulation explains the mechanism of focal chorioretinal damage in numerical terms. Infused air induces a prolonged increase in focal pressure on the vulnerable point, and this may be responsible for visual field defects arising after fluid-air exchange. Copyright 2014 The Association for Research in Vision and Ophthalmology, Inc.

  17. A model for identifying and ranking need for trauma service in nonmetropolitan regions based on injury risk and access to services.

    PubMed

    Schuurman, Nadine; Bell, Nathaniel; Hameed, Morad S; Simons, Richard

    2008-07-01

    Timely access to definitive trauma care has been shown to improve survival rates after severe injury. Unfortunately, despite development of sophisticated trauma systems, prompt, definitive trauma care remains unavailable to over 50 million North Americans, particularly in rural areas. Measures to quantify social and geographic isolation may provide important insights for the development of health policy aimed at reducing the burden of injury and improving access to trauma care in presently under serviced populations. Indices of social deprivation based on census data, and spatial analyses of access to trauma centers based on street network files were combined into a single index, the Population Isolation Vulnerability Amplifier (PIVA) to characterize vulnerability to trauma in socioeconomically and geographically diverse rural and urban communities across British Columbia. Regions with a sufficient core population that are more than one hour travel time from existing services were ranked based on their level of socioeconomic vulnerability. Ten regions throughout the province were identified as most in need of trauma services based on population, isolation and vulnerability. Likewise, 10 communities were classified as some of the least isolated areas and were simultaneously classified as least vulnerable populations in province. The model was verified using trauma services utilization data from the British Columbia Trauma Registry. These data indicate that including vulnerability in the model provided superior results to running the model based only on population and road travel time. Using the PIVA model we have shown that across Census Urban Areas there are wide variations in population dependence on and distances to accredited tertiary/district trauma centers throughout British Columbia. Many of the factors that influence access to definitive trauma care can be combined into a single quantifiable model that researchers in the health sector can use to predict where to place new services. The model can also be used to locate optimal locations for any basket of health services.

  18. A profile of four patterns of vulnerability to functional decline in older general medicine patients in Victoria, Australia: a cross sectional survey.

    PubMed

    Beddoes-Ley, Lenore; Khaw, Damien; Duke, Maxine; Botti, Mari

    2016-08-05

    There are limited published data reporting Australian hospitalized elders' vulnerability to functional decline to guide best practice interventions. The objectives of this study were to describe the prevalence of vulnerability to functional decline and explore profiles of vulnerability related to the performance of physical activity in a representative group of elders in a single centre in Victoria, Australia. A cross-sectional survey of patients aged ≥ 70 years (Mean age 82.4, SD 7 years) admitted to a general medical ward of an Australian tertiary-referral metropolitan public hospital from March 2010 to March 2011 (n = 526). Patients were screened using the Vulnerable Elders Survey (VES-13). Distinct typologies of physical difficulties were identified using latent class analysis. Most elders scored ≥3/10 on the VES-13 and were rated vulnerable to functional decline (n = 480, 89.5 %). Four distinct classes of physical difficulty were identified: 1) Elders with higher physical functioning (n = 114, 21.7 %); 2) Ambulant elders with diminished strength (n = 24, 4.6 %); 3) Elders with impaired mobility, strength and ability to stoop (n = 267, 50.8 %) and 4) Elders with extensive physical impairment (n = 121, 23 %) Vulnerable elders were distributed through all classes. Older general medicine patients in Victoria, Australia, are highly vulnerable to functional decline. We identified four distinct patterns of physical difficulties associated with vulnerability to functional decline that can inform health service planning, delivery and education.

  19. Fleshing out vulnerability.

    PubMed

    Tavaglione, Nicolas; Martin, Angela K; Mezger, Nathalie; Durieux-Paillard, Sophie; François, Anne; Jackson, Yves; Hurst, Samia A

    2015-02-01

    In the literature on medical ethics, it is generally admitted that vulnerable persons or groups deserve special attention, care or protection. One can define vulnerable persons as those having a greater likelihood of being wronged - that is, of being denied adequate satisfaction of certain legitimate claims. The conjunction of these two points entails what we call the Special Protection Thesis. It asserts that persons with a greater likelihood of being denied adequate satisfaction of their legitimate claims deserve special attention, care or protection. Such a thesis remains vague, however, as long as we do not know what legitimate claims are. This article aims at dispelling this vagueness by exploring what claims we have in relation to health care - thus fleshing out a claim-based conception of vulnerability. We argue that the Special Protection Thesis must be enriched as follows: If individual or group X has a greater likelihood of being denied adequate satisfaction of some of their legitimate claims to (i) physical integrity, (ii) autonomy, (iii) freedom, (iv) social provision, (v) impartial quality of government, (vi) social bases of self-respect or (vii) communal belonging, then X deserves special attention, care or protection. With this improved understanding of vulnerability, vulnerability talk in healthcare ethics can escape vagueness and serve as an adequate basis for practice. © 2013 John Wiley & Sons Ltd.

  20. Quantifying human vulnerability in rural areas: case study of Tutova Hills (Eastern Romania)

    NASA Astrophysics Data System (ADS)

    Stângă, I. C.; Grozavu, A.

    2012-06-01

    This paper aims to assess the vulnerability at regional level, the model and the proposed indicators being explicitly intended for an essentially rural region, in this case-Tutova Hills (Eastern Romania). Five categories of variables were taken into account to define the vulnerability components: rural habitat, demographic features, agriculture, environmental quality and emergency situations. For each one, five variables were analyzed and ranked based on the level of determination or subordination. In order to ensure the flexibility of the model and to avoid the criteria duplication in assessing vulnerability, only a single indicator of each category was retained and included in analysis: total number of inhabitants, dependency ratio, weight of arable land on slope categories, weight of land under forestry and road accessibility of villages. The selected indicators were mathematically processed in order to maximize their relevance and to unitary express the results in the spread 0-1. Also, values of each indicator were grouped into four classes, corresponding to the level of vulnerability: low, medium, high and very high. A general index was obtained through the integration of vulnerability factors in an equation based on the geometric mean. Spatial analysis was based on features of the MicroImages TNTmips 7.3. software, which allow the vulnerability mapping. This approach argues and states that vulnerability assessment through indicator-based methods can be made only according to the level and scale of analysis and related to natural or human conditions of a region.

  1. Identification of dominating factors affecting vadose zone vulnerability by a simulation method

    PubMed Central

    Li, Juan; Xi, Beidou; Cai, Wutian; Yang, Yang; Jia, Yongfeng; Li, Xiang; Lv, Yonggao; Lv, Ningqing; Huan, Huan; Yang, Jinjin

    2017-01-01

    The characteristics of vadose zone vulnerability dominating factors (VDFs) are closely related to the migration and transformation mechanisms of contaminants in the vadose zone, which directly affect the state of the contaminants percolating to the groundwater. This study analyzes the hydrogeological profile of the pore water regions in the vadose zone, and conceptualizes the vadose zone as single lithologic, double lithologic, or multi lithologic. To accurately determine how the location of the pollution source influences the groundwater, we classify the permeabilities (thicknesses) of different media into clay-layer and non-clay-layer permeabilities (thicknesses), and introduce the maximum pollution thickness. Meanwhile, the physicochemical reactions of the contaminants in the vadose zone are represented by the soil adsorption and soil degradability. The VDFs are determined from the factors and parameters in groundwater vulnerability assessment. The VDFs are identified and sequenced in simulations and a sensitivity analysis. When applied to three polluted sites in China, the method improved the weighting of factors in groundwater vulnerability assessment, and increased the reliability of predicting groundwater vulnerability to contaminants. PMID:28387232

  2. Spatial vulnerability units - expert-based spatial modelling of socio-economic vulnerability in the Salzach catchment, Austria

    NASA Astrophysics Data System (ADS)

    Kienberger, S.; Lang, S.; Zeil, P.

    2009-05-01

    The assessment of vulnerability has moved to centre-stage of the debate between different scientific disciplines related to climate change and disaster risk management. Composed by a combination of social, economical, physical and environmental factors the assessment implies combining different domains as well as quantitative with qualitative data and makes it therefore a challenge to identify an integrated metric for vulnerability. In this paper we define vulnerability in the context of climate change, targeting the hazard "flood". The developed methodology is being tested in the Salzach river catchment in Austria, which is largely prone to floods. The proposed methodology allows the spatial quantification of vulnerability and the identification of vulnerability units. These units build upon the geon concept which acts as a framework for the regionalization of continuous spatial information according to defined parameters of homogeneity. Using geons, we are capable of transforming singular domains of information on specific systemic components to policy-relevant, conditioned information. Considering the fact that vulnerability is not directly measurable and due to its complex dimension and social construction an expert-based approach has been chosen. Established methodologies such as Multicriteria Decision Analysis, Delphi exercises and regionalization approaches are being integrated. The method not only enables the assessment of vulnerability independent from administrative boundaries, but also applies an aggregation mode which reflects homogenous vulnerability units. This supports decision makers to reflect on complex issues such as vulnerability. Next to that, the advantage is to decompose the units to their underlying domains. Feedback from disaster management experts indicates that the approach helps to improve the design of measures aimed at strengthening preparedness and mitigation. From this point of view, we reach a step closer towards validation of the proposed method, comprising critical user-oriented aspects like adequateness, practicability and usability of the provided results in general.

  3. Recent Radiation Damage and Single Event Effect Results for Candidate Spacecraft Electronics

    NASA Technical Reports Server (NTRS)

    OBryan, Martha V.; LaBel, Kenneth A.; Reed, Robert A.; Ladbury, Ray L.; Howard, James W., Jr.; Buchner, Stephen P.; Barth, Janet L.; Kniffen, Scott D.; Seidleck, Christina M.; Marshall, Cheryl J.; hide

    2001-01-01

    We present data on the vulnerability of a variety of candidate spacecraft electronics to proton and heavy-ion induced single-event effects and proton-induced damage. Devices tested include optoelectronics, digital, analog, linear bipolar, hybrid devices, Analog-to-Digital Converters (ADCs), Digital-to-Analog Converters (DACs), and DC-DC converters, among others.

  4. Current Single Event Effects and Radiation Damage Results for Candidate Spacecraft Electronics

    NASA Technical Reports Server (NTRS)

    OBryan, Martha V.; LaBel, Kenneth A.; Reed, Robert A.; Ladbury, Ray L.; Howard, James W., Jr.; Kniffin, Scott D.; Poivey, Christian; Buchner, Stephen P.; Bings, John P.; Titus, Jeff L.

    2002-01-01

    We present data on the vulnerability of a variety of candidate spacecraft electronics to proton and heavy ion induced single event effects, total ionizing dose and proton-induced damage. Devices tested include optoelectronics, digital, analog, linear bipolar, hybrid devices, Analog-to-Digital Converters (ADCs), Digital-to-Analog Converters (DACs), and DC-DC converters, among others.

  5. Internal friction and vulnerability of mixed alkali glasses.

    PubMed

    Peibst, Robby; Schott, Stephan; Maass, Philipp

    2005-09-09

    Based on a hopping model we show how the mixed alkali effect in glasses can be understood if only a small fraction c(V) of the available sites for the mobile ions is vacant. In particular, we reproduce the peculiar behavior of the internal friction and the steep fall ("vulnerability") of the mobility of the majority ion upon small replacements by the minority ion. The single and mixed alkali internal friction peaks are caused by ion-vacancy and ion-ion exchange processes. If c(V) is small, they can become comparable in height even at small mixing ratios. The large vulnerability is explained by a trapping of vacancies induced by the minority ions. Reasonable choices of model parameters yield typical behaviors found in experiments.

  6. Addiction Genetics and Pleiotropic Effects of Common Haplotypes that Make Polygenic Contributions to Vulnerability to Substance Dependence

    PubMed Central

    Uhl, George R.; Drgon, Tomas; Johnson, Catherine; Liu, Qing-Rong

    2016-01-01

    Abundant evidence from family, adoption, and twin studies point to large genetic contributions to individual differences in vulnerability to develop dependence on one or more addictive substances. Twin data suggest that most of this genetic vulnerability is shared by individuals who are dependent on a variety of addictive substances. Molecular genetic studies, especially genomewide and candidate gene association studies, have elucidated common haplotypes in dozens of genes that appear to make polygenic contributions to vulnerability to developing dependence. Most genes that harbor currently identified addiction-associated haplotypes are expressed in the brain. Haplotypes in many of the same genes are identified in genomewide association studies that compare allele frequencies in substance dependent vs. control individuals from European, African, and Asian racial/ethnic backgrounds. Many of these addiction-associated haplotypes display pleiotropic influences on a variety of related brain-based phenotypes that display 1) substantial heritability and 2) clinical cooccurence with substance dependence. PMID:19152208

  7. Physical, Structural and Operational Vulnerability of Critical Facilities in Valle de Chalco Solidaridad, Estado de Mexico, Mexico. Case of study: Avándaro, San Isidro and El Triunfo

    NASA Astrophysics Data System (ADS)

    Garcia Payne, D. G.; Novelo-Casanova, D. A.; Ponce-Pacheco, A. B.; Espinosa-Campos, O.; Huerta-Parra, M.; Reyes-Pimentel, T.; Rodriguez, F.; Benitez-Olivares, I.

    2010-12-01

    Valle de Chalco Solidaridad is located in Mexico City Metropolitan Area in Estado de Mexico, Mexico. In this town there is a sewage canal called “La Compañía”. A wall of this canal collapsed on February 5, 2010 due to heavy rains creating the flooding of four surrounding communities. It is important to point out that this area is frequently exposed to floods. In this work, we consider a critical facility as an essential structure for performance, health care and welfare within a community or/and as a place that can be used as shelter in case of emergency or disaster. Global vulnerability (the sum of the three measured vulnerabilities) of the 25 critical facilities identified in the locations of Avándaro, San Isidro and El Triunfo was assessed using the Community Vulnerability Assessment Tool developed by the National Oceanic and Atmospheric Administration (NOAA). For each critical facility we determined its operational, structural and physical vulnerabilities. For our analysis, we considered the four main natural hazards to which Valle de Chalco is exposed: earthquakes, floods, landslides and sinking. We considered five levels of vulnerability using a scale from 1 to 5, where values range from very low to very high vulnerability, respectively. A critical facilities database was generated by collecting general information for three categories: schools, government and church. Each facility was evaluated considering its location in relation to identified high-risk areas. Our results indicate that in average, the global vulnerability of all facilities is low, however, there are particular cases in which this global vulnerability is high. The average operational vulnerability of the three communities is moderate. The global structural vulnerability (sum of the structural vulnerability for the four analyzed hazards) is moderate. In particular, the structural vulnerability to earthquakes is low, to landslides is very low, to flooding is moderate and to sinking is low. Due to the location of the critical facilities, its global physical vulnerability (sum of the physical vulnerability to the four analyzed hazards) is moderate. Only three facilities have very high physical vulnerability to floods. Churches (six facilities) have the highest operational vulnerability, whereas its structural vulnerability is the lowest. Schools (13 facilities) have the lowest operational vulnerability, nevertheless, there are two schools with very high vulnerability. Regarding the six government facilities, we identified that their structural vulnerability range from moderate to high. As a result of this work, we believe in the importance of strengthening the culture of civil protection within the critical facilities of the communities of Valle de Chalco.

  8. Indicator-based model to assess vulnerability to landslides in urban areas. Case study of Husi city (Eastern Romania)

    NASA Astrophysics Data System (ADS)

    Grozavu, Adrian; Ciprian Margarint, Mihai; Catalin Stanga, Iulian

    2013-04-01

    In the last three or four decades, vulnerability evolved from physical fragility meanings to a more complex concept, being a key element of risk assessment. In landslide risk assessment, there are a large series of studies regarding landslide hazard, but far fewer researches focusing on vulnerability measurement. Furthermore, there is still no unitary understanding on the methodological framework, neither any internationally agreed standard for landslide vulnerability measurements. The omnipresent common element is the existence of elements at risk, but while some approaches are limited to exposure, other focus on the degree of losses (human injuries, material damages and monetary losses, structural dysfunctions etc.). These losses are differently assessed using both absolute and relative values on qualitative or quantitative scales and they are differently integrated to provide a final vulnerability value. This study aims to assess vulnerability to landslides at local level using an indicator-based model applied to urban areas and tested for Husi town (Eastern Romania). The study region is characterized by permeable and impermeable alternating sedimentary rocks, monoclinal geological structure and hilly relief with impressive cuestas, continental temperate climate, and precipitation of about 500 mm/year, rising to 700 m and even more in some rainy years. The town is a middle size one (25000 inhabitants) and it had an ascending evolution in the last centuries, followed by an increasing human pressure on lands. Methodologically, the first step was to assess the landslide susceptibility and to identify in this way those regions within which any asset would be exposed to landslide hazards. Landslide susceptibility was assessed using the logistic regression approach, taking into account several quantitative and qualitative factors (elements of geology, morphometry, rainfall, land use etc.). The spatial background consisted in the Digital Elevation Model and all derived maps (slope, aspect, shading), realized based on the topographical plans and maps (1:1000, 1:5000). The second step was to realize the spatial inventory of elements at risk (vector format), based on the General Urban Plan (1:5000), the orthorectified aerial images (2009, resolution: 0.5 meters) and field investigations. All elements have been classified using attribute databases: residential buildings (single or multiple dwellings), other buildings according to their functionality, main and secondary roads, special transport network etc. Data about population have been added in order to assess the intrinsic value of each element and the number of potentially affected peoples. The study also took into account issues as preparedness and preventive measures (risk prevention plans, reinforcing structures, draining wells etc.), coping ability (network geometry and connectivity, emergency services accessibility) and recovering capacity (e.g. the existence of insurance policies). According to their importance and functionality, a distinct rank (ri … rn) was assigned to each element at risk (i1…in) showing the level of vulnerability. The rank values were assigned mainly on the expert knowledge and they range from 1 (limited damages, no affected people) to 5 (several households and people affected, dysfunctions in the urban system). The vulnerability index (Vi) was obtained combining the rank with the role of vulnerability factors (Fi), according to their degree of influence: the number of people that would be affected, the potential material and economic damages, the relationship with the neighboring exposed elements, the existence of the preventing, coping and recovering measures etc. Thus, the general equation of vulnerability has the form of weighted geometric mean: Vi=ri•Fi = ri•(w1F1 • w2F2 • … • wmFm). It must be noted that the weighting coefficients (wi) have subunitary or supraunitary value according to their role in diminishing or increasing the vulnerability level. The general vulnerability index (GVI) was obtained through a final transformation that was done to limit the spread of variation between zero (minimum vulnerability) and one (maximum vulnerability): GVIi = Vi/Vmax. In this form, the elements at risk are individually inventoried and spatialized in vector format as points, lines, polygons, each one having its own vulnerability value, but the results can be used only at the precise local level (both by practitioners and decision makers). To allow a more profound interpretation, the general vulnerability index was spatialized in two distinct ways: (1) creating a raster with a standard pixel size (e.g. 20 x 20 m, 50 x 50 m) and calculating the average vulnerability of the exposed elements in each pixel; (2) choosing a interpolation method (e.g. krigging) that would allow to integrate the spatial autocorrelation of the elements at risk and to obtain an output raster at the same resolution with the susceptibility map and a further risk assessment.

  9. Where Lies the Risk? An Ecological Approach to Understanding Child Mental Health Risk and Vulnerabilities in Sub-Saharan Africa

    PubMed Central

    Atilola, Olayinka

    2014-01-01

    Efforts at improving child-health and development initiatives in sub-Saharan Africa had focused on the physical health of children due to the neglect of child and adolescent mental health (CAMH) policy initiatives. A thorough and broad-based understanding of the prevalent child mental-health risk and vulnerability factors is needed to successfully articulate CAMH policies. In this discourse, we present a narrative on the child mental-health risk and vulnerability factors in sub-Saharan Africa. Through an ecological point of view, we identified widespread family poverty, poor availability and uptake of childcare resources, inadequate community and institutional childcare systems, and inadequate framework for social protection for vulnerable children as among the risk and vulnerability factors for CAMH in the region. Others are poor workplace policy/practice that does not support work-family life balance, poor legislative framework for child protection, and some harmful traditional practices. We conclude that an ecological approach shows that child mental-health risks are diverse and cut across different layers of the care environment. The approach also provides a broad and holistic template from which appropriate CAMH policy direction in sub-Saharan Africa can be understood. PMID:24834431

  10. Where lies the risk? An ecological approach to understanding child mental health risk and vulnerabilities in sub-saharan Africa.

    PubMed

    Atilola, Olayinka

    2014-01-01

    Efforts at improving child-health and development initiatives in sub-Saharan Africa had focused on the physical health of children due to the neglect of child and adolescent mental health (CAMH) policy initiatives. A thorough and broad-based understanding of the prevalent child mental-health risk and vulnerability factors is needed to successfully articulate CAMH policies. In this discourse, we present a narrative on the child mental-health risk and vulnerability factors in sub-Saharan Africa. Through an ecological point of view, we identified widespread family poverty, poor availability and uptake of childcare resources, inadequate community and institutional childcare systems, and inadequate framework for social protection for vulnerable children as among the risk and vulnerability factors for CAMH in the region. Others are poor workplace policy/practice that does not support work-family life balance, poor legislative framework for child protection, and some harmful traditional practices. We conclude that an ecological approach shows that child mental-health risks are diverse and cut across different layers of the care environment. The approach also provides a broad and holistic template from which appropriate CAMH policy direction in sub-Saharan Africa can be understood.

  11. Thermal reaction norms and the scale of temperature variation: latitudinal vulnerability of intertidal nacellid limpets to climate change.

    PubMed

    Morley, Simon A; Martin, Stephanie M; Day, Robert W; Ericson, Jess; Lai, Chien-Houng; Lamare, Miles; Tan, Koh-Siang; Thorne, Michael A S; Peck, Lloyd S

    2012-01-01

    The thermal reaction norms of 4 closely related intertidal Nacellid limpets, Antarctic (Nacella concinna), New Zealand (Cellana ornata), Australia (C. tramoserica) and Singapore (C. radiata), were compared across environments with different temperature magnitude, variability and predictability, to test their relative vulnerability to different scales of climate warming. Lethal limits were measured alongside a newly developed metric of "duration tenacity", which was tested at different temperatures to calculate the thermal reaction norm of limpet adductor muscle fatigue. Except in C. tramoserica which had a wide optimum range with two break points, duration tenacity did not follow a typical aerobic capacity curve but was best described by a single break point at an optimum temperature. Thermal reaction norms were shifted to warmer temperatures in warmer environments; the optimum temperature for tenacity (T(opt)) increased from 1.0°C (N. concinna) to 14.3°C (C. ornata) to 18.0°C (an average for the optimum range of C. tramoserica) to 27.6°C (C. radiata). The temperature limits for duration tenacity of the 4 species were most consistently correlated with both maximum sea surface temperature and summer maximum in situ habitat logger temperature. Tropical C. radiata, which lives in the least variable and most predictable environment, generally had the lowest warming tolerance and thermal safety margin (WT and TSM; respectively the thermal buffer of CT(max) and T(opt) over habitat temperature). However, the two temperate species, C. ornata and C. tramoserica, which live in a variable and seasonally unpredictable microhabitat, had the lowest TSM relative to in situ logger temperature. N. concinna which lives in the most variable, but seasonally predictable microhabitat, generally had the highest TSMs. Intertidal animals live at the highly variable interface between terrestrial and marine biomes and even small changes in the magnitude and predictability of their environment could markedly influence their future distributions.

  12. Thermal Reaction Norms and the Scale of Temperature Variation: Latitudinal Vulnerability of Intertidal Nacellid Limpets to Climate Change

    PubMed Central

    Morley, Simon A.; Martin, Stephanie M.; Day, Robert W.; Ericson, Jess; Lai, Chien-Houng; Lamare, Miles; Tan, Koh-Siang; Thorne, Michael A. S.; Peck, Lloyd S.

    2012-01-01

    The thermal reaction norms of 4 closely related intertidal Nacellid limpets, Antarctic (Nacella concinna), New Zealand (Cellana ornata), Australia (C. tramoserica) and Singapore (C. radiata), were compared across environments with different temperature magnitude, variability and predictability, to test their relative vulnerability to different scales of climate warming. Lethal limits were measured alongside a newly developed metric of “duration tenacity”, which was tested at different temperatures to calculate the thermal reaction norm of limpet adductor muscle fatigue. Except in C. tramoserica which had a wide optimum range with two break points, duration tenacity did not follow a typical aerobic capacity curve but was best described by a single break point at an optimum temperature. Thermal reaction norms were shifted to warmer temperatures in warmer environments; the optimum temperature for tenacity (Topt) increased from 1.0°C (N. concinna) to 14.3°C (C. ornata) to 18.0°C (an average for the optimum range of C. tramoserica) to 27.6°C (C. radiata). The temperature limits for duration tenacity of the 4 species were most consistently correlated with both maximum sea surface temperature and summer maximum in situ habitat logger temperature. Tropical C. radiata, which lives in the least variable and most predictable environment, generally had the lowest warming tolerance and thermal safety margin (WT and TSM; respectively the thermal buffer of CTmax and Topt over habitat temperature). However, the two temperate species, C. ornata and C. tramoserica, which live in a variable and seasonally unpredictable microhabitat, had the lowest TSM relative to in situ logger temperature. N. concinna which lives in the most variable, but seasonally predictable microhabitat, generally had the highest TSMs. Intertidal animals live at the highly variable interface between terrestrial and marine biomes and even small changes in the magnitude and predictability of their environment could markedly influence their future distributions. PMID:23285194

  13. Clinical-Functional Vulnerability Index-20 (IVCF-20): rapid recognition of frail older adults

    PubMed Central

    de Moraes, Edgar Nunes; do Carmo, Juliana Alves; de Moraes, Flávia Lanna; Azevedo, Raquel Souza; Machado, Carla Jorge; Montilla, Dalia Elena Romero

    2016-01-01

    ABSTRACT OBJECTIVE To evaluate the adequacy of the Clinical-Functional Vulnerability Index-20, a rapid triage instrument to test vulnerability in Brazilian older adults, for the use in primary health care. METHODS The study included convenience sample of 397 patients aged older than or equal to 60 years attended at Centro de Referência para o Idoso (Reference Center for Older Adults) and of 52 older adults the same age attended at the community. The results of the questionnaire, consisting of 20 questions, were compared with those of the Comprehensive Geriatric Assessment, considered a reference for identifying frail older adults. Spearman’s correlation was evaluated in the Clinical-Functional Vulnerability Index-20 with the Comprehensive Geriatric Assessment; the validity was verified by the area under the ROC curve; reliability was estimated by the percentage of agreement among evaluators and by the kappa coefficient, both with quadratic weighted. The cut-off point was obtained based on the higher accuracy criterion. Cronbach’s alpha, a measure of internal consistency, was estimated. RESULTS The Spearman’s correlation coefficient was high and positive for both groups (0.792 for older adults attended at the Reference Center and 0.305 for older adults from the community [p < 0.001]). The area under the ROC curve for older adults attended at the Reference Center was substantial (0.903). The cut-off point obtained was six, and older adults with scores in Clinical-Functional Vulnerability Index-20 above that value had strong possibility of being frail. For older adults from the community, the quadratic weighted agreement among evaluators was 99.5%, and the global quadratic weighted kappa coefficient was 0.94. Cronbach’s alpha was high for older adults attended at the Reference Center (0.861) and those attended at the community (0.740). CONCLUSIONS The Clinical-Functional Vulnerability Index-20 questionnaire, in the sample examined, turned out to be positively correlated with the Comprehensive Geriatric Assessment, in addition to the results indicating a high degree of validity and reliability. Thus, the Clinical-Functional Vulnerability Index-20 proves to be viable as a triage instrument in the primary health care that identifies frail older adults (older adults at risk of weakening and frail older adults). PMID:28099667

  14. Migration and HIV risk: Life histories of Mexican-born men living with HIV in North Carolina

    PubMed Central

    Mann, Lilli; Valera, Erik; Hightow-Weidman, Lisa B.; Barrington, Clare

    2015-01-01

    Latino men in the Southeastern USA are disproportionately affected by HIV, but little is known about how the migration process influences HIV-related risk. In North Carolina (NC), a relatively new immigrant destination, Latino men are predominantly young and from Mexico. We conducted 31 iterative life history interviews with 15 Mexican-born men living with HIV. We used holistic content narrative analysis methods to examine HIV vulnerability in the context of migration and to identify important turning points. Major themes included the prominence of traumatic early life experiences, migration as an ongoing process rather than a finite event, and HIV diagnosis as a final turning point in migration trajectories. Findings provide a nuanced understanding of HIV vulnerability throughout the migration process and have implications including the need for bi-national HIV prevention approaches, improved outreach around early testing and linkage to care, and attention to mental health. PMID:24866206

  15. Multiple Identification and Risks: Examination of Peer Factors across Multiracial and Single-Race Youth

    ERIC Educational Resources Information Center

    Choi, Yoonsun; He, Michael; Herrenkohl, Todd I.; Catalano, Richard F.; Toumbourou, John W.

    2012-01-01

    Multiracial youth are thought to be more vulnerable to peer-related risk factors than are single-race youth. However, there have been surprisingly few well-designed studies on this topic. This study empirically investigated the extent to which multiracial youth are at higher risk for peer influenced problem behavior. Data are from a representative…

  16. Development of a process-oriented vulnerability concept for water travel time in karst aquifers-case study of Tanour and Rasoun springs catchment area.

    NASA Astrophysics Data System (ADS)

    Hamdan, Ibraheem; Sauter, Martin; Ptak, Thomas; Wiegand, Bettina; Margane, Armin; Toll, Mathias

    2017-04-01

    Key words: Karst aquifer, water travel time, vulnerability assessment, Jordan. The understanding of the groundwater pathways and movement through karst aquifers, and the karst aquifer response to precipitation events especially in the arid to semi-arid areas is fundamental to evaluate pollution risks from point and non-point sources. In spite of the great importance of the karst aquifer for drinking purposes, karst aquifers are highly sensitive to contamination events due to the fast connections between the land-surface and the groundwater (through the karst features) which is makes groundwater quality issues within karst systems very complicated. Within this study, different methods and approaches were developed and applied in order to characterise the karst aquifer system of the Tanour and Rasoun springs (NW-Jordan) and the flow dynamics within the aquifer, and to develop a process-oriented method for vulnerability assessment based on the monitoring of different multi-spatially variable parameters of water travel time in karst aquifer. In general, this study aims to achieve two main objectives: 1. Characterization of the karst aquifer system and flow dynamics. 2. Development of a process-oriented method for vulnerability assessment based on spatially variable parameters of travel time. In order to achieve these aims, different approaches and methods were applied starting from the understanding of the geological and hydrogeological characteristics of the karst aquifer and its vulnerability against pollutants, to using different methods, procedures and monitored parameters in order to determine the water travel time within the aquifer and investigate its response to precipitation event and, finally, with the study of the aquifer response to pollution events. The integrated breakthrough signal obtained from the applied methods and procedures including the using of stable isotopes of oxygen and hydrogen, the monitoring of multi qualitative and quantitative parameters using automated probes and data loggers, and the development of travel time physics-based vulnerability assessment method shows good agreement as an applicable methods to determine the water travel time in karst aquifers, and to investigate its response to precipitation and pollution events.

  17. Single cell gene expression profiling in Alzheimer's disease.

    PubMed

    Ginsberg, Stephen D; Che, Shaoli; Counts, Scott E; Mufson, Elliott J

    2006-07-01

    Development and implementation of microarray techniques to quantify expression levels of dozens to hundreds to thousands of transcripts simultaneously within select tissue samples from normal control subjects and neurodegenerative diseased brains has enabled scientists to create molecular fingerprints of vulnerable neuronal populations in Alzheimer's disease (AD) and related disorders. A goal is to sample gene expression from homogeneous cell types within a defined region without potential contamination by expression profiles of adjacent neuronal subpopulations and nonneuronal cells. The precise resolution afforded by single cell and population cell RNA analysis in combination with microarrays and real-time quantitative polymerase chain reaction (qPCR)-based analyses allows for relative gene expression level comparisons across cell types under different experimental conditions and disease progression. The ability to analyze single cells is an important distinction from global and regional assessments of mRNA expression and can be applied to optimally prepared tissues from animal models of neurodegeneration as well as postmortem human brain tissues. Gene expression analysis in postmortem AD brain regions including the hippocampal formation and neocortex reveals selectively vulnerable cell types share putative pathogenetic alterations in common classes of transcripts, for example, markers of glutamatergic neurotransmission, synaptic-related markers, protein phosphatases and kinases, and neurotrophins/neurotrophin receptors. Expression profiles of vulnerable regions and neurons may reveal important clues toward the understanding of the molecular pathogenesis of various neurological diseases and aid in identifying rational targets toward pharmacotherapeutic interventions for progressive, late-onset neurodegenerative disorders such as mild cognitive impairment (MCI) and AD.

  18. Influence of childhood adversity on health among male UK military personnel.

    PubMed

    Iversen, Amy C; Fear, Nicola T; Simonoff, Emily; Hull, Lisa; Horn, Oded; Greenberg, Neil; Hotopf, Matthew; Rona, Roberto; Wessely, Simon

    2007-12-01

    Exposure to childhood adversity may explain why only a minority of combatants exposed to trauma develop psychological problems. To examine the association between self-reported childhood vulnerability and later health outcomes in a large randomly selected male military cohort. Data are derived from the first stage of a cohort study comparing Iraq veterans and non-deployed UK military personnel. We describe data collected by questionnaire from males in the regular UK armed forces (n=7937). Pre-enlistment vulnerability is associated with being single, of lower rank, having low educational attainment and serving in the Army. Pre-enlistment vulnerability is associated with a variety of negative health outcomes. Two main factors emerge as important predictors of ill health: a 'family relationships' factor reflecting the home environment and an 'externalising behaviour' factor reflecting behavioural disturbance. Pre-enlistment vulnerability is an important individual risk factor for ill health in military men. Awareness of such factors is important in understanding post-combat psychiatric disorder.

  19. Parental stress and perceived vulnerability at 5 and 10 years after pediatric SCT.

    PubMed

    Vrijmoet-Wiersma, C M J; Egeler, R M; Koopman, H M; Bresters, D; Norberg, A L; Grootenhuis, M A

    2010-06-01

    With the aim of assessing parental stress after SCT, 73 parents of children and adolescents who underwent SCT 5 or 10 years ago responded to questionnaires on general distress (General Health Questionnaire (GHQ)), disease-related stress (Pediatric Inventory for Parents-short form (PIP-SF)) and perceptions of child vulnerability (Child Vulnerability Scale (CVS)). General distress scores were comparable with the reference groups, but 40% of the mothers at 5 years after SCT reported increased stress levels as compared with 26% in the community-based reference group. Disease-related stress was comparable with the reference group of parents of children who were just off cancer treatment, 5 years after SCT. At 10 years after SCT, scores were lower than the reference group. Perceived child vulnerability did diminish over time, but remained high in parents of SCT survivors, compared with parents of healthy children: 96% of the parents at 5 years after SCT and 76% of the parents at 10 years after SCT scored above the cutoff point. Perceived vulnerability was found to be a predictor for parental disease-related stress. To conclude, although most parents of SCT survivors are resilient, the majority of parents perceive their child to be much more vulnerable as compared with parents of healthy children. This perception is associated with disease-related stress and may induce overprotective parenting.

  20. Casting light on xylem vulnerability in an herbaceous species reveals a lack of segmentation.

    PubMed

    Skelton, Robert P; Brodribb, Timothy J; Choat, Brendan

    2017-04-01

    Finding thresholds at which loss of plant functionality occurs during drought is critical for predicting future crop productivity and survival. Xylem resistance to embolism has been suggested as a key trait associated with water-stress tolerance. Although a substantial literature exists describing the vulnerability of woody stems to embolism, leaves and roots of herbaceous species remain under-represented. Also, little is known about vulnerability to embolism at a whole-plant scale or propagation of embolism within plants. New techniques to view the process of embolism formation provide opportunities to resolve long-standing questions. Here, we used multiple visual techniques, including X-ray micro-computed tomography and the optical vulnerability method, to investigate the spread of embolism within intact stems, leaves and roots of Solanum lycopersicum (common tomato). We found that roots, stems and leaves of tomato plants all exhibited similar vulnerability to embolism, suggesting that embolism rapidly propagates among tissues. Although we found scarce evidence for differentiation of xylem vulnerability among tissues at the scale of the whole plant, within a leaf the midrib embolized at higher water potentials than lower order veins. Substantial overlap between the onset of cavitation and incipient leaf damage suggests that cavitation represents a substantial damage to plants, but the point of lethal cavitation in this herbaceous species remains uncertain. © 2017 The Authors. New Phytologist © 2017 New Phytologist Trust.

  1. Vulnerability- and Diversity-Aware Anonymization of Personally Identifiable Information for Improving User Privacy and Utility of Publishing Data.

    PubMed

    Majeed, Abdul; Ullah, Farman; Lee, Sungchang

    2017-05-08

    Personally identifiable information (PII) affects individual privacy because PII combinations may yield unique identifications in published data. User PII such as age, race, gender, and zip code contain private information that may assist an adversary in determining the user to whom such information relates. Each item of user PII reveals identity differently, and some types of PII are highly identity vulnerable. More vulnerable types of PII enable unique identification more easily, and their presence in published data increases privacy risks. Existing privacy models treat all types of PII equally from an identity revelation point of view, and they mainly focus on hiding user PII in a crowd of other users. Ignoring the identity vulnerability of each type of PII during anonymization is not an effective method of protecting user privacy in a fine-grained manner. This paper proposes a new anonymization scheme that considers the identity vulnerability of PII to effectively protect user privacy. Data generalization is performed adaptively based on the identity vulnerability of PII as well as diversity to anonymize data. This adaptive generalization effectively enables anonymous data, which protects user identity and private information disclosures while maximizing the utility of data for performing analyses and building classification models. Additionally, the proposed scheme has low computational overheads. The simulation results show the effectiveness of the scheme and verify the aforementioned claims.

  2. Vulnerability- and Diversity-Aware Anonymization of Personally Identifiable Information for Improving User Privacy and Utility of Publishing Data

    PubMed Central

    Majeed, Abdul; Ullah, Farman; Lee, Sungchang

    2017-01-01

    Personally identifiable information (PII) affects individual privacy because PII combinations may yield unique identifications in published data. User PII such as age, race, gender, and zip code contain private information that may assist an adversary in determining the user to whom such information relates. Each item of user PII reveals identity differently, and some types of PII are highly identity vulnerable. More vulnerable types of PII enable unique identification more easily, and their presence in published data increases privacy risks. Existing privacy models treat all types of PII equally from an identity revelation point of view, and they mainly focus on hiding user PII in a crowd of other users. Ignoring the identity vulnerability of each type of PII during anonymization is not an effective method of protecting user privacy in a fine-grained manner. This paper proposes a new anonymization scheme that considers the identity vulnerability of PII to effectively protect user privacy. Data generalization is performed adaptively based on the identity vulnerability of PII as well as diversity to anonymize data. This adaptive generalization effectively enables anonymous data, which protects user identity and private information disclosures while maximizing the utility of data for performing analyses and building classification models. Additionally, the proposed scheme has low computational overheads. The simulation results show the effectiveness of the scheme and verify the aforementioned claims. PMID:28481298

  3. Identifying, Assessing, and Mitigating Risk of Single-Point Inspections on the Space Shuttle Reusable Solid Rocket Motor

    NASA Technical Reports Server (NTRS)

    Greenhalgh, Phillip O.

    2004-01-01

    In the production of each Space Shuttle Reusable Solid Rocket Motor (RSRM), over 100,000 inspections are performed. ATK Thiokol Inc. reviewed these inspections to ensure a robust inspection system is maintained. The principal effort within this endeavor was the systematic identification and evaluation of inspections considered to be single-point. Single-point inspections are those accomplished on components, materials, and tooling by only one person, involving no other check. The purpose was to more accurately characterize risk and ultimately address and/or mitigate risk associated with single-point inspections. After the initial review of all inspections and identification/assessment of single-point inspections, review teams applied risk prioritization methodology similar to that used in a Process Failure Modes Effects Analysis to derive a Risk Prioritization Number for each single-point inspection. After the prioritization of risk, all single-point inspection points determined to have significant risk were provided either with risk-mitigating actions or rationale for acceptance. This effort gave confidence to the RSRM program that the correct inspections are being accomplished, that there is appropriate justification for those that remain as single-point inspections, and that risk mitigation was applied to further reduce risk of higher risk single-point inspections. This paper examines the process, results, and lessons learned in identifying, assessing, and mitigating risk associated with single-point inspections accomplished in the production of the Space Shuttle RSRM.

  4. Consensus statement of the Academy of Nutrition and Dietetics/American Society for Parenteral and Enteral Nutrition: indicators recommended for the identification and documentation of pediatric malnutrition (undernutrition).

    PubMed

    Becker, Patricia; Carney, Liesje Nieman; Corkins, Mark R; Monczka, Jessica; Smith, Elizabeth; Smith, Susan E; Spear, Bonnie A; White, Jane V

    2015-02-01

    The Academy of Nutrition and Dietetics (the Academy) and the American Society for Parenteral and Enteral Nutrition (A.S.P.E.N.), utilizing an evidence-informed, consensus-derived process, recommend that a standardized set of diagnostic indicators be used to identify and document pediatric malnutrition (undernutrition) in routine clinical practice. The recommended indicators include z scores for weight-for-height/length, body mass index-for-age, or length/height-for-age or mid-upper arm circumference when a single data point is available. When 2 or more data points are available, indicators may also include weight gain velocity (<2 years of age), weight loss (2-20 years of age), deceleration in weight for length/height z score, and inadequate nutrient intake. The purpose of this consensus statement is to identify a basic set of indicators that can be used to diagnose and document undernutrition in the pediatric population ages 1 month to 18 years. The indicators are intended for use in multiple settings (eg, acute, ambulatory care/outpatient, residential care). Several screening tools have been developed for use in hospitalized children. However, identifying criteria for use in screening for nutritional risk is not the purpose of this paper. Clinicians should use as many data points as available to identify and document the presence of malnutrition. The universal use of a single set of diagnostic parameters will expedite the recognition of pediatric undernutrition, lead to the development of more accurate estimates of its prevalence and incidence, direct interventions, and promote improved outcomes. A standardized diagnostic approach will also inform the prediction of the human and financial responsibilities and costs associated with the prevention and treatment of undernutrition in this vulnerable population and help to further ensure the provision of high-quality, cost-effective nutritional care. © 2014 American Society for Parenteral and Enteral Nutrition and Academy of Nutrition and Dietetics.

  5. Will electrical cyber-physical interdependent networks undergo first-order transition under random attacks?

    NASA Astrophysics Data System (ADS)

    Ji, Xingpei; Wang, Bo; Liu, Dichen; Dong, Zhaoyang; Chen, Guo; Zhu, Zhenshan; Zhu, Xuedong; Wang, Xunting

    2016-10-01

    Whether the realistic electrical cyber-physical interdependent networks will undergo first-order transition under random failures still remains a question. To reflect the reality of Chinese electrical cyber-physical system, the "partial one-to-one correspondence" interdependent networks model is proposed and the connectivity vulnerabilities of three realistic electrical cyber-physical interdependent networks are analyzed. The simulation results show that due to the service demands of power system the topologies of power grid and its cyber network are highly inter-similar which can effectively avoid the first-order transition. By comparing the vulnerability curves between electrical cyber-physical interdependent networks and its single-layer network, we find that complex network theory is still useful in the vulnerability analysis of electrical cyber-physical interdependent networks.

  6. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chicoine, T.K.; Fay, P.K.; Nielsen, G.A.

    Soil characteristics, elevation, annual precipitation, potential evapotranspiration, length of frost-free season, and mean maximum July temperature were estimated for 116 established infestations of spotted knapweed (Centaurea maculosa Lam. number/sup 3/ CENMA) in Montana using basic land resource maps. Areas potentially vulnerable to invasion by the plant were delineated on the basis of representative edaphic and climatic characteristics. No single environmental variable was an effective predictor of sites vulnerable to invasion by spotted knapweed. Only a combination of variables was effective, indicating that the factors that regulate adaptability of this plant are complex. This technique provides a first approximation map ofmore » the regions most similar environmentally to infested sites and; therefore, most vulnerable to further invasion. This weed migration prediction technique shows promise for predicting suitable habitats of other invader species. 6 references, 4 figures, 1 table.« less

  7. Peace education: Learning to hate war, love peace, and to do something about it

    NASA Astrophysics Data System (ADS)

    Galtung, Johan

    1983-09-01

    Peace education should not be only general knowledge but conclude with something the students can do — as when health education leads to hygienic practices. For this to happen, our peace concepts have to come closer to the level at which people live, the local level. It is argued that this points to transarmament rather than disarmament; to defence based on local conventional defence, paramilitary units and non-military defence, rather than (or in addition to) negotiations among governments. It is also pointed out that this would lead to the building of less vulnerable societies from the bottom up. Less vulnerable societies would have great capacity for survival even in times of crisis, including warfare in the country itself, being thereby less susceptible to blackmail. The key to national invulnerability is local-level invulnerability. And a society organised with less dependency on national and international centres will also be a society less dependent on offensive weapons, concentrating more on defensive modes of security. Present and dominant modes of defence not only try to combine a high level of vulnerability with offensive weapons, but also operate at a level so far away from the ordinary citizen that he/she feels there is little else to do than just to be informed and perhaps to have strong opinions.

  8. Vulnerability to stress in migratory contexts: a study with Eastern European immigrants residing in Portugal.

    PubMed

    de Almeida Vieira Monteiro, Ana Paula Teixeira; Serra, Adriano Vaz

    2011-08-01

    The assessment of individual vulnerability to stress emerges as a predictive factor of a higher risk of developing stress-related disorders. In the last decade, the geography of immigration in Portugal experienced intense transformations in terms of recruitment and patterns of geographic settlement, with an increasing and exponential inflow of new and diversified migratory groups. The immigrant populations coming from Eastern European countries are a recent migratory flow, with linguistic, cultural and socio-demographic specificities which are very different from the general Portuguese population. This makes them a paradigmatic group in potential transcultural studies on mental health issues. The primary aim of the study was to describe the characteristics of vulnerability to stress and determine their impact on the mental health status of Russian-speaking immigrants residing in Portugal. The relationship between vulnerability to stress, sociodemographic variables, mental health status and social support were analyzed, using the SSQ6, GHQ28, 23QVS and a socio-demographic questionnaire. A comparative analysis was carried out, using a control group of 110 Portuguese subjects without previous migratory experiences, matched by sex, age group and academic qualifications. The eastern European immigrants reported high levels of vulnerability to stress assessed by the cut-off point of the 23QVS. Immigrants also reported higher percentage of vulnerability to stress and lower social support levels of social support versus the control group. Several factors inherent to the dynamics of the migratory process were related to the presence of vulnerability to stress. The findings suggest that vulnerability to stress is positively correlated with worse mental health outcomes and negatively correlated with the social support perceived as available--number of supporters and satisfaction with social support.

  9. Computational discovery of pathway-level genetic vulnerabilities in non-small-cell lung cancer

    PubMed Central

    Young, Jonathan H.; Peyton, Michael; Seok Kim, Hyun; McMillan, Elizabeth; Minna, John D.; White, Michael A.; Marcotte, Edward M.

    2016-01-01

    Motivation: Novel approaches are needed for discovery of targeted therapies for non-small-cell lung cancer (NSCLC) that are specific to certain patients. Whole genome RNAi screening of lung cancer cell lines provides an ideal source for determining candidate drug targets. Results: Unsupervised learning algorithms uncovered patterns of differential vulnerability across lung cancer cell lines to loss of functionally related genes. Such genetic vulnerabilities represent candidate targets for therapy and are found to be involved in splicing, translation and protein folding. In particular, many NSCLC cell lines were especially sensitive to the loss of components of the LSm2-8 protein complex or the CCT/TRiC chaperonin. Different vulnerabilities were also found for different cell line subgroups. Furthermore, the predicted vulnerability of a single adenocarcinoma cell line to loss of the Wnt pathway was experimentally validated with screening of small-molecule Wnt inhibitors against an extensive cell line panel. Availability and implementation: The clustering algorithm is implemented in Python and is freely available at https://bitbucket.org/youngjh/nsclc_paper. Contact: marcotte@icmb.utexas.edu or jon.young@utexas.edu Supplementary information: Supplementary data are available at Bioinformatics online. PMID:26755624

  10. Computational discovery of pathway-level genetic vulnerabilities in non-small-cell lung cancer.

    PubMed

    Young, Jonathan H; Peyton, Michael; Seok Kim, Hyun; McMillan, Elizabeth; Minna, John D; White, Michael A; Marcotte, Edward M

    2016-05-01

    Novel approaches are needed for discovery of targeted therapies for non-small-cell lung cancer (NSCLC) that are specific to certain patients. Whole genome RNAi screening of lung cancer cell lines provides an ideal source for determining candidate drug targets. Unsupervised learning algorithms uncovered patterns of differential vulnerability across lung cancer cell lines to loss of functionally related genes. Such genetic vulnerabilities represent candidate targets for therapy and are found to be involved in splicing, translation and protein folding. In particular, many NSCLC cell lines were especially sensitive to the loss of components of the LSm2-8 protein complex or the CCT/TRiC chaperonin. Different vulnerabilities were also found for different cell line subgroups. Furthermore, the predicted vulnerability of a single adenocarcinoma cell line to loss of the Wnt pathway was experimentally validated with screening of small-molecule Wnt inhibitors against an extensive cell line panel. The clustering algorithm is implemented in Python and is freely available at https://bitbucket.org/youngjh/nsclc_paper marcotte@icmb.utexas.edu or jon.young@utexas.edu Supplementary data are available at Bioinformatics online. © The Author 2016. Published by Oxford University Press.

  11. Individual risk alleles of susceptibility to schizophrenia are associated with poor clinical and social outcomes.

    PubMed

    Sakamoto, Shinji; Takaki, Manabu; Okahisa, Yuko; Mizuki, Yutaka; Inagaki, Masatoshi; Ujike, Hiroshi; Mitsuhashi, Toshiharu; Takao, Soshi; Ikeda, Masashi; Uchitomi, Yosuke; Iwata, Nakao; Yamada, Norihito

    2016-04-01

    Many patients with schizophrenia have poor clinical and social outcomes. Some risk alleles closely related to the onset of schizophrenia have been reported to be associated with their clinical phenotypes, but the direct relationship between genetic vulnerability to schizophrenia and clinical/social outcomes of schizophrenia, as evaluated by both practical clinical scales and 'real-world' function, has not been investigated. We evaluated the clinical and social outcomes of 455 Japanese patients with schizophrenia by severity of illness according to the Clinical Global Impression-Severity Scale (CGI-S) and social outcomes by social adjustment/maladjustment at 5 years after the first visit. We examined whether 46 single nucleotide polymorphisms (SNPs) selected from a Japanese genome-wide association study of susceptibility to schizophrenia were associated with clinical and social outcomes. We also investigated the polygenic risk scores of 46 SNPs. Allele-wise association analysis detected three SNPs, including rs2623659 in the CUB and Sushi multiple domains-1 (CSMD1) gene, associated with severity of illness at end point. The severity of illness at end point was associated with treatment response, but not with the severity of illness at baseline. Three SNPs, including rs2294424 in the C6orf105 gene, were associated with social outcomes. Point estimates of odds ratios showed positive relationships between polygenic risk scores and clinical/social outcomes; however, the results were not statistically significant. Because these results are exploratory, we need to replicate them with a larger sample in a future study.

  12. Security and Privacy Assurance Research (SPAR) Pilot Final Report

    DTIC Science & Technology

    2015-11-30

    for a single querier interacting with a single encrypted database. In order to deploy the technology, the underlying cryptography must support multiple...underlying cryptography . A full SPAR system should be evaluated too including the software itself. Software should be checked for consistency with...ESPADA included cryptography libraries (e.g., gnutls, nettle, and openssl). Consider a hypothetical scenario in which a vulnerability is discovered in

  13. Single event effects in pulse width modulation controllers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Penzin, S.H.; Crain, W.R.; Crawford, K.B.

    1996-12-01

    SEE testing was performed on pulse width modulation (PWM) controllers which are commonly used in switching mode power supply systems. The devices are designed using both Set-Reset (SR) flip-flops and Toggle (T) flip-flops which are vulnerable to single event upset (SEU) in a radiation environment. Depending on the implementation of the different devices the effect can be significant in spaceflight hardware.

  14. Spatial-temporal analysis of dengue deaths: identifying social vulnerabilities.

    PubMed

    Silva, Maria do Socorro da; Branco, Maria Dos Remédios Freitas Carvalho; Aquino, José; Queiroz, Rejane Christine de Sousa; Bani, Emanuele; Moreira, Emnielle Pinto Borges; Medeiros, Maria Nilza Lima; Rodrigues, Zulimar Márita Ribeiro

    2017-01-01

    Currently, dengue fever, chikungunya fever, and zika virus represent serious public health issues in Brazil, despite efforts to control the vector, the Aedes aegypti mosquito. This was a descriptive and ecological study of dengue deaths occurring from 2002 to 2013 in São Luis, Maranhão, Brazil. Geoprocessing software was used to draw maps, linking the geo-referenced deaths with urban/social data at census tract level. There were 74 deaths, concentrated in areas of social vulnerability. The use of geo-technology tools pointed to a concentration of dengue deaths in specific intra-urban areas.

  15. A Comprehensive evaluation of groundwater vulnerability to saltwater up-coning and sea water intrusion in a coastal aquifer (case study: Ghaemshahr-juybar aquifer)

    NASA Astrophysics Data System (ADS)

    Motevalli, Alireza; Moradi, Hamid Reza; Javadi, Saman

    2018-02-01

    Aquifer salinization has recently increased significantly due to human activity and has caused irreparable environmental and economic effects. In this research, a new method is proposed for modeling the vulnerability to salinity for the Ghaemshahr-juybar aquifer. Specifically, the GALDIT (Sea water intrusion) and TAWLBIC (Saltwater up-coning) indices were combined to produce a map of vulnerability (Comprehensive Salinity Index or CSI) to seawater intrusion of a region near the coast and saltwater up-coning away from the coast, respectively. Single parameter and removal layer sensitivity analysis were performed in order to identify the sensitive parameters and achieve optimal weights (through the single-parameter method) of contributing factors in all three methods. The three optimized methods produced were GALDIT-Opt, TAWLBIC-Opt and CSI-Opt. To assess the accuracy of the original maps and optimal ones, the Pearson correlation was used. Results indicated that the Pearson correlation of the optimized GALDIT, TAWLBIC and CSI model was better than GALDIT, TAWLBIC and CSI. The results show that the increase in correlation between EC (Electrical Conductivity), TDS (Total Dissolved Solids) and SAR (Sodium Adsorption Ratio) from the GALDIT model to the CSI-Opt model from values of 0.64, 0.56 and 0.68 has improved to values of 0.81, 0.88 and 0.91, respectively. The highest concentration of EC, with a value of 7050 μs/cm, is sampled in the areas of the east and northwest of the Ghaemshahr-juybar aquifer, which are classified in the CSI-Opt model as high and very high vulnerability levels. The highest concentration of TDS and SAR has been found in the east, northwest and northeast of the Ghaemshahr-juybar aquifer with a value of 4724 ppm for TDS and 14 mg/l for SAR that have been modeled in the CSI-Opt index as highly vulnerable areas. Eventually, CSI mapping can be used as an efficient tool in prioritizing in terms of the vulnerability to aquifer salinity, carrying out adjustments, recharge, and adaptation policies for this issue.

  16. Vulnerabilities to climate change of Massachusetts animal species of greatest conservation need

    USGS Publications Warehouse

    Galbraith, Hector; Morelli, Toni L.

    2017-01-01

    Over the last decade, the Commonwealth of Massachusetts has addressed the potential and actual impacts of climate change on state flora and fauna. The state’s involvement began in 2007 when, led by the Division of Fisheries and Wildlife (DFW) and assisted by Manomet Center for Con-servation Research, it carried out one of the first habitat vulnerability assessments in North America (Manomet, 2010). The new methods and processes that resulted were later applied to vulnerability assessments in North America and elsewhere. In 2011, the state assisted the North-eastern Association of Fish and Wildlife Agencies (NEAFWA) in organizing and leading a pio-neering three-year, thirteen-state research effort to evaluate the vulnerabilities of fish and wild-life habitats to climate change in the northeast, from Maine south to West Virginia (NEAFWA, 2012). This focus on climate change vulnerabilities led to three important early realizations: (1) simply categorizing and scoring vulnerabilities might not lead to better conservation outcomes. It was vital to also understand why some resources were more or less vulnerable to climate change in order to identify potential intervention points on which conservation actions and strategies could be based. (2) simply producing research results was not enough; these results had to be cast as specific conservation actions. Moreover (3), these actions needed to be communicated in a useful form to conservation “actors”, such as state agencies, land trusts, land managers, etc. These real-izations led to the next step on the Commonwealth’s journey to effective conservation in an age of climate change - the Massachusetts Wildlife Climate Action Tool (CAT).

  17. Predicting risk in space: Genetic markers for differential vulnerability to sleep restriction

    NASA Astrophysics Data System (ADS)

    Goel, Namni; Dinges, David F.

    2012-08-01

    Several laboratories have found large, highly reliable individual differences in the magnitude of cognitive performance, fatigue and sleepiness, and sleep homeostatic vulnerability to acute total sleep deprivation and to chronic sleep restriction in healthy adults. Such individual differences in neurobehavioral performance are also observed in space flight as a result of sleep loss. The reasons for these stable phenotypic differential vulnerabilities are unknown: such differences are not yet accounted for by demographic factors, IQ or sleep need, and moreover, psychometric scales do not predict those individuals cognitively vulnerable to sleep loss. The stable, trait-like (phenotypic) inter-individual differences observed in response to sleep loss—with intraclass correlation coefficients accounting for 58-92% of the variance in neurobehavioral measures—point to an underlying genetic component. To this end, we utilized multi-day highly controlled laboratory studies to investigate the role of various common candidate gene variants—each independently—in relation to cumulative neurobehavioral and sleep homeostatic responses to sleep restriction. These data suggest that common genetic variations (polymorphisms) involved in sleep-wake, circadian, and cognitive regulation may serve as markers for prediction of inter-individual differences in sleep homeostatic and neurobehavioral vulnerability to sleep restriction in healthy adults. Identification of genetic predictors of differential vulnerability to sleep restriction—as determined from candidate gene studies—will help identify astronauts most in need of fatigue countermeasures in space flight and inform medical standards for obtaining adequate sleep in space. This review summarizes individual differences in neurobehavioral vulnerability to sleep deprivation and ongoing genetic efforts to identify markers of such differences.

  18. Effects of a Single Bout of Aerobic Exercise Versus Resistance Training on Cognitive Vulnerabilities for Anxiety Disorders.

    PubMed

    Broman-Fulks, Joshua J; Kelso, Kerry; Zawilinski, Laci

    2015-01-01

    The purpose of this study was to compare the relative effects of a single bout of aerobic exercise versus resistance training on cognitive vulnerabilities for anxiety disorders. Seventy-seven participants (60% female; 84% Caucasian) were randomized to complete 20 min of moderate-intensity aerobic exercise, resistance training, or rest, followed by a 35% CO2/65% O2 inhalation challenge task. Results indicated that aerobic exercise and resistance training were significantly and equally effective in reducing anxiety sensitivity (AS) compared with rest ((η(2)(p ) = 52), though only aerobic exercise significantly attenuated reactivity to the CO2 challenge task. Neither form of exercise generated observable effects on distress tolerance, discomfort intolerance, or state anxiety (all ps >.10). The results of this study are discussed with regard to their implications for the use of exercise interventions for anxiety and related forms of psychopathology, and potential directions for future research are discussed.

  19. Vulnerability Assessments and Resilience Planning at Federal Facilities. Preliminary Synthesis of Project

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Moss, R. H.; Blohm, A. J.; Delgado, A.

    2015-08-15

    U.S. government agencies are now directed to assess the vulnerability of their operations and facilities to climate change and to develop adaptation plans to increase their resilience. Specific guidance on methods is still evolving based on the many different available frameworks. Agencies have been experimenting with these frameworks and approaches. This technical paper synthesizes lessons and insights from a series of research case studies conducted by the investigators at facilities of the U.S. Department of Energy and the Department of Defense. The purpose of the paper is to solicit comments and feedback from interested program managers and analysts before finalmore » conclusions are published. The paper describes the characteristics of a systematic process for prioritizing needs for adaptation planning at individual facilities and examines requirements and methods needed. It then suggests a framework of steps for vulnerability assessments at Federal facilities and elaborates on three sets of methods required for assessments, regardless of the detailed framework used. In a concluding section, the paper suggests a roadmap to further develop methods to support agencies in preparing for climate change. The case studies point to several preliminary conclusions; (1) Vulnerability assessments are needed to translate potential changes in climate exposure to estimates of impacts and evaluation of their significance for operations and mission attainment, in other words into information that is related to and useful in ongoing planning, management, and decision-making processes; (2) To increase the relevance and utility of vulnerability assessments to site personnel, the assessment process needs to emphasize the characteristics of the site infrastructure, not just climate change; (3) A multi-tiered framework that includes screening, vulnerability assessments at the most vulnerable installations, and adaptation design will efficiently target high-risk sites and infrastructure; (4) Vulnerability assessments can be connected to efforts to improve facility resilience to motivate participation; and (5) Efficient, scalable methods for vulnerability assessment can be developed, but additional case studies and evaluation are required.« less

  20. Vulnerability of ground water to atrazine leaching in Kent County, Michigan

    USGS Publications Warehouse

    Holtschlag, D.J.; Luukkonen, C.L.

    1997-01-01

    A steady-state model of pesticide leaching through the unsaturated zone was used with readily available hydrologic, lithologic, and pesticide characteristics to estimate the vulnerability of the near-surface aquifer to atrazine contamination from non-point sources in Kent County, Michigan. The modelcomputed fraction of atrazine remaining at the water table, RM, was used as the vulnerability criterion; time of travel to the water table also was computed. Model results indicate that the average fraction of atrazine remaining at the water table was 0.039 percent; the fraction ranged from 0 to 3.6 percent. Time of travel of atrazine from the soil surface to the water table averaged 17.7 years and ranged from 2.2 to 118 years.Three maps were generated to present three views of the same atrazine vulnerability characteristics using different metrics (nonlinear transformations of the computed fractions remaining). The metrics were chosen because of the highly (right) skewed distribution of computed fractions. The first metric, rm = RMλ (where λ was 0.0625), depicts a relatively uniform distribution of vulnerability across the county with localized areas of high and low vulnerability visible. The second metric, rmλ-0.5, depicts about one-half the county at low vulnerability with discontinuous patterns of high vulnerability evident. In the third metric, rmλ-1.0 (RM), more than 95 percent of the county appears to have low vulnerability; small, distinct areas of high vulnerability are present.Aquifer vulnerability estimates in the RM metric were used with a steady-state, uniform atrazine application rate to compute a potential concentration of atrazine in leachate reaching the water table. The average estimated potential atrazine concentration in leachate at the water table was 0.16 μg/L (micrograms per liter) in the model area; estimated potential concentrations ranged from 0 to 26 μg/L. About 2 percent of the model area had estimated potential atrazine concentrations in leachate at the water table that exceeded the USEPA (U.S. Environmental Protection Agency) maximum contaminant level of 3 μg/L.Uncertainty analyses were used to assess effects of parameter uncertainty and spatial interpolation error on the variability of the estimated fractions of atrazine remaining at the water table. Results of Monte Carlo simulations indicate that parameter uncertainty is associated with a standard error of 0.0875 in the computed fractions (in the rm metric). Results of kriging analysis indicate that errors in spatial interpolation are associated with a standard error of 0.146 (in the rm metric). Thus, uncertainty in fractions remaining is primarily associated with spatial interpolation error, which can be reduced by increasing the density of points where the leaching model is applied.A sensitivity analysis indicated which of 13 hydrologic, lithologic, and pesticide characteristics were influential in determining fractions of atrazine remaining at the water table. Results indicate that fractions remaining are most sensitive to the unit changes in pesticide half life and in organic-carbon content in soils and unweathered rocks, and least sensitive to infiltration rates.The leaching model applied in this report provides an estimate of the vulnerability of the near-surface aquifer in Kent County to contamination by atrazine. The vulnerability estimate is related to water-quality criteria developed by the USEPA to help assess potential risks from atrazine to the near-surface aquifer. However, atrazine accounts for only 28 percent of the herbicide use in the county; additional potential for contamination exists from other pesticides and pesticide metabolites. Therefore, additional work is needed to develop a comprehensive understanding of the relative risks associated with specific pesticides. The modeling approach described in this report provides a technique for estimating relative vulnerabilities to specific pesticides and for helping to assess potential risks.

  1. Performance-based methodology for assessing seismic vulnerability and capacity of buildings

    NASA Astrophysics Data System (ADS)

    Shibin, Lin; Lili, Xie; Maosheng, Gong; Ming, Li

    2010-06-01

    This paper presents a performance-based methodology for the assessment of seismic vulnerability and capacity of buildings. The vulnerability assessment methodology is based on the HAZUS methodology and the improved capacitydemand-diagram method. The spectral displacement ( S d ) of performance points on a capacity curve is used to estimate the damage level of a building. The relationship between S d and peak ground acceleration (PGA) is established, and then a new vulnerability function is expressed in terms of PGA. Furthermore, the expected value of the seismic capacity index (SCev) is provided to estimate the seismic capacity of buildings based on the probability distribution of damage levels and the corresponding seismic capacity index. The results indicate that the proposed vulnerability methodology is able to assess seismic damage of a large number of building stock directly and quickly following an earthquake. The SCev provides an effective index to measure the seismic capacity of buildings and illustrate the relationship between the seismic capacity of buildings and seismic action. The estimated result is compared with damage surveys of the cities of Dujiangyan and Jiangyou in the M8.0 Wenchuan earthquake, revealing that the methodology is acceptable for seismic risk assessment and decision making. The primary reasons for discrepancies between the estimated results and the damage surveys are discussed.

  2. Vulnerability of global food production to extreme climatic events.

    PubMed

    Yeni, F; Alpas, H

    2017-06-01

    It is known that the frequency, intensity or duration of the extreme climatic events have been changing substantially. The ultimate goal of this study was to identify current vulnerabilities of global primary food production against extreme climatic events, and to discuss potential entry points for adaptation planning by means of an explorative vulnerability analysis. Outcomes of this analysis were demonstrated as a composite index where 118 country performances in maintaining safety of food production were compared and ranked against climate change. In order to better interpret the results, cluster analysis technique was used as a tool to group the countries based on their vulnerability index (VI) scores. Results suggested that one sixth of the countries analyzed were subject to high level of exposure (0.45-1), one third to high to very high level of sensitivity (0.41-1) and low to moderate level of adaptive capacity (0-0.59). Proper adaptation strategies for reducing the microbial and chemical contamination of food products, soil and waters on the field were proposed. Finally, availability of data on food safety management systems and occurrence of foodborne outbreaks with global coverage were proposed as key factors for improving the robustness of future vulnerability assessments. Copyright © 2017 Elsevier Ltd. All rights reserved.

  3. Prefrontal vulnerabilities and whole brain connectivity in aging and depression.

    PubMed

    Lamar, Melissa; Charlton, Rebecca A; Ajilore, Olusola; Zhang, Aifeng; Yang, Shaolin; Barrick, Thomas R; Rhodes, Emma; Kumar, Anand

    2013-07-01

    Studies exploring the underpinnings of age-related neurodegeneration suggest fronto-limbic alterations that are increasingly vulnerable in the presence of disease including late life depression. Less work has assessed the impact of this specific vulnerability on widespread brain circuitry. Seventy-nine older adults (healthy controls=45; late life depression=34) completed translational tasks shown in non-human primates to rely on fronto-limbic networks involving dorsolateral (Self-Ordered Pointing Task) or orbitofrontal (Object Alternation Task) cortices. A sub-sample of participants also completed diffusion tensor imaging for white matter tract quantification (uncinate and cingulum bundle; n=58) and whole brain tract-based spatial statistics (n=62). Despite task associations to specific white matter tracts across both groups, only healthy controls demonstrated significant correlations between widespread tract integrity and cognition. Thus, increasing Object Alternation Task errors were associated with decreasing fractional anisotropy in the uncinate in late life depression; however, only in healthy controls was the uncinate incorporated into a larger network of white matter vulnerability associating fractional anisotropy with Object Alternation Task errors using whole brain tract-based spatial statistics. It appears that the whole brain impact of specific fronto-limbic vulnerabilities in aging may be eclipsed in the presence of disease-specific neuropathology like that seen in late life depression. Copyright © 2013 Elsevier Ltd. All rights reserved.

  4. Assessing the social vulnerability to malaria in Rwanda.

    PubMed

    Bizimana, Jean-Pierre; Twarabamenye, Emmanuel; Kienberger, Stefan

    2015-01-07

    Since 2004, malaria interventions in Rwanda have resulted in substantial decline of malaria incidence. However, this achievement is fragile as potentials for local malaria transmissions remain. The risk of getting malaria infection is partially explained by social conditions of vulnerable populations. Since vulnerability to malaria is both influenced by social and environmental factors, its complexity cannot be measured by a single value. The aim of this paper is, therefore, to apply a composite indicator approach for assessing social vulnerability to malaria in Rwanda. This assessment informs the decision-makers in targeting malaria interventions and allocating limited resources to reduce malaria burden in Rwanda. A literature review was used to conceptualize the social vulnerability to malaria and to select the appropriate vulnerability indicators. Indicators used in the index creation were classified into susceptibility and lack of resilience vulnerability domains. The main steps followed include selection of indicators and datasets, imputation of missing values, descriptive statistics, normalization and weighting of indicators, local sensitivity analysis and indicators aggregation. Correlation analysis helped to empirically evidence the association between the indicators and malaria incidence. The high values of social vulnerability to malaria are found in Gicumbi, Rusizi, Nyaruguru and Gisagara, and low values in Muhanga, Nyarugenge, Kicukiro and Nyanza. The most influential susceptibility indicators to increase malaria are population change (r = 0.729), average number of persons per bedroom (r = 0.531), number of households affected by droughts and famines (r = 0.591), and area used for irrigation (r = 0.611). The bed net ownership (r = -0.398) and poor housing wall materials (0.378) are the lack of resilience indicators that significantly correlate with malaria incidence. The developed composite index social vulnerability to malaria indicates which indicators need to be addressed and in which districts. The results from this study are salient for public health policy- and decision makers in malaria control in Rwanda and timely support the national integrated malaria initiative. Future research development should focus on spatial explicit vulnerability assessment by combining environmental and social drivers to achieve an integrated and complete assessment of vulnerability to malaria.

  5. Multiple Identification and Risks: Examination of Peer Factors Across Multiracial and Single-Race Youth

    PubMed Central

    Choi, Yoonsun; He, Michael; Herrenkohl, Todd I.; Catalano, Richard F.; Toumbourou, John W.

    2012-01-01

    Multiracial youth are thought to be more vulnerable to peer-related risk factors than are single-race youth. However, there have been surprisingly few well-designed studies on this topic. This study empirically investigated the extent to which multiracial youth are at higher risk for peer influenced problem behavior. Data are from a representative and longitudinal sample of youth from Washington State (N = 1,760, mean age = 14.13, 50.9% girls). Of those in the sample, 225 youth self-identified as multiracial (12.8%), 1,259 as White (71.5%), 152 as Latino (8.6%), and 124 as Asian American (7.1%). Results show that multiracial youth have higher rates of violence and alcohol use than Whites and more marijuana use than Asian Americans. Higher levels of socioeconomic disadvantage and single-parent family status partly explained the higher rates of problem behaviors among multiracial youth. Peer risk factors of substance-using or antisocial friends were higher for multiracial youth than Whites, even after socioeconomic variables were accounted for, demonstrating a higher rate of peer risks among multiracial youth. The number of substance-using friends was the most consistently significant correlate and predictor of problems and was highest among multiracial youth. However, interaction tests did not provide consistent evidence of a stronger influence of peer risks among multiracial youth. Findings underscore the importance of a differentiated understanding of vulnerability in order to better target prevention and intervention efforts as well as the need for further research that can help identify and explain the unique experiences and vulnerabilities of multiracial youth. PMID:22395776

  6. Overt and Latent Cardiac Effects of Ozone Inhalation in Rats: Evidence for Autonomic Modulation and Increased Myocardial Vulnerability

    EPA Science Inventory

    Background: Ozone (03) is a well-documented respiratory oxidant, but increasing epidemiologic evidence points to extra-pulmonary effects including positive associations between ambient 03 concentrations and cardiovascular morbidity/mortality. Objectives: With preliminary reports ...

  7. Precise aircraft single-point positioning using GPS post-mission orbits and satellite clock corrections

    NASA Astrophysics Data System (ADS)

    Lachapelle, G.; Cannon, M. E.; Qiu, W.; Varner, C.

    1996-09-01

    Aircraft single point position accuracy is assessed through a comparison of the single point coordinates with corresponding DGPS-derived coordinates. The platform utilized for this evaluation is a Naval Air Warfare Center P-3 Orion aircraft. Data was collected over a period of about 40 hours, spread over six days, off Florida's East Coast in July 94, using DGPS reference stations in Jacksonville, FL, and Warminster, PA. The analysis of results shows that the consistency between aircraft single point and DGPS coordinates obtained in single point positioning mode and DGPS mode is about 1 m (rms) in latitude and longitude, and 2 m (rms) in height, with instantaneous errors of up to a few metres due to the effect of the ionosphere on the single point L1 solutions.

  8. Functional genomic Landscape of Human Breast Cancer drivers, vulnerabilities, and resistance

    PubMed Central

    Marcotte, Richard; Sayad, Azin; Brown, Kevin R.; Sanchez-Garcia, Felix; Reimand, Jüri; Haider, Maliha; Virtanen, Carl; Bradner, James E.; Bader, Gary D.; Mills, Gordon B.; Pe’er, Dana; Moffat, Jason; Neel, Benjamin G.

    2016-01-01

    Summary Large-scale genomic studies have identified multiple somatic aberrations in breast cancer, including copy number alterations, and point mutations. Still, identifying causal variants and emergent vulnerabilities that arise as a consequence of genetic alterations remain major challenges. We performed whole genome shRNA “dropout screens” on 77 breast cancer cell lines. Using a hierarchical linear regression algorithm to score our screen results and integrate them with accompanying detailed genetic and proteomic information, we identify vulnerabilities in breast cancer, including candidate “drivers,” and reveal general functional genomic properties of cancer cells. Comparisons of gene essentiality with drug sensitivity data suggest potential resistance mechanisms, effects of existing anti-cancer drugs, and opportunities for combination therapy. Finally, we demonstrate the utility of this large dataset by identifying BRD4 as a potential target in luminal breast cancer, and PIK3CA mutations as a resistance determinant for BET-inhibitors. PMID:26771497

  9. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sahoo, Satiprasad; Dhar, Anirban, E-mail: anirban.dhar@gmail.com; Kar, Amlanjyoti

    Environmental management of an area describes a policy for its systematic and sustainable environmental protection. In the present study, regional environmental vulnerability assessment in Hirakud command area of Odisha, India is envisaged based on Grey Analytic Hierarchy Process method (Grey–AHP) using integrated remote sensing (RS) and geographic information system (GIS) techniques. Grey–AHP combines the advantages of classical analytic hierarchy process (AHP) and grey clustering method for accurate estimation of weight coefficients. It is a new method for environmental vulnerability assessment. Environmental vulnerability index (EVI) uses natural, environmental and human impact related factors, e.g., soil, geology, elevation, slope, rainfall, temperature, windmore » speed, normalized difference vegetation index, drainage density, crop intensity, agricultural DRASTIC value, population density and road density. EVI map has been classified into four environmental vulnerability zones (EVZs) namely: ‘low’, ‘moderate’ ‘high’, and ‘extreme’ encompassing 17.87%, 44.44%, 27.81% and 9.88% of the study area, respectively. EVI map indicates that the northern part of the study area is more vulnerable from an environmental point of view. EVI map shows close correlation with elevation. Effectiveness of the zone classification is evaluated by using grey clustering method. General effectiveness is in between “better” and “common classes”. This analysis demonstrates the potential applicability of the methodology. - Highlights: • Environmental vulnerability zone identification based on Grey Analytic Hierarchy Process (AHP) • The effectiveness evaluation by means of a grey clustering method with support from AHP • Use of grey approach eliminates the excessive dependency on the experience of experts.« less

  10. Children of substance abusers: overview of research findings.

    PubMed

    Johnson, J L; Leff, M

    1999-05-01

    A relationship between parental substance abuse and subsequent alcohol problems in their children has been documented extensively. Children of alcoholics (COAs) are considered to be at high risk because there is a greater likelihood that they will develop alcoholism compared with a randomly selected child from the same community. COAs and children of other drug-abusing parents are especially vulnerable to the risk for maladaptive behavior because they have combinations of many risk factors present in their lives. The single most potent risk factor is their parent's substance-abusing behavior. This single risk factor can place children of substance abusers at biologic, psychologic, and environmental risk. Since the turn of the century, many reports have described the deleterious influence of parental alcoholism on their children. A series of studies measured mortality, physiology, and general health in the offspring of alcoholic parents and concluded that when mothers stopped drinking during gestation, their children were healthier. Today, research on COAs can be classified into studies of fetal alcohol syndrome, the transmission of alcoholism, psychobiologic markers of vulnerability, and psychosocial characteristics. Each of these studies hypothesizes that differences between COAs and children of nonalcoholics influence maladaptive behaviors later in life, such as academic failure or alcoholism. This research supports the belief that COAs are at risk for a variety of problems that may include behavioral, psychologic, cognitive, or neuropsychologic deficits. The vast literature on COAs far outweighs the literature on children of other drug abusers. Relatively little is known about children of heroin addicts, cocaine abusers, or polydrug abusers. Nonetheless, many researchers suggest that the children of addicted parents are at greater risk for later dysfunctional behaviors and that they, too, deserve significant attention to prevent intergenerational transmission of drug abuse. Most research on children of other drug abusers examines fetal exposure to maternal drug abuse. The overview of the research on children of substance abusers points toward the need for better, longitudinal research in this area. Most studies on COAs or other drug abusers are not longitudinal; they examine behavior at one point in time. Given the studies reviewed in this article, it is unclear whether we see true deficits or developmental delay. Longitudinal studies will allow us to predict when early disorders and behavioral deviations will be transient or when they will be precursors to more severe types of maladaptive behavior. Longitudinal research also will enable us to explain specific childhood outcomes. Differences in outcome could be studied simultaneously to understand whether antecedents discovered for one are specific to it or are general antecedents leading to a broad variety of outcomes.

  11. Psychological Vulnerability and Earthquake Risk Perception in Bucharest/Romania

    NASA Astrophysics Data System (ADS)

    Romeo Cretu, Zeno; Armas, Iuliana; Stanciugelu, Irina

    2010-05-01

    The importance of studying the relationship with the natural hazard events from a psycho-social perspective is fundamental by the experience with past disasters as much as by the research in the field that proved that the people's psychologic structures may constitute a starting point for risk reduction. People's psycho-behavioural patterns contain conscious or unconscious references to the environmental risk, thus creating certain adjustment strategies and mechanisms, with a certain degree of psychological vulnerability. In modern man's case, the high level of awareness in front of natural dangers, doubled by the perception of the environment's unsafety, experienced as a lack of control, brings to attention nowadays the problematic of the analysis of natural risk perception, as a main factor in the adjustment of human communities' capacity of adapting to the natural environment's dynamics. The major objective of this present work is, based on the development of an efficient evaluation methodology, to identify specific relational patterns to seismic risk in Bucharest, function the characteristics of the urban environment, the social, economical and psychological vulnerability, with results that can be applied for disaster management. For explaining human reactions and the way in which they perceive and evaluate the psychological resources, on a daily basis, but also in risk situations (earthquakes), a multi-modal questionnaire was conceived through qualitative methods (a focus group, along with experts from the Public and Administrative Sciences National School, Risk Communication Center). The questionnaire was structured on a 49 items sequence, in which were included different type of questions (with single or multiple answers, open questions etc), and also questions using different scaling methods. The items caught cognitive elements (expectations, anticipations and negative or positive judgments regarding risk element), affective (feelings) and behavioral (activities, strategies in case of disaster). The psychological module included 21 encoded items with answers on a five-level Likert scale (1 - strongly disagree, 5 - strongly agree). The research hypotheses were centered on testing the connection between psychological control factors and demographic determinants (subject's sex and age), economical status and the building conditions/characteristics which they live in. Another hypothesis to be checked was focused on behavioral changes related with the experience level of investigated subjects. The final questionnaire was applied by phone to Bucharest representative sample of 1376 people. The sample type was the probabilistic, single-staged, layered one. There had been selected families/households from Bucharest, which had a telephone or a Mobil phone. The households were elected using the RDD (Random Digit Dialing) Method for undifferentiated phone numbers generation. The layer criterion was the district.

  12. [The vulnerability of women Francophone parent at risk of homelessness in a community in Northern Ontario].

    PubMed

    Benoit, Monique; Lavoie, Anne Marise; Muray, Kalum; Watson, Shelley; Beaudoin, Monique

    2013-06-13

    This study aimed to examine the vulnerability of Francophone single mothers at risk of homelessness in Northern Ontario. The project also endeavoured to document the quest for autonomy of these women in a minority context. Employing a qualitative approach, eleven life stories were obtained from five women. Although none were homeless at the time of the interviews, in terms of living on the street, two were living with friends and the others were at risk of becoming homeless. All of the participants were between 20 and 59 years old and had completed their secondary education. Taking into account their economic and social situation, as well as the participants' health and cultural resources, vulnerabilities throughout the life course were analyzed. The life trajectory of these women showed us that their significant vulnerabilities are relative to the amount of autonomy they are able to secure through the services provided by supporting agencies, particularly in a linguistic minority context. In addition, the triple stigmatization (economic, linguistic and gender relations) requires a broader understanding of the resilience of these women in their journey from poverty (economic) to social (and linguistic) exclusion, and vulnerability. Despite these challenges, each of the individuals interviewed in this study, for whom the quest for autonomy is a continual struggle, demonstrated resilience.

  13. Development of hazard-compatible building fragility and vulnerability models

    USGS Publications Warehouse

    Karaca, E.; Luco, N.

    2008-01-01

    We present a methodology for transforming the structural and non-structural fragility functions in HAZUS into a format that is compatible with conventional seismic hazard analysis information. The methodology makes use of the building capacity (or pushover) curves and related building parameters provided in HAZUS. Instead of the capacity spectrum method applied in HAZUS, building response is estimated by inelastic response history analysis of corresponding single-degree-of-freedom systems under a large number of earthquake records. Statistics of the building response are used with the damage state definitions from HAZUS to derive fragility models conditioned on spectral acceleration values. Using the developed fragility models for structural and nonstructural building components, with corresponding damage state loss ratios from HAZUS, we also derive building vulnerability models relating spectral acceleration to repair costs. Whereas in HAZUS the structural and nonstructural damage states are treated as if they are independent, our vulnerability models are derived assuming "complete" nonstructural damage whenever the structural damage state is complete. We show the effects of considering this dependence on the final vulnerability models. The use of spectral acceleration (at selected vibration periods) as the ground motion intensity parameter, coupled with the careful treatment of uncertainty, makes the new fragility and vulnerability models compatible with conventional seismic hazard curves and hence useful for extensions to probabilistic damage and loss assessment.

  14. Bioenergetic status modulates motor neuron vulnerability and pathogenesis in a zebrafish model of spinal muscular atrophy

    PubMed Central

    Boyd, Penelope J.; Shorrock, Hannah K.; Carter, Roderick N.; Powis, Rachael A.; Thomson, Sophie R.; Thomson, Derek; Graham, Laura C.; Motyl, Anna A. L.; Highley, J. Robin; Becker, Thomas; Becker, Catherina G.; Heath, Paul R.

    2017-01-01

    Degeneration and loss of lower motor neurons is the major pathological hallmark of spinal muscular atrophy (SMA), resulting from low levels of ubiquitously-expressed survival motor neuron (SMN) protein. One remarkable, yet unresolved, feature of SMA is that not all motor neurons are equally affected, with some populations displaying a robust resistance to the disease. Here, we demonstrate that selective vulnerability of distinct motor neuron pools arises from fundamental modifications to their basal molecular profiles. Comparative gene expression profiling of motor neurons innervating the extensor digitorum longus (disease-resistant), gastrocnemius (intermediate vulnerability), and tibialis anterior (vulnerable) muscles in mice revealed that disease susceptibility correlates strongly with a modified bioenergetic profile. Targeting of identified bioenergetic pathways by enhancing mitochondrial biogenesis rescued motor axon defects in SMA zebrafish. Moreover, targeting of a single bioenergetic protein, phosphoglycerate kinase 1 (Pgk1), was found to modulate motor neuron vulnerability in vivo. Knockdown of pgk1 alone was sufficient to partially mimic the SMA phenotype in wild-type zebrafish. Conversely, Pgk1 overexpression, or treatment with terazosin (an FDA-approved small molecule that binds and activates Pgk1), rescued motor axon phenotypes in SMA zebrafish. We conclude that global bioenergetics pathways can be therapeutically manipulated to ameliorate SMA motor neuron phenotypes in vivo. PMID:28426667

  15. Assessment of vulnerable older adults' physical function according to the Japanese Long-Term Care Insurance (LTCI) system and Fried's criteria for frailty syndrome.

    PubMed

    Nemoto, Miyuki; Yabushita, Noriko; Kim, Mi-Ji; Matsuo, Tomoaki; Seino, Satoshi; Tanaka, Kiyoji

    2012-01-01

    This study aimed to evaluate the physical frailty status of vulnerable older adults as classified in the Japanese LTCI system and to compare this with Fried's definition. A total of 444 older adults were classified based on the LTCI system as independent, vulnerable, or dependent, and 400 of these participants also fit Fried's criteria for not frail, pre-frail or frail. We evaluated their physical function with a 12 item physical function test. We derived a physical function score (PFS) from these 12 items and a principal component analysis was used to make comparisons. The receiver operating characteristic (ROC) curve analysis was performed to identify the sensitivity and specificity of the PFS cut-off points to distinguish the dependent category from the other categories. We found significant differences and a hierarchical order for the PFSs among the three groups of the LTCI system (the independent, 0.41 ± 0.54; the vulnerable, -0.40 ± 0.76; and the dependent, -1.49 ± 0.73) and of Fried's definition (not frail, 0.50 ± 0.51; pre frail, -0.11 ± 0.63; and frail, -1.25 ± 0.98). The optimal cut-off value (OCV) was -0.593. This study showed that the range of physical function of people considered frail category (pre-frail, vulnerable, and frail) is wide and overlapping. That is, the physical function of vulnerable older adults is worse than the pre-frail, but better than the frail. To better recognize older adults in need of greater support, the vulnerable should also receive assessment of their frailty status according to Fried's definition. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.

  16. Human vulnerability in volcanic environments: the case of Furnas, São Miguel, Azores

    NASA Astrophysics Data System (ADS)

    Dibben, Christopher; Chester, David K.

    1999-09-01

    The need to examine the vulnerability of people to natural hazards, in addition to the long-established requirement to study extreme events of nature, is being increasingly recognised within disaster research. Following a discussion of the nature of human vulnerability, we propose a framework for its analysis within the context of volcanic activity and we exemplify our approach by a detailed study of Furnas, a village located at the centre of a volcano with the same name on the island of São Miguel in the Azores. The methods used included in-depth interviews with permanent residents ( n=50), analysis of census records and an examination of the socio-economic history of the town. The vulnerability of an individual to volcanic hazards involves a complex interaction of elements which, in addition to the usual factors taken into account in programmes of hazard reduction (e.g., the nature of the physical threat, location and economic situation), also comprises his or her social context and a number of physiological and psychological considerations. It is argued, further, that both generally and in the case of Furnas, the root causes of vulnerability lie in the history and development of society. Individual decision making is fundamental but takes place within and cannot be separated from this social context. Vulnerability analysis allows the identification of points where intervention may be successful in reducing the likelihood of suffering in a society. It avoids the problem of people's unexpected reactions to invention leading to a changing or even increasing level of vulnerability, by studying society rather than just one aspect of volcanic hazard in isolation.

  17. Is desiccation tolerance and avoidance reflected in xylem and phloem anatomy of two co-existing arid-zone coniferous trees?: Xylem and Phloem Anatomy

    DOE PAGES

    Sevanto, Sanna Annika; Ryan, Max; Turin Dickman, L.; ...

    2018-03-22

    Plants close their stomata during drought to avoid excessive water loss, but species differ in respect to the drought severity at which stomata close. The stomatal closure point is related to xylem anatomy and vulnerability to embolism, but it also has implications for phloem transport, and possibly phloem anatomy to allow sugar transport at low water potentials. Desiccation tolerant plants that close their stomata at severe drought should have smaller xylem conduits and/or fewer and smaller inter-conduit pits to reduce vulnerability to embolism, but more phloem tissue and larger phloem conduits compared to plants that avoid desiccation. These anatomical differencesmore » could be expected to increase in response to long-term reduction in precipitation. To test these hypotheses we used tridimensional synchroton X-ray microtomograph and light microscope imaging of combined xylem and phloem tissues of two coniferous species: one-seed juniper (Juniperus monosperma) and piñon pine (Pinus edulis) subjected to precipitation manipulation treatments. These species show different xylem vulnerability to embolism, contrasting desiccation tolerance, and stomatal closure points. Our results support the hypothesis that desiccation tolerant plants require higher phloem transport capacity than desiccation avoiding plants, but this can be gained through various anatomical adaptations in addition to changing conduit or tissue size.« less

  18. Is desiccation tolerance and avoidance reflected in xylem and phloem anatomy of two co-existing arid-zone coniferous trees?: Xylem and Phloem Anatomy

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sevanto, Sanna Annika; Ryan, Max; Turin Dickman, L.

    Plants close their stomata during drought to avoid excessive water loss, but species differ in respect to the drought severity at which stomata close. The stomatal closure point is related to xylem anatomy and vulnerability to embolism, but it also has implications for phloem transport, and possibly phloem anatomy to allow sugar transport at low water potentials. Desiccation tolerant plants that close their stomata at severe drought should have smaller xylem conduits and/or fewer and smaller inter-conduit pits to reduce vulnerability to embolism, but more phloem tissue and larger phloem conduits compared to plants that avoid desiccation. These anatomical differencesmore » could be expected to increase in response to long-term reduction in precipitation. To test these hypotheses we used tridimensional synchroton X-ray microtomograph and light microscope imaging of combined xylem and phloem tissues of two coniferous species: one-seed juniper (Juniperus monosperma) and piñon pine (Pinus edulis) subjected to precipitation manipulation treatments. These species show different xylem vulnerability to embolism, contrasting desiccation tolerance, and stomatal closure points. Our results support the hypothesis that desiccation tolerant plants require higher phloem transport capacity than desiccation avoiding plants, but this can be gained through various anatomical adaptations in addition to changing conduit or tissue size.« less

  19. A numerical evaluation of protection strategies for cab car crashworthiness

    DOT National Transportation Integrated Search

    1999-11-15

    The operator and passengers in cab cars are particularly vulnerable to collisions with objects or with other trains because of their proximity to the point of collision. We present one part of a larger study in which we examined several strategies fo...

  20. Vegetable Antifertility drugs of India.

    PubMed

    Malhi, B S; Trivedi, V P

    1972-01-01

    A table of 76 selected species of plants which Indian medicine regards as having antifertility effects is presented. All the plants used for fertility control contain alkaloids, resins, tannins and bitter principles. The vulnerable points in the process of reproduction at which these plants act is not known.

  1. ASSESSING THE VULNERABILITY OF AQUIFERS USING REGULARIZED POINT DATA.

    EPA Science Inventory

    The approach will be to collect available data on concentrations of dissolved nitrate. The data will be areally-averaged using covariance functions as Bras and Rodriguez-Iturbe (1993) described for the averaging of rainfall data. Polygon coverages of nitrate will be defined bas...

  2. [Potential vulnerability to flooding at public health facilities in four northern regions of Peru].

    PubMed

    Hernández-Vásquez, Akram; Arroyo-Hernández, Hugo; Bendezú-Quispe, Guido; Díaz-Seijas, Deysi; Vilcarromero, Stalin; Rubilar-González, Juan; Gutierrez-Lagos, Edith

    2016-03-01

    In order to determine the potential vulnerability of public health facilities in four northern regions of Peru to the possible effects of El Niño-Southern Oscillation (ENSO) phenomenon. An exploratory spatial analysis was performed using the geo-referenced points for at-risk areas based on the activation of gullies that were reported by the National Water Authority, and the location of the four regional public health facilities of the Ministry of Health. Concentric areas of influence were simulate from the points of risk towards the public health facilities using radii of 200, 1000 and 1500 meters. The Tumbes region would be the most affected with 37.2% of its health facilities being affected by floods and landslides. The I-2 and I-3 categories of health facilities appeared to be the most affected with 28.9% and 31.6% respectively. Therefore, public health facilities near the risk zones may be affected by the ENSO.

  3. Single-Event Effect Response of a Commercial ReRAM

    NASA Technical Reports Server (NTRS)

    Chen, Dakai; Label, Kenneth A.; Kim, Hak; Phan, Anthony; Wilcox, Edward; Buchner, Stephen; Khachatrian, Ani; Roche, Nicolas

    2014-01-01

    We show heavy ion test results of a commercial production-level ReRAM. The memory array is robust to bit upsets. However the ReRAM system is vulnerable to SEFIs due to upsets in peripheral circuits, including the sense amplifier.

  4. Assessment of intrinsic vulnerability of an alluvial aquifer under anthropogenic pressure: cross comparison of 4 index-based groundwater vulnerability mapping models within the Biguglia lagoon watershed (Corsica, France).

    NASA Astrophysics Data System (ADS)

    Jaunat, Jessy; Huneau, Frédéric; Garel, Emilie; Devos, Alain; Lejeune, Olivier

    2016-04-01

    KEYWORDS: Alluvial aquifer, Vulnerability mapping, Index-based methods, DRASTIC, SINTACS, SI, GOD The geographical position of the Biguglia lagoon watershed south of the Bastia city (80 000 inhabitants), lead to a highly vulnerable hydrosystem setting. This littoral plain is the unique territory available for the urbanisation and for the agriculture activities (cattle breeding). All the activities developed are likely to have a qualitative impact on water infiltration and therefore on groundwater, which is in hydraulic connection with the lagoon system. Beyond this ecological issue, groundwater of this watershed is intensively used as drinking water supply. It appears essential to control the long-term groundwater quality of the Biguglia plain which is the major economic zone of Corsica. Achievement of this issue requires the identification of the areas where the alluvial aquifer is mostly vulnerable to anthropogenic activities. The results given by 4 of the most popular index-based vulnerability mapping methods (DRASTIC, SI, SINTACS and GOD) are compared. The water table, net recharge, aquifer and soils properties, topography, vadose zone and land uses have been precisely mapped and numerically translated in GIS with a 25m precision. 4 final maps were finally compiled according to the weighting factors of each methods. Hydrochemical investigations were also carried out on 30 sampling points (major ions and anthropogenic tracers) to evaluate the effect of anthropogenic activities on groundwater quality and also to validate the results of the vulnerability mapping. A comparison between the parametric models shows a significant agreement between the DRASTIC, SINTACS and SI results (2% to 5% of the total area in very low vulnerability class, 10% to 13% in low vulnerability, 16% to 23% in medium vulnerability, 31% to 53% in high vulnerability and 14% to 23% in very high vulnerability). The two first methods are quite similar, which explains the proximity of the obtained results. High vulnerability and very high vulnerability classes are noticeably different for the SI results. This can be partly explained by the consideration of the land use and the absence of parameters related to soil media, vadose zone and hydraulic conductivity in this model, which generates a larger surface in highly vulnerable class at the expense of the very highly vulnerable one. Conversely, the GOD method gives very different results especially in the very low and low vulnerability classes with 11% and 17% of the total area respectively. This last method underestimates the vulnerability in the hydrological context of this work. The DRASTIC and SINTACS models are those that best transcribe the field observations. With these models the most vulnerable zones are correlated with the highest concentrations of nitrates measured in groundwater. Thereafter, it will be essential to integrate the temporal variability of the imputed parameters and to link these results with the acquired data on origin and residence time of groundwater in the alluvial aquifer of Biguglia lagoon. This study was supported by CNRS Labex DRIIHM OHM Littoral méditerranéen (HYDROGEO-LAG project).

  5. Improving the Patron Experience: Sterling Memorial Library's Single Service Point

    ERIC Educational Resources Information Center

    Sider, Laura Galas

    2016-01-01

    This article describes the planning process and implementation of a single service point at Yale University's Sterling Memorial Library. While much recent scholarship on single service points (SSPs) has focused on the virtues or hazards of eliminating reference desks in libraries nationwide, this essay explores the ways in which single service…

  6. Root resistance to cavitation is accurately measured using a centrifuge technique.

    PubMed

    Pratt, R B; MacKinnon, E D; Venturas, M D; Crous, C J; Jacobsen, A L

    2015-02-01

    Plants transport water under negative pressure and this makes their xylem vulnerable to cavitation. Among plant organs, root xylem is often highly vulnerable to cavitation due to water stress. The use of centrifuge methods to study organs, such as roots, that have long vessels are hypothesized to produce erroneous estimates of cavitation resistance due to the presence of open vessels through measured samples. The assumption that roots have long vessels may be premature since data for root vessel length are sparse; moreover, recent studies have not supported the existence of a long-vessel artifact for stems when a standard centrifuge technique was used. We examined resistance to cavitation estimated using a standard centrifuge technique and compared these values with native embolism measurements for roots of seven woody species grown in a common garden. For one species we also measured vulnerability using single-vessel air injection. We found excellent agreement between root native embolism and the levels of embolism measured using a centrifuge technique, and with air-seeding estimates from single-vessel injection. Estimates of cavitation resistance measured from centrifuge curves were biologically meaningful and were correlated with field minimum water potentials, vessel diameter (VD), maximum xylem-specific conductivity (Ksmax) and vessel length. Roots did not have unusually long vessels compared with stems; moreover, root vessel length was not correlated to VD or to the vessel length of stems. These results suggest that root cavitation resistance can be accurately and efficiently measured using a standard centrifuge method and that roots are highly vulnerable to cavitation. The role of root cavitation resistance in determining drought tolerance of woody species deserves further study, particularly in the context of climate change. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  7. Groundwater vulnerability assessment for the karst aquifer of Tanour and Rasoun spring using EPIK, COP, and travel time methods

    NASA Astrophysics Data System (ADS)

    Hamdan, Ibraheem; Sauter, Martin; Margane, Armin; Ptak, Thomas; Wiegand, Bettina

    2016-04-01

    Key words: Karst, groundwater vulnerability, EPIK, COP, travel time, Jordan. Karst aquifers are especially sensitive to short-lived contaminants because of fast water travel times and a low storage capacity in the conduit system. Tanour and Rasoun karst springs located around 75 km northwest of the city of Amman in Jordan represent the main domestic water supply for the surrounding villages. Both springs suffer from pollution events especially during the winter season, either by microbiological contamination due to wastewater leakage from septic tanks or by wastewater discharge from local olive oil presses. To assess the vulnerability of the karst aquifer of Tanour and Rasoun spring and its sensitivity for pollution, two different intrinsic groundwater vulnerability methods were applied: EPIK and COP. In addition, a travel time vulnerability method was applied to determine the time water travels from different points in the catchment to the streams, as a function of land surface gradients and presumed lateral flow within the epikarst. For the application of the COP and EPIK, a detailed geological survey was carried out to determine karst features and the karst network development within the catchment area. In addition, parameters, such as soil data, long term daily precipitation data, land use and topographical data were collected. For the application of the travel time vulnerability method, flow length, hydraulic conductivity, effective porosity, and slope gradient was used in order to determining the travel time in days. ArcGIS software was used for map preparation. The results of the combined vulnerability methods (COP, EPIK and travel time) show a high percentage of "very high" to "moderate" vulnerable areas within the catchment area of Tanour and Rasoun karst springs. Therefore, protection of the catchment area of Tanour and Rasoun springs from pollution and proper management of land use types is urgently needed to maintain the quality of drinking water in the area.

  8. Factors affecting low summer dissolved oxygen concentrations in Mississippi Delta bayous

    USDA-ARS?s Scientific Manuscript database

    Streams in watersheds supporting intensive row-crop agriculture are vulnerable to ecological degradation due to non-point source pollutants such as nutrients. Low gradient streams such as bayous are especially susceptible to pollutants due to increased water residence time, and they often exhibit po...

  9. Stream-crossing structure for deer fence

    Treesearch

    Robert M. Blair; James A. Hays; Louis Brunett

    1963-01-01

    Stream crossings are the most vulnerable points in a deer-proof fence. When an inadequately constructed crossing washes out, enclosed deer may escape and unwanted animals enter. Structures of the type described here have withstood 2 years of frequent, severe flooding in the pine-hardwood hills of central Louisiana.

  10. Perspectives: Community Education and Services in the 1980's.

    ERIC Educational Resources Information Center

    Cosand, Joseph P.

    1981-01-01

    Looks at goals and rewards associated with community education and services. Points to areas where community colleges are vulnerable to criticism of self-interest at the community's expense: management efficiency, duplication of effort, mission, and productivity and accountability. Underscores the importance of cooperation between community…

  11. Why Athletics Are Vulnerable to Gambling.

    ERIC Educational Resources Information Center

    Naughton, Jim

    1998-01-01

    Incidents of point-shaving and placing and accepting bets are evidence that professional gamblers are influencing college sports and campus life. Because of student athletes' competitive nature, they may be more likely to engage in gambling. The National Collegiate Athletic Association and individual colleges are examining and addressing this…

  12. Flood vulnerability evaluation in complex urban areas

    NASA Astrophysics Data System (ADS)

    Giosa, L.; Pascale, S.; Sdao, F.; Sole, A.; Cantisani, A.

    2009-04-01

    This paper deals the conception, the development and the subsequent validation of an integrated numerical model for the assessment of systemic vulnerability in complex and urbanized areas, subject to flood risk. The proposed methodology is based on the application of the concept of "systemic vulnerability", the model is a mathematician-decisional model action to estimate the vulnerability of complex a territorial system during a flood event. The model uses a group of "pressure pointers" in order to define, qualitatively and quantitatively, the influence exercised on the territorial system from factors like as those physicists, social, economic, etc.. The model evaluates the exposure to the flood risk of the elements that belong to a system. The proposed model, which is based on the studies of Tamura et al., 2000; Minciardi et al., 2004; Pascale et al., 2008; considers the vulnerability not as a characteristic of a particular element at risk, but as a peculiarity of a complex territorial system, in which the different elements are reciprocally linked in a functional way. The proposed model points out the elements with the major functional lost and that make the whole system critical. This characteristic makes the proposed model able to support a correct territorial planning and a suitable management of the emergency following natural disasters such as floods. The proposed approach was tested on the study area in the city of Potenza, southern Italy.

  13. Clinical prediction model to identify vulnerable patients in ambulatory surgery: towards optimal medical decision-making.

    PubMed

    Mijderwijk, Herjan; Stolker, Robert Jan; Duivenvoorden, Hugo J; Klimek, Markus; Steyerberg, Ewout W

    2016-09-01

    Ambulatory surgery patients are at risk of adverse psychological outcomes such as anxiety, aggression, fatigue, and depression. We developed and validated a clinical prediction model to identify patients who were vulnerable to these psychological outcome parameters. We prospectively assessed 383 mixed ambulatory surgery patients for psychological vulnerability, defined as the presence of anxiety (state/trait), aggression (state/trait), fatigue, and depression seven days after surgery. Three psychological vulnerability categories were considered-i.e., none, one, or multiple poor scores, defined as a score exceeding one standard deviation above the mean for each single outcome according to normative data. The following determinants were assessed preoperatively: sociodemographic (age, sex, level of education, employment status, marital status, having children, religion, nationality), medical (heart rate and body mass index), and psychological variables (self-esteem and self-efficacy), in addition to anxiety, aggression, fatigue, and depression. A prediction model was constructed using ordinal polytomous logistic regression analysis, and bootstrapping was applied for internal validation. The ordinal c-index (ORC) quantified the discriminative ability of the model, in addition to measures for overall model performance (Nagelkerke's R (2) ). In this population, 137 (36%) patients were identified as being psychologically vulnerable after surgery for at least one of the psychological outcomes. The most parsimonious and optimal prediction model combined sociodemographic variables (level of education, having children, and nationality) with psychological variables (trait anxiety, state/trait aggression, fatigue, and depression). Model performance was promising: R (2)  = 30% and ORC = 0.76 after correction for optimism. This study identified a substantial group of vulnerable patients in ambulatory surgery. The proposed clinical prediction model could allow healthcare professionals the opportunity to identify vulnerable patients in ambulatory surgery, although additional modification and validation are needed. (ClinicalTrials.gov number, NCT01441843).

  14. The influence of urban heat islands and socioeconomic factors on the spatial distribution of Aedes aegypti larval habitats.

    PubMed

    De Azevedo, Thiago S; Bourke, Brian Patrick; Piovezan, Rafael; Sallum, Maria Anice M

    2018-05-08

    We addressed the potential associations among the temporal and spatial distribution of larval habitats of Aedes (Stegomyia) aegypti, the presence of urban heat islands and socioeconomic factors. Data on larval habitats were collected in Santa Bárbara d'Oeste, São Paulo, Brazil, from 2004 to 2006, and spatial and temporal variations were analysed using a wavelet-based approach. We quantified urban heat islands by calculating surface temperatures using the results of wavelet analyses and grey level transformation from Thematic Mapper images (Landsat 5). Ae. aegypti larval habitats were geo-referenced corresponding to the wavelet analyses to test the potential association between geographical distribution of habitats and surface temperature. In an inhomogeneous spatial point process, we estimated the frequency of occurrence of larval habitats in relation to temperature. The São Paulo State Social Vulnerability Index in the municipality of Santa Barbára d'Oeste was used to test the potential association between presence of larval habitats and social vulnerability. We found abundant Ae. aegypti larval habitats in areas of higher surface temperature and social vulnerability and fewer larval habitats in areas with lower surface temperature and social vulnerability.

  15. Consent to medical research of vulnerable subjects from the French point of view: the example of consent in research in the case of Alzheimer disease.

    PubMed

    Duguet, Anne-Marie; Boyer-Beviere, Bénédicte

    2011-12-01

    The consent to research is the expression of autonomy. Some groups are vulnerable and cannot give free consent because their conditions limit their decision making or because they are unable to consent themselves (minor, incompetent adults). International standards and recommendations for medical research protect vulnerable subjects (article 17 of the Helsinki declaration, guidelines 9 and 13 of the CIOMS, article 17 of the Oviedo Convention). French Law protects mostly three categories of vulnerable people: minors, adults with a legal representative, and the people living in sanitary and social establishments. Specific protection is given as well to pregnant women, detainees and persons with psychiatric disorders in involuntary commitment. From the example of research with Alzheimer patients the authors show the original provisions of French legislation to involve in medical research incompetent patients with or without legal protection. Clinical research on Alzheimer's disease poses challenges as never before to research ethics. In fact, the development of the disease progressively reduces the patient's ability to make choices: the latter is no longer capable, but is not totally incapacitated. Several solutions are offered for a "proxy" consent or authorisation.

  16. Assessment of floodplain vulnerability during extreme Mississippi River flood 2011

    USGS Publications Warehouse

    Goodwell, Allison E.; Zhu, Zhenduo; Dutta, Debsunder; Greenberg, Jonathan A.; Kumar, Praveen; Garcia, Marcelo H.; Rhoads, Bruce L.; Holmes, Robert R.; Parker, Gary; Berretta, David P.; Jacobson, Robert B.

    2014-01-01

    Regional change in the variability and magnitude of flooding could be a major consequence of future global climate change. Extreme floods have the capacity to rapidly transform landscapes and expose landscape vulnerabilities through highly variable spatial patterns of inundation, erosion, and deposition. We use the historic activation of the Birds Point-New Madrid Floodway during the Mississippi and Ohio River Flooding of 2011 as a scientifically unique stress experiment to analyze indicators of floodplain vulnerability. We use pre- and postflood airborne Light Detection and Ranging data sets to locate erosional and depositional hotspots over the 540 km2 agricultural Floodway. While riparian vegetation between the river and the main levee breach likely prevented widespread deposition, localized scour and deposition occurred near the levee breaches. Eroded gullies nearly 1 km in length were observed at a low ridge of a relict meander scar of the Mississippi River. Our flow modeling and spatial mapping analysis attributes this vulnerability to a combination of erodible soils, flow acceleration associated with legacy fluvial landforms, and a lack of woody vegetation to anchor soil and enhance flow resistance. Results from this study could guide future mitigation and adaptation measures in cases of extreme flooding.

  17. Assessment of floodplain vulnerability during extreme Mississippi River flood 2011.

    PubMed

    Goodwell, Allison E; Zhu, Zhenduo; Dutta, Debsunder; Greenberg, Jonathan A; Kumar, Praveen; Garcia, Marcelo H; Rhoads, Bruce L; Holmes, Robert R; Parker, Gary; Berretta, David P; Jacobson, Robert B

    2014-01-01

    Regional change in the variability and magnitude of flooding could be a major consequence of future global climate change. Extreme floods have the capacity to rapidly transform landscapes and expose landscape vulnerabilities through highly variable spatial patterns of inundation, erosion, and deposition. We use the historic activation of the Birds Point-New Madrid Floodway during the Mississippi and Ohio River Flooding of 2011 as a scientifically unique stress experiment to analyze indicators of floodplain vulnerability. We use pre- and postflood airborne Light Detection and Ranging data sets to locate erosional and depositional hotspots over the 540 km(2) agricultural Floodway. While riparian vegetation between the river and the main levee breach likely prevented widespread deposition, localized scour and deposition occurred near the levee breaches. Eroded gullies nearly 1 km in length were observed at a low ridge of a relict meander scar of the Mississippi River. Our flow modeling and spatial mapping analysis attributes this vulnerability to a combination of erodible soils, flow acceleration associated with legacy fluvial landforms, and a lack of woody vegetation to anchor soil and enhance flow resistance. Results from this study could guide future mitigation and adaptation measures in cases of extreme flooding.

  18. Monitoring of Progressive Damage in Buildings Using Laser Scan Data

    NASA Astrophysics Data System (ADS)

    Puente, I.; Lindenbergh, R.; Van Natijne, A.; Esposito, R.; Schipper, R.

    2018-05-01

    Vulnerability of buildings to natural and man-induced hazards has become a main concern for our society. Ensuring their serviceability, safety and sustainability is of vital importance and the main reason for setting up monitoring systems to detect damages at an early stage. In this work, a method is presented for detecting changes from laser scan data, where no registration between different epochs is needed. To show the potential of the method, a case study of a laboratory test carried out at the Stevin laboratory of Delft University of Technology was selected. The case study was a quasi-static cyclic pushover test on a two-story high unreinforced masonry structure designed to simulate damage evolution caused by cyclic loading. During the various phases, we analysed the behaviour of the masonry walls by monitoring the deformation of each masonry unit. First a plane is fitted to the selected wall point cloud, consisting of one single terrestrial laser scan, using Principal Component Analysis (PCA). Second, the segmentation of individual elements is performed. Then deformations with respect to this plane model, for each epoch and specific element, are determined by computing their corresponding rotation and cloud-to-plane distances. The validation of the changes detected within this approach is done by comparison with traditional deformation analysis based on co-registered TLS point clouds between two or more epochs of building measurements. Initial results show that the sketched methodology is indeed able to detect changes at the mm level while avoiding 3D point cloud registration, which is a main issue in computer vision and remote sensing.

  19. The balance between stress resilience and vulnerability is regulated by corticotropin-releasing hormone during the critical postnatal period for sensory development.

    PubMed

    Cramer, Tomer; Kisliouk, Tatiana; Yeshurun, Shlomo; Meiri, Noam

    2015-08-01

    Determining whether a stressful event will lead to stress-resilience or vulnerability depends probably on an adjustable stress response set point, which is most likely effective during postnatal sensory development and involves the regulation of corticotrophin-releasing hormone (CRH) expression. During the critical period of thermal-control establishment in 3-day-old chicks, heat stress was found to render resilient or sensitized response, depending on the ambient temperature. These two different responses were correlated with the amount of activation of the hypothalamic-pituitary-adrenal (HPA) axis. The expression of CRH mRNA in the hypothalamic paraventricular nucleus was augmented during heat challenge a week after heat conditioning in chicks which were trained to be vulnerable to heat, while it declined in chicks that were trained to be resilient. To study the role of CRH in HPA-axis plasticity, CRH or Crh-antisense were intracranially injected into the third ventricle. CRH caused an elevation of both body temperature and plasma corticosterone level, while Crh-antisense caused an opposite response. Moreover, these effects had long term implications by reversing a week later, heat resilience into vulnerability and vice versa. Chicks that had been injected with CRH followed by exposure to mild heat stress, normally inducing resilience, demonstrated, a week later, an elevation in body temperature, and Crh mRNA level similar to heat vulnerability, while Crh-antisense injected chicks, which were exposed to harsh temperature, responded in heat resilience. These results demonstrate a potential role for CRH in determining the stress resilience/vulnerability balance. © 2014 Wiley Periodicals, Inc.

  20. Threatened and Endangered Subspecies with Vulnerable Ecological Traits Also Have High Susceptibility to Sea Level Rise and Habitat Fragmentation

    PubMed Central

    Benscoter, Allison M.; Reece, Joshua S.; Noss, Reed F.; Brandt, Laura A.; Mazzotti, Frank J.; Romañach, Stephanie S.; Watling, James I.

    2013-01-01

    The presence of multiple interacting threats to biodiversity and the increasing rate of species extinction make it critical to prioritize management efforts on species and communities that maximize conservation success. We implemented a multi-step approach that coupled vulnerability assessments evaluating threats to Florida taxa such as climate change, sea-level rise, and habitat fragmentation with in-depth literature surveys of taxon-specific ecological traits. The vulnerability, adaptive capacity, and ecological traits of 12 threatened and endangered subspecies were compared to non-listed subspecies of the same parent species. Overall, the threatened and endangered subspecies showed high vulnerability and low adaptive capacity, in particular to sea level rise and habitat fragmentation. They also exhibited larger home ranges and greater dispersal limitation compared to non-endangered subspecies, which may inhibit their ability to track changing climate in fragmented landscapes. There was evidence for lower reproductive capacity in some of the threatened or endangered taxa, but not for most. Taxa located in the Florida Keys or in other low coastal areas were most vulnerable to sea level rise, and also showed low levels of adaptive capacity, indicating they may have a lower probability of conservation success. Our analysis of at-risk subspecies and closely related non-endangered subspecies demonstrates that ecological traits help to explain observed differences in vulnerability and adaptive capacity. This study points to the importance of assessing the relative contributions of multiple threats and evaluating conservation value at the species (or subspecies) level when resources are limited and several factors affect conservation success. PMID:23940614

  1. Threatened and endangered subspecies with vulnerable ecological traits also have high susceptibility to sea level rise and habitat fragmentation.

    PubMed

    Benscoter, Allison M; Reece, Joshua S; Noss, Reed F; Brandt, Laura A; Mazzotti, Frank J; Romañach, Stephanie S; Watling, James I

    2013-01-01

    The presence of multiple interacting threats to biodiversity and the increasing rate of species extinction make it critical to prioritize management efforts on species and communities that maximize conservation success. We implemented a multi-step approach that coupled vulnerability assessments evaluating threats to Florida taxa such as climate change, sea-level rise, and habitat fragmentation with in-depth literature surveys of taxon-specific ecological traits. The vulnerability, adaptive capacity, and ecological traits of 12 threatened and endangered subspecies were compared to non-listed subspecies of the same parent species. Overall, the threatened and endangered subspecies showed high vulnerability and low adaptive capacity, in particular to sea level rise and habitat fragmentation. They also exhibited larger home ranges and greater dispersal limitation compared to non-endangered subspecies, which may inhibit their ability to track changing climate in fragmented landscapes. There was evidence for lower reproductive capacity in some of the threatened or endangered taxa, but not for most. Taxa located in the Florida Keys or in other low coastal areas were most vulnerable to sea level rise, and also showed low levels of adaptive capacity, indicating they may have a lower probability of conservation success. Our analysis of at-risk subspecies and closely related non-endangered subspecies demonstrates that ecological traits help to explain observed differences in vulnerability and adaptive capacity. This study points to the importance of assessing the relative contributions of multiple threats and evaluating conservation value at the species (or subspecies) level when resources are limited and several factors affect conservation success.

  2. Threatened and endangered subspecies with vulnerable ecological traits Also have high susceptibility to sea level rise and habitat fragmentation

    USGS Publications Warehouse

    Benscoter, Allison M.; Reece, Joshua S.; Noss, Reed F.; Brandt, Laura B.; Mazzotti, Frank J.; Romañach, Stephanie S.; Watling, James I.

    2013-01-01

    The presence of multiple interacting threats to biodiversity and the increasing rate of species extinction make it critical to prioritize management efforts on species and communities that maximize conservation success. We implemented a multi-step approach that coupled vulnerability assessments evaluating threats to Florida taxa such as climate change, sea-level rise, and habitat fragmentation with in-depth literature surveys of taxon-specific ecological traits. The vulnerability, adaptive capacity, and ecological traits of 12 threatened and endangered subspecies were compared to non-listed subspecies of the same parent species. Overall, the threatened and endangered subspecies showed high vulnerability and low adaptive capacity, in particular to sea level rise and habitat fragmentation. They also exhibited larger home ranges and greater dispersal limitation compared to non-endangered subspecies, which may inhibit their ability to track changing climate in fragmented landscapes. There was evidence for lower reproductive capacity in some of the threatened or endangered taxa, but not for most. Taxa located in the Florida Keys or in other low coastal areas were most vulnerable to sea level rise, and also showed low levels of adaptive capacity, indicating they may have a lower probability of conservation success. Our analysis of at-risk subspecies and closely related non-endangered subspecies demonstrates that ecological traits help to explain observed differences in vulnerability and adaptive capacity. This study points to the importance of assessing the relative contributions of multiple threats and evaluating conservation value at the species (or subspecies) level when resources are limited and several factors affect conservation success.

  3. Factors affecting low summer dissolved oxygen concentrations in Mississippi Delta bayous

    USDA-ARS?s Scientific Manuscript database

    Streams in watersheds supporting intensive row-crop agriculture are vulnerable to ecological degradation due to non-point source discharge of pollutants such as nutrients. Low gradient streams such as bayous are especially susceptible due to increased water residence time, and often result in poor w...

  4. Accountability for Alternative Schools in California. Continuous Improvement Series

    ERIC Educational Resources Information Center

    de Velasco, Jorge Ruiz; Gonzales, Daisy

    2017-01-01

    California's alternative education options for youth vulnerable to dropping out of school have been established at different historical points and for different student age and target populations. For purposes of this brief, "alternative school" is defined as belonging to one of six legislatively authorized types of public (non-charter)…

  5. Inferential Style, School Teachers, and Depressive Symptoms in College Students

    ERIC Educational Resources Information Center

    Pittard, Caroline M.; Pössel, Patrick; Lau, Timothy

    2017-01-01

    Depressive symptoms affect around half of students at some point during college. According to the hopelessness theory of depression, making negative inferences about stressful events is a vulnerability for developing depression. Negative and socio-emotional teaching behavior can be stressors that are associated with depression in school students.…

  6. SPATIAL PATTERN OF FUTURE VULNERABILITY OF STREAM EUTROPHICATION IN THE MID-ATLANTIC REGION OF THE UNITED STATES

    EPA Science Inventory

    Spatially explicit identification of changes in ecological conditions over large areas is key to targeting and prioritizing areas for environmental protection and restoration by managers at watershed, basin, and regional scales. A critical limitation to this point has been the d...

  7. The Infusion of Corporate Values into Progressive Education: Professional Vulnerability or Complicity?

    ERIC Educational Resources Information Center

    Gamson, David A.

    2004-01-01

    Examines the history of educational administration in the USA during the Progressive era (1890-1940). Using Callahan's Education and the Cult of Efficiency as a starting point, examines school district-based administrative practices that offered viable alternatives to the business-oriented, "scientific management" reforms that tended to…

  8. Overt and Latent Cardiac Effects of Ozone Inhalation in Rats: Evidence for Autonomic Modulation and Increased Myocardial Vulnerability*

    EPA Science Inventory

    Ozone (O3) is a well-documented respiratory oxidant, but increasing epidemiologic evidence points to extra-pulmonary effects including positive associations between ambient O3 concentrations and cardiovascular morbidity/mortality. With preliminary reports linking O3 exposure wit...

  9. USING LANDSCAPE ECOLOGY AND PARTIAL LEAST SQUARES PREDICTIONS TO MAP WATERSHEDS THAT ARE VULNERABLE TO NON-POINT SOURCE POLLUTION

    EPA Science Inventory

    The U.S. Environmental Protection Agency's Office of Research and Development have mapped and interpreted landscape-scale (i.e., broad scale) ecological metrics among watersheds in the upper White River watershed, producing the first geospatial models of water quality vulnerabili...

  10. Evaluating the suitability of the Soil Vulnerability Index (SVI) classification scheme using the SWAT model

    USDA-ARS?s Scientific Manuscript database

    Conservation practices are effective ways to mitigate non-point source pollution, especially when implemented on critical source areas (CSAs) known to be the areas contributing disproportionately to high pollution loads. Although hydrologic models are promising tools to identify CSAs within agricul...

  11. Binge-pattern cocaine administration causes long-lasting behavioral hyperarousal but does not enhance vulnerability to single prolonged stress in rats.

    PubMed

    Lisieski, Michael J; Perrine, Shane A

    2017-11-01

    Cocaine use disorder and post-traumatic stress disorder (PTSD) commonly co-occur. This could be due to vulnerability to post-traumatic symptoms conferred by previous exposure to cocaine. Therefore, we combined chronic binge-pattern cocaine with a model of psychological trauma (single prolonged stress) to determine whether the behavioral effects of psychological trauma are enhanced in cocaine-sensitized individuals. Adult male Sprague Dawley rats received 14 days of cocaine (15mg/kg/injection) or saline in a binge pattern (3 injections per day, 1h apart). Seven days after the last injection animals were exposed to traumatic stress or a control procedure. Seven days after stress, activity and anxiety-like behaviors were measured. Binge-pattern cocaine increased locomotor activity in the open field and elevated plus maze, and both cocaine and SPS exposure increased the rapidity with which rats moved through grooming sequences. Neither binge-pattern cocaine nor SPS increased anxiety-like behaviors, and no interactions were found between binge-pattern cocaine exposure and SPS exposure. A behavioral phenotype categorization approach demonstrated that cocaine-exposed groups expressed a high incidence of hyperactivity-like symptoms. These results suggest that binge-pattern cocaine exposure causes a long-lasting hyper-exploratory phenotype but does not make individuals more vulnerable to a later traumatic stress exposure. Copyright © 2017 Elsevier B.V. All rights reserved.

  12. Estimating drought risk across Europe from reported drought impacts, hazard indicators and vulnerability factors

    NASA Astrophysics Data System (ADS)

    Blauhut, V.; Stahl, K.; Stagge, J. H.; Tallaksen, L. M.; De Stefano, L.; Vogt, J.

    2015-12-01

    Drought is one of the most costly natural hazards in Europe. Due to its complexity, drought risk, the combination of the natural hazard and societal vulnerability, is difficult to define and challenging to detect and predict, as the impacts of drought are very diverse, covering the breadth of socioeconomic and environmental systems. Pan-European maps of drought risk could inform the elaboration of guidelines and policies to address its documented severity and impact across borders. This work (1) tests the capability of commonly applied hazard indicators and vulnerability factors to predict annual drought impact occurrence for different sectors and macro regions in Europe and (2) combines information on past drought impacts, drought hazard indicators, and vulnerability factors into estimates of drought risk at the pan-European scale. This "hybrid approach" bridges the gap between traditional vulnerability assessment and probabilistic impact forecast in a statistical modelling framework. Multivariable logistic regression was applied to predict the likelihood of impact occurrence on an annual basis for particular impact categories and European macro regions. The results indicate sector- and macro region specific sensitivities of hazard indicators, with the Standardised Precipitation Evapotranspiration Index for a twelve month aggregation period (SPEI-12) as the overall best hazard predictor. Vulnerability factors have only limited ability to predict drought impacts as single predictor, with information about landuse and water resources as best vulnerability-based predictors. (3) The application of the "hybrid approach" revealed strong regional (NUTS combo level) and sector specific differences in drought risk across Europe. The majority of best predictor combinations rely on a combination of SPEI for shorter and longer aggregation periods, and a combination of information on landuse and water resources. The added value of integrating regional vulnerability information with drought risk prediction could be proven. Thus, the study contributes to the overall understanding of drivers of drought impacts, current practice of drought indicators selection for specific application, and drought risk assessment.

  13. Estimating drought risk across Europe from reported drought impacts, drought indices, and vulnerability factors

    NASA Astrophysics Data System (ADS)

    Blauhut, Veit; Stahl, Kerstin; Stagge, James Howard; Tallaksen, Lena M.; De Stefano, Lucia; Vogt, Jürgen

    2016-07-01

    Drought is one of the most costly natural hazards in Europe. Due to its complexity, drought risk, meant as the combination of the natural hazard and societal vulnerability, is difficult to define and challenging to detect and predict, as the impacts of drought are very diverse, covering the breadth of socioeconomic and environmental systems. Pan-European maps of drought risk could inform the elaboration of guidelines and policies to address its documented severity and impact across borders. This work tests the capability of commonly applied drought indices and vulnerability factors to predict annual drought impact occurrence for different sectors and macro regions in Europe and combines information on past drought impacts, drought indices, and vulnerability factors into estimates of drought risk at the pan-European scale. This hybrid approach bridges the gap between traditional vulnerability assessment and probabilistic impact prediction in a statistical modelling framework. Multivariable logistic regression was applied to predict the likelihood of impact occurrence on an annual basis for particular impact categories and European macro regions. The results indicate sector- and macro-region-specific sensitivities of drought indices, with the Standardized Precipitation Evapotranspiration Index (SPEI) for a 12-month accumulation period as the overall best hazard predictor. Vulnerability factors have only limited ability to predict drought impacts as single predictors, with information about land use and water resources being the best vulnerability-based predictors. The application of the hybrid approach revealed strong regional and sector-specific differences in drought risk across Europe. The majority of the best predictor combinations rely on a combination of SPEI for shorter and longer accumulation periods, and a combination of information on land use and water resources. The added value of integrating regional vulnerability information with drought risk prediction could be proven. Thus, the study contributes to the overall understanding of drivers of drought impacts, appropriateness of drought indices selection for specific applications, and drought risk assessment.

  14. Parental HIV/AIDS and psychosocial adjustment among rural Chinese children.

    PubMed

    Fang, Xiaoyi; Li, Xiaoming; Stanton, Bonita; Hong, Yan; Zhang, Liying; Zhao, Guoxiang; Zhao, Junfeng; Lin, Xiuyun; Lin, Danhua

    2009-01-01

    To assess the relationship between parental HIV/AIDS and psychosocial adjustment of children in rural central China. Participants included 296 double AIDS orphans (children who had lost both their parents to AIDS), 459 single orphans (children who had lost one parent to AIDS), 466 vulnerable children who lived with HIV-infected parents, and 404 comparison children who did not experience HIV/AIDS-related illness and death in their families. The measures included depressive symptoms, loneliness, self-esteem, future expectations, hopefulness about the future, and perceived control over the future. AIDS orphans and vulnerable children consistently demonstrated poorer psychosocial adjustment than comparison children in the same community. The level of psychosocial adjustment was similar between single orphans and double orphans, but differed by care arrangement among double orphans. The findings underscore the urgency and importance of culturally and developmentally appropriate intervention efforts targeting psychosocial problems among children affected by AIDS and call for more exploration of risk and resilience factors, both individual and contextual, affecting the psychosocial wellbeing of these children.

  15. Effect of reservoir zones and hedging factor dynamism on reservoir adaptive capacity for climate change impacts

    NASA Astrophysics Data System (ADS)

    Adeloye, Adebayo J.; Soundharajan, Bankaru-Swamy

    2018-06-01

    When based on the zones of available water in storage, hedging has traditionally used a single hedged zone and a constant rationing ratio for constraining supply during droughts. Given the usual seasonality of reservoir inflows, it is also possible that hedging could feature multiple hedged zones and temporally varying rationing ratios but very few studies addressing this have been reported especially in relation to adaptation to projected climate change. This study developed and tested Genetic Algorithms (GA) optimised zone-based operating policies of various configurations using data for the Pong reservoir, Himachal Pradesh, India. The results show that hedging does lessen vulnerability, which dropped from ≥ 60 % without hedging to below 25 % with the single stage hedging. More complex hedging policies, e.g. two stage and/or temporally varying rationing ratios only produced marginal improvements in performance. All this shows that water hedging policies do not have to be overly complex to effectively offset reservoir vulnerability caused by water shortage resulting from e.g. projected climate change.

  16. Techniques for Updating Pedestrian Network Data Including Facilities and Obstructions Information for Transportation of Vulnerable People

    PubMed Central

    Park, Seula; Bang, Yoonsik; Yu, Kiyun

    2015-01-01

    Demand for a Pedestrian Navigation Service (PNS) is on the rise. To provide a PNS for the transportation of vulnerable people, more detailed information of pedestrian facilities and obstructions should be included in Pedestrian Network Data (PND) used for PNS. Such data can be constructed efficiently by collecting GPS trajectories and integrating them with the existing PND. However, these two kinds of data have geometric differences and topological inconsistencies that need to be addressed. In this paper, we provide a methodology for integrating pedestrian facilities and obstructions information with an existing PND. At first we extracted the significant points from user-collected GPS trajectory by identifying the geometric difference index and attributes of each point. Then the extracted points were used to make an initial solution of the matching between the trajectory and the PND. Two geometrical algorithms were proposed and applied to reduce two kinds of errors in the matching: on dual lines and on intersections. Using the final solution for the matching, we reconstructed the node/link structure of PND including the facilities and obstructions information. Finally, performance was assessed with a test site and 79.2% of the collected data were correctly integrated with the PND. PMID:26404307

  17. Estimating vegetation vulnerability to detect areas prone to land degradation in the Mediterranean basin

    NASA Astrophysics Data System (ADS)

    Imbrenda, Vito; Coluzzi, Rosa; D'Emilio, Mariagrazia; Lanfredi, Maria; Simoniello, Tiziana

    2013-04-01

    Vegetation is one of the key components to study land degradation vulnerability because of the complex interactions and feedbacks that link it to soil. In the Mediterranean region, degradation phenomena are due to a mix of predisposing factors (thin soil horizons, low soil organic matter, increasing aridity, etc.) and bad management practices (overgrazing, deforestation, intensification of agriculture, tourism development). In particular, in areas threatened by degradation processes but still covered by vegetation, large scale soil condition evaluation is a hard task and the detection of stressed vegetation can be useful to identify on-going soil degradation phenomena and to reduce their impacts through interventions for recovery/rehabilitation. In this context the use of satellite time series can increase the efficacy and completeness of the land degradation assessment, providing precious information to understand vegetation dynamics. In order to estimate vulnerability levels in Basilicata (a Mediterranean region of Southern Italy) in the framework of PRO-LAND project (PO-FESR Basilicata 2007-2013), we crossed information on potential vegetation vulnerability with information on photosynthetic activity dynamics. Potential vegetation vulnerability represents the vulnerability related to the type of present cover in terms of fire risk, erosion protection, drought resistance and plant cover distribution. It was derived from an updated land cover map by separately analyzing each factor, and then by combining them to obtain concise information on the possible degradation exposure. The analysis of photosynthetic activity dynamics provides information on the status of vegetation, that is fundamental to discriminate the different vulnerability levels within the same land cover, i.e. the same potential vulnerability. For such a purpose, we analyzed a time series (2000-2010) of a satellite vegetation index (MODIS NDVI) with 250m resolution, available as 16-day composite from the NASA LP DAAC dataset. Vegetation activity trends were estimated and then normalized to the starting conditions to obtain the percentage variation (NDVI-PV) for the considered period. Information on the potential vulnerability and vegetation activity dynamics were classified into indexes and combined to obtain the final map of the actual vegetation vulnerability and to identify on-going degradation phenomena and priority sites within areas already compromised. As for the investigated area, this map shows a composite picture in which only a few values of high vulnerability are scattered along areas where medium-high vulnerability values generally prevail. Here, we singled out two kind of areas: one largely devoted to intensive agriculture, and other one mostly characterized by bare soils and sparse vegetation. On the contrary, a large part of natural and seminatural vegetation located along the Apennine chain does not show critical vulnerability values. By comparing the vegetation vulnerability map with the vulnerability map due to anthropic factors (pressure induced by agricultural and grazing activities, estimated by indicators derived from census data), we found correlation, confirming the anthropogenic cause of vulnerability and therefore the major role held by soil management in areas mainly devoted to intensive farming.

  18. Considering Time-Dependency of Social Vulnerability in Crisis Modeling and Management

    NASA Astrophysics Data System (ADS)

    Aubrecht, C.; Steinnocher, K.; Freire, S.; Loibl, W.; Peters-Anders, J.; Ungar, J.

    2012-04-01

    Crisis and disaster management is much more than the immediate first-response actions following an incident. In many projects the main focus has been on the phase starting at the point when an unwanted event happens and lasting until the activities return to normal routines (i.e., ad hoc reaction rather than proactive mitigation). There has been less emphasis on the other phases of the disaster management cycle such as prevention, preparedness, recovery and reconstruction, even though those phases have a strong influence on the general status of a society and its citizens. Especially the potential of a crisis to escalate into a large-scale disaster is heavily dependent on the overall level of preparedness as well as on the planning of mitigation and response actions and their timely execution. There is a need for improved decision-making support that enables modeling of different crisis scenarios and their impacts according to chosen prevention and response actions. Vulnerability describing the status of a society with respect to an imposed hazard or potential impact is considered a strongly multidisciplinary concept. A central objective of vulnerability assessment is to provide indications where and how people - and more specifically, what kind of people - might be affected by a certain impact. Results should provide decision- and policy-makers with supporting information to target response and mitigation actions adequately. For assessment of the social dimension of vulnerability, population exposure mapping is usually considered the starting point. Integration of social structure and varying aspects of resilience further differentiate situation-specific vulnerability patterns on a local scale. In a disaster risk management context, assessment of human vulnerability has generally been lagging behind hazard analysis efforts. Accurately estimating population exposure is a key component of catastrophe loss modeling, one element of effective integrated risk analysis and emergency management. The vulnerability of each relevant element at risk, including human beings and society in general and its time-dependent variation is characterized both by its pre-event status and by its possible evolution during a crisis. Particularly in metropolitan areas, the spatial distribution of population is highly time-dependent due to human activities and mobility. Identifying distinct day-/nighttime population distribution characteristics is a major improvement compared to standard residence-based models, but does however only display part of reality. New technologies and data processing capabilities allow moving into the field of real-time representation of human movement. The focus of this contribution will be on illustrating, through project examples and by putting it in an emergency and crisis management context, two main categories, (1) the mapping of cell phone user activity, and (2) the use of volunteered geographic information (VGI).

  19. Impact of Degree Heterogeneity on Attack Vulnerability of Interdependent Networks

    NASA Astrophysics Data System (ADS)

    Sun, Shiwen; Wu, Yafang; Ma, Yilin; Wang, Li; Gao, Zhongke; Xia, Chengyi

    2016-09-01

    The study of interdependent networks has become a new research focus in recent years. We focus on one fundamental property of interdependent networks: vulnerability. Previous studies mainly focused on the impact of topological properties upon interdependent networks under random attacks, the effect of degree heterogeneity on structural vulnerability of interdependent networks under intentional attacks, however, is still unexplored. In order to deeply understand the role of degree distribution and in particular degree heterogeneity, we construct an interdependent system model which consists of two networks whose extent of degree heterogeneity can be controlled simultaneously by a tuning parameter. Meanwhile, a new quantity, which can better measure the performance of interdependent networks after attack, is proposed. Numerical simulation results demonstrate that degree heterogeneity can significantly increase the vulnerability of both single and interdependent networks. Moreover, it is found that interdependent links between two networks make the entire system much more fragile to attacks. Enhancing coupling strength between networks can greatly increase the fragility of both networks against targeted attacks, which is most evident under the case of max-max assortative coupling. Current results can help to deepen the understanding of structural complexity of complex real-world systems.

  20. Public health consequences on vulnerable populations from acute chemical releases.

    PubMed

    Ruckart, Perri Zeitz; Orr, Maureen F

    2008-07-09

    Data from a large, multi-state surveillance system on acute chemical releases were analyzed to describe the type of events that are potentially affecting vulnerable populations (children, elderly and hospitalized patients) in order to better prevent and plan for these types of incidents in the future. During 2003-2005, there were 231 events where vulnerable populations were within ¼ mile of the event and the area of impact was greater than 200 feet from the facility/point of release. Most events occurred on a weekday during times when day care centers or schools were likely to be in session. Equipment failure and human error caused a majority of the releases. Agencies involved in preparing for and responding to chemical emergencies should work with hospitals, nursing homes, day care centers, and schools to develop policies and procedures for initiating appropriate protective measures and managing the medical needs of patients. Chemical emergency response drills should involve the entire community to protect those that may be more susceptible to harm.

  1. Public Health Consequences on Vulnerable Populations from Acute Chemical Releases

    PubMed Central

    Ruckart, Perri Zeitz; Orr, Maureen F.

    2008-01-01

    Data from a large, multi-state surveillance system on acute chemical releases were analyzed to describe the type of events that are potentially affecting vulnerable populations (children, elderly and hospitalized patients) in order to better prevent and plan for these types of incidents in the future. During 2003–2005, there were 231 events where vulnerable populations were within ¼ mile of the event and the area of impact was greater than 200 feet from the facility/point of release. Most events occurred on a weekday during times when day care centers or schools were likely to be in session. Equipment failure and human error caused a majority of the releases. Agencies involved in preparing for and responding to chemical emergencies should work with hospitals, nursing homes, day care centers, and schools to develop policies and procedures for initiating appropriate protective measures and managing the medical needs of patients. Chemical emergency response drills should involve the entire community to protect those that may be more susceptible to harm. PMID:21572842

  2. Addressing the vulnerabilities of pass-thoughts

    NASA Astrophysics Data System (ADS)

    Fernandez, Gabriel C.; Danko, Amanda S.

    2016-05-01

    As biometrics become increasingly pervasive, consumer electronics are reaping the benefits of improved authentication methods. Leveraging the physical characteristics of a user reduces the burden of setting and remembering complex passwords, while enabling stronger security. Multi-factor systems lend further credence to this model, increasing security via multiple passive data points. In recent years, brainwaves have been shown to be another feasible source for biometric authentication. Physically unique to an individual in certain circumstances, the signals can also be changed by the user at will, making them more robust than static physical characteristics. No paradigm is impervious however, and even well-established medical technologies have deficiencies. In this work, a system for biometric authentication via brainwaves is constructed with electroencephalography (EEG). The efficacy of EEG biometrics via existing consumer electronics is evaluated, and vulnerabilities of such a system are enumerated. Impersonation attacks are performed to expose the extent to which the system is vulnerable. Finally, a multimodal system combining EEG with additional factors is recommended and outlined.

  3. Psychological vulnerability, burnout, and coping among employees of a business process outsourcing organization.

    PubMed

    Machado, Tanya; Sathyanarayanan, Vidya; Bhola, Poornima; Kamath, Kirthi

    2013-01-01

    The business process outsourcing (BPO) sector is a contemporary work setting in India, with a large and relatively young workforce. There is concern that the demands of the work environment may contribute to stress levels and psychological vulnerability among employees as well as to high attrition levels. As part of a larger study, questionnaires were used to assess psychological distress, burnout, and coping strategies in a sample of 1,209 employees of a BPO organization. The analysis indicated that 38% of the sample had significant psychological distress on the General Health Questionnaire (GHQ-28; Goldberg and Hillier, 1979). The vulnerable groups were women, permanent employees, data processors, and those employed for 6 months or longer. The reported levels of burnout were low and the employees reported a fairly large repertoire of coping behaviors. The study has implications for individual and systemic efforts at employee stress management and workplace prevention approaches. The results point to the emerging and growing role of mental health professionals in the corporate sector.

  4. Labor migration, externalities and ethics: Theorizing the meso-level determinants of HIV vulnerability

    PubMed Central

    Hirsch, Jennifer S.

    2013-01-01

    This paper discusses labor migration as an example of how focusing on the meso-level highlights the social processes through which structural factors produce HIV risk. Situating that argument in relation to existing work on economic organization and HIV risk as well as research on labor migration and HIV vulnerabilities, the paper demonstrates how analyzing the processes through which labor migration creates vulnerability can shift attention away from the proximate behavioral determinants of HIV risk and towards the community and policy levels. Further, it presents the concepts of externalities and the ethics of consumption, which underline how both producers and consumers benefit from low-waged migrant labor, and thus are responsible for the externalization of HIV risk characteristic of supply chains that rely on migrant labor. These concepts point to strategies through which researchers and advocates could press the public and private sectors to improve the conditions in which migrants live and work, with implications for HIV as well as other health outcomes. PMID:24444837

  5. Functional Genomic Landscape of Human Breast Cancer Drivers, Vulnerabilities, and Resistance.

    PubMed

    Marcotte, Richard; Sayad, Azin; Brown, Kevin R; Sanchez-Garcia, Felix; Reimand, Jüri; Haider, Maliha; Virtanen, Carl; Bradner, James E; Bader, Gary D; Mills, Gordon B; Pe'er, Dana; Moffat, Jason; Neel, Benjamin G

    2016-01-14

    Large-scale genomic studies have identified multiple somatic aberrations in breast cancer, including copy number alterations and point mutations. Still, identifying causal variants and emergent vulnerabilities that arise as a consequence of genetic alterations remain major challenges. We performed whole-genome small hairpin RNA (shRNA) "dropout screens" on 77 breast cancer cell lines. Using a hierarchical linear regression algorithm to score our screen results and integrate them with accompanying detailed genetic and proteomic information, we identify vulnerabilities in breast cancer, including candidate "drivers," and reveal general functional genomic properties of cancer cells. Comparisons of gene essentiality with drug sensitivity data suggest potential resistance mechanisms, effects of existing anti-cancer drugs, and opportunities for combination therapy. Finally, we demonstrate the utility of this large dataset by identifying BRD4 as a potential target in luminal breast cancer and PIK3CA mutations as a resistance determinant for BET-inhibitors. Copyright © 2016 Elsevier Inc. All rights reserved.

  6. Quantifying Access Disparities in Response Plans

    PubMed Central

    Indrakanti, Saratchandra; Mikler, Armin R.; O’Neill, Martin; Tiwari, Chetan

    2016-01-01

    Effective response planning and preparedness are critical to the health and well-being of communities in the face of biological emergencies. Response plans involving mass prophylaxis may seem feasible when considering the choice of dispensing points within a region, overall population density, and estimated traffic demands. However, the plan may fail to serve particular vulnerable subpopulations, resulting in access disparities during emergency response. For a response plan to be effective, sufficient mitigation resources must be made accessible to target populations within short, federally-mandated time frames. A major challenge in response plan design is to establish a balance between the allocation of available resources and the provision of equal access to PODs for all individuals in a given geographic region. Limitations on the availability, granularity, and currency of data to identify vulnerable populations further complicate the planning process. To address these challenges and limitations, data driven methods to quantify vulnerabilities in the context of response plans have been developed and are explored in this article. PMID:26771551

  7. VULNERABILITY AS A FUNCTION OF INDIVIDUAL AND GROUP RESOURCES IN CUMULATIVE RISK ASSESSMENT

    EPA Science Inventory

    Background: The field of risk assessment has focused on protecting the health of individual people or populations of wildlife from single risks, mostly from chemical exposure. The U.S. Environmental Protection Agency recently began to address multiple risks to communities in the ...

  8. Workshop Builds Strategies to Address Global Positioning System Vulnerabilities

    NASA Astrophysics Data System (ADS)

    Fisher, Genene

    2011-01-01

    When we examine the impacts of space weather on society, do we really understand the risks? Can past experiences reliably predict what will happen in the future? As the complexity of technology increases, there is the potential for it to become more fragile, allowing for a single point of failure to bring down the entire system. Take the Global Positioning System (GPS) as an example. GPS positioning, navigation, and timing have become an integral part of daily life, supporting transportation and communications systems vital to the aviation, merchant marine, cargo, cellular phone, surveying, and oil exploration industries. Everyday activities such as banking, mobile phone operations, and even the control of power grids are facilitated by the accurate timing provided by GPS. Understanding the risks of space weather to GPS and the many economic sectors reliant upon it, as well as how to build resilience, was the focus of a policy workshop organized by the American Meteorological Society (AMS) and held on 13-14 October 2010 in Washington, D. C. The workshop brought together a select group of policy makers, space weather scientists, and GPS experts and users.

  9. Radiation Damage and Single Event Effect Results for Candidate Spacecraft Electronics

    NASA Technical Reports Server (NTRS)

    OBryan, Martha V.; LaBel, Kenneth A.; Reed, Robert A.; Howard, James W., Jr.; Ladbury, Ray L.; Barth, Janet L.; Kniffin, Scott D.; Seidleck, Christina M.; Marshall, Paul W.; Marshall, Cheryl J.; hide

    2000-01-01

    We present data on the vulnerability of a variety of candidate spacecraft electronics to proton and heavy-ion induced single-event effects and proton-induced damage. We also present data on the susceptibility of parts to functional degradation resulting from total ionizing dose at low dose rates (0.003-0.33 Rads(Si)/s). Devices tested include optoelectronics, digital, analog, linear bipolar, hybrid devices, Analog to Digital Converters (ADCs), Digital to Analog Converters (DACs), and DC-DC converters, among others.

  10. Extension of the behavioral model of healthcare utilization with ethnically diverse, low-income women.

    PubMed

    Keenan, Lisa A; Marshall, Linda L; Eve, Susan

    2002-01-01

    Psychosocial vulnerabilities were added to a model of healthcare utilization. This extension was tested among low-income women with ethnicity addressed as a moderator. Structured interviews were conducted at 2 points in time, approximately 1 year apart. The constructs of psychosocial vulnerability, demographic predisposing, barriers, and illness were measured by multiple indicators to allow use of Structural Equation Modeling to analyze results. The models were tested separately for each ethnic group. Community office. African-American (N = 266), Euro-American (N = 200), and Mexican-American (N = 210) women were recruited from the Dallas Metropolitan area to participate in Project Health Outcomes of Women, a multi-year, multi-wave study. Face-to-face interviews were conducted with this sample. Participants had been in heterosexual relationships for at least 1 year, were between 20 and 49 years of age, and had incomes less than 200% of the national poverty level. Healthcare utilization, defined as physician visits and general healthcare visits. Illness mediated the effect of psychosocial vulnerability on healthcare utilization for African Americans and Euro-Americans. The model for Mexican Americans was the most complex. Psychosocial vulnerability on illness was partially mediated by barriers, which also directly affected utilization. Psychosocial vulnerabilities were significant utilization predictors for healthcare use for all low-income women in this study. The final models for the 2 minority groups, African Americans and Mexican Americans, were quite different. Hence, women of color should not be considered a homogeneous group in comparison to Euro-Americans.

  11. Dark and vulnerable personality trait correlates of dimensions of criminal behavior among adult offenders.

    PubMed

    Edwards, Bethany G; Albertson, Emily; Verona, Edelyn

    2017-10-01

    Given the high-level impact of crime, empirical work is needed to identify personality traits, or overarching factors of personality pathology, that may leave individuals more prone to engage in criminal behaviors. This study empirically tested the distinction between the dark personality and vulnerable dark personality spectra (Miller et al., 2010) in a large offender sample and aimed to test how these personality factors relate to criminal dimensions and individual types of crime. Self-report and public record data verified criminal behaviors for 493 (34.7% women) adult offenders, and features of the 2 personality spectra were assessed using the Psychopathy Checklist: Screening Version, Narcissistic Personality Inventory-16, Hypersensitive Narcissism Scale, and Personality Assessment Inventory: Borderline Scale. Factor analyses supported the distinction between dark and vulnerable dark personality spectra and 3 dimensions of crime (i.e., crimes against property and persons, and drug-related crimes). Findings broadly pointed to trait vulnerabilities within the dark spectra (e.g., callousness) as relevant for criminal versatility and violent crimes against persons (e.g., assault, murder), and impulsive/reactive tendencies within the dark spectra (vulnerable dark) appeared to be particularly important for impulsive property crimes (e.g., theft, robbery) and drug offenses. Results may lend themselves well to refining offender intervention techniques and warrant further examination of the extent to which dark personality spectra coalesce as expected or similarly predict high-impact behaviors. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  12. Classification of aquifer vulnerability using K-means cluster analysis

    NASA Astrophysics Data System (ADS)

    Javadi, S.; Hashemy, S. M.; Mohammadi, K.; Howard, K. W. F.; Neshat, A.

    2017-06-01

    Groundwater is one of the main sources of drinking and agricultural water in arid and semi-arid regions but is becoming increasingly threatened by contamination. Vulnerability mapping has been used for many years as an effective tool for assessing the potential for aquifer pollution and the most common method of intrinsic vulnerability assessment is DRASTIC (Depth to water table, net Recharge, Aquifer media, Soil media, Topography, Impact of vadose zone and hydraulic Conductivity). An underlying problem with the DRASTIC approach relates to the subjectivity involved in selecting relative weightings for each of the DRASTIC factors and assigning rating values to ranges or media types within each factor. In this study, a clustering technique is introduced that removes some of the subjectivity associated with the indexing method. It creates a vulnerability map that does not rely on fixed weights and ratings and, thereby provides a more objective representation of the system's physical characteristics. This methodology was applied to an aquifer in Iran and compared with the standard DRASTIC approach using the water quality parameters nitrate, chloride and total dissolved solids (TDS) as surrogate indicators of aquifer vulnerability. The proposed method required only four of DRASTIC's seven factors - depth to groundwater, hydraulic conductivity, recharge value and the nature of the vadose zone, to produce a superior result. For nitrate, chloride, and TDS, respectively, the clustering approach delivered Pearson correlation coefficients that were 15, 22 and 5 percentage points higher than those obtained for the DRASTIC method.

  13. Vulnerability Assessment of Water Supply Systems: Status, Gaps and Opportunities

    NASA Astrophysics Data System (ADS)

    Wheater, H. S.

    2015-12-01

    Conventional frameworks for assessing the impacts of climate change on water resource systems use cascades of climate and hydrological models to provide 'top-down' projections of future water availability, but these are subject to high uncertainty and are model and scenario-specific. Hence there has been recent interest in 'bottom-up' frameworks, which aim to evaluate system vulnerability to change in the context of possible future climate and/or hydrological conditions. Such vulnerability assessments are generic, and can be combined with updated information from top-down assessments as they become available. While some vulnerability methods use hydrological models to estimate water availability, fully bottom-up schemes have recently been proposed that directly map system vulnerability as a function of feasible changes in water supply characteristics. These use stochastic algorithms, based on reconstruction or reshuffling methods, by which multiple water supply realizations can be generated under feasible ranges of change in water supply conditions. The paper reports recent successes, and points to areas of future improvement. Advances in stochastic modeling and optimization can address some technical limitations in flow reconstruction, while various data mining and system identification techniques can provide possibilities to better condition realizations for consistency with top-down scenarios. Finally, we show that probabilistic and Bayesian frameworks together can provide a potential basis to combine information obtained from fully bottom-up analyses with projections available from climate and/or hydrological models in a fully integrated risk assessment framework for deep uncertainty.

  14. Assessing Flood Risks and Planning for Resiliency in New Jersey: A Case Study on the Use of Online Flood Mapping and Resilience Planning Tools

    NASA Astrophysics Data System (ADS)

    Auermuller, L. M.; Gatto, J.; Huch, C.

    2015-12-01

    The highly developed nature of New Jersey's coastline, barrier island and lagoon communities make them particularly vulnerable to storm surge, sea level rise and flooding. The impacts of Hurricane Sandy have enlightened coastal communities to these realities. Recognizing these vulnerabilities, the Jacques Cousteau National Research Reserve (JC NERR), Rutgers Center for Remote Sensing and Spatial Analysis (CRSSA), Rutgers Bloustein School and the Barnegat Bay Partnership (BBP) have developed web-based tools to assist NJ's coastal communities in visualizing and planning for future local impacts. NJFloodMapper and NJAdapt are two complementary interactive mapping websites that visualize different current and future flood hazards. These hazard layers can be combined with additional data including critical facilities, evacuation routes, socioeconomic and environmental data. Getting to Resilience is an online self-assessment tool developed to assist communities reduce vulnerability and increase preparedness by linking planning, mitigation, and adaptation. Through this interactive process communities will learn how their preparedness can yield valuable points through voluntary programs like FEMA's Community Rating System and Sustainable Jersey. The assessment process can also increase the community's understanding of where future vulnerabilities should be addressed through hazard mitigation planning. Since Superstorm Sandy, more than thirty communities in New Jersey have been provided technical assistance in assessing their risks and vulnerabilities to coastal hazards, and have begun to understand how to better plan and prepare for short and long-term changes along their shorelines.

  15. Associations between social vulnerabilities and psychosocial problems in European children. Results from the IDEFICS study.

    PubMed

    Iguacel, Isabel; Michels, Nathalie; Fernández-Alvira, Juan M; Bammann, Karin; De Henauw, Stefaan; Felső, Regina; Gwozdz, Wencke; Hunsberger, Monica; Reisch, Lucia; Russo, Paola; Tornaritis, Michael; Thumann, Barbara Franziska; Veidebaum, Toomas; Börnhorst, Claudia; Moreno, Luis A

    2017-09-01

    The effect of socioeconomic inequalities on children's mental health remains unclear. This study aims to explore the cross-sectional and longitudinal associations between social vulnerabilities and psychosocial problems, and the association between accumulation of vulnerabilities and psychosocial problems. 5987 children aged 2-9 years from eight European countries were assessed at baseline and 2-year follow-up. Two different instruments were employed to assess children's psychosocial problems: the KINDL (Questionnaire for Measuring Health-Related Quality of Life in Children and Adolescents) was used to evaluate children's well-being and the Strengths and Difficulties Questionnaire (SDQ) was used to evaluate children's internalising problems. Vulnerable groups were defined as follows: children whose parents had minimal social networks, children from non-traditional families, children of migrant origin or children with unemployed parents. Logistic mixed-effects models were used to assess the associations between social vulnerabilities and psychosocial problems. After adjusting for classical socioeconomic and lifestyle indicators, children whose parents had minimal social networks were at greater risk of presenting internalising problems at baseline and follow-up (OR 1.53, 99% CI 1.11-2.11). The highest risk for psychosocial problems was found in children whose status changed from traditional families at T0 to non-traditional families at T1 (OR 1.60, 99% CI 1.07-2.39) and whose parents had minimal social networks at both time points (OR 1.97, 99% CI 1.26-3.08). Children with one or more vulnerabilities accumulated were at a higher risk of developing psychosocial problems at baseline and follow-up. Therefore, policy makers should implement measures to strengthen the social support for parents with a minimal social network.

  16. Peer Harassment in School: The Plight of the Vulnerable and Victimized.

    ERIC Educational Resources Information Center

    Juvonen, Jaana, Ed.; Graham, Sandra, Ed.

    Many children are targets of verbal and physical abuse or social ostracism at some point during their school careers, and a minority are repeatedly victimized by their peers. This volume brings together leading investigators to present the latest psychological research on chronically victimized children and adolescents. The book's introduction…

  17. When Working Becomes Hazardous. Punching, Spitting, Swearing, Shooting: Violence at Work Goes Global.

    ERIC Educational Resources Information Center

    World of Work, 1998

    1998-01-01

    Workplace violence has gone global, crossing borders, work settings, and occupational groups. A report from the International Labor Organization points out high-risk occupations and indicates that women are especially vulnerable. It highlights the problem and provides ways for policymakers to remove violence from the workplace. (JOW)

  18. Discrimination and Good Practice Activities in Education: Trends and Developments in the 27 EU Member States

    ERIC Educational Resources Information Center

    Pollak, Alexander

    2008-01-01

    The European Union Agency for Fundamental Rights collects, through its network of observation points, information on discrimination and good practice in the areas of legislation, employment, housing, racist violence, and education. Data on education includes information on: access to education for vulnerable groups, discriminatory practices,…

  19. USING LANDSCAPE ECOLOGY AND PARTIAL LEAST SQUARES PREDICITIONS TO MAP WATERSHEDS THAT ARE VULNERABLE TO NON-POINT SOURCE POLLUTION

    EPA Science Inventory

    The U.S. Environmental Protection Agency¿s Office of Research and Development have mapped and interpreted landscape-scale (i.e., broad scale) ecological metrics among watersheds in the upper White River watershed, producing the first geospatial models of water quality vulnerabili...

  20. Cognitive Vulnerability to Depressive Symptoms in Children: The Protective Role of Self-efficacy Beliefs in a Multi-Wave Longitudinal Study

    PubMed Central

    Steca, P.; Abela, J. R. Z.; Monzani, D.; Greco, A.; Hazel, N. A.; Hankin, B. L.

    2015-01-01

    The current multi-wave longitudinal study on childhood examined the role that social and academic self-efficacy beliefs and cognitive vulnerabilities play in predicting depressive symptoms in response to elevations in idiographic stressors. Children (N = 554; males: 51.4%) attending second and third grade completed measures of depressive symptoms, negative cognitive styles, negative life events, and academic and social self-efficacy beliefs at four time-points over 6 months. Results showed that high levels of academic and social self-efficacy beliefs predicted lower levels of depressive symptoms, whereas negative cognitive styles about consequences predicted higher depression. Furthermore, children reporting higher social self-efficacy beliefs showed a smaller elevation in levels of depressive symptoms when reporting an increases in stress than children with lower social self-efficacy beliefs. Findings point to the role of multiple factors in predicting children’s depression in the long term and commend the promotion of self-efficacy beliefs and the modification of cognitive dysfunctional styles as relevant protective factors. PMID:23740171

  1. Security risk assessment: applying the concepts of fuzzy logic.

    PubMed

    Bajpai, Shailendra; Sachdeva, Anish; Gupta, J P

    2010-01-15

    Chemical process industries (CPI) handling hazardous chemicals in bulk can be attractive targets for deliberate adversarial actions by terrorists, criminals and disgruntled employees. It is therefore imperative to have comprehensive security risk management programme including effective security risk assessment techniques. In an earlier work, it has been shown that security risk assessment can be done by conducting threat and vulnerability analysis or by developing Security Risk Factor Table (SRFT). HAZOP type vulnerability assessment sheets can be developed that are scenario based. In SRFT model, important security risk bearing factors such as location, ownership, visibility, inventory, etc., have been used. In this paper, the earlier developed SRFT model has been modified using the concepts of fuzzy logic. In the modified SRFT model, two linguistic fuzzy scales (three-point and four-point) are devised based on trapezoidal fuzzy numbers. Human subjectivity of different experts associated with previous SRFT model is tackled by mapping their scores to the newly devised fuzzy scale. Finally, the fuzzy score thus obtained is defuzzyfied to get the results. A test case of a refinery is used to explain the method and compared with the earlier work.

  2. Coastal vulnerability: climate change and natural hazards perspectives

    NASA Astrophysics Data System (ADS)

    Romieu, E.; Vinchon, C.

    2009-04-01

    Introduction Studying coastal zones as a territorial concept (Integrated coastal zone management) is an essential issue for managers, as they have to consider many different topics (natural hazards, resources management, tourism, climate change…). The recent approach in terms of "coastal vulnerability" studies (since the 90's) is the main tool used nowadays to help them in evaluating impacts of natural hazards on coastal zones, specially considering climate change. This present communication aims to highlight the difficulties in integrating this concept in risk analysis as it is usually practiced in natural hazards sciences. 1) Coastal vulnerability as a recent issue The concept of coastal vulnerability mainly appears in the International panel on climate change works of 1992 (IPCC. 2001), where it is presented as essential for climate change adaptation. The concept has been defined by a common methodology which proposes the assessment of seven indicators, in regards to a sea level rise of 1m in 2100: people affected, people at risk, capital value at loss, land at loss, wetland at loss, potential adaptation costs, people at risk assuming this adaptation. Many national assessments have been implemented (Nicholls, et al. 1995) and a global assessment was proposed for three indicators (Nicholls, et al. 1999). The DINAS-Coast project reuses this methodology to produce the DIVA-tool for coastal managers (Vafeidis, et al. 2004). Besides, many other methodologies for national or regional coastal vulnerability assessments have been developed (review by (UNFCCC. 2008). The use of aggregated vulnerability indicators (including geomorphology, hydrodynamics, climate change…) is widespread: the USGS coastal vulnerability index is used worldwide and was completed by a social vulnerability index (Boruff, et al. 2005). Those index-based methods propose a vulnerability mapping which visualise indicators of erosion, submersion and/or socio economic sensibility in coastal zones. This concept is a great tool for policy makers to help managing their action and taking into account climate change (McFadden, et al. 2006). However, in those approaches, vulnerability is the output itself (cost of effective impacts, geomorphologic impacts…), but is not integrated it in a risk analysis. Furthermore, those studies emerged from a climatic perspective, which leads to consider climate change as a hazard or pressure whereas risk studies commonly consider hazards such as erosion and flooding, where climate change modifies the drivers of the hazard. 2) The natural hazards and socio economic perspectives In order to reduce impacts of natural hazards, decision makers need a complete risk assessment (probability of losses). Past studies on natural risks (landslide, earthquake...) highlighted the pertinence of defining risk as a combination of : (1)hazard occurrence and intensity, (2) exposition and (3)vulnerability of assets and population to this hazard (e.g. Douglas. 2007, Sarewitz, et al. 2003). Following the Renn and Klinke risk assessment frame, high uncertainties associated with coastal risks considering climatic and anthropic change highlights the importance of working on that concept of "vulnerability" (Klinke and Renn. 2002). Past studies on vulnerability assessment showed a frequently mentioned gap between "impact based" and "human based" points of view. It is nowadays a great issue for natural risk sciences. Many research efforts in FP7 projects such as MOVE and ENSURE focus on integrating the different dimensions of vulnerability (Turner, et al. 2003, Birkmann. 2006). Coastal risk studies highlight another issue of concern. We previously detailed the different use of the term "vulnerability" in the coastal context, quite different of the "natural risk's" use. Interaction of social, economic and physical sciences is considered within two french research projects (Vulsaco, Miseeva), in order to identify the vulnerability of a system to flooding or erosion (i.e. its characteristics that create potential harm), and integrate them in a risk assessment. Global change is considered by modifications of hazard, anthropogenic pressure and exposition, in order to point out possible modification of vulnerabilities. 3) Learning from both perspectives Coastal vulnerability in its "end in itself" and climate change dimension is a widespread tool for decision makers but it can be inadequate when vulnerability is a component of risk. This is mainly due to the consideration of climate change as a "hazard", so that coastal vulnerability is seen as the possible adverse impacts of climate change. As a matter of fact, this concept is clearly well considered by managers, who feel deeply concerned by climate change. However, coastal risk managers would gain in considering climate change more like a driver able to modify existing hazards than like the pressure in itself. Using this concept could lead to new perspectives of coastal risk mitigation for decision makers (social vulnerability, risk perception…), learning from other disciplines and sciences thanks to research projects such as MOVE (FP7). Acknowledgements The authors would like to thank the BRGM coastal team for rich discussions and fruitful collaborations in coastal vulnerability studies, more specially Déborah Idier for animating the Vulsaco project and Manuel Garcin for his work on tsunamis in Sri Lanka. They are also grateful to the MISEEVA and MOVE teams, which are doing some great trans-disciplinary work. References Birkmann, J., 2006. Measuring vulnerability to Natural Hazards : towards disaster resilient societies. United Nations University Press. Boruff, B. J., Emrich, C., Cutter, S. L., 2005. Erosion hazard vulnerability of US coastal counties. Journal of Coastal Research. 21, 932-942. Douglas, J., 2007. Physical vulnerability modelling in natural hazard risk assessment. Natural Hazards and Earth System Sciences. 7, 283-288. IPCC, 2001. Climate change 2001 : synthesis report. A contribution of working groups I, II and III to the Third Assesment Report of the Intergovernmental Panel on Climate Change. Klinke, A. and Renn, O., 2002. A new approach to risk evaluation and management : risk based, precaution based and discourse based strategies. Risk Analysis. 22, 1071-1094. McFadden, L., Nicholls, R.J., Penning-Rowsell, E. (Eds.), 2006. Managing coastal vulnerability. Elsevier Science. Nicholls, R. J., Hoozemans, F. M. J., Marchand, M., 1999. Increasing flood risk and wetland losses due to global sea-level rise: regional and global analyses. Global Environmental Change, Part A: Human and Policy Dimensions. 9, S69-S87. Nicholls, R. J., Leatherman, S. P., Volonte, C. R., 1995. Impacts and responses to sea-level rise; qualitative and quantitative assessments; Potential impacts of accelerated sea-level rise on developing countries. Journal of Coastal Research. Special issue 14, 26-43. Sarewitz, D., Pielke, R., Keykhah, M., 2003. Vulnerability and Risk: Some Thoughts from a Political and Policy Perspective. Risk Analysis. 23, 805-810. Turner, B. L.,II, Kasperson, R. E., Matson, P. A., McCarthy, J. J., Corell, R. W., Christensen, L., Eckley, N., Kasperson, J. X., Luers, A., Martello, M. L., Polsky, C., Pulsipher, A., Schiller, A., 2003. A framework for vulnerability analysis in sustainability science. Proceedings of the National Academy of Sciences, USA. 100, 8074-8079. UNFCCC, 2008. Compendium on methods and tools to evaluate impacts of vulnerability and adaptation to climate change. Vafeidis, A., Nicholls, R., McFadden, L., 2004. Developing a database for global vulnerability analysis of coastal zones: The DINAS-COAST project and the DIVA tool.

  3. Effect of wild Helianthus cytoplasms on agronomic and oil characteristics of cultivated sunflower (H. annuus L.)

    USDA-ARS?s Scientific Manuscript database

    Sunflower (Helianthus annuus L.) productions reliance on a single source of cytoplasmic male-sterility, PET1, derived from H. petiolaris Nutt., makes the crop genetically vulnerable. Twenty diverse cytoplasmic substitution lines from annual and perennial wild species were compared with the inbred li...

  4. How to Assess Vulnerabilities of Water Policies to Global Change?

    NASA Astrophysics Data System (ADS)

    Kumar, A.; Haasnoot, M.; Weijs, S.

    2017-12-01

    Water managers are confronted with uncertainties arising from hydrological, societal, economical and political drivers. To manage these uncertainties two paradigms have been identified: top-down and bottom-up approaches. Top-down or prediction-based approaches use socio-economic scenarios together with a discrete set of GCM projections (often downscaled) to assess the expected impact of drivers and policies on water resource system through various hydrological and social systems models. Adaptation strategies to alleviate these impacts are then identified and tested against the scenarios. To address GCM and downscaling uncertainties, these approaches put more focus on climate predictions, rather than the decision problem itself. Triggered by the wish to have a more scenario-neutral approach and address downscaling uncertainties, recent analyses have been shifted towards vulnerability-based (bottom-up or decision-centric) approaches. They begin at the local scale by addressing socio-economic responses to climate, often involving stakeholder's input; identify vulnerabilities under a larger sample of plausible futures and evaluate sensitivity and robustness of possible adaptation options. Several bottom-up approaches have emerged so far and are increasingly recommended. Fundamentally they share several core ideas, however, subtle differences exist in vulnerability assessment, visualization tools for exploring vulnerabilities and computational methods used for identifying robust water policies. Through this study, we try to identify how these approaches are progressing, how the climate and non-climate uncertainties are being confronted and how to integrate existing and new tools. We find that choice of a method may depend on the number of vulnerability drivers identified and type of threshold levels (environmental conditions or policy objectives) defined. Certain approaches are suited well for assessing adaptive capacities, tipping points and sequencing of decisions. However, visualization of the vulnerability domain is still challenging if multiple drivers are present. New emerging tools are focused on generating synthetic scenarios, addressing multiple objectives, linking decision-making frameworks to adaptation pathways and communicating risks to the stakeholders.

  5. Influence of confining layers' heterogeneity on the barometric response functions in semi-confined aquifers

    NASA Astrophysics Data System (ADS)

    Redaelli, Marco; Perulero Serrano, Raul

    2017-04-01

    It has been shown that Barometric Response Functions (BRFs) can provide a useful tool for detecting the occurrence of highly conducive bodies which span across aquifer confining layers and can potentially give rise to pathways for pollutant migration (Hussein et al 2013, Odling et al 2015). Analytical models employed to estimate BRFs from geological system properties assume homogeneity within the aquifer and its confining layer. These assumptions are rarely satisfied in practice. Our study focusses on the impact on predicted BRFs of heterogeneous distribution of high conductivity geomaterials within the confining layer. The work is grounded on a suite of three-dimensional, transient numerical computations of groundwater flow in a confining layer-aquifer system for i) a perfectly homogeneous two-layer setting where a single highly conducive block is fully penetrating the confining layer and ii) a heterogeneous two-layer system where hydraulic conductivity in the confining layer is modelled as a stochastic process. Our numerical results are interpreted through a comparison against those associated with an analytical model which assumes system homogeneity. Monitoring points located in the middle of the modelled aquifer domain, mimicking screened boreholes in field conditions, are used to extract water level records. The output is used to obtain the corresponding BRFs (in terms of gain and phase components) and compared vis-a-vis the selected analytical solution. The results show a wide variety of BRF responses, especially in the gain component, which vary from almost confined to unconfined scenarios. Our simulations show that the BRFs are a viable tool to improve understanding of the degree of spatial continuity within low permeability heterogeneous geological materials such as glacial till which is frequently found overlying water bearing units across the UK and other localities worldwide. As such, it has the potential to improve groundwater vulnerability assessment protocols. The results are promising and support the merit of additional developments through, e.g., numerical Monte Carlo simulations which can be performed to extract meaningful statistical information on the nature of BRFs as a function of randomly heterogeneous confining layers. Keywords: groundwater vulnerability, numerical modeling, barometric response functions, semi-confined aquifers References Hussein M.E.A., Odling N.E. & Clark R.A. (2013). Borehole water level response to barometric pressure as an indicator of aquifer vulnerability, Water Resources Research, 49: 7102-7119. Odling N.E, Perulero Serrano R., Hussein M.E.A, Riva M. & Guadagnini A. (2015). Detecting the vulnerability of groundwater in semi-confined aquifers using barometric response functions, Journal of Hydrology, 520: 143-156.

  6. Plasticity of vulnerability to leaf hydraulic dysfunction during acclimation to drought in grapevines: an osmotic-mediated process.

    PubMed

    Martorell, Sebastian; Medrano, Hipolito; Tomàs, Magdalena; Escalona, José M; Flexas, Jaume; Diaz-Espejo, Antonio

    2015-03-01

    Previous studies have reported correlation of leaf hydraulic vulnerability with pressure-volume parameters related to cell turgor. This link has been explained on the basis of the effects of turgor on connectivity among cells and tissue structural integrity, which affect leaf water transport. In this study, we tested the hypothesis that osmotic adjustment to water stress would shift the leaf vulnerability curve toward more negative water potential (Ψ leaf ) by increasing turgor at low Ψ leaf . We measured leaf hydraulic conductance (K leaf ), K leaf vulnerability [50 and 80% loss of K leaf (P50 and P80 ); |Ψ leaf | at 50 and 80% loss of K leaf , respectively), bulk leaf water relations, leaf gas exchange and sap flow in two Vitis vinifera cultivars (Tempranillo and Grenache), under two water treatments. We found that P50 , P80 and maximum K leaf decreased seasonally by more than 20% in both cultivars and watering treatments. However, K leaf at 2 MPa increased threefold, while osmotic potential at full turgor and turgor loss point decreased. Our results indicate that leaf resistance to hydraulic dysfunction is seasonally plastic, and this plasticity may be mediated by osmotic adjustment. © 2014 Scandinavian Plant Physiology Society.

  7. Predicting Health Care Utilization in Marginalized Populations: Black, Female, Street-based Sex Workers

    PubMed Central

    Varga, Leah M.; Surratt, Hilary L.

    2014-01-01

    Background Patterns of social and structural factors experienced by vulnerable populations may negatively affect willingness and ability to seek out health care services, and ultimately, their health. Methods The outcome variable was utilization of health care services in the previous 12 months. Using Andersen’s Behavioral Model for Vulnerable Populations, we examined self-reported data on utilization of health care services among a sample of 546 Black, street-based female sex workers in Miami, Florida. To evaluate the impact of each domain of the model on predicting health care utilization, domains were included in the logistic regression analysis by blocks using the traditional variables first and then adding the vulnerable domain variables. Findings The most consistent variables predicting health care utilization were having a regular source of care and self-rated health. The model that included only enabling variables was the most efficient model in predicting health care utilization. Conclusions Any type of resource, link, or connection to or with an institution, or any consistent point of care contributes significantly to health care utilization behaviors. A consistent and reliable source for health care may increase health care utilization and subsequently decrease health disparities among vulnerable and marginalized populations, as well as contribute to public health efforts that encourage preventive health. PMID:24657047

  8. Mountain Child: Systematic Literature Review.

    PubMed

    Audsley, Annie; Wallace, Rebecca M M; Price, Martin F

    2016-12-01

    Objectives This systematic review identifies and reviews both peer-reviewed and 'grey' literature, across a range of disciplines and from diverse sources, relating to the condition of children living in mountain communities in low- and middle-income countries. Findings The literature on poverty in these communities does not generally focus on the particular vulnerabilities of children or the impact of intersecting vulnerabilities on the most marginalised members of communities. However, this literature does contribute analyses of the broader context and variety of factors impacting on human development in mountainous areas. The literature on other areas of children's lives-health, nutrition, child mortality, education, and child labour-focuses more specifically on children's particular vulnerabilities or experiences. However, it sometimes lacks the broader analysis of the many interrelated characteristics of a mountainous environment which impact on children's situations. Themes Nevertheless, certain themes recur across many disciplines and types of literature, and point to some general conclusions: mountain poverty is influenced by the very local specificities of the physical environment; mountain communities are often politically and economically marginalised, particularly for the most vulnerable within these communities, including children; and mountain communities themselves are an important locus for challenging and interrupting cycles of increasing inequality and disadvantage. While this broad-scale review represents a modest first step, its findings provide the basis for further investigation.

  9. [Human immunodeficiency virus vulnerabilities and related health risk behaviors of out-of-school children of the floating population in Beijing].

    PubMed

    Ma, Ying-hua; Ding, Su-qin; Wang, Chao

    2007-10-18

    To explore the vulnerability and related risk behaviors of the out-of-school adolescents floating with their parents from country to city. From September to October in 2005, 260 out-of-school adolescents who were 14 to 20 years old were investigated in our study. The out-of-school adolescents lacked of HIV/AIDS knowledge and life skills, and their psychosocial competence was at a lower level. The adolescents were open-minded to sex, but they were not conscious of using condoms. Attitude towards people with HIV was positively correlated with a well-being family, harmonious relation between their parents, a stable job, knowledge, life skills and psychosocial competence (such as in control of emotions, empathy). Their life skills were positively correlated with their mothers' schooling satisfaction with family income, a stable job, high scores of knowledge, social responsibility,and interpersonal relationship. Competence of HIV/AIDS prevention was positively correlated with schooling, a stable job, knowledge, life skills, and psychosocial competence. Out-of-school adolescents were vulnerable to HIV/AIDS. Individual level intervention combined with structural intervention could effectively reduce their vulnerability. Effective and feasible health education approach to enhance their life skills and psychosocial competence was a key point to health education on HIV/AIDS prevention.

  10. Cognitive Vulnerabilities to Depression for Adolescents in Single-Mother and Two-Parent Families

    PubMed Central

    Daryanani, Issar; Hamilton, Jessica L.; McArthur, Brae Anne; Steinberg, Laurence; Abramson, Lyn. Y.; Alloy, Lauren B.

    2017-01-01

    Although research consistently suggests that adolescents in single-mother families are at increased risk for depression, the mechanisms that explain this relationship are unclear. In a community sample of adolescents (N = 368; ages 12–16; 50% female; 50% White) and their mothers (42% single), adolescents completed measures of depressive symptoms, rumination, and depressogenic inferential style at baseline and two yearly follow-ups. Mothers reported on stressful events that occurred in the child’s life from birth until baseline. Adolescents raised by single mothers, relative to partnered mothers, experienced more childhood stressors and higher rumination levels at one-year follow-up. Additionally, higher rumination mediated the relationship between single motherhood and greater youth depressive symptoms at the two-year follow-up. Clinical implications and developmental considerations are discussed. PMID:27858293

  11. Cognitive Vulnerabilities to Depression for Adolescents in Single-Mother and Two-Parent Families.

    PubMed

    Daryanani, Issar; Hamilton, Jessica L; McArthur, Brae Anne; Steinberg, Laurence; Abramson, Lyn Y; Alloy, Lauren B

    2017-01-01

    Although research consistently suggests that adolescents in single-mother families are at increased risk for depression, the mechanisms that explain this relationship are unclear. In a community sample of adolescents (N = 368; ages 12-16; 50 % female; 50 % White) and their mothers (42 % single), adolescents completed measures of depressive symptoms, rumination, and depressogenic inferential style at baseline and two yearly follow-ups. Mothers reported on stressful events that occurred in the child's life from birth until baseline. Adolescents raised by single mothers, relative to partnered mothers, experienced more childhood stressors and higher rumination levels at 1-year follow-up. Additionally, higher rumination mediated the relationship between single motherhood and greater youth depressive symptoms at the 2-year follow-up. Clinical implications and developmental considerations are discussed.

  12. Early-Life Adversity Interacts with FKBP5 Genotypes: Altered Working Memory and Cardiac Stress Reactivity in the Oklahoma Family Health Patterns Project.

    PubMed

    Lovallo, William R; Enoch, Mary-Anne; Acheson, Ashley; Cohoon, Andrew J; Sorocco, Kristen H; Hodgkinson, Colin A; Vincent, Andrea S; Goldman, David

    2016-06-01

    Exposure to stress during critical periods of development can have adverse effects on adult health behaviors, and genetic vulnerabilities may enhance these stress effects. We carried out an exploratory examination of psychological, physiological, and behavioral characteristics of 252 healthy young adults for the impact of early-life adversity (ELA) in relation to the G-to-A single nucleotide polymorphism (SNP), rs9296158, of the FKBP5 gene. FKBP5 is a molecular cochaperone that contributes to the functional status of the glucocorticoid receptor (GR) and to the quality of corticosteroid signaling. FKBP5 expression is upregulated by cortisol exposure during stressful episodes, with greater upregulation seen in A-allele carriers. As such, FKBP5 expression and GR function may be environmentally sensitive in A-allele carriers and therefore suitable for the study of gene-by-environment (G × E) interactions. Compared with FKBP5, GG homozygotes (N=118), A-allele carriers (N = 132) without psychiatric morbidity had progressively worse performance on the Stroop color-word task with increasing levels of ELA exposure (Genotype × ELA, F=5.14, P=0.007), indicating a G × E interaction on working memory in early adulthood. In addition, heart rate response to mental stress was diminished overall in AA/AG-allele carriers (F=5.15, P=0.024). Diminished working memory and attenuated autonomic responses to stress are both associated with risk for alcoholism and other substance use disorders. The present data suggest that FKBP5 in the GR pathway may be a point of vulnerability to ELA, as seen in this group of non-traumatized young adults. FKBP5 is accordingly a potential target for more extensive studies of the impact of ELA on health and health behaviors in adulthood.

  13. Evolution of natural risk: research framework and perspectives

    NASA Astrophysics Data System (ADS)

    Hufschmidt, G.; Crozier, M.; Glade, T.

    2005-05-01

    This study presents a conceptual framework for addressing temporal variation in natural risk. Numerous former natural risk analyses and investigations have demonstrated that time and related changes have a crucial influence on risk. For natural hazards, time becomes a factor for a number of reasons. Using the example of landslides to illustrate this point, it is shown that: 1. landslide history is important in determining probability of occurrence, 2. the significance of catchment variables in explaining landslide susceptibility is dependent on the time scale chosen, 3. the observer's perception of the geosystem's state changes with different time spans, and 4. the system's sensitivity varies with time. Natural hazards are not isolated events but complex features that are connected with the social system. Similarly, elements at risk and their vulnerability are highly dynamic through time, an aspect that is not sufficiently acknowledged in research. Since natural risk is an amalgam of hazard and vulnerability, its temporal behaviour has to be considered as well. Identifying these changes and their underlying processes contributes to a better understanding of natural risk today and in the future. However, no dynamic models for natural risks are currently available. Dynamic behaviour of factors affecting risk is likely to create increasing connectivity and complexity. This demands a broad approach to natural risk, since the concept of risk encapsulates aspects of many disciplines and has suffered from single-discipline approaches in the past. In New Zealand, dramatic environmental and social change has occurred in a relatively short period of time, graphically demonstrating the temporal variability of the geosystem and the social system. To understand these changes and subsequent interactions between both systems, a holistic perspective is needed. This contribution reviews available frameworks, demonstrates the need for further concepts, and gives research perspectives on a New Zealand example.

  14. The vulnerability of commercial aircraft avionics to carbon fibers

    NASA Technical Reports Server (NTRS)

    Meyers, J. A.; Salmirs, S.

    1980-01-01

    Avionics components commonly used in commercial aircraft were tested for vulnerability to failure when operated in an environment with a high density of graphite fibers. The components were subjected to a series of exposures to graphite fibers of different lengths. Lengths used for the tests were (in order) 1 mm, 3 mm, and 10 mm. The test procedure included subjecting the equipment to characteristic noise and shock environments. Most of the equipment was invulnerable or did not fail until extremely high average exposures were reached. The single exception was an air traffic control transponder produced in the early 1960's. It had the largest case open area through which fibers could enter and it had no coated boards.

  15. Mushrooming vulnerability to EMP

    NASA Astrophysics Data System (ADS)

    Lerner, E. J.

    1984-08-01

    The electromagnetic pulse (EMP) generated by a single thermonuclear bomb detonated above the continental U.S. could set up electrical fields of 50 kV/m over nearly all of North America. Since the progressively microminiaturized integrated circuits of current military and civilian electronics become more vulnerable with decreasing circuit element size, even shield-protected chips can now be destroyed by the substantially shield-dampened EMP pulses. It is noted as a source of special concern that, as nuclear weapons have evolved, the EMP characteristically generated by them has shifted to increasingly shorter wavelengths, requiring significant redesign of EMP shields devised a decade or more ago. The surge arresters currently employed may not react sufficiently rapidly for existing weapons.

  16. An Analysis of the Extent of Social Inclusion and Equity Consideration in Malawi’s National HIV and AIDS Policy Review Process

    PubMed Central

    Chinyama, Mathews Junior; MacLachlan, Malcolm; McVeigh, Joanne; Huss, Tessy; Gawamadzi, Sylvester

    2018-01-01

    Background: Equity and social inclusion for vulnerable groups in policy development processes and resulting documents remain a challenge globally. Most often, the marginalization of vulnerable groups is overlooked in both the planning and practice of health service delivery. Such marginalization may occur because authorities deem the targeting of those who already have better access to healthcare a cheaper and easier way to achieve short-term health gains. The Government of Malawi wishes to achieve an equitable and inclusive HIV and AIDS Policy. The aim of this study is to assess the extent to which the Malawi Policy review process addressed regional and international health priorities of equity and social inclusion for vulnerable groups in the policy content and policy revision process. Methods: This research design comprised two phases. First, the content of the Malawi HIV and AIDS Policy was assessed using EquiFrame regarding its coverage of 21 Core Concepts of human rights and inclusion of 12 Vulnerable Groups. Second, the engagement of vulnerable groups in the policy process was assessed using the EquIPP matrix. For the latter, 10 interviews were conducted with a purposive sample of representatives of public sector, civil society organizations and development partners who participated in the policy revision process. Data was also collected from documented information of the policy processes. Results: Our analyses indicated that the Malawi HIV and AIDS Policy had a relatively high coverage of Core Concepts of human rights and Vulnerable Groups; although with some notable omissions. The analyses also found that reasonable steps were taken to engage and promote participation of vulnerable groups in the planning, development, implementation, monitoring and evaluation processes of the HIV and AIDS Policy, although again, with some notable exceptions. This is the first study to use both EquiFrame and EquIPP as complimentary tools to assess the content and process of policy. Conclusion: While the findings indicate inclusive processes, commitment to Core Concepts of human rights and inclusion of Vulnerable Groups in relation to the Malawi HIV and AIDS Policy, the results also point to areas in which social inclusion and equity could be further strengthened. PMID:29626397

  17. Vulnerability and risk evaluation of agricultural nitrogen pollution for Hungary's main aquifer using DRASTIC and GLEAMS models.

    PubMed

    Leone, A; Ripa, M N; Uricchio, V; Deák, J; Vargay, Z

    2009-07-01

    In recent years, the significant improvement in point source depuration technologies has highlighted problems regarding, in particular, phosphorus and nitrogen pollution of surface and groundwater caused by agricultural non-point (diffuse) sources (NPS). Therefore, there is an urgent need to determine the relationship between agriculture and chemical and ecological water quality. This is a worldwide problem, but it is particularly relevant in countries, such as Hungary, that have recently become members of the European Community. The Italian Foreign Ministry has financed the PECO (Eastern Europe Countries Project) projects, amongst which is the project that led to the present paper, aimed at agricultural sustainability in Hungary, from the point of view of NPS. Specifically, the aim of the present work has been to study nitrates in Hungary's main aquifer. This study compares a model showing aquifer intrinsic vulnerability to pollution (using the DRASTIC parameter method; Aller et al. [Aller, L., Truman, B., Leher, J.H., Petty, R.J., 1986. DRASTIC: A Standardized System for Evaluating Ground Water Pollution Potential Using Hydrogeologic Settings. US NTIS, Springfield, VA.]) with a field-scale model (GLEAMS; Knisel [Knisel, W.G. (Ed.), 1993. GLEAMS--Groudwater Leaching Effects of Agricultural Management Systems, Version 3.10. University of Georgia, Coastal Plain Experimental Station, Tifton, GA.]) developed to evaluate the effects of agricultural management systems within and through the plant root zone. Specifically, GLEAMS calculates nitrate nitrogen lost by runoff, sediment and leachate. Groundwater monitoring probes were constructed for the project to measure: (i) nitrate content in monitored wells; (ii) tritium (3H) hydrogen radioisotope, as a tool to estimate the recharge conditions of the shallow groundwater; (iii) nitrogen isotope ratio delta15N, since nitrogen of organic and inorganic origin can easily be distinguished. The results obtained are satisfactory, above all regarding the DRASTIC evaluation method, which is shown to satisfactorily explain both low and high aquifer vulnerability, and furthermore proves to be a good tool for zoning hydrogeological regions in terms of natural system susceptibility to pollution. The GLEAMS model, however, proves not to be immediately usable for predictions, above all due to the difficulty in finding sufficient data for the input parameters. It remains a good tool, but only after an accurate validation, for decision support systems, in the specific case to integrate intrinsic vulnerability, from DRASTIC (or similar methods), with land use nitrate loads from GLEAMS, or similar methods. The PECO project has proved a positive experience to highlight the fundamental points of a decision support system, aimed to mitigate the nitrate risk for groundwater coming from Hungarian agricultural areas.

  18. Disaster planning for vulnerable populations: leveraging Community Human Service Organizations direct service delivery personnel.

    PubMed

    Levin, Karen L; Berliner, Maegan; Merdjanoff, Alexis

    2014-01-01

    Given the variability, complexities, and available resources for local vulnerable populations, it is clear that preparing effectively for catastrophic events cannot be accomplished with a single, simple template. Inclusion of Community Human Service Organizations' (CHSO's) direct service delivery personnel ensures that emergency disaster planning efforts for vulnerable populations are effective and responsive to unique needs and constraints. By leveraging existing local resources, it extends the preparedness system's reach to the whole community. CHSO personnel already perform community-based services and directly engage with vulnerable and special needs populations; typically they are on the front lines during an emergency event. Generally, however, the CHSOs, staff, and clients are neither adequately prepared for disasters nor well integrated into emergency systems. To address preparedness gaps identified during Hurricane Sandy, regional CHSO and local health department partners requested that the Columbia Regional Learning Center provide preparedness trainings for their agencies and staff responsible for vulnerable clients. Evaluation of this initiative was begun with a mixed-methods approach consisting of collaborative learning activities, a function-based assessment tool, and a 5 Steps to Preparedness module. Results from a survey were inclusive because of a low response rate but suggested satisfaction with the training format and content; increases in awareness of a client preparedness role; and steps toward improved personal, agency, and client preparedness. Direct service delivery personnel can leverage routine client interactions for preparedness planning and thus can contribute significantly to vulnerable population and community disaster readiness. Trainings that provide preparedness tools can help support this role. CHSO personnel are knowledgeable and have the expertise to assist clients in personal preparedness planning; yet, there are challenges around their ability and willingness to take on additional responsibilities.

  19. Comparison of a traditional with a new approach based on Graph Theory to vulnerability assessment to natural hazards: a study case on a socio-economic complex system

    NASA Astrophysics Data System (ADS)

    Arosio, Marcello; Martina, Mario L. V.

    2017-04-01

    The emergent behaviour of the contemporary complex, socio-technical and interconnected society makes the collective risk greater than the sum of the parts and this requires a holistic, systematic and integrated approach. Although there have been major improvements in recent years, there are still some limitation in term of a holistic approach that is able to include the emergent value hidden in the connections between exposed elements and the interactions between the different spheres of the multi-hazards, vulnerability, exposure and resilience. To deal with these challenges it is necessary to consider the connections between the exposed elements (e.g. populations, schools, hospital, etc.) and to quantify the relative importance of the elements and their interconnections (e.g. the need of injured people to go to hospital or children to school). In a system (e.g. road, hospital and ecological network, etc.), or in a System of System (e.g. socio-technical urban service), there are critical elements that, beyond the intrinsic vulnerability, can be characterized by greater or lower vulnerability because of their physical, geographical, cyber or logical connections. To this aim, we propose in this study a comparative analysis between traditional reductionist approach and a new holistic approach to vulnerability assessment to natural hazards. The analysis considers a study case of a socio-economic complex system through an innovative approach based on the properties of graph G=(N,L). A graph consists of two sets N (nodes) and L (links): the nodes represent the single exposed elements (physical, social, environmental, etc.) to a hazard, while the links (or connections) represent the interaction between the elements. The final goal is to illustrate an application of this innovative approach of integrated collective vulnerability assessment.

  20. Identifying mismatches between institutional perceptions of water-related risk drivers and water management strategies in three river basin areas

    NASA Astrophysics Data System (ADS)

    Räsänen, Aleksi; Juhola, Sirkku; Monge Monge, Adrián; Käkönen, Mira; Kanninen, Markku; Nygren, Anja

    2017-07-01

    Water-related risks and vulnerabilities are driven by variety of stressors, including climate and land use change, as well as changes in socio-economic positions and political landscapes. Hence, water governance, which addresses risks and vulnerabilities, should target multiple stressors. We analyze the institutional perceptions of the drivers and strategies for managing water-related risks and vulnerabilities in three regionally important river basin areas located in Finland, Mexico, and Laos. Our analysis is based on data gathered through participatory workshops and complemented by qualitative content analysis of relevant policy documents. The identified drivers and proposed risk reduction strategies showed the multidimensionality and context-specificity of water-related risks and vulnerabilities across study areas. Most of the identified drivers were seen to increase risks, but some of the drivers were positive trends, and drivers also included also policy instruments that can both increase or decrease risks. Nevertheless, all perceived drivers were not addressed with suggested risk reduction strategies. In particular, most of the risk reduction strategies were incremental adjustments, although many of the drivers classified as most important were large-scale trends, such as climate change, land use changes and increase in foreign investments. We argue that there is a scale mismatch between the identified drivers and suggested strategies, which questions the opportunity to manage the drivers by single-scale incremental adjustments. Our study suggests that for more sustainable risk and vulnerability reduction, the root causes of water-related risks and vulnerabilities should be addressed through adaptive multi-scale governance that carefully considers the context-specificity and the multidimensionality of the associated drivers and stressors.

  1. Effectiveness evaluation of objective and subjective weighting methods for aquifer vulnerability assessment in urban context

    NASA Astrophysics Data System (ADS)

    Sahoo, Madhumita; Sahoo, Satiprasad; Dhar, Anirban; Pradhan, Biswajeet

    2016-10-01

    Groundwater vulnerability assessment has been an accepted practice to identify the zones with relatively increased potential for groundwater contamination. DRASTIC is the most popular secondary information-based vulnerability assessment approach. Original DRASTIC approach considers relative importance of features/sub-features based on subjective weighting/rating values. However variability of features at a smaller scale is not reflected in this subjective vulnerability assessment process. In contrast to the subjective approach, the objective weighting-based methods provide flexibility in weight assignment depending on the variation of the local system. However experts' opinion is not directly considered in the objective weighting-based methods. Thus effectiveness of both subjective and objective weighting-based approaches needs to be evaluated. In the present study, three methods - Entropy information method (E-DRASTIC), Fuzzy pattern recognition method (F-DRASTIC) and Single parameter sensitivity analysis (SA-DRASTIC), were used to modify the weights of the original DRASTIC features to include local variability. Moreover, a grey incidence analysis was used to evaluate the relative performance of subjective (DRASTIC and SA-DRASTIC) and objective (E-DRASTIC and F-DRASTIC) weighting-based methods. The performance of the developed methodology was tested in an urban area of Kanpur City, India. Relative performance of the subjective and objective methods varies with the choice of water quality parameters. This methodology can be applied without/with suitable modification. These evaluations establish the potential applicability of the methodology for general vulnerability assessment in urban context.

  2. Tensions of network security and collaborative work practice: understanding a single sign-on deployment in a regional hospital.

    PubMed

    Heckle, Rosa R; Lutters, Wayne G

    2011-08-01

    Healthcare providers and their IT staff, working in an effort to balance appropriate accessibility with stricter security mandates, are considering the use of a single network sign-on approach for authentication and password management. Single sign-on (SSO) promises to improve usability of authentication for multiple-system users, increase compliance, and help curb system maintenance costs. However, complexities are introduced when SSO is placed within a collaborative environment. These complexities include unanticipated workflow implications that introduce greater security vulnerability for the individual user. OBJECTIVES AND METHODOLOGY: In this work, we examine the challenges of implementing a single sign-on authentication technology in a hospital environment. The aim of the study was to document the factors that affected SSO adoption within the context of use. The ultimate goal is to better inform the design of usable authentication systems within collaborative healthcare work sites. The primary data collection techniques used are ethnographically informed - observation, contextual interviews, and document review. The study included a cross-section of individuals from various departments and varying rolls. These participants were a mix of both clinical and administrative staff, as well as the Information Technology group. The field work revealed fundamental mis-matches between the technology and routine work practices that will significantly impact its effective adoption. While single sign-on was effective in the administrative offices, SSO was not a good fit for collaborative areas. The collaborative needs of the clinical staff unearthed tensions in its implementation. An analysis of the findings revealed that the workflow, activities, and physical environment of the clinical areas create increased security vulnerabilities for the individual user. The clinical users were cognizant of these vulnerabilities and this created resistance to the implementation due to a concern for privacy. From a preliminary analysis of our on-going field study at a community hospital, there appears to be a number of mismatches between the SSO vision and the realities of routine work. While we cannot conclusively say if a SSO adoption will be effective in meeting its goals in a hospital environment, we do know that it will affect the work practice and that will make the management of the SSO system problematic. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.

  3. Fuzzy decision analysis for integrated environmental vulnerability assessment of the mid-Atlantic Region.

    PubMed

    Tran, Liem T; Knight, C Gregory; O'Neill, Robert V; Smith, Elizabeth R; Riitters, Kurt H; Wickham, James

    2002-06-01

    A fuzzy decision analysis method for integrating ecological indicators was developed. This was a combination of a fuzzy ranking method and the analytic hierarchy process (AHP). The method was capable of ranking ecosystems in terms of environmental conditions and suggesting cumulative impacts across a large region. Using data on land cover, population, roads, streams, air pollution, and topography of the Mid-Atlantic region, we were able to point out areas that were in relatively poor condition and/or vulnerable to future deterioration. The method offered an easy and comprehensive way to combine the strengths of fuzzy set theory and the AHP for ecological assessment. Furthermore, the suggested method can serve as a building block for the evaluation of environmental policies.

  4. Do You Ignore Information Security in Your Journal Website?

    PubMed

    Dadkhah, Mehdi; Borchardt, Glenn; Lagzian, Mohammad

    2017-08-01

    Nowadays, web-based applications extend to all businesses due to their advantages and easy usability. The most important issue in web-based applications is security. Due to their advantages, most academic journals are now using these applications, with papers being submitted and published through their websites. As these websites are resources for knowledge, information security is primary for maintaining their integrity. In this opinion piece, we point out vulnerabilities in certain websites and introduce the potential for future threats. We intend to present how some journals are vulnerable and what will happen if a journal can be infected by attackers. This opinion is not a technical manual in information security, it is a short inspection that we did to improve the security of academic journals.

  5. Landsat Application of Remote Sensing to Shoreline-form Analysis. [Cape Hatteras, North Carolina and Assateague Island, Virginia

    NASA Technical Reports Server (NTRS)

    Dolan, R. (Principal Investigator); Heywood, J. E.

    1975-01-01

    The author has identified the following significant results. Areas of the coast were selected which have historically shown vulnerability to storm damage. On Assateague Island, there are six such areas: the western tip of Fishing Point; the southern National Park Service parking lot; Smith Hammocks; Fox Hill Level; Little Fox Hill Level; and the northern five kilometers of the island. Comparative analysis of these areas with other data and with large and small scale aerial photographs shows them to be associated with large overwash fans and shoreline cusping. Initial analysis of Landsat imagery and high altitude photography indicates that the areas of high vulnerability are also associated with the angular orientation of the shoreline.

  6. Estimation of Vulnerability Functions for Debris Flows Using Different Intensity Parameters

    NASA Astrophysics Data System (ADS)

    Akbas, S. O.; Blahut, J.; Luna, B. Q.; Sterlacchini, S.

    2009-04-01

    In landslide risk research, the majority of past studies have focused on hazard analysis, with only few targeting the concept of vulnerability. When debris flows are considered, there is no consensus or even modest agreement on a generalized methodology to estimate physical vulnerability of the affected buildings. Very few quantitative relationships have been proposed between intensities and vulnerability values. More importantly, in most of the existing relationships, information on process intensity is often missing or only described semi-quantitatively. However, robust assessment of vulnerabilities along with the associated uncertainties is of utmost importance from a quantitative risk analysis point of view. On the morning of 13th July 2008, after more than two days of intense rainfall, several debris and mud flows were released in the central part of Valtellina, an Italian alpine valley in Lombardy Region. One of the largest muddy-debris flows occurred in Selvetta, a fraction of Colorina municipality. The result was the complete destruction of two buildings, and damage at varying severity levels to eight others. The authors had the chance to gather detailed information about the event, by conducting extensive field work and interviews with local inhabitants, civil protection teams, and officials. In addition to the data gathered from the field studies, the main characteristics of the debris flow have been estimated using numerical and empirical approaches. The extensive data obtained from Selvetta event gave an opportunity to develop three separate empirical vulnerability curves, which are functions of deposition height, debris flow velocity, and pressure, respectively. Deposition heights were directly obtained from field surveys, whereas the velocity and pressure values were back-calculated using the finite difference program FLO2D. The vulnerability was defined as the ratio between the monetary loss and the reconstruction value. The monetary losses were obtained from official RASDA documents, which were compiled for claim purposes. For each building, the approximate reconstruction value was calculated according to the building type and size, using the official data given in the Housing Prices Index prepared by the Engineers and Architects of Milan. The resulting vulnerability curves were compared to those in the literature, and among themselves. Specific recommendations were given regarding the most suitable parameter to be used for characterizing the intensity of debris flows within the context of physical vulnerability.

  7. Social dimensions of vulnerability to glacier-hydrology hazards in Peru and Nepal

    NASA Astrophysics Data System (ADS)

    McDowell, Graham; Carey, Mark; Huggel, Christian; Kargel, Jeffrey S.

    2014-05-01

    Snow and ice hazards affect populations worldwide, and prevention and adaptation plans must devote more attention to the human dimensions of these hazards. Historically, most research on glacier hazards has emphasized glacial lake outburst floods (GLOFs) and rock-ice landslides. This work often focuses on technical approaches or scientific knowledge about these high-magnitude and low-frequency hazards. This study examines a different type of cryospheric hazard, one that is low-magnitude and high-frequency, especially under future climate change projections: the increasingly recognized hydrologic hazards related to runoff variability in downstream communities below shrinking glaciers. By focusing on actual water users in glacier-fed watersheds, the research helps illuminate key vulnerabilities to hydrological change. It demonstrates that people are indeed vulnerable to decreased runoff, but that these vulnerabilities must be analyzed in the context of global change, including socio-economic and political variables, and not just through technical or scientific approaches. The study examines water use for export-oriented agriculture in Peru's billion-dollar Chavimochic Project, which depends on a single canal from the Santa River that could be damaged by a GLOF or avalanche. Or the canal could experience declining water supplies in the future if water use increases, particularly due to international agricultural demands, while water supplies from glacial ice decreases. The study also provides insights from Khumbu, Nepal, where changing hydrological conditions are leading to reduced water access for household uses, declining crop yields, reduced water access for meeting the high water demands of tourists, and reduced hydro-electricity generation capabilities. Although these effects are widespread, there are clear patterns of socially determined vulnerability among the population, with low livelihood diversity an important indicator of increased susceptibility to harm. While focusing on hydrologic variability and vulnerability, this poster's societal orientation has far-reaching implications for the analysis of all cryospheric hazards where vulnerability and resilience are affected by a range of human and environmental forces.

  8. Urban Heat Wave Vulnerability Analysis Considering Climate Change

    NASA Astrophysics Data System (ADS)

    JE, M.; KIM, H.; Jung, S.

    2017-12-01

    Much attention has been paid to thermal environments in Seoul City in South Korea since 2016 when the worst heatwave in 22 years. It is necessary to provide a selective measure by singling out vulnerable regions in advance to cope with the heat wave-related damage. This study aims to analyze and categorize vulnerable regions of thermal environments in the Seoul and analyzes and discusses the factors and risk factors for each type. To do this, this study conducted the following processes: first, based on the analyzed various literature reviews, indices that can evaluate vulnerable regions of thermal environment are collated. The indices were divided into climate exposure index related to temperature, sensitivity index including demographic, social, and economic indices, and adaptation index related to urban environment and climate adaptation policy status. Second, significant variables were derived to evaluate a vulnerable region of thermal environment based on the summarized indices in the above. this study analyzed a relationship between the number of heat-related patients in Seoul and variables that affected the number using multi-variate statistical analysis to derive significant variables. Third, the importance of each variable was calculated quantitatively by integrating the statistical analysis results and analytic hierarchy process (AHP) method. Fourth, a distribution of data for each index was identified based on the selected variables and indices were normalized and overlapped. Fifth, For the climate exposure index, evaluations were conducted as same as the current vulnerability evaluation method by selecting future temperature of Seoul predicted through the representative concentration pathways (RCPs) climate change scenarios as an evaluation variable. The results of this study can be utilized as foundational data to establish a countermeasure against heatwave in Seoul. Although it is limited to control heatwave occurrences itself completely, improvements on environment for heatwave alleviation and response can be done. In particular, if vulnerable regions of heatwave can be identified and managed in advance, the study results are expected to be utilized as a basis of policy utilization in local communities accordingly.

  9. Combining demographic and genetic factors to assess population vulnerability in stream species

    USGS Publications Warehouse

    Erin L, Landguth; Muhlfeld, Clint C.; Jones, Leslie W.; Waples, Robin S.; Whited, Diane; Lowe, Winsor H.; Lucotch, John; Neville, Helen; Luikart, Gordon

    2014-01-01

    Accelerating climate change and other cumulative stressors create an urgent need to understand the influence of environmental variation and landscape features on the connectivity and vulnerability of freshwater species. Here, we introduce a novel modeling framework for aquatic systems that integrates spatially explicit, individual-based, demographic and genetic (demogenetic) assessments with environmental variables. To show its potential utility, we simulated a hypothetical network of 19 migratory riverine populations (e.g., salmonids) using a riverscape connectivity and demogenetic model (CDFISH). We assessed how stream resistance to movement (a function of water temperature, fluvial distance, and physical barriers) might influence demogenetic connectivity, and hence, population vulnerability. We present demographic metrics (abundance, immigration, and change in abundance) and genetic metrics (diversity, differentiation, and change in differentiation), and combine them into a single vulnerability index for identifying populations at risk of extirpation. We considered four realistic scenarios that illustrate the relative sensitivity of these metrics for early detection of reduced connectivity: (1) maximum resistance due to high water temperatures throughout the network, (2) minimum resistance due to low water temperatures throughout the network, (3) increased resistance at a tributary junction caused by a partial barrier, and (4) complete isolation of a tributary, leaving resident individuals only. We then applied this demogenetic framework using empirical data for a bull trout (Salvelinus confluentus) metapopulation in the upper Flathead River system, Canada and USA, to assess how current and predicted future stream warming may influence population vulnerability. Results suggest that warmer water temperatures and associated barriers to movement (e.g., low flows, dewatering) are predicted to fragment suitable habitat for migratory salmonids, resulting in the loss of genetic diversity and reduced numbers in certain vulnerable populations. This demogenetic simulation framework, which is illustrated in a web-based interactive mapping prototype, should be useful for evaluating population vulnerability in a wide variety of dendritic and fragmented riverscapes, helping to guide conservation and management efforts for freshwater species.

  10. UAS-SfM for coastal research: Geomorphic feature extraction and land cover classification from high-resolution elevation and optical imagery

    USGS Publications Warehouse

    Sturdivant, Emily; Lentz, Erika; Thieler, E. Robert; Farris, Amy; Weber, Kathryn; Remsen, David P.; Miner, Simon; Henderson, Rachel

    2017-01-01

    The vulnerability of coastal systems to hazards such as storms and sea-level rise is typically characterized using a combination of ground and manned airborne systems that have limited spatial or temporal scales. Structure-from-motion (SfM) photogrammetry applied to imagery acquired by unmanned aerial systems (UAS) offers a rapid and inexpensive means to produce high-resolution topographic and visual reflectance datasets that rival existing lidar and imagery standards. Here, we use SfM to produce an elevation point cloud, an orthomosaic, and a digital elevation model (DEM) from data collected by UAS at a beach and wetland site in Massachusetts, USA. We apply existing methods to (a) determine the position of shorelines and foredunes using a feature extraction routine developed for lidar point clouds and (b) map land cover from the rasterized surfaces using a supervised classification routine. In both analyses, we experimentally vary the input datasets to understand the benefits and limitations of UAS-SfM for coastal vulnerability assessment. We find that (a) geomorphic features are extracted from the SfM point cloud with near-continuous coverage and sub-meter precision, better than was possible from a recent lidar dataset covering the same area; and (b) land cover classification is greatly improved by including topographic data with visual reflectance, but changes to resolution (when <50 cm) have little influence on the classification accuracy.

  11. Integrated assessment of urban vulnerability and resilience. Case study: Targu Ocna town, Romania

    NASA Astrophysics Data System (ADS)

    Grozavu, Adrian; Bănică, Alexandru

    2015-04-01

    Vulnerability assessment frequently emphasizes the internal fragility of a system in relation to a given hazard, when compared to similar systems or to a reference standard. This internal fragility, either biophysical or structural, may affect the ability to predict, to prepare for and cope with or to recover from the manifestation of a risk phenomenon. Thus, the vulnerability is highly related to resilience and adaptability. There is no single methodology for vulnerability and resilience analysis, their assessment can only be made by identifying and integrating indicators which are compatible with the analysis level and the geographic, economic and social features of a certain area. An integrated model of evaluating vulnerability and resilience capacity is being proposed in this paper for Targu Ocna, a small mining settlement in the Eastern Carpathians of Romania, that became in the last years a tourist town and acts within the surrounding territory as a dynamic local pole. Methodologically, the following steps and operations were considered: identifying potential hazards, identifying elements at risk, identifying proper indicators and integrating them in order to evaluate the general vulnerability and resilience. The inventory of elements at risk (the number of people potentially affected, residential or other functionalities buildings, roads and other infrastructure elements etc.) was made based on General Urban Plan, topographic maps (scale 1:5000), ortophotos from 2003 and 2008 and field mapping and researches. Further on, several vulnerability indicators were identified and included within the analytical approach: dependency ratio, income, quality of the habitat and technical urban facilities, environment quality showing differentiated sensitivity. Issues such as preparedness and preventive measures (priority areas within the risk prevention plans), coping ability (networks' geometry and connectivity, emergency utilities and services accessibility) and the recovering capacity (the time needed to reestablish functions after a disastrous event) were also taken into account. The selected indicators were mathematically processed (standardized and normalized) in order to maximize their relevance and to unitary express the results in the spread 0-1. Then a grid with a cell size of 100 x 100 m was created in order to spatialize vulnerability indicators, that were calculated as the average vulnerability of the exposed elements in each cell. All identified indicators have been processed within a cluster analysis that permitted the identification of similar areas in terms of vulnerabilities. Finally, a general index was obtained by the integration of all vulnerability factors in an equation based on the geometric mean. The results of the study could provide a reference basis to substantiate local correctly prioritized decisions for reducing vulnerability by mitigation and adaptation measures in order to avoid significant damages when risks materialise.

  12. Flood susceptibility analysis through remote sensing, GIS and frequency ratio model

    NASA Astrophysics Data System (ADS)

    Samanta, Sailesh; Pal, Dilip Kumar; Palsamanta, Babita

    2018-05-01

    Papua New Guinea (PNG) is saddled with frequent natural disasters like earthquake, volcanic eruption, landslide, drought, flood etc. Flood, as a hydrological disaster to humankind's niche brings about a powerful and often sudden, pernicious change in the surface distribution of water on land, while the benevolence of flood manifests in restoring the health of the thalweg from excessive siltation by redistributing the fertile sediments on the riverine floodplains. In respect to social, economic and environmental perspective, flood is one of the most devastating disasters in PNG. This research was conducted to investigate the usefulness of remote sensing, geographic information system and the frequency ratio (FR) for flood susceptibility mapping. FR model was used to handle different independent variables via weighted-based bivariate probability values to generate a plausible flood susceptibility map. This study was conducted in the Markham riverine precinct under Morobe province in PNG. A historical flood inventory database of PNG resource information system (PNGRIS) was used to generate 143 flood locations based on "create fishnet" analysis. 100 (70%) flood sample locations were selected randomly for model building. Ten independent variables, namely land use/land cover, elevation, slope, topographic wetness index, surface runoff, landform, lithology, distance from the main river, soil texture and soil drainage were used into the FR model for flood vulnerability analysis. Finally, the database was developed for areas vulnerable to flood. The result demonstrated a span of FR values ranging from 2.66 (least flood prone) to 19.02 (most flood prone) for the study area. The developed database was reclassified into five (5) flood vulnerability zones segmenting on the FR values, namely very low (less that 5.0), low (5.0-7.5), moderate (7.5-10.0), high (10.0-12.5) and very high susceptibility (more than 12.5). The result indicated that about 19.4% land area as `very high' and 35.8% as `high' flood vulnerable class. The FR model output was validated with remaining 43 (30%) flood points, where 42 points were marked as correct predictions which evinced an accuracy of 97.7% in prediction. A total of 137292 people are living in those vulnerable zones. The flood susceptibility analysis using this model will be very useful and also an efficient tool to the local government administrators, researchers and planners for devising flood mitigation plans.

  13. The Fantastic Four of Mathematics Assessment Items

    ERIC Educational Resources Information Center

    Greenlees, Jane

    2011-01-01

    In this article, the author makes reference to four comic book characters to make the point that together they are a formidable team, but on their own they are vulnerable. She examines the four components of mathematics assessment items and the need for implicit instruction within the classroom for student success. Just like the "Fantastic Four"…

  14. Vulnerable Decision Points for Disproportionate Office Discipline Referrals: Comparisons of Discipline for African American and White Elementary School Students

    ERIC Educational Resources Information Center

    Smolkowski, Keith; Girvan, Erik J.; McIntosh, Kent; Nese, Rhonda N. T.; Horner, Robert H.

    2016-01-01

    Racial disparities in rates of exclusionary school discipline are well documented and seemingly intractable. However, emerging theories on implicit bias show promise in identifying effective interventions. In this study, we used school discipline data from 1,666 elementary schools and 483,686 office discipline referrals to identify specific…

  15. Performance testing to identify climate-ready trees

    Treesearch

    E.Gregory McPherson; Alison M. Berry; Natalie S. van Doorn

    2018-01-01

    Urban forests produce ecosystem services that can benefit city dwellers, but are especially vulnerable to climate change stressors such as heat, drought, extreme winds and pests. Tree selection is an important decision point for managers wanting to transition to a more stable and resilient urban forest structure. This study describes a five-step process to identify and...

  16. Resilience Predicts Well-Being in Teachers, but Not in Non-Teaching Employees

    ERIC Educational Resources Information Center

    Pretsch, Johanna; Flunger, Barbara; Schmitt, Manfred

    2012-01-01

    The resilience concept has often been criticized as simply reflecting the absence of neuroticism (i.e. vulnerability to stress and negative affectivity). Challenging this point of view, the aim of this study was to show that resilience could predict well-being in teachers above and beyond neuroticism. By contrast, we expected that resilience would…

  17. Children's Ideas about the Ozone Layer and Opportunities for Physics Teaching.

    ERIC Educational Resources Information Center

    Potts, Alison; And Others

    1996-01-01

    Examines the potential of global environmental issues as starting points for learning science by studying the preconceptions of children aged 12-13 about the nature, functions, and vulnerability of the ozone layer. Results indicate that children are familiar with the location and nature of the ozone layer but less informed about its magnitude and…

  18. Understanding the science of climate change: Talking points - Impacts to Prairie Potholes and Grasslands

    Treesearch

    Rachel Loehman

    2009-01-01

    Climate changes in the Prairie Potholes and Grasslands bioregion include increased seasonal, annual, minimum, and maximum temperature and changing precipitation patterns. Because the region is relatively dry with a strong seasonal climate, it is sensitive to climatic changes and vulnerable to changes in climatic regime. For example, model simulations show that regional...

  19. Integrating People with Disabilities: Their Right--Our Responsibility

    ERIC Educational Resources Information Center

    Isaac, Rebecca; Raja, B. William Dharma; Ravanan, M. P.

    2010-01-01

    A full understanding of disability recognizes that it has a powerful human rights dimension and is often associated with social exclusion, and increased exposure and vulnerability to poverty. Disability is a human rights issue. The World Bank (1999) report points out that one in five of the world's poorest are disabled, for whom access to basic…

  20. USING LANDSCAPE ECOLOGY TO MAP WATERSHEDS THAT ARE VULNERABLE TO NON-POINT SOURCE POLLUTION IN THE OZARKS

    EPA Science Inventory

    The U.S. EPA's Office of Research and Development, and U.S. EPA Region 7 have collaborated to map and interpret landscape-scale (i.e. broad-scale) ecological metrics among watershed of the Upper White River, and have produced the first geospatial models of water quality vulnerabi...

  1. Fear of School Violence and the Ameliorative Effects of Student Social Capital

    ERIC Educational Resources Information Center

    Sacco, Vincent F.; Nakhaie, M. Reza

    2007-01-01

    Data from the Canadian National Survey of Children and Youth are employed in order to investigate hypotheses regarding the relationships between students' social connections and their feelings of vulnerability to criminal danger. The analysis is preceded by a review of the research relating to school fear and social capital. Findings point to the…

  2. 40 CFR 29.9 - How does the Administrator receive and respond to comments?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... State office or official is designated to act as a single point of contact between a State process and... program selected under § 29.6. (b) The single point of contact is not obligated to transmit comments from.... However, if a State process recommendation is transmitted by a single point of contact, all comments from...

  3. Relating Speech and Cognitive Deficits in Children Vulnerable to Psychopathology.

    ERIC Educational Resources Information Center

    Harvey, Philip D.; And Others

    To determine whether or not both speech and laboratory assessments of referential communication ability measure a single area of competence, three groups of children were formed on the basis of their parents' diagnostic status: schizophrenic, unipolar depressive, or bipolar disordered. The breakdown of subject groups was as follows: 23 children of…

  4. Assessing Cardiovascular Responses to Stressors in Individuals with Autism Spectrum Disorders

    ERIC Educational Resources Information Center

    Groden, June; Goodwin, Matthew S.; Baron, M. Grace; Groden, Gerald; Velicer, Wayne F.; Lipsitt, Lewis P.; Hofmann, Stefan G.; Plummer, Brett

    2005-01-01

    Characteristics of persons with autism and other developmental disabilities may make this population especially vulnerable to the effects of stress. Prior research on stress and its measurement in this population is reviewed. Using a single-case multi-element design, this study explores the feasibility of measuring cardiovascular responses to four…

  5. Evidence for Early Morphological Decomposition in Visual Word Recognition

    ERIC Educational Resources Information Center

    Solomyak, Olla; Marantz, Alec

    2010-01-01

    We employ a single-trial correlational MEG analysis technique to investigate early processing in the visual recognition of morphologically complex words. Three classes of affixed words were presented in a lexical decision task: free stems (e.g., taxable), bound roots (e.g., tolerable), and unique root words (e.g., vulnerable, the root of which…

  6. Parental HIV/AIDS and Psychosocial Adjustment among Rural Chinese Children

    PubMed Central

    Fang, Xiaoyi; Stanton, Bonita; Hong, Yan; Zhang, Liying; Zhao, Guoxiang; Zhao, Junfeng; Lin, Xiuyun; Lin, Danhua

    2009-01-01

    Objective To assess the relationship between parental HIV/AIDS and psychosocial adjustment of children in rural central China. Methods Participants included 296 double AIDS orphans (children who had lost both their parents to AIDS), 459 single orphans (children who had lost one parent to AIDS), 466 vulnerable children who lived with HIV-infected parents, and 404 comparison children who did not experience HIV/AIDS-related illness and death in their families. The measures included depressive symptoms, loneliness, self-esteem, future expectations, hopefulness about the future, and perceived control over the future. Results AIDS orphans and vulnerable children consistently demonstrated poorer psychosocial adjustment than comparison children in the same community. The level of psychosocial adjustment was similar between single orphans and double orphans, but differed by care arrangement among double orphans. Conclusion The findings underscore the urgency and importance of culturally and developmentally appropriate intervention efforts targeting psychosocial problems among children affected by AIDS and call for more exploration of risk and resilience factors, both individual and contextual, affecting the psychosocial wellbeing of these children. PMID:19208701

  7. The Gatsby Plant Science Summer School: Inspiring the Next Generation of Plant Science Researchers[OA

    PubMed Central

    Levesley, Aurora; Jopson, Juliet; Knight, Celia

    2012-01-01

    We provide evidence from a 5-year study to show that a single concerted effort at the start of undergraduate study can have a clear and lasting effect on the attitudes of students toward plant science. Attendance at a week-long residential plant science summer school in the first year of an undergraduate degree resulted in many students changing courses to include more plant science and increased numbers of graduates selecting plant-based PhDs. The evidence shows that the Gatsby Plant Science Summer School has increased the pool of high-quality plant science related PhD applicants in the UK and has had a positive impact on students’ career aspirations. The results are discussed within the context of enhancing the pipeline of future plant scientists and reversing the decline of this vulnerable and strategically important subject relevant to addressing food security and other major global challenges. We have shown that a single well-designed and timely intervention can influence future student behavior and as such offers a framework of potential use to other vulnerable disciplines. PMID:22534129

  8. Travelling without a helmet: tourists' vulnerabilities and responses to disasters in Indonesia.

    PubMed

    Rindrasih, Erda; Hartmann, Thomas; Witte, Patrick; Spit, Tejo; Zoomers, Annelies

    2018-03-13

    Tourists are particularly vulnerable when natural disasters occur in regions that they are visiting. It is assumed that they lack awareness and understanding of the actions that they need to take in such circumstances. This study examines the responses of tourists in times of disaster, building on empirical data collected through large-scale surveys conducted in Bali and Yogyakarta, Indonesia, in 2015. Both are important tourist destinations in the country that have suffered major disasters in recent years. The different types of responses to these events are framed using a grid/group analysis stemming from cultural theory. The study resulted in three key findings: (i) current disaster management planning largely follows a single rationale; (ii) tourists are not a homogeneous group, but rather a complex, diverse, and dynamic body of stakeholders; and (iii) the focus of disaster management planning should shift from a single rationale to a polyrational methodology. Disaster managers need to consider, therefore, these different aspects in the context of preparedness. © 2018 The Author(s). Disasters © Overseas Development Institute, 2018.

  9. A secure and efficiently searchable health information architecture.

    PubMed

    Yasnoff, William A

    2016-06-01

    Patient-centric repositories of health records are an important component of health information infrastructure. However, patient information in a single repository is potentially vulnerable to loss of the entire dataset from a single unauthorized intrusion. A new health record storage architecture, the personal grid, eliminates this risk by separately storing and encrypting each person's record. The tradeoff for this improved security is that a personal grid repository must be sequentially searched since each record must be individually accessed and decrypted. To allow reasonable search times for large numbers of records, parallel processing with hundreds (or even thousands) of on-demand virtual servers (now available in cloud computing environments) is used. Estimated search times for a 10 million record personal grid using 500 servers vary from 7 to 33min depending on the complexity of the query. Since extremely rapid searching is not a critical requirement of health information infrastructure, the personal grid may provide a practical and useful alternative architecture that eliminates the large-scale security vulnerabilities of traditional databases by sacrificing unnecessary searching speed. Copyright © 2016 Elsevier Inc. All rights reserved.

  10. A scoring mechanism for the rank aggregation of network robustness

    NASA Astrophysics Data System (ADS)

    Yazdani, Alireza; Dueñas-Osorio, Leonardo; Li, Qilin

    2013-10-01

    To date, a number of metrics have been proposed to quantify inherent robustness of network topology against failures. However, each single metric usually only offers a limited view of network vulnerability to different types of random failures and targeted attacks. When applied to certain network configurations, different metrics rank network topology robustness in different orders which is rather inconsistent, and no single metric fully characterizes network robustness against different modes of failure. To overcome such inconsistency, this work proposes a multi-metric approach as the basis of evaluating aggregate ranking of network topology robustness. This is based on simultaneous utilization of a minimal set of distinct robustness metrics that are standardized so to give way to a direct comparison of vulnerability across networks with different sizes and configurations, hence leading to an initial scoring of inherent topology robustness. Subsequently, based on the inputs of initial scoring a rank aggregation method is employed to allocate an overall ranking of robustness to each network topology. A discussion is presented in support of the presented multi-metric approach and its applications to more realistically assess and rank network topology robustness.

  11. The Gatsby Plant Science Summer School: inspiring the next generation of plant science researchers.

    PubMed

    Levesley, Aurora; Jopson, Juliet; Knight, Celia

    2012-04-01

    We provide evidence from a 5-year study to show that a single concerted effort at the start of undergraduate study can have a clear and lasting effect on the attitudes of students toward plant science. Attendance at a week-long residential plant science summer school in the first year of an undergraduate degree resulted in many students changing courses to include more plant science and increased numbers of graduates selecting plant-based PhDs. The evidence shows that the Gatsby Plant Science Summer School has increased the pool of high-quality plant science related PhD applicants in the UK and has had a positive impact on students' career aspirations. The results are discussed within the context of enhancing the pipeline of future plant scientists and reversing the decline of this vulnerable and strategically important subject relevant to addressing food security and other major global challenges. We have shown that a single well-designed and timely intervention can influence future student behavior and as such offers a framework of potential use to other vulnerable disciplines.

  12. A model for improving the health and quality of life of single mothers in the developing world.

    PubMed

    Mainthia, Rajshri; Reppart, Laura; Reppart, Jim; Pearce, Elizabeth C; Cohen, Jordan J; Netterville, James L

    2013-12-01

    Among the impoverished population of coastal Kenya, there is a rapidly growing group of young single mothers who suffer from adverse health outcomes, incomplete schooling, social ostracism by their communities, and economic hardship. To address this problem, in 2008 the Single Mothers Program (SMP) selected a group of vulnerable single mothers, provided them with basic relief and education, equipped them with training and start-up capital to run their own businesses, and assessed the impact of the program via a pre- and post-implementation survey. After two years in the program, a majority of the single mothers increased their contraceptive use, increased their degree of literacy, increased their individual incomes, and were more positively perceived by their communities. This study demonstrates a program model that can be used to improve the health and quality of life of single mothers and their children in similar communities throughout the world.

  13. Improving xylem hydraulic conductivity measurements by correcting the error caused by passive water uptake.

    PubMed

    Torres-Ruiz, José M; Sperry, John S; Fernández, José E

    2012-10-01

    Xylem hydraulic conductivity (K) is typically defined as K = F/(P/L), where F is the flow rate through a xylem segment associated with an applied pressure gradient (P/L) along the segment. This definition assumes a linear flow-pressure relationship with a flow intercept (F(0)) of zero. While linearity is typically the case, there is often a non-zero F(0) that persists in the absence of leaks or evaporation and is caused by passive uptake of water by the sample. In this study, we determined the consequences of failing to account for non-zero F(0) for both K measurements and the use of K to estimate the vulnerability to xylem cavitation. We generated vulnerability curves for olive root samples (Olea europaea) by the centrifuge technique, measuring a maximally accurate reference K(ref) as the slope of a four-point F vs P/L relationship. The K(ref) was compared with three more rapid ways of estimating K. When F(0) was assumed to be zero, K was significantly under-estimated (average of -81.4 ± 4.7%), especially when K(ref) was low. Vulnerability curves derived from these under-estimated K values overestimated the vulnerability to cavitation. When non-zero F(0) was taken into account, whether it was measured or estimated, more accurate K values (relative to K(ref)) were obtained, and vulnerability curves indicated greater resistance to cavitation. We recommend accounting for non-zero F(0) for obtaining accurate estimates of K and cavitation resistance in hydraulic studies. Copyright © Physiologia Plantarum 2012.

  14. Vulnerability and fragility risk indices for non-renewable resources.

    PubMed

    Miller, Anne E; Steele, Nicholas; Tobin, Benjamin W

    2018-06-02

    Protected areas are tasked with mitigating impacts to a wide range of invaluable resources. These resources are often subject to a variety of potential natural and anthropogenic impacts that require monitoring efforts and management actions to minimize the degradation of these resources. However, due to insufficient funding and staff, managers often have to prioritize efforts, leaving some resources at higher risk to impact. Attempts to address this issue have resulted in numerous qualitative and semi-quantitative frameworks for prioritization based on resource vulnerability. Here, we add to those methods by modifying an internationally standardized vulnerability framework, quantify both resource vulnerability, susceptibility to human disturbance, and fragility, susceptibility to natural disturbance. This modified framework quantifies impacts through a six-step process: identifying the resource and management objectives, identifying exposure and sensitivity indicators, define scoring criteria for each indicator, collect and compile data, calculate indices, and prioritize sites for mitigations. We applied this methodology to two resource types in Grand Canyon National Park (GRCA): caves and fossil sites. Three hundred sixty-five cave sites and 127 fossil sites in GRCA were used for this analysis. The majority of cave and fossil sites scored moderate to low vulnerability (0-6 out of 10 points) and moderate to low fragility for fossils. The percentage of sites that fell in the high-priority range was 5.5% for fossils and 21.9% for caves. These results are consistent with the known state of these resources and the results present a tool for managers to utilize to prioritize monitoring and management needs.

  15. Sexual Violence on Campus: Differences Across Gender and Sexual Minority Status.

    PubMed

    Martin-Storey, Alexa; Paquette, Geneviève; Bergeron, Manon; Dion, Jacinthe; Daigneault, Isabelle; Hébert, Martine; Ricci, Sandrine

    2018-06-01

    Sexual violence is a pervasive problem on university campuses. Although previous work has documented greater vulnerability for sexual violence among sexual and gender minority students, little is known about contextual variation in vulnerability to this kind of violence. The goals of the current study were (1) to identify vulnerability among sexual and gender minority students with regard to sexual violence, and (2) to explore if the context of this violence differs across sexual and gender minority status. Undergraduate students (ages 18-24) from six francophone universities in Quebec, Canada (N = 4,264) completed online questionnaires regarding their experience of sexual violence, as well as the context of these acts (e.g., the gender of the perpetrator, the status of the perpetrator, and the location of the violence). They also provided information regarding their sexual and gender minority status. Binary logistic regressions were conducted to assess for variation in experiencing sexual violence across sexual and gender minority status. Transgender/nonbinary students generally reported higher levels of sexual violence than their cisgender peers, while variation occurred with regard to vulnerability across sexual identity subgroups. Few differences in context were observed across sexual minority identity. Transgender/nonbinary students were significantly more likely to report sexual violence in athletic contexts and during volunteering activities compared to their cisgender peers. Findings highlight the higher levels of vulnerability for sexual violence among gender minority and some sexual minority university students. They also point to the contexts in which such violence occurs, suggesting specific strategies for prevention. Copyright © 2018 The Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  16. Vulnerability assessment and application of bacterial technology on urban rivers for pollution eradication.

    PubMed

    Hashim, Sarfraz; Yuebo, Xie; Ahmad, Fiaz; Arslan, Chaudhry; Saifullah, Muhammad

    2015-01-01

    To protect against the environmental pollution, the present research was undertaken to enumerate the Bacterial Technologies (BTs) on the restoration of polluted urban rivers, that is, Fenghu-Song Yang River (FSR) and Xuxi River (XXR). Experimental research accounted for the physiochemical parameters (pH; temperature; dissolved oxygen (DO); chemical oxygen demand (COD); total phosphorus (TP); total nitrogen (TN); and ammonia nitrogen (NH3N)) before and after the BT operation. The results declared that the BT is efficient to restore the polluted rivers up to reliable condition. These results were analyzed by using multivariate statistical techniques (principal component analysis (PCA) and cluster analysis (CA)). These techniques interpreted the complex data sets and expressed the point source information about the water quality of these rivers at SA5, SA6, and SB3 under highly polluted regions. For better understanding, water quality index (WQI) was applied to compute the single numeric value. WQI results are evidence of the above results which prove the water quality of both rivers faced under outrageous condition (below 50 WQI scores) before the BT treatment, but, after the treatment, the rivers were restored from fair to good level (above 50 WQI scores) and overall output of these scores was quite similar to detect the point source of pollution. These results described an abrupt recovery of the urban rivers up to reliable condition for aquatic organism and clear effluents from the rivers.

  17. Sexual hazards, life experiences and social circumstances among male sex workers in Nigeria.

    PubMed

    Okanlawon, Kehinde; Adebowale, Ayo Stephen; Titilayo, Ayotunde

    2013-01-01

    The sexual health and rights needs of male sex workers in Nigeria remain poorly understood and served. Men who sell sex are at high risk of discrimination and violation because of laws criminalising same-sex activity and sex work. This paper examines the experiences, social circumstances, vulnerabilities and sexual hazards experienced by male sex workers in Nigeria. In-depth interviews were used to explore the experiences of six male sex workers who were selected by means of convenience sampling from among those who came for counselling. Findings reveal that economic disadvantage drives some men to engage in sex work and risky sexual behaviour. Subsequently, sex work may put their lives and health at risk as a result of violation by the police and clients, including ritual murder. Men's extreme vulnerability points to the need for appropriate interventions to improve well-being. Sexual health and rights programmes must identify ways of making male sex workers less vulnerable to abuse, and devise strategies for protecting their health and human rights, while empowering them economically to reduce their dependency on often risky sexual behaviour for livelihoods.

  18. Examining the association between motivations for induced abortion and method safety among women in Ghana.

    PubMed

    Biney, Adriana A E; Atiglo, D Yaw

    2017-10-01

    This article draws on data from 552 women interviewed in the 2007 Ghana Maternal Health Survey to examine the association between motivations for women's pregnancy terminations and the safety of methods used. Women's reasons for induced abortions represented their vulnerability types at the critical time of decision making. Different motivations can result in taking various forms of action with the most vulnerable potentially resorting to the most harmful behaviors. Analysis of survey data pointed to spacing/delaying births as the main reason for abortion. Furthermore, women were more likely to terminate pregnancies unsafely if their main motivation for abortion was financial constraints. Especially among rural women, abortions for any reason were more likely associated with safe methods than if for financial reasons. These findings suggest a theme of vulnerability, resulting from poverty, as the motivations for women to resort to harmful abortion methods. Therefore, interventions formulated to reduce instances of unsafe pregnancy terminations should target reducing poverty and capacity building with the aim of economic advancement, in addition to curbing the root of the problem: unintended pregnancy.

  19. Labor migration, externalities and ethics: theorizing the meso-level determinants of HIV vulnerability.

    PubMed

    Hirsch, Jennifer S

    2014-01-01

    This paper discusses labor migration as an example of how focusing on the meso-level highlights the social processes through which structural factors produce HIV risk. Situating that argument in relation to existing work on economic organization and HIV risk as well as research on labor migration and HIV vulnerabilities, the paper demonstrates how analyzing the processes through which labor migration creates vulnerability can shift attention away from the proximate behavioral determinants of HIV risk and toward the community and policy levels. Further, it presents the concepts of externalities and the ethics of consumption, which underline how both producers and consumers benefit from low-waged migrant labor, and thus are responsible for the externalization of HIV risk characteristic of supply chains that rely on migrant labor. These concepts point to strategies through which researchers and advocates could press the public and private sectors to improve the conditions in which migrants live and work, with implications for HIV as well as other health outcomes. Copyright © 2013 Elsevier Ltd. All rights reserved.

  20. Psychological vulnerability, burnout, and coping among employees of a business process outsourcing organization

    PubMed Central

    Machado, Tanya; Sathyanarayanan, Vidya; Bhola, Poornima; Kamath, Kirthi

    2013-01-01

    Background: The business process outsourcing (BPO) sector is a contemporary work setting in India, with a large and relatively young workforce. There is concern that the demands of the work environment may contribute to stress levels and psychological vulnerability among employees as well as to high attrition levels. Materials and Methods: As part of a larger study, questionnaires were used to assess psychological distress, burnout, and coping strategies in a sample of 1,209 employees of a BPO organization. Results: The analysis indicated that 38% of the sample had significant psychological distress on the General Health Questionnaire (GHQ-28; Goldberg and Hillier, 1979). The vulnerable groups were women, permanent employees, data processors, and those employed for 6 months or longer. The reported levels of burnout were low and the employees reported a fairly large repertoire of coping behaviors. Conclusions: The study has implications for individual and systemic efforts at employee stress management and workplace prevention approaches. The results point to the emerging and growing role of mental health professionals in the corporate sector. PMID:24459370

  1. Research should not ignore the power of elite groups.

    PubMed

    Gregory, Robert J

    2002-02-01

    For a long time, public health research has focused on many and diverse types of vulnerable groups in society. Whether drug abusers, prison inmates, smokers, poverty-stricken, mentally ill, HIV positive, or any number of other ailments, the public health system and, in particular, researchers have addressed and reported on people and populations with so-called deficits. Research on these vulnerable groups has been designed, conducted, reported, discussed and analysed, but vulnerable groups continue and, in fact, appear to be increasing in number, size, and range. An alternative approach that begins with entirely different questions is possible and advisable. Public health research could, and in the author's point of view, should, examine the lifestyles and, specifically, decision-making by members of elite groups. Studying up the economic and political ladder calls for examination of how a few reap enormous benefits for themselves, leaving the rest of us to our misfortune. Such decisions as the elite groups make affects resource allocation, use of information, and results in the public health and other social, economic, military, and political sectors in society.

  2. 47 CFR 68.105 - Minimum point of entry (MPOE) and demarcation point.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... be either the closest practicable point to where the wiring crosses a property line or the closest practicable point to where the wiring enters a multiunit building or buildings. The reasonable and... situations. (c) Single unit installations. For single unit installations existing as of August 13, 1990, and...

  3. Explanation for excessive DNA single-strand breaks and endogenous repair foci in pluripotent mouse embryonic stem cells.

    PubMed

    Banáth, J P; Bañuelos, C A; Klokov, D; MacPhail, S M; Lansdorp, P M; Olive, P L

    2009-05-01

    Pluripotent mouse embryonic stem cells (mES cells) exhibit approximately 100 large gammaH2AX repair foci in the absence of measurable numbers of DNA double-strand breaks. Many of these cells also show excessive numbers of DNA single-strand breaks (>10,000 per cell) when analyzed using the alkaline comet assay. To understand the reasons for these unexpected observations, various methods for detecting DNA strand breaks were applied to wild-type mES cells and to mES cells lacking H2AX, ATM, or DNA-PKcs. H2AX phosphorylation and expression of other repair complexes were measured using flow and image analysis of antibody-stained cells. Results indicate that high numbers of endogenous gammaH2AX foci and single-strand breaks in pluripotent mES cells do not require ATM or DNA-PK kinase activity and appear to be associated with global chromatin decondensation rather than pre-existing DNA damage. This will limit applications of gammaH2AX foci analysis in mES cells to relatively high levels of initial or residual DNA damage. Excessive numbers of single-strand breaks in the alkaline comet assay can be explained by the vulnerability of replicating chromatin in mES cells to osmotic shock. This suggests that caution is needed in interpreting results with the alkaline comet assay when applied to certain cell types or after treatment with agents that make chromatin vulnerable to osmotic changes. Differentiation of mES cells caused a reduction in histone acetylation, gammaH2AX foci intensity, and DNA single-strand breakage, providing a link between chromatin structural organization, excessive gammaH2AX foci, and sensitivity of replicating mES cell chromatin to osmotic shock.

  4. Depressive-like behavioral profiles in captive-bred single- and socially-housed rhesus and cynomolgus macaques: a species comparison

    PubMed Central

    Camus, Sandrine M. J.; Rochais, Céline; Blois-Heulin, Catherine; Li, Qin; Hausberger, Martine; Bezard, Erwan

    2014-01-01

    Background: To unravel the causes of major depressive disorder (MDD), the third leading cause of disease burden around the world, ethological animal models have recently been proposed. Our previous studies highlighted a depressive-like profile among single- and socially-housed farm-bred cynomolgus macaques. Although phylogenetically close, cynomolgus and rhesus macaques, the two most commonly used macaque species in biomedical research, differ on several levels such as patterns of aggression, reconciliation, temperament, or dominance styles. The question of whether one captive macaque species was more vulnerable than another in the development of a pathological profile reminiscent of MDD symptoms was explored. Methods: Behavioral data (including body postures, orientations, gaze directions, inter-individual distances, and locations in the cage) were collected in farming conditions. Using an unbiased validated ethological scan-sampling method, followed by multiple correspondence and hierarchical clustering analyses, 40 single- and 35 socially-housed rhesus macaques were assessed. Independently, for each housing condition, inter-species comparisons were made with previously acquired data on farm-bred cynomolgus monkeys. Results: Consistent with our previous studies, we found depressive-like characteristics (e.g., inactivity, low level of investigation and maintenance, long time spent inactive while facing the wall) among single- and socially-housed rhesus macaques. Species-specificities were reported in non-depressive time budgets and in the prevalence of the pathological profiles. Conclusions: Our results suggest that rhesus may be more vulnerable to developing a despair-like state than cynomolgus macaques, both in single- and in social-housing conditions. Therefore, rhesus macaques are more suitable for use as a “spontaneous” model of depressive disorders. PMID:24600363

  5. Error-Based Design Space Windowing

    NASA Technical Reports Server (NTRS)

    Papila, Melih; Papila, Nilay U.; Shyy, Wei; Haftka, Raphael T.; Fitz-Coy, Norman

    2002-01-01

    Windowing of design space is considered in order to reduce the bias errors due to low-order polynomial response surfaces (RS). Standard design space windowing (DSW) uses a region of interest by setting a requirement on response level and checks it by a global RS predictions over the design space. This approach, however, is vulnerable since RS modeling errors may lead to the wrong region to zoom on. The approach is modified by introducing an eigenvalue error measure based on point-to-point mean squared error criterion. Two examples are presented to demonstrate the benefit of the error-based DSW.

  6. Indications of a positive feedback between coastal development and beach nourishment

    USGS Publications Warehouse

    Armstrong, Scott; Lazarus, Eli; Limber, Patrick W.; Goldstein, Evan; Thorpe, Curtis; Ballinger, Rhoda

    2016-01-01

    Beach nourishment, a method for mitigating coastal storm damage or chronic erosion by deliberately replacing sand on an eroded beach, has been the leading form of coastal protection in the U.S. for four decades. However, investment in hazard protection can have the unintended consequence of encouraging development in places especially vulnerable to damage. In a comprehensive, parcel-scale analysis of all shorefront single-family homes in the state of Florida, we find that houses in nourishing zones are significantly larger and more numerous than in non-nourishing zones. The predominance of larger homes in nourishing zones suggests a positive feedback between nourishment and development that is compounding coastal risk in zones already characterized by high vulnerability.

  7. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zimmerman, P.D.

    Intercontinental ballistic missiles based in silos have become relatively vulnerable, at least in theory, to counter-force attacks. This theoretical vulnerability may not, in fact, be a serious practical concern; it is nonetheless troubling both to policy-makers and to the public. Furthermore, the present generation of ICBMs is aging (the Minuteman II single warhead missile will exceed its operational life-span early in the next decade) and significant restructuring of the ballistic missile force may well be necessary if a Strategic Arms Reduction Treaty (START) is signed. This paper compares several proposed schemes for modernizing the ICBM force. Because the rail-garrison MIRVdmore » mobile system is the least costly alternative to secure a large number of strategic warheads, it receives a comparatively large amount of attention.« less

  8. Indications of a positive feedback between coastal development and beach nourishment

    NASA Astrophysics Data System (ADS)

    Armstrong, Scott B.; Lazarus, Eli D.; Limber, Patrick W.; Goldstein, Evan B.; Thorpe, Curtis; Ballinger, Rhoda C.

    2016-12-01

    Beach nourishment, a method for mitigating coastal storm damage or chronic erosion by deliberately replacing sand on an eroded beach, has been the leading form of coastal protection in the United States for four decades. However, investment in hazard protection can have the unintended consequence of encouraging development in places especially vulnerable to damage. In a comprehensive, parcel-scale analysis of all shorefront single-family homes in the state of Florida, we find that houses in nourishing zones are significantly larger and more numerous than in non-nourishing zones. The predominance of larger homes in nourishing zones suggests a positive feedback between nourishment and development that is compounding coastal risk in zones already characterized by high vulnerability.

  9. Fulfilling the Mission of Academic Medicine: Training Residents in the Health Needs of Prisoners

    PubMed Central

    Wakeman, Sarah E.

    2010-01-01

    The single mission of academic medicine is the pursuit of health for all. This mandate serves as a reminder to focus care on vulnerable and underserved populations. The 12 million Americans who cycle through correctional facilities each year are arguably among the most vulnerable populations in this country; predominantly black, with a high burden of disease and many barriers to care after release. Medical training programs should provide exposure to the health needs of prisoners. Residents could establish care with inmates prior to release and arrange follow-up in the community. This addition to training would not only provide care to this underserved group, but also would train residents in the myriad problems prisoners face, and foster social responsibility. PMID:20352517

  10. Extending key sharing: how to generate a key tightly coupled to a network security policy

    NASA Astrophysics Data System (ADS)

    Kazantzidis, Matheos

    2006-04-01

    Current state of the art security policy technologies, besides the small scale limitation and largely manual nature of accompanied management methods, are lacking a) in real-timeliness of policy implementation and b) vulnerabilities and inflexibility stemming from the centralized policy decision making; even if, for example, a policy description or access control database is distributed, the actual decision is often a centralized action and forms a system single point of failure. In this paper we are presenting a new fundamental concept that allows implement a security policy by a systematic and efficient key distribution procedure. Specifically, we extend the polynomial Shamir key splitting. According to this, a global key is split into n parts, any k of which can re-construct the original key. In this paper we present a method that instead of having "any k parts" be able to re-construct the original key, the latter can only be reconstructed if keys are combined as any access control policy describes. This leads into an easily deployable key generation procedure that results a single key per entity that "knows" its role in the specific access control policy from which it was derived. The system is considered efficient as it may be used to avoid expensive PKI operations or pairwise key distributions as well as provides superior security due to its distributed nature, the fact that the key is tightly coupled to the policy, and that policy change may be implemented easier and faster.

  11. Overview of environmental and hydrogeologic conditions at Moses Point, Alaska

    USGS Publications Warehouse

    Dorava, J.M.; Ayres, R.P.; Sisco, W.C.

    1994-01-01

    The Federal Aviation Administration facility at Moses Point is located at the mouth of the Kwiniuk River on the Seward Peninsula in northwestern Alaska. This area has long cold winters and short summers which affect the hydrology of the area. The Federal Aviation Administration owns or operates airport support facilities at the Moses Point site and wishes to consider the subsistence lifestyles of area residents and the quality of the current environment when evaluating options for remediation of environmental contamination at their facilities. Currently no operating wells are in the area, but the vulnerability of the aquifer and other alternative water supplies are being evaluated because the Federal Aviation Administration has a potential liability for the storage and use of hazardous materials in the area.

  12. The prevalence and marketing of electronic cigarettes in proximity to at-risk youths: An investigation of point-of-sale practices near alternative high schools.

    PubMed

    Miller, Stephen; Pike, James; Chapman, Jared; Xie, Bin; Hilton, Brian N; Ames, Susan L; Stacy, Alan W

    2017-01-01

    This study examines the point-of-sale marketing practices used to promote electronic cigarettes at stores near schools that serve at-risk youth. One hundred stores selling tobacco products within a half mile of alternative high schools in Southern California were assessed for this study. Seventy percent of stores in the sample sold electronic cigarettes. Convenience stores heavily frequented by youth had the highest number of interior ads for e-cigarettes and were the most likely to employ in-store product placement strategies. Increased exposure to the promotion of these products at the point-of-sale poses a challenge for anti-smoking efforts directed toward vulnerable populations.

  13. The prevalence and marketing of electronic cigarettes in proximity to at-risk youths: An investigation of point-of-sale practices near alternative high schools

    PubMed Central

    Miller, Stephen; Pike, James; Chapman, Jared; Xie, Bin; Hilton, Brian N.; Ames, Susan L.; Stacy, Alan W.

    2017-01-01

    This study examines the point-of-sale marketing practices used to promote electronic cigarettes at stores near schools that serve at-risk youth. One hundred stores selling tobacco products within a half mile of alternative high schools in Southern California were assessed for this study. Seventy percent of stores in the sample sold electronic cigarettes. Convenience stores heavily frequented by youth had the highest number of interior ads for e-cigarettes and were the most likely to employ in-store product placement strategies. Increased exposure to the promotion of these products at the point-of-sale poses a challenge for anti-smoking efforts directed toward vulnerable populations. PMID:28993719

  14. Advertising of tobacco products at point of sale: who are more exposed in Brazil?

    PubMed

    Ferreira-Gomes, Adriana Bacelar; Moura, Lenildo de; Araújo-Andrade, Silvânia Suely de; Lacerda-Mendes, Felipe; Perez, Cristina A; Abaakouk, Zohra

    2017-01-01

    To describe the adult population perception of cigarette advertising at point of sale, according their tobacco-use status and socio-demographic characteristics such as sex, age, race/color, region, household location and schooling. A multivariable analysis was carried out using data from the Global Adult Tobacco Survey in 2008 and the National Health Survey in 2013. Both surveys showed that among nonsmokers: women, young adults and those who had over 10 years of schooling had more frequently noticed advertising of cigarettes at point of sale. It was also observed that among the population with fewer years of schooling these proportions increased significantly. A measure that completely bans tobacco advertising would be more effective to protect the vulnerable groups from tobacco consumption.

  15. Predicting health care utilization in marginalized populations: Black, female, street-based sex workers.

    PubMed

    Varga, Leah M; Surratt, Hilary L

    2014-01-01

    Patterns of social and structural factors experienced by vulnerable populations may negatively affect willingness and ability to seek out health care services, and ultimately, their health. The outcome variable was utilization of health care services in the previous 12 months. Using Andersen's Behavioral Model for Vulnerable Populations, we examined self-reported data on utilization of health care services among a sample of 546 Black, street-based, female sex workers in Miami, Florida. To evaluate the impact of each domain of the model on predicting health care utilization, domains were included in the logistic regression analysis by blocks using the traditional variables first and then adding the vulnerable domain variables. The most consistent variables predicting health care utilization were having a regular source of care and self-rated health. The model that included only enabling variables was the most efficient model in predicting health care utilization. Any type of resource, link, or connection to or with an institution, or any consistent point of care, contributes significantly to health care utilization behaviors. A consistent and reliable source for health care may increase health care utilization and subsequently decrease health disparities among vulnerable and marginalized populations, as well as contribute to public health efforts that encourage preventive health. Copyright © 2014 Jacobs Institute of Women's Health. Published by Elsevier Inc. All rights reserved.

  16. Vulnerability of marginal seas to sea level rise

    NASA Astrophysics Data System (ADS)

    Gomis, Damia; Jordà, Gabriel

    2017-04-01

    Sea level rise (SLR) is a serious thread for coastal areas and has a potential negative impact on society and economy. SLR can lead for instance to land loss, beach reduction, increase of the damage of marine storms on coastal infrastructures and to the salinization of underground water streams. It is well acknowledged that future SLR will be inhomogeneous across the globe, with regional differences of up to 100% with respect to global mean sea level (GMSL). Several studies have addressed the projections of SLR at regional scale, but most of them are based on global climate models (GCMs) that have a relatively coarse spatial resolution (>1°). In marginal seas this has proven to be a strong limitation, as their particular configurations require spatial resolutions that are not reachable by present GCMs. A paradigmatic case is the Mediterranean Sea, connected to the global ocean through the Strait of Gibraltar, a narrow passage of 14 km width. The functioning of the Mediterranean Sea involves a variety of processes including an overturning circulation, small-scale convection and a rich mesoscale field. Moreover, the long-term evolution of Mediterranean sea level has been significantly different from the global mean during the last decades. The observations of present climate and the projections for the next decades have lead some authors to hypothesize that the particular characteristics of the basin could allow Mediterranean mean sea level to evolve differently from the global mean. Assessing this point is essential to undertake proper adaptation strategies for the largely populated Mediterranean coastal areas. In this work we apply a new approach that combines regional and global projections to analyse future SLR. In a first step we focus on the quantification of the expected departures of future Mediterranean sea level from GMSL evolution and on the contribution of different processes to these departures. As a result we find that, in spite of its particularities, Mediterranean Sea level would follow global changes with departures lower than + 5 cm. In a second step we use the same methodology to obtain SLR projections at global scale in order to assess the vulnerability of other coastal areas. Namely, we define a vulnerability index based on relating the characteristics of present day variability with SLR projections under different scenarios. Results show that the averaged vulnerability index is 0.5 for scenario RCP8.5 (projected SLR is about a half of the maximum sea level recorded in the last decades). However, in the Mediterranean, the Caribbean and the Sea of Japan the vulnerability index is much higher (2.6, 2.4 and 2.1, respectively). From this point of view, therefore, these regions could be considered the most vulnerable regions in the world.

  17. Rethinking the Role of Research: New Issues and Lingering Doubts in an Era of Expanding Preschool Education.

    ERIC Educational Resources Information Center

    Zimiles, Herbert

    1986-01-01

    Changing ideas about the role of early education increasingly point toward universal preschool education for all children. Examines issues concerning the long-term effects of preschool experiences and suggests that the value of early education will vary as a function of a matrix of factors including program quality, the vulnerability of individual…

  18. Improving the Success of First Term General Chemistry Students at a Liberal Arts Institution

    ERIC Educational Resources Information Center

    Stone, Kari L.; Shaner, Sarah E.; Fendrick, Carol M.

    2018-01-01

    General Chemistry is a high impact course at Benedictine University where a large enrollment of ~250 students each year, coupled with low pass rates of a particularly vulnerable student population from a retention point of view (i.e., first-year college students), make it a strategic course on which to focus innovative pedagogical development.…

  19. Social and Environmental Factors and Their Influence on Drug Use Vulnerability and Resiliency in Rural Populations

    ERIC Educational Resources Information Center

    Dew, Brian; Elifson, Kirk; Dozier, Michael

    2007-01-01

    Findings from recent epidemiological investigations indicate that substance use in rural America has increased to the point where it nearly equals, if not exceeds, the rates found in suburban and urban areas. Although previous research has examined factors that have influenced use patterns, little attention has been devoted to the social and…

  20. How Will We Crack the Ice and Smack the Chronic, Sugar and Coke? The Control of Illicit Drugs in Canada. The Front Line.

    ERIC Educational Resources Information Center

    Kilgour, David

    1997-01-01

    Maintains that Canada's expansive geography, endless, uninhabited coastlines, and long border make it vulnerable as an entry point for illegal drugs. Briefly reviews recent revelations regarding increased drug use and money laundering. Recommends stiffening current drug laws and increasing spending for education and rehabilitation. (MJP)

  1. Life Events, Public Policy and the Economic Vulnerability of Children and the Elderly.

    ERIC Educational Resources Information Center

    Burkhauser, Richard V.; Duncan, Greg J.

    This report uses longitudinal data to provide a dynamic picture of the family income experiences of children and the elderly. In contrast to the image of fairly stable incomes during most life-cycle stages, findings show substantial income volatility at all points in the life span, placing substantial numbers of the population at risk of suffering…

  2. Intensively exploited Mediterranean aquifers: resilience and proximity to critical points of seawater intrusion

    NASA Astrophysics Data System (ADS)

    Mazi, K.; Koussis, A. D.; Destouni, G.

    2013-11-01

    We investigate here seawater intrusion in three prominent Mediterranean aquifers that are subject to intensive exploitation and modified hydrologic regimes by human activities: the Nile Delta Aquifer, the Israel Coastal Aquifer and the Cyprus Akrotiri Aquifer. Using a generalized analytical sharp-interface model, we review the salinization history and current status of these aquifers, and quantify their resilience/vulnerability to current and future sea intrusion forcings. We identify two different critical limits of sea intrusion under groundwater exploitation and/or climatic stress: a limit of well intrusion, at which intruded seawater reaches key locations of groundwater pumping, and a tipping point of complete sea intrusion upto the prevailing groundwater divide of a coastal aquifer. Either limit can be reached, and ultimately crossed, under intensive aquifer exploitation and/or climate-driven change. We show that sea intrusion vulnerability for different aquifer cases can be directly compared in terms of normalized intrusion performance curves. The site-specific assessments show that the advance of seawater currently seriously threatens the Nile Delta Aquifer and the Israel Coastal Aquifer. The Cyprus Akrotiri Aquifer is currently somewhat less threatened by increased seawater intrusion.

  3. Resilience and vulnerability to a natural hazard: A mathematical framework based on viability theory

    NASA Astrophysics Data System (ADS)

    Rougé, Charles; Mathias, Jean-Denis; Deffuant, Guillaume

    2013-04-01

    This deals with the response of a coupled human and natural system (CHANS) to a natural hazard by using the concepts of resilience and vulnerability within the mathematical framework of viability theory. This theory applies to time-evolving systems such as CHANS and assumes that their desirable properties can be defined as a subset of their state space. Policies can also apply to influence the dynamics of such systems: viability theory aims at finding the policies which keep the properties of a controlled dynamical system for so long as no disturbance hits it. The states of the system such that the properties are guaranteed constitute what is called the viability kernel. This viability framework has been extended to describe the response to a perturbation such as a natural hazard. Resilience describes the capacity of the CHANS to recover by getting back in the viability kernel, where its properties are guaranteed until the onset of the next major event. Defined for a given controlled trajectory that the system may take after the event ends, resilience is (a) whether the system comes back to the viability kernel within a given budget such as a time constraint, but also (b) a decreasing function of vulnerability. Computed for a given trajectory as well, vulnerability is a measure of the consequence of violating a property. We propose a family of functions from which cost functions and other vulnerability indicators can be derived for a certain trajectory. There can be several vulnerability functions, representing for instance social, economic or ecological vulnerability, and each representing the violation of an associated property, but these functions need to be ultimately aggregated as a single indicator. Computing the resilience and vulnerability of a trajectory enables the viability framework to describe the response of both deterministic and stochastic systems to hazards. In the deterministic case, there is only one response trajectory for a given action policy, and methods exist to find the actions which yield the most resilient trajectory, namely the least vulnerable trajectory for which recovery is complete. In the stochastic case however, there is a range of possible trajectories. Statistics can be derived from the probability distribution of the resilience and vulnerability of the trajectories. Dynamic programming methods can then yield either the policies that maximize the probability of being resilient by achieving recovery within a given time horizon, or these which minimize a given vulnerability statistic. These objectives are different and can be in contradiction, so that trade-offs may have to be considered between them. The approach is illustrated in both the deterministic and stochastic cases through a simple model of lake eutrophication, for which the desirable ecological properties of the lake conflict with the economic interest of neighboring farmers.

  4. A Bottom-up Vulnerability Analysis of Water Systems with Decentralized Decision Making and Demographic Shifts- the Case of Jordan.

    NASA Astrophysics Data System (ADS)

    Lachaut, T.; Yoon, J.; Klassert, C. J. A.; Talozi, S.; Mustafa, D.; Knox, S.; Selby, P. D.; Haddad, Y.; Gorelick, S.; Tilmant, A.

    2016-12-01

    Probabilistic approaches to uncertainty in water systems management can face challenges of several types: non stationary climate, sudden shocks such as conflict-driven migrations, or the internal complexity and dynamics of large systems. There has been a rising trend in the development of bottom-up methods that place focus on the decision side instead of probability distributions and climate scenarios. These approaches are based on defining acceptability thresholds for the decision makers and considering the entire range of possibilities over which such thresholds are crossed. We aim at improving the knowledge on the applicability and relevance of this approach by enlarging its scope beyond climate uncertainty and single decision makers; thus including demographic shifts, internal system dynamics, and multiple stakeholders at different scales. This vulnerability analysis is part of the Jordan Water Project and makes use of an ambitious multi-agent model developed by its teams with the extensive cooperation of the Ministry of Water and Irrigation of Jordan. The case of Jordan is a relevant example for migration spikes, rapid social changes, resource depletion and climate change impacts. The multi-agent modeling framework used provides a consistent structure to assess the vulnerability of complex water resources systems with distributed acceptability thresholds and stakeholder interaction. A proof of concept and preliminary results are presented for a non-probabilistic vulnerability analysis that involves different types of stakeholders, uncertainties other than climatic and the integration of threshold-based indicators. For each stakeholder (agent) a vulnerability matrix is constructed over a multi-dimensional domain, which includes various hydrologic and/or demographic variables.

  5. Removing the Australian tax exemption on healthy food adds food stress to families vulnerable to poor nutrition.

    PubMed

    Landrigan, Timothy J; Kerr, Deborah A; Dhaliwal, Satvinder S; Savage, Victoria; Pollard, Christina M

    2017-12-01

    To assess the impact of changing the Australian Goods and Services Tax (GST) on household food stress, which occurs when >25% of disposable income needs to be spent on food. Weekly healthy meal plan costs for average-income (AI), low-income (LI) and welfare-dependent (WDI) families were calculated using the 2013 Western Australian (WA) Food Access and Costs Survey. Four GST scenarios were compared: 1) status quo; 2) increasing GST to 15%; 3) expanding base to include exempt foods at 10% GST; and 4) expanding base to include exempt foods and increasing the tax to 15%. Single-parent families risk food stress regardless of their income or the GST scenario (requiring 24-42% of disposable income). The probability of food stress in Scenario 1 is 100% for WDI two-parent families and 36% for LI earners. In Scenarios 3 and 4, food stress probability is 60-72% for two-parent LI families and AI single-parent families, increasing to 88-94% if residing in very remote areas. There is food stress risk among single-parent, LI and WDI families, particularly those residing in very remote areas. Implications for public health: Expanding GST places an additional burden on people who are already vulnerable to poor nutrition and chronic disease due to their socioeconomic circumstances. © 2017 The Authors.

  6. X-Linked Intellectual Disability: Unique Vulnerability of the Male Genome

    ERIC Educational Resources Information Center

    Stevenson, Roger E.; Schwartz, Charles E.

    2009-01-01

    X-linked intellectual disability (XLID) accounts for approximately 16% of males with intellectual disability (ID). This is, in part, related to the fact that males have a single X chromosome. Progress in the clinical and molecular characterization of XLID has outpaced progress in the delineation of ID due to genes on the other 22 chromosomes.…

  7. Education in Sustainable Development: How Can Science Education Contribute to the Vulnerability Perception?

    ERIC Educational Resources Information Center

    Lange, J. M.

    2012-01-01

    Education for human development within the constraints of sustainability is problematic for schools. On one hand, it is a political idea that continues to evolve with successive compromises between social groups with differing or even conflicting interests. ESD is therefore inherently "non-disciplinary" and cannot be the basis of a single school…

  8. 75 FR 62841 - Award of a Single-Source Grant to Chapin Hall at the University of Chicago, Chicago, IL

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-13

    ... the child-only Temporary Assistance for Needy Families (TANF) client population. Chapin Hall's... and more detailed picture of the TANF child-only caseload, including the dynamics of client entry and..., to gather policy information about a vulnerable and important ACF client group. OPRE will administer...

  9. Real Estate Market Trends and the Displacement of the Aged: Examination of the Linkages in Manhattan.

    ERIC Educational Resources Information Center

    Singelakis, Andrew Thomas

    1990-01-01

    Analyzed real estate market trends of low-income area of Manhattan which revealed increases in residential property values. Results revealed a depletion of over one-half of the single-room-occupancy stock. A survey of seniors (n=115) indicated a population at risk of displacement and vulnerable to homelessness. (Author/ABL)

  10. What Do We Mean by "School Entry Age"? Conceptual Ambiguity and Its Implications: The Example of Indonesia

    ERIC Educational Resources Information Center

    Barakat, Bilal; Bengtsson, Stephanie

    2018-01-01

    The age pattern of school entry reflects a complex social and empirical reality that is inadequately captured by a single number. Recognising these complexities in national and international research and policy discourse raises important but neglected questions around the identification of vulnerable groups, the relative value of pre-primary and…

  11. Software Epistemology

    DTIC Science & Technology

    2016-03-01

    in-vitro decision to incubate a startup, Lexumo [7], which is developing a commercial Software as a Service ( SaaS ) vulnerability assessment...LTS Label Transition System MUSE Mining and Understanding Software Enclaves RTEMS Real-Time Executive for Multi-processor Systems SaaS Software ...as a Service SSA Static Single Assignment SWE Software Epistemology UD/DU Def-Use/Use-Def Chains (Dataflow Graph)

  12. Deconstructing vulnerability for psychosis: Meta-analysis of environmental risk factors for psychosis in subjects at ultra high-risk.

    PubMed

    Fusar-Poli, P; Tantardini, M; De Simone, S; Ramella-Cravaro, V; Oliver, D; Kingdon, J; Kotlicka-Antczak, M; Valmaggia, L; Lee, J; Millan, M J; Galderisi, S; Balottin, U; Ricca, V; McGuire, P

    2017-02-01

    Subjects at ultra high-risk (UHR) for psychosis have an enhanced vulnerability to develop the disorder but the risk factors accounting for this accrued risk are undetermined. Systematic review of associations between genetic or environmental risk factors for psychosis that are widely established in the literature and UHR state, based on comparisons to controls. Forty-four studies encompassing 170 independent datasets and 54 risk factors were included. There were no studies on association between genetic or epigenetic risk factors and the UHR state that met the inclusion criteria. UHR subjects were more likely to show obstetric complications, tobacco use, physical inactivity, childhood trauma/emotional abuse/physical neglect, high perceived stress, childhood and adolescent low functioning, affective comorbidities, male gender, single status, unemployment and low educational level as compared to controls. The increased vulnerability of UHR subjects can be related to environmental risk factors like childhood trauma, adverse life events and affective dysfunction. The role of genetic and epigenetic risk factors awaits clarification. Copyright © 2016 The Authors. Published by Elsevier Masson SAS.. All rights reserved.

  13. Vulnerability of Xylem Vessels to Cavitation in Sugar Maple. Scaling from Individual Vessels to Whole Branches1

    PubMed Central

    Melcher, Peter J.; Zwieniecki, Maciej A.; Holbrook, N. Michele

    2003-01-01

    The relation between xylem vessel age and vulnerability to cavitation of sugar maple (Acer saccharum Marsh.) was quantified by measuring the pressure required to force air across bordered pit membranes separating individual xylem vessels. We found that the bordered pit membranes of vessels located in current year xylem could withstand greater applied gas pressures (3.8 MPa) compared with bordered pit membranes in vessels located in older annular rings (2.0 MPa). A longitudinal transect along 6-year-old branches indicated that the pressure required to push gas across bordered pit membranes of current year xylem did not vary with distance from the growing tip. To understand the contribution of age-related changes in vulnerability to the overall resistance to cavitation, we combined data on the pressure thresholds of individual xylem vessels with measurements of the relative flow rate through each annual ring. The annual ring of the current year contributed only 16% of the total flow measured on 10-cm-long segments cut from 6-year-old branches, but it contributed more than 70% of the total flow when measured through 6-year-old branches to the point of leaf attachment. The vulnerability curve calculated using relative flow rates measured on branch segments were similar to vulnerability curves measured on 6-year-old branches (pressure that reduces hydraulic conductance by 50% = 1.6–2.4 MPa), whereas the vulnerability curve calculated using relative flow rates measured on 6-year-old branches were similar to ones measured on the extension growth of the current year (pressure that reduces hydraulic conductance by 50% = 3.8 MPa). These data suggest that, in sugar maple, the xylem of the current year can withstand larger xylem tensions than older wood and dominates water delivery to leaves. PMID:12692336

  14. SU-G-BRB-16: Vulnerabilities in the Gamma Metric

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Neal, B; Siebers, J

    Purpose: To explore vulnerabilities in the gamma index metric that undermine its wide use as a radiation therapy quality assurance tool. Methods: 2D test field pairs (images) are created specifically to achieve high gamma passing rates, but to also include gross errors by exploiting the distance-to-agreement and percent-passing components of the metric. The first set has no requirement of clinical practicality, but is intended to expose vulnerabilities. The second set exposes clinically realistic vulnerabilities. To circumvent limitations inherent to user-specific tuning of prediction algorithms to match measurements, digital test cases are manually constructed, thereby mimicking high-quality image prediction. Results: Withmore » a 3 mm distance-to-agreement metric, changing field size by ±6 mm results in a gamma passing rate over 99%. For a uniform field, a lattice of passing points spaced 5 mm apart results in a passing rate of 100%. Exploiting the percent-passing component, a 10×10 cm{sup 2} field can have a 95% passing rate when an 8 cm{sup 2}=2.8×2.8 cm{sup 2} highly out-of-tolerance (e.g. zero dose) square is missing from the comparison image. For clinically realistic vulnerabilities, an arc plan for which a 2D image is created can have a >95% passing rate solely due to agreement in the lateral spillage, with the failing 5% in the critical target region. A field with an integrated boost (e.g whole brain plus small metastases) could neglect the metastases entirely, yet still pass with a 95% threshold. All the failure modes described would be visually apparent on a gamma-map image. Conclusion: The %gamma<1 metric has significant vulnerabilities. High passing rates can obscure critical faults in hypothetical and delivered radiation doses. Great caution should be used with gamma as a QA metric; users should inspect the gamma-map. Visual analysis of gamma-maps may be impractical for cine acquisition.« less

  15. A test of the hydraulic vulnerability segmentation hypothesis in angiosperm and conifer tree species

    DOE PAGES

    Johnson, Daniel M.; Wortemann, Remi; McCulloh, Katherine A.; ...

    2016-05-04

    Water transport from soils to the atmosphere is critical for plant growth and survival. However, we have a limited understanding about many portions of the whole-tree hydraulic pathway, because the vast majority of published information is on terminal branches. Our understanding of mature tree trunk hydraulic physiology, in particular, is limited. The hydraulic vulnerability segmentation hypothesis (HVSH) stipulates that distal portions of the plant (leaves, branches and roots) should be more vulnerable to embolism than trunks, which are non-redundant organs that require a massive carbon investment. In the current study, we compared vulnerability to loss of hydraulic function, leaf andmore » xylem water potentials and the resulting hydraulic safety margins (in relation to the water potential causing 50% loss of hydraulic conductivity) in leaves, branches, trunks and roots of four angiosperms and four conifer tree species. Across all species, our results supported strongly the HVSH as leaves and roots were less resistant to embolism than branches or trunks. However, branches were consistently more resistant to embolism than any other portion of the plant, including trunks. Also, calculated whole-tree vulnerability to hydraulic dysfunction was much greater than vulnerability in branches. This was due to hydraulic dysfunction in roots and leaves at less negative water potentials than those causing branch or trunk dysfunction. Leaves and roots had narrow or negative hydraulic safety margins, but trunks and branches maintained positive safety margins. By using branch-based hydraulic information as a proxy for entire plants, much research has potentially overestimated embolism resistance, and possibly drought tolerance, for many species. This study highlights the necessity to reconsider past conclusions made about plant resistance to drought based on branch xylem only. As a result, this study also highlights the necessity for more research of whole-plant hydraulic physiology to better understand strategies of plant drought tolerance and the critical control points within the hydraulic pathway.« less

  16. A test of the hydraulic vulnerability segmentation hypothesis in angiosperm and conifer tree species

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Johnson, Daniel M.; Wortemann, Remi; McCulloh, Katherine A.

    Water transport from soils to the atmosphere is critical for plant growth and survival. However, we have a limited understanding about many portions of the whole-tree hydraulic pathway, because the vast majority of published information is on terminal branches. Our understanding of mature tree trunk hydraulic physiology, in particular, is limited. The hydraulic vulnerability segmentation hypothesis (HVSH) stipulates that distal portions of the plant (leaves, branches and roots) should be more vulnerable to embolism than trunks, which are non-redundant organs that require a massive carbon investment. In the current study, we compared vulnerability to loss of hydraulic function, leaf andmore » xylem water potentials and the resulting hydraulic safety margins (in relation to the water potential causing 50% loss of hydraulic conductivity) in leaves, branches, trunks and roots of four angiosperms and four conifer tree species. Across all species, our results supported strongly the HVSH as leaves and roots were less resistant to embolism than branches or trunks. However, branches were consistently more resistant to embolism than any other portion of the plant, including trunks. Also, calculated whole-tree vulnerability to hydraulic dysfunction was much greater than vulnerability in branches. This was due to hydraulic dysfunction in roots and leaves at less negative water potentials than those causing branch or trunk dysfunction. Leaves and roots had narrow or negative hydraulic safety margins, but trunks and branches maintained positive safety margins. By using branch-based hydraulic information as a proxy for entire plants, much research has potentially overestimated embolism resistance, and possibly drought tolerance, for many species. This study highlights the necessity to reconsider past conclusions made about plant resistance to drought based on branch xylem only. As a result, this study also highlights the necessity for more research of whole-plant hydraulic physiology to better understand strategies of plant drought tolerance and the critical control points within the hydraulic pathway.« less

  17. Vulnerability Risk Index Profile for Elder Abuse in Community-Dwelling Population

    PubMed Central

    Dong, XinQi; Simon, Melissa A.

    2013-01-01

    Objectives Elder abuse is associated with increased morbidity and mortality. This study aims to develop a vulnerability index for elder abuse in a community-dwelling population. Design Population-based study Setting Geographically defined community in Chicago. Participants A population-based study was conducted in Chicago of community-dwelling older adults who participated in the Chicago Health and Aging Project (CHAP). Of the 8,157 participants in the CHAP study, 213 participants were reported to social services agency for suspected elder abuse. Measurements A vulnerability index for elder abuse was constructed from sociodemographic, health-related, and psychosocial factors. The outcomes of interest were reported and confirmed elder abuse. Logistic regression models were used to determine the accuracy of the index with respect to elder abuse outcomes. Results Out of the selected risk index for elder abuse, every one point increase in the 9 item vulnerability index items, there was a two fold increase in the risk for reported elder abuse (OR, 2.19 (2.00–2.40) and confirmed elder abuse (OR, 2.19 (1.94–2.47). Compared to the reference group, older adults with 3–4 vulnerability index items had increased risk for reported elder abuse (OR, 2.98 (1.98–4.49) and confirmed elder abuse (OR, 3.90, (2.07–7.36); and older adults with 5 or more risk index items, there was an 18 fold increase in risk for reported elder abuse (OR, 18.46 (12.15–28.04) and confirmed elder abuse (OR, 26.79 (14.18–50.61). Receiver Operating Characteristic (ROC) statistically derived curves for identifying reported elder abuse ranged between 0.77–0.84 and for predicting confirmed elder abuse ranged between 0.79–0.86. Conclusion The vulnerability risk index demonstrates value for identifying individuals at risk for elder abuse. Additional studies are needed to validate this index in other community dwelling populations. PMID:25180376

  18. Effect of Chlorine Substitution on Sulfide Reactivity with OH Radicals

    DTIC Science & Technology

    2008-09-01

    Single point energy: MP2/6-311+G(3df,2p) (LRG) • Zero Point Energy from a vibrational frequency analysis: MP2/6-31++G** ( ZPE ) • Extrapolated energy...E(QCI) + E(LARG) – E(SML) + ZPE • Characterize the TS • Use a three-point fit methodology – fit a harmonic potential to three CCSD single point

  19. 49 CFR 172.315 - Packages containing limited quantities.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... applicable, for the entry as shown in the § 172.101 Table, and placed within a square-on-point border in... to the package as to be readily visible. The width of line forming the square-on-point must be at... square-on-points bearing a single ID number, or a single square-on-point large enough to include each...

  20. Caregiver's depressive symptoms and asthma control in children from an underserved community.

    PubMed

    Rioseco, Andrea; Serrano, Carolina; Celedón, Juan C; Padilla, Oslando; Puschel, Klaus; Castro-Rodriguez, Jose A

    2017-12-01

    Caregiver's or maternal depression has been associated with increased asthma morbidity in children from prosperous nations, but little is known about this link in low and middle-income countries. To examine if caregiver's depressive symptoms are associated with poor asthma control and abnormal immune responses in school-aged children. Case-control study of 87 asthmatic children (aged 4-11 years) attending a primary care clinic in an underserved area of Santiago (Chile). Cases were children with poor asthma control (Child Asthma Control Test [cACT] <20 points) and controls were children with adequate asthma control (cACT ≥20 points). The Beck Depression Inventory-II (BDI) and a locally validated family health vulnerability test (SALUFAM) were used to assess caregivers' depression and family health vulnerability. Serum from participating children was assayed for IFN-γ, IL-4, IL-13, TGF-β, cortisol, and total IgE. The mean (SD) age of study participants was 8.23 (2.15 years), and 55.2% were females. Use of inhaled corticosteroids (ICS), family health vulnerability, and caregiver's depressive symptoms were significantly more common in cases than in controls (65.4% vs. 34.6%, p = 0.003; 41.3% vs. 24.8%, p = 0.07; and 39.1% vs. 19.5%, p = 0.04, respectively). There was no significant difference in the level of any serum biomarkers between groups. In a multivariate analysis, only ICS use was significantly associated with better asthma control (OR = 3.56 [1.34-9.48], p = 0.01). Presence of caregiver's depressive symptoms is associated with poor asthma control among children from an underserved community, but this association was no longer significant after accounting for ICS use.

  1. The linear relationship between the Vulnerable Elders Survey-13 score and mortality in an Asian population of community-dwelling older persons.

    PubMed

    Wang, Jye; Lin, Wender; Chang, Ling-Hui

    2018-01-01

    The Vulnerable Elders Survey-13 (VES-13) has been used as a screening tool to identify vulnerable community-dwelling older persons for more in-depth assessment and targeted interventions. Although many studies supported its use in different populations, few have addressed Asian populations. The optimal scaling system for the VES-13 in predicting health outcomes also has not been adequately tested. This study (1) assesses the applicability of the VES-13 to predict the mortality of community-dwelling older persons in Taiwan, (2) identifies the best scaling system for the VES-13 in predicting mortality using generalized additive models (GAMs), and (3) determines whether including covariates, such as socio-demographic factors and common geriatric syndromes, improves model fitting. This retrospective longitudinal cohort study analyzed the data of 2184 community-dwelling persons 65 years old or older from the 2003 wave of the national-wide Taiwan Longitudinal Study on Aging. Cox proportional hazards models and Generalized Additive Models (GAMs) were used. The VES-13 significantly predicted the mortality of Taiwan's community-dwelling elders. A one-point increase in the VES-13 score raised the risk of death by 26% (hazard ratio, 1.26; 95% confidence interval, 1.21-1.32). The hazard ratio of death increased linearly with each additional VES-13 score point, suggesting that using a continuous scale is appropriate. Inclusion of socio-demographic factors and geriatric syndromes improved the model-fitting. The VES-13 is appropriate for an Asian population. VES-13 scores linearly predict the mortality of this population. Adjusting the weighting of the physical activity items may improve the performance of the VES-13. Copyright © 2017 Elsevier B.V. All rights reserved.

  2. Nitrate in aquifers beneath agricultural systems

    USGS Publications Warehouse

    Burkart, M.R.; Stoner, J.D.; ,

    2007-01-01

    Research from several regions of the world provides spatially anecdotal evidence to hypothesize which hydrologic and agricultural factors contribute to groundwater vulnerability to nitrate contamination. Analysis of nationally consistent measurements from the U.S. Geological Survey's NAWQA program confirms these hypotheses for a substantial range of agricultural systems. Shallow unconfined aquifers are most susceptible to nitrate contamination associated with agricultural systems. Alluvial and other unconsolidated aquifers are the most vulnerable and also shallow carbonate aquifers that provide a substantial but smaller contamination risk. Where any of these aquifers are overlain by permeable soils the risk of contamination is larger. Irrigated systems can compound this vulnerability by increasing leaching facilitated by additional recharge and additional nutrient applications. The system of corn, soybean, and hogs produced significantly larger concentrations of groundwater nitrate than all other agricultural systems because this system imports the largest amount of N-fertilizer per unit production area. Mean nitrate under dairy, poultry, horticulture, and cattle and grains systems were similar. If trends in the relation between increased fertilizer use and groundwater nitrate in the United States are repeated in other regions of the world, Asia may experience increasing problems because of recent increases in fertilizer use. Groundwater monitoring in Western and Eastern Europe as well as Russia over the next decade may provide data to determine if the trend in increased nitrate contamination can be reversed. If the concentrated livestock trend in the United States is global, it may be accompanied by increasing nitrogen contamination in groundwater. Concentrated livestock provide both point sources in the confinement area and intense non-point sources as fields close to facilities are used for manure disposal. Regions where irrigated cropland is expanding, such as in Asia, may experience the greatest impact of this practice on groundwater nitrate. ?? USDA 2007.

  3. Nitrate in aquifers beneath agricultural systems

    USGS Publications Warehouse

    Burkart, M.R.; Stoner, J.D.

    2002-01-01

    Research from several regions of the world provides spatially anecdotal evidence to hypothesize which hydrologic and agricultural factors contribute to groundwater vulnerability to nitrate contamination. Analysis of nationally consistent measurements from the U.S. Geological Survey's NAWOA program confirms these hypotheses for a substantial range of agricultural systems. Shallow unconfined aquifers are most susceptible to nitrate contamination associated with agricultural systems. Alluvial and other unconsolidated aquifers are the most vulnerable and shallow carbonate aquifers provide a substantial but smaller contamination risk. Where any of these aquifers are overlain by permeable soils the risk of contamination is larger. Irrigated systems can compound this vulnerability by increasing leaching facilitated by additional recharge and additional nutrient applications. The agricultural system of corn, soybeans, and hogs produced significantly larger concentrations of groundwater nitrate than all other agricultural systems, although mean nitrate concentrations in counties with dairy, poultry, cattle and grains, and horticulture systems were similar. If trends in the relation between increased fertilizer use and groundwater nitrate in the United States are repeated in other regions of the world, Asia may experience increasing problems because of recent increases in fertilizer use. Groundwater monitoring in Western and Eastern Europe as well as Russia over the next decade may provide data to determine if the trend in increased nitrate contamination can be reversed. If the concentrated livestock trend in the United States is global, it may be accompanied by increasing nitrogen contamination in groundwater. Concentrated livestock provide both point sources in the confinement area and intense non-point sources as fields close to facilities are used for manure disposal. Regions where irrigated cropland is expanding, such as in Asia, may experience the greatest impact of this practice.

  4. Dynamics of leaf hydraulic conductance with water status: quantification and analysis of species differences under steady state

    PubMed Central

    Scoffoni, Christine; McKown, Athena D.; Rawls, Michael; Sack, Lawren

    2012-01-01

    Leaf hydraulic conductance (Kleaf) is a major determinant of photosynthetic rate in well-watered and drought-stressed plants. Previous work assessed the decline of Kleaf with decreasing leaf water potential (Ψleaf), most typically using rehydration kinetics methods, and found that species varied in the shape of their vulnerability curve, and that hydraulic vulnerability correlated with other leaf functional traits and with drought sensitivity. These findings were tested and extended, using a new steady-state evaporative flux method under high irradiance, and the function for the vulnerability curve of each species was determined individually using maximum likelihood for 10 species varying strongly in drought tolerance. Additionally, the ability of excised leaves to recover in Kleaf with rehydration was assessed, and a new theoretical framework was developed to estimate how rehydration of measured leaves may affect estimation of hydraulic parameters. As hypothesized, species differed in their vulnerability function. Drought-tolerant species showed shallow linear declines and more negative Ψleaf at 80% loss of Kleaf (P80), whereas drought-sensitive species showed steeper, non-linear declines, and less negative P80. Across species, the maximum Kleaf was independent of hydraulic vulnerability. Recovery of Kleaf after 1 h rehydration of leaves dehydrated below their turgor loss point occurred only for four of 10 species. Across species without recovery, a more negative P80 correlated with the ability to maintain Kleaf through both dehydration and rehydration. These findings indicate that resistance to Kleaf decline is important not only in maintaining open stomata during the onset of drought, but also in enabling sustained function during drought recovery. PMID:22016424

  5. Simplified spacecraft vulnerability assessments at component level in early design phase at the European Space Agency's Concurrent Design Facility

    NASA Astrophysics Data System (ADS)

    Kempf, Scott; Schäfer, Frank K.; Cardone, Tiziana; Ferreira, Ivo; Gerené, Sam; Destefanis, Roberto; Grassi, Lilith

    2016-12-01

    During recent years, the state-of-the-art risk assessment of the threat posed to spacecraft by micrometeoroids and space debris has been expanded to the analysis of failure modes of internal spacecraft components. This method can now be used to perform risk analyses for satellites to assess various failure levels - from failure of specific sub-systems to catastrophic break-up. This new assessment methodology is based on triple-wall ballistic limit equations (BLEs), specifically the Schäfer-Ryan-Lambert (SRL) BLE, which is applicable for describing failure threshold levels for satellite components following a hypervelocity impact. The methodology is implemented in the form of the software tool Particle Impact Risk and vulnerability Analysis Tool (PIRAT). During a recent European Space Agency (ESA) funded study, the PIRAT functionality was expanded in order to provide an interface to ESA's Concurrent Design Facility (CDF). The additions include a geometry importer and an OCDT (Open Concurrent Design Tool) interface. The new interface provides both the expanded geometrical flexibility, which is provided by external computer aided design (CAD) modelling, and an ease of import of existing data without the need for extensive preparation of the model. The reduced effort required to perform vulnerability analyses makes it feasible for application during early design phase, at which point modifications to satellite design can be undertaken with relatively little extra effort. The integration of PIRAT in the CDF represents the first time that vulnerability analyses can be performed in-session in ESA's CDF and the first time that comprehensive vulnerability studies can be applied cost-effectively in early design phase in general.

  6. Who is more vulnerable to death from extremely cold temperatures? A case-only approach in Hong Kong with a temperate climate

    NASA Astrophysics Data System (ADS)

    Qiu, Hong; Tian, Linwei; Ho, Kin-fai; Yu, Ignatius T. S.; Thach, Thuan-Quoc; Wong, Chit-Ming

    2016-05-01

    The short-term effects of ambient cold temperature on mortality have been well documented in the literature worldwide. However, less is known about which subpopulations are more vulnerable to death related to extreme cold. We aimed to examine the personal characteristics and underlying causes of death that modified the association between extreme cold and mortality in a case-only approach. Individual information of 197,680 deaths of natural causes, daily temperature, and air pollution concentrations in cool season (November-April) during 2002-2011 in Hong Kong were collected. Extreme cold was defined as those days with preceding week with a daily maximum temperature at or less than the 1st percentile of its distribution. Logistic regression models were used to estimate the effects of modification, further controlling for age, seasonal pattern, and air pollution. Sensitivity analyses were conducted by using the 5th percentile as cutoff point to define the extreme cold. Subjects with age of 85 and older were more vulnerable to extreme cold, with an odds ratio (OR) of 1.33 (95 % confidence interval (CI), 1.22-1.45). The greater risk of extreme cold-related mortality was observed for total cardiorespiratory diseases and several specific causes including hypertensive diseases, stroke, congestive heart failure, chronic obstructive pulmonary disease (COPD), and pneumonia. Hypertensive diseases exhibited the greatest vulnerability to extreme cold exposure, with an OR of 1.37 (95 % CI, 1.13-1.65). Sensitivity analyses showed the robustness of these effect modifications. This evidence on which subpopulations are vulnerable to the adverse effects of extreme cold is important to inform public health measures to minimize those effects.

  7. Integrating Urban Infrastructure and Health System Impact Modeling for Disasters and Mass-Casualty Events

    NASA Astrophysics Data System (ADS)

    Balbus, J. M.; Kirsch, T.; Mitrani-Reiser, J.

    2017-12-01

    Over recent decades, natural disasters and mass-casualty events in United States have repeatedly revealed the serious consequences of health care facility vulnerability and the subsequent ability to deliver care for the affected people. Advances in predictive modeling and vulnerability assessment for health care facility failure, integrated infrastructure, and extreme weather events have now enabled a more rigorous scientific approach to evaluating health care system vulnerability and assessing impacts of natural and human disasters as well as the value of specific interventions. Concurrent advances in computing capacity also allow, for the first time, full integration of these multiple individual models, along with the modeling of population behaviors and mass casualty responses during a disaster. A team of federal and academic investigators led by the National Center for Disaster Medicine and Public Health (NCDMPH) is develoing a platform for integrating extreme event forecasts, health risk/impact assessment and population simulations, critical infrastructure (electrical, water, transportation, communication) impact and response models, health care facility-specific vulnerability and failure assessments, and health system/patient flow responses. The integration of these models is intended to develop much greater understanding of critical tipping points in the vulnerability of health systems during natural and human disasters and build an evidence base for specific interventions. Development of such a modeling platform will greatly facilitate the assessment of potential concurrent or sequential catastrophic events, such as a terrorism act following a severe heat wave or hurricane. This presentation will highlight the development of this modeling platform as well as applications not just for the US health system, but also for international science-based disaster risk reduction efforts, such as the Sendai Framework and the WHO SMART hospital project.

  8. a Novel Approach to Support Majority Voting in Spatial Group Mcdm Using Density Induced Owa Operator for Seismic Vulnerability Assessment

    NASA Astrophysics Data System (ADS)

    Moradi, M.; Delavar, M. R.; Moshiri, B.; Khamespanah, F.

    2014-10-01

    Being one of the most frightening disasters, earthquakes frequently cause huge damages to buildings, facilities and human beings. Although the prediction of characteristics of an earthquake seems to be impossible, its loss and damage is predictable in advance. Seismic loss estimation models tend to evaluate the extent to which the urban areas are vulnerable to earthquakes. Many factors contribute to the vulnerability of urban areas against earthquakes including age and height of buildings, the quality of the materials, the density of population and the location of flammable facilities. Therefore, seismic vulnerability assessment is a multi-criteria problem. A number of multi criteria decision making models have been proposed based on a single expert. The main objective of this paper is to propose a model which facilitates group multi criteria decision making based on the concept of majority voting. The main idea of majority voting is providing a computational tool to measure the degree to which different experts support each other's opinions and make a decision regarding this measure. The applicability of this model is examined in Tehran metropolitan area which is located in a seismically active region. The results indicate that neglecting the experts which get lower degrees of support from others enables the decision makers to avoid the extreme strategies. Moreover, a computational method is proposed to calculate the degree of optimism in the experts' opinions.

  9. Carotid plaque characterization using CT and MRI scans for synergistic image analysis

    NASA Astrophysics Data System (ADS)

    Getzin, Matthew; Xu, Yiqin; Rao, Arhant; Madi, Saaussan; Bahadur, Ali; Lennartz, Michelle R.; Wang, Ge

    2014-09-01

    Noninvasive determination of plaque vulnerability has been a holy grail of medical imaging. Despite advances in tomographic technologies , there is currently no effective way to identify vulnerable atherosclerotic plaques with high sensitivity and specificity. Computed tomography (CT) and magnetic resonance imaging (MRI) are widely used, but neither provides sufficient information of plaque properties. Thus, we are motivated to combine CT and MRI imaging to determine if the composite information can better reflect the histological determination of plaque vulnerability. Two human endarterectomy specimens (1 symptomatic carotid and 1 stable femoral) were imaged using Scanco Medical Viva CT40 and Bruker Pharmascan 16cm 7T Horizontal MRI / MRS systems. μCT scans were done at 55 kVp and tube current of 70 mA. Samples underwent RARE-VTR and MSME pulse sequences to measure T1, T2 values, and proton density. The specimens were processed for histology and scored for vulnerability using the American Heart Association criteria. Single modality-based analyses were performed through segmentation of key imaging biomarkers (i.e. calcification and lumen), image registration, measurement of fibrous capsule, and multi-component T1 and T2 decay modeling. Feature differences were analyzed between the unstable and stable controls, symptomatic carotid and femoral plaque, respectively. By building on the techniques used in this study, synergistic CT+MRI analysis may provide a promising solution for plaque characterization in vivo.

  10. Evaluating Application Resilience with XRay

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chen, Sui; Bronevetsky, Greg; Li, Bin

    2015-05-07

    The rising count and shrinking feature size of transistors within modern computers is making them increasingly vulnerable to various types of soft faults. This problem is especially acute in high-performance computing (HPC) systems used for scientific computing, because these systems include many thousands of compute cores and nodes, all of which may be utilized in a single large-scale run. The increasing vulnerability of HPC applications to errors induced by soft faults is motivating extensive work on techniques to make these applications more resiilent to such faults, ranging from generic techniques such as replication or checkpoint/restart to algorithmspecific error detection andmore » tolerance techniques. Effective use of such techniques requires a detailed understanding of how a given application is affected by soft faults to ensure that (i) efforts to improve application resilience are spent in the code regions most vulnerable to faults and (ii) the appropriate resilience technique is applied to each code region. This paper presents XRay, a tool to view the application vulnerability to soft errors, and illustrates how XRay can be used in the context of a representative application. In addition to providing actionable insights into application behavior XRay automatically selects the number of fault injection experiments required to provide an informative view of application behavior, ensuring that the information is statistically well-grounded without performing unnecessary experiments.« less

  11. Combining OCT and a fluorescence intensity imaging method for atherosclerosis detection

    NASA Astrophysics Data System (ADS)

    Liang, Shanshan; Saidi, Arya; Jing, Joe; Liu, Gangjun; Yin, Jiechen; Narula, Jagat; Chen, Zhongping

    2012-02-01

    Coronary heart disease (like myocardial infarction) is caused by atherosclerosis. It cause over 30% of all deaths in North America and are the most common cause of death in European men under 65 years of age and the second most common cause in women. To diagnose this atherosclerosis before it gets rupture is the most effect way to increase the chance of survival for patients who suffer from this disease. The crucial tusk is how to find out vulnerable plaques. In resent years optical coherence tomography (OCT) has become a very useful tool for intravascular imaging, since it has high axial and transverse resolution. OCT can tell the detail structure inside the plaque like the thickness of plaque cap which is an important factor to identify vulnerable plaques. But we still need to find out the biochemical characteristics that is unique for vulnerable plaques (like inflammation). Fluorescence molecular imaging is a standard way to exam the biochemical property of biological samples. So we integrate these two techniques together into one probe. Our probe is comprised of a double-clad fiber (DCF) and a grin lens, and rotates with a micro mirror in front. The single-mode inner core of the DCF transmits both OCT and fluorescence excitation light, and the multimode inner cladding is used to detect fluorescence signal. In vitro result shows that this is a possible way for more accurate diagnose of vulnerable plaques.

  12. An elevated neutrophil-lymphocyte ratio is associated with adverse outcomes following single time-point paracetamol (acetaminophen) overdose: a time-course analysis.

    PubMed

    Craig, Darren G; Kitto, Laura; Zafar, Sara; Reid, Thomas W D J; Martin, Kirsty G; Davidson, Janice S; Hayes, Peter C; Simpson, Kenneth J

    2014-09-01

    The innate immune system is profoundly dysregulated in paracetamol (acetaminophen)-induced liver injury. The neutrophil-lymphocyte ratio (NLR) is a simple bedside index with prognostic value in a number of inflammatory conditions. To evaluate the prognostic accuracy of the NLR in patients with significant liver injury following single time-point and staggered paracetamol overdoses. Time-course analysis of 100 single time-point and 50 staggered paracetamol overdoses admitted to a tertiary liver centre. Timed laboratory samples were correlated with time elapsed after overdose or admission, respectively, and the NLR was calculated. A total of 49/100 single time-point patients developed hepatic encephalopathy (HE). Median NLRs were higher at both 72 (P=0.0047) and 96 h after overdose (P=0.0041) in single time-point patients who died or were transplanted. Maximum NLR values by 96 h were associated with increasing HE grade (P=0.0005). An NLR of more than 16.7 during the first 96 h following overdose was independently associated with the development of HE [odds ratio 5.65 (95% confidence interval 1.67-19.13), P=0.005]. Maximum NLR values by 96 h were strongly associated with the requirement for intracranial pressure monitoring (P<0.0001), renal replacement therapy (P=0.0002) and inotropic support (P=0.0005). In contrast, in the staggered overdose cohort, the NLR was not associated with adverse outcomes or death/transplantation either at admission or subsequently. The NLR is a simple test which is strongly associated with adverse outcomes following single time-point, but not staggered, paracetamol overdoses. Future studies should assess the value of incorporating the NLR into existing prognostic and triage indices of single time-point paracetamol overdose.

  13. Enhanced quantum spin fluctuations in a binary Bose-Einstein condensate

    NASA Astrophysics Data System (ADS)

    Bisset, R. N.; Kevrekidis, P. G.; Ticknor, C.

    2018-02-01

    For quantum fluids, the role of quantum fluctuations may be significant in several regimes such as when the dimensionality is low, the density is high, the interactions are strong, or for low particle numbers. In this paper, we propose a fundamentally different regime for enhanced quantum fluctuations without being restricted by any of the above conditions. Instead, our scheme relies on the engineering of an effective attractive interaction in a dilute, two-component Bose-Einstein condensate (BEC) consisting of thousands of atoms. In such a regime, the quantum spin fluctuations are significantly enhanced (atom bunching with respect to the noninteracting limit) since they act to reduce the interaction energy, a remarkable property given that spin fluctuations are normally suppressed (antibunching) at zero temperature. In contrast to the case of true attractive interactions, our approach is not vulnerable to BEC collapse. We numerically demonstrate that these quantum fluctuations are experimentally accessible by either spin or single-component Bragg spectroscopy, offering a useful platform on which to test beyond-mean-field theories. We also develop a variational model and use it to analytically predict the shift of the immiscibility critical point, finding good agreement with our numerics.

  14. [Factors associated with condom use and knowledge about STD/AIDS among teenagers in public and private schools in São Paulo, Brazil].

    PubMed

    Martins, Laura B Motta; da Costa-Paiva, Lúcia Helena S; Osis, Maria José D; de Sousa, Maria Helena; Pinto-Neto, Aarão M; Tadini, Valdir

    2006-02-01

    This study aimed to compare knowledge about STD/AIDS and identify the factors associated with adequate knowledge and consistent use of male condoms in teenagers from public and private schools in the city of São Paulo, Brazil. We selected 1,594 adolescents ranging 12 to 19 years of age in 13 public schools and 5 private schools to complete a questionnaire on knowledge of STD/AIDS and use of male condoms. Prevalence ratios were computed with a 95% confidence interval. The score on STD knowledge used a cutoff point corresponding to 50% of correct answers. Statistical tests were chi-square and Poisson multiple regression. Consistent use of male condoms was 60% in private and 57.1% in public schools (p > 0.05) and was associated with male gender and lower socioeconomic status. Female gender, higher schooling, enrollment in private school, Caucasian race, and being single were associated with higher knowledge of STDs. Teenagers from public and private schools have adequate knowledge of STD prevention, however this does not include the adoption of effective prevention. Educational programs and STD/AIDS awareness-raising should be expanded in order to minimize vulnerability.

  15. Understanding resilience in industrial symbiosis networks: insights from network analysis.

    PubMed

    Chopra, Shauhrat S; Khanna, Vikas

    2014-08-01

    Industrial symbiotic networks are based on the principles of ecological systems where waste equals food, to develop synergistic networks. For example, industrial symbiosis (IS) at Kalundborg, Denmark, creates an exchange network of waste, water, and energy among companies based on contractual dependency. Since most of the industrial symbiotic networks are based on ad-hoc opportunities rather than strategic planning, gaining insight into disruptive scenarios is pivotal for understanding the balance of resilience and sustainability and developing heuristics for designing resilient IS networks. The present work focuses on understanding resilience as an emergent property of an IS network via a network-based approach with application to the Kalundborg Industrial Symbiosis (KIS). Results from network metrics and simulated disruptive scenarios reveal Asnaes power plant as the most critical node in the system. We also observe a decrease in the vulnerability of nodes and reduction in single points of failure in the system, suggesting an increase in the overall resilience of the KIS system from 1960 to 2010. Based on our findings, we recommend design strategies, such as increasing diversity, redundancy, and multi-functionality to ensure flexibility and plasticity, to develop resilient and sustainable industrial symbiotic networks. Copyright © 2014 Elsevier Ltd. All rights reserved.

  16. Application of a single-objective, hybrid genetic algorithm approach to pharmacokinetic model building.

    PubMed

    Sherer, Eric A; Sale, Mark E; Pollock, Bruce G; Belani, Chandra P; Egorin, Merrill J; Ivy, Percy S; Lieberman, Jeffrey A; Manuck, Stephen B; Marder, Stephen R; Muldoon, Matthew F; Scher, Howard I; Solit, David B; Bies, Robert R

    2012-08-01

    A limitation in traditional stepwise population pharmacokinetic model building is the difficulty in handling interactions between model components. To address this issue, a method was previously introduced which couples NONMEM parameter estimation and model fitness evaluation to a single-objective, hybrid genetic algorithm for global optimization of the model structure. In this study, the generalizability of this approach for pharmacokinetic model building is evaluated by comparing (1) correct and spurious covariate relationships in a simulated dataset resulting from automated stepwise covariate modeling, Lasso methods, and single-objective hybrid genetic algorithm approaches to covariate identification and (2) information criteria values, model structures, convergence, and model parameter values resulting from manual stepwise versus single-objective, hybrid genetic algorithm approaches to model building for seven compounds. Both manual stepwise and single-objective, hybrid genetic algorithm approaches to model building were applied, blinded to the results of the other approach, for selection of the compartment structure as well as inclusion and model form of inter-individual and inter-occasion variability, residual error, and covariates from a common set of model options. For the simulated dataset, stepwise covariate modeling identified three of four true covariates and two spurious covariates; Lasso identified two of four true and 0 spurious covariates; and the single-objective, hybrid genetic algorithm identified three of four true covariates and one spurious covariate. For the clinical datasets, the Akaike information criterion was a median of 22.3 points lower (range of 470.5 point decrease to 0.1 point decrease) for the best single-objective hybrid genetic-algorithm candidate model versus the final manual stepwise model: the Akaike information criterion was lower by greater than 10 points for four compounds and differed by less than 10 points for three compounds. The root mean squared error and absolute mean prediction error of the best single-objective hybrid genetic algorithm candidates were a median of 0.2 points higher (range of 38.9 point decrease to 27.3 point increase) and 0.02 points lower (range of 0.98 point decrease to 0.74 point increase), respectively, than that of the final stepwise models. In addition, the best single-objective, hybrid genetic algorithm candidate models had successful convergence and covariance steps for each compound, used the same compartment structure as the manual stepwise approach for 6 of 7 (86 %) compounds, and identified 54 % (7 of 13) of covariates included by the manual stepwise approach and 16 covariate relationships not included by manual stepwise models. The model parameter values between the final manual stepwise and best single-objective, hybrid genetic algorithm models differed by a median of 26.7 % (q₁ = 4.9 % and q₃ = 57.1 %). Finally, the single-objective, hybrid genetic algorithm approach was able to identify models capable of estimating absorption rate parameters for four compounds that the manual stepwise approach did not identify. The single-objective, hybrid genetic algorithm represents a general pharmacokinetic model building methodology whose ability to rapidly search the feasible solution space leads to nearly equivalent or superior model fits to pharmacokinetic data.

  17. Ranking terrestrial vertebrate species for utility in biomonitoring and vulnerability to environmental contaminants

    USGS Publications Warehouse

    Golden, N.H.; Rattner, B.A.

    2003-01-01

    The measurement of contaminant tissue concentrations or exposure-related effects in biota has been used extensively to monitor pollution and environmental health. Terrestrial vertebrates have historically been an important group of species in such evaluations, not only because many are excellent sentinels of environmental contamination, but also because they are valued natural resources in their own right that may be adversely affected by toxicant exposure. Selection of appropriate vertebrates for biomonitoring studies frequently relies on expert opinion, although a few rigorous schemes are in use for predicting vulnerability of birds to the adverse effects of petroleum crude oil. A Utility Index that ranks terrestrial vertebrate species as potential sentinels of contaminants in a region, and a Vulnerability Index that assesses the threat of specific groups of contaminants to these species, have been developed to assist decision makers in risk assessments of persistent organic pollutants, cholinesterase-inhibiting pesticides, petroleum crude oil, mercury, and lead shot. Twenty-five terrestrial vertebrate species commonly found in Atlantic Coast estuarine habitat were ranked for their utility as biomonitors of contamination and their vulnerability to pollutants in this region. No single species, taxa or class of vertebrates was found to be an ideal sentinel for all groups of contaminants. Although birds have overwhelmingly been used to monitor contaminants compared to other terrestrial vertebrate classes, the non-migratory nature and dietary habits of the snapping turtle and mink consistently resulted in ranking these species excellent sentinels as well. Vulnerability of Atlantic Coast populations of these species varied considerably among groups of contaminants. Usually a particular species was found to be at high risk to only one or two groups of contaminants, although a noteworthy exception is the bald eagle that is highly vulnerable to all five of the contaminant groups examined. This index could be further enhanced by generation of additional comparative toxicity data to facilitate interspecific extrapolations. The Utility and Vulnerability Indices have application to many types of habitat types in addition to estuaries, and are of value to natural resource and risk managers that routinely conduct local, regional or national environmental quality assessments.

  18. Multi-beam and single-chip LIDAR with discrete beam steering by digital micromirror device

    NASA Astrophysics Data System (ADS)

    Rodriguez, Joshua; Smith, Braden; Hellman, Brandon; Gin, Adley; Espinoza, Alonzo; Takashima, Yuzuru

    2018-02-01

    A novel Digital Micromirror Device (DMD) based beam steering enables a single chip Light Detection and Ranging (LIDAR) system for discrete scanning points. We present increasing number of scanning point by using multiple laser diodes for Multi-beam and Single-chip DMD-based LIDAR.

  19. "So, You Think You Have a History?": Taking a Q from Lesbian and Gay Studies in Writing Education History

    ERIC Educational Resources Information Center

    Graves, Karen

    2012-01-01

    This article presents an analysis of LGBTQ education history with an Ohio narrative to underscore a point: four decades into the publication of LGBTQ history it remains a critical enterprise--essential to a collective understanding of the past, vulnerable to those who do not approve of its subject(s), and undergoing significant change. The Ohio…

  20. Negligent hiring liability--a primer for healthcare administrators.

    PubMed

    Bates, Norman D

    2008-01-01

    Healthcare institutions are particularly vulnerable to negligent hiring liability which holds employers responsible for their employees' improper conduct. Several methods are simple and inexpensive yet many employers neglect to employ them effectively, the author, an attorney and security management consultant, points out. In this article, he spells out what can be done to screen applicants to avoid and/or better defend against negligent hiring lawsuits.

  1. Airlift and Access in the Indo-Pacific

    DTIC Science & Technology

    2014-06-01

    landing points. These strikes occur before landing forces can disperse, when they are most vulnerable and include wide-area mine fields; contamination of...Taiwan, Malaysia , Philippines, and Vietnam. Second, it establishes rights to fishing, navigation, and oil and gas exploration and drilling activities...to smuggle cotton northward to mix with legal cotton. As Union and merchant ships transported food down the Mississippi for sale, their return

  2. Vulnerability to heatwaves and implications for public health interventions - A scoping review.

    PubMed

    Mayrhuber, Elisabeth Anne-Sophie; Dückers, Michel L A; Wallner, Peter; Arnberger, Arne; Allex, Brigitte; Wiesböck, Laura; Wanka, Anna; Kolland, Franz; Eder, Renate; Hutter, Hans-Peter; Kutalek, Ruth

    2018-05-31

    Heatwaves form a serious public health threat, especially for vulnerable groups. Interventions such as active outreach programs, exposure reduction measures and monitoring and mapping of at-risk groups are increasingly implemented across the world but little is known about their effect. To assess how vulnerable groups are identified and reached in heat health interventions, to understand the effectiveness and efficiency of those interventions, and to identify research gaps in existing literature. We performed a literature search in relevant scientific literature databases and searched with a four element search model for articles published from 1995 onward. We extracted data on intervention measures, target group and evaluation of effectiveness and efficiency. We identified 23 eligible studies. Patterns exist in type of interventions 1) to detect and 2) to influence extrinsic and intrinsic risk and protective factors. Results showed several intervention barriers related to the variety and intersection of these factors, as well as the self-perception of vulnerable groups, and misconceptions and unfavorable attitudes towards intervention benefits. While modest indications for the evidence on the effectiveness of interventions were found, efficiency remains unclear. Interventions entailed logical combinations of measures, subsumed as packages. Evidence for effective and efficient intervention is limited by the difficulty to determine effects and because single measures are mutually dependent. Interventions prioritized promoting behavioral change and were based on behavioral assumptions that remain untested and mechanisms not worked out explicitly. Multifaceted efforts are needed to tailor interventions, compiled in heat health warning systems and action plans for exposure reduction and protection of vulnerable populations, to fit the social, economic and geographical context. Besides adequately addressing relevant risk and protective factors, the challenge is to integrate perspectives of vulnerable groups. Future research should focus on intervention barriers and improving the methods of effectiveness and efficiency evaluation. Copyright © 2018 Elsevier Inc. All rights reserved.

  3. Assessing tsunami vulnerability, an example from Herakleio, Crete

    NASA Astrophysics Data System (ADS)

    Papathoma, M.; Dominey-Howes, D.; Zong, Y.; Smith, D.

    Recent tsunami have caused massive loss of life, destruction of coastal infrastructures and disruption to economic activity. To date, tsunami hazard studies have concentrated on determining the frequency and magnitude of events and in the production of simplistic flood maps. In general, such maps appear to have assumed a uniform vulnerability of population, infrastructure and business. In reality however, a complex set of factors interact to produce a pattern of vulnerability that varies spatially and temporally. A new vulnerability assessment approach is described, that incorporates multiple factors (e.g. parameters relating to the natural and built environments and socio-demographics) that contribute to tsunami vulnerability. The new methodology is applied on a coastal segment in Greece and, in particular, in Crete, westof the city of Herakleio. The results are presented within a Geographic Information System (GIS). The application of GIS ensures the approach is novel for tsunami studies, since it permits interrogation of the primary database by several different end-users. For example, the GIS may be used: (1) to determine immediate post-tsunami disaster response needs by the emergency services; (2) to preplan tsunami mitigation measures by disaster planners; (3) as a tool for local planning by the municipal authorities or; (4) as a basis for catastrophe modelling by insurance companies. We show that population density varies markedly with the time of the year and that 30% of buildings within the inundation zone are only single story thus increasing the vulnerability of their occupants. Within the high inundation depth zone, 11% of buildings are identified as in need of reinforcement and this figure rises to 50% within the medium inundation depth zone. 10% of businesses are located within the high inundation depth zone and these may need to consider their level of insurance cover to protect against primary building damage, contents loss and business interruption losses.

  4. A new holistic approach to vulnerability assessment to natural hazards of socio-economic systems by means of Graph Theory

    NASA Astrophysics Data System (ADS)

    Arosio, Marcello; Martina, Mario L. V.

    2017-04-01

    In the last years, the relations and interactions between multi-hazards, vulnerability, exposure and resilience spheres are assuming more and more attention and the scientific community recognized that they are very dynamic, complex and interconnected. The traditional approaches define risk as the potential economic, social and environmental consequences due to a hazardous phenomenon in a specific period. Although there have been major improvements in recent years, there are still some limitation in term of a holistic approach that is able to include the emergent value hidden in the relation and interaction between the different spheres. Furthermore, the emergent behaviour of a society makes the collective risk greater than the sum of the parts and this requires a holistic, systematic and integrated approach. For this reason, it is important to consider the connections between elements to assess properly the vulnerability of systems. In a system (e.g. road, hospital and ecological network, etc.), or in a System of System (e.g. socio-technical urban service), there are critical elements that, beyond the intrinsic vulnerability, can be characterize by greater or lower vulnerability because of their physical, geographical, cyber or logical connections. To understand the system response to a perturbation, and therefore its resilience, is necessary not only to represent but also to quantify the relative importance of the elements and their interconnections. To this aim, we propose an innovative approach in the field of natural risk assessment based on the properties of graph G=(N,L). A graph consists of two sets N (nodes) and L (links): the nodes represent the single exposed elements (physical, social, environmental, etc.) to a hazard, while the links (or connections) represent the interaction between the elements. This approach encourages the risk assessment to a new prospective: from reductionist to holistic. The final goal is to provide insight in understanding how to quantify integrated collective vulnerability, resilience and risk.

  5. Analysis of data from NASA B-57B gust gradient program

    NASA Technical Reports Server (NTRS)

    Frost, W.; Lin, M. C.; Chang, H. P.; Ringnes, E.

    1985-01-01

    Statistical analysis of the turbulence measured in flight 6 of the NASA B-57B over Denver, Colorado, from July 7 to July 23, 1982 included the calculations of average turbulence parameters, integral length scales, probability density functions, single point autocorrelation coefficients, two point autocorrelation coefficients, normalized autospectra, normalized two point autospectra, and two point cross sectra for gust velocities. The single point autocorrelation coefficients were compared with the theoretical model developed by von Karman. Theoretical analyses were developed which address the effects spanwise gust distributions, using two point spatial turbulence correlations.

  6. Testing in Service-Oriented Environments

    DTIC Science & Technology

    2010-03-01

    software releases (versions, service packs, vulnerability patches) for one com- mon ESB during the 13-month period from January 1, 2008 through...impact on quality of service : Unlike traditional software compo- nents, a single instance of a web service can be used by multiple consumers. Since the...distributed, with heterogeneous hardware and software (SOA infrastructure, services , operating systems, and databases). Because of cost and security, it

  7. Principal component analysis of binding energies for single-point mutants of hT2R16 bound to an agonist correlate with experimental mutant cell response.

    PubMed

    Chen, Derek E; Willick, Darryl L; Ruckel, Joseph B; Floriano, Wely B

    2015-01-01

    Directed evolution is a technique that enables the identification of mutants of a particular protein that carry a desired property by successive rounds of random mutagenesis, screening, and selection. This technique has many applications, including the development of G protein-coupled receptor-based biosensors and designer drugs for personalized medicine. Although effective, directed evolution is not without challenges and can greatly benefit from the development of computational techniques to predict the functional outcome of single-point amino acid substitutions. In this article, we describe a molecular dynamics-based approach to predict the effects of single amino acid substitutions on agonist binding (salicin) to a human bitter taste receptor (hT2R16). An experimentally determined functional map of single-point amino acid substitutions was used to validate the whole-protein molecular dynamics-based predictive functions. Molecular docking was used to construct a wild-type agonist-receptor complex, providing a starting structure for single-point substitution simulations. The effects of each single amino acid substitution in the functional response of the receptor to its agonist were estimated using three binding energy schemes with increasing inclusion of solvation effects. We show that molecular docking combined with molecular mechanics simulations of single-point mutants of the agonist-receptor complex accurately predicts the functional outcome of single amino acid substitutions in a human bitter taste receptor.

  8. Detection of kinetic change points in piece-wise linear single molecule motion

    NASA Astrophysics Data System (ADS)

    Hill, Flynn R.; van Oijen, Antoine M.; Duderstadt, Karl E.

    2018-03-01

    Single-molecule approaches present a powerful way to obtain detailed kinetic information at the molecular level. However, the identification of small rate changes is often hindered by the considerable noise present in such single-molecule kinetic data. We present a general method to detect such kinetic change points in trajectories of motion of processive single molecules having Gaussian noise, with a minimum number of parameters and without the need of an assumed kinetic model beyond piece-wise linearity of motion. Kinetic change points are detected using a likelihood ratio test in which the probability of no change is compared to the probability of a change occurring, given the experimental noise. A predetermined confidence interval minimizes the occurrence of false detections. Applying the method recursively to all sub-regions of a single molecule trajectory ensures that all kinetic change points are located. The algorithm presented allows rigorous and quantitative determination of kinetic change points in noisy single molecule observations without the need for filtering or binning, which reduce temporal resolution and obscure dynamics. The statistical framework for the approach and implementation details are discussed. The detection power of the algorithm is assessed using simulations with both single kinetic changes and multiple kinetic changes that typically arise in observations of single-molecule DNA-replication reactions. Implementations of the algorithm are provided in ImageJ plugin format written in Java and in the Julia language for numeric computing, with accompanying Jupyter Notebooks to allow reproduction of the analysis presented here.

  9. Hurricane Recovery Report 2004

    NASA Technical Reports Server (NTRS)

    Gordon, Joseph P.

    2005-01-01

    During August and September 2004, four hurricanes tested the mettle of Space Coast residents and the Kennedy Space Center (KSC) leadership and workforce. These threats underscored two important points: the very real vulnerability of KSC and its valuable space program assets to the devastating power of a hurricane, and the planning required to effectively deal with such threats. The damage was significant even though KSC did not experience sustained hurricane-force winds. To better understand and appreciate these points, this report provides an overview of the meteorological history of the Space Coast and what is involved in the planning, preparation, and recovery activities, as well as addressing the impacts of the 2004 hurricane season.

  10. Order of accuracy of QUICK and related convection-diffusion schemes

    NASA Technical Reports Server (NTRS)

    Leonard, B. P.

    1993-01-01

    This report attempts to correct some misunderstandings that have appeared in the literature concerning the order of accuracy of the QUICK scheme for steady-state convective modeling. Other related convection-diffusion schemes are also considered. The original one-dimensional QUICK scheme written in terms of nodal-point values of the convected variable (with a 1/8-factor multiplying the 'curvature' term) is indeed a third-order representation of the finite volume formulation of the convection operator average across the control volume, written naturally in flux-difference form. An alternative single-point upwind difference scheme (SPUDS) using node values (with a 1/6-factor) is a third-order representation of the finite difference single-point formulation; this can be written in a pseudo-flux difference form. These are both third-order convection schemes; however, the QUICK finite volume convection operator is 33 percent more accurate than the single-point implementation of SPUDS. Another finite volume scheme, writing convective fluxes in terms of cell-average values, requires a 1/6-factor for third-order accuracy. For completeness, one can also write a single-point formulation of the convective derivative in terms of cell averages, and then express this in pseudo-flux difference form; for third-order accuracy, this requires a curvature factor of 5/24. Diffusion operators are also considered in both single-point and finite volume formulations. Finite volume formulations are found to be significantly more accurate. For example, classical second-order central differencing for the second derivative is exactly twice as accurate in a finite volume formulation as it is in single-point.

  11. The Health of the Nation’s Custodial Grandfathers and Older Single Fathers: Findings From the Behavior Risk Factor Surveillance System

    PubMed Central

    Whitley, Deborah M.; Fuller-Thomson, Esme

    2015-01-01

    Two important parent groups are solo grandfathers and single fathers raising children alone. The health of male caregivers raising children has received little attention by scholars. Investigating the health of single male caregivers raises awareness about their physical vulnerability. This study uses the 2012 Behavioral Risk Factor Surveillance System to compare health characteristics of 82 solo grandfathers with 396 single fathers aged 50 years and older. The findings suggest that grandfathers exhibited a high prevalence for various health conditions, including diabetes (44%), heart attack (27%), chronic obstructive pulmonary disease (23%), and stroke (6%). Almost half of grandfathers rated their health as fair/poor (47%), and nearly two in five had functional limitations (38%). Although older single fathers had better health characteristics than grandfathers, their health profile was poorer than population norms. Logistic regression analysis suggests that solo grandfathers are more at risk for poor health outcomes than older single fathers. Practice interventions to minimize health risks are discussed. PMID:26669777

  12. A Transdiagnostic Approach to Interventions in Addictive Disorders- Third wave therapies and other current interventions

    PubMed Central

    Narayanan, Gitanjali; Naaz, Shaima

    2018-01-01

    Recent research points to a shift from categorical diagnoses to a dimensional understanding of psychopathology and mental health disorders. In parallel, there has been a rise in newer psychosocial treatment modalities, which are inherently transdiagnostic. Transdiagnostic approaches are those that identify core vulnerabilities and apply universal principles to therapeutic treatment. As treatment of substance use disorders (SUD) must invariably accommodate such vulnerabilities, clinicians are finding such interventions useful. Therapies like Acceptance and Commitment Therapy (ACT), Dialectical Behavioural Therapy (DBT), Metacognitive Therapy, Mindfulness-Based Relapse Prevention (MBRP) use a transdiagnostic framework and are backed by evidence in the last 3-5 years. In this paper we first highlight the conceptual understanding of SUD through these frameworks and then discuss their clinical applications along with specific techniques that have been particularly useful with this population. PMID:29540925

  13. The Engineering for Climate Extremes Partnership

    NASA Astrophysics Data System (ADS)

    Holland, G. J.; Tye, M. R.

    2014-12-01

    Hurricane Sandy and the recent floods in Thailand have demonstrated not only how sensitive the urban environment is to the impact of severe weather, but also the associated global reach of the ramifications. These, together with other growing extreme weather impacts and the increasing interdependence of global commercial activities point towards a growing vulnerability to weather and climate extremes. The Engineering for Climate Extremes Partnership brings academia, industry and government together with the goals encouraging joint activities aimed at developing new, robust, and well-communicated responses to this increasing vulnerability. Integral to the approach is the concept of 'graceful failure' in which flexible designs are adopted that protect against failure by combining engineering or network strengths with a plan for efficient and rapid recovery if and when they fail. Such an approach enables optimal planning for both known future scenarios and their assessed uncertainty.

  14. HIV/AIDS and tourism in the Caribbean: an ecological systems perspective.

    PubMed

    Padilla, Mark B; Guilamo-Ramos, Vincent; Bouris, Alida; Reyes, Armando Matiz

    2010-01-01

    The Caribbean has the highest HIV rates outside of sub-Saharan Africa. In recent decades, tourism has become the most important Caribbean industry. Studies suggest that tourism areas are epicenters of demographic and social changes linked to HIV risk, such as transactional sex, elevated alcohol and substance use, and internal migration. Despite this, no formative HIV-prevention studies have examined tourism areas as ecologies that heighten HIV vulnerability. HIV/AIDS research needs to place emphasis on the ecological context of sexual vulnerability in tourism areas and develop multilevel interventions that are sensitive to this context. From our review and integration of a broad literature across the social and health sciences, we argue for an ecological approach to sexual health in Caribbean tourism areas, point to gaps in knowledge, and provide direction for future research.

  15. HIV/AIDS and Tourism in the Caribbean: An Ecological Systems Perspective

    PubMed Central

    Guilamo-Ramos, Vincent; Bouris, Alida; Reyes, Armando Matiz

    2010-01-01

    The Caribbean has the highest HIV rates outside of sub-Saharan Africa. In recent decades, tourism has become the most important Caribbean industry. Studies suggest that tourism areas are epicenters of demographic and social changes linked to HIV risk, such as transactional sex, elevated alcohol and substance use, and internal migration. Despite this, no formative HIV-prevention studies have examined tourism areas as ecologies that heighten HIV vulnerability. HIV/AIDS research needs to place emphasis on the ecological context of sexual vulnerability in tourism areas and develop multilevel interventions that are sensitive to this context. From our review and integration of a broad literature across the social and health sciences, we argue for an ecological approach to sexual health in Caribbean tourism areas, point to gaps in knowledge, and provide direction for future research. PMID:19910343

  16. “Complexities of holistic community based participatory research for a low-income, multi-ethnic population exposed to multiple built-environment stressors in Worcester, Massachusetts”

    PubMed Central

    Downs, Timothy J.; Ross, Laurie; Patton, Suzanne; Rulnick, Sarah; Sinha, Deb; Mucciarone, Danielle; Calvache, Maria; Parmenter, Sarah; Subedi, Rajendra; Wysokenski, Donna; Anderson, Erin; Dezan, Rebecca; Lowe, Kate; Bowen, Jennifer; Tejani, Amee; Piersanti, Kelly; Taylor, Octavia; Goble, Robert

    2009-01-01

    Low income, multi-ethnic communities in Main South/Piedmont neighborhoods of Worcester, Massachusetts are exposed to cumulative, chronic built-environment stressors, and have limited capacity to respond, magnifying their vulnerability to adverse health outcomes. “Neighborhood STRENGTH”, our community based participatory research (CBPR) project, comprised four partners: a youth center; an environmental non-profit; a community based health center; and a university. Unlike most CBPR projects that are single topic-focused, our ‘holistic’, systems-based project targeted five priorities. The three research-focused/action-oriented components were: 1) participatory monitoring of indoor and outdoor pollution; 2) learning about health needs and concerns of residents through community based listening sessions; and 3) engaging in collaborative survey work, including a household vulnerability survey and an asthma prevalence survey for schoolchildren. The two action-focused/research-informed components were: 4) tackling persistent street trash and illegal dumping strategically; and 5) educating and empowering youth to promote environmental justice. We used a coupled CBPR-capacity building approach to design, vulnerability theory to frame, and mixed methods: quantitative environmental testing and qualitative surveys. Process and outcomes yielded important lessons: vulnerability theory helps frame issues holistically; having several topic-based projects yielded useful information, but was hard to manage and articulate to the public; access to, and engagement with, the target population was very difficult and would have benefited greatly from having representative residents who were paid at the partners' table. Engagement with residents and conflict burden varied highly across components. Notwithstanding, we built enabling capacity, strengthened our understanding of vulnerability, and are able to share valuable experiential knowledge. PMID:19762014

  17. Social protection systems in vulnerable families: their importance for the public health

    PubMed Central

    Arcos, Estela; Sanchez, Ximena; Toffoletto, Maria Cecilia; Baeza, Margarita; Gazmuri, Patricia; Muñoz, Luz Angélica; Vollrath, Antonia

    2014-01-01

    OBJECTIVE To analyze the effectiveness of the Chilean System of Childhood Welfare in transferring benefits to socially vulnerable families. METHODS A cross-sectional study with a sample of 132 families from the Metropolitan Region, Chile, stratified according to degree of social vulnerability, between September 2011 and January 2012. Semi-structured interviews were conducted with mothers of the studied families in public health facilities or their households. The variables studied were family structure, psychosocial risk in the family context and integrated benefits from the welfare system in families that fulfill the necessary requirements for transfer of benefits. Descriptive statistics to measure location and dispersion were calculated. A binary logistic regression, which accounts for the sample size of the study, was carried out. RESULTS The groups were homogenous regarding family size, the presence of biological father in the household, the number of relatives living in the same dwelling, income generation capacity and the rate of dependency and psychosocial risk (p ≥ 0.05). The transfer of benefits was low in all three groups of the sample (≤ 23.0%). The benefit with the best coverage in the system was the Single Family Subsidy, whose transfer was associated with the size of the family, the presence of relatives in the dwelling, the absence of the father in the household, a high rate of dependency and a high income generation capacity (p ≤ 0.10). CONCLUSIONS The effectiveness of benefit transfer was poor, especially in families that were extremely socially vulnerable. Further explanatory studies of benefit transfers to the vulnerable population, of differing intensity and duration, are required in order to reduce health disparities and inequalities. PMID:25119935

  18. Towards stressor-specific macroinvertebrate indices: Which traits and taxonomic groups are associated with vulnerable and tolerant taxa?

    PubMed

    Berger, Elisabeth; Haase, Peter; Schäfer, Ralf B; Sundermann, Andrea

    2018-04-01

    Monitoring of macroinvertebrate communities is frequently used to define the ecological health status of rivers. Ideally, biomonitoring should also give an indication on the major stressors acting on the macroinvertebrate communities supporting the selection of appropriate management measures. However, most indices are affected by more than one stressor. Biological traits (e.g. size, generation time, reproduction) could potentially lead to more stressor-specific indices. However, such an approach has rarely been tested. In this study we classify 324 macroinvertebrate taxa as vulnerable (decreasing abundances) or tolerant (increasing abundances) along 21 environmental gradients (i.e. nutrients, major ions, oxygen and micropollutants) from 422 monitoring sites in Germany using Threshold Indicator Taxa Analysis (TITAN). Subsequently, we investigate which biological traits and taxonomic groups are associated with taxa classified as vulnerable or tolerant with regard to specific gradients. The response of most taxa towards different gradients was similar and especially high for correlated gradients. Traits associated with vulnerable taxa across most gradients included: larval aquatic life stages, isolated cemented eggs, reproductive cycle per year <1, scrapers, aerial and aquatic active dispersal and plastron respiration. Traits associated with tolerant taxa included: adult aquatic life stages, polyvoltinism, ovoviviparity or egg clutches in vegetation, food preference for dead animals or living microinvertebrates, substrate preference for macrophytes, microphytes, silt or mud and a body size >2-4cm. Our results question whether stressor-specific indices based on macroinvertebrate assemblages can be achieved using single traits, because we observed that similar taxa responded to different gradients and also similar traits were associated with vulnerable and tolerant taxa across a variety of water quality gradients. Future studies should examine whether combinations of traits focusing on specific taxonomic groups achieve higher stressor specificity. Copyright © 2017 Elsevier B.V. All rights reserved.

  19. Identifying Electricity Capacity at Risk to Changes in Climate and Water Resources in the United States

    NASA Astrophysics Data System (ADS)

    Miara, A.; Macknick, J.; Vorosmarty, C. J.; Corsi, F.; Fekete, B. M.; Newmark, R. L.; Tidwell, V. C.; Cohen, S. M.

    2016-12-01

    Thermoelectric plants supply 85% of electricity generation in the United States. Under a warming climate, the performance of these power plants may be reduced, as thermoelectric generation is dependent upon cool ambient temperatures and sufficient water supplies at adequate temperatures. In this study, we assess the vulnerability and reliability of 1,100 operational power plants (2015) across the contiguous United States under a comprehensive set of climate scenarios (five Global Circulation Models each with four Representative Concentration Pathways). We model individual power plant capacities using the Thermoelectric Power and Thermal Pollution model (TP2M) coupled with the Water Balance Model (WBM) at a daily temporal resolution and 5x5 km spatial resolution. Together, these models calculate power plant capacity losses that account for geophysical constraints and river network dynamics. Potential losses at the single-plant level are put into a regional energy security context by assessing the collective system-level reliability at the North-American Electricity Reliability Corporation (NERC) regions. Results show that the thermoelectric sector at the national level has low vulnerability under the contemporary climate and that system-level reliability in terms of available thermoelectric resources relative to thermoelectric demand is sufficient. Under future climates scenarios, changes in water availability and warm ambient temperatures lead to constraints on operational capacity and increased vulnerability at individual power plant sites across all regions in the United States. However, there is a strong disparity in regional vulnerability trends and magnitudes that arise from each region's climate, hydrology and technology mix. Despite increases in vulnerabilities at the individual power plant level, regional energy systems may still be reliable (with no system failures) due to sufficient back-up reserve capacities.

  20. Vulnerability to mild predator stress in serotonin transporter knockout mice.

    PubMed

    Adamec, Robert; Burton, Paul; Blundell, Jacqueline; Murphy, Dennis L; Holmes, Andrew

    2006-06-03

    Effect of predator stress on rat and mouse anxiety-like behavior may model aspects of post traumatic stress disorder (PTSD). A single cat exposure of wild type (C57, CFW) mice can produce lasting anxiety-like effects in the elevated plus maze, light/dark box tests and startle. In addition, female but not male C57 mice are made more anxious in the plus maze by exposure to predator odors alone, suggesting differential vulnerability to predator stressors of differing intensity. There is a link between genetic variation in the serotonin (5-HT) transporter (SERT) and anxiety in humans. This prompted the generation of SERT knockout mice [see Holmes A, Murphy DL, Crawley, JN. Biol Psychiatry 2003;54(10):953-9]. Present work used these mice to determine if there was a link between vulnerability to the anxiogenic effects of predator odors and abnormalities of 5-HT transmission induced by a life long reduction in 5-HT reuptake. Wild type (WT, C57 background), heterozygous (SERT +/-, HET) mice and homozygous knockout (SERT -/-, KO) were assigned to handled control groups or groups exposed for 10 min to a large testing room rich in cat odor. One week after handling or room exposure, anxiety testing took place in the dark phase of the light/dark cycle, in red light. Predator odor exposure was selectively anxiogenic in the plus maze and light/dark box tests in SERT -/- mice. Exposure to predator odor did not potentiate startle. Findings suggest a role for abnormalities in 5-HT transmission in vulnerability to some of the lasting anxiogenic effects of species relevant stressors and possibly in vulnerability to PTSD.

  1. Variations in population vulnerability to tectonic and landslide-related tsunami hazards in Alaska

    USGS Publications Warehouse

    Wood, Nathan J.; Peters, Jeff

    2015-01-01

    Effective tsunami risk reduction requires an understanding of how at-risk populations are specifically vulnerable to tsunami threats. Vulnerability assessments primarily have been based on single hazard zones, even though a coastal community may be threatened by multiple tsunami sources that vary locally in terms of inundation extents and wave arrival times. We use the Alaskan coastal communities of Cordova, Kodiak, Seward, Valdez, and Whittier (USA), as a case study to explore population vulnerability to multiple tsunami threats. We use anisotropic pedestrian evacuation models to assess variations in population exposure as a function of travel time out of hazard zones associated with tectonic and landslide-related tsunamis (based on scenarios similar to the 1964 M w9.2 Good Friday earthquake and tsunami disaster). Results demonstrate that there are thousands of residents, employees, and business customers in tsunami hazard zones associated with tectonically generated waves, but that at-risk individuals will likely have sufficient time to evacuate to high ground before waves are estimated to arrive 30–60 min after generation. Tsunami hazard zones associated with submarine landslides initiated by a subduction zone earthquake are smaller and contain fewer people, but many at-risk individuals may not have enough time to evacuate as waves are estimated to arrive in 1–2 min and evacuations may need to occur during earthquake ground shaking. For all hazard zones, employees and customers at businesses far outnumber residents at their homes and evacuation travel times are highest on docks and along waterfronts. Results suggest that population vulnerability studies related to tsunami hazards should recognize non-residential populations and differences in wave arrival times if emergency managers are to develop realistic preparedness and outreach efforts.

  2. Complexities of holistic community-based participatory research for a low income, multi-ethnic population exposed to multiple built-environment stressors in Worcester, Massachusetts.

    PubMed

    Downs, Timothy J; Ross, Laurie; Patton, Suzanne; Rulnick, Sarah; Sinha, Deb; Mucciarone, Danielle; Calvache, Maria; Parmenter, Sarah; Subedi, Rajendra; Wysokenski, Donna; Anderson, Erin; Dezan, Rebecca; Lowe, Kate; Bowen, Jennifer; Tejani, Amee; Piersanti, Kelly; Taylor, Octavia; Goble, Robert

    2009-11-01

    Low income, multi-ethnic communities in Main South/Piedmont neighborhoods of Worcester, Massachusetts are exposed to cumulative, chronic built-environment stressors, and have limited capacity to respond, magnifying their vulnerability to adverse health outcomes. "Neighborhood STRENGTH", our community-based participatory research (CBPR) project, comprised four partners: a youth center; an environmental non-profit; a community-based health center; and a university. Unlike most CBPR projects that are single topic-focused, our 'holistic', systems-based project targeted five priorities. The three research-focused/action-oriented components were: (1) participatory monitoring of indoor and outdoor pollution; (2) learning about health needs and concerns of residents through community-based listening sessions; (3) engaging in collaborative survey work, including a household vulnerability survey and an asthma prevalence survey for schoolchildren. The two action-focused/research-informed components were: (4) tackling persistent street trash and illegal dumping strategically; and (5) educating and empowering youth to promote environmental justice. We used a coupled CBPR-capacity building approach to design, vulnerability theory to frame, and mixed methods: quantitative environmental testing and qualitative surveys. Process and outcomes yielded important lessons: vulnerability theory helps frame issues holistically; having several topic-based projects yielded useful information, but was hard to manage and articulate to the public; access to, and engagement with, the target population was very difficult and would have benefited greatly from having representative residents who were paid at the partners' table. Engagement with residents and conflict burden varied highly across components. Notwithstanding, we built enabling capacity, strengthened our understanding of vulnerability, and are able to share valuable experiential knowledge.

  3. Natural and Artificial (fluorescent) Tracers to Characterise Hydrogeological Functioning and to Protect Karst Aquifers

    NASA Astrophysics Data System (ADS)

    Andreo, B.; Mudarra, M.; Marin, A. I.; Barberá, J. A.

    2012-12-01

    The hydrogeological functioning and response of karst aquifers can be determined by the joint use of natural hydrogeochemical tracers, especially total organic carbon (TOC) and intrinsic fluorescence of water, together with artificial (fluorescent) tracers, under the same hydrodynamic conditions. Sharp and rapid variations in discharge, temperature, electrical conductivity and water chemistry, particularly of natural tracers of infiltration (TOC, intrinsic fluorescence and NO3-) recorded in karst spring water, confirm the existence of well developed karst conduits in the sector of the aquifer being drained, with rapid flows and very short water transit times from the surface to the springs (Mudarra et al., 2011). This is in agreement with the evidence obtained from breakthrough curves of fluorescent dye tracers (uranine, eosine, etc.). However, time lags between maximum concentrations of natural (especially TOC and intrinsic fluorescence) and artificial tracers show that the global system response is faster than that produced from a recharge concentrated at a point on the surface, even in karst sinkholes. Response and transit times of water through the karst can be calculated using both natural and artificial tracers, but flow velocities can really only be quantified using artificial tracers. Analysis of the responses obtained by natural tracers of infiltration (global system response) and artificial tracers (single response) in karst waters has revealed the usefulness and complementarity of both techniques for characterising the hydrogeological functioning of karst aquifers and, even more important, for validating contamination vulnerability mapping in these medium (Zwahlen, 2004; Andreo et al., 2006). In recent decades, several methods have been developed for such vulnerability mapping, but little progress has been made in validating their results. This validation is essential for the adequate protection of water resources in karst media, as has been shown in recent research (Marin et al., 2012; Ravbar et al., 2012). References: Andreo B, Goldscheider N, Vadillo I, Vías JM, Neukum C, Sinreich M, Jiménez P, Brechenmacher J, Carrasco F, Hötzl H, Perles MJ, Zwahlen F (2006a): Karst groundwater protection: First application of a Pan-European Approach to vulnerability, hazard and risk mapping in the Sierra de Líbar (Southern Spain). Science of the Total Environment, 357 1-3: 54-73. Marín AI, Andreo B and Dörfliger N (2012): Comparative application of two methods (COP and PaPRIKa) for groundwater vulnerability mapping in Mediterranean karst aquifers (France and Spain). Environmental Earth Sciences, 65: 2407-2421. Mudarra M, Andreo B and Baker A (2011): Characterisation of dissolved organic matter in karst spring waters using intrinsic fluorescence: Relationship with infiltration processes. Science of Total Environment, 40: 3448-3462. Ravbar N, Barberá JA, Petric M, Kogovsek J and Andreo B (2012): Study of hydrodynamic behaviour of a complex karst system under low-flow conditions using natural and artificial tracers (springs of the Unica River, SW Slovenia Environmental Earth Sciences, 65: 2259-2272. Zwahlen F -Editor- (2004). Vulnerability and risk mapping for the protection of carbonate (karst) aquifers, final report (COST action 620). - European Commission, Directorate-General XII Science, Research and Development: 297 pp.

  4. Extreme rainfall, vulnerability and risk: a continental-scale assessment for South America.

    PubMed

    Vörösmarty, Charles J; Bravo de Guenni, Lelys; Wollheim, Wilfred M; Pellerin, Brian; Bjerklie, David; Cardoso, Manoel; D'Almeida, Cassiano; Green, Pamela; Colon, Lilybeth

    2013-11-13

    Extreme weather continues to preoccupy society as a formidable public safety concern bearing huge economic costs. While attention has focused on global climate change and how it could intensify key elements of the water cycle such as precipitation and river discharge, it is the conjunction of geophysical and socioeconomic forces that shapes human sensitivity and risks to weather extremes. We demonstrate here the use of high-resolution geophysical and population datasets together with documentary reports of rainfall-induced damage across South America over a multi-decadal, retrospective time domain (1960-2000). We define and map extreme precipitation hazard, exposure, affectedpopulations, vulnerability and risk, and use these variables to analyse the impact of floods as a water security issue. Geospatial experiments uncover major sources of risk from natural climate variability and population growth, with change in climate extremes bearing a minor role. While rural populations display greatest relative sensitivity to extreme rainfall, urban settings show the highest rates of increasing risk. In the coming decades, rapid urbanization will make South American cities the focal point of future climate threats but also an opportunity for reducing vulnerability, protecting lives and sustaining economic development through both traditional and ecosystem-based disaster risk management systems.

  5. Nutritional vulnerability seen within asylum seekers in Australia.

    PubMed

    O'Reilly, Sharleen; O'Shea, Tess; Bhusumane, Sibusiso

    2012-04-01

    To examine the extent of nutritional vulnerability seen in a cohort of asylum seekers in Australia. Twenty-one asylum seekers (15 males, 6 females) that used a food bank were interviewed over a 6 week period at the Melbourne based Asylum Seeker Resource Centre about foods consumed in the previous 24-h and any non food bank foods obtained. A basket audit was conducted after participants accessed the food bank on the day of interview, Participants obtained significantly less than the minimum requirements for the Australian Guide to Healthy Eating in the vegetables and legumes (P < .001, 95% CI -3.5, -1.7) fruits (P < .001, 95% CI -1.7, -.1.2), dairy (P < .001, 95% CI -1.8, -1.5) and meat and meat alternatives core food groups (P = .001, 95% CI -0.8, -0.3) using foods accessed from the food bank, their primary or sole food source. A high level of nutritional vulnerability was seen in this cohort due to their inability to meet minimum nutritional requirements from their primary food access point. Health professionals working with asylum seeker populations need to be aware of this issue and the resulting potential for longer term ill health as a consequence.

  6. Impact of heterogeneity on groundwater salinization due to coastal pumping

    NASA Astrophysics Data System (ADS)

    Yu, X.; Michael, H. A.

    2017-12-01

    Groundwater abstraction causes and accelerates seawater intrusion in many coastal areas. In heterogeneous aquifers, preferential flow paths can lead to fast intrusion, while low permeability layers can serve as barriers. The extent to which different types of heterogeneous aquifers are vulnerable to pumping-induced seawater intrusion has not been well studied. Here we show that the connectedness of pumping location and local boundary condition drive salinization patterns. Salinization patterns in homogeneous aquifers were relatively simple and only related to the hydraulic properties and pumping rate. The salinization rates and patterns in heterogeneous aquifers were much more complicated and related to pumping location, rate and depth, preferential flow path locations, and local boundary conditions. An intrusion classification approach was developed with three types in homogeneous aquifers and four types in heterogeneous aquifers. After classification the main factors of salinized areas, intrusion rates and salinization time could be identified. The ranges of these salinization assessment criteria suggested different aspect of groundwater vulnerability in each class. We anticipate the classification approach to be a starting point for more comprehensive groundwater abstraction vulnerability assessment (including consideration of pumping rates, locations and depths, connectivity, preferential flow paths, etc.), which is critical for coastal water resources management.

  7. Does topological information matter for power grid vulnerability?

    PubMed

    Ouyang, Min; Yang, Kun

    2014-12-01

    Power grids, which are playing an important role in supporting the economy of a region as well as the life of its citizens, could be attacked by terrorists or enemies to damage the region. Depending on different levels of power grid information collected by the terrorists, their attack strategies might be different. This paper groups power grid information into four levels: no information, purely topological information (PTI), topological information with generator and load nodes (GLNI), and full information (including component physical properties and flow parameters information), and then identifies possible attack strategies for each information level. Analyzing and comparing power grid vulnerability under these attack strategies from both terrorists' and utility companies' point of view give rise to an approach to quantify the relative values of these three types of information, including PTI, GLNI, and component parameter information (CPI). This approach can provide information regarding the extent to which topological information matters for power system vulnerability decisions. Taking several test systems as examples, results show that for small attacks with p ≤ 0.1, CPI matters the most; when taking attack cost into consideration and assuming that the terrorists take the optimum cost-efficient attack intensity, then CPI has the largest cost-based information value.

  8. Earthquake Macro-zonation Based Peak Ground Acceleration, Modified Mercalli Intensity, And Type of Rocks around Matano Fault

    NASA Astrophysics Data System (ADS)

    Karnaen, Muh; Suriamihardja, D. A.; Maulana, A.; Jaya, A.

    2018-03-01

    This study aims to determine earthquake vulnerable zones. We conducted research on earthquake macro-zonation based on PGA, Modified Mercalli Intensity (MMI), and type of rocks around Matano Fault in the area of 1.60 S to 2.990 S and 120.50 E to 122.470 E. We have acquired Maximum PGA and Modified Mercalli Intensity (MMI) for each observation point on the ground from the four major earthquake events. The empirical model is used due to lack of acceleration data recorded. We tried some empirical methods, but the McGuire method is found to be acceptable for this area. The result gives the maximum variation of PGA which is ranged between 18.40 - 363.54 gals. While the variation of MMI using empirical Wald attenuation gives values ranging from 2.9 - 7.7 MMI. The most vulnerable zone is located around Sorowako city with PGA value of 326.55 gals and MMI value of 7.5 MMI. This area is between ultra-basic rock and metamorphic rock formation. The vulnerable zone is near largest earthquake 6.2 M on 15-02-2011.

  9. Does topological information matter for power grid vulnerability?

    NASA Astrophysics Data System (ADS)

    Ouyang, Min; Yang, Kun

    2014-12-01

    Power grids, which are playing an important role in supporting the economy of a region as well as the life of its citizens, could be attacked by terrorists or enemies to damage the region. Depending on different levels of power grid information collected by the terrorists, their attack strategies might be different. This paper groups power grid information into four levels: no information, purely topological information (PTI), topological information with generator and load nodes (GLNI), and full information (including component physical properties and flow parameters information), and then identifies possible attack strategies for each information level. Analyzing and comparing power grid vulnerability under these attack strategies from both terrorists' and utility companies' point of view give rise to an approach to quantify the relative values of these three types of information, including PTI, GLNI, and component parameter information (CPI). This approach can provide information regarding the extent to which topological information matters for power system vulnerability decisions. Taking several test systems as examples, results show that for small attacks with p ≤ 0.1, CPI matters the most; when taking attack cost into consideration and assuming that the terrorists take the optimum cost-efficient attack intensity, then CPI has the largest cost-based information value.

  10. Critical concepts in elder abuse research.

    PubMed

    Goergen, Thomas; Beaulieu, Marie

    2013-08-01

    This paper identifies core elements in principal definitions of elder abuse or mistreatment of older adults (EA/MOA) and discusses the relevance of four crucial concepts: age, vulnerability, trust, and power balance in relationships. A critical analysis of selected literature in EA/MOA with a focus on works from the last 10 years. Current definitions of EA/MOA share commonalities regarding an understanding of elder abuse as a status offence, the inclusion of both acts and omissions, and the consideration of multiple levels of behavior and its effects. Definitions differ with regard to aspects as crucial as the intentionality of an abusive action and its actual or potential harmful effects. EA/MOA can be considered as a complex subtype of victimization in later life limited to victim-perpetrator relationships, where the perpetrator has assumed responsibility for the victim, the victim puts trust in the offender, or the role assigned to the offending person creates the perception and expectation that the victim may trust the perpetrator. Vulnerability is identified as a key variable in EA/MOA theory and research. With regard to neglect, the mere possibility of being neglected presupposes a heightened level of vulnerability. Power imbalance often characterizes victim - perpetrator relationships but is not a necessary characteristic of abuse. Research on EA/MOA needs conceptual development. Confining phenomena of EA/MOA to specific relationships and tying them to notions of vulnerability has implications for research design and sampling and points to the limits of population-based victimization surveys.

  11. Using cyber vulnerability testing techniques to expose undocumented security vulnerabilities in DCS and SCADA equipment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pollet, J.

    2006-07-01

    This session starts by providing an overview of typical DCS (Distributed Control Systems) and SCADA (Supervisory Control and Data Acquisition) architectures, and exposes cyber security vulnerabilities that vendors never admit, but are found through a comprehensive cyber testing process. A complete assessment process involves testing all of the layers and components of a SCADA or DCS environment, from the perimeter firewall all the way down to the end devices controlling the process, including what to look for when conducting a vulnerability assessment of real-time control systems. The following systems are discussed: 1. Perimeter (isolation from corporate IT or other non-criticalmore » networks) 2. Remote Access (third Party access into SCADA or DCS networks) 3. Network Architecture (switch, router, firewalls, access controls, network design) 4. Network Traffic Analysis (what is running on the network) 5. Host Operating Systems Hardening 6. Applications (how they communicate with other applications and end devices) 7. End Device Testing (PLCs, RTUs, DCS Controllers, Smart Transmitters) a. System Discovery b. Functional Discovery c. Attack Methodology i. DoS Tests (at what point does the device fail) ii. Malformed Packet Tests (packets that can cause equipment failure) iii. Session Hijacking (do anything that the operator can do) iv. Packet Injection (code and inject your own SCADA commands) v. Protocol Exploitation (Protocol Reverse Engineering / Fuzzing) This paper will provide information compiled from over five years of conducting cyber security testing on control systems hardware, software, and systems. (authors)« less

  12. Grapevine acclimation to water deficit: the adjustment of stomatal and hydraulic conductance differs from petiole embolism vulnerability.

    PubMed

    Hochberg, Uri; Bonel, Andrea Giulia; David-Schwartz, Rakefet; Degu, Asfaw; Fait, Aaron; Cochard, Hervé; Peterlunger, Enrico; Herrera, Jose Carlos

    2017-06-01

    Drought-acclimated vines maintained higher gas exchange compared to irrigated controls under water deficit; this effect is associated with modified leaf turgor but not with improved petiole vulnerability to cavitation. A key feature for the prosperity of plants under changing environments is the plasticity of their hydraulic system. In the present research we studied the hydraulic regulation in grapevines (Vitis vinifera L.) that were first acclimated for 39 days to well-watered (WW), sustained water deficit (SD), or transient-cycles of dehydration-rehydration-water deficit (TD) conditions, and then subjected to varying degrees of drought. Vine development under SD led to the smallest leaves and petioles, but the TD vines had the smallest mean xylem vessel and calculated specific conductivity (k ts ). Unexpectedly, both the water deficit acclimation treatments resulted in vines more vulnerable to cavitation in comparison to WW, possibly as a result of developmental differences or cavitation fatigue. When exposed to drought, the SD vines maintained the highest stomatal (g s ) and leaf conductance (k leaf ) under low stem water potential (Ψ s ), despite their high xylem vulnerability and in agreement with their lower turgor loss point (Ψ TLP ). These findings suggest that the down-regulation of k leaf and g s is not associated with embolism, and the ability of drought-acclimated vines to maintain hydraulic conductance and gas exchange under stressed conditions is more likely associated with the leaf turgor and membrane permeability.

  13. Engineering a horseradish peroxidase C stable to radical attacks by mutating multiple radical coupling sites.

    PubMed

    Kim, Su Jin; Joo, Jeong Chan; Song, Bong Keun; Yoo, Young Je; Kim, Yong Hwan

    2015-04-01

    Peroxidases have great potential as industrial biocatalysts. In particular, the oxidative polymerization of phenolic compounds catalyzed by peroxidases has been extensively examined because of the advantage of this method over other conventional chemical methods. However, the industrial application of peroxidases is often limited because of their rapid inactivation by phenoxyl radicals during oxidative polymerization. In this work, we report a novel protein engineering approach to improve the radical stability of horseradish peroxidase isozyme C (HRPC). Phenylalanine residues that are vulnerable to modification by the phenoxyl radicals were identified using mass spectrometry analysis. UV-Vis and CD spectra showed that radical coupling did not change the secondary structure or the active site of HRPC. Four phenylalanine (Phe) residues (F68, F142, F143, and F179) were each mutated to alanine residues to generate single mutants to examine the role of these sites in radical coupling. Despite marginal improvement of radical stability, each single mutant still exhibited rapid radical inactivation. To further reduce inactivation by radical coupling, the four substitution mutations were combined in F68A/F142A/F143A/F179A. This mutant demonstrated dramatic enhancement of radical stability by retaining 41% of its initial activity compared to the wild-type, which was completely inactivated. Structure and sequence alignment revealed that radical-vulnerable Phe residues of HPRC are conserved in homologous peroxidases, which showed the same rapid inactivation tendency as HRPC. Based on our site-directed mutagenesis and biochemical characterization, we have shown that engineering radical-vulnerable residues to eliminate multiple radical coupling can be a good strategy to improve the stability of peroxidases against radical attack. © 2014 Wiley Periodicals, Inc.

  14. Enhanced vulnerability of human proteins towards disease-associated inactivation through divergent evolution.

    PubMed

    Medina-Carmona, Encarnación; Fuchs, Julian E; Gavira, Jose A; Mesa-Torres, Noel; Neira, Jose L; Salido, Eduardo; Palomino-Morales, Rogelio; Burgos, Miguel; Timson, David J; Pey, Angel L

    2017-09-15

    Human proteins are vulnerable towards disease-associated single amino acid replacements affecting protein stability and function. Interestingly, a few studies have shown that consensus amino acids from mammals or vertebrates can enhance protein stability when incorporated into human proteins. Here, we investigate yet unexplored relationships between the high vulnerability of human proteins towards disease-associated inactivation and recent evolutionary site-specific divergence of stabilizing amino acids. Using phylogenetic, structural and experimental analyses, we show that divergence from the consensus amino acids at several sites during mammalian evolution has caused local protein destabilization in two human proteins linked to disease: cancer-associated NQO1 and alanine:glyoxylate aminotransferase, mutated in primary hyperoxaluria type I. We demonstrate that a single consensus mutation (H80R) acts as a disease suppressor on the most common cancer-associated polymorphism in NQO1 (P187S). The H80R mutation reactivates P187S by enhancing FAD binding affinity through local and dynamic stabilization of its binding site. Furthermore, we show how a second suppressor mutation (E247Q) cooperates with H80R in protecting the P187S polymorphism towards inactivation through long-range allosteric communication within the structural ensemble of the protein. Our results support that recent divergence of consensus amino acids may have occurred with neutral effects on many functional and regulatory traits of wild-type human proteins. However, divergence at certain sites may have increased the propensity of some human proteins towards inactivation due to disease-associated mutations and polymorphisms. Consensus mutations also emerge as a potential strategy to identify structural hot-spots in proteins as targets for pharmacological rescue in loss-of-function genetic diseases. © The Author 2017. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  15. Estimating Total Heliospheric Magnetic Flux from Single-Point in Situ Measurements

    NASA Technical Reports Server (NTRS)

    Owens, M. J.; Arge, C. N.; Crooker, N. U.; Schwardron, N. A.; Horbury, T. S.

    2008-01-01

    A fraction of the total photospheric magnetic flux opens to the heliosphere to form the interplanetary magnetic field carried by the solar wind. While this open flux is critical to our understanding of the generation and evolution of the solar magnetic field, direct measurements are generally limited to single-point measurements taken in situ by heliospheric spacecraft. An observed latitude invariance in the radial component of the magnetic field suggests that extrapolation from such single-point measurements to total heliospheric magnetic flux is possible. In this study we test this assumption using estimates of total heliospheric flux from well-separated heliospheric spacecraft and conclude that single-point measurements are indeed adequate proxies for the total heliospheric magnetic flux, though care must be taken when comparing flux estimates from data collected at different heliocentric distances.

  16. The validity of multiphase DNS initialized on the basis of single--point statistics

    NASA Astrophysics Data System (ADS)

    Subramaniam, Shankar

    1999-11-01

    A study of the point--process statistical representation of a spray reveals that single--point statistical information contained in the droplet distribution function (ddf) is related to a sequence of single surrogate--droplet pdf's, which are in general different from the physical single--droplet pdf's. The results of this study have important consequences for the initialization and evolution of direct numerical simulations (DNS) of multiphase flows, which are usually initialized on the basis of single--point statistics such as the average number density in physical space. If multiphase DNS are initialized in this way, this implies that even the initial representation contains certain implicit assumptions concerning the complete ensemble of realizations, which are invalid for general multiphase flows. Also the evolution of a DNS initialized in this manner is shown to be valid only if an as yet unproven commutation hypothesis holds true. Therefore, it is questionable to what extent DNS that are initialized in this manner constitute a direct simulation of the physical droplets.

  17. Nonrigid motion compensation in B-mode and contrast enhanced ultrasound image sequences of the carotid artery

    NASA Astrophysics Data System (ADS)

    Carvalho, Diego D. B.; Akkus, Zeynettin; Bosch, Johan G.; van den Oord, Stijn C. H.; Niessen, Wiro J.; Klein, Stefan

    2014-03-01

    In this work, we investigate nonrigid motion compensation in simultaneously acquired (side-by-side) B-mode ultrasound (BMUS) and contrast enhanced ultrasound (CEUS) image sequences of the carotid artery. These images are acquired to study the presence of intraplaque neovascularization (IPN), which is a marker of plaque vulnerability. IPN quantification is visualized by performing the maximum intensity projection (MIP) on the CEUS image sequence over time. As carotid images contain considerable motion, accurate global nonrigid motion compensation (GNMC) is required prior to the MIP. Moreover, we demonstrate that an improved lumen and plaque differentiation can be obtained by averaging the motion compensated BMUS images over time. We propose to use a previously published 2D+t nonrigid registration method, which is based on minimization of pixel intensity variance over time, using a spatially and temporally smooth B-spline deformation model. The validation compares displacements of plaque points with manual trackings by 3 experts in 11 carotids. The average (+/- standard deviation) root mean square error (RMSE) was 99+/-74μm for longitudinal and 47+/-18μm for radial displacements. These results were comparable with the interobserver variability, and with results of a local rigid registration technique based on speckle tracking, which estimates motion in a single point, whereas our approach applies motion compensation to the entire image. In conclusion, we evaluated that the GNMC technique produces reliable results. Since this technique tracks global deformations, it can aid in the quantification of IPN and the delineation of lumen and plaque contours.

  18. CONTRIBUTION OF NUTRIENTS AND E.COLI TO SURFACE WATER CONDITION IN THE OZARKS: PART II USING LANDSCAPE ECOLOGY AND PARTIAL LEAST SQUARES PREDICTIONS TO MAP WATERSHEDS THAT ARE VULNERABLE TO NON-POINT SOURCE POLLUTION

    EPA Science Inventory

    The results of this project provide watershed managers with the first broad-scale predictions that can be used to explain how land cover type, land cover configuration, environmental change, and human activities may affect the chemical and biological characteristics of surface wa...

  19. LAVA: Large scale Automated Vulnerability Addition

    DTIC Science & Technology

    2016-05-23

    memory copy, e.g., are reasonable attack points. If the goal is to inject divide- by-zero, then arithmetic operations involving division will be...ways. First, it introduces deterministic record and replay , which can be used for iterated and expensive analyses that cannot be performed online... memory . Since our approach records the correspondence between source lines and program basic block execution, it would be just as easy to figure out

  20. 'Mobile men with money': HIV prevention and the erasure of difference.

    PubMed

    Aggleton, Peter; Bell, Stephen A; Kelly-Hanku, Angela

    2014-01-01

    Mobile Men with Money is one of the latest risk categories to enter into HIV prevention discourse. Used in countries in Asia, the Pacific and Africa, it refers to diverse groups of men (e.g. businessmen, miners and itinerant wage labourers) who, in contexts of high population movement and economic disparity, find themselves at heightened risk of HIV as members of a 'most-at-risk population', or render others vulnerable to infection. How adequate is such a description? Does it make sense to develop HIV prevention programmes from such understandings? The history of the epidemic points to major weaknesses in the use of terminologies such as 'sex worker' and 'men who have sex with men' when characterising often diverse populations. Each of these terms carries negative connotations, portraying the individuals concerned as being apart from the 'general population', and posing a threat to it. This paper examines the diversity of men classified as mobile men with money, pointing to significant variations in mobility, wealth and sexual networking conducive to HIV transmission. It highlights the patriarchal, heteronormative and gendered assumptions frequently underpinning use of the category and suggests more useful ways of understanding men, masculinity, population movement, relative wealth in relation to HIV vulnerability and risk.

  1. The inter-relationship between mood, self-esteem and response styles in adolescent offspring of bipolar parents: an experience sampling study.

    PubMed

    Pavlickova, Hana; Turnbull, Oliver H; Myin-Germeys, Inez; Bentall, Richard P

    2015-02-28

    The response styles theory of depression (Nolen-Hoeksema, 1991) proposes three main strategies individuals employ in response to low mood: rumination, active coping (distraction and problem-solving) and risk taking. Although recent research has suggested this theory has utility in understanding the symptoms of bipolar disorder (BD), the role of these processes in conferring vulnerability to the condition is poorly understood. Twenty-three adolescent children of patients with BD and 25 offspring of well parents completed the Experience Sampling Method (ESM; Csikszentmihalyi and Larson, 1987) diary for six days. Longitudinal analyses were carried out to examine inter-relationships between mood, self-esteem and response styles. Increased negative as well as positive mood resulted in greater rumination in both groups. Low self-esteem triggered greater risk-taking at the subsequent time point in the at-risk group, while negative affect instigated increased active coping in the control group. In both groups, engagement in risk-taking improved mood at the subsequent time point, whilst rumination dampened self-esteem. Differential longitudinal associations between mood, self-esteem and response styles between at-risk and control children suggest early psychological vulnerability in the offspring of BD parents, with important indications for early intervention. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  2. SEE Transient Response of Crane Interpoint Single Output Point of Load DC-DC Converters

    NASA Technical Reports Server (NTRS)

    Sanders, Anthony B.; Chen, Dakai; Kim, Hak S.; Phan, Anthony M.

    2011-01-01

    This study was undertaken to determine the single event effect and transient susceptibility of the Crane Interpoint Maximum Flexible Power (MFP) Single Output Point of Load DC/DC Converters for transient interruptions in the output signal and for destructive and non destructive events induced by exposing it to a heavy ion beam..

  3. Behavioral Adjustment of Toddler and Preschool-Aged Children with Single-Suture Craniosynostosis*

    PubMed Central

    Kapp-Simon, Kathleen A; Collett, Brent R; Barr-Schinzel, Michael A; Cradock, Mary M; Buono, Lauren A; Pietila, Kristen E; Speltz, Matthew L

    2012-01-01

    Background The purpose of this study was to confirm initial reports of elevated behavior problems in children with single-suture craniosynostosis (SSC), using multiple informants, longitudinal analyses and a control group. We hypothesized higher levels of maladjustment for children with SSC than comparison children, particularly at the older age and in selected areas of previously observed vulnerability: attention and social adjustment. Method A Child Behavior Checklist (CBCL) was completed when children were ~19 months by 436 mothers (219 with SSC) and 371 fathers (177 with SSC); and at ~37 months by 361 mothers (175 with SSC) and 303 fathers (142 with SSC). A minimum of one caregiver/teacher report was available for 169 of these children (74 with SSC) using the Caregiver-Teacher Report Form (CTRF). Results Average CBCL/CTRF externalizing, internalizing and total scores for all informants were consistently higher (worse) for children with SSC than control group children, but most differences were small and statistically non-significant. No differences associated with suture site were found. At the oldest age point, both mothers and fathers (but not teachers) generated higher average scores for patients than for controls on scales measuring attention and social problems, with small to medium effects sizes (0.20 to 0.32). Conclusion On average toddlers/preschoolers with SSC show behavioral development that is largely indistinguishable from same-aged peers of similar socioeconomic background. The predictive significance of small group differences in attention and social adjustment will be assessed in a follow-up of this cohort at age 7. PMID:22929249

  4. Infants and Toddlers in the Midst of an Opioid Crisis: A Busy Intersection on the Road to Well-Being

    ERIC Educational Resources Information Center

    Miriyala, Kalpana

    2018-01-01

    Opioid use in pregnancy and the postpartum period increases the vulnerability of the newborn in many ways. No single system can appropriately meet all the needs of this population. Due to the variety of systems that are involved, there are multiple opportunities for gaps in care. Thus, the systems of care must collaborate, communicate, and share…

  5. An Educational Intervention for Police and Firefighters for Elders at Risk: Limits of Education Alone as a Strategy for Behavior Change

    ERIC Educational Resources Information Center

    Nusbaum, N. J.; Mistretta, M.; Wegner, J.

    2007-01-01

    As part of a research project aimed at the health care needs of the vulnerable community-dwelling elderly, an educational intervention was delivered to police and firefighters in worksite settings. A single educational intervention proved insufficient to produce lasting attitudinal and behavioral change as measured by follow-up surveys 3 and 6…

  6. Electrically generated eddies at an eightfold stagnation point within a nanopore

    PubMed Central

    Sherwood, J. D.; Mao, M.; Ghosal, S.

    2014-01-01

    Electrically generated flows around a thin dielectric plate pierced by a cylindrical hole are computed numerically. The geometry represents that of a single nanopore in a membrane. When the membrane is uncharged, flow is due solely to induced charge electroosmosis, and eddies are generated by the high fields at the corners of the nanopore. These eddies meet at stagnation points. If the geometry is chosen correctly, the stagnation points merge to form a single stagnation point at which four streamlines cross at a point and eight eddies meet. PMID:25489206

  7. An Analysis of the Extent of Social Inclusion and Equity Consideration in Malawi's National HIV and AIDS Policy Review Process.

    PubMed

    Chinyama, Mathews Junior; MacLachlan, Malcolm; McVeigh, Joanne; Huss, Tessy; Gawamadzi, Sylvester

    2017-07-29

    Equity and social inclusion for vulnerable groups in policy development processes and resulting documents remain a challenge globally. Most often, the marginalization of vulnerable groups is overlooked in both the planning and practice of health service delivery. Such marginalization may occur because authorities deem the targeting of those who already have better access to healthcare a cheaper and easier way to achieve short-term health gains. The Government of Malawi wishes to achieve an equitable and inclusive HIV and AIDS Policy. The aim of this study is to assess the extent to which the Malawi Policy review process addressed regional and international health priorities of equity and social inclusion for vulnerable groups in the policy content and policy revision process. This research design comprised two phases. First, the content of the Malawi HIV and AIDS Policy was assessed using EquiFrame regarding its coverage of 21 Core Concepts of human rights and inclusion of 12 Vulnerable Groups. Second, the engagement of vulnerable groups in the policy process was assessed using the EquIPP matrix. For the latter, 10 interviews were conducted with a purposive sample of representatives of public sector, civil society organizations and development partners who participated in the policy revision process. Data was also collected from documented information of the policy processes. Our analyses indicated that the Malawi HIV and AIDS Policy had a relatively high coverage of Core Concepts of human rights and Vulnerable Groups; although with some notable omissions. The analyses also found that reasonable steps were taken to engage and promote participation of vulnerable groups in the planning, development, implementation, monitoring and evaluation processes of the HIV and AIDS Policy, although again, with some notable exceptions. This is the first study to use both EquiFrame and EquIPP as complimentary tools to assess the content and process of policy. While the findings indicate inclusive processes, commitment to Core Concepts of human rights and inclusion of Vulnerable Groups in relation to the Malawi HIV and AIDS Policy, the results also point to areas in which social inclusion and equity could be further strengthened. © 2018 The Author(s); Published by Kerman University of Medical Sciences. This is an open-access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

  8. Tsunami Risk in the NE Atlantic: Pilot Study for Algarve Portugal and Applications for future TWS

    NASA Astrophysics Data System (ADS)

    Omira, R.; Baptista, M. A.; Catita, C.; Carrilho, F.; Matias, L.

    2012-04-01

    Tsunami risk assessment is an essential component of any Tsunami Early Warning System due to its significant contribution to the disaster reduction by providing valuable information that serve as basis for mitigation preparedness and strategies. Generally, risk assessment combines the outputs of the hazard and the vulnerability assessment for considered exposed elements. In the NE Atlantic region, the tsunami hazard is relatively well established through compilation of tsunami historical events, evaluation of tsunamigenic sources and impact computations for site-specific coastal areas. While, tsunami vulnerability remains poorly investigated in spite of some few studies that focused on limited coastal areas of the Gulf of Cadiz region. This work seeks to present a pilot study for tsunami risk assessment that covers about 170 km of coasts of Algarve region, south of Portugal. This area of high coastal occupation and touristic activities was strongly impacted by the 1755 tsunami event as reported in various historical documents. An approach based upon a combination of tsunami hazard and vulnerability is developed in order to take into account the dynamic aspect of tsunami risk in the region that depends on the variation of hazard and vulnerability of exposed elements from a coastal point to other. Hazard study is based upon the consideration of most credible earthquake scenarios and the derivation of hazard maps through hydrodynamic modeling of inundation and tsunami arrival time. The vulnerability assessment is performed by: i) the analysis of the occupation and the population density, ii) derivation of evacuation maps and safe shelters, and iii) the analysis of population response and evacuation times. Different risk levels ranging from "low" to "high" are assigned to the coats of the studied area. Variation of human tsunami risk between the high and low touristic seasons is also considered in this study and aims to produce different tsunami risk-related scenarios. Results are presented in terms of thematic maps and GIS layers highlighting information on inundation depths and limits, evacuation plans and safe shelters, tsunami vulnerability, evacuation times and tsunami risk levels. Results can be used for national and regional tsunami disaster management and planning. This work is funded by TRIDEC (Collaborative, Complex and Critical Decision-Support in Evolving Crises) FP7, EU project and by MAREMOTI (Mareograph and field tsunami observations, modeling and vulnerability studies for Northeast Atlantic and western Mediterranean) French project. Keywords: Tsunami, Algarve-Portugal, Evacuation, Vulnerability, Risk

  9. Results of the round table "Impact of natural and man-made hazards on urban areas"

    NASA Astrophysics Data System (ADS)

    Bostenaru-Dan, Maria; Olga Gociman, Cristina; Hostiuc, Constantin; Mihaila, Marina; Gheorghe (Popovici), Diana Alexandra; Anghelache, Mirela Adriana; Dutu, Andreea; Tascu-Stavre, Miroslav

    2015-04-01

    On Thursday the 6th of November a round table was organised at the Centre of Architectural and Urban Studies of the "Ion Mincu" University of Architecture and Urban Planning on the topic of this session. It included a review of the previous editions, and an outlook to the edition this year. We shared publications, and a publication is in work from the round table itself. The series of round tables at the Centre of Architectural and Urban Studies is an innitiative of Constantin Hostiuc, the secretary general of the centre. This round table was organised by Maria Bostenaru Dan, and moderated by Cristina Olga Gociman, who currently runs a project on a related topic. From the various ways to approach the effects of hazards, up to the disatrous ones, on urban areas, we consider the most suitable the approach to the impact. From the point of view of natural sciences and of the engineering ones this was approached a number of times, and newly social sciences are included as well. The role of planning and design for a better prevention, and even post-disaster intervention is ignored many times though. The goal of the round table was to bring together multidisciplinary approaches (architecture, urban planning, seismology, geography, structural engineering, ecology, communication sciences, art history) on a problem set from this point of view. Discussed topics were: 1. Assessment and mapping methods of the impact of natural hazards on urban areas (preventive, postdisaster) 2. Visualisation and communication techniques of the assessed impact, including GIS, internet, 3D 3. Strategies for the reduction of the impact of natural hazards on urban areas 4. Suitable methods of urban design for the mitigation of the effects of disasters in multihazard case 5. Partnership models among the involved actors in the decision process for disaster mitigaton 6. Urban planning instruments for risc management strategies (ex. master plan) 7. Lessons learned from the relationship between hazard, vulnerability and impact in recent events 8. Investigation o urban morphology for better estimation of urban vulnerability (interaction between neighbouring buildings, the influence of the position of a building in the historical centre, ...) 9. Investigation of urban morphology to assess postdisaster accesibility of strategical buildings, the role of the urban pattern for emergency vehicles 11. Quantifying models of vulnerability through questionnaires based on point numbers - the role of statistics 12. Interactions between the urban systems which can increase/decrease vulnerability 13. The approach difference in the impact on protected urban areas as compared on common urban areas. 14. Keeping the memory in reconstruction/reshape efforts after disasters, the role of heritage habitat.

  10. Can Probability Maps of Swept-Source Optical Coherence Tomography Predict Visual Field Changes in Preperimetric Glaucoma?

    PubMed

    Lee, Won June; Kim, Young Kook; Jeoung, Jin Wook; Park, Ki Ho

    2017-12-01

    To determine the usefulness of swept-source optical coherence tomography (SS-OCT) probability maps in detecting locations with significant reduction in visual field (VF) sensitivity or predicting future VF changes, in patients with classically defined preperimetric glaucoma (PPG). Of 43 PPG patients, 43 eyes were followed-up on every 6 months for at least 2 years were analyzed in this longitudinal study. The patients underwent wide-field SS-OCT scanning and standard automated perimetry (SAP) at the time of enrollment. With this wide-scan protocol, probability maps originating from the corresponding thickness map and overlapped with SAP VF test points could be generated. We evaluated the vulnerable VF points with SS-OCT probability maps as well as the prevalence of locations with significant VF reduction or subsequent VF changes observed in the corresponding damaged areas of the probability maps. The vulnerable VF points were shown in superior and inferior arcuate patterns near the central fixation. In 19 of 43 PPG eyes (44.2%), significant reduction in baseline VF was detected within the areas of structural change on the SS-OCT probability maps. In 16 of 43 PPG eyes (37.2%), subsequent VF changes within the areas of SS-OCT probability map change were observed over the course of the follow-up. Structural changes on SS-OCT probability maps could detect or predict VF changes using SAP, in a considerable number of PPG eyes. Careful comparison of probability maps with SAP results could be useful in diagnosing and monitoring PPG patients in the clinical setting.

  11. Advancing national climate change risk assessment to deliver national adaptation plans

    NASA Astrophysics Data System (ADS)

    Warren, R. F.; Wilby, R. L.; Brown, K.; Watkiss, P.; Betts, Richard A.; Murphy, James M.; Lowe, Jason A.

    2018-06-01

    A wide range of climate vulnerability and risk assessments have been implemented using different approaches at different scales, some with a broad multi-sectoral scope and others focused on single risks or sectors. This paper describes the novel approach to vulnerability and risk assessment which was designed and put into practice in the United Kingdom's Second Climate Change Risk Assessment (CCRA2) so as to build upon its earlier assessment (CCRA1). First, we summarize and critique the CCRA1 approach, and second describe the steps taken in the CCRA2 approach in detail, providing examples of how each was applied in practice. Novel elements of the approach include assessment of both present day and future vulnerability, a focus on the urgency of adaptation action, and a structure focused around systems of receptors rather than conventional sectors. Both stakeholders and reviewers generally regarded the approach as successful in providing advice on current risks and future opportunities to the UK from climate change, and the fulfilment of statutory duty. The need for a well-supported and open suite of impact indicators going forward is highlighted. This article is part of the theme issue `Advances in risk assessment for climate change adaptation policy'.

  12. Risk-Reduction Strategies to Expand Radon Care Planning with Vulnerable Groups

    PubMed Central

    Larsson, Laura S.

    2016-01-01

    Objectives Radon is the second leading cause of lung cancer in the United States and the leading cause of lung cancer among nonsmokers. Residential radon is the cause of approximately 21,000 U.S. lung cancer deaths each year. Dangerous levels of radon are just as likely to be found in low-rise apartments and townhomes as single-family homes in the same area. The preferred radon mitigation strategy can be expensive and requires structural modifications to the home. The public health nurse (PHN) needs a collection of low-cost alternatives when working with low-income families or families who rent their homes. Method A review of the literature was performed to identify evidence-based methods to reduce radon risk with vulnerable populations. Results Fourteen recommendations for radon risk reduction were categorized into four strategies. Nine additional activities for raising awareness and increasing testing were also included. Discussion The results pair the PHN with practical interventions and the underlying rationale to develop radon careplans with vulnerable families across housing types. The PHN has both the competence and the access to help families reduce their exposure to this potent carcinogen. PMID:24547763

  13. Effects of acute thermal stress on the survival, predator avoidance, and physiology of juvenile fall Chinook salmon

    USGS Publications Warehouse

    Mesa, M.G.; Weiland, L.K.; Wagner, P.

    2002-01-01

    We subjected juvenile fall chinook salmon from the Hanford Reach of the Columbia River to acute thermal stressors in the laboratory that were derived from field data. We assessed the effects of thermal stress on: (1) the extent of direct mortality; (2) the vulnerability of fish to predation by smallmouth bass; and (3) some general physiological stress responses and synthesis of heat shock protein 70 (hsp70). Thermally-stressed fish showed little direct mortality and no increases in vulnerability to predation. However, these fish showed transient increases in plasma concentrations of cortisol, glucose, and lactate, and a dramatic (25-fold higher than controls) and persistent (lasting 2 wk) increase in levels of liver hsp70. Our results indicate that exposure of Hanford Reach juvenile fall chinook salmon to such stressors did not lead to significant increases in direct mortality or vulnerability to predation, but did alter physiological homeostasis, which should be of concern to those managing this resource. Because our fish received only a single exposure to one of the stressors we examined, we are also concerned about the consequences of exposing fish to multiple, cumulative stressors - a likely scenario for fish in the wild.

  14. Blastogenetic associations: General considerations.

    PubMed

    Lubinsky, Mark

    2015-11-01

    Associations of anomalies, with VACTERL as the prototype, have been the source of much debate, including questions about the validity and definition of this category. Evidence is presented for a teratologic basis for associations involving interactions between disruptive events and specific vulnerabilities. Because the embryo is organized in time and space, differences in the timing, location, and severity of exposures will create variable sequelae for any specific vulnerability, creating associations. The blastogenetic stage of development involves distinct properties that affect the nature of associations arising during this time, including relatively undifferentiated developmental fields and causally nonspecific malformations. With this, single anomalies can be part of the spectrum of findings that comprise a specific association. A specific defect defines a subset of disturbances, biasing frequencies of other defects. Processes are basic, integrated, and general, so disruptions are often lethal, and can have multiple effects, accounting for high incidences of multiple anomalies, and overlaps between associations. Blastogenetic disturbances also do not affect the late "fine tuning" of minor anomalies, although pathogenetic sequences can occur. This model suggests that certain combinations of congenital anomalies can arise from causally nonspecific teratogenetic fields determined by timing, location, and vulnerabilities, rather than polytopic developmental fields. © 2015 Wiley Periodicals, Inc.

  15. Risk-reduction strategies to expand radon care planning with vulnerable groups.

    PubMed

    Larsson, Laura S

    2014-01-01

    Radon is the second leading cause of lung cancer in the United States and the leading cause of lung cancer among nonsmokers. Residential radon is the cause of approximately 21,000 U.S. lung cancer deaths each year. Dangerous levels of radon are just as likely to be found in low-rise apartments and townhomes as single-family homes in the same area. The preferred radon mitigation strategy can be expensive and requires structural modifications to the home. The public health nurse (PHN) needs a collection of low-cost alternatives when working with low-income families or families who rent their homes. A review of the literature was performed to identify evidence-based methods to reduce radon risk with vulnerable populations. Fourteen recommendations for radon risk reduction were categorized into four strategies. Nine additional activities for raising awareness and increasing testing were also included. The results pair the PHN with practical interventions and the underlying rationale to develop radon careplans with vulnerable families across housing types. The PHN has both the competence and the access to help families reduce their exposure to this potent carcinogen. © 2014 Wiley Periodicals, Inc.

  16. DETAIL VIEW OF SINGLE PANEL POINTS TAKEN FROM BRIDGE DECK, ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    DETAIL VIEW OF SINGLE PANEL POINTS TAKEN FROM BRIDGE DECK, SHOWING CONNECTION BETWEEN VERTICAL AND UPPER CHORD MEMBER - White Bowstring Arch Truss Bridge, Spanning Yellow Creek at Cemetery Drive (Riverside Drive), Poland, Mahoning County, OH

  17. 76 FR 67200 - Prospective Grant of Exclusive License: Electron Paramagnetic Resonance Devices and Systems for...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-31

    ... that is a unique combination of: (1) multi-gradient Single Point Imaging involving global phase...-encoding gradients. The combination approach of single point imaging with the spin-echo signal detection...

  18. Alternative methods for CYP2D6 phenotyping: comparison of dextromethorphan metabolic ratios from AUC, single point plasma, and urine.

    PubMed

    Chen, Rui; Wang, Haotian; Shi, Jun; Hu, Pei

    2016-05-01

    CYP2D6 is a high polymorphic enzyme. Determining its phenotype before CYP2D6 substrate treatment can avoid dose-dependent adverse events or therapeutic failures. Alternative phenotyping methods of CYP2D6 were compared to aluate the appropriate and precise time points for phenotyping after single-dose and ultiple-dose of 30-mg controlled-release (CR) dextromethorphan (DM) and to explore the antimodes for potential sampling methods. This was an open-label, single and multiple-dose study. 21 subjects were assigned to receive a single dose of CR DM 30 mg orally, followed by a 3-day washout period prior to oral administration of CR DM 30 mg every 12 hours for 6 days. Metabolic ratios (MRs) from AUC∞ after single dosing and from AUC0-12h at steady state were taken as the gold standard. The correlations of metabolic ratios of DM to dextrorphan (MRDM/DX) values based on different phenotyping methods were assessed. Linear regression formulas were derived to calculate the antimodes for potential sample methods. In the single-dose part of the study statistically significant correlations were found between MRDM/DX from AUC∞ and from serial plasma points from 1 to 30 hours or from urine (all p-values < 0.001). In the multiple-dose part, statistically significant correlations were found between MRDM/DX from AUC0-12h on day 6 and MRDM/DX from serial plasma points from 0 to 36 hours after the last dosing (all p-values < 0.001). Based on reported urinary antimode and linear regression analysis, the antimodes of AUC and plasma points were derived to profile the trend of antimodes as the drug concentrations changed. MRDM/DX from plasma points had good correlations with MRDM/DX from AUC. Plasma points from 1 to 30 hours after single dose of 30-mg CR DM and any plasma point at steady state after multiple doses of CR DM could potentially be used for phenotyping of CYP2D6.

  19. The co-creation of meaningful action: bridging enaction and interactional sociology.

    PubMed

    De Jaegher, Hanne; Peräkylä, Anssi; Stevanovic, Melisa

    2016-05-05

    What makes possible the co-creation of meaningful action? In this paper, we go in search of an answer to this question by combining insights from interactional sociology and enaction. Both research schools investigate social interactions as such, and conceptualize their organization in terms of autonomy. We ask what it could mean for an interaction to be autonomous, and discuss the structures and processes that contribute to and are maintained in the so-called interaction order. We also discuss the role played by individual vulnerability as well as the vulnerability of social interaction processes in the co-creation of meaningful action. Finally, we outline some implications of this interdisciplinary fraternization for the empirical study of social understanding, in particular in social neuroscience and psychology, pointing out the need for studies based on dynamic systems approaches on origins and references of coordination, and experimental designs to help understand human co-presence. © 2016 The Authors.

  20. The vulnerablility for elder abuse among a sample of custodial grandfathers: an exploratory study.

    PubMed

    Bullock, Karen; Thomas, Rebecca L

    2007-01-01

    Older adults have been known to make sacrifices in their caregiving roles. Gerontology literature on custodial grandparents has primarily focused on grandmothers and the challenges they face when they assume primary care for grandchildren. Little is known about the risks that older men face when they become custodial grandparents. This article highlights types and warning signs of abuse, exploitation and neglect. Exploratory study was undertaken with a racially diverse group of custodial grandfathers to fill a gap in the literature about the vulnerability for elder abuse, exploitation and neglect as expressed by older Black, Latino and White custodial grandfathers. To provide a more inclusive understanding of elder abuse, areas of vulnerability were identified for consideration by practitioners, educators and researchers. The implications of this research point to the need to rethink elder abuse assessment, prevention and intervention strategies with older men.

  1. "There Are No Known Benefits . . .": Considering the Risk/Benefit Ratio of Qualitative Research.

    PubMed

    Opsal, Tara; Wolgemuth, Jennifer; Cross, Jennifer; Kaanta, Tanya; Dickmann, Ellyn; Colomer, Soria; Erdil-Moody, Zeynep

    2016-07-01

    Institutional review boards (IRBs) are responsible for weighing the risks and benefits of research participation. Qualitative researchers note numerous instances where IRB ethical frameworks fail to align with the ethics of their research projects and point out that IRB understandings of the benefits and risks of research often differ from those of the participants they seek to protect. This qualitative cross-case research investigates participants' interview experiences in six qualitative studies that differed in their methods, subject of focus, and populations. Our findings indicate that contemporary IRBs' use of population "vulnerability" and topic "sensitivity" to assess project risk does not adequately determine the benefits, risks, or ethicality of research. We recommend that IRBs treat as real the evidence for benefits in qualitative research, recognize that sensitivity and vulnerability do not predict risk, and encourage researchers to attend to relationships in their projects. © The Author(s) 2015.

  2. The co-creation of meaningful action: bridging enaction and interactional sociology

    PubMed Central

    Peräkylä, Anssi; Stevanovic, Melisa

    2016-01-01

    What makes possible the co-creation of meaningful action? In this paper, we go in search of an answer to this question by combining insights from interactional sociology and enaction. Both research schools investigate social interactions as such, and conceptualize their organization in terms of autonomy. We ask what it could mean for an interaction to be autonomous, and discuss the structures and processes that contribute to and are maintained in the so-called interaction order. We also discuss the role played by individual vulnerability as well as the vulnerability of social interaction processes in the co-creation of meaningful action. Finally, we outline some implications of this interdisciplinary fraternization for the empirical study of social understanding, in particular in social neuroscience and psychology, pointing out the need for studies based on dynamic systems approaches on origins and references of coordination, and experimental designs to help understand human co-presence. PMID:27069055

  3. Leveraging Social Links for Trust and Privacy in Networks

    NASA Astrophysics Data System (ADS)

    Cutillo, Leucio Antonio; Molva, Refik; Strufe, Thorsten

    Existing on-line social networks (OSN) such as Facebook suffer from several weaknesses regarding privacy and security due to their inherent handling of personal data. As pointed out in [4], a preliminary analysis of existing OSNs shows that they are subject to a number of vulnerabilities, ranging from cloning legitimate users to sybil attacks through privacy violations. Starting from these OSN vulnerabilities as the first step of a broader research activity, we came up with a new approach that is very promising in re-visiting security and privacy problems in distributed systems and networks. We suggest a solution that both aims at avoiding any centralized control and leverages on the real life trust between users, that is part of the social network application itself. An anonymization technique based on multi-hop routing among trusted nodes guarantees privacy in data access and, generally speaking, in all the OSN operations.

  4. Safe teleradiology: information assurance as project planning methodology.

    PubMed

    Collmann, Jeff; Alaoui, Adil; Nguyen, Dan; Lindisch, David

    2005-01-01

    The Georgetown University Medical Center Department of Radiology used a tailored version of OCTAVE, a self-directed information security risk assessment method, to design a teleradiology system that complied with the regulation implementing the security provisions of the Health Insurance Portability and Accountability Act (HIPAA) of 1996. The system addressed threats to and vulnerabilities in the privacy and security of protected health information. By using OCTAVE, Georgetown identified the teleradiology program's critical assets, described threats to the assurance of those assets, developed and ran vulnerability scans of a system pilot, evaluated the consequences of security breaches, and developed a risk management plan to mitigate threats to program assets, thereby implementing good information assurance practices. This case study illustrates the basic point that prospective, comprehensive planning to protect the privacy and security of an information system strategically benefits program management as well as system security.

  5. Pathogenic Policy: Immigrant Policing, Fear, and Parallel Medical Systems in the US South.

    PubMed

    Kline, Nolan

    2017-01-01

    Medical anthropology has a vital role in identifying health-related impacts of policy. In the United States, increasingly harsh immigration policies have formed a multilayered immigrant policing regime comprising state and federal laws and local police practices, the effects of which demand ethnographic attention. In this article, I draw from ethnographic fieldwork in Atlanta, Georgia, to examine the biopolitics of immigrant policing. I underscore how immigrant policing directly impacts undocumented immigrants' health by producing a type of fear based governance that alters immigrants' health behaviors and sites for seeking health services. Ethnographic data further point to how immigrant policing sustains a need for an unequal, parallel medical system, reflecting broader social inequalities impacting vulnerable populations. Moreover, by focusing on immigrant policing, I demonstrate the analytical utility in examining the biopolitics of fear, which can reveal individual experiences and structural influents of health-related vulnerability.

  6. Girls' math performance under stereotype threat: the moderating role of mothers' gender stereotypes.

    PubMed

    Tomasetto, Carlo; Alparone, Francesca Romana; Cadinu, Mara

    2011-07-01

    Previous research on stereotype threat in children suggests that making gender identity salient disrupts girls' math performance at as early as 5 to 7 years of age. The present study (n = 124) tested the hypothesis that parents' endorsement of gender stereotypes about math moderates girls' susceptibility to stereotype threat. Results confirmed that stereotype threat impaired girls' performance on math tasks among students from kindergarten through 2nd grade. Moreover, mothers' but not fathers' endorsement of gender stereotypes about math moderated girls' vulnerability to stereotype threat: performance of girls whose mothers strongly rejected the gender stereotype about math did not decrease under stereotype threat. These findings are important because they point to the role of mothers' beliefs in the development of girls' vulnerability to the negative effects of gender stereotypes about math. PsycINFO Database Record (c) 2011 APA, all rights reserved

  7. Fiber release from impacted graphite reinforced epoxy composites

    NASA Technical Reports Server (NTRS)

    Babinsky, T. C.

    1980-01-01

    Carbon fibers released from composites by aircraft fires and crashes can cause electrical shorts and consequent equipment damage. This report investigates less vigorous release mechanisms than that previously simulated by explosive burn/blast tests. When AS/3501-6 composites are impacted by various head and weight configurations of a pendulum impactor, less than 0.2 percent by weight of the original sample is released as single fibers. Other fiber release mechanisms studied were air blasts, constant airflow, torsion, flexural, and vibration of composite samples. The full significance of the low single fiber release rates found here is to be evaluated by NASA in their aircraft vulnerability studies.

  8. Assessing vulnerability mapping and protection zones of karst spring waters and validating by the joint use of natural and artificial tracers. The case of Auta Spring (Southern Spain)

    NASA Astrophysics Data System (ADS)

    Marín, Ana Isabel; Mudarra, Matías; Andreo, Bartolomé

    2016-04-01

    Delineation of protection zones for water supply and implementation of proper land-use practices in surrounding areas are crucial aspects for a sustainable use of valuable drinking water resources. This is even more important in karst aquifers, which are particularly sensitive to contamination, having a very low self-cleaning capacity due to their structure and hydrological behavior. Consequently, specific methodologies adapted to the particular characteristics of karst media are necessary. In this work, an approach for protection zoning of the pilot site of Auta karst spring (southern Spain) is proposed, based on the application of COP+K method for contamination vulnerability and validation of results by natural (organic) tracers of infiltration (NO3-, TOC, intrinsic fluorescence) and by a dye tracer test conducted on June, 2011 (injecting 500 mg uranine). The aquifer drained by Auta spring (8.5 km2) presents a complex geological structure, formed by Jurassic dolostones and limestones highly folded and fractured. Recharge takes place by the infiltration of rainfall through karst landforms and also by losses in an adjacent river when it flows over the carbonate outcrops (dye injection point). Drainage is mainly through several springs located at the southwest, including Auta spring and 5 overflow springs. The source vulnerability map obtained by applying COP+K method can be adopted as the baseline to delineate the protection zones, through the conversion from vulnerability classes to degrees of protection. Dye tracer test and natural tracers of infiltration corroborate that aquifer sectors influenced by the river can be extremely vulnerable to pollution, but also well-developed exokarst features. In fact, slight evidences of pollution have been detected during the study period, with relatively-high NO3- contents and high fluorescence linked to bacteriological activity in Auta spring water. The jointly use of natural and artificial tracers constitute a reliable and effective procedure for validating vulnerability mapping of karst systems and springs used for water supply. This procedure is meant to implement and to complement protection zone mapping, particularly in countries lacking guidelines for protecting the water resources of karst aquifers.

  9. Landscape Vulnerability Analysis from Historic Lower Mississippi River Flood in 2011

    NASA Astrophysics Data System (ADS)

    Goodwell, A. E.; Zhu, Z.; Dutta, D.; Greenberg, J.; Kumar, P.; Garcia, M. H.; Rhoads, B. L.; Parker, G.; Berretta, D.; Holmes, R. R.

    2012-12-01

    This study presents the results of a landscape vulnerability analysis of the Birds Point New Madrid Floodway in southeastern Missouri. The U.S. Army Corps of Engineers intentionally inundated 500 square kilometers of agricultural floodplain in May of 2011 as an emergency flood control measure. We use pre-flood (2005) and post-flood (2011) high resolution Lidar data to establish the landscape impact of the levee breach on the floodplain. The Lidar DEMs were corrected for flight line errors using a Fourier filtering technique, and then subtracted to obtain a differential DEM of erosion and deposition patterns. We use soil erosion characteristics, AVIRIS remote sensing data, and 2D floodplain modeling to analyze the three components of vulnerability: sensitivity, exposure, and adaptive capacity. HydroSed2D (Liu, Landry and García 2008), a 2D flow model, is implemented to simulate flow depths and speeds, or flood exposure, over the entire floodway, as well as smaller sections at increased resolution using a nested grid. We classify woody vegetation based on AVIRIS remote sensing data, and represent vegetated regions in the model as varied values of the Manning's n coefficient. Soil erodibility, vegetation, topography, and flow characteristics are compared to observed landscape changes within the floodplain. Overall, the floodway showed a remarkable resilience to an extreme flood event. When compared to levee breaches on similar rivers in other floods, the lack of newly deposited sediment is noticeable and likely attributable to the presence of a substantial riparian corridor between the main channel of the Mississippi River and the floodway. Although many meander scars indicating former channels of the Mississippi River are apparent in the topography, only one, known as O'Bryan Ridge, experienced high volumes of erosion and deposition due to the flooding. The vulnerability analysis supports the hypothesis this high impact is due to a combination of vulnerability factors such as high flow speed, few localized patches of vegetation, and high soil erodibility at this ridge compared to other similar meander scars. The methodology of this analysis can be used to locate regions of high vulnerability in future floodplain management and flood control, and mitigate potentially catastrophic landscape change.

  10. 6. DETAIL VIEW OF SINGLE PANEL POINTS TAKEN FROM BRIDGE ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    6. DETAIL VIEW OF SINGLE PANEL POINTS TAKEN FROM BRIDGE DECK, SHOWING CONNECTION BETWEEN VERTICAL AND UPPER CHORD MEMBER. - White Bowstring Arch Truss Bridge, Spanning Yellow Creek at Cemetery Drive (Riverside Drive), Poland, Mahoning County, OH

  11. Systems Reliability Framework for Surface Water Sustainability and Risk Management

    NASA Astrophysics Data System (ADS)

    Myers, J. R.; Yeghiazarian, L.

    2016-12-01

    With microbial contamination posing a serious threat to the availability of clean water across the world, it is necessary to develop a framework that evaluates the safety and sustainability of water systems in respect to non-point source fecal microbial contamination. The concept of water safety is closely related to the concept of failure in reliability theory. In water quality problems, the event of failure can be defined as the concentration of microbial contamination exceeding a certain standard for usability of water. It is pertinent in watershed management to know the likelihood of such an event of failure occurring at a particular point in space and time. Microbial fate and transport are driven by environmental processes taking place in complex, multi-component, interdependent environmental systems that are dynamic and spatially heterogeneous, which means these processes and therefore their influences upon microbial transport must be considered stochastic and variable through space and time. A physics-based stochastic model of microbial dynamics is presented that propagates uncertainty using a unique sampling method based on artificial neural networks to produce a correlation between watershed characteristics and spatial-temporal probabilistic patterns of microbial contamination. These results are used to address the question of water safety through several sustainability metrics: reliability, vulnerability, resilience and a composite sustainability index. System reliability is described uniquely though the temporal evolution of risk along watershed points or pathways. Probabilistic resilience describes how long the system is above a certain probability of failure, and the vulnerability metric describes how the temporal evolution of risk changes throughout a hierarchy of failure levels. Additionally our approach allows for the identification of contributions in microbial contamination and uncertainty from specific pathways and sources. We expect that this framework will significantly improve the efficiency and precision of sustainable watershed management strategies through providing a better understanding of how watershed characteristics and environmental parameters affect surface water quality and sustainability. With microbial contamination posing a serious threat to the availability of clean water across the world, it is necessary to develop a framework that evaluates the safety and sustainability of water systems in respect to non-point source fecal microbial contamination. The concept of water safety is closely related to the concept of failure in reliability theory. In water quality problems, the event of failure can be defined as the concentration of microbial contamination exceeding a certain standard for usability of water. It is pertinent in watershed management to know the likelihood of such an event of failure occurring at a particular point in space and time. Microbial fate and transport are driven by environmental processes taking place in complex, multi-component, interdependent environmental systems that are dynamic and spatially heterogeneous, which means these processes and therefore their influences upon microbial transport must be considered stochastic and variable through space and time. A physics-based stochastic model of microbial dynamics is presented that propagates uncertainty using a unique sampling method based on artificial neural networks to produce a correlation between watershed characteristics and spatial-temporal probabilistic patterns of microbial contamination. These results are used to address the question of water safety through several sustainability metrics: reliability, vulnerability, resilience and a composite sustainability index. System reliability is described uniquely though the temporal evolution of risk along watershed points or pathways. Probabilistic resilience describes how long the system is above a certain probability of failure, and the vulnerability metric describes how the temporal evolution of risk changes throughout a hierarchy of failure levels. Additionally our approach allows for the identification of contributions in microbial contamination and uncertainty from specific pathways and sources. We expect that this framework will significantly improve the efficiency and precision of sustainable watershed management strategies through providing a better understanding of how watershed characteristics and environmental parameters affect surface water quality and sustainability.

  12. Lake eutrophication and environmental change: A viability framework for resilience, vulnerability and adaptive capacity

    NASA Astrophysics Data System (ADS)

    Mathias, Jean-Denis; Rougé, Charles; Deffuant, Guillaume

    2013-04-01

    We present a simple stochastic model of lake eutrophication to demonstrate how the mathematical framework of viability theory fosters operational definitions of resilience, vulnerability and adaptive capacity, and then helps understand which response one should bring to environmental changes. The model represents the phosphorus dynamics, given that high concentrations trigger a regime change from oligotrophic to eutrophic, and causes ecological but also economic losses, for instance from tourism. Phosphorus comes from agricultural inputs upstream of the lake, and we will consider a stochastic input. We consider the system made of both the lake and its upstream region, and explore how to maintain the desirable ecological and economic properties of this system. In the viability framework, we translate these desirable properties into state constraints, then examine how, given the dynamics of the model and the available policy options, the properties can be kept. The set of states for which there exists a policy to keep the properties is called the viability kernel. We extend this framework to both major perturbations and long-term environmental changes. In our model, since the phosphorus inputs and outputs from the lake depend on rainfall, we will focus on extreme rainfall events and long-term changes in the rainfall regime. They can be described as changes in the state of the system, and may displace it outside the viability kernel. Its response can then be described using the concepts of resilience, vulnerability and adaptive capacity. Resilience is the capacity to recover by getting back to the viability kernel where the dynamics keep the system safe, and in this work we assume it to be the first objective of management. Computed for a given trajectory, vulnerability is a measure of the consequence of violating a property. We propose a family of functions from which cost functions and other vulnerability indicators can be derived for any trajectory. There can be several vulnerability functions, representing for instance social, economic or ecological vulnerability, and each representing the violation of the associated property, but these functions need to be ultimately aggregated as a single indicator. Due to the stochastic nature of the system, there is a range of possible trajectories. Statistics can be derived from the probability distribution of the vulnerability of the trajectories. Dynamic programming methods can then yield the policies which, among available policies, minimize a given trajectory. Thus, this viability framework gives indication on both the possible consequences of a hazard or an environmental change, and on the policies that can mitigate or avert it. It also enables to assess the benefits of extending the set of available policy options, and we define adaptive capacity as the reduction in a given vulnerability statistic due to the introduction of new policy options.

  13. Statistical Characteristics of Wrong-Way Driving Crashes on Illinois Freeways.

    PubMed

    Zhou, Huaguo; Zhao, Jiguang; Pour-Rouholamin, Mahdi; Tobias, Priscilla A

    2015-01-01

    Driving the wrong way on freeways, namely wrong-way driving (WWD), has been found to be a major concern for more than 6 decades. The purpose of this study was to identify characteristics of this type of crash as well as to rank the locations/interchanges according to their vulnerability to WWD entries. The WWD crash data on Illinois freeways were statistically analyzed for a 6-year time period (2004 to 2009) from 3 aspects: crash, vehicle, and person. The temporal distributions, geographical distributions, roadway characteristics, and crash locations were analyzed for WWD crashes. The driver demographic information, physical condition, and injury severity were analyzed for wrong-way drivers. The vehicle characteristics, vehicle operation, and collision results were analyzed for WWD vehicles. A method was brought about to identify wrong-way entry points that was then used to develop a relative-importance technique and rank different interchange types in terms of potential WWD incidents. The findings revealed that a large proportion of WWD crashes occurred during the weekend from midnight to 5 a.m. Approximately 80% of WWD crashes were located in urban areas and nearly 70% of wrong-way vehicles were passenger cars. Approximately 58% of wrong-way drivers were driving under the influence (DUI). Of those, nearly 50% were confirmed to be impaired by alcohol, about 4% were impaired by drugs, and more than 3% had been drinking. The analysis of interchange ranking found that compressed diamond interchanges, single point diamond interchanges (SPDIs), partial cloverleaf interchanges, and freeway feeders had the highest wrong-way crash rates (wrong-way crashes per 100 interchanges per year). The findings of this study call for more attention to WWD crashes from different aspects such as driver age group, time of day, day of week, and DUI drivers. Based on the analysis results of WWD distance, the study explained why a 5-mile radius of WWD crash location should be studied for WWD fatal crashes with unknown entry points.

  14. Site Specific Probable Maximum Precipitation Estimates and Professional Judgement

    NASA Astrophysics Data System (ADS)

    Hayes, B. D.; Kao, S. C.; Kanney, J. F.; Quinlan, K. R.; DeNeale, S. T.

    2015-12-01

    State and federal regulatory authorities currently rely upon the US National Weather Service Hydrometeorological Reports (HMRs) to determine probable maximum precipitation (PMP) estimates (i.e., rainfall depths and durations) for estimating flooding hazards for relatively broad regions in the US. PMP estimates for the contributing watersheds upstream of vulnerable facilities are used to estimate riverine flooding hazards while site-specific estimates for small water sheds are appropriate for individual facilities such as nuclear power plants. The HMRs are often criticized due to their limitations on basin size, questionable applicability in regions affected by orographic effects, their lack of consist methods, and generally by their age. HMR-51 for generalized PMP estimates for the United States east of the 105th meridian, was published in 1978 and is sometimes perceived as overly conservative. The US Nuclear Regulatory Commission (NRC), is currently reviewing several flood hazard evaluation reports that rely on site specific PMP estimates that have been commercially developed. As such, NRC has recently investigated key areas of expert judgement via a generic audit and one in-depth site specific review as they relate to identifying and quantifying actual and potential storm moisture sources, determining storm transposition limits, and adjusting available moisture during storm transposition. Though much of the approach reviewed was considered a logical extension of HMRs, two key points of expert judgement stood out for further in-depth review. The first relates primarily to small storms and the use of a heuristic for storm representative dew point adjustment developed for the Electric Power Research Institute by North American Weather Consultants in 1993 in order to harmonize historic storms for which only 12 hour dew point data was available with more recent storms in a single database. The second issue relates to the use of climatological averages for spatially interpolating 100-year dew point values rather than a more gauge-based approach. Site specific reviews demonstrated that both issues had potential for lowering the PMP estimate significantly by affecting the in-place and transposed moisture maximization value and, in turn, the final controlling storm for a given basin size and PMP estimate.

  15. Polynomial expansions of single-mode motions around equilibrium points in the circular restricted three-body problem

    NASA Astrophysics Data System (ADS)

    Lei, Hanlun; Xu, Bo; Circi, Christian

    2018-05-01

    In this work, the single-mode motions around the collinear and triangular libration points in the circular restricted three-body problem are studied. To describe these motions, we adopt an invariant manifold approach, which states that a suitable pair of independent variables are taken as modal coordinates and the remaining state variables are expressed as polynomial series of them. Based on the invariant manifold approach, the general procedure on constructing polynomial expansions up to a certain order is outlined. Taking the Earth-Moon system as the example dynamical model, we construct the polynomial expansions up to the tenth order for the single-mode motions around collinear libration points, and up to order eight and six for the planar and vertical-periodic motions around triangular libration point, respectively. The application of the polynomial expansions constructed lies in that they can be used to determine the initial states for the single-mode motions around equilibrium points. To check the validity, the accuracy of initial states determined by the polynomial expansions is evaluated.

  16. Estimation of vulnerability functions based on a global earthquake damage database

    NASA Astrophysics Data System (ADS)

    Spence, R. J. S.; Coburn, A. W.; Ruffle, S. J.

    2009-04-01

    Developing a better approach to the estimation of future earthquake losses, and in particular to the understanding of the inherent uncertainties in loss models, is vital to confidence in modelling potential losses in insurance or for mitigation. For most areas of the world there is currently insufficient knowledge of the current building stock for vulnerability estimates to be based on calculations of structural performance. In such areas, the most reliable basis for estimating vulnerability is performance of the building stock in past earthquakes, using damage databases, and comparison with consistent estimates of ground motion. This paper will present a new approach to the estimation of vulnerabilities using the recently launched Cambridge University Damage Database (CUEDD). CUEDD is based on data assembled by the Martin Centre at Cambridge University since 1980, complemented by other more-recently published and some unpublished data. The database assembles in a single, organised, expandable and web-accessible database, summary information on worldwide post-earthquake building damage surveys which have been carried out since the 1960's. Currently it contains data on the performance of more than 750,000 individual buildings, in 200 surveys following 40 separate earthquakes. The database includes building typologies, damage levels, location of each survey. It is mounted on a GIS mapping system and links to the USGS Shakemaps of each earthquake which enables the macroseismic intensity and other ground motion parameters to be defined for each survey and location. Fields of data for each building damage survey include: · Basic earthquake data and its sources · Details of the survey location and intensity and other ground motion observations or assignments at that location · Building and damage level classification, and tabulated damage survey results · Photos showing typical examples of damage. In future planned extensions of the database information on human casualties will also be assembled. The database also contains analytical tools enabling data from similar locations, building classes or ground motion levels to be assembled and thus vulnerability relationships derived for any chosen ground motion parameter, for a given class of building, and for particular countries or regions. The paper presents examples of vulnerability relationships for particular classes of buildings and regions of the world, together with the estimated uncertainty ranges. It will discuss the applicability of such vulnerability functions in earthquake loss assessment for insurance purposes or for earthquake risk mitigation.

  17. Predicting and Controlling Complex Networks

    DTIC Science & Technology

    2015-06-22

    vulnerability and to generate a global view of network security against attacks. By deploying network sensors at particular points in the Internet ...48006, 1-6 (2011). 2 13. L. Huang and Y.-C. Lai, “Cascading dynamics in complex quantum networks,” Chaos 21, 025107, 1-6 (2011). This work was selected...by July 2011 issue of Virtual Journal of Quantum Information (http://www.vjquantuminfo.org). 14. W.-X. Wang, Y.-C. Lai, and D. Armbruster, “Cascading

  18. The United States Strategic Bombing Surveys, (European War) (Pacific War)

    DTIC Science & Technology

    1987-10-01

    traffic between the Ruhr and points on the north coast and in central Germany . By October 14, traffic on the Rhine had been interdicted by a bomb that...the National Load Dispatcher, and secret minutes of the Central Planning Committee . Fears that their extreme vulnerability would be discovered were...fighting and other defensive resources of surrounding communities and, as a final resort, on mobile reserves deployed by the central government through

  19. [Addictions].

    PubMed

    Besson, Jacques; Grivel, Jeremy; Tomei, Alexander; Zullino, Daniele; Thorens, Gabriel; Castro, Erika; Hachaichi, Mohamed; Devaud Cornaz, Corinne; Dudzus, Mathias; Gothuey, Isabelle

    2017-01-11

    In 2016, the actuality for addictions in this edition addresses four points. Social neurosciences of addiction are of great importance regarding the vulnerabilities for addiction and for the recovery. Deep brain stimulation is emerging in the therapeutic panel coming from the clinical neurosciences for the addictions. Novelties in opioid agonists for the treatment of opiates dependence, with the apparition in the Swiss market of release morphine and of levomethadone. Cannabis and prison, a pilot study for the maintenance of abstinence in prison.

  20. Decision Vulnerability Analysis (DVA) Program

    DTIC Science & Technology

    2014-05-01

    the external entities. For example, the chief financial officer can say that the organization will be buying back stock to make stockholders more...financial success Reichheld (2001) points out that a key component of success is “doing what you say you are going to do.” This applies to...that run counter to the explicit and implicit expectations expressed by the organization (e.g., do as I say , not as I do). Relevant Research Literature

  1. Gays vs. Russia: media representations, vulnerable bodies and the construction of a (post)modern West

    PubMed Central

    Wiedlack, M. Katharina

    2017-01-01

    Abstract This essay analyses the recent focus on Russian human rights violations in Anglophone media, scrutinising the ideological agenda of the visual politics which strategically foreground victimised bodies of Russian dissidents. Notwithstanding the importance of a critique on human rights violations, the article points to the unwanted but very real side effects the current mediatisations of violence have, from structural victimisation and the creation of ‘gay martyrs’ to the resignification of the West as progressive and ‘gay’ and Russia as backward and heterosexual. A close reading of popular press photographs of wounded Russian gay youth and the textual context – arguably representative for the Western media focus on the ‘Eastern’ violation of human rights between 2012 and 2014 – serves to illustrate how an image of Russian nation and Russian state politics is forged within Anglophone media discourses meant to reinforce the positive identity of the self-same by evoking pity, empathy and a responsible helpful attitude toward the endangered othered. The essay argues that Anglophone media’s focus on the vulnerability of Russian LGBTIQ+ bodies, consciously or unconsciously, reduces the subjects to this vulnerability, confirming feelings of moral superiority within the enlightened audience. The study highlights the important role that Russia’s vulnerable citizens play not only in the construction of values such as ‘tolerance’ and ‘acceptance’ and evaluations like ‘progressive’ and ‘modern’, but also in perceptions of the nation and its people and the reaffirmation of the dualistic divide between ‘The East’ and ‘The West’. PMID:29250129

  2. Downregulation of PMCA2 increases the vulnerability of midbrain neurons to mitochondrial complex I inhibition.

    PubMed

    Brendel, Alexander; Renziehausen, Jana; Behl, Christian; Hajieva, Parvana

    2014-01-01

    Parkinson's disease is an age-associated disorder characterized by selective degeneration of dopaminergic neurons. The molecular mechanisms underlying the selective vulnerability of this subset of neurons are, however, not fully understood. Employing SH-SY5Y neuroblastoma cells and primary mesencephalic neurons, we here demonstrate a significant increase in cytosolic calcium after inhibition of mitochondrial complex I by means of MPP(+), which is a well-established environmental toxin-based in vitro model of Parkinson's disease. This increase in calcium is correlated with a downregulation of the neuron-specific plasma membrane Ca(2+)-ATPase isoform 2 (PMCA2). Interestingly, two other important mediators of calcium efflux, sarcoplasmic reticulum Ca(2+)-ATPase (SERCA), and Na(+)-Ca(2+)-exchanger (NCX), remained unaltered, indicating a specific role of PMCA2 in maintaining calcium homeostasis in neurons. The observed PMCA2 downregulation was accompanied by reduced levels of phosphorylated CREB protein, an intracellular signaling molecule and transcriptional regulator. In order to investigate the potential influence of PMCA2 on neuronal vulnerability, experimental downregulation of PMCA2 by means of siRNA was performed. The results demonstrate a significant impairment of cell survival under conditions of PMCA2 suppression. Hence, in our cell models increased cytosolic calcium levels as a consequence of insufficient calcium efflux lead to an increased vulnerability of neuronal cells. Moreover, overexpression of PMCA2 rendered the neurons significantly resistant to complex I inhibition. Our findings point toward a dysregulation of calcium homeostasis in Parkinson's disease and suggest a potential molecular mechanism of neurodegeneration via PMCA2. Copyright © 2013 Elsevier Inc. All rights reserved.

  3. The three-hit concept of vulnerability and resilience: towards understanding adaptation to early-life adversity outcome

    PubMed Central

    Daskalakis, Nikolaos P.; Bagot, Rosemary C.; Parker, Karen J.; Vinkers, Christiaan H.; de Kloet, E. R.

    2013-01-01

    Stressful experiences during early-life can modulate the genetic programming of specific brain circuits underlying emotional and cognitive aspects of behavioral adaptation to stressful experiences later in life. Although this programming effect exerted by experience-related factors is an important determinant of mental health, its outcome depends on cognitive inputs and hence the valence an individual assigns to a given environmental context. From this perspective we will highlight, with studies in rodents, non-human primates and humans, the three-hit concept of vulnerability and resilience to stress-related mental disorders, which is based on gene-environment interactions during critical phases of perinatal and juvenile brain development. The three-hit (i.e., hit-1: genetic predisposition, hit-2: early-life environment, and hit-3: later-life environment) concept accommodates the cumulative stress hypothesis stating that in a given context vulnerability is enhanced when failure to cope with adversity accumulates. Alternatively, the concept also points to the individual’s predictive adaptive capacity, which underlies the stress inoculation and match/mismatch hypotheses. The latter hypotheses propose that the experience of relatively mild early-life adversity prepares for the future and promotes resilience to similar challenges in later-life; when a mismatch occurs between early and later-life experience, coping is compromised and vulnerability is enhanced. The three-hit concept is fundamental for understanding how individuals can either be prepared for coping with life to come and remain resilient or are unable to do so and succumb to a stress-related mental disorder, under seemingly identical circumstances. PMID:23838101

  4. Closing the Health Care Gap in Communities: A Safety Net System Approach.

    PubMed

    Gabow, Patricia A

    2016-10-01

    The goal of U.S. health care should be good health for every American. This daunting goal will require closing the health care gap in communities with a particular focus on the most vulnerable populations and the safety net institutions that disproportionately serve these communities. This Commentary describes Denver Health's (DH's) two-pronged approach to achieving this goal: (1) creating an integrated system that focuses on the needs of vulnerable populations, and (2) creating an approach for financial viability, quality of care, and employee engagement. The implementation and outcomes of this approach at DH are described to provide a replicable model. An integrated delivery system serving vulnerable populations should go beyond the traditional components found in most integrated health systems and include components such as mental health services, school-based clinics, and correctional health care, which address the unique and important needs of, and points of access for, vulnerable populations. In addition, the demands that a safety net system experiences from an open-door policy on access and revenue require a disciplined approach to cost, quality of care, and employee engagement. For this, DH chose Lean, which focuses on reducing waste to respect the patients and employees within its health system, as well as all citizens. DH's Lean effort produced almost $195 million of financial benefit, impressive clinical outcomes, and high employee engagement. If this two-pronged approach were widely adopted, health systems across the United States would improve their chances of giving better care at costs they can afford for every person in society.

  5. The three-hit concept of vulnerability and resilience: toward understanding adaptation to early-life adversity outcome.

    PubMed

    Daskalakis, Nikolaos P; Bagot, Rosemary C; Parker, Karen J; Vinkers, Christiaan H; de Kloet, E R

    2013-09-01

    Stressful experiences during early-life can modulate the genetic programming of specific brain circuits underlying emotional and cognitive aspects of behavioral adaptation to stressful experiences later in life. Although this programming effect exerted by experience-related factors is an important determinant of mental health, its outcome depends on cognitive inputs and hence the valence an individual assigns to a given environmental context. From this perspective we will highlight, with studies in rodents, non-human primates and humans, the three-hit concept of vulnerability and resilience to stress-related mental disorders, which is based on gene-environment interactions during critical phases of perinatal and juvenile brain development. The three-hit (i.e., hit-1: genetic predisposition, hit-2: early-life environment, and hit-3: later-life environment) concept accommodates the cumulative stress hypothesis stating that in a given context vulnerability is enhanced when failure to cope with adversity accumulates. Alternatively, the concept also points to the individual's predictive adaptive capacity, which underlies the stress inoculation and match/mismatch hypotheses. The latter hypotheses propose that the experience of relatively mild early-life adversity prepares for the future and promotes resilience to similar challenges in later-life; when a mismatch occurs between early and later-life experience, coping is compromised and vulnerability is enhanced. The three-hit concept is fundamental for understanding how individuals can either be prepared for coping with life to come and remain resilient or are unable to do so and succumb to a stress-related mental disorder, under seemingly identical circumstances. Copyright © 2013 Elsevier Ltd. All rights reserved.

  6. Vulnerability-specific stress generation: Childhood emotional abuse and the mediating role of depressogenic interpersonal processes.

    PubMed

    Hernandez, Evelyn M; Trout, Zoë M; Liu, Richard T

    2016-12-01

    Stress generation in depression (i.e. the tendency for depression-prone individuals to experience more life stress that is in part influenced by the individual) has been well established. However, more research is necessary to clarify the role of specific types of life stress in this effect. The current study extends the stress generation hypothesis by examining whether the type of stress involved is contingent upon the nature of the individual's particular vulnerability. Childhood emotional abuse and interpersonal vulnerability factors were predicted to be associated with prospective interpersonal dependent but not non-interpersonal or independent stress. These interpersonal factors were examined as mediators of the association between childhood emotional abuse and interpersonal stress generation. Data were collected from 185 undergraduate participants at two time-points, four months apart. At baseline, participants completed assessments of depressive symptoms, childhood abuse history, interpersonal risk factors (rejection sensitivity, excessive reassurance-seeking, and negative feedback-seeking), and a diagnostic interview for depression. At the follow-up assessment, participants completed a life stress interview. Childhood emotional abuse prospectively predicted greater interpersonal dependent stress, but not non-interpersonal dependent or independent stress. Only rejection sensitivity mediated this relationship. Consistent with the stress generation hypothesis, neither childhood emotional abuse nor the three interpersonal risk factors predicted independent stress. These findings suggest that targeting interpersonal vulnerabilities in clinical settings, particularly rejection sensitivity, among individuals with a history of childhood emotional abuse, may help to reduce the occurrence of interpersonal dependent stress, thus possibly decreasing risk for depression. Copyright © 2016 Elsevier Ltd. All rights reserved.

  7. Defining the Pathophysiological Role of Tau in Experimental TBI

    DTIC Science & Technology

    2016-10-01

    in AD. This pathway is a major source for excitatory innervation of hippocampus , a structure vital for memory formation. Damage to the EC or...hippocampal input pathway that is both preferentially vulnerable in early-stage AD and critically important for long-term memory . The model confines...structure and function of the hippocampus after single or repetitive mild TBI, and whether mild TBI exacerbates ongoing tauopathy to promote a chronic

  8. Effects of maternal and grandmaternal nutrition on deer mass and vulnerability to wolf predation

    USGS Publications Warehouse

    Mech, L.D.; Nelson, M.E.; McRoberts, R.E.

    1991-01-01

    In a Minnesota ecosystem, mass of female white-tailed deer (Odocoileus virginianus) fawns and adults, and survival of adult females in the face of wolf (Canis lupus) predation, were directly related to maternal nutrition during gestation. Mass of single male fawns produced by 2-year-old females, and survival of yearlings to 2 years of age were related directly to the nutrition of their grandmothers.

  9. An Exploratory Investigation of the Relationship between Turnover Intentions, Work Exhaustion and Disengagement among IT Professionals in a Single Institution of Higher Education in a Major Metropolitan Area

    ERIC Educational Resources Information Center

    Ford, Valerie F.

    2012-01-01

    Recent studies have shown that turnover is a major issue in IT environments (Armstrong & Riemenschneider, 2011; Carayon, Schoepke, Hoonakker, Haims, & Brunette, 2006; Moore, 2000a; Rigas, 2009). In fact, the research literature in IT and the popular press suggest that IT professionals are particularly vulnerable to burnout (Armstrong &…

  10. Developing an Emotional Intelligence Program Training and Study Its Effectiveness on Emotional Intelligence of Adolescents with Emotional and Behavioral Problems That Living in Single Parent Families

    ERIC Educational Resources Information Center

    Motamedi, Farzaneh; Ghobari-Bonab, Bagher; Beh-pajooh, Ahmad; Yekta, Mohsen Shokoohi; Afrooz, Gholam Ali

    2017-01-01

    Development of children and adolescents' personality is strongly affected by their parents, and absence of one of them has an undesirable effect on their development, and makes them vulnerable to later psychological disorders and behavioral problems. The purpose of this study was to develop an emotional intelligence training program and to…

  11. Investigations Concerning Cavitation and Frost Fatigue in Clonal 84K Poplar Using High-Resolution Cavitron Measurements1[OPEN

    PubMed Central

    Feng, Feng; Ding, Fei; Tyree, Melvin T.

    2015-01-01

    Both drought and freezing-thawing of stems induce a loss of hydraulic conductivity (percentage loss of conductivity [PLC]) in woody plants. Drought-induced PLC is often accompanied by physical damage to pit membranes, causing a shift in vulnerability curves (cavitation fatigue). Hence, if cavitated stems are flushed to remove embolisms, the next vulnerability curve is different (shifted to lower tensions). The 84K poplar (Populus alba × Populus glandulosa) clone has small vessels that should be immune from frost-induced PLC, but results demonstrated that freezing-thawing in combination with tension synergistically increased PLC. Frost fatigue has already been defined, which is similar to cavitation fatigue but induced by freezing. Frost fatigue caused a transition from a single to a dual Weibull curve, but drought-fatigued stems had single Weibull curves shifted to lower tensions. Studying the combined impact of tension plus freezing on fatigue provided evidence that the mechanism of frost fatigue may be the extra water tension induced by freezing or thawing while spinning stems in a centrifuge rather than direct ice damage. A hypothesis is advanced that tension is enhanced as ice crystals grow or melt during the freeze or thaw event, respectively, causing a nearly identical fatigue event to that induced by drought. PMID:25786827

  12. Assessing forest vulnerability and the potential distribution of pine beetles under current and future climate scenarios in the Interior West of the US

    USGS Publications Warehouse

    Evangelista, P.H.; Kumar, S.; Stohlgren, T.J.; Young, N.E.

    2011-01-01

    The aim of our study was to estimate forest vulnerability and potential distribution of three bark beetles (Curculionidae: Scolytinae) under current and projected climate conditions for 2020 and 2050. Our study focused on the mountain pine beetle (Dendroctonus ponderosae), western pine beetle (Dendroctonus brevicomis), and pine engraver (Ips pini). This study was conducted across eight states in the Interior West of the US covering approximately 2.2millionkm2 and encompassing about 95% of the Rocky Mountains in the contiguous US. Our analyses relied on aerial surveys of bark beetle outbreaks that occurred between 1991 and 2008. Occurrence points for each species were generated within polygons created from the aerial surveys. Current and projected climate scenarios were acquired from the WorldClim database and represented by 19 bioclimatic variables. We used Maxent modeling technique fit with occurrence points and current climate data to model potential beetle distributions and forest vulnerability. Three available climate models, each having two emission scenarios, were modeled independently and results averaged to produce two predictions for 2020 and two predictions for 2050 for each analysis. Environmental parameters defined by current climate models were then used to predict conditions under future climate scenarios, and changes in different species' ranges were calculated. Our results suggested that the potential distribution for bark beetles under current climate conditions is extensive, which coincides with infestation trends observed in the last decade. Our results predicted that suitable habitats for the mountain pine beetle and pine engraver beetle will stabilize or decrease under future climate conditions, while habitat for the western pine beetle will continue to increase over time. The greatest increase in habitat area was for the western pine beetle, where one climate model predicted a 27% increase by 2050. In contrast, the predicted habitat of the mountain pine beetle from another climate model suggested a decrease in habitat areas as great as 46% by 2050. Generally, 2020 and 2050 models that tested the three climate scenarios independently had similar trends, though one climate scenario for the western pine beetle produced contrasting results. Ranges for all three species of bark beetles shifted considerably geographically suggesting that some host species may become more vulnerable to beetle attack in the future, while others may have a reduced risk over time. ?? 2011 Elsevier B.V.

  13. Digging deeper into noise. Reply to comment on "Extracting physics of life at the molecular level: A review of single-molecule data analyses"

    NASA Astrophysics Data System (ADS)

    Colomb, Warren; Sarkar, Susanta K.

    2015-06-01

    We would like to thank all the commentators for their constructive comments on our paper. Commentators agree that a proper analysis of noisy single-molecule data is important for extracting meaningful and accurate information about the system. We concur with their views and indeed, motivating an accurate analysis of experimental data is precisely the point of our paper. After a model about the system of interest is constructed based on the experimental single-molecule data, it is very helpful to simulate the model to generate theoretical single-molecule data and analyze exactly the same way. In our experience, such self-consistent approach involving experiments, simulations, and analyses often forces us to revise our model and make experimentally testable predictions. In light of comments from the commentators with different expertise, we would also like to point out that a single model should be able to connect different experimental techniques because the underlying science does not depend on the experimental techniques used. Wohland [1] has made a strong case for fluorescence correlation spectroscopy (FCS) as an important experimental technique to bridge single-molecule and ensemble experiments. FCS is a very powerful technique that can measure ensemble parameters with single-molecule sensitivity. Therefore, it is logical to simulate any proposed model and predict both single-molecule data and FCS data, and confirm with experimental data. Fitting the diffraction-limited point spread function (PSF) of an isolated fluorescent marker to localize a labeled biomolecule is a critical step in many single-molecule tracking experiments. Flyvbjerg et al. [2] have rigorously pointed out some important drawbacks of the prevalent practice of fitting diffraction-limited PSF with 2D Gaussian. As we try to achieve more accurate and precise localization of biomolecules, we need to consider subtle points as mentioned by Flyvbjerg et al. Shepherd [3] has mentioned specific examples of PSF that have been used for localization and has rightly mentioned the importance of detector noise in single-molecule localization. Meroz [4] has pointed out more clearly that the signal itself could be noisy and it is necessary to distinguish the noise of interest from the background noise. Krapf [5] has pointed out different origins of fluctuations in biomolecular systems and commented on their possible Gaussian and non-Gaussian nature. Importance of noise along with the possibility that the noise itself can be the signal of interest has been discussed in our paper [6]. However, Meroz [4] and Krapf [5] have provided specific examples to guide the readers in a better way. Sachs et al. [7] have discussed kinetic analysis in the presence of indistinguishable states and have pointed to the free software for the general kinetic analysis that originated from their research.

  14. Health Vulnerability Index and newborn hearing screening: urban inequality.

    PubMed

    Januário, Gabriela Cintra; Alves, Claudia Regina Lindgren; Lemos, Stela Maris Aguiar; Almeida, Maria Cristina de Mattos; Cruz, Ramon Costa; Friche, Amélia Augusta de Lima

    To analyze the intra-urban differentials related to the outcome of the Newborn Hearing Screening (NHS) of children living in Belo Horizonte tested in a reference service using the Health Vulnerability Index (HVI). cross-sectional study with children living in Belo Horizonte evaluated by a Newborn Hearing Screening Reference Service (NHSRS) between 2010 and 2011. The HVI of the census tract of each child was obtained by the georeferencing of their respective addresses. Multivariate analysis was conducted using the decision tree technique, considering a statistical model for each response. A thematic map of points representing the geographic distribution of the children evaluated by the NHS program was also developed. The NHS failure rate for children living in areas with very high HVI, or without HVI data, was 1.5 times higher than that for children living in other census tracts. For children living in areas of low, medium, and high HVI, who underwent NHS after 30 days of life, the NHS failure rate was 2.1 times higher in children that presented Risk Indicator for Hearing Loss (RIHL) (17.2%) than in those who did not (8.1%). Uneven distribution was observed between areas for children that underwent the NHS and those who failed it. Significant intra-urban differentials were found in Belo Horizonte, indicating correlation between health vulnerability and NHS outcomes.

  15. Extreme rainfall, vulnerability and risk: a continental-scale assessment for South America

    USGS Publications Warehouse

    Vorosmarty, Charles J.; de Guenni, Lelys Bravo; Wollheim, Wilfred M.; Pellerin, Brian A.; Bjerklie, David M.; Cardoso, Manoel; D'Almeida, Cassiano; Colon, Lilybeth

    2013-01-01

    Extreme weather continues to preoccupy society as a formidable public safety concern bearing huge economic costs. While attention has focused on global climate change and how it could intensify key elements of the water cycle such as precipitation and river discharge, it is the conjunction of geophysical and socioeconomic forces that shapes human sensitivity and risks to weather extremes. We demonstrate here the use of high-resolution geophysical and population datasets together with documentary reports of rainfall-induced damage across South America over a multi-decadal, retrospective time domain (1960–2000). We define and map extreme precipitation hazard, exposure, affectedpopulations, vulnerability and risk, and use these variables to analyse the impact of floods as a water security issue. Geospatial experiments uncover major sources of risk from natural climate variability and population growth, with change in climate extremes bearing a minor role. While rural populations display greatest relative sensitivity to extreme rainfall, urban settings show the highest rates of increasing risk. In the coming decades, rapid urbanization will make South American cities the focal point of future climate threats but also an opportunity for reducing vulnerability, protecting lives and sustaining economic development through both traditional and ecosystem-based disaster risk management systems.

  16. Exploring pathways for building trust in vaccination and strengthening health system resilience.

    PubMed

    Ozawa, Sachiko; Paina, Ligia; Qiu, Mary

    2016-11-15

    Trust is critical to generate and maintain demand for vaccines in low and middle income countries. However, there is little documentation on how health system insufficiencies affect trust in vaccination and the process of re-building trust once it has been compromised. We reflect on how disruptions to immunizations systems can affect trust in vaccination and can compromise vaccine utilization. We then explore key pathways for overcoming system vulnerabilities in order to restore trust, to strengthen the resilience of health systems and communities, and to promote vaccine utilization. Utilizing secondary data and a review of the literature, we developed a causal loop diagram (CLD) to map the determinants of building trust in immunizations. Using the CLD, we devised three scenarios to illustrate common vulnerabilities that compromise trust and pathways to strengthen trust and utilization of vaccines, specifically looking at weak health systems, harmful communication channels, and role of social capital. Spill-over effects, interactions and other dynamics in the CLD were then examined to assess leverage points to counter these vulnerabilities. Trust in vaccination arises from the interactions among experiences with the health system, the various forms of communication and social capital - both external and internal to communities. When experiencing system-wide shocks such as the case in Ebola-affected countries, distrust is reinforced by feedback between the health and immunization systems where distrust often lingers even after systems are restored and spills over beyond vaccination in the broader health system. Vaccine myths or anti-vaccine movements reinforce distrust. Social capital - the collective value of social networks of community members - plays a central role in increasing levels of trust. Trust is important, yet underexplored, in the context of vaccine utilization. Using a CLD to illustrate various scenarios helped to explore how common health and vaccine vulnerabilities can reinforce and spill over distrust through vicious, reinforcing feedback. Restoring trust requires a careful balance between eliminating vulnerabilities and strengthening social capital and interactions among communication channels.

  17. Personality traits in rats predict vulnerability and resilience to developing stress-induced depression-like behaviors, HPA axis hyper-reactivity and brain changes in pERK1/2 activity.

    PubMed

    Castro, Jorge E; Diessler, Shanaz; Varea, Emilio; Márquez, Cristina; Larsen, Marianne H; Cordero, M Isabel; Sandi, Carmen

    2012-08-01

    Emerging evidence indicates that certain behavioral traits, such as anxiety, are associated with the development of depression-like behaviors after exposure to chronic stress. However, single traits do not explain the wide variability in vulnerability to stress observed in outbred populations. We hypothesized that a combination of behavioral traits might provide a better characterization of an individual's vulnerability to prolonged stress. Here, we sought to determine whether the characterization of relevant behavioral traits in rats could aid in identifying individuals with different vulnerabilities to developing stress-induced depression-like behavioral alterations. We also investigated whether behavioral traits would be related to the development of alterations in the hypothalamic-pituitary-adrenal axis and in brain activity - as measured through phosphorylation of extracellular signal-regulated kinase 1/2 (ERK1/2)--in response to an acute stressor following either sub-chronic (2 weeks) or chronic (4 weeks) unpredictable stress (CUS). Sprague-Dawley rats were characterized using a battery of behavioral tasks, and three principal traits were identified: anxiety, exploration and activity. When combined, the first two traits were found to explain the variability in the stress responses. Our findings confirm the increased risk of animals with high anxiety developing certain depression-like behaviors (e.g., increased floating time in the forced swim test) when progressively exposed to stress. In contrast, the behavioral profile based on combined low anxiety and low exploration was resistant to alterations related to social behaviors, while the high anxiety and low exploration profile displayed a particularly vulnerable pattern of physiological and neurobiological responses after sub-chronic stress exposure. Our findings indicate important differences in animals' vulnerability and/or resilience to the effects of repeated stress, particularly during initial or intermediate levels of stress exposure, and they highlight that the behavioral inhibition profile of an animal provides a particular susceptibility to responding in a deleterious manner to stress. Copyright © 2011 Elsevier Ltd. All rights reserved.

  18. Hippocampal neuronal cells that accumulate α-synuclein fragments are more vulnerable to Aβ oligomer toxicity via mGluR5 – implications for dementia with Lewy bodies

    PubMed Central

    2014-01-01

    Background In dementia with Lewy bodies (DLB) abnormal interactions between α-synuclein (α-syn) and beta amyloid (Aβ) result in selective degeneration of neurons in the neocortex, limbic system and striatum. However, factors rendering these neurons selectively vulnerable have not been fully investigated. The metabotropic glutamate receptor 5 (mGluR5) has been shown to be up regulated in DLB and might play a role as a mediator of the neurotoxic effects of Aβ and α-syn in vulnerable neuronal populations. In this context, the main objective of the present study was to investigate the role of mGluR5 as a mediator of the neurotoxic effects of α-syn and Aβ in the hippocampus. Results We generated double transgenic mice over-expressing amyloid precursor protein (APP) and α-syn under the mThy1 cassette and investigated the relationship between α-syn cleavage, Aβ, mGluR5 and neurodegeneration in the hippocampus. We found that compared to the single tg mice, the α-syn/APP tg mice displayed greater accumulation of α-syn and mGluR5 in the CA3 region of the hippocampus compared to the CA1 and other regions. This was accompanied by loss of CA3 (but not CA1) neurons in the single and α-syn/APP tg mice and greater loss of MAP 2 and synaptophysin in the CA3 in the α-syn/APP tg. mGluR5 gene transfer using a lentiviral vector into the hippocampus CA1 region resulted in greater α-syn accumulation and neurodegeneration in the single and α-syn/APP tg mice. In contrast, silencing mGluR5 with a lenti-shRNA protected neurons in the CA3 region of tg mice. In vitro, greater toxicity was observed in primary hippocampal neuronal cultures treated with Aβ oligomers and over-expressing α-syn; this effect was attenuated by down-regulating mGluR5 with an shRNA lentiviral vector. In α-syn-expressing neuronal cells lines, Aβ oligomers promoted increased intracellular calcium levels, calpain activation and α-syn cleavage resulting in caspase-3-dependent cell death. Treatment with pharmacological mGluR5 inhibitors such as 2-Methyl-6-(phenylethynyl)pyridine (MPEP) and 3-((2-Methyl-4-thiazolyl)ethynyl)pyridine (MTEP) attenuated the toxic effects of Aβ in α-syn-expressing neuronal cells. Conclusions Together, these results support the possibility that vulnerability of hippocampal neurons to α-syn and Aβ might be mediated via mGluR5. Moreover, therapeutical interventions targeting mGluR5 might have a role in DLB. PMID:24885390

  19. Centrifugal multiplexing fixed-volume dispenser on a plastic lab-on-a-disk for parallel biochemical single-end-point assays

    PubMed Central

    La, Moonwoo; Park, Sang Min; Kim, Dong Sung

    2015-01-01

    In this study, a multiple sample dispenser for precisely metered fixed volumes was successfully designed, fabricated, and fully characterized on a plastic centrifugal lab-on-a-disk (LOD) for parallel biochemical single-end-point assays. The dispenser, namely, a centrifugal multiplexing fixed-volume dispenser (C-MUFID) was designed with microfluidic structures based on the theoretical modeling about a centrifugal circumferential filling flow. The designed LODs were fabricated with a polystyrene substrate through micromachining and they were thermally bonded with a flat substrate. Furthermore, six parallel metering and dispensing assays were conducted at the same fixed-volume (1.27 μl) with a relative variation of ±0.02 μl. Moreover, the samples were metered and dispensed at different sub-volumes. To visualize the metering and dispensing performances, the C-MUFID was integrated with a serpentine micromixer during parallel centrifugal mixing tests. Parallel biochemical single-end-point assays were successfully conducted on the developed LOD using a standard serum with albumin, glucose, and total protein reagents. The developed LOD could be widely applied to various biochemical single-end-point assays which require different volume ratios of the sample and reagent by controlling the design of the C-MUFID. The proposed LOD is feasible for point-of-care diagnostics because of its mass-producible structures, reliable metering/dispensing performance, and parallel biochemical single-end-point assays, which can identify numerous biochemical. PMID:25610516

  20. Statistical representation of a spray as a point process

    NASA Astrophysics Data System (ADS)

    Subramaniam, S.

    2000-10-01

    The statistical representation of a spray as a finite point process is investigated. One objective is to develop a better understanding of how single-point statistical information contained in descriptions such as the droplet distribution function (ddf), relates to the probability density functions (pdfs) associated with the droplets themselves. Single-point statistical information contained in the droplet distribution function (ddf) is shown to be related to a sequence of single surrogate-droplet pdfs, which are in general different from the physical single-droplet pdfs. It is shown that the ddf contains less information than the fundamental single-point statistical representation of the spray, which is also described. The analysis shows which events associated with the ensemble of spray droplets can be characterized by the ddf, and which cannot. The implications of these findings for the ddf approach to spray modeling are discussed. The results of this study also have important consequences for the initialization and evolution of direct numerical simulations (DNS) of multiphase flows, which are usually initialized on the basis of single-point statistics such as the droplet number density in physical space. If multiphase DNS are initialized in this way, this implies that even the initial representation contains certain implicit assumptions concerning the complete ensemble of realizations, which are invalid for general multiphase flows. Also the evolution of a DNS initialized in this manner is shown to be valid only if an as yet unproven commutation hypothesis holds true. Therefore, it is questionable to what extent DNS that are initialized in this manner constitute a direct simulation of the physical droplets. Implications of these findings for large eddy simulations of multiphase flows are also discussed.

  1. Ranking of sabotage/tampering avoidance technology alternatives

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Andrews, W.B.; Tabatabai, A.S.; Powers, T.B.

    1986-01-01

    Pacific Northwest Laboratory conducted a study to evaluate alternatives to the design and operation of nuclear power plants, emphasizing a reduction of their vulnerability to sabotage. Estimates of core melt accident frequency during normal operations and from sabotage/tampering events were used to rank the alternatives. Core melt frequency for normal operations was estimated using sensitivity analysis of results of probabilistic risk assessments. Core melt frequency for sabotage/tampering was estimated by developing a model based on probabilistic risk analyses, historic data, engineering judgment, and safeguards analyses of plant locations where core melt events could be initiated. Results indicate the most effectivemore » alternatives focus on large areas of the plant, increase safety system redundancy, and reduce reliance on single locations for mitigation of transients. Less effective options focus on specific areas of the plant, reduce reliance on some plant areas for safe shutdown, and focus on less vulnerable targets.« less

  2. Consistent approach to describing aircraft HIRF protection

    NASA Technical Reports Server (NTRS)

    Rimbey, P. R.; Walen, D. B.

    1995-01-01

    The high intensity radiated fields (HIRF) certification process as currently implemented is comprised of an inconsistent combination of factors that tend to emphasize worst case scenarios in assessing commercial airplane certification requirements. By examining these factors which include the process definition, the external HIRF environment, the aircraft coupling and corresponding internal fields, and methods of measuring equipment susceptibilities, activities leading to an approach to appraising airplane vulnerability to HIRF are proposed. This approach utilizes technically based criteria to evaluate the nature of the threat, including the probability of encountering the external HIRF environment. No single test or analytic method comprehensively addresses the full HIRF threat frequency spectrum. Additional tools such as statistical methods must be adopted to arrive at more realistic requirements to reflect commercial aircraft vulnerability to the HIRF threat. Test and analytic data are provided to support the conclusions of this report. This work was performed under NASA contract NAS1-19360, Task 52.

  3. Method and tool for network vulnerability analysis

    DOEpatents

    Swiler, Laura Painton [Albuquerque, NM; Phillips, Cynthia A [Albuquerque, NM

    2006-03-14

    A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

  4. Coral Reef Resilience, Tipping Points and the Strength of Herbivory

    PubMed Central

    Holbrook, Sally J.; Schmitt, Russell J.; Adam, Thomas C.; Brooks, Andrew J.

    2016-01-01

    Coral reefs increasingly are undergoing transitions from coral to macroalgal dominance. Although the functional roles of reef herbivores in controlling algae are becoming better understood, identifying possible tipping points in the herbivory-macroalgae relationships has remained a challenge. Assessment of where any coral reef ecosystem lies in relation to the coral-to-macroalgae tipping point is fundamental to understanding resilience properties, forecasting state shifts, and developing effective management practices. We conducted a multi-year field experiment in Moorea, French Polynesia to estimate these properties. While we found a sharp herbivory threshold where macroalgae escape control, ambient levels of herbivory by reef fishes were well above that needed to prevent proliferation of macroalgae. These findings are consistent with previously observed high resilience of the fore reef in Moorea. Our approach can identify vulnerable coral reef systems in urgent need of management action to both forestall shifts to macroalgae and preserve properties essential for resilience. PMID:27804977

  5. Coral Reef Resilience, Tipping Points and the Strength of Herbivory.

    PubMed

    Holbrook, Sally J; Schmitt, Russell J; Adam, Thomas C; Brooks, Andrew J

    2016-11-02

    Coral reefs increasingly are undergoing transitions from coral to macroalgal dominance. Although the functional roles of reef herbivores in controlling algae are becoming better understood, identifying possible tipping points in the herbivory-macroalgae relationships has remained a challenge. Assessment of where any coral reef ecosystem lies in relation to the coral-to-macroalgae tipping point is fundamental to understanding resilience properties, forecasting state shifts, and developing effective management practices. We conducted a multi-year field experiment in Moorea, French Polynesia to estimate these properties. While we found a sharp herbivory threshold where macroalgae escape control, ambient levels of herbivory by reef fishes were well above that needed to prevent proliferation of macroalgae. These findings are consistent with previously observed high resilience of the fore reef in Moorea. Our approach can identify vulnerable coral reef systems in urgent need of management action to both forestall shifts to macroalgae and preserve properties essential for resilience.

  6. Effect of Combined Patient Decision Aid and Patient Navigation vs Usual Care for Colorectal Cancer Screening in a Vulnerable Patient Population: A Randomized Clinical Trial.

    PubMed

    Reuland, Daniel S; Brenner, Alison T; Hoffman, Richard; McWilliams, Andrew; Rhyne, Robert L; Getrich, Christina; Tapp, Hazel; Weaver, Mark A; Callan, Danelle; Cubillos, Laura; Urquieta de Hernandez, Brisa; Pignone, Michael P

    2017-07-01

    Colorectal cancer (CRC) screening is underused, especially among vulnerable populations. Decision aids and patient navigation are potentially complementary interventions for improving CRC screening rates, but their combined effect on screening completion is unknown. To determine the combined effect of a CRC screening decision aid and patient navigation compared with usual care on CRC screening completion. In this randomized clinical trial, data were collected from January 2014 to March 2016 at 2 community health center practices, 1 in North Carolina and 1 in New Mexico, serving vulnerable populations. Patients ages 50 to 75 years who had average CRC risk, spoke English or Spanish, were not current with recommended CRC screening, and were attending primary care visits were recruited and randomized 1:1 to intervention or control arms. Intervention participants viewed a CRC screening decision aid in English or Spanish immediately before their clinician encounter. The decision aid promoted screening and presented colonoscopy and fecal occult blood testing as screening options. After the clinician encounter, intervention patients received support for screening completion from a bilingual patient navigator. Control participants viewed a food safety video before the encounter and otherwise received usual care. The primary outcome was CRC screening completion within 6 months of the index study visit assessed by blinded medical record review. Characteristics of the 265 participants were as follows: their mean age was 58 years; 173 (65%) were female, 164 (62%) were Latino; 40 (15%) were white non-Latino; 61 (23%) were black or of mixed race; 191 (78%) had a household income of less than $20 000; 101 (38%) had low literacy; 75 (28%) were on Medicaid; and 91 (34%) were uninsured. Intervention participants were more likely to complete CRC screening within 6 months (68% vs 27%); adjusted-difference, 40 percentage points (95% CI, 29-51 percentage points). The intervention was more effective in women than in men (50 vs 21 percentage point increase, interaction P = .02). No effect modification was observed across other subgroups. A patient decision aid plus patient navigation increased the rate of CRC screening completion in compared with usual care invulnerable primary care patients. clinicaltrials.gov Identifier: NCT02054598.

  7. Comparison of the operational and safety characteristics of the single point urban and diamond interchanges.

    DOT National Transportation Integrated Search

    1996-01-01

    The purpose of this study was to evaluate and compare the safety and operational characteristics of the single point urban interchange (SPUI) and the diamond interchange (DI) and develop guidelines that identify traffic and/or geometric conditions th...

  8. Implementing Multidisciplinary and Multi-Zonal Applications Using MPI

    NASA Technical Reports Server (NTRS)

    Fineberg, Samuel A.

    1995-01-01

    Multidisciplinary and multi-zonal applications are an important class of applications in the area of Computational Aerosciences. In these codes, two or more distinct parallel programs or copies of a single program are utilized to model a single problem. To support such applications, it is common to use a programming model where a program is divided into several single program multiple data stream (SPMD) applications, each of which solves the equations for a single physical discipline or grid zone. These SPMD applications are then bound together to form a single multidisciplinary or multi-zonal program in which the constituent parts communicate via point-to-point message passing routines. Unfortunately, simple message passing models, like Intel's NX library, only allow point-to-point and global communication within a single system-defined partition. This makes implementation of these applications quite difficult, if not impossible. In this report it is shown that the new Message Passing Interface (MPI) standard is a viable portable library for implementing the message passing portion of multidisciplinary applications. Further, with the extension of a portable loader, fully portable multidisciplinary application programs can be developed. Finally, the performance of MPI is compared to that of some native message passing libraries. This comparison shows that MPI can be implemented to deliver performance commensurate with native message libraries.

  9. Neutrophil Interactions Stimulate Evasive Hyphal Branching by Aspergillus fumigatus

    PubMed Central

    Jorgensen, Julianne; Frydman, Galit H.; Jones, Caroline N.

    2017-01-01

    Invasive aspergillosis (IA), primarily caused by Aspergillus fumigatus, is an opportunistic fungal infection predominantly affecting immunocompromised and neutropenic patients that is difficult to treat and results in high mortality. Investigations of neutrophil-hypha interaction in vitro and in animal models of IA are limited by lack of temporal and spatial control over interactions. This study presents a new approach for studying neutrophil-hypha interaction at single cell resolution over time, which revealed an evasive fungal behavior triggered by interaction with neutrophils: Interacting hyphae performed de novo tip formation to generate new hyphal branches, allowing the fungi to avoid the interaction point and continue invasive growth. Induction of this mechanism was independent of neutrophil NADPH oxidase activity and neutrophil extracellular trap (NET) formation, but could be phenocopied by iron chelation and mechanical or physiological stalling of hyphal tip extension. The consequence of branch induction upon interaction outcome depends on the number and activity of neutrophils available: In the presence of sufficient neutrophils branching makes hyphae more vulnerable to destruction, while in the presence of limited neutrophils the interaction increases the number of hyphal tips, potentially making the infection more aggressive. This has direct implications for infections in neutrophil-deficient patients and opens new avenues for treatments targeting fungal branching. PMID:28076396

  10. A Novel Attitude Estimation Algorithm Based on the Non-Orthogonal Magnetic Sensors

    PubMed Central

    Zhu, Jianliang; Wu, Panlong; Bo, Yuming

    2016-01-01

    Because the existing extremum ratio method for projectile attitude measurement is vulnerable to random disturbance, a novel integral ratio method is proposed to calculate the projectile attitude. First, the non-orthogonal measurement theory of the magnetic sensors is analyzed. It is found that the projectile rotating velocity is constant in one spinning circle and the attitude error is actually the pitch error. Next, by investigating the model of the extremum ratio method, an integral ratio mathematical model is established to improve the anti-disturbance performance. Finally, by combining the preprocessed magnetic sensor data based on the least-square method and the rotating extremum features in one cycle, the analytical expression of the proposed integral ratio algorithm is derived with respect to the pitch angle. The simulation results show that the proposed integral ratio method gives more accurate attitude calculations than does the extremum ratio method, and that the attitude error variance can decrease by more than 90%. Compared to the extremum ratio method (which collects only a single data point in one rotation cycle), the proposed integral ratio method can utilize all of the data collected in the high spin environment, which is a clearly superior calculation approach, and can be applied to the actual projectile environment disturbance. PMID:27213389

  11. Design, construction, and validation of a rotary multifunctional intravascular diagnostic catheter combining multispectral fluorescence lifetime imaging and intravascular ultrasound.

    PubMed

    Bec, Julien; Xie, Hongtao; Yankelevich, Diego R; Zhou, Feifei; Sun, Yang; Ghata, Narugopal; Aldredge, Ralph; Marcu, Laura

    2012-10-01

    We report the development and validation of an intravascular rotary catheter for bimodal interrogation of arterial pathologies. This is based on a point-spectroscopy scanning time-resolved fluorescence spectroscopy technique enabling reconstruction of fluorescence lifetime images (FLIm) and providing information on arterial intima composition and intravascular ultrasound (IVUS) providing information on arterial wall morphology. The catheter design allows for independent rotation of the ultrasonic and optical channels within an 8 Fr outer diameter catheter sheath and integrates a low volume flushing channel for blood removal in the optical pathways. In the current configuration, the two channels consist of (a) a standard 3 Fr IVUS catheter with single element transducer (40 MHz) and (b) a side-viewing fiber optic (400 μm core). Experiments conducted in tissue phantoms showed the ability of the catheter to operate in an intraluminal setting and to generate coregistered FLIm and IVUS in one pull-back scan. Current results demonstrate the feasibility of the catheter for simultaneous bimodal interrogation of arterial lumen and for generation of robust fluorescence lifetime data under IVUS guidance. These results facilitate further development of a FLIm-IVUS technique for intravascular diagnosis of atherosclerotic cardiovascular diseases including vulnerable plaques.

  12. Depression, Somatization, and Posttraumatic Stress Disorder in Children Born of Occupation After World War II in Comparison With a General Population.

    PubMed

    Kaiser, Marie; Kuwert, Philipp; Braehler, Elmar; Glaesmer, Heide

    2015-10-01

    At the end of World War II and during the first decade after the war, roughly 200,000 children were fathered in intimate contacts between German women and foreign soldiers. The experiences of these German occupation children (GOC) have been so far described in case reports and from historical perspective only. Research on psychosocial consequences of growing up as a GOC has been missing so far. This study examined traumatic experiences, posttraumatic stress disorder, somatization, and depression in GOC (N = 146) using self-report instruments: Posttraumatic Diagnostic Scale and Patient Health Questionnaire. Findings have then been compared with a representative birth cohort-matched sample from the German general population (N = 977). German occupation children showed significantly higher prevalence rates of most traumatic experiences, higher point prevalence rates of full and partial posttraumatic stress disorder, depression, and somatization than the control group. In summary, GOC often grew up under difficult conditions (e.g., poverty, single mothers, and stigmatization). Even decades later, they showed higher rates of different mental disorders and higher comorbidity. These findings underline the complex and long-term impact of their burdened social, financial, and familial conditions. The results underpin the importance of conceptualizing occupation children as a vulnerable group in postconflict settings.

  13. The supply chain of CO2 emissions

    PubMed Central

    Davis, Steven J.; Peters, Glen P.; Caldeira, Ken

    2011-01-01

    CO2 emissions from the burning of fossil fuels are conventionally attributed to the country where the emissions are produced (i.e., where the fuels are burned). However, these production-based accounts represent a single point in the value chain of fossil fuels, which may have been extracted elsewhere and may be used to provide goods or services to consumers elsewhere. We present a consistent set of carbon inventories that spans the full supply chain of global CO2 emissions, finding that 10.2 billion tons CO2 or 37% of global emissions are from fossil fuels traded internationally and an additional 6.4 billion tons CO2 or 23% of global emissions are embodied in traded goods. Our results reveal vulnerabilities and benefits related to current patterns of energy use that are relevant to climate and energy policy. In particular, if a consistent and unavoidable price were imposed on CO2 emissions somewhere along the supply chain, then all of the parties along the supply chain would seek to impose that price to generate revenue from taxes collected or permits sold. The geographical concentration of carbon-based fuels and relatively small number of parties involved in extracting and refining those fuels suggest that regulation at the wellhead, mine mouth, or refinery might minimize transaction costs as well as opportunities for leakage. PMID:22006314

  14. Variation of the anthropic vulnerability in Ribeirão das Pedras watershed in Campinas/SP - Brazil.

    NASA Astrophysics Data System (ADS)

    Damame, Desirée; Longo, Regina; Ribeiro, Admilson; Fengler, Felipe

    2015-04-01

    The human actions has caused over the years profound changes in environmental quality in urban ecosystems suffering losses in the quality of air, soil , water and vegetation also the quality of life of the population that inhabit these areas . The study area is characterized by being a highly urbanized watershed, with about 43 % of its area covered by buildings, houses , and commercial and industrial establishments . Called the Ribeirão das Pedras Basin, located in Campinas / SP - Brazil and is bounded by coordinates 22˚47'10 '' and 22˚52'20 '' S , and 47˚ 07'15 '' and 46˚ 02 ' 15' ' . Has an average temperature of 22.4 ° C and average annual rainfall of 1424.5 mm . It has an area of about 42 km² . This is located two universities and a large mall. It also demands a strong agriculture , which occupies about 30 % of the area . It has also been part of two major forest reserves of the municipality, the Forest Santa Geneva and the Forest of Quilombo , both added to other small fragments overlying only about 6% of the total basin area . Avalição to environmental quality , the analysis of the vulnerability of urban watershed becomes an important environmental management tool. The vulnerability can be defined by susceptibility to changes of environment in its initial state , a current tax status by human intervention , and is almost always associated with risk , and the intensity at which such projects in one place, person or structure. In this context , this study aimed to assess environmental vulnerability in an urban watershed coming under increasing human pressures , especially in recent years . For this analysis were prepared soil graphics, slope , elevation and land use and land cover for the years 2009 and 2014 , generating with these , comparative anthropic vulnerability maps of the past five years. Crafting vulnerability maps is a sensitivity in order to enable appropriate management of biotic systems. With the results can be seen that the variation of anthropogenic vulnerability in the study area took place mainly by the real estate growth that the area has suffered in recent years, due to the large enhancement of the region , both for businesses and homes , as for industrial area. It was found that the distribution of anthropogenic vulnerability for 2009 was 19% too low, 33% low, 40 % moderate , high 8% and 0% too high. 2014 was obtained by dividing the current scenario is as follows: 10% very low , low 31% , moderate 50% , 9% and 0% high too high, meaning that there was an increase in high vulnerability points and moderate and still , a very significant decrease for low and very low vulnerability , revealing the strong environmental impact that the area has been suffering . Thus, we can conclude that the housing boom in large areas impacts the vulnerability of a watershed , which will certainly affect both the areas of forest / native fragments , and subsequently the quality of life of the surrounding population. In the specific case of Ribeirão das Pedras watershed , knowing the strong agricultural occupation of the area , it is known that the increased fragility still imply large losses for food production in the region.

  15. Allostatic load: single parents, stress-related health issues, and social care.

    PubMed

    Johner, Randy L

    2007-05-01

    This article explores the possible relationships between allostatic load (AL) and stress-related health issues in the low-income single-parent population, using both a population health perspective (PHP) and a biological framework. A PHP identifies associations among such factors as gender, income, employment, and social support and their potential effect on health outcomes. A PHP also recognizes physiological and pathological manifestations of the body such as stress (mental or somatic) and individual biological parameters (for example, glucose levels) as health determinants. AL uses an aggregate score of individual biological parameters as a health measure that is exacerbated through repetitive movement of physiologic systems under stress. The social work profession should incorporate knowledge of both PHP and AL into its theory and practice domains for effective care of vulnerable populations such as single-parent families.

  16. Assessment of Critical Events Corridors through Multivariate Cascading Outages Analysis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Makarov, Yuri V.; Samaan, Nader A.; Diao, Ruisheng

    2011-10-17

    Massive blackouts of electrical power systems in North America over the past decade has focused increasing attention upon ways to identify and simulate network events that may potentially lead to widespread network collapse. This paper summarizes a method to simulate power-system vulnerability to cascading failures to a supplied set of initiating events synonymously termed as Extreme Events. The implemented simulation method is currently confined to simulating steady state power-system response to a set of extreme events. The outlined method of simulation is meant to augment and provide a new insight into bulk power transmission network planning that at present remainsmore » mainly confined to maintaining power system security for single and double component outages under a number of projected future network operating conditions. Although one of the aims of this paper is to demonstrate the feasibility of simulating network vulnerability to cascading outages, a more important goal has been to determine vulnerable parts of the network that may potentially be strengthened in practice so as to mitigate system susceptibility to cascading failures. This paper proposes to demonstrate a systematic approach to analyze extreme events and identify vulnerable system elements that may be contributing to cascading outages. The hypothesis of critical events corridors is proposed to represent repeating sequential outages that can occur in the system for multiple initiating events. The new concept helps to identify system reinforcements that planners could engineer in order to 'break' the critical events sequences and therefore lessen the likelihood of cascading outages. This hypothesis has been successfully validated with a California power system model.« less

  17. Genetic Vulnerability and the Relationship of Commercial Germplasms of Maize in Brazil with the Nested Association Mapping Parents

    PubMed Central

    Fritsche Neto, Roberto; Granato, Ítalo Stefanine Correia; Sant’Ana, Gustavo César; Morais, Pedro Patric Pinho; Borém, Aluízio

    2016-01-01

    A few breeding companies dominate the maize (Zea mays L.) hybrid market in Brazil: Monsanto® (35%), DuPont Pioneer® (30%), Dow Agrosciences® (15%), Syngenta® (10%) and Helix Sementes (4%). Therefore, it is important to monitor the genetic diversity in commercial germplasms as breeding practices, registration and marketing of new cultivars can lead to a significant reduction of the genetic diversity. Reduced genetic variation may lead to crop vulnerabilities, food insecurity and limited genetic gains following selection. The aim of this study was to evaluate the genetic vulnerability risk by examining the relationship between the commercial Brazilian maize germplasms and the Nested Association Mapping (NAM) Parents. For this purpose, we used the commercial hybrids with the largest market share in Brazil and the NAM parents. The hybrids were genotyped for 768 single nucleotide polymorphisms (SNPs), using the Illumina Goldengate® platform. The NAM parent genomic data, comprising 1,536 SNPs for each line, were obtained from the Panzea data bank. The population structure, genetic diversity and the correlation between allele frequencies were analyzed. Based on the estimated effective population size and genetic variability, it was found that there is a low risk of genetic vulnerability in the commercial Brazilian maize germplasms. However, the genetic diversity is lower than those found in the NAM parents. Furthermore, the Brazilian germplasms presented no close relations with most NAM parents, except B73. This indicates that B73, or its heterotic group (Iowa Stiff Stalk Synthetic), contributed to the development of the commercial Brazilian germplasms. PMID:27780247

  18. Genetic Vulnerability and the Relationship of Commercial Germplasms of Maize in Brazil with the Nested Association Mapping Parents.

    PubMed

    Andrade, Luciano Rogério Braatz de; Fritsche Neto, Roberto; Granato, Ítalo Stefanine Correia; Sant'Ana, Gustavo César; Morais, Pedro Patric Pinho; Borém, Aluízio

    2016-01-01

    A few breeding companies dominate the maize (Zea mays L.) hybrid market in Brazil: Monsanto® (35%), DuPont Pioneer® (30%), Dow Agrosciences® (15%), Syngenta® (10%) and Helix Sementes (4%). Therefore, it is important to monitor the genetic diversity in commercial germplasms as breeding practices, registration and marketing of new cultivars can lead to a significant reduction of the genetic diversity. Reduced genetic variation may lead to crop vulnerabilities, food insecurity and limited genetic gains following selection. The aim of this study was to evaluate the genetic vulnerability risk by examining the relationship between the commercial Brazilian maize germplasms and the Nested Association Mapping (NAM) Parents. For this purpose, we used the commercial hybrids with the largest market share in Brazil and the NAM parents. The hybrids were genotyped for 768 single nucleotide polymorphisms (SNPs), using the Illumina Goldengate® platform. The NAM parent genomic data, comprising 1,536 SNPs for each line, were obtained from the Panzea data bank. The population structure, genetic diversity and the correlation between allele frequencies were analyzed. Based on the estimated effective population size and genetic variability, it was found that there is a low risk of genetic vulnerability in the commercial Brazilian maize germplasms. However, the genetic diversity is lower than those found in the NAM parents. Furthermore, the Brazilian germplasms presented no close relations with most NAM parents, except B73. This indicates that B73, or its heterotic group (Iowa Stiff Stalk Synthetic), contributed to the development of the commercial Brazilian germplasms.

  19. Variant BDNF-Val66Met Polymorphism is Associated with Layer-Specific Alterations in GABAergic Innervation of Pyramidal Neurons, Elevated Anxiety and Reduced Vulnerability of Adolescent Male Mice to Activity-Based Anorexia.

    PubMed

    Chen, Yi-Wen; Surgent, Olivia; Rana, Barkha S; Lee, Francis; Aoki, Chiye

    2017-08-01

    Previously, we determined that rodents' vulnerability to food restriction (FR)-evoked wheel running during adolescence (activity-based anorexia, ABA) is associated with failures to increase GABAergic innervation of hippocampal and medial prefrontal pyramidal neurons. Since brain-derived neurotrophic factor (BDNF) promotes GABAergic synaptogenesis, we hypothesized that individual differences in this vulnerability may arise from differences in the link between BDNF bioavailability and FR-evoked wheel running. We tested this hypothesis in male BDNF-Val66Met knock-in mice (BDNFMet/Met), known for reduction in the activity-dependent BDNF secretion and elevated anxiety-like behaviors. We found that 1) in the absence of FR or a wheel (i.e., control), BDNFMet/Met mice are more anxious than wild-type (WT) littermates, 2) electron microscopically verified GABAergic innervations of pyramidal neurons of BDNFMet/Met mice are reduced at distal dendrites in hippocampal CA1 and medial prefrontal cortex, 3) following ABA, WT mice exhibit anxiety equal to those of the BDNFMet/Met mice and have lost GABAergic innervation along distal dendrites, 4) BDNFMet/Met mice show blunted ABA vulnerability, and 5) unexpectedly, GABAergic innervation is higher at somata of BDNFMet/Met mice than of WT. We conclude that lamina-specific GABAergic inhibition is important for regulating anxiety, whether arising from environmental stress, such as food deprivation, or genetically, such as BDNFMet/Met single nucleotide polymorphism. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  20. Morphological Characteristics of Motor Neurons Do Not Determine Their Relative Susceptibility to Degeneration in a Mouse Model of Severe Spinal Muscular Atrophy

    PubMed Central

    Mutsaers, Chantal A.; Thomson, Derek; Hamilton, Gillian; Parson, Simon H.; Gillingwater, Thomas H.

    2012-01-01

    Spinal muscular atrophy (SMA) is a leading genetic cause of infant mortality, resulting primarily from the degeneration and loss of lower motor neurons. Studies using mouse models of SMA have revealed widespread heterogeneity in the susceptibility of individual motor neurons to neurodegeneration, but the underlying reasons remain unclear. Data from related motor neuron diseases, such as amyotrophic lateral sclerosis (ALS), suggest that morphological properties of motor neurons may regulate susceptibility: in ALS larger motor units innervating fast-twitch muscles degenerate first. We therefore set out to determine whether intrinsic morphological characteristics of motor neurons influenced their relative vulnerability to SMA. Motor neuron vulnerability was mapped across 10 muscle groups in SMA mice. Neither the position of the muscle in the body, nor the fibre type of the muscle innervated, influenced susceptibility. Morphological properties of vulnerable and disease-resistant motor neurons were then determined from single motor units reconstructed in Thy.1-YFP-H mice. None of the parameters we investigated in healthy young adult mice – including motor unit size, motor unit arbor length, branching patterns, motor endplate size, developmental pruning and numbers of terminal Schwann cells at neuromuscular junctions - correlated with vulnerability. We conclude that morphological characteristics of motor neurons are not a major determinant of disease-susceptibility in SMA, in stark contrast to related forms of motor neuron disease such as ALS. This suggests that subtle molecular differences between motor neurons, or extrinsic factors arising from other cell types, are more likely to determine relative susceptibility in SMA. PMID:23285108

Top