Childhood Sexual Violence in Indonesia: A Systematic Review.
Rumble, Lauren; Febrianto, Ryan Fajar; Larasati, Melania Niken; Hamilton, Carolyn; Mathews, Ben; Dunne, Michael P
2018-01-01
There has been relatively little research into the prevalence of childhood sexual violence (CSV) as well as the risk and protective factors for CSV in low- and middle-income countries including Indonesia. Systematic searches conducted in English and Bahasa Indonesia in this review identified 594 records published between 2006 and 2016 in peer-reviewed journals and other literature including 299 Indonesian records. Fifteen studies, including nine prevalence studies, met the quality appraisal criteria developed for this review. The review found that CSV research is scarce: Only one study included nationally representative prevalence estimates. Varying definitions for CSV, survey methods, and sample characteristics limited the generalizability of the data. The available evidence points to significant risk of sexual violence affecting both girls and boys across many geographical and institutional settings. Married adolescent girls are vulnerable to sexual violence by partners in their homes. Children in schools are vulnerable to CSV by peers and adults. Victims seldom disclose incidents and rarely seek support. In addition, early childhood experiences of trauma were strongly associated with later perpetration of sexual violence and revictimization. Limited information is available about protective factors. This review synthesizes evidence about what is currently known about CSV in Indonesia and identifies the strengths and weaknesses of the existing research. A more robust evidence base regarding CSV is required to better inform policy and justify investment into prevention programs.
GeoCSV: tabular text formatting for geoscience data
NASA Astrophysics Data System (ADS)
Stults, M.; Arko, R. A.; Davis, E.; Ertz, D. J.; Turner, M.; Trabant, C. M.; Valentine, D. W., Jr.; Ahern, T. K.; Carbotte, S. M.; Gurnis, M.; Meertens, C.; Ramamurthy, M. K.; Zaslavsky, I.; McWhirter, J.
2015-12-01
The GeoCSV design was developed within the GeoWS project as a way to provide a baseline of compatibility between tabular text data sets from various sub-domains in geoscience. Funded through NSF's EarthCube initiative, the GeoWS project aims to develop common web service interfaces for data access across hydrology, geodesy, seismology, marine geophysics, atmospheric science and other areas. The GeoCSV format is an essential part of delivering data via simple web services for discovery and utilization by both humans and machines. As most geoscience disciplines have developed and use data formats specific for their needs, tabular text data can play a key role as a lowest common denominator useful for exchanging and integrating data across sub-domains. The design starts with a core definition compatible with best practices described by the W3C - CSV on the Web Working Group (CSVW). Compatibility with CSVW is intended to ensure the broadest usability of data expressed as GeoCSV. An optional, simple, but limited metadata description mechanism was added to allow inclusion of important metadata with comma separated data, while staying with the definition of a "dialect" by CSVW. The format is designed both for creating new datasets and to annotate data sets already in a tabular text format such that they are compliant with GeoCSV.
Abraham, A D; Menzel, W; Varrelmann, M; Vetten, H Josef
2009-01-01
Chickpea chlorotic stunt virus (CpCSV), a proposed new member of the genus Polerovirus (family Luteoviridae), has been reported only from Ethiopia. In attempts to determine the geographical distribution and variability of CpCSV, a pair of degenerate primers derived from conserved domains of the luteovirus coat protein (CP) gene was used for RT-PCR analysis of various legume samples originating from five countries and containing unidentified luteoviruses. Sequencing of the amplicons provided evidence for the occurrence of CpCSV also in Egypt, Morocco, Sudan, and Syria. Phylogenetic analysis of the CP nucleotide sequences of 18 samples from the five countries revealed the existence of two geographic groups of CpCSV isolates differing in CP sequences by 8-10%. Group I included isolates from Ethiopia and Sudan, while group II comprised those from Egypt, Morocco and Syria. For distinguishing these two groups, a simple RFLP test using HindIII and/or PvuII for cleavage of CP-gene-derived PCR products was developed. In ELISA and immunoelectron microscopy, however, isolates from these two groups could not be distinguished with rabbit antisera raised against a group-I isolate from Ethiopia (CpCSV-Eth) and a group-II isolate from Syria (CpCSV-Sy). Since none of the ten monoclonal antibodies (MAbs) that had been produced earlier against CpCSV-Eth reacted with group-II isolates, further MAbs were produced. Of the seven MAbs raised against CpCSV-Sy, two reacted only with CpCSV-Sy and two others with both CpCSV-Sy and -Eth. This indicated that there are group I- and II-specific and common (species-specific) epitopes on the CpCSV CP and that the corresponding MAbs are suitable for specific detection and discrimination of CpCSV isolates. Moreover, CpCSV-Sy (group II) caused more severe stunting and yellowing in faba bean than CpCSV-Eth (group I). In conclusion, our data indicate the existence of a geographically associated variation in the molecular, serological and presumably biological properties of CpCSV.
Pinheiro, Marcel D O; Bols, Niels C
2018-03-05
For the first time, ciliates have been found to activate rather than inactivate a virus, chum salmon reovirus (CSV). Activation was seen as an increase in viral titre upon incubation of CSV at 22 °C with Tetrahymena canadenesis and two strains of T. thermophila: wild type (B1975) and a temperature conditional mutant for phagocytosis (NP1). The titre increase was not likely due to replication because CSV had no visible effects on the ciliates and no vertebrate virus has ever been shown unequivocally to replicate in ciliates. When incubated with B1975 and NP1 at 30 °C, CSV was activated only by B1975. Therefore, activation required CSV internalization because at 30 °C only B1975 exhibited phagocytosis. CSV replicated in fish cells at 18 to 26 °C but not at 30 °C. Collectively, these observations point to CSV activation being distinct from replication. Activation is attributed to the CSV capsid being modified in the ciliate phagosomal-lysosomal system and released in a more infectious form. When allowed to swim in CSV-infected fish cell cultures, collected, washed, and transferred to uninfected cultures, T. canadensis caused a CSV infection. Overall the results suggest that ciliates could have roles in the environmental dissemination of some fish viral diseases. © 2018 The Author(s) Journal of Eukaryotic Microbiology © 2018 International Society of Protistologists.
Noh, Hyangsoon; Yan, Jun; Hong, Sungguan; Kong, Ling-Yuan; Gabrusiewicz, Konrad; Xia, Xueqing; Heimberger, Amy B; Li, Shulin
2016-11-01
Intracellular vimentin overexpression has been associated with epithelial-mesenchymal transition, metastasis, invasion, and proliferation, but cell surface vimentin (CSV) is less understood. Furthermore, it remains unknown whether CSV can serve as a therapeutic target in CSV-expressing tumor cells. We found that CSV was present on glioblastoma multiforme (GBM) cancer stem cells and that CSV expression was associated with spheroid formation in those cells. A newly developed monoclonal antibody against CSV, 86C, specifically and significantly induced apoptosis and inhibited spheroid formation in GBM cells in vitro. The addition of 86C to GBM cells in vitro also led to rapid internalization of vimentin and decreased GBM cell viability. These findings were associated with an increase in caspase-3 activity, indicating activation of apoptosis. Finally, treatment with 86C inhibited GBM progression in vivo. In conclusion, CSV-expressing GBM cells have properties of tumor initiating cells, and targeting CSV with the monoclonal antibody 86C is a promising approach in the treatment of GBM.
Wadeable Streams Assessment Data
The Wadeable Streams Assessment (WSA) is a first-ever statistically-valid survey of the biological condition of small streams throughout the U.S. The U.S. Environmental Protection Agency (EPA) worked with the states to conduct the assessment in 2004-2005. Data for each parameter sampled in the Wadeable Streams Assessment (WSA) are available for downloading in a series of files as comma separated values (*.csv). Each *.csv data file has a companion text file (*.txt) that lists a dataset label and individual descriptions for each variable. Users should view the *.txt files first to help guide their understanding and use of the data.
EPA FRS Facilities State Single File CSV Download
This page provides state comma separated value (CSV) files containing key information of all facilities and sites within the Facility Registry System (FRS). Each state zip file contains a single CSV file of key facility-level information.
A Preliminary Investigation of Reversing RML: From an RDF dataset to its Column-Based data source
Gougousis, Alexandros
2015-01-01
Abstract Background A large percentage of scientific data with tabular structure are published on the Web of Data as interlinked RDF datasets. When we come to the issue of long-term preservation of such RDF-based digital objects, it is important to provide full support for reusing them in the future. In particular, it should include means for both players who have no familiarity with RDF data model and, at the same time, who by working only with the native format of the data still provide sufficient information. To achieve this, we need mechanisms to bring the data back to their original format and structure. New information In this paper, we investigate how to perform the reverse process for column-based data sources. In particular, we devise an algorithm, RML2CSV, and exemplify its implementation in transforming an RDF dataset into its CSV tabular structure, through the use of the same RML mapping document that was used to generate the set of RDF triples. Through a set of content-based criteria, we attempt a comparative evaluation to measure the similarity between the rebuilt CSV and the original one. The results are promising and show that, under certain assumptions, RML2CSV reconstructs the same data with the same structure, offering more advanced digital preservation services. PMID:26312054
Molecular Characterization of Watermelon Chlorotic Stunt Virus (WmCSV) from Palestine
Ali-Shtayeh, Mohammed S.; Jamous, Rana M.; Mallah, Omar B.; Abu-Zeitoun, Salam Y.
2014-01-01
The incidence of watermelon chlorotic stunt disease and molecular characterization of the Palestinian isolate of Watermelon chlorotic stunt virus (WmCSV-[PAL]) are described in this study. Symptomatic leaf samples obtained from watermelon Citrullus lanatus (Thunb.), and cucumber (Cucumis sativus L.) plants were tested for WmCSV-[PAL] infection by polymerase chain reaction (PCR) and Rolling Circle Amplification (RCA). Disease incidence ranged between 25%–98% in watermelon fields in the studied area, 77% of leaf samples collected from Jenin were found to be mixed infected with WmCSV-[PAL] and SLCV. The full-length DNA-A and DNA-B genomes of WmCSV-[PAL] were amplified and sequenced, and the sequences were deposited in the GenBank. Sequence analysis of virus genomes showed that DNA-A and DNA-B had 97.6%–99.42% and 93.16%–98.26% nucleotide identity with other virus isolates in the region, respectively. Sequence analysis also revealed that the Palestinian isolate of WmCSV shared the highest nucleotide identity with an isolate from Israel suggesting that the virus was introduced to Palestine from Israel. PMID:24956181
Wada, Atsushi; Sakano, Yuichi; Ando, Hiroshi
2016-01-01
Vision is important for estimating self-motion, which is thought to involve optic-flow processing. Here, we investigated the fMRI response profiles in visual area V6, the precuneus motion area (PcM), and the cingulate sulcus visual area (CSv)—three medial brain regions recently shown to be sensitive to optic-flow. We used wide-view stereoscopic stimulation to induce robust self-motion processing. Stimuli included static, randomly moving, and coherently moving dots (simulating forward self-motion). We varied the stimulus size and the presence of stereoscopic information. A combination of univariate and multi-voxel pattern analyses (MVPA) revealed that fMRI responses in the three regions differed from each other. The univariate analysis identified optic-flow selectivity and an effect of stimulus size in V6, PcM, and CSv, among which only CSv showed a significantly lower response to random motion stimuli compared with static conditions. Furthermore, MVPA revealed an optic-flow specific multi-voxel pattern in the PcM and CSv, where the discrimination of coherent motion from both random motion and static conditions showed above-chance prediction accuracy, but that of random motion from static conditions did not. Additionally, while area V6 successfully classified different stimulus sizes regardless of motion pattern, this classification was only partial in PcM and was absent in CSv. This may reflect the known retinotopic representation in V6 and the absence of such clear visuospatial representation in CSv. We also found significant correlations between the strength of subjective self-motion and univariate activation in all examined regions except for primary visual cortex (V1). This neuro-perceptual correlation was significantly higher for V6, PcM, and CSv when compared with V1, and higher for CSv when compared with the visual motion area hMT+. Our convergent results suggest the significant involvement of CSv in self-motion processing, which may give rise to its percept. PMID:26973588
VizieR Online Data Catalog: Parenago Catalog of Stars in Orion Nebula (Parenago 1954)
NASA Astrophysics Data System (ADS)
Parenago, P. P.
1997-10-01
The present catalogue is a machine-readable version of the catalogue of stars in the area of the Orion nebula, published by P.P. Parenago (1954). The sky area between 5h 24m and 5h 36m in right ascension (1900.0) and between -4 and -7 degrees in declination (1900.0), containing the Orion nebula, has been investigated in that work. Ten of variable stars in original Parenago (1954) catalogue had CSV numbers (Kukarkin et al., 1951) but since that time all of them were confirmed as variables and included in GCVS (Kholopov et al., 1985a&b, 1987). We superseded CSV-numbers by GCVS-names in the machine-readable version for the following stars: ------------------------------------------------ Number in CSV-number GCVS-name the catalogue ------------------------------------------------ 1605 606 V372 ORI 1613 607 V373 ORI 1635 608 V374 ORI 1713 609 V375 ORI 1748 610 V387 ORI 1762 100569 V376 ORI 1974 617 V377 ORI 2183 625 V388 ORI 2393 630 V380 ORI 2478 634 V381 ORI ------------------------------------------------ (1 data file).
Voltammetric determination of arsenic in high iron and manganese groundwaters.
Gibbon-Walsh, Kristoff; Salaün, Pascal; Uroic, M Kalle; Feldmann, Joerg; McArthur, John M; van den Berg, Constant M G
2011-09-15
Determination of the speciation of arsenic in groundwaters, using cathodic stripping voltammetry (CSV), is severely hampered by high levels of iron and manganese. Experiments showed that the interference is eliminated by addition of EDTA, making it possible to determine the arsenic speciation on-site by CSV. This work presents the CSV method to determine As(III) in high-iron or -manganese groundwaters in the field with only minor sample treatment. The method was field-tested in West-Bengal (India) on a series of groundwater samples. Total arsenic was subsequently determined after acidification to pH 1 by anodic stripping voltammetry (ASV). Comparative measurements by ICP-MS as reference method for total As, and by HPLC for its speciation, were used to corroborate the field data in stored samples. Most of the arsenic (78±0.02%) was found to occur as inorganic As(III) in the freshly collected waters, in accordance with previous studies. The data shows that the modified on-site CSV method for As(III) is a good measure of water contamination with As. The EDTA was also found to be effective in stabilising the arsenic speciation for longterm sample storage at room temperature. Without sample preservation, in water exposed to air and sunlight, the As(III) was found to become oxidised to As(V), and Fe(II) oxidised to Fe(III), removing the As(V) by adsorption on precipitating Fe(III)-hydroxides within a few hours. Copyright © 2011 Elsevier B.V. All rights reserved.
Elements of a next generation time-series ASCII data file format for Earth Sciences
NASA Astrophysics Data System (ADS)
Webster, C. J.
2015-12-01
Data in ASCII comma separated value (CSV) format are recognized as the most simple, straightforward and readable type of data present in the geosciences. Many scientific workflows developed over the years rely on data using this simple format. However, there is a need for a lightweight ASCII header format standard that is easy to create and easy to work with. Current OGC grade XML standards are complex and difficult to implement for researchers with few resources. Ideally, such a format should provide the data in CSV for easy consumption by generic applications such as spreadsheets. The format should use an existing time standard. The header should be easily human readable as well as machine parsable. The metadata format should be extendable to allow vocabularies to be adopted as they are created by external standards bodies. The creation of such a format will increase the productivity of software engineers and scientists because fewer translators and checkers would be required. Data in ASCII comma separated value (CSV) format are recognized as the most simple, straightforward and readable type of data present in the geosciences. Many scientific workflows developed over the years rely on data using this simple format. However, there is a need for a lightweight ASCII header format standard that is easy to create and easy to work with. Current OGC grade XML standards are complex and difficult to implement for researchers with few resources. Ideally, such a format would provide the data in CSV for easy consumption by generic applications such as spreadsheets. The format would use existing time standard. The header would be easily human readable as well as machine parsable. The metadata format would be extendable to allow vocabularies to be adopted as they are created by external standards bodies. The creation of such a format would increase the productivity of software engineers and scientists because fewer translators would be required.
Sutiman, Natalia; Zhang, Zhenxian; Tan, Eng Huat; Ang, Mei Kim; Tan, Shao-Weng Daniel; Toh, Chee Keong; Ng, Quan Sing; Chowbay, Balram; Lim, Wan-Teck
2016-01-01
Purpose This study aimed to evaluate the safety, tolerability and pharmacokinetics of the combination of oral vinorelbine with erlotinib using the conventional (CSV) and metronomic (MSV) dosing schedules in patients with advanced non-small cell lung cancer (NSCLC). Methods This was an open-label, multiple dose-escalation phase I study. An alternating 3+3 phase I design was employed to allow each schedule to enroll three patients sequentially at each dose level. Thirty patients with Stage IIIB/IV NSCLC were treated with escalating doses of oral vinorelbine starting at 40 mg/m2 on day 1 and 8 in the CSV group (N = 16) and at 100 mg/week in the MSV group (N = 14). Erlotinib was administered orally daily. Results The maximum tolerated dose was vinorelbine 80 mg/m2 with erlotinib 100 mg in the CSV group and vinorelbine 120 mg/week with erlotinib 100 mg in the MSV group. Grade 3/4 toxicities included neutropenia (N = 2; 13%) and hyponatremia (N = 1; 6%) in the CSV group, and neutropenia (N = 5; 36%) in the MSV group. Objective response was achieved in 38% and 29% in the CSV and MSV groups respectively. Vinorelbine co-administration did not significantly affect the pharmacokinetics of erlotinib and OSI-420 after initial dose. However, at steady-state, significantly higher Cmax, higher Cmin and lower CL/F of erlotinib were observed with increasing dose levels of vinorelbine in the CSV group. Significantly higher steady-state Cmin, Cavg and AUCss of erlotinib were observed with increasing dose levels of vinorelbine in the MSV group. Conclusions Combination of oral vinorelbine with erlotinib is feasible and tolerable in both the CSV and MSV groups. Trial Registration ClinicalTrials.gov NCT00702182 PMID:27135612
Assessing the Adaptability to Irregular Rest-Work Rhythms in Military Personnel
2000-03-01
Aeronautica Militare Italiana, CSV Reparto Medicina Aerospaziale Pratica di Mare, 00040 Pomezia (Roma) Italy 2 Dipartimento di Psicologia - Universitd...characteristics to adapt to increased work errors and impaired social work at unusual hours. and family relationship. In addition, there is an increased mortality...DUTY: a brief questionnaire on critical evaluation. Journal of Personality the sleep-wake cycle and vigilance filled in and Social Psychology. 58: 844
Primary mental health care for survivors of collective sexual violence in Rwanda.
Zraly, Maggie; Rubin-Smith, Julia; Betancourt, Theresa
2011-01-01
This paper draws attention to the obligation and opportunity to respond to the mental health impacts of collective sexual violence (CSV) among genocide-rape survivors in post-genocide Rwanda. Qualitative data gathered from CSV survivors who were members of Rwandan women's genocide survivor associations are presented to illustrate how they strive to overcome adversity while seeking access to quality mental health care and using informal community mental health services. The results reveal that a system of high quality, holistic health and mental health care is yet needed to meet Rwandan CSV survivors' complex and serious health and mental health needs. Given that a rural health system, modelled on community-based, comprehensive HIV/AIDS care and treatment, is currently being implemented in Rwanda, we recommend enhancements to this model that would contribute to meeting the mental health care needs of CSV survivors while benefiting the health and mental health system as a whole within Rwanda.
DeWitte-Orr, Stephanie J; Leong, Jo-Ann C; Bols, Niels C
2007-09-01
The expression of potential antiviral genes, Mx1, Mx2, Mx3 and vig-1, was studied in two rainbow trout cell lines: monocyte/macrophage RTS11 and fibroblast-like RTG-2. Transcripts were monitored by RT-PCR; Mx protein by Western blotting. In unstimulated cultures Mx1 and vig-1 transcripts were seen occasionally in RTS11 but rarely in RTG-2. A low level of Mx protein was seen in unstimulated RTS11 but not in RTG-2. In both cell lines, Mx and vig-1 transcripts were induced by a dsRNA, poly inosinic: poly cytidylic acid (poly IC), and by Chum salmon reovirus (CSV). Medium conditioned by cells previously exposed to poly IC or CSV and assumed to contain interferon (IFN) induced the antiviral genes in RTS11. However, RTG-2 responded only to medium conditioned by RTG-2 exposed previously to CSV. In both cell lines, poly IC and CSV induced Mx transcripts in the presence of cycloheximide, suggesting a direct induction mechanism, independent of IFN, was also possible. For CSV, ribavirin blocked induction in RTS11 but not in RTG-2, suggesting viral RNA synthesis was required for induction only in RTS11. In both RTS11 and RTG-2 cultures, Mx protein showed enhanced accumulation by 24h after exposure to poly IC and CSV, but subsequently Mx protein levels declined back to control levels in RTS11 but not in RTG-2. These results suggest that Mx can be regulated differently in macrophages and fibroblasts.
DOE Office of Scientific and Technical Information (OSTI.GOV)
2014-08-14
RolX takes the features from Re-FeX or any other feature matrix as input and outputs role assignments (clusters). The output of RolX is a csv file containing the node-role memberships and a csv file containing the role-feature definitions.
Complete Nucleotide Sequence of Watermelon Chlorotic Stunt Virus Originating from Oman
Khan, Akhtar J.; Akhtar, Sohail; Briddon, Rob W.; Ammara, Um; Al-Matrooshi, Abdulrahman M.; Mansoor, Shahid
2012-01-01
Watermelon chlorotic stunt virus (WmCSV) is a bipartite begomovirus (genus Begomovirus, family Geminiviridae) that causes economic losses to cucurbits, particularly watermelon, across the Middle East and North Africa. Recently squash (Cucurbita moschata) grown in an experimental field in Oman was found to display symptoms such as leaf curling, yellowing and stunting, typical of a begomovirus infection. Sequence analysis of the virus isolated from squash showed 97.6–99.9% nucleotide sequence identity to previously described WmCSV isolates for the DNA A component and 93–98% identity for the DNA B component. Agrobacterium-mediated inoculation to Nicotiana benthamiana resulted in the development of symptoms fifteen days post inoculation. This is the first bipartite begomovirus identified in Oman. Overall the Oman isolate showed the highest levels of sequence identity to a WmCSV isolate originating from Iran, which was confirmed by phylogenetic analysis. This suggests that WmCSV present in Oman has been introduced from Iran. The significance of this finding is discussed. PMID:22852046
Complete nucleotide sequence of watermelon chlorotic stunt virus originating from Oman.
Khan, Akhtar J; Akhtar, Sohail; Briddon, Rob W; Ammara, Um; Al-Matrooshi, Abdulrahman M; Mansoor, Shahid
2012-07-01
Watermelon chlorotic stunt virus (WmCSV) is a bipartite begomovirus (genus Begomovirus, family Geminiviridae) that causes economic losses to cucurbits, particularly watermelon, across the Middle East and North Africa. Recently squash (Cucurbita moschata) grown in an experimental field in Oman was found to display symptoms such as leaf curling, yellowing and stunting, typical of a begomovirus infection. Sequence analysis of the virus isolated from squash showed 97.6-99.9% nucleotide sequence identity to previously described WmCSV isolates for the DNA A component and 93-98% identity for the DNA B component. Agrobacterium-mediated inoculation to Nicotiana benthamiana resulted in the development of symptoms fifteen days post inoculation. This is the first bipartite begomovirus identified in Oman. Overall the Oman isolate showed the highest levels of sequence identity to a WmCSV isolate originating from Iran, which was confirmed by phylogenetic analysis. This suggests that WmCSV present in Oman has been introduced from Iran. The significance of this finding is discussed.
Mohan, Karishma
2017-01-01
ABSTRACT Pseudomonas putida CSV86 degrades lignin-derived metabolic intermediates, viz., veratryl alcohol, ferulic acid, vanillin, and vanillic acid, as the sole sources of carbon and energy. Strain CSV86 also degraded lignin sulfonate. Cell respiration, enzyme activity, biotransformation, and high-pressure liquid chromatography (HPLC) analyses suggest that veratryl alcohol and ferulic acid are metabolized to vanillic acid by two distinct carbon source-dependent inducible pathways. Vanillic acid was further metabolized to protocatechuic acid and entered the central carbon pathway via the β-ketoadipate route after ortho ring cleavage. Genes encoding putative enzymes involved in the degradation were found to be present at fer, ver, and van loci. The transcriptional analysis suggests a carbon source-dependent cotranscription of these loci, substantiating the metabolic studies. Biochemical and quantitative real-time (qRT)-PCR studies revealed the presence of two distinct O-demethylases, viz., VerAB and VanAB, involved in the oxidative demethylation of veratric acid and vanillic acid, respectively. This report describes the various steps involved in metabolizing lignin-derived aromatic compounds at the biochemical level and identifies the genes involved in degrading veratric acid and the arrangement of phenylpropanoid metabolic genes as three distinct inducible transcription units/operons. This study provides insight into the bacterial degradation of lignin-derived aromatics and the potential of P. putida CSV86 as a suitable candidate for producing valuable products. IMPORTANCE Pseudomonas putida CSV86 metabolizes lignin and its metabolic intermediates as a carbon source. Strain CSV86 displays a unique property of preferential utilization of aromatics, including for phenylpropanoids over glucose. This report unravels veratryl alcohol metabolism and genes encoding veratric acid O-demethylase, hitherto unknown in pseudomonads, thereby providing new insight into the metabolic pathway and gene pool for lignin degradation in bacteria. The biochemical and genetic characterization of phenylpropanoid metabolism makes it a prospective system for its application in producing valuable products, such as vanillin and vanillic acid, from lignocellulose. This study supports the immense potential of P. putida CSV86 as a suitable candidate for bioremediation and biorefinery. PMID:28188206
Recursive Feature Extraction in Graphs
DOE Office of Scientific and Technical Information (OSTI.GOV)
2014-08-14
ReFeX extracts recursive topological features from graph data. The input is a graph as a csv file and the output is a csv file containing feature values for each node in the graph. The features are based on topological counts in the neighborhoods of each nodes, as well as recursive summaries of neighbors' features.
A Prototype Web-based system for GOES-R Space Weather Data
NASA Astrophysics Data System (ADS)
Sundaravel, A.; Wilkinson, D. C.
2010-12-01
The Geostationary Operational Environmental Satellite-R Series (GOES-R) makes use of advanced instruments and technologies to monitor the Earth's surface and provide with accurate space weather data. The first GOES-R series satellite is scheduled to be launched in 2015. The data from the satellite will be widely used by scientists for space weather modeling and predictions. This project looks into the ways of how these datasets can be made available to the scientists on the Web and to assist them on their research. We are working on to develop a prototype web-based system that allows users to browse, search and download these data. The GOES-R datasets will be archived in NetCDF (Network Common Data Form) and CSV (Comma Separated Values) format. The NetCDF is a self-describing data format that contains both the metadata information and the data. The data is stored in an array-oriented fashion. The web-based system will offer services in two ways: via a web application (portal) and via web services. Using the web application, the users can download data in NetCDF or CSV format and can also plot a graph of the data. The web page displays the various categories of data and the time intervals for which the data is available. The web application (client) sends the user query to the server, which then connects to the data sources to retrieve the data and delivers it to the users. Data access will also be provided via SOAP (Simple Object Access Protocol) and REST (Representational State Transfer) web services. These provide functions which can be used by other applications to fetch data and use the data for further processing. To build the prototype system, we are making use of proxy data from existing GOES and POES space weather datasets. Java is the programming language used in developing tools that formats data to NetCDF and CSV. For the web technology we have chosen Grails to develop both the web application and the services. Grails is an open source web application framework based on the Groovy language. We are also making use of the THREDDS (Thematic Realtime Environmental Distributed Data Services) server to publish and access the NetCDF files. We have completed developing software tools to generate NetCDF and CSV data files and also tools to translate NetCDF to CSV. The current phase of the project involves in designing and developing the web interface.
The Last Word on TLE (Briefing Charts)
2015-05-12
hist, show, plot, figure import pandas as pd from os import chdir 16 File processing • filename="TPSrun.csv" arr = pd.read_csv(filename) r... pandas theta = atan2(model.beta.x, 1.0) tArrX=[ ] ; tArrY=[ ] # define arrays for i in range(len(arr.y)): # how to put stuff into an array! append
Matter-induced charge-symmetry-violating NN potential
DOE Office of Scientific and Technical Information (OSTI.GOV)
Biswas, Subhrajyoti; Roy, Pradip; Dutt-Mazumder, Abhee K.
2010-01-15
We construct a density-dependent, Class III, charge-symmetry-violating (CSV) potential due to mixing of the {rho}-{omega} meson with off-shell corrections. Here, in addition to the usual vacuum contribution, the matter-induced mixing of {rho}-{omega} is also included. It is observed that the contribution of the density-dependent CSV potential is comparable to that of the vacuum contribution.
Storm Prediction Center Today's Storm Reports
)(?) Time Location County State Lat Lon Comments 2056 7 N BUFORD ALBANY WY 4121 10530 TORNADO SPOTTED NORTH 4236 10503 ON THE GROUND AT THIS TIME. (CYS) 2215 15 N CHEYENNE LARAMIE WY 4136 10479 TORNADO MOVING TOWARDS I-25 BETWEEN MM 25 AND 35. (CYS) Hail Reports (CSV) (Raw Hail CSV)(?) Time Size Location County
Houck, Constance S; Deshpande, Jayant K; Flick, Randall P
2017-06-01
The Task Force for Children's Surgical Care, an ad-hoc multidisciplinary group of invited leaders in pediatric perioperative medicine, was assembled in May 2012 to consider approaches to optimize delivery of children's surgical care in today's competitive national healthcare environment. Over the subsequent 3 years, with support from the American College of Surgeons (ACS) and Children's Hospital Association (CHA), the group established principles regarding perioperative resource standards, quality improvement and safety processes, data collection, and verification that were used to develop an ACS-sponsored Children's Surgery Verification and Quality Improvement Program (ACS CSV). The voluntary ACS CSV was officially launched in January 2017 and more than 125 pediatric surgical programs have expressed interest in verification. ACS CSV-verified programs have specific requirements for pediatric anesthesia leadership, resources, and the availability of pediatric anesthesiologists or anesthesiologists with pediatric expertise to care for infants and young children. The present review outlines the history of the ACS CSV, key elements of the program, and the standards specific to pediatric anesthesiology. As with the pediatric trauma programs initiated more than 40 years ago, this program has the potential to significantly improve surgical care for infants and children in the United States and Canada.
Genotypic variability enhances the reproducibility of an ecological study.
Milcu, Alexandru; Puga-Freitas, Ruben; Ellison, Aaron M; Blouin, Manuel; Scheu, Stefan; Freschet, Grégoire T; Rose, Laura; Barot, Sebastien; Cesarz, Simone; Eisenhauer, Nico; Girin, Thomas; Assandri, Davide; Bonkowski, Michael; Buchmann, Nina; Butenschoen, Olaf; Devidal, Sebastien; Gleixner, Gerd; Gessler, Arthur; Gigon, Agnès; Greiner, Anna; Grignani, Carlo; Hansart, Amandine; Kayler, Zachary; Lange, Markus; Lata, Jean-Christophe; Le Galliard, Jean-François; Lukac, Martin; Mannerheim, Neringa; Müller, Marina E H; Pando, Anne; Rotter, Paula; Scherer-Lorenzen, Michael; Seyhun, Rahme; Urban-Mead, Katherine; Weigelt, Alexandra; Zavattaro, Laura; Roy, Jacques
2018-02-01
Many scientific disciplines are currently experiencing a 'reproducibility crisis' because numerous scientific findings cannot be repeated consistently. A novel but controversial hypothesis postulates that stringent levels of environmental and biotic standardization in experimental studies reduce reproducibility by amplifying the impacts of laboratory-specific environmental factors not accounted for in study designs. A corollary to this hypothesis is that a deliberate introduction of controlled systematic variability (CSV) in experimental designs may lead to increased reproducibility. To test this hypothesis, we had 14 European laboratories run a simple microcosm experiment using grass (Brachypodium distachyon L.) monocultures and grass and legume (Medicago truncatula Gaertn.) mixtures. Each laboratory introduced environmental and genotypic CSV within and among replicated microcosms established in either growth chambers (with stringent control of environmental conditions) or glasshouses (with more variable environmental conditions). The introduction of genotypic CSV led to 18% lower among-laboratory variability in growth chambers, indicating increased reproducibility, but had no significant effect in glasshouses where reproducibility was generally lower. Environmental CSV had little effect on reproducibility. Although there are multiple causes for the 'reproducibility crisis', deliberately including genetic variability may be a simple solution for increasing the reproducibility of ecological studies performed under stringently controlled environmental conditions.
{rho}-{omega} mixing and spin dependent charge-symmetry violating potential
DOE Office of Scientific and Technical Information (OSTI.GOV)
Biswas, Subhrajyoti; Roy, Pradip; Dutt-Mazumder, Abhee K.
2008-10-15
We construct the charge symmetry violating (CSV) nucleon-nucleon potential induced by the {rho}{sup 0}-{omega} mixing due to the neutron-proton mass difference driven by the NN loop. Analytical expression for the two-body CSV potential is presented containing both the central and noncentral NN interaction. We show that the {rho}NN tensor interaction can significantly enhance the charge symmetry violating NN interaction even if the momentum dependent off-shell {rho}{sup 0}-{omega} mixing amplitude is considered. It is also shown that the inclusion of form factors removes the divergence arising out of the contact interaction. Consequently, we see that the precise size of the computedmore » scattering length difference depends on how the short-range aspects of the CSV potential are treated.« less
Analysis of Forensic Super Timelines
2012-06-14
Components of Incident Response (Mandia, Prosise & Pepe, 2003). Detection of an incident can be complex. It can occur through the use of an intrusion ...ECHO =================================== REM - Convert DirList.txt to CSV File, DirList.CSV REM ...Directory Processing REM - NOTE: Must use !_dir! instead of %_dir% since it’s in the executing line of a loop FOR /F "tokens=1,2,3,4,5*" %%G IN
Choudhary, Alpa; Modak, Arnab; Apte, Shree K.
2017-01-01
ABSTRACT The effective elimination of xenobiotic pollutants from the environment can be achieved by efficient degradation by microorganisms even in the presence of sugars or organic acids. Soil isolate Pseudomonas putida CSV86 displays a unique ability to utilize aromatic compounds prior to glucose. The draft genome and transcription analyses revealed that glucose uptake and benzoate transport and metabolism genes are clustered at the glc and ben loci, respectively, as two distinct operons. When grown on glucose plus benzoate, CSV86 displayed significantly higher expression of the ben locus in the first log phase and of the glc locus in the second log phase. Kinetics of substrate uptake and metabolism matched the transcription profiles. The inability of succinate to suppress benzoate transport and metabolism resulted in coutilization of succinate and benzoate. When challenged with succinate or benzoate, glucose-grown cells showed rapid reduction in glc locus transcription, glucose transport, and metabolic activity, with succinate being more effective at the functional level. Benzoate and succinate failed to interact with or inhibit the activities of glucose transport components or metabolic enzymes. The data suggest that succinate and benzoate suppress glucose transport and metabolism at the transcription level, enabling P. putida CSV86 to preferentially metabolize benzoate. This strain thus has the potential to be an ideal host to engineer diverse metabolic pathways for efficient bioremediation. IMPORTANCE Pseudomonas strains play an important role in carbon cycling in the environment and display a hierarchy in carbon utilization: organic acids first, followed by glucose, and aromatic substrates last. This limits their exploitation for bioremediation. This study demonstrates the substrate-dependent modulation of ben and glc operons in Pseudomonas putida CSV86, wherein benzoate suppresses glucose transport and metabolism at the transcription level, leading to preferential utilization of benzoate over glucose. Interestingly, succinate and benzoate are cometabolized. These properties are unique to this strain compared to other pseudomonads and open up avenues to unravel novel regulatory processes. Strain CSV86 can serve as an ideal host to engineer and facilitate efficient removal of recalcitrant pollutants even in the presence of simpler carbon sources. PMID:28733285
Ro, Eun Young; Kim, Geun Su; Kwon, Do Young; Park, Young Min; Cho, Sang Woo; Lee, Sang Yun; Yeo, Ik Hyun
2017-01-01
Abstract The objective of this study was to investigate the antimicrobial effects of cultured sugar/vinegar (CSV) blend and nisin to control the risk of Listeria monocytogenes in ready to cook (RTC) ravioli. Ravioli dough was prepared with 0.1, 0.3, 0.5, 1% CSV blend and 0.1, 0.2, and 0.3% nisin. Inoculated spinach or artichoke raviolis with 2.0 ± 0.5 log cfu/g of L. monocytogenes were packed aerobically or using modified atmosphere packaging (MAP), and then stored at 4, 10, 17, and 24 °C for 60 days. Growth kinetic parameters of the observed data fit well to the Baranyi equation. Ravioli with spinach filling materials yielded a higher risk than that with artichoke. L. monocytogenes was able to survive in ravioli with artichoke, but did not grow. The addition of 1% CSV blend or 0.3% nisin in spinach ravioli with the combination of MAP effectively controlled the growth of L. monocytogenes at the temperature below 10 °C. The organoleptic quality of spinach ravioli was not also affected by the application of 1% CSV blend. Therefore, the CSV blend can be recommended to improve the microbial safety and quality of natural RTC ravioli at retail market. Practical applications The risk of ravioli was affected by the filling materials of ravioli at retail market. Addition of 1% cultured sugar/vinegar blend in dough substantially contributes to the extension of shelf‐life of MAP spinach raviolis. classification and regression tree analysis results indicate that refrigeration temperature is the main control factor to affect lag time and growth rate, while packaging method is critical for maximum population density. PMID:29456276
pi-eta mixing and charge symmetry violating NN potential in matter
DOE Office of Scientific and Technical Information (OSTI.GOV)
Biswas, Subhrajyoti; Roy, Pradip; Dutt-Mazumder, Abhee K.
2010-06-15
We construct density-dependent class III charge symmetry violating (CSV) potential caused by the mixing of pi-eta mesons with off-shell corrections. The density dependence enters through the nonvanishing pi-eta mixing driven by both the neutron-proton mass difference and their asymmetric density distribution. The contribution of density-dependent mixing to the CSV potential is found to be appreciably larger than that of the vacuum part.
Transparency, Accountability, and Engagement: A Recipe for Building Trust in Policing
2017-06-01
Toward Community-orientated Policing: Potential, Basic Requirements, and Threshold Questions,” Crime and Delinquency 33 (1987): 6–30. 49 More, Current...States,” in Sourcebook of Criminal Justice Statistics Online, accessed June 4, 2017, http://www.albany.edu/sourcebook/csv/ t2332011.csv. 89 Gary...to-date crime statistics , and empowered them to think creatively to develop individualized plans to address crime trends and conditions. His focus
UAV Swarm Tactics: An Agent-Based Simulation and Markov Process Analysis
2013-06-01
CRN Common Random Numbers CSV Comma Separated Values DoE Design of Experiment GLM Generalized Linear Model HVT High Value Target JAR Java ARchive JMF... Java Media Framework JRE Java runtime environment Mason Multi-Agent Simulator Of Networks MOE Measure Of Effectiveness MOP Measures Of Performance...with every set several times, and to write a CSV file with the results. Rather than scripting the agent behavior deterministically, the agents should
Stivaktakis, Polychronis D; Giannakopoulos, Evangelos; Vlastos, Dimitris; Matthopoulos, Demetrios P
2017-02-01
The interaction of pesticides with environmental factors, such as pH, may result in alterations of their physicochemical properties and should be taken into consideration in regard to their classification. This study investigates the genotoxicity of methidathion and its alkaline hydrolysis by-products in cultured human lymphocytes, using the square-wave voltammetry (square wave-adsorptive cathodic stripping voltammetry (SW-AdCSV) technique) and the cytokinesis block micronucleus assay (CBMN assay). According to the SW-AdCSV data the alkaline hydrolysis of methidathion results in two new molecules, one non-electro-active and a second electro-active which is more genotoxic than methidathion itself in cultured human lymphocytes, inducing higher micronuclei frequencies. The present study confirms the SW-AdCSV technique as a voltammetric method which can successfully simulates the electrodynamics of the cellular membrane. Copyright © 2016 Elsevier B.V. All rights reserved.
Mynodbcsv: lightweight zero-config database solution for handling very large CSV files.
Adaszewski, Stanisław
2014-01-01
Volumes of data used in science and industry are growing rapidly. When researchers face the challenge of analyzing them, their format is often the first obstacle. Lack of standardized ways of exploring different data layouts requires an effort each time to solve the problem from scratch. Possibility to access data in a rich, uniform manner, e.g. using Structured Query Language (SQL) would offer expressiveness and user-friendliness. Comma-separated values (CSV) are one of the most common data storage formats. Despite its simplicity, with growing file size handling it becomes non-trivial. Importing CSVs into existing databases is time-consuming and troublesome, or even impossible if its horizontal dimension reaches thousands of columns. Most databases are optimized for handling large number of rows rather than columns, therefore, performance for datasets with non-typical layouts is often unacceptable. Other challenges include schema creation, updates and repeated data imports. To address the above-mentioned problems, I present a system for accessing very large CSV-based datasets by means of SQL. It's characterized by: "no copy" approach--data stay mostly in the CSV files; "zero configuration"--no need to specify database schema; written in C++, with boost [1], SQLite [2] and Qt [3], doesn't require installation and has very small size; query rewriting, dynamic creation of indices for appropriate columns and static data retrieval directly from CSV files ensure efficient plan execution; effortless support for millions of columns; due to per-value typing, using mixed text/numbers data is easy; very simple network protocol provides efficient interface for MATLAB and reduces implementation time for other languages. The software is available as freeware along with educational videos on its website [4]. It doesn't need any prerequisites to run, as all of the libraries are included in the distribution package. I test it against existing database solutions using a battery of benchmarks and discuss the results.
Mynodbcsv: Lightweight Zero-Config Database Solution for Handling Very Large CSV Files
Adaszewski, Stanisław
2014-01-01
Volumes of data used in science and industry are growing rapidly. When researchers face the challenge of analyzing them, their format is often the first obstacle. Lack of standardized ways of exploring different data layouts requires an effort each time to solve the problem from scratch. Possibility to access data in a rich, uniform manner, e.g. using Structured Query Language (SQL) would offer expressiveness and user-friendliness. Comma-separated values (CSV) are one of the most common data storage formats. Despite its simplicity, with growing file size handling it becomes non-trivial. Importing CSVs into existing databases is time-consuming and troublesome, or even impossible if its horizontal dimension reaches thousands of columns. Most databases are optimized for handling large number of rows rather than columns, therefore, performance for datasets with non-typical layouts is often unacceptable. Other challenges include schema creation, updates and repeated data imports. To address the above-mentioned problems, I present a system for accessing very large CSV-based datasets by means of SQL. It's characterized by: “no copy” approach – data stay mostly in the CSV files; “zero configuration” – no need to specify database schema; written in C++, with boost [1], SQLite [2] and Qt [3], doesn't require installation and has very small size; query rewriting, dynamic creation of indices for appropriate columns and static data retrieval directly from CSV files ensure efficient plan execution; effortless support for millions of columns; due to per-value typing, using mixed text/numbers data is easy; very simple network protocol provides efficient interface for MATLAB and reduces implementation time for other languages. The software is available as freeware along with educational videos on its website [4]. It doesn't need any prerequisites to run, as all of the libraries are included in the distribution package. I test it against existing database solutions using a battery of benchmarks and discuss the results. PMID:25068261
Effect due to charge symmetry violation on the Paschos-Wolfenstein relation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ding Yong; Ma Boqiang; CCAST
2006-03-01
The modification of the Paschos-Wolfenstein relation is investigated when the charge symmetry violations of valence and sea quark distributions in the nucleon are taken into account. We also study qualitatively the impact of charge symmetry violation (CSV) effect on the extraction of sin{sup 2}{theta}{sub w} from deep-inelastic neutrino- and antineutrino-nuclei scattering within the light-cone meson-baryon fluctuation model. We find that the effect of CSV is too small to give a sizable contribution to the NuTeV result with various choices of mass difference inputs, which is consistence with the prediction that the strange-antistrange asymmetry can account for largely the NuTeV deviationmore » in this model. It is noticeable that the effect of CSV might contribute to the NuTeV deviation when the larger difference between the internal momentum scales, {alpha}{sub p} of the proton and {alpha}{sub n} of the neutron, is considered.« less
Taylor, Melanie; Montoya, Jorge A; Cantrell, Russell; Mitchell, Samuel J; Williams, Mark; Jordahl, Lori; Freeman, Millicent; Brown, James; Broussard, Dawn; Roland, Eric
2005-10-01
Describe sexually transmitted disease/human immunodeficiency virus prevention interventions targeting men who have sex with men (MSM) in commercial sex venues (CSV). Compilation of descriptive and evaluation data from the CDC 8-city MSM Syphilis Response on interventions conducted in bathhouses/sex clubs, circuit parties, the Internet, male sex workers, and the adult film industry. Interventions in the commercial sex industry (CSI) often involved multiple collaborative efforts between public health departments (PHD), community-based organizations (CBO), and CSV owners and managers. Education and condoms were provided at multiple venues, including circuit parties, bathhouses, and sex clubs. CBO staff reported one-on-one street and CSV outreach to engage MSM at risk. Evaluation data demonstrate that MSM exposed to media campaigns were more aware of syphilis and more likely to have been tested for syphilis than MSM who did not see the campaigns. PHD and CBO are using multiple means of reaching MSM in the CSI. Evaluations are needed to determine which of these efforts decreases syphilis transmission.
A new version of Visual tool for estimating the fractal dimension of images
NASA Astrophysics Data System (ADS)
Grossu, I. V.; Felea, D.; Besliu, C.; Jipa, Al.; Bordeianu, C. C.; Stan, E.; Esanu, T.
2010-04-01
This work presents a new version of a Visual Basic 6.0 application for estimating the fractal dimension of images (Grossu et al., 2009 [1]). The earlier version was limited to bi-dimensional sets of points, stored in bitmap files. The application was extended for working also with comma separated values files and three-dimensional images. New version program summaryProgram title: Fractal Analysis v02 Catalogue identifier: AEEG_v2_0 Program summary URL:http://cpc.cs.qub.ac.uk/summaries/AEEG_v2_0.html Program obtainable from: CPC Program Library, Queen's University, Belfast, N. Ireland Licensing provisions: Standard CPC licence, http://cpc.cs.qub.ac.uk/licence/licence.html No. of lines in distributed program, including test data, etc.: 9999 No. of bytes in distributed program, including test data, etc.: 4 366 783 Distribution format: tar.gz Programming language: MS Visual Basic 6.0 Computer: PC Operating system: MS Windows 98 or later RAM: 30 M Classification: 14 Catalogue identifier of previous version: AEEG_v1_0 Journal reference of previous version: Comput. Phys. Comm. 180 (2009) 1999 Does the new version supersede the previous version?: Yes Nature of problem: Estimating the fractal dimension of 2D and 3D images. Solution method: Optimized implementation of the box-counting algorithm. Reasons for new version:The previous version was limited to bitmap image files. The new application was extended in order to work with objects stored in comma separated values (csv) files. The main advantages are: Easier integration with other applications (csv is a widely used, simple text file format); Less resources consumed and improved performance (only the information of interest, the "black points", are stored); Higher resolution (the points coordinates are loaded into Visual Basic double variables [2]); Possibility of storing three-dimensional objects (e.g. the 3D Sierpinski gasket). In this version the optimized box-counting algorithm [1] was extended to the three-dimensional case. Summary of revisions:The application interface was changed from SDI (single document interface) to MDI (multi-document interface). One form was added in order to provide a graphical user interface for the new functionalities (fractal analysis of 2D and 3D images stored in csv files). Additional comments: User friendly graphical interface; Easy deployment mechanism. Running time: In the first approximation, the algorithm is linear. References:[1] I.V. Grossu, C. Besliu, M.V. Rusu, Al. Jipa, C.C. Bordeianu, D. Felea, Comput. Phys. Comm. 180 (2009) 1999-2001.[2] F. Balena, Programming Microsoft Visual Basic 6.0, Microsoft Press, US, 1999.
Sawyer, J E; Mathis, C P; Davis, B
2004-12-01
To evaluate production and economic effects of feeding management strategy and age on intensively managed culled beef cows, a study was conducted using 125 cows of British breeding blocked by age (Young = 3 and 4 yr olds; LowMid = 5 and 6 yr olds; HighMid = 7 and 8 yr olds; and Aged = 9 yr and older) and assigned to one of three steam-flaked corn based feeding strategies. Treatments were as follows: Conservative (CSV), 30% roughage throughout; Standard (STD), decrease roughage from 30 to 10% over 20 d; and Aggressive (AGR), decrease roughage from 30 to 10% over 10 d. There were four pens per treatment in a randomized complete block design. Cows were fed for a total of 54 d, and BW was measured on d 0, 14, 28, 42, and 54. Half the cows from each pen were randomly selected and slaughtered at a commercial abattoir, and carcass data were collected. Average daily gain, daily DMI, and G:F during each weigh period and across the entire feeding period were calculated. Over the 54-d feeding period, strategies that employed more energy-dense diets numerically increased ADG (1.28, 1.63, and 1.55 +/- 0.14 kg/d for CSV, STD, and AGR; P = 0.26) and decreased DMI (11.91, 10.74, and 10.89 +/- 0.27 kg/d for CSV, STD, and AGR; P = 0.05), such that G:F was lower for CSV than for STD or AGR (0.105, 0.150, and 0.141 +/- 0.010; P = 0.05). Carcass weight was least for the CSV strategy (298 kg) and greatest for STD (328 kg); AGR resulted in intermediate carcass weight (317 +/- 6 kg; P = 0.04). Total cost of gain was over 30% greater for CSV strategy than for STD or AGR strategies (P < 0.01). In many cases, block effects (age) had a greater effect on responses than treatments. Average daily gain, DMI, and G:F decreased linearly with age (P < 0.01). Hot carcass weight, dressing percent, and fat thickness decreased linearly with age (P < 0.03); yield grade decreased and carcass maturity attributes increased linearly with age (P < 0.02). Performance and intake differences resulted in linear increases in total cost of gain (P < 0.01) and breakeven price (P = 0.03) with increasing age. These data indicate advantages to more aggressive feeding management strategies for culled beef cows, although maximal intake may be achieved with higher-roughage diets. Despite management effects, an increase in market price above purchase price may be required for intensive feeding of culled beef cows to be a profitable enterprise.
Townley, Deirdre; Kirwan, Caitriona; O'Keefe, Michael
2012-02-01
To determine the effect of conventional laser in situ keratomileusis (LASIK) and laser epithelial keratomileusis (LASEK) for myopia on contrast sensitivity (CS) using the Pelli-Robson and Vector Vision CSV-1000E CS tests. A prospective, comparative study was conducted on 36 eyes of 36 patients with myopia undergoing LASIK (18 eyes) and LASEK (18 eyes). Surgery was performed using the Technolas 217z laser (Bausch & Lomb). CS was recorded preoperatively and at 3, 6 and 12 months postoperatively. No statistically significant difference was found in LogMAR uncorrected visual acuity post-LASIK (-0.02 ± 0.16) and LASEK (-0.04 ± 0.14). Using the Pelli-Robson, CS was significantly lower in the LASIK group 3 and 6 months postoperatively. No significant postoperative reduction in CS was observed in either treatment group. Using the CSV-1000E test, CS was significantly reduced post-LASIK at 3 (p = 0.05) and 6 (p = 0.05) cycles/degree under photopic conditions. No significant postoperative change occurred in the LASEK group under photopic or scotopic conditions. There was no significant difference in postoperative CS between the LASIK and LASEK groups at 3, 6, 12 or 18 cycles/degree using the CSV-1000E test. One year postoperatively, there was no difference in CS between both treatment groups using the Pelli-Robson and CSV-1000E tests. CS was reduced postoperatively in the LASIK group at the lower spatial frequencies under photopic conditions. No postoperative change was detected in CS following LASIK or LASEK using the Pelli-Robson test. © 2010 The Authors. Journal compilation © 2010 Acta Ophthalmol.
NASA Astrophysics Data System (ADS)
Melnikov, A. A.; Popov, S. G.; Nikolaev, D. V.; Vikulov, A. D.
2013-04-01
We have investigated the distribution of peripheral blood volumes in different regions of the body in response to the tilt-test in endurance trained athletes after aerobic exercise. Distribution of peripheral blood volumes (ml/beat) simultaneously in six regions of the body (two legs, two hands, abdomen, neck and ECG) was assessed in response to the tilt-test using the impedance method (the impedance change rate (dZ/dT). Before and after exercise session cardiac stroke (CSV) and blood volumes in legs, arms and neck were higher in athletes both in lying and standing positions. Before exercise the increase of heart rate and the decrease of a neck blood volume in response to tilting was lower (p <0.05) but the decrease of leg blood volumes was higher (p<0.001) in athletes. The reactions in arms and abdomen blood volumes were similar. Also, the neck blood volumes as percentage of CSV (%/CSV) did not change in the control but increased in athletes (p <0.05) in response to the tilt test. After (10 min recovery) the aerobic bicycle exercise (mean HR = 156±8 beat/min, duration 30 min) blood volumes in neck and arms in response to the tilting were reduced equally, but abdomen (p<0.05) and leg blood volumes (p <0.001) were lowered more significantly in athletes. The neck blood flow (%/CSV) did not change in athletes but decreased in control (p<0.01), which was offset by higher tachycardia in response to tilt-test in controls after exercise. The data demonstrate greater orthostatic tolerance in athletes both before and after exercise during fatigue which is due to effective distribution of blood flows aimed at maintaining cerebral blood flow.
Manoukis, Nicholas C
2007-07-01
There has been a great increase in both the number of population genetic analysis programs and the size of data sets being studied with them. Since the file formats required by the most popular and useful programs are variable, automated reformatting or conversion between them is desirable. formatomatic is an easy to use program that can read allelic data files in genepop, raw (csv) or convert formats and create data files in nine formats: raw (csv), arlequin, genepop, immanc/bayesass +, migrate, newhybrids, msvar, baps and structure. Use of formatomatic should greatly reduce time spent reformatting data sets and avoid unnecessary errors.
Zhou, Cui-Ji; Xiang, Hai-Ying; Zhuo, Tao; Li, Da-Wei; Yu, Jia-Lin; Han, Cheng-Gui
2012-07-01
We determined the genome sequence of a new polerovirus that infects field pea and faba bean in China. Its entire nucleotide sequence (6021 nt) was most closely related (83.3% identity) to that of an Ethiopian isolate of chickpea chlorotic stunt virus (CpCSV-Eth). With the exception of the coat protein (encoded by ORF3), amino acid sequence identities of all gene products of this virus to those of CpCSV-Eth and other poleroviruses were <90%. This suggests that it is a new member of the genus Polerovirus, and the name pea mild chlorosis virus is proposed.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kraus, Terrence D.
2017-04-01
This report specifies the electronic file format that was agreed upon to be used as the file format for normalized radiological data produced by the software tool developed under this TI project. The NA-84 Technology Integration (TI) Program project (SNL17-CM-635, Normalizing Radiological Data for Analysis and Integration into Models) investigators held a teleconference on December 7, 2017 to discuss the tasks to be completed under the TI program project. During this teleconference, the TI project investigators determined that the comma-separated values (CSV) file format is the most suitable file format for the normalized radiological data that will be outputted frommore » the normalizing tool developed under this TI project. The CSV file format was selected because it provides the requisite flexibility to manage different types of radiological data (i.e., activity concentration, exposure rate, dose rate) from other sources [e.g., Radiological Assessment and Monitoring System (RAMS), Aerial Measuring System (AMS), Monitoring and Sampling). The CSV file format also is suitable for the file format of the normalized radiological data because this normalized data can then be ingested by other software [e.g., RAMS, Visual Sampling Plan (VSP)] used by the NA-84’s Consequence Management Program.« less
Web-Based Customizable Viewer for Mars Network Overflight Opportunities
NASA Technical Reports Server (NTRS)
Gladden, Roy E.; Wallick, Michael N.; Allard, Daniel A.
2012-01-01
This software displays a full summary of information regarding the overflight opportunities between any set of lander and orbiter pairs that the user has access to view. The information display can be customized, allowing the user to choose which fields to view/hide and filter. The software works from a Web browser on any modern operating system. A full summary of information pertaining to an overflight is available, including the proposed, tentative, requested, planned, and implemented. This gives the user a chance to quickly check for inconsistencies and fix any problems. Overflights from multiple lander/ orbiter pairs can be compared instantly, and information can be filtered through the query and shown/hidden, giving the user a customizable view of the data. The information can be exported to a CSV (comma separated value) or XML (extensible markup language) file. The software only grants access to users who are authorized to view the information. This application is an addition to the MaROS Web suite. Prior to this addition, information pertaining to overflight opportunities would have a limited amount of data (displayed graphically) and could only be shown in strict temporal ordering. This new display shows more information, allows direct comparisons between overflights, and allows the data to be manipulated in ways that it was unable to be done in the past. The current software solution is to use CSV files to view the overflight opportunities.
Photoelectron emission from LiF surfaces by ultrashort electromagnetic pulses
DOE Office of Scientific and Technical Information (OSTI.GOV)
Acuna, M. A.; Gravielle, M. S.; Departamento de Fisica, Facultad de Ciencias Exactas y Naturales, Universidad de Buenos Aires
2011-03-15
Energy- and angle-resolved electron emission spectra produced by incidence of ultrashort electromagnetic pulses on a LiF(001) surface are studied by employing a distorted-wave method named the crystal surface-Volkov (CSV) approximation. The theory makes use of the Volkov phase to describe the action of the external electric field on the emitted electron, while the electron-surface interaction is represented within the tight-binding model. The CSV approach is applied to investigate the effects introduced by the crystal lattice when the electric field is oriented parallel to the surface plane. These effects are essentially governed by the vector potential of the external field, whilemore » the influence of the crystal orientation was found to be negligible.« less
Metal–organic complexation in the marine environment
Luther, George W; Rozan, Timothy F; Witter, Amy; Lewis, Brent
2001-01-01
We discuss the voltammetric methods that are used to assess metal–organic complexation in seawater. These consist of titration methods using anodic stripping voltammetry (ASV) and cathodic stripping voltammetry competitive ligand experiments (CSV-CLE). These approaches and a kinetic approach using CSV-CLE give similar information on the amount of excess ligand to metal in a sample and the conditional metal ligand stability constant for the excess ligand bound to the metal. CSV-CLE data using different ligands to measure Fe(III) organic complexes are similar. All these methods give conditional stability constants for which the side reaction coefficient for the metal can be corrected but not that for the ligand. Another approach, pseudovoltammetry, provides information on the actual metal–ligand complex(es) in a sample by doing ASV experiments where the deposition potential is varied more negatively in order to destroy the metal–ligand complex. This latter approach gives concentration information on each actual ligand bound to the metal as well as the thermodynamic stability constant of each complex in solution when compared to known metal–ligand complexes. In this case the side reaction coefficients for the metal and ligand are corrected. Thus, this method may not give identical information to the titration methods because the excess ligand in the sample may not be identical to some of the actual ligands binding the metal in the sample. PMID:16759421
DOE Office of Scientific and Technical Information (OSTI.GOV)
Goodall, John; Iannacone, Mike; Athalye, Anish
2013-08-01
Morph is a framework and domain-specific language (DSL) that helps parse and transform structured documents. It currently supports several file formats including XML, JSON, and CSV, and custom formats are usable as well.
Exploration Gap Assessment (FY13 Update)
Dan Getman
2013-09-30
This submission contains an update to the previous Exploration Gap Assessment funded in 2012, which identify high potential hydrothermal areas where critical data are needed (gap analysis on exploration data). The uploaded data are contained in two data files for each data category: A shape (SHP) file containing the grid, and a data file (CSV) containing the individual layers that intersected with the grid. This CSV can be joined with the map to retrieve a list of datasets that are available at any given site. A grid of the contiguous U.S. was created with 88,000 10-km by 10-km grid cells, and each cell was populated with the status of data availability corresponding to five data types: 1. well data 2. geologic maps 3. fault maps 4. geochemistry data 5. geophysical data
BP Spill Sampling and Monitoring Data
This dataset analyzes waste from the the British Petroleum Deepwater Horizon Rig Explosion Emergency Response, providing opportunity to query data sets by metadata criteria and find resulting raw datasets in CSV format.The data query tool allows users to download EPA's air, water and sediment sampling and monitoring data that has been collected in response to the BP oil spill. All sampling and monitoring data that has been collected to date is available for download as raw structured data.The query tools enables CSV file creation to be refined based on the following search criteria: date range (between April 28, 2010 and 9/29/2010); location by zip, city, or county; media (solid waste, weathered oil, air, surface water, liquid waste, tar, sediment, water); substance categories (based on media selection) and substances (based on substance category selection).
Pham, Phuc H; Tong, Winnie W L; Misk, Ehab; Jones, Ginny; Lumsden, John S; Bols, Niels C
2017-11-01
Heart diseases caused by viruses are major causes of Atlantic salmon aquaculture loss. Two Atlantic salmon cardiovascular cell lines, an endothelial cell line (ASHe) from the heart and a fibroblast cell line (BAASf) from the bulbus arteriosus, were evaluated for their response to four fish viruses, CSV, IPNV, VHSV IVa and VHSV IVb, and the innate immune agonist, double-stranded RNA mimic poly IC. All four viruses caused cytopathic effects in ASHe and BAASf. However, ASHe was more susceptible to all four viruses than BAASf. When comparing between the viruses, ASHe cells were found to be moderately susceptible to CSV and VHSV IVb, but highly susceptible to IPNV and VHSV IVa induced cell death. All four viruses were capable of propagating in the ASHe cell line, leading to increases in virus titre over time. In BAASf, CSV and IPNV produced more than one log increase in titre from initial infection, but VHSV IVb and IVa did not. When looking at the antiviral response of both cell lines, Mx proteins were induced in ASHe and BAASf by poly IC. All four viruses induced Mx proteins in BAASf, while only CSV and VHSV IVb induced Mx proteins in ASHe. IPNV and VHSV IVa suppressed Mx proteins expression in ASHe. Pretreatment of ASHe with poly IC to allow for Mx proteins accumulation protected the culture from subsequent infections with IPNV and VHSV IVa, resulting in delayed cell death, reduced virus titres and reduced viral proteins expression. These data suggest that endothelial cells potentially can serve as points of infections for viruses in the heart and that two of the four viruses, IPNV and VHSV IVa, have mechanisms to avoid or downregulate antiviral responses in ASHe cells. Furthermore, the high susceptibility of the ASHe cell line to IPNV and VHSV IVa can make it a useful tool for studying antiviral compounds against these viruses and for general detection of fish viruses. Copyright © 2017 Elsevier Ltd. All rights reserved.
NASA Astrophysics Data System (ADS)
Wawrzyniak, Pierre; Zlotnicki, Jacques; Sailhac, Pascal; Marquis, Guy
2017-11-01
The 2645 m-high La Fournaise volcano, located in the Southwest of Réunion Island (Indian Ocean), is a shield basaltic volcano where effusive eruptions generally occur along long fissures starting from the summit, alongside major fractures that characterize the eruptions' dynamism and effusivity. Between 1992 and 1998, the volcano underwent a quiet period during which few earthquakes were recorded. Minor seismic activity returned after 1997 and picked up in March 1998 during the 35 h preceding the March 9 eruption. From 1996, two autonomous stations (CSV and BAV) were installed on the volcano. CSV was located inside the Enclos Fouqué caldera while BAV was positioned 8.2 km NW of the volcano summit. Horizontal components of the electric and magnetic fields were sampled every 20 s. Continuous time-series were available from 1996 to 1999 at CSV, and from 1997 to March 1998 at BAV. Data have been processed using both single-station and remote-reference processing. Both results show apparent resistivity variations synchronous to the eruption. Time-lapse impedance estimates are computed on overlapping time windows of about two days at both stations. The only major decrease of the observed impedance coincides with the March 1998 eruption. At CSV, the resistivity started to drop about five days before the eruption, reached several local minima until April, and then slowly increased as the volcanic crisis reduced in activity. After the end of the crisis in September 1998, the apparent resistivity recovered its pre-crisis value. The time-lapse results also show variability in directionality: sharp and elongated phase tensor ellipse residuals appear during the eruption with a N105° orientation, suggesting the emergence of an almost NS-striking dyke. A 1D background model built from MT soundings performed during the quiet period (1996 to February 1998) on which a 3D NS-striking dyke was added shows a good agreement with phase tensor residuals and spatial distribution of the resistivity variations observed during the eruption.
[Human bioaging acceleration as Chernobyl radiation consequence].
Neĭfakh, E A; Liuman, G K
2013-01-01
To monitor human bioaging as a health integral index by blood plasma markers as a molar ratio for biochemically coupled monomers of intracellular lipofuscin, an intracellular polymeric aging pigment with free-radical crossed shifts, has been developed. Lipofuscin includes cell debris with catabolites of lipoperoxic cascade and lipid antioxidants. The latter were detected in the plasma samples of normal adults and children, as well as in Chernobyl clean-up workers (24-62 years old by 1990) with external total gamma-doses of 0.9-145 cSv for 4.2 years. Dynamics for bioaging markers as the molar ratio of blood levels of lipoperoxic catabolites to their antioxidants reflected normal physiologic peculiarities for the studied age periods: oxygen stress for newborns, adaptation during childhood, stability for the middle age and an increased lipoperoxidation (mainly for aging men) due to the age weakening of the antioxidant control. The ratio for the fractions of ma- lone dialdehyde (MDA), a lipoperoxic final catabolite, showed the increase of its binding by plasma proteins in proportions to calendar ages for the norm, as it is the case for lipofuscin; The graph of the age normal molar ratio of protein-bound MDA to the free one was pre-set for calibrations into the developed computer Program to calculate Relative Aging Velocities (Wrel) by bioage increments during the period of human exposure to radiation from the CAPS damage. Wrel were increasing logarithmically to the obtained doses if the total radiation exceeded 4 cSv and exceeded their normal velocities at 50 cSv 10 times or more. Slowing down of Wrel in relation to the calendar age increment was found if the sum doses were lower than 4 cSv. Levels of the studied plasma metabolites as their bioage Moles/Moles markers relative to their norms are dynamically stationary in contrast to the lipofuscin intracellular irreversible accumulation. Earlier it was shown that the decreased vitamin E and A levels with the increased lipoperoxic metabolite blood levels that indicate health consequences for the irradiated CAPS personell with related cytogenetic deviations, as well as for the adult population and children from radio-polluted regions, were restored to norms or corrected by adequate peroral therapy with bioantioxidants.
Itagaki, Taiga; Bennett, Desmond J; Chenelle, Christopher T; Fisher, Daniel F; Kacmarek, Robert M
2017-01-01
Volume-targeted ventilation is increasingly used in low birthweight infants because of the potential for reducing volutrauma and avoiding hypocapnea. However, it is not known what level of air leak is acceptable during neonatal volume-targeted ventilation when leak compensation is activated concurrently. Four ICU ventilators (Servo-i, PB980, V500, and Avea) were compared in available invasive volume-targeted ventilation modes (pressure control continuous spontaneous ventilation [PC-CSV] and pressure control continuous mandatory ventilation [PC-CMV]). The Servo-i and PB980 were tested with (+) and without (-) their proximal flow sensor. The V500 and Avea were tested with their proximal flow sensor as indicated by their manufacturers. An ASL 5000 lung model was used to simulate 4 neonatal scenarios (body weight 0.5, 1, 2, and 4 kg). The ASL 5000 was ventilated via an endotracheal tube with 3 different leaks. Two minutes of data were collected after each change in leak level, and the asynchrony index was calculated. Tidal volume (V T ) before and after the change in leak was assessed. The differences in delivered V T between before and after the change in leak were within ±5% in all scenarios with the PB980 (-/+) and V500. With the Servo-i (-/+), baseline V T was ≥10% greater than set V T during PC-CSV, and delivered V T markedly changed with leak. The Avea demonstrated persistent high V T in all leak scenarios. Across all ventilators, the median asynchrony index was 1% (interquartile range 0-27%) in PC-CSV and 1.8% (0-45%) in PC-CMV. The median asynchrony index was significantly higher in the Servo-i (-/+) than in the PB980 (-/+) and V500 in 1 and 2 kg scenarios during PC-CSV and PC-CMV. The PB980 and V500 were the only ventilators to acclimate to all leak scenarios and achieve targeted V T . Further clinical investigation is needed to validate the use of leak compensation during neonatal volume-targeted ventilation. Copyright © 2017 by Daedalus Enterprises.
BP Spill Sampling and Monitoring Data April-September 2010 - Data Download Tool
This dataset analyzes waste from the the British Petroleum Deepwater Horizon Rig Explosion Emergency Response, providing opportunity to query data sets by metadata criteria and find resulting raw datasets in CSV format.The data query tool allows users to download air, water and sediment sampling and monitoring data that has been collected in response to the BP oil spill. All sampling and monitoring data that has been collected to date is available for download as raw structured data.The query tools enables CSV file creation to be refined based on the following search criteria: date range (between April 28, 2010 and 9/29/2010); location by zip, city, or county; media (solid waste, weathered oil, air, surface water, liquid waste, tar, sediment, water); substance categories (based on media selection) and substances (based on substance category selection).
Chen, Yantian; Bloemen, Veerle; Impens, Saartje; Moesen, Maarten; Luyten, Frank P; Schrooten, Jan
2011-12-01
Cell seeding into scaffolds plays a crucial role in the development of efficient bone tissue engineering constructs. Hence, it becomes imperative to identify the key factors that quantitatively predict reproducible and efficient seeding protocols. In this study, the optimization of a cell seeding process was investigated using design of experiments (DOE) statistical methods. Five seeding factors (cell type, scaffold type, seeding volume, seeding density, and seeding time) were selected and investigated by means of two response parameters, critically related to the cell seeding process: cell seeding efficiency (CSE) and cell-specific viability (CSV). In addition, cell spatial distribution (CSD) was analyzed by Live/Dead staining assays. Analysis identified a number of statistically significant main factor effects and interactions. Among the five seeding factors, only seeding volume and seeding time significantly affected CSE and CSV. Also, cell and scaffold type were involved in the interactions with other seeding factors. Within the investigated ranges, optimal conditions in terms of CSV and CSD were obtained when seeding cells in a regular scaffold with an excess of medium. The results of this case study contribute to a better understanding and definition of optimal process parameters for cell seeding. A DOE strategy can identify and optimize critical process variables to reduce the variability and assists in determining which variables should be carefully controlled during good manufacturing practice production to enable a clinically relevant implant.
... County-level Lyme disease data from 2000-2016 Microsoft Excel file [Excel CSV – 209KB] ––Right–click the link ... PDF file Microsoft PowerPoint file Microsoft Word file Microsoft Excel file Audio/Video file Apple Quicktime file RealPlayer ...
Demonstration of New OLAF Capabilities and Technologies
NASA Astrophysics Data System (ADS)
Kingston, C.; Palmer, E.; Stone, J.; Neese, C.; Mueller, B.
2017-06-01
Upgrades to the On-Line Archiving Facility (OLAF) PDS tool are leading to improved usability and additional functionality by integration of JavaScript web app frameworks. Also included is the capability to upload tabular data as CSV files.
Fallon, Nevada FORGE Analogue Outcrop Samples
Blankenship, Doug; Bauer, Steve J.; Barrow, P.; Robbins, A.; Hileman, M.
2018-03-12
Compilation of results for mechanical and fluid flow properties of analogue outcrop samples - experimental data for compressional and shear wave velocities, tensile strengths, and compressive strengths. Outcrop location and sample orientation data are documented in a separate csv file.
This page is the starting point for EZ Query. This page describes how to select key data elements from EPA's Facility Information Database and Geospatial Reference Database to build a tabular report or a Comma Separated Value (CSV) files for downloading.
VizieR Online Data Catalog: Horizontal temperature at Venus upper atmosphere (Peralta+, 2016)
NASA Astrophysics Data System (ADS)
Peralta, J.; Lopez-Valverde, M. A.; Gilli, G.; Piccialli, A.
2015-11-01
The dayside atmospheric temperatures in the UMLT of Venus (displayed in Figure 7A of this article) are listed as a CSV data file. These values consist of averages in bins of 5° in latitude and 0.25-hours in local time from dayside temperatures covering five years of data (from 2006/05/14 to 2011/06/05). These temperatures were inferred from the CO2 NLTE nadir spectra measured by the instrument VIRTIS-H onboard Venus Express (see article for full description of the procedure), and are representative of the atmospheric region between 10-2 to 10-5mb. Along with the temperatures, we also provide the corresponding error and the number of temperatures averaged in each bin. The format of the CSV file reasonably agrees with the expected format of the data files to be provided in the future version of the Venus International Reference Atmosphere (VIRA). (1 data file).
Definition and maintenance of a telemetry database dictionary
NASA Technical Reports Server (NTRS)
Knopf, William P. (Inventor)
2007-01-01
A telemetry dictionary database includes a component for receiving spreadsheet workbooks of telemetry data over a web-based interface from other computer devices. Another component routes the spreadsheet workbooks to a specified directory on the host processing device. A process then checks the received spreadsheet workbooks for errors, and if no errors are detected the spreadsheet workbooks are routed to another directory to await initiation of a remote database loading process. The loading process first converts the spreadsheet workbooks to comma separated value (CSV) files. Next, a network connection with the computer system that hosts the telemetry dictionary database is established and the CSV files are ported to the computer system that hosts the telemetry dictionary database. This is followed by a remote initiation of a database loading program. Upon completion of loading a flatfile generation program is manually initiated to generate a flatfile to be used in a mission operations environment by the core ground system.
Differential responses in dorsal visual cortex to motion and disparity depth cues
Arnoldussen, David M.; Goossens, Jeroen; van den Berg, Albert V.
2013-01-01
We investigated how interactions between monocular motion parallax and binocular cues to depth vary in human motion areas for wide-field visual motion stimuli (110 × 100°). We used fMRI with an extensive 2 × 3 × 2 factorial blocked design in which we combined two types of self-motion (translational motion and translational + rotational motion), with three categories of motion inflicted by the degree of noise (self-motion, distorted self-motion, and multiple object-motion), and two different view modes of the flow patterns (stereo and synoptic viewing). Interactions between disparity and motion category revealed distinct contributions to self- and object-motion processing in 3D. For cortical areas V6 and CSv, but not the anterior part of MT+ with bilateral visual responsiveness (MT+/b), we found a disparity-dependent effect of rotational flow and noise: When self-motion perception was degraded by adding rotational flow and moderate levels of noise, the BOLD responses were reduced compared with translational self-motion alone, but this reduction was cancelled by adding stereo information which also rescued the subject's self-motion percept. At high noise levels, when the self-motion percept gave way to a swarm of moving objects, the BOLD signal strongly increased compared to self-motion in areas MT+/b and V6, but only for stereo in the latter. BOLD response did not increase for either view mode in CSv. These different response patterns indicate different contributions of areas V6, MT+/b, and CSv to the processing of self-motion perception and the processing of multiple independent motions. PMID:24339808
Raw Pressure Data from Observation Wells at Brady's Hot Springs
DOE Office of Scientific and Technical Information (OSTI.GOV)
David Lim
This .csv files contain the raw water pressure data from three observation wells during pumping tests performed in the Spring of 2016. Included is a "read me" file explaining the details of where and how the data were collected.
BRAD BRDY and BRD1 GPS Station RINEX Files 09-17-2015
Corne Kreemer
2015-09-17
CSV files with links to RINEX data for stations BRAD and BRDY for all days after those reported previous (i.e., since 21-JAN-2015) Links to websites that show the position time-series of both stations.
COPPER COMPLEXATION BY NATURAL ORGANIC MATTER IN CONTAMINATED AND UNCOMTAINATED GROUND WATER
Ground-water samples were collected from an uncontaminated and a contaminated site. Copper complexation was characterized by ion-selective electrode (ISE), fluorescence quenching (FQ), and cathodic stripping voltammetric (CSV) titrations. All of the samples were titrated at their...
NASA Astrophysics Data System (ADS)
Li, Xiaojing; Tang, Youmin; Yao, Zhixiong
2017-04-01
The predictability of the convection related to the Madden-Julian Oscillation (MJO) is studied using a coupled model CESM (Community Earth System Model) and the climatically relevant singular vector (CSV) approach. The CSV approach is an ensemble-based strategy to calculate the optimal initial error on climate scale. In this study, we focus on the optimal initial error of the sea surface temperature in Indian Ocean, where is the location of the MJO onset. Six MJO events are chosen from the 10 years model simulation output. The results show that the large values of the SVs are mainly located in the bay of Bengal and the south central IO (around (25°S, 90°E)), which is a meridional dipole-like pattern. The fast error growth of the CSVs have important impacts on the prediction of the convection related to the MJO. The initial perturbations with the SV pattern result in the deep convection damping more quickly in the east Pacific Ocean. Moreover, the sensitivity studies of the CSVs show that different initial fields do not affect the CSVs obviously, while the perturbation domain is a more responsive factor to the CSVs. The rapid growth of the CSVs is found to be related to the west bay of Bengal, where the wind stress starts to be perturbed due to the CSV initial error. These results contribute to the establishment of an ensemble prediction system, as well as the optimal observation network. In addition, the analysis of the error growth can provide us some enlightment about the relationship between SST and the intraseasonal convection related to the MJO.
Trnkova, Libuse; Zerzankova, Lenka; Dycka, Filip; Mikelova, Radka; Jelen, Frantisek
2008-01-01
Using a paraffin impregnated graphite electrode (PIGE) and mercury-modified pyrolytic graphite electrode with basal orientation (Hg-PGEb) copper(II) and Cu(II)-DNA purine base solutions have been studied by cyclic (CV) and linear sweep voltammetry (LSV) in connection with elimination voltammetry with linear scan (EVLS). In chloride and bromide solutions (pH 6), the redox process of Cu(II) proceeded on PIGE with two cathodic and two anodic potentially separated signals. According to the elimination function E4, the first cathodic peak corresponds to the reduction Cu(II) + e- → Cu(I) with the possibility of fast disproportionation 2Cu(I) → Cu(II)+ Cu(0). The E4 of the second cathodic peak signalized an electrode process controlled by a surface reaction. The electrode system of Cu(II) on Hg-PGEb in borate buffer (pH 9.2) was characterized by one cathodic and one anodic peak. Anodic stripping voltammetry (ASV) on PIGE and cathodic stripping voltammetry (CSV) on Hg-PGEb were carried out at potentials where the reduction of copper ions took place and Cu(I)-purine complexes were formed. By using ASV and CSV in combination with EVLS, the sensitivity of Cu(I)-purine complex detection was enhanced relative to either ASV or CSV alone, resulting in higher peak currents of more than one order of magnitude. The statistical treatment of CE data was used to determine the reproducibility of measurements. Our results show that EVLS in connection with the stripping procedure is useful for both qualitative and quantitative microanalysis of purine derivatives and can also reveal details of studied electrode processes. PMID:27879715
DOE Office of Scientific and Technical Information (OSTI.GOV)
2013-08-01
This is a Node.js command line utility for scraping XML metadata from CSW and WFS, downloading linkage data from CSW and WFS, pinging hosts and returning status codes, pinging data linkages and returning status codes, writing ping status to CSV files, and uploading data to Amazon S3.
Brady's Geothermal Field - Analysis of Pressure Data
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lim, David
*This submission provides corrections to GDR Submissions 844 and 845* Poroelastic Tomography (PoroTomo) by Adjoint Inverse Modeling of Data from Hydrology. The 3 *csv files containing pressure data are the corrected versions of the pressure dataset found in Submission 844. The dataset has been corrected in the sense that the atmospheric pressure has been subtracted from the total pressure measured in the well. Also, the transducers used at wells 56A-1 and SP-2 are sensitive to surface temperature fluctuations. These temperature effects have been removed from the corrected datasets. The 4th *csv file contains corrected version of the pumping data foundmore » in Submission 845. The data has been corrected in the sense that the data from several wells that were used during the PoroTomo deployment pumping tests that were not included in the original dataset has been added. In addition, several other minor changes have been made to the pumping records due to flow rate instrument calibration issues that were discovered.« less
Blasing, T. J. [Carbon Dioxide Information Analysis Center (CDIAC), Oak Ridge National Laboratory (ORNL), Oak Ridge, Tennessee (USA); Marland, Gregg [Carbon Dioxide Information Analysis Center (CDIAC), Oak Ridge National Laboratory (ORNL), Oak Ridge, Tennessee (USA); Broniak, Christine [Oregon State Univ., Corvallis, OR (United States)
2004-01-01
Consumption data for coal, petroleum, and natural gas are multiplied by their respective thermal conversion factors, which are in units of heat energy per unit of fuel consumed (i.e., per cubic foot, barrel, or ton), to calculate the amount of heat energy derived from fuel combustion. The thermal conversion factors are given in Appendix A of each issue of Monthly Energy Review, published by the Energy Information Administration (EIA) of the U.S. Department of Energy (DOE). Results are expressed in terms of heat energy obtained from each fuel type. These energy values were obtained from the State Energy Data Report (EIA, 2003a), ( http://www.eia.doe.gov/emeu/states/sep_use/total/csv/use_csv.html), and served as our basic input. The energy data are also available in hard copy from the Energy Information Administration, U.S. Department of Energy, as the State Energy Data Report (EIA, 2003a,b).
Pauling, Linus
1989-01-01
Consideration of the relation between bond length and bond number and the average atomic volume for different ways of packing atoms leads to the conclusion that the average ligancy of atoms in a metal should increase when a phase change occurs on increasing the pressure. Minimum volume for each value of the ligancy results from triangular coordination polyhedra (with triangular faces), such as the icosahedron and the Friauf polyhedron. Electron transfer may permit atoms of an element to assume different ligancies. Application of these principles to Cs(IV) and Cs(V), which were previously assigned structures with ligancy 8 and 6, respectively, has led to the assignment to Cs(IV) of a primitive cubic unit cell with a = 16.11 Å and with about 122 atoms in the cube and to Cs(V) of a primitive cubic unit cell resembling that of Mg32(Al,Zn)49, with a = 16.97 Å and with 162 atoms in the cube. PMID:16578839
Converting CSV Files to RKSML Files
NASA Technical Reports Server (NTRS)
Trebi-Ollennu, Ashitey; Liebersbach, Robert
2009-01-01
A computer program converts, into a format suitable for processing on Earth, files of downlinked telemetric data pertaining to the operation of the Instrument Deployment Device (IDD), which is a robot arm on either of the Mars Explorer Rovers (MERs). The raw downlinked data files are in comma-separated- value (CSV) format. The present program converts the files into Rover Kinematics State Markup Language (RKSML), which is an Extensible Markup Language (XML) format that facilitates representation of operations of the IDD and enables analysis of the operations by means of the Rover Sequencing Validation Program (RSVP), which is used to build sequences of commanded operations for the MERs. After conversion by means of the present program, the downlinked data can be processed by RSVP, enabling the MER downlink operations team to play back the actual IDD activity represented by the telemetric data against the planned IDD activity. Thus, the present program enhances the diagnosis of anomalies that manifest themselves as differences between actual and planned IDD activities.
Brady Well Coordinates and Observation Sensor Depths
DOE Office of Scientific and Technical Information (OSTI.GOV)
David Lim
Contains metadata associated with the wells used in the 2016 Spring Campaign led partially by UW - Madison, LBNL, and LLNL scientists. Included with the well coordinates are the depths to the pressure sensors used in observation and pumping wells. Read me files are included for each .csv file.
Clinical Skills Verification, Formative Feedback, and Psychiatry Residency Trainees
ERIC Educational Resources Information Center
Dalack, Gregory W.; Jibson, Michael D.
2012-01-01
Objective: The authors describe the implementation of Clinical Skills Verification (CSV) in their program as an in-training assessment intended primarily to provide formative feedback to trainees, strengthen the supervisory experience, identify the need for remediation of interviewing skills, and secondarily to demonstrating resident competence…
Workplace support after breast cancer treatment: recognition of vulnerability.
Tiedtke, Corine; Dierckx de Casterlé, Bernadette; Donceel, Peter; de Rijk, Angelique
2015-01-01
Support from the workplace seems to be a key element in addressing the poor return-to-work (RTW) rate of employees with breast cancer. We aim to acquire an in-depth understanding of how Flemish employees experience their RTW after breast cancer and the support from the workplace. Fourteen in-depth interviews of women who experienced breast cancer and returned to work (high school graduates, age range 42-55 years, mean age 48 at time of surgery) were analysed using the Qualitative Analysis Guide of Leuven (QUAGOL), based on a Grounded Theory approach. The key experiences were feeling vulnerable, feeling able to work and need for support. Although little diversity in RTW experiences was found, the background of the vulnerability varied. Women experienced support (which could be emotional or practical) only as adequate if it addressed their specific vulnerability. Employees felt particularly vulnerable. Vulnerability is not the same as low-work ability and as such it should be added as theoretical concept in RTW research. Adequate workplace support addresses the specific vulnerability of an individual woman. Our study offers a nuanced insight into the RTW process of breast cancer survivors. Upon actual return-to-work (RTW) after breast cancer treatment, women feel vulnerable but able to work and, hence, have a high need for workplace support. Support from the workplace during RTW after breast cancer treatment is experienced as adequate when it expresses genuine recognition of the individual woman's vulnerability.
Fallon, Nevada FORGE Geodetic Data
Blankenship, Doug; Eneva, Mariana; Hammond, William
2018-02-01
Fallon FORGE InSAR and geodetic GPS deformation data. InSAR shapefiles are packaged together as .MPK (ArcMap map package, compatible with other GIS platforms), and as .CSV comma-delimited plaintext. GPS data and additional metadata are linked to the Nevada Geodetic Laboratory database at the Univ. of Nevada, Reno (UNR).
EarthServer2 : The Marine Data Service - Web based and Programmatic Access to Ocean Colour Open Data
NASA Astrophysics Data System (ADS)
Clements, Oliver; Walker, Peter
2017-04-01
The ESA Ocean Colour - Climate Change Initiative (ESA OC-CCI) has produced a long-term high quality global dataset with associated per-pixel uncertainty data. This dataset has now grown to several hundred terabytes (uncompressed) and is freely available to download. However, the sheer size of the dataset can act as a barrier to many users; large network bandwidth, local storage and processing requirements can prevent researchers without the backing of a large organisation from taking advantage of this raw data. The EC H2020 project, EarthServer2, aims to create a federated data service providing access to more than 1 petabyte of earth science data. Within this federation the Marine Data Service already provides an innovative on-line tool-kit for filtering, analysing and visualising OC-CCI data. Data are made available, filtered and processed at source through a standards-based interface, the Open Geospatial Consortium Web Coverage Service and Web Coverage Processing Service. This work was initiated in the EC FP7 EarthServer project where it was found that the unfamiliarity and complexity of these interfaces itself created a barrier to wider uptake. The continuation project, EarthServer2, addresses these issues by providing higher level tools for working with these data. We will present some examples of these tools. Many researchers wish to extract time series data from discrete points of interest. We will present a web based interface, based on NASA/ESA WebWorldWind, for selecting points of interest and plotting time series from a chosen dataset. In addition, a CSV file of locations and times, such as a ship's track, can be uploaded and these points extracted and returned in a CSV file allowing researchers to work with the extract locally, such as a spreadsheet. We will also present a set of Python and JavaScript APIs that have been created to complement and extend the web based GUI. These APIs allow the selection of single points and areas for extraction. The extracted data is returned as structured data (for instance a Python array) which can then be passed directly to local processing code. We will highlight how the libraries can be used by the community and integrated into existing systems, for instance by the use of Jupyter notebooks to share Python code examples which can then be used by other researchers as a basis for their own work.
Brady's Geothermal Field - DTS Raw Data
Thomas Coleman
2016-03-26
The submitted data correspond to the complete raw temperature datasets captured by the distributed temperature sensing (DTS) horizontal and vertical arrays during the PoroTomo Experiment. Files in each submitted resource include: .xml (level 0): Data that includes Stokes, Anti-Stokes, and Temperature data .csv (level 1): Data that includes temperature PT100: Reference probe data
ERIC Educational Resources Information Center
Jibson, Michael D.; Broquet, Karen E.; Anzia, Joan Meyer; Beresin, Eugene V.; Hunt, Jeffrey I.; Kaye, David; Rao, Nyapati Raghu; Rostain, Anthony Leon; Sexson, Sandra B.; Summers, Richard F.
2012-01-01
Objective: The American Board of Psychiatry and Neurology (ABPN) announced in 2007 that general psychiatry training programs must conduct Clinical Skills Verification (CSV), consisting of observed clinical interviews and case presentations during residency, as one requirement to establish graduates' eligibility to sit for the written certification…
BLAST for Behind-the-Meter Applications Lite Tool | Transportation Research
provided by NREL's PV Watts calculator. A generic utility rate structure framework makes it possible to the BLAST documentation for proper CSV formatting. Rate structure values Define demand charges and energy costs to best represent your utility rate structure of interest. Demand charges and energy costs
Experimental Study of SBS Suppression via White Noise Phase Modulation
2014-02-10
fiber optical parametric amplifiers,” Opt. Communications 283, 2607-2610 (2010). [8] Coles, J. B., Kuo, B. P.-P., Alie , N., Moro, S., Bres, C.-S...V., Farley, K., Leveille, R., Galipeau, J., Majid , I., Christensen, S., Samson, B., Tankala, K. “kW level narrow linewidth Yb fiber amplifiers for
Brady's Geothermal Field - Metadata for InSAR Holdings
Ali, Tabrez
2016-07-29
List of synthetic aperture radar (SAR) images acquired by TerraSAR-X and TanDEM-X satellite missions and archived at UNAVCO's WINSAR facility. See file "Bradys TSX Holdings.csv" for individual links. NOTE: The user must create an account in order to access the data (See "Instructions for Creating an Account" below).
Processing of Egomotion-Consistent Optic Flow in the Rhesus Macaque Cortex
Cottereau, Benoit R.; Smith, Andrew T.; Rima, Samy; Fize, Denis; Héjja-Brichard, Yseult; Renaud, Luc; Lejards, Camille; Vayssière, Nathalie; Trotter, Yves; Durand, Jean-Baptiste
2017-01-01
Abstract The cortical network that processes visual cues to self-motion was characterized with functional magnetic resonance imaging in 3 awake behaving macaques. The experimental protocol was similar to previous human studies in which the responses to a single large optic flow patch were contrasted with responses to an array of 9 similar flow patches. This distinguishes cortical regions where neurons respond to flow in their receptive fields regardless of surrounding motion from those that are sensitive to whether the overall image arises from self-motion. In all 3 animals, significant selectivity for egomotion-consistent flow was found in several areas previously associated with optic flow processing, and notably dorsal middle superior temporal area, ventral intra-parietal area, and VPS. It was also seen in areas 7a (Opt), STPm, FEFsem, FEFsac and in a region of the cingulate sulcus that may be homologous with human area CSv. Selectivity for egomotion-compatible flow was never total but was particularly strong in VPS and putative macaque CSv. Direct comparison of results with the equivalent human studies reveals several commonalities but also some differences. PMID:28108489
The crystal structures of potassium and cesium trivanadates
Evans, H.T.; Block, S.
1966-01-01
Potassium and cesium trivanadates are monoclinic and isomorphous, space group P21/m, with the following dimensions (Z = 2): KV3O8, a = 7.640 A, b = 8.380 A, c = 4.979 A, ??= 96?? 57???; CsV3O8, a = 8.176 A, b = 8.519 A, c = 4.988 A, ?? = 95?? 32???. The crystal structure of KV3O8 has been determined from hk0, 0kl, and h0l Weissenberg data with an R factor of 0.15. The structure of CsV3O8 has been refined with 1273 hkl Weissenberg data to an R factor of 0.089. The structures consist of corrugated sheets based on a linkage of distorted VO6, octahedra. Two of the vanadium atoms lie in double, square-pyramid groups V2O8, which are linked through opposite basal corners into chains along the b axis. The chains are joined laterally along the c axis into sheets by the third vanadium atom in VO groups, also forming part of a square-pyramid coordination. Various aspects of these structures are compared with other known oxovanadate structures.
Farm 2 Fly | National Agricultural Library
identify gaps where further research, development or investment may be needed to facilitate readiness of a FSRL checklist and report template for performing a feedstock evaluation, as well as examples of a materials and residues, and a template for the report, as well as examples. Farm2fly Program csv xlsx 1 2 3
Brady Geothermal Field InSAR Raw Data
Ali, Tabrez
2015-03-31
List of TerraSAR-X/TanDEM-X images acquired between 2015-01-01 and 2015-03-31, and archived at https://winsar.unavco.org. See file "BHS InSAR Data with URLs.csv" for individual links. NOTE: The user must create an account in order to access the data (See "Instructions for Creating an Account" below).
Software Vulnerability Taxonomy Consolidation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Polepeddi, Sriram S.
2004-12-07
In today's environment, computers and networks are increasing exposed to a number of software vulnerabilities. Information about these vulnerabilities is collected and disseminated via various large publicly available databases such as BugTraq, OSVDB and ICAT. Each of these databases, individually, do not cover all aspects of a vulnerability and lack a standard format among them, making it difficult for end-users to easily compare various vulnerabilities. A central database of vulnerabilities has not been available until today for a number of reasons, such as the non-uniform methods by which current vulnerability database providers receive information, disagreement over which features of amore » particular vulnerability are important and how best to present them, and the non-utility of the information presented in many databases. The goal of this software vulnerability taxonomy consolidation project is to address the need for a universally accepted vulnerability taxonomy that classifies vulnerabilities in an unambiguous manner. A consolidated vulnerability database (CVDB) was implemented that coalesces and organizes vulnerability data from disparate data sources. Based on the work done in this paper, there is strong evidence that a consolidated taxonomy encompassing and organizing all relevant data can be achieved. However, three primary obstacles remain: lack of referencing a common ''primary key'', un-structured and free-form descriptions of necessary vulnerability data, and lack of data on all aspects of a vulnerability. This work has only considered data that can be unambiguously extracted from various data sources by straightforward parsers. It is felt that even with the use of more advanced, information mining tools, which can wade through the sea of unstructured vulnerability data, this current integration methodology would still provide repeatable, unambiguous, and exhaustive results. Though the goal of coalescing all available data, which would be of use to system administrators, software developers and vulnerability researchers is not yet achieved, this work has resulted in the most exhaustive collection of vulnerability data to date.« less
NASA Astrophysics Data System (ADS)
Bashev, A.
2012-04-01
Currently there is an enormous amount of various geoscience databases. Unfortunately the only users of the majority of the databases are their elaborators. There are several reasons for that: incompaitability, specificity of tasks and objects and so on. However the main obstacles for wide usage of geoscience databases are complexity for elaborators and complication for users. The complexity of architecture leads to high costs that block the public access. The complication prevents users from understanding when and how to use the database. Only databases, associated with GoogleMaps don't have these drawbacks, but they could be hardly named "geoscience" Nevertheless, open and simple geoscience database is necessary at least for educational purposes (see our abstract for ESSI20/EOS12). We developed a database and web interface to work with them and now it is accessible at maps.sch192.ru. In this database a result is a value of a parameter (no matter which) in a station with a certain position, associated with metadata: the date when the result was obtained; the type of a station (lake, soil etc); the contributor that sent the result. Each contributor has its own profile, that allows to estimate the reliability of the data. The results can be represented on GoogleMaps space image as a point in a certain position, coloured according to the value of the parameter. There are default colour scales and each registered user can create the own scale. The results can be also extracted in *.csv file. For both types of representation one could select the data by date, object type, parameter type, area and contributor. The data are uploaded in *.csv format: Name of the station; Lattitude(dd.dddddd); Longitude(ddd.dddddd); Station type; Parameter type; Parameter value; Date(yyyy-mm-dd). The contributor is recognised while entering. This is the minimal set of features that is required to connect a value of a parameter with a position and see the results. All the complicated data treatment could be conducted in other programs after extraction the filtered data into *.csv file. It makes the database understandable for non-experts. The database employs open data format (*.csv) and wide spread tools: PHP as the program language, MySQL as database management system, JavaScript for interaction with GoogleMaps and JQueryUI for create user interface. The database is multilingual: there are association tables, which connect with elements of the database. In total the development required about 150 hours. The database still has several problems. The main problem is the reliability of the data. Actually it needs an expert system for estimation the reliability, but the elaboration of such a system would take more resources than the database itself. The second problem is the problem of stream selection - how to select the stations that are connected with each other (for example, belong to one water stream) and indicate their sequence. Currently the interface is English and Russian. However it can be easily translated to your language. But some problems we decided. For example problem "the problem of the same station" (sometimes the distance between stations is smaller, than the error of position): when you adding new station to the database our application automatically find station near this place. Also we decided problem of object and parameter type (how to regard "EC" and "electrical conductivity" as the same parameter). This problem has been solved using "associative tables". If you would like to see the interface on your language, just contact us. We should send you the list of terms and phrases for translation on your language. The main advantage of the database is that it is totally open: everybody can see, extract the data from the database and use them for non-commercial purposes with no charge. Registered users can contribute to the database without getting paid. We hope, that it will be widely used first of all for education purposes, but professional scientists could use it also.
Eriksson, Jonatan; Andersson, Simone; Appelqvist, Roger; Wieslander, Elisabet; Truedsson, Mikael; Bugge, May; Malm, Johan; Dahlbäck, Magnus; Andersson, Bo; Fehniger, Thomas E; Marko-Varga, György
2016-01-01
Data from biological samples and medical evaluations plays an essential part in clinical decision making. This data is equally important in clinical studies and it is critical to have an infrastructure that ensures that its quality is preserved throughout its entire lifetime. We are running a 5-year longitudinal clinical study, KOL-Örestad, with the objective to identify new COPD (Chronic Obstructive Pulmonary Disease) biomarkers in blood. In the study, clinical data and blood samples are collected from both private and public health-care institutions and stored at our research center in databases and biobanks, respectively. The blood is analyzed by Mass Spectrometry and the results from this analysis then linked to the clinical data. We built an infrastructure that allows us to efficiently collect and analyze the data. We chose to use REDCap as the EDC (Electronic Data Capture) tool for the study due to its short setup-time, ease of use, and flexibility. REDCap allows users to easily design data collection modules based on existing templates. In addition, it provides two functions that allow users to import batches of data; through a web API (Application Programming Interface) as well as by uploading CSV-files (Comma Separated Values). We created a software, DART (Data Rapid Translation), that translates our biomarker data into a format that fits REDCap's CSV-templates. In addition, DART is configurable to work with many other data formats as well. We use DART to import our clinical chemistry data to the REDCap database. We have shown that a powerful and internationally adopted EDC tool such as REDCap can be extended so that it can be used efficiently in proteomic studies. In our study, we accomplish this by using DART to translate our clinical chemistry data to a format that fits the templates of REDCap.
Development of EnergyPlus Utility to Batch Simulate Building Energy Performance on a National Scale
DOE Office of Scientific and Technical Information (OSTI.GOV)
Valencia, Jayson F.; Dirks, James A.
2008-08-29
EnergyPlus is a simulation program that requires a large number of details to fully define and model a building. Hundreds or even thousands of lines in a text file are needed to run the EnergyPlus simulation depending on the size of the building. To manually create these files is a time consuming process that would not be practical when trying to create input files for thousands of buildings needed to simulate national building energy performance. To streamline the process needed to create the input files for EnergyPlus, two methods were created to work in conjunction with the National Renewable Energymore » Laboratory (NREL) Preprocessor; this reduced the hundreds of inputs needed to define a building in EnergyPlus to a small set of high-level parameters. The first method uses Java routines to perform all of the preprocessing on a Windows machine while the second method carries out all of the preprocessing on the Linux cluster by using an in-house built utility called Generalized Parametrics (GPARM). A comma delimited (CSV) input file is created to define the high-level parameters for any number of buildings. Each method then takes this CSV file and uses the data entered for each parameter to populate an extensible markup language (XML) file used by the NREL Preprocessor to automatically prepare EnergyPlus input data files (idf) using automatic building routines and macro templates. Using a Linux utility called “make”, the idf files can then be automatically run through the Linux cluster and the desired data from each building can be aggregated into one table to be analyzed. Creating a large number of EnergyPlus input files results in the ability to batch simulate building energy performance and scale the result to national energy consumption estimates.« less
Genomic mutation consequence calculator.
Major, John E
2007-11-15
The genomic mutation consequence calculator (GMCC) is a tool that will reliably and quickly calculate the consequence of arbitrary genomic mutations. GMCC also reports supporting annotations for the specified genomic region. The particular strength of the GMCC is it works in genomic space, not simply in spliced transcript space as some similar tools do. Within gene features, GMCC can report on the effects on splice site, UTR and coding regions in all isoforms affected by the mutation. A considerable number of genomic annotations are also reported, including: genomic conservation score, known SNPs, COSMIC mutations, disease associations and others. The manual interface also offers link outs to various external databases and resources. In batch mode, GMCC returns a csv file which can easily be parsed by the end user. GMCC is intended to support the many tumor resequencing efforts, but can be useful to any study investigating genomic mutations.
SynTrack: DNA Assembly Workflow Management (SynTrack) v2.0.1
DOE Office of Scientific and Technical Information (OSTI.GOV)
MENG, XIANWEI; SIMIRENKO, LISA
2016-12-01
SynTrack is a dynamic, workflow-driven data management system that tracks the DNA build process: Management of the hierarchical relationships of the DNA fragments; Monitoring of process tasks for the assembly of multiple DNA fragments into final constructs; Creations of vendor order forms with selectable building blocks. Organizing plate layouts barcodes for vendor/pcr/fusion/chewback/bioassay/glycerol/master plate maps (default/condensed); Creating or updating Pre-Assembly/Assembly process workflows with selected building blocks; Generating Echo pooling instructions based on plate maps; Tracking of building block orders, received and final assembled for delivering; Bulk updating of colony or PCR amplification information, fusion PCR and chewback results; Updating with QA/QCmore » outcome with .csv & .xlsx template files; Re-work assembly workflow enabled before and after sequencing validation; and Tracking of plate/well data changes and status updates and reporting of master plate status with QC outcomes.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Brown, Joseph; Pirrung, Meg; McCue, Lee Ann
FQC is software that facilitates large-scale quality control of FASTQ files by carrying out a QC protocol, parsing results, and aggregating quality metrics within and across experiments into an interactive dashboard. The dashboard utilizes human-readable configuration files to manipulate the pages and tabs, and is extensible with CSV data.
A Virtual Environment for Resilient Infrastructure Modeling and Design
2015-09-01
Security CI Critical Infrastructure CID Center for Infrastructure Defense CSV Comma Separated Value DAD Defender-Attacker-Defender DHS Department...responses to disruptive events (e.g., cascading failure behavior) in a context- rich , controlled environment for exercises, education, and training...The general attacker-defender (AD) and defender-attacker-defender ( DAD ) models for CI are defined in Brown et al. (2006). These models help
[Computerized system validation of clinical researches].
Yan, Charles; Chen, Feng; Xia, Jia-lai; Zheng, Qing-shan; Liu, Daniel
2015-11-01
Validation is a documented process that provides a high degree of assurance. The computer system does exactly and consistently what it is designed to do in a controlled manner throughout the life. The validation process begins with the system proposal/requirements definition, and continues application and maintenance until system retirement and retention of the e-records based on regulatory rules. The objective to do so is to clearly specify that each application of information technology fulfills its purpose. The computer system validation (CSV) is essential in clinical studies according to the GCP standard, meeting product's pre-determined attributes of the specifications, quality, safety and traceability. This paper describes how to perform the validation process and determine relevant stakeholders within an organization in the light of validation SOPs. Although a specific accountability in the implementation of the validation process might be outsourced, the ultimate responsibility of the CSV remains on the shoulder of the business process owner-sponsor. In order to show that the compliance of the system validation has been properly attained, it is essential to set up comprehensive validation procedures and maintain adequate documentations as well as training records. Quality of the system validation should be controlled using both QC and QA means.
Speciation studies of nickel and chromium in wastewater from an electroplating plant.
Kiptoo, Jackson K; Ngila, J Catherine; Sawula, Gerald M
2004-09-08
A speciation scheme involving the use of flame atomic absorption spectrometry (FAAS) and differential pulse adsorptive cathodic stripping voltammetry (DPAdCSV) techniques was applied to studies of nickel and chromium in wastewater from a nickel-chrome electroplating plant. Dimethylglyoxime (DMG) and diethylenetriaminepentaacetic acid (DTPA) were employed as complexing agents for adsorptive voltammetric determination of Ni and Cr, respectively. Cr(III) and Cr(VI) were determined by exploiting differences in their reactivity towards DTPA at HMDE. Total dissolved metal content was in the range 2906-3141 and 30.7-31.2mgl(-1) for Ni and Cr, respectively. A higher percentage of the metal was present as labile species (mean value of 67.9% for Ni and 79.8% for Cr) suggesting that strongly binding ligands are not ubiquitous in the sample. About 77.8% of Cr was found to exist in the higher oxidization state, Cr(IV). Results on effect of dilution on lability of the metal forms in the sample using DPAdCSV showed slight peak shifts to a more negative (cathodic) value by -0.036V for Ni and -0.180V for Cr with a dilution factor of 100, while peak intensity (cathodic current) remained fairly constant.
NASA Technical Reports Server (NTRS)
Fanourakis, Sofia
2015-01-01
My main project was to determine and implement updates to be made to MODEAR (Mission Operations Data Enterprise Architecture Repository) process definitions to be used for CST-100 (Crew Space Transportation-100) related missions. Emphasis was placed on the scheduling aspect of the processes. In addition, I was to complete other tasks as given. Some of the additional tasks were: to create pass-through command look-up tables for the flight controllers, finish one of the MDT (Mission Operations Directorate Display Tool) displays, gather data on what is included in the CST-100 public data, develop a VBA (Visual Basic for Applications) script to create a csv (Comma-Separated Values) file with specific information from spreadsheets containing command data, create a command script for the November MCC-ASIL (Mission Control Center-Avionics System Integration Laboratory) testing, and take notes for one of the TCVB (Terminal Configured Vehicle B-737) meetings. In order to make progress in my main project I scheduled meetings with the appropriate subject matter experts, prepared material for the meetings, and assisted in the discussions in order to understand the process or processes at hand. After such discussions I made updates to various MODEAR processes and process graphics. These meetings have resulted in significant updates to the processes that were discussed. In addition, the discussions have helped the departments responsible for these processes better understand the work ahead and provided material to help document how their products are created. I completed my other tasks utilizing resources available to me and, when necessary, consulting with the subject matter experts. Outputs resulting from my other tasks were: two completed and one partially completed pass through command look-up tables for the fight controllers, significant updates to one of the MDT displays, a spreadsheet containing data on what is included in the CST-100 public data, a tool to create a csv file with specific information from spreadsheets containing command data, a command script for the November MCC-ASIL testing which resulted in a successful test day identifying several potential issues, and notes from one of the TCVB meetings that was used to keep the teams up to date on what was discussed and decided. I have learned a great deal working at NASA these last four months. I was able to meet and work with amazing individuals, further develop my technical knowledge, expand my knowledge base regarding human spaceflight, and contribute to the CST-100 missions. My work at NASA has strengthened my desire to continue my education in order to make further contributions to the field, and has given me the opportunity to see the advantages of a career at NASA.
NASA Technical Reports Server (NTRS)
Taback, I.
1979-01-01
The discussion of vulnerability begins with a description of some of the electrical characteristics of fibers before definiting how vulnerability calculations are done. The vulnerability results secured to date are presented. The discussion touches on post exposure vulnerability. After a description of some shock hazard work now underway, the discussion leads into a description of the planned effort and some preliminary conclusions are presented.
Generating Ship-to-Shore Bulk Fuel Delivery Schedules for the Marine Expeditionary Unit
2017-06-01
Amphibious Ready Group . . . . . . . . . . . . . . . . . . . . . 9 2.2 Amphibious Connectors . . . . . . . . . . . . . . . . . . . . . 11 2.3 Fuel Containers...ARG Amphibious Ready Group BLT Battalion Landing Team COMPHIBRON Commander, Amphibious Squadron CSV Comma Separated Values LCAC Landing Craft Air...in the world. The MEU and the Amphibious Ready Group (ARG) create a highly capable amphibious force able to strike and conduct operations from the sea
HIPPO Unit Commitment Version 1
DOE Office of Scientific and Technical Information (OSTI.GOV)
2017-01-17
Developed for the Midcontinent Independent System Operator, Inc. (MISO), HIPPO-Unit Commitment Version 1 is for solving security constrained unit commitment problem. The model was developed to solve MISO's cases. This version of codes includes I/O module to read in MISO's csv files, modules to create a state-based mixed integer programming formulation for solving MIP, and modules to test basic procedures to solve MIP via HPC.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-16
... posting CSV file samples. Order No. 770 revised the process for filing EQRs. Pursuant to Order No. 770, one of the new processes for filing allows EQRs to be filed using an XML file. The XML schema that is needed to file EQRs in this manner is now posted on the Commission's Web site at http://www.ferc.gov/docs...
ERIC Educational Resources Information Center
Rao, Nyapati R.; Kodali, Rahul; Mian, Ayesha; Ramtekkar, Ujjwal; Kamarajan, Chella; Jibson, Michael D.
2012-01-01
Objective: The authors report on a pilot study of the experiences and perceptions of foreign international medical graduate (F-IMG), United States international medical graduate (US-IMG), and United States medical graduate (USMG) psychiatric residents with the newly mandated Clinical Skills Verification (CSV) process. The goal was to identify and…
Working up a Debt: Students as Vulnerable Consumers
ERIC Educational Resources Information Center
Robson, Julie; Farquhar, Jillian Dawes; Hindle, Christopher
2017-01-01
Students are recognized as vulnerable consumers where financial matters are concerned, particularly with reference to indebtedness. This study examines student indebtedness in order to initiate wider debate about student vulnerability. We consider vulnerability as dynamic and temporal, linked to an event that renders the consumer susceptible to…
NASA Technical Reports Server (NTRS)
Goseva-Popstojanova, Katerina; Tyo, Jacob
2017-01-01
While some prior research work exists on characteristics of software faults (i.e., bugs) and failures, very little work has been published on analysis of software applications vulnerabilities. This paper aims to contribute towards filling that gap by presenting an empirical investigation of application vulnerabilities. The results are based on data extracted from issue tracking systems of two NASA missions. These data were organized in three datasets: Ground mission IVV issues, Flight mission IVV issues, and Flight mission Developers issues. In each dataset, we identified security related software bugs and classified them in specific vulnerability classes. Then, we created the security vulnerability profiles, i.e., determined where and when the security vulnerabilities were introduced and what were the dominating vulnerabilities classes. Our main findings include: (1) In IVV issues datasets the majority of vulnerabilities were code related and were introduced in the Implementation phase. (2) For all datasets, around 90 of the vulnerabilities were located in two to four subsystems. (3) Out of 21 primary classes, five dominated: Exception Management, Memory Access, Other, Risky Values, and Unused Entities. Together, they contributed from 80 to 90 of vulnerabilities in each dataset.
ERIC Educational Resources Information Center
Parley, Fiona F
2011-01-01
Protection of those deemed vulnerable has received increasing attention since 2000. This article reports on care staff views of vulnerability using original data from a research study (Parley. "Vulnerability and abuse: an exploration of views of care staff working with people who have learning disabilities," PhD Thesis, 2007) in which care staff…
Schmidt-Sane, Megan M
2018-01-29
This article examines the social patterning of health, economic uncertainty, hegemonic masculinity, and vulnerability among men who live and work in a low-income sex work community in Kampala, Uganda. This problematises the notion that vulnerable communities are homogenous, in demographics, economic status, and risk. This article draws on ethnographic data collected in 2016, including semi-structured interviews and participant observation. This article uses a stratified risk framework to describe the central finding of this study, which is that men's experience in Kataba is characterised by a struggle to fulfil the provider role that constitutes a core aspect of their socially ascribed gender role. In a context of economic scarcity, men's lives are fraught with strain and this intersects with other forms of risk. Finally, by focusing on community vulnerability rather than individual risk, this work contributes to theories of gender and sex work, and informs HIV/AIDS praxis.
Examining occupational health and safety vulnerability among Canadian workers with disabilities.
Breslin, F Curtis; Lay, A Morgan; Jetha, Arif; Smith, Peter
2017-05-26
To compare workers with and without disabilities on their reported workplace hazard exposure and the presence of occupational health and safety vulnerability factors. Working-aged adults in Ontario or British Columbia were recruited to participate in a cross-sectional survey (n = 1988). Self-reported measures included demographic factors, work-related variables, perceived level of activity limitation at work, and presence of work safety vulnerability factors utilizing a novel framework. Reporting a disability at work was significantly associated with greater hazard exposure than those without a disability. In addition, those reporting a disability at work were more likely to be employed in conditions where hazard exposure was combined with inadequate policies and procedures, or hazard exposures were combined with inadequate empowerment. Work safety vulnerability is one way that health inequalities can be perpetuated even among those with disabilities who have found work. Our results suggest that employers and policy makers need to focus on assessing and addressing hazard exposures and targeting occupational health and safety resources in the workplace in a way that includes workers with disabilities. Implications for Rehabilitation Workers with disabilities experience greater hazard exposure than those without a disability. Those with moderate and severe disabilities reported occupational health and safety vulnerability, suggesting that workplace accommodations should be available to a broader range of disability levels. It appears that, above and beyond standard safety procedures, providing workplace accommodations for people with disabilities may further reduce their hazard exposure and improve their safety.
Youth Work with Vulnerable Young People. Interchange No. 51.
ERIC Educational Resources Information Center
Powney, Janet; Furlong, Andy; Cartmel, Fred; Hall, Stuart
Research was conducted in Scotland to evaluate the effectiveness of youth work with vulnerable young people, primarily between the ages of 13 and 16. Four complementary methods were adopted: (1) a survey of secondary school students; (2) a series of focus group interviews with young people with experience of youth work; (3) interviews with…
Supporting Community in Schools: The Relationship of Resilience and Vulnerability.
ERIC Educational Resources Information Center
Calderwood, Patricia E.
This paper examines the role of community in education. It focuses on the relation between vulnerability and resilience and how this dialectic is fundamental to the workings of community. Community without vulnerability is impoverished since it offers no chance to build resilience. However, vulnerabilities may be perceived as flaws that could be…
ERIC Educational Resources Information Center
Luguetti, Carla; Oliver, Kimberly L.; Dantas, Luiz E. P. B. T.; Kirk, David
2017-01-01
Purpose: This study discusses the process of co-constructing a prototype pedagogical model for working with youth from socially vulnerable backgrounds. Participants and settings: This six-month activist research project was conducted in a soccer program in a socially vulnerable area of Brazil in 2013. The study included 17 youths, 4 coaches, a…
A Data Warehouse to Support Condition Based Maintenance (CBM)
2005-05-01
Application ( VBA ) code sequence to import the original MAST-generated CSV and then create a single output table in DBASE IV format. The DBASE IV format...database architecture (Oracle, Sybase, MS- SQL , etc). This design includes table definitions, comments, specification of table attributes, primary and foreign...built queries and applications. Needs the application developers to construct data views. No SQL programming experience. b. Power Database User - knows
Network Science Research Laboratory (NSRL) Telemetry Warehouse
2016-06-01
Functionality and architecture of the NSRL Telemetry Warehouse are also described as well as the web interface, data structure, security aspects, and...Experiment Controller 6 4.5 Telemetry Sensors 7 4.6 Custom Data Processing Nodes 7 5. Web Interface 8 6. Data Structure 8 6.1 Measurements 8...telemetry in comma-separated value (CSV) format from the web interface or via custom applications developed by researchers using the client application
EPA FRS Facilities Combined File CSV Download for the Marshall Islands
The Facility Registry System (FRS) identifies facilities, sites, or places subject to environmental regulation or of environmental interest to EPA programs or delegated states. Using vigorous verification and data management procedures, FRS integrates facility data from program national systems, state master facility records, tribal partners, and other federal agencies and provides the Agency with a centrally managed, single source of comprehensive and authoritative information on facilities.
EPA FRS Facilities Single File CSV Download for the Marshall Islands
The Facility Registry System (FRS) identifies facilities, sites, or places subject to environmental regulation or of environmental interest to EPA programs or delegated states. Using vigorous verification and data management procedures, FRS integrates facility data from program national systems, state master facility records, tribal partners, and other federal agencies and provides the Agency with a centrally managed, single source of comprehensive and authoritative information on facilities.
Supporting Marine Corps Enhanced Company Operations: A Quantitative Analysis
2010-06-01
by decomposition into simple independent parts. o Agents interact with each other in non-linear ways, and “ adapt ” to their local environment . (p...Center Co Company CoLT Company Landing Team CAS Complex Adaptive Systems CSV Comma-separated Value DO Distributed Operations DODIC Department...SUMMARY The modern irregular warfare environment has dramatically impacted the battle space assignments and mission scope of tactical units that now
VStar: Variable star data visualization and analysis tool
NASA Astrophysics Data System (ADS)
VStar Team
2014-07-01
VStar is a multi-platform, easy-to-use variable star data visualization and analysis tool. Data for a star can be read from the AAVSO (American Association of Variable Star Observers) database or from CSV and TSV files. VStar displays light curves and phase plots, can produce a mean curve, and analyzes time-frequency with Weighted Wavelet Z-Transform. It offers tools for period analysis, filtering, and other functions.
Social and cultural vulnerability to sexually transmitted infection: the work of exotic dancers.
Maticka-Tyndale, E; Lewis, J; Clark, J P; Zubick, J; Young, S
1999-01-01
This article examines the social and cultural factors that influence the vulnerability of female exotic dancers to sexually transmitted infections. Results are based on a qualitative, exploratory study using observations in 10 clubs and in-depth interviews with 30 dancers in southern Ontario. The social and cultural context within which exotic dancing takes place contributes to a chronic state of sexual harassment and sexual assault in the strip clubs. Women are pressured by economics and by their customers to engage in sex for pay. The defence mechanisms that some women use to deal with these work conditions also contribute to women's vulnerability. The social structure of strip clubs and their policies toward employees and customers can either reduce or exacerbate the vulnerability of dancers. Workplace policies and health and safety standards appear to be the most effective ways to decrease the vulnerability of dancers. Public health units can work with employers and dancers to establish workplace policies and programmes that contribute to the health and wellbeing of dancers.
Joining and leaving sex work: experiences of women in Kigali, Rwanda.
Ingabire, Marie Chantal; Mitchell, Kirstin; Veldhuijzen, Nienke; Umulisa, Marie Michelle; Nyinawabega, Jeanine; Kestelyn, Evelyne; Van Steijn, Minouk; Van De Wijgert, Janneke; Pool, Robert
2012-10-01
Although sex work can bring significant economic benefit there are serious downsides, not least vulnerability to adverse sexual health outcomes. Focus-groups discussions and in-depth interviews were conducted with 70 female sex workers to explore the context in which they started sex work, their motivations to leave, and their experiences of trying to leave. The pathway to becoming a sex worker was underscored by poverty, with disruptive events leading to increasing vulnerability and increasingly difficult life choices. A sizeable minority of women became sex workers while working as house-girls, a position associated with financial, physical and sexual vulnerability. The majority of participants were still working as sex workers, citing financial reasons for not leaving. Motivations to leave sex work included experiencing a frightening incident, peer pressure and concerns about dependent children. Those who left often described a change in their financial circumstances that enabled them to leave. Some had left but had returned to sex work following a financial crisis or because they found their new life too hard. House-girls are particularly vulnerable and therefore an appropriate focus for prevention. Programmes assisting women to leave need to include financial safety nets so that a time of financial difficulty does not necessitate a return to sex work.
EPA Enforcement and Compliance History Online
The Environmental Protection Agency's Enforcement and Compliance History Online (ECHO) website provides customizable and downloadable information about environmental inspections, violations, and enforcement actions for EPA-regulated facilities related to the Clean Air Act, Clean Water Act, Resource Conservation and Recovery Act, and Safe Drinking Water Act. These data are updated weekly as part of the ECHO data refresh, and ECHO offers many user-friendly options to explore data, including:? Facility Search: ECHO information is searchable by varied criteria, including location, facility type, and compliance status. Search results are customizable and downloadable.? Comparative Maps and State Dashboards: These tools offer aggregated information about facility compliance status, regulatory agency compliance monitoring, and enforcement activity at the national and state level.? Bulk Data Downloads: One of ECHO??s most popular features is the ability to work offline by downloading large data sets. Users can take advantage of the ECHO Exporter, which provides summary information about each facility in comma-separated values (csv) file format, or download data sets by program as zip files.
MODIS Interactive Subsetting Tool (MIST)
NASA Astrophysics Data System (ADS)
McAllister, M.; Duerr, R.; Haran, T.; Khalsa, S. S.; Miller, D.
2008-12-01
In response to requests from the user community, NSIDC has teamed with the Oak Ridge National Laboratory Distributive Active Archive Center (ORNL DAAC) and the Moderate Resolution Data Center (MrDC) to provide time series subsets of satellite data covering stations in the Greenland Climate Network (GC-NET) and the International Arctic Systems for Observing the Atmosphere (IASOA) network. To serve these data NSIDC created the MODIS Interactive Subsetting Tool (MIST). MIST works with 7 km by 7 km subset time series of certain Version 5 (V005) MODIS products over GC-Net and IASOA stations. User- selected data are delivered in a text Comma Separated Value (CSV) file format. MIST also provides online analysis capabilities that include generating time series and scatter plots. Currently, MIST is a Beta prototype and NSIDC intends that user requests will drive future development of the tool. The intent of this poster is to introduce MIST to the MODIS data user audience and illustrate some of the online analysis capabilities.
NASA Astrophysics Data System (ADS)
Chandrasekhar, Anoop; Sander, Sylvia; Milnes, Angie; Boyd, Philip
2015-04-01
Iron plays a significant role in the ocean productivity as a micro nutrient that facilitates the growth of marine phytoplankton and microbes. The bioavailability of iron in the ocean depends on it speciation. Iron is bio available in its dissolved form and about 99.9% of dissolved iron in seawater is organically complexed with natural ligands. The competitive ligand equilibration - adsorptive cathodic stripping voltammetry (CLE-AdCSV) is the widely used technique to examine Fe speciation. The method has its own limitations. The analytical window employed in this technique has a distinct impact on Fe speciation results (Buck, Moffett et al. 2012). Recently, (Pizeta, Sander et al. in preparation) have shown that the accuracy of complexometric titrations improve if multiple analytical windows (MAW) are solved as a united dataset. Several programs are now available that enable this approach with the KMS (Kineteql.xls , Hudson 2014), which is based on an Excel application based on speciation calculation (Hudson, Rue et al. 2003, Sander, Hunter et al. 2011), being one of them. In the present work, the unified MAW data analysis method is applied to determine iron speciation by CLE-AdCSV with salicyl aldoxime (SA) (Abualhaija and van den Berg 2014) in real seawater samples from the Spring bloom FeCycle III voyage, which took place in an anticyclonic eddy in subtropical waters east of New Zealand in spring 2012. Two different analytical windows (5 and 15µM SA) were applied to samples from depth profiles taken during this cruise. The data obtained was analysed using the program KMS (Kineteql.xls). Most samples only returned one Fe-binding ligands class. Higher ligand concentrations were observed in the upper water column and the stability constants were above 22 (e.g. 22.25 ± 0.21 for station 63). Our results will be discussed in the context of microbial community distribution as well as other biogeochemical parameters. Abualhaija, M. M. and C. M. G. van den Berg (2014). "Chemical speciation of iron in seawater using catalytic cathodic stripping voltammetry with ligand competition against salicylaldoxime." Marine Chemistry 164(0): 60-74. Buck, K. N., J. Moffett, K. A. Barbeau, R. M. Bundy, Y. Kondo and J. Wu (2012). "The organic complexation of iron and copper: an intercomparison of competitive ligand exchange-adsorptive cathodic stripping voltammetry (CLE-ACSV) techniques " Limnology and Oceanography: Methods 10: 496-515. Hudson, R. J. M., E. L. Rue and K. W. Bruland (2003). "Modeling Complexometric Titrations of Natural Water Samples." Environ. Sci. Tech. 37: 1553-1562. Pizeta, I., S. G. Sander, O. Baars, K. Buck, R. Bundy, G. Carrasco, P. Croot, C. Garnier, L. Gerringa, M. Gledhill, K. Hirose, D. R. Hudson, Y. Kondo-Jacquot, L. Laglera, D. Omanovic, M. Rijkenberg, B. Twining and M. Wells (in preparation). "Intercomparison of estimating metal binding ligand parameters from simulated titration data using different fitting approaches." for Limnology and Oceanography: Methods. Sander, S. G., K. A. Hunter, H. Harms and M. Wells (2011). "Numerical approach to speciation and estimation of parameters used in modeling trace metal bioavailability." Environmental Science and Technology 45(15): 6388-6395.
Storage and Database Management for Big Data
2015-07-27
and value ), each cell is actually a seven tuple where the column is broken into three parts, and there is an additional field for a timestamp as seen...questions require a careful understanding of the technology field in addition to the types of problems that are being solved. This chapter aims to address...formats such as comma separated values (CSV), JavaScript Object Notation (JSON) [21], or other proprietary sensor formats. Most often, this raw data
DOE Office of Scientific and Technical Information (OSTI.GOV)
Brown, Joseph; Pirrung, Meg; McCue, Lee Ann
FQC is software that facilitates quality control of FASTQ files by carrying out a QC protocol using FastQC, parsing results, and aggregating quality metrics into an interactive dashboard designed to richly summarize individual sequencing runs. The dashboard groups samples in dropdowns for navigation among the data sets, utilizes human-readable configuration files to manipulate the pages and tabs, and is extensible with CSV data.
Brown, Joseph; Pirrung, Meg; McCue, Lee Ann
2017-06-09
FQC is software that facilitates quality control of FASTQ files by carrying out a QC protocol using FastQC, parsing results, and aggregating quality metrics into an interactive dashboard designed to richly summarize individual sequencing runs. The dashboard groups samples in dropdowns for navigation among the data sets, utilizes human-readable configuration files to manipulate the pages and tabs, and is extensible with CSV data.
2013-06-03
dairyFarm.txt Ted runs a dairy farm. He milks the cows , runs the office, and cleans the barn. 136 dairyFarmDeleteList.txt There are some...applying the delete list, the text appears in the display like this: Ted runs dairy farm. He milks cows , runs office, cleans ...in the file. dairyFarmMeta.csv Ted,agent runs,task dairy,resource farm,location He,agent milks ,task cows ,resource office,location cleans
Are there high-risk groups among physicians that are more vulnerable to on-call work?
Heponiemi, Tarja; Aalto, Anna-Mari; Pekkarinen, Laura; Siuvatti, Eeva; Elovainio, Marko
2015-05-01
Work done in the emergency departments is one stressful aspect of physicians' work. Numerous previous studies have highlighted the stressfulness of on-call work and especially of night on call. In addition, previous studies suggest that there may be individual differences in adjusting to changes in circadian rhythms and on-call work. The objective of this study was to examine whether physicians' on-call work is associated with perceived work-related stress factors and job resources and whether there are groups that are more vulnerable to on-call work according to sex, age, and specialization status. This was a cross-sectional questionnaire study among 3230 Finnish physicians (61.5% women). The analyses were conducted using analyses of covariance adjusted for sex, age, specialization status, and employment sector. Physicians with on-call duties had more time pressure and stress related to team work and patient information systems compared with those who did not have on-call duties. In addition, they had less job control opportunities and experienced organization as less fair and team climate as worse. Older physicians and specialists seemed to be especially vulnerable to on-call work regarding stress factors, whereas younger and specialist trainees seemed vulnerable to on-call work regarding job resources. Focusing on team issues and resources is important for younger physicians and trainees having on-call duties, whereas for older and specialists, attention should be focused on actual work load and time pressure. Copyright © 2015 Elsevier Inc. All rights reserved.
Huan, Tao; Li, Liang
2015-01-20
Metabolomics requires quantitative comparison of individual metabolites present in an entire sample set. Unfortunately, missing intensity values in one or more samples are very common. Because missing values can have a profound influence on metabolomic results, the extent of missing values found in a metabolomic data set should be treated as an important parameter for measuring the analytical performance of a technique. In this work, we report a study on the scope of missing values and a robust method of filling the missing values in a chemical isotope labeling (CIL) LC-MS metabolomics platform. Unlike conventional LC-MS, CIL LC-MS quantifies the concentration differences of individual metabolites in two comparative samples based on the mass spectral peak intensity ratio of a peak pair from a mixture of differentially labeled samples. We show that this peak-pair feature can be explored as a unique means of extracting metabolite intensity information from raw mass spectra. In our approach, a peak-pair peaking algorithm, IsoMS, is initially used to process the LC-MS data set to generate a CSV file or table that contains metabolite ID and peak ratio information (i.e., metabolite-intensity table). A zero-fill program, freely available from MyCompoundID.org , is developed to automatically find a missing value in the CSV file and go back to the raw LC-MS data to find the peak pair and, then, calculate the intensity ratio and enter the ratio value into the table. Most of the missing values are found to be low abundance peak pairs. We demonstrate the performance of this method in analyzing an experimental and technical replicate data set of human urine metabolome. Furthermore, we propose a standardized approach of counting missing values in a replicate data set as a way of gauging the extent of missing values in a metabolomics platform. Finally, we illustrate that applying the zero-fill program, in conjunction with dansylation CIL LC-MS, can lead to a marked improvement in finding significant metabolites that differentiate bladder cancer patients and their controls in a metabolomics study of 109 subjects.
Evaluating Youth Work with Vulnerable Young People.
ERIC Educational Resources Information Center
Furlong, Andy; Cartmel, Fred; Powney, Janet; Hall, Stuart
This report presents the results of an 18-month research project that studied the effectiveness of youth work with vulnerable young people. The research, representing six distinct geographical areas of Scotland characterized by disadvantage, focused on young people aged 13 to 16. In each neighborhood, the project examined the experiences of young…
Stigma, violence and HIV vulnerability among transgender persons in sex work in Maharashtra, India.
Ganju, Deepika; Saggurti, Niranjan
2017-08-01
Among marginalised groups in India, HIV prevalence is highest among transgender persons; however, little is known about their HIV vulnerability. This study describes transgender sex workers' experiences of stigma and violence, a key driver of the HIV epidemic, and explores their coping responses. In-depth interviews were conducted with 68 respondents in Maharashtra state, India. Findings show that respondents face pervasive stigma and violence due to multiple marginalised social identities (transgender status, sex work, gender non-conformity), which reinforce and intersect with social inequities (economic and housing insecurity, employment discrimination, poverty), fuelling HIV vulnerability at the micro, meso and macro levels. Several factors, such as felt and internalised stigma associated with psycho-social distress and low self-efficacy to challenge abuse and negotiate condom use; clients' power in sexual transactions; establishing trust in regular partnerships through condomless sex; norms condoning violence against gender non-conforming persons; lack of community support; police harassment; health provider discrimination and the sex work environment create a context for HIV vulnerability. In the face of such adversity, respondents adopt coping strategies to shift power relations and mobilise against abuse. Community mobilisation interventions, as discussed in the paper, offer a promising vulnerability reduction strategy to safeguard transgender sex workers' rights and reduce HIV vulnerability.
Mobile Phones and Psychosocial Therapies with Vulnerable People: a First State of the Art.
Vázquez, Maria Yolanda García; Sexto, Carlos Ferrás; Rocha, Álvaro; Aguilera, Adrián
2016-06-01
Mobile phones are becoming a communication tool commonly used by people all over the world; and they are started to be adopted in psychosocial therapies involving vulnerable people. We are herein presenting the results of an academic literature review. We identified scientific papers published between 2006 and 2015 resorting to academic databases available on the Internet, applying a systematic selection method based on quality criteria. Secondly, we analysed contents, highlighting the scarcity of research involving vulnerable people. The available literature specialized in psychosocial therapies offers investigation results which involve mobile phones and patients in general, focusing particularly on the clinical psychology field and, to a lesser extent, on the social work field. Particularly significant are the investigation works developed in the United States. In the present paper we introduce a first "state of the art", identifying opportunities and also the limitations surrounding the use of mobile phones in psychosocial therapies targeting the vulnerable. Issues concerning privacy and data confidentiality, and the access of vulnerable people to mobile phones and how they use them, pose significant challenges; but they offer the opportunity to reach isolated or impoverished populations, or even to facilitate access to social and healthcare services. We close this paper formulating possible orientations, hypotheses and goals to design new investigation works involving vulnerable populations.
McCauley, Linda A
2005-07-01
Immigrant workers are a rapidly growing segment of the U.S. work force, and these increasing numbers have resulted in a different ethnic mix in the work force than in previous decades. Immigrant workers are not a homogenous group, but are over-represented in low-paying occupations. Their diversity and vulnerability present distinct challenges for occupational health nurses. High-risk occupations in which a large proportion of immigrant workers are hired include agriculture, sweatshops, day laborers, and construction. Initiatives needed to improve the working conditions of this vulnerable population include improved surveillance and research, culturally competent care providers, improved health care access, advocacy, and changes in immigration and health policy.
Analysis of the Impact of Data Normalization on Cyber Event Correlation Query Performance
2012-03-01
2003). Organizations use it in planning, target marketing , decision-making, data analysis, and customer services (Shin, 2003). Organizations that...Following this IP address is a router message sequence number. This is a globally unique number for each router terminal and can range from...Appendix G, invokes the PERL parser for the log files from a particular USAF base, and invokes the CTL file that loads the resultant CSV file into the
R script: ensemble_rrf_sigma_vs_mean_play.RData: ensemble_mean_sigma_rrf_allgrids_epismax_new_13runs.csvPlot: boxplot_ensemble_rrf_sigma_vs_mean_nowater_new_13runs_epimax.pdfThis dataset is associated with the following publication:Gilliam , R., C. Hogrefe , J. Godowitch, S. Napelenok , R. Mathur , and S.T. Rao. Impact of inherent meteorology uncertainty on air quality model predictions. JOURNAL OF GEOPHYSICAL RESEARCH-ATMOSPHERES. American Geophysical Union, Washington, DC, USA, 120(23): 12,259–12,280, (2015).
Tsuru, Satoko; Okamine, Eiko; Takada, Aya; Watanabe, Chitose; Uchiyama, Makiko; Dannoue, Hideo; Aoyagi, Hisae; Endo, Akira
2009-01-01
Nursing Action Master and Nursing Observation Master were released from 2002 to 2008. Two kinds of format, an Excel format and a CSV format file are prepared for maintaining them. Followings were decided as a basic rule of the maintenance: newly addition, revision, deletion, the numbering of the management and a rule of the coding. The master was developed based on it. We do quality assurance for the masters using these rules.
DOE Office of Scientific and Technical Information (OSTI.GOV)
The PLEXOS Input Data Generator (PIDG) is a tool that enables PLEXOS users to better version their data, automate data processing, collaborate in developing inputs, and transfer data between different production cost modeling and other power systems analysis software. PIDG can process data that is in a generalized format from multiple input sources, including CSV files, PostgreSQL databases, and PSS/E .raw files and write it to an Excel file that can be imported into PLEXOS with only limited manual intervention.
FY2012 Annual Report for Director Operational Test & Evaluation (DOT&E)
2012-01-01
The JLTV FoV consists of two vehicle categories: the JLTV Combat Tactical Vehicle (CTV), designed to seat four passengers ; and the JLTV Combat...Support Vehicle (CSV), designed to seat two passengers . • The JLTV CTV has a 3,500-pound payload and three mission package configurations: - Close...For example, a previous ground combat vehicle had KPPs that only required it seat nine passengers , be transportable by a C-130, and have a
Informality and employment vulnerability: application in sellers with subsistence work.
Garzón-Duque, María Osley; Cardona-Arango, María Doris; Rodríguez-Ospina, Fabio León; Segura-Cardona, Angela María
2017-10-05
To describe the origin, evolution, and application of the concept of employment vulnerability in workers who subsist on street sales. We have carried out an analysis of the literature in database in Spanish, Portuguese, and English, without restriction by country. This is a review of the gray literature of government reports, articles, and documents from Latin America and the Caribbean. We have analyzed information on the informal economy, social-employment vulnerability, and subsistence workers. The concept of informal economy is dispersed and suggested as synonymous with employment vulnerability. As a polysemic term, it generates confusion and difficulty in identifying defined profiles of employment vulnerability in informal subsistence workers, who sell their products on the streets and sidewalks of cities. The lack of a clear concept and profile of employment vulnerability for this type of workers generates a restriction on defined actions to reduce employment vulnerability. The profiles could facilitate access to the acquisition of assets that support their structure of opportunities, facilitating and mediating in the passage from vulnerability to social mobility with opportunities. We propose as a concept of employment vulnerability for subsistence workers in the informal sector, the condition of those who must work by day to eat at night, who have little or no ownership of assets, and who have a minimum structure of opportunities to prevent, face, and resist the critical situations that occur daily, putting at risk their subsistence and that of the persons who are their responsibility, thus making the connection between social and employment vulnerability.
Variability in home mechanical ventilation prescription.
Escarrabill, Joan; Tebé, Cristian; Espallargues, Mireia; Torrente, Elena; Tresserras, Ricard; Argimón, J
2015-10-01
Few studies have analyzed the prevalence and accessibility of home mechanical ventilation (HMV). The aim of this study was to characterize the prevalence of HMV and variability in prescriptions from administrative data. Prescribing rates of HMV in the 37 healthcare sectors of the Catalan Health Service were compared from billing data from 2008 to 2011. Crude accumulated activity rates (per 100,000 population) were calculated using systematic component of variation (SCV) and empirical Bayes (EB) methods. Standardized activity ratios (SAR) were described using a map of healthcare sectors. A crude rate of 23 HMV prescriptions per 100,000 population was observed. Rates increase with age and have increased by 39%. Statistics measuring variation not due to chance show a high variation in women (CSV=0.20 and EB=0.30) and in men (CSV=0.21 and EB=0.40), and were constant over time. In a multilevel Poisson model, hospitals with a chest unit were associated with a greater number of cases (beta=0.68, P<.0001). High variability in prescribing HMV can be explained, in part, by the attitude of professionals towards treatment and accessibility to specialist centers with a chest unit. Analysis of administrative data and variability mapping help identify unexplained variations and, in the absence of systematic records, are a feasible way of tracking treatment. Copyright © 2014 SEPAR. Published by Elsevier Espana. All rights reserved.
Rao, B Dayakar; Kulkarni, Dhanashri B; C, Kavitha
2018-01-01
The study aimed to identify best cultivars suitable for sorghum cookies accordingly nutrient and mineral compositions were evaluated. Protein and fat content of cookies were ranged from 5.89±0.04 to 8.27±0.21% and 21.03±0.01 to 23.08±0.03% respectively. The starch content of cookie ranged between 47.06±0.01 and 42.15±0.03% and dietary fiber was reported highest in CSH14 (9.27±0.01%). The highest Mg (56.24±0.03mg/100g) P (255.54±0.03mg/100g), and K (124.26±0.02mg/100g) content were found in C43 cultivar. CSV18R was reported highest iron content (1.23±0.01mg/100g). The sensory scores for overall acceptability of cookies were highest in CSH23, CSH13R and CSV18R cultivars which are rich in dietary fiber and minerals. Normally the hybrids are high yielders and the grain price/qt is 20% lower than varieties. It is implied the raw material costs of two identified cultivars (CSH23 & CSH13R) would help the industry to reduce overall cost of production and offer a better profit margins over the varieties. Copyright © 2016 Elsevier Ltd. All rights reserved.
Bohls, Ryan L; Linares, Jose A; Gross, Shannon L; Ferro, Pam J; Silvy, Nova J; Collisson, Ellen W
2006-08-01
Reticuloendotheliosis virus infection, which typically causes systemic lymphomas and high mortality in the endangered Attwater's prairie chicken, has been described as a major obstacle in repopulation efforts of captive breeding facilities in Texas. Although antigenic relationships among reticuloendotheliosis virus (REV) strains have been previously determined, phylogenetic relationships have not been reported. The pol and env of REV proviral DNA from prairie chickens (PC-R92 and PC-2404), from poxvirus lesions in domestic chickens, the prototype poultry derived REV-A and chick syncytial virus (CSV), and duck derived spleen necrosis virus (SNV) were PCR amplified and sequenced. The 5032bp, that included the pol and most of env genes, of the PC-R92 and REV-A were 98% identical, and nucleotide sequence identities of smaller regions within the pol and env from REV strains examined ranged from 95 to 99% and 93 to 99%, respectively. The putative amino acid sequences were 97-99% identical in the polymerase and 90-98% in the envelope. Phylogenetic analyses of the nucleotide and amino acid sequences indicated the closest relationship among the recent fowl pox-associated chicken isolates, the prairie chicken isolates and the prototype CSV while only the SNV appeared to be distinctly divergent. While the origin of the naturally occurring viruses is not known, the avian poxvirus may be a critical component of transmission of these ubiquitous oncogenic viruses.
Huang, Ting-Lin; Li, Yu-Xian; Zhang, Hui
2008-01-01
During the reconstruction of horizontal flow tanks into inclined settling tanks in Chinese water plants, uniformity of water distribution has not been solved theoretically. Based on the concepts of hydraulics, a model of inclined tanks, including the ratio (L/B) of tank length (L) to width (B), diameter of inclined tubes (d) and height of the water distribution area (h1) and so on, was established to simulate and analyze the effects of these parameters on Non-Uniformity of Water Distribution (NUWD). The influences of NUWD on settling efficiency were also analyzed based on Yao's formula. Simulated results show that the ratio (L/B) has the greatest impact on NUWD, and the settling efficiency decreases with it. Under the conditions of q=10 or 20 m/h and L/B>or=5 or 3, the total forces imposed on down-sliding flocs tend to be zero, which reduces the separating efficiency. Moreover, critical settling velocity (CSV) of the first inclined tube will decrease with the increase of h1, and the optimal range of h1 will be 1.2-1.6 m. The difference of CSV between the first tube and the average value of the tank u0 (shown as Delta(uF0-u0)) will increase with d and surface load (q). Copyright IWA Publishing 2008.
Methods to Secure Databases Against Vulnerabilities
2015-12-01
for several languages such as C, C++, PHP, Java and Python [16]. MySQL will work well with very large databases. The documentation references...using Eclipse and connected to each database management system using Python and Java drivers provided by MySQL , MongoDB, and Datastax (for Cassandra...tiers in Python and Java . Problem MySQL MongoDB Cassandra 1. Injection a. Tautologies Vulnerable Vulnerable Not Vulnerable b. Illegal query
Storm, Ilse; Uiters, Ellen; Busch, Mirjam C M; den Broeder, Lea; Schuit, Albertine J
2015-07-01
Learning is essential for sustainable employability. However, various factors make work-related learning more difficult for certain groups of workers, who are consequently at a disadvantage in the labour market. In the long term, that in turn can have adverse health implications and can make those groups vulnerable. With a view to encouraging workers to continue learning, the Netherlands has a policy on work-related learning, which forms part of the 'Vitality Package'. A Health Impact Assessment with equity focus (HIAef) was undertaken to determine whether the policy on work-related learning affected certain groups of workers and their health in different ways, and whether the differences were avoidable. The HIAef method involved the standard phases: screening, scoping, appraisal and recommendations. Equity was the core principle in this method. Data were collected by means of both literature searches (e.g., Scopus, Medline) and interviews with experts and stakeholders (e.g., expertise regarding work, training and/or health). The HIAef identified the following groups as potentially vulnerable in the field of work-related learning: the chronically sick, older people, less educated people, flexi-workers/the self-employed and lay carers (e.g., thresholds to learning). Published literature indicates that work-related learning may have a positive influence on health through (work-related) factors such as pay, employability, longer employment rate and training-participation. According to experts and stakeholders, work-related learning policy could be adapted to take more account of vulnerable groups through alignment with their particular needs, such as early support, informal learning and e-learning. With a view to reducing avoidable inequalities in work-related learning, it is recommended that early, low-threshold, accessible opportunities are made available to identified vulnerable groups. Making such opportunities available may have a positive effect on (continued) participation in the labour market and thus on the health of the relevant groups. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.
Diwadkar, Vaibhav A; Goradia, Dhruman; Hosanagar, Avinash; Mermon, Diana; Montrose, Debra M; Birmaher, Boris; Axelson, David; Rajarathinem, R; Haddad, Luay; Amirsadri, Ali; Zajac-Benitez, Caroline; Rajan, Usha; Keshavan, Matcheri S
2011-07-01
Working memory deficits abound in schizophrenia and attention deficits have been documented in schizophrenia and bipolar disorder. Adolescent offspring of patients may inherit vulnerabilities in brain circuits that subserve these cognitive domains. Here we assess impairments in offspring of schizophrenia (SCZ-Offspring) or bipolar (BP-Offspring) patients compared to controls (HC) with no family history of mood or psychotic disorders to the second degree. Three groups (n=100 subjects; range: 10-20 yrs) of HC, SCZ-Offspring and BP-Offspring gave informed consent. Working memory was assessed using a delayed spatial memory paradigm with two levels of delay (2s & 12s); sustained attention processing was assessed using the Continuous Performance Task-Identical Pairs version. SCZ-Offspring (but not BP-Offspring) showed impairments in working memory (relative to HC) at the longer memory delay indicating a unique deficit. Both groups showed reduced sensitivity during attention but only BP-Offspring significantly differed from controls. These results suggest unique (working memory/dorsal frontal cortex) and potentially overlapping (attention/fronto-striatal cortex) vulnerability pathways in adolescent offspring of patients with schizophrenia and bipolar disorder. Working memory and attention assessments in these offspring may assist in the clinical characterization of the adolescents vulnerable to SCZ or BP. Copyright © 2011 Elsevier Inc. All rights reserved.
Interprofessional Graduate Students' Perspectives on Caring for Vulnerable Populations.
Wright, Patricia Moyle; Hanson, Mary Jane S
The purpose of this focus group study was to explore graduate students' clinical experiences with vulnerable populations, perceived barriers to care, and ethical issues related to caring for disenfranchised groups. Furthermore, based on their experiences, the students were asked to share suggestions for curricular changes that could enhance care for vulnerable populations through interdisciplinary collaboration and multidisciplinary projects. The responses of the participants add to what is known about the care of vulnerable populations, offering a first-hand description of students' preparation for work with vulnerable populations and the interdisciplinary team.
Work disability prevention in rural healthcare workers.
Franche, Renée L; Murray, Eleanor J; Ostry, Aleck; Ratner, Pamela A; Wagner, Shannon L; Harder, Henry G
2010-01-01
Approximately 20% of healthcare workers in high-income countries such as Australia, Canada and the USA work in rural areas. Healthcare workers are known to be vulnerable to occupational injury and poor work disability outcomes; given their rural-urban distribution, it is possible to compare work disability prevention in rural and urban areas. However, little attention has been paid to work disability prevention issues specific to rural workers, including rural healthcare workers. A comprehensive review of the literature was conducted to identify rural-urban differences in work disability outcomes (defined as the incidence of occupational injury and the duration of associated work absence), as well as risk factors for poor work disability outcomes in rural healthcare workers. The databases MEDLINE, CINAHL, and EMBASE were searched, as were relevant research centers and government agencies, to identify all quantitative and qualitative English-language studies published between 1 January 2000 and 6 October 2009 that discussed occupational injury, work absence duration, work disability management, or risk factors for poor work disability outcomes, for rural workers specifically, or in comparison with urban workers. To ensure inclusion of studies of healthcare workers as a distinct group among other sector-specific groups, a broad search for literature related to all industrial sectors was conducted. Of 860 references identified, 5 discussed work disability outcomes and 25 discussed known risk factors. Known risk factors were defined as factors firmly established to be associated with poor work disability outcomes in the general worker population based on systematic reviews, well-established conceptual models of work disability prevention, and public health literature. Although somewhat conflicting, the evidence suggests that rural healthcare workers experience higher rates of occupational injury compared with urban healthcare workers, within occupational categories. Rural workers also appear to be more vulnerable to prolonged work absence although the data are limited. No studies directly compared risk factors for work disability prevention outcomes between rural and urban healthcare workers. However, potential risk factors were identified at the level of the environment, worker, job, organization, worker compensation system and healthcare access. Important methodological limitations were noted, including unclear definitions of rurality, inadequate methods of urban-rural comparisons such as comparing samples from different countries, and a paucity of studies applying longitudinal or multivariate designs. There is a notable lack of evidence about work disability prevention issues for healthcare workers in rural areas. Available evidence supports the hypothesis that rural healthcare workers are vulnerable to occupational injury, and suggests they are vulnerable to prolonged work absence. They may be particularly vulnerable to poor work disability prevention outcomes due to complex patient needs in the context of risk factors such as heavy workloads, long hours, heavy on-call demands, high stress levels, limited support and workplace violence. Additional vulnerability may occur because their work conditions are managed in distant urban administrative centers, and due to barriers in their own healthcare access. Although rural healthcare workers seem generally at greater risk of injury, one study suggests that urban emergency medical service workers experience a high vulnerability to injury that may outweigh the effects of rurality. Additional research is needed to document rural-urban disparities in work disability outcomes and to identify associated sources and risk factors. Other issues to address are access to and quality of healthcare for rural healthcare workers, streamlining the compensation system, the unique needs of Aboriginal healthcare workers, and the management of prolonged work absence. Finally, occupational injury and work absence duration programs should be tailored to meet the needs of rural workers.
Schadenhofer, Petra; Kundi, Michael; Abrahamian, Heidemarie; Stummer, Harald; Kautzky-Willer, Alexandra
2018-03-01
According to the European Agency for Safety and Health at Work (EU-OSHA), hospitals represent a work environment with high job strain. Prolonged perceived occupational stress may result in symptoms of burnout, such as emotional exhaustion (EE), depersonalisation (DP) and reduced personal accomplishment (PA). Understanding which factors may reduce vulnerability for burnout is an important requirement for well-targeted occupational stress prevention in mental hospital staff. To identify the influence of gender, age, working field, family structure, education, voluntarily occupational training during holidays and length of stay on job on occupational stress perception. In a cross-sectional design, 491 employees (311 female, 180 male) of an Austrian mental health centre participated in the study. The extent of perceived occupational stress was assessed by the Maslach Burnout Inventory (MBI) with the scales for emotional exhaustion, depersonalisation and personal accomplishment. Participants were divided according to their working field in those working with/without patients. Prevalence of emotional exhaustion was higher in women working with patients compared to men working with patients (25% vs. 18%, p = 0.003). Age above 45 years was significantly associated with decreased vulnerability for burnout in men (EE p = 0.040, DP p = 0.010, PA p = 0.007), but not in women. A lower level of education had a significant impact on depersonalisation in both sexes (p = 0.001 for men, p = 0.048 for women). Length of stay on job showed a significant influence on emotional exhaustion. No significant relationship was found between family structure and vulnerability for burnout. Gender had a differential effect on perceived occupational stress indicating a need for gender-tailored preventive strategies. Age, working field, education, voluntarily occupational training during holidays and length of stay on job affect vulnerability for burnout in mental hospital staff. © 2017 Nordic College of Caring Science.
Socially Vulnerable Young People in Flemish Sports Clubs: Investigating Youth Experiences
ERIC Educational Resources Information Center
Haudenhuyse, Reinhard; Theeboom, Marc; Nols, Zeno; Coussée, Filip
2014-01-01
Sport appears to present a powerful tool for engaging socially vulnerable youth in an organised context, which offers an opportunity to work with them. However, we have little understanding regarding participation of socially vulnerable young people in the "traditional" sport sector (i.e. sports clubs). Nor do we have sufficient insights…
Mobile Phones and Psychosocial Therapies with Vulnerable People: a First State of the Art
Sexto, Carlos Ferrás; Rocha, Álvaro; Aguilera, Adrián
2017-01-01
Mobile phones are becoming a communication tool commonly used by people all over the world; and they are started to be adopted in psychosocial therapies involving vulnerable people. We are herein presenting the results of an academic literature review. We identified scientific papers published between 2006 and 2015 resorting to academic databases available on the Internet, applying a systematic selection method based on quality criteria. Secondly, we analysed contents, highlighting the scarcity of research involving vulnerable people. The available literature specialized in psychosocial therapies offers investigation results which involve mobile phones and patients in general, focusing particularly on the clinical psychology field and, to a lesser extent, on the social work field. Particularly significant are the investigation works developed in the United States. In the present paper we introduce a first “state of the art”, identifying opportunities and also the limitations surrounding the use of mobile phones in psychosocial therapies targeting the vulnerable. Issues concerning privacy and data confidentiality, and the access of vulnerable people to mobile phones and how they use them, pose significant challenges; but they offer the opportunity to reach isolated or impoverished populations, or even to facilitate access to social and healthcare services. We close this paper formulating possible orientations, hypotheses and goals to design new investigation works involving vulnerable populations. PMID:27194134
Older Women and Poverty. Lifecycle Learning Sheet.
ERIC Educational Resources Information Center
Regina Univ. (Saskatchewan). Univ. Extension. Seniors Education Centre.
Statistics reveal that 61% of older Canadian women who are unattached to a male partner live in poverty. Two primary factors why women are especially vulnerable to poverty are their financially dependent status and their inequality in the work force. Even women who have worked outside the home are more vulnerable to poverty in old age than their…
Informality and employment vulnerability: application in sellers with subsistence work
Garzón-Duque, María Osley; Cardona-Arango, María Doris; Rodríguez-Ospina, Fabio León; Segura-Cardona, Angela María
2017-01-01
ABSTRACT OBJECTIVE To describe the origin, evolution, and application of the concept of employment vulnerability in workers who subsist on street sales. METHODS We have carried out an analysis of the literature in database in Spanish, Portuguese, and English, without restriction by country. This is a review of the gray literature of government reports, articles, and documents from Latin America and the Caribbean. We have analyzed information on the informal economy, social-employment vulnerability, and subsistence workers. RESULTS AND CONCLUSIONS The concept of informal economy is dispersed and suggested as synonymous with employment vulnerability. As a polysemic term, it generates confusion and difficulty in identifying defined profiles of employment vulnerability in informal subsistence workers, who sell their products on the streets and sidewalks of cities. The lack of a clear concept and profile of employment vulnerability for this type of workers generates a restriction on defined actions to reduce employment vulnerability. The profiles could facilitate access to the acquisition of assets that support their structure of opportunities, facilitating and mediating in the passage from vulnerability to social mobility with opportunities. We propose as a concept of employment vulnerability for subsistence workers in the informal sector, the condition of those who must work by day to eat at night, who have little or no ownership of assets, and who have a minimum structure of opportunities to prevent, face, and resist the critical situations that occur daily, putting at risk their subsistence and that of the persons who are their responsibility, thus making the connection between social and employment vulnerability. PMID:29020122
Interactive Visualization of National Airspace Data in 4D (IV4D)
2010-08-01
Research Laboratory) JView graphics engine. All of the software, IV4D/Viewer/JView, is written in Java and is platform independent, meaning that it...both parts. 11 3.3.1.1 Airspace Volumes Once appropriate CSV or ACES XML airspace boundary files are selected from a standard Java File Chooser...persistence mechanism, Hibernate , was replaced with JDBC specific code and, over time, quite a bit of JDBC support code was added to the Viewer and to
Catalog Descriptions Using VOTable Files
NASA Astrophysics Data System (ADS)
Thompson, R.; Levay, K.; Kimball, T.; White, R.
2008-08-01
Additional information is frequently required to describe database table contents and make it understandable to users. For this reason, the Multimission Archive at Space Telescope (MAST) creates Òdescription filesÓ for each table/catalog. After trying various XML and CSV formats, we finally chose VOTable. These files are easy to update via an HTML form, easily read using an XML parser such as (in our case) the PHP5 SimpleXML extension, and have found multiple uses in our data access/retrieval process.
Auxiliary Library Explorer (ALEX) Development
2016-02-01
non-empty cells. This is a laborious manual task and could probably have been avoided by using Java code to read the data directly from Excel. In fact...it might be even easier to leave the data as a comma separated variables (CSV) file and read the data in with Java , although this could create other...This is first implemented using the MakeFullDatabaseapp Java project, which performs an SQL query on the DSpace data to return a list of items for which
Anbindung des SISIS-SunRise-Bibliothekssystems an das zentrale Identitätsmanagement
NASA Astrophysics Data System (ADS)
Ebner, Ralf; Pretz, Edwin
Wir berichten über Konzepte und Implementierungen zur Datenprovisionierung aus den Personenverwaltungssystemen der Technischen Universität München (TUM) über das zentrale Metadirectory am Leibniz-Rechenzentrum (LRZ) in das SISIS-SunRise-Bibliothekssystem der Universitätsbibliothek der TUM (TUB). Es werden drei Implementierungsvarianten diskutiert, angefangen von der Generierung und Übertragung einfacher CSV-Dateien über ein OpenLDAP-basiertes Konzept als Backend für die SISIS-Datenbank bis zur endgültigen Implementierung mit dem OCLC IDM Connector.
Analyzed Boise Data for Oscillatory Hydraulic Tomography
Lim, David
2015-07-01
Data here has been "pre-processed" and "analyzed" from the raw data submitted to the GDR previously (raw data files found at http://gdr.openei.org/submissions/479. doi:10.15121/1176944 after 30 September 2017). First, we submit .mat files which are the "pre-processed" data (must have MATLAB software to use). Secondly, the csv files contain submitted data in its final analyzed form before being used for inversion. Specifically, we have fourier coefficients obtained from Fast Fourier Transform Algorithms.
BOREAS TE-21 SSA Site Characteristics Data
NASA Technical Reports Server (NTRS)
Knox, Robert; Hall, Forrest G. (Editor); Papagno, Andrea (Editor)
2000-01-01
The Boreal Ecosystem-Atmospheric Study (BOREAS) TE-20 (Terrestrial Ecology) team collected several data sets for use in developing and testing models of forest ecosystem dynamics. This data set contains measurements of site characteristics conducted in the Southern Study Area (SSA) from 18 Jul 1994 to 30 Jul 1994. The data are stored in CSV files. The data files are available on a CD-ROM (see document number 20010000884), or from the Oak Ridge National Laboratory (ORNL) Distributed Active Archive Center (DAAC).
Kontos, P; Grigorovich, A; Nowrouzi, B; Sharma, B; Lewko, J; Mollayeva, T; Colantonio, A
2017-10-18
Work-related head injury is a critical public health issue due to its rising prevalence; the association with profound disruption of workers' lives; and significant economic burdens in terms of medical costs and lost wages. Efforts to understand and prevent these types of injuries have largely been dominated by epidemiological research and safety science, which has focused on identifying risk at the level of the individual worker, population group, or organizational sector. Limited research has focused on the perspectives of the workers, a key stakeholder group for informing understanding of vulnerability to work-related head injury. This study explored workers' perspectives to better understand their decision-making and how and why their injuries occurred. We conducted a qualitative study using in-depth semi-structured interviews with thirty-two adult workers who had sustained a work-related head injury. Workers were recruited from an urban clinic in central Ontario, Canada. Labour Process Theory informed the thematic analysis. Three hazardous work conditions were identified: insufficient training; inadequate staffing; and inattention to the physical environment. In addition, professional and organizational norms were implicated in vulnerability to head injury including putting the client before the worker and the pressure to work unsafely. The findings also highlight a complex interrelationship between workers' decision-making and professional and organizational norms that produces vulnerability to head injury, a vulnerability which oftentimes is reproduced by workers' decisions to work despite hazardous conditions. Our findings suggest that, beyond the need to redress the inattention to hazards in the physical environment, there is a need to address norms that influence worker decision-making to improve the safety of workers. Using Labour Process Theory highlights an important social dynamic within workplace sectors that could inform future development and implementation of multi-level and integrated public health strategies to reduce work-related head injury.
Social vulnerability assessment: a growing practice in Europe?
NASA Astrophysics Data System (ADS)
Tapsell, S.; McC arthy, S.
2012-04-01
This paper builds upon work on social vulnerability from the CapHaz-Net consortium, an ongoing research project funded by the European Commission in its 7th Framework Programme. The project focuses on the social dimensions of natural hazards, as well as on regional practices of risk prevention and management, and aims at improving the resilience of European societies to natural hazards, paying particular attention to social capacity building. The topic of social vulnerability is one of seven themes being addressed in the project. There are various rationales for examining the relevance of social vulnerability to natural hazards. Vulnerability assessment has now been accepted as a requirement for the effective development of emergency management capability, and assessment of social vulnerability has been recognised as being integral to understanding the risk to natural hazards. The aim of our research was to examine social vulnerability, how it might be understood in the context of natural hazards in Europe, and how social vulnerability can be addressed to increase social capacity. The work comprised a review of research on social vulnerability to different natural hazards within Europe and included concepts and definitions of social vulnerability (and related concepts), the purpose of vulnerability assessment and who decides who is vulnerable, different approaches to assessing or measuring social vulnerability (such as the use of 'classical' quantitative vulnerability indicators and qualitative community-based approaches, along with the advantages and disadvantages of both), conceptual frameworks for assessing social vulnerability and three case studies of social vulnerability studies within Europe: flash floods in the Italian Alps, fluvial flooding in Germany and heat waves in Spain. The review reveals variable application of social vulnerability analysis across Europe and there are indications why this might be the case. Reasons could range from the scale of country policy and the particular risk management focus to the smaller scale risk management perceptions of the analysis techniques employed being to resource expensive, difficult to interpret or to operationalise. This paper will provide a context with some empirical examples to perhaps explain the growing popularity of concepts such as resilience and capacity building which lie more comfortably with policy makers and risk managers as concepts which focus on the solution rather than identifying a problem by assessing social vulnerability.
Data are from Mars, Tools are from Venus
NASA Technical Reports Server (NTRS)
Lee, H. Joe
2017-01-01
Although during the data production phase, the data producers will usually ensure the products to be easily used by the specific power users the products serve. However, most data products are also posted for general public to use. It is not straightforward for data producers to anticipate what tools that these general end-data users are likely to use. In this talk, we will try to help fill in the gap by going over various tools related to Earth Science and how they work with the existing NASA HDF (Hierarchical Data Format) data products and the reasons why some products cannot be visualized or analyzed by existing tools. One goal is for to give insights for data producers on how to make their data product more interoperable. On the other hand, we also provide some hints for end users on how to make tools work with existing HDF data products. (tool category list: check the comments) HDF-EOS tools: HDFView HDF-EOS Plugin, HEG, h4tonccf, hdf-eos2 dumper, NCL, MATLAB, IDL, etc.net; CDF-Java tools: Panoply, IDV, toosUI, NcML, etc.net; CDF-C tools: ArcGIS Desktop, GrADS, NCL, NCO, etc.; GDAL tools: ArcGIS Desktop, QGIS, Google Earth, etc.; CSV tools: ArcGIS Online, MS Excel, Tableau, etc.
NASA Astrophysics Data System (ADS)
Tellman, B.; Schwarz, B.; Kuhn, C.; Pandey, B.; Schank, C.; Sullivan, J.; Mahtta, R.; Hammet, L.
2016-12-01
21 million people are exposed to flooding every year, and that number is expected to more than double by 2030 due to climate, land use, and demographic change. Cloud to Street, a mission driven science organization, is working to make big and real time data more meaningful to understand both biophysical and social vulnerability to flooding in this changing world. This talk will showcase the science and practice we have built of integrated social and biophysical flood vulnerability assessments based on our work in Uttarakhand, India and Senegal, in conjunction with nonprofits and development banks. We will show developments of our global historical flood database, detected from MODIS and Landsat satellites, used to power machine learning flood exposure models in Google Earth Engine's API. Demonstrating the approach, we will also showcase new approaches in social vulnerability science, from developing data-driven social vulnerability indices in India, to deriving predictive models that explain the social conditions that lead to disproportionate flood damage and fatality in the US. While this talk will draw on examples of completed vulnerability assessments, we will also discuss the possible future for place-based "living" flood vulnerability assessments that are updated each time satellites circle the earth or people add crowd-sourced observations about flood events and social conditions.
Washington, Olivia G M; Moxley, David P
2013-03-01
The authors consider self-efficacy practice as an organizing construct guiding nursing-social work action research in partnership with older homeless and formerly homeless African-American women. The authors, both academics who together have worked with members of this vulnerable population for a decade and a half, report on their unifying action research perspective immersed in self-efficacy theory. We examine how our adaptations of Bandura's classic four sources of self-efficacy form a distinctive intervention practice designed to help older African-American women emerge from homelessness. We amplify the incorporation of the four sources (vicarious experience and exposure to powerful role models, emotional arousal and accompanying catharsis, verbal persuasion, and role performance) into a grand strategy useful in working collaboratively with members of vulnerable populations, so they can achieve outcomes that improve their functional health, well-being and ultimately their quality of life. © 2012 Blackwell Publishing Ltd.
ERIC Educational Resources Information Center
Luguetti, Carla; Oliver, Kimberly L.; Kirk, David; Dantas, Luiz
2017-01-01
This study explores an activist approach for co-creating a prototype pedagogical model of sport for working with boys from socially vulnerable backgrounds. This paper addresses the key features that emerged when we identified what facilitated and hindered the boys' engagement in sport. This study was an activist research project that was conducted…
ERIC Educational Resources Information Center
Sellman, Edward
2015-01-01
This article provides a critical and thematic analysis of three research projects involving artists working with vulnerable young people in educational contexts. It argues that artists create safe spaces in contrast to traditional educational activities but it will also raise questions about what constitutes such a space for participants. It will…
Cultural knowledge and local vulnerability in African American communities
NASA Astrophysics Data System (ADS)
Miller Hesed, Christine D.; Paolisso, Michael
2015-07-01
Policymakers need to know what factors are most important in determining local vulnerability to facilitate effective adaptation to climate change. Quantitative vulnerability indices are helpful in this endeavour but are limited in their ability to capture subtle yet important aspects of vulnerability such as social networks, knowledge and access to resources. Working with three African American communities on Maryland’s Eastern Shore, we systematically elicit local cultural knowledge on climate change and connect it with a scientific vulnerability framework. The results of this study show that: a given social-ecological factor can substantially differ in the way in which it affects local vulnerability, even among communities with similar demographics and climate-related risks; and social and political isolation inhibits access to sources of adaptive capacity, thereby exacerbating local vulnerability. These results show that employing methods for analysing cultural knowledge can yield new insights to complement those generated by quantitative vulnerability indices.
Abley, Clare; Bond, John; Robinson, Louise
2011-09-01
A key focus for professionals working with older people in the community is on those who are vulnerable, although this vulnerability is not well defined. This study sought the views of health and social care professionals and older people on vulnerability, identifying significant differences between professional and older people's perspectives. It found that for older people, vulnerability is an emotional response to being in a specific situation, whereas for professionals, the vulnerability of those on their case loads relates to them having certain or a combination of characteristics (physical, psychological and social). The paper concludes that interprofessional care for older people in the community could be improved firstly by asking older people if they ever feel vulnerable and if so, in what situations and secondly by focusing team efforts on addressing the issues raised by older people in response to these questions.
2009-03-03
ajor vulnerabilities still exist in ... general aviation security ,”3 the commission did not further elaborate on the nature of those vulnerabilities...commercial operations may make them an attractive alternative to terrorists seeking to identify and exploit vulnerabilities in aviation security . In this...3, 2003, p. A7. 2 See Report of the Aviation Security Advisory Committee Working Group on General Aviation Airport Security (October 1, 2003); and
How sex work becomes an option: Experiences of female sex workers in Kerman, Iran.
Karamouzian, Mohammad; Foroozanfar, Zohre; Ahmadi, Azal; Haghdoost, Ali Akbar; Vogel, Joanna; Zolala, Farzaneh
2016-01-01
Sex work is rarely an occupation of choice for Iranian women and is often described as a last resort. While several factors play a role in creating an environment where individuals become involved in sex work, female sex workers' experiences regarding entry into sex work in Iran are poorly understood. In this qualitative study, a convenience sample of 24 participants was recruited from a drop-in centre for vulnerable women in Kerman, Iran. Through in-depth interviews, participants were asked about their personal lived experiences of initiating sex work. Grounded theory was used to analyse findings from this research. We learned that major factors impacting on women's initiation into sex work circulated around their vulnerability and chronic poverty. Participants continued to sell sex due to their limited opportunities, drug dependence and financial needs. Improving sex workers' economic status could be a vital intervention in providing vulnerable women with options other than sex work. Female sex workers should be provided with government support and educational programmes delivered through special centres. Despite the illegal status of their work, sex workers' needs should be recognised across all aspects of policy and legislation.
NASA Astrophysics Data System (ADS)
Strasser, C.; Borda, S.; Cruse, P.; Kunze, J.
2013-12-01
There are many barriers to data management and sharing among earth and environmental scientists; among the most significant are a lack of knowledge about best practices for data management, metadata standards, or appropriate data repositories for archiving and sharing data. Last year we developed an open source web application, DataUp, to help researchers overcome these barriers. DataUp helps scientists to (1) determine whether their file is CSV compatible, (2) generate metadata in a standard format, (3) retrieve an identifier to facilitate data citation, and (4) deposit their data into a repository. With funding from the NSF via a supplemental grant to the DataONE project, we are working to improve upon DataUp. Our main goal for DataUp 2.0 is to ensure organizations and repositories are able to adopt and adapt DataUp to meet their unique needs, including connecting to analytical tools, adding new metadata schema, and expanding the list of connected data repositories. DataUp is a collaborative project between the California Digital Library, DataONE, the San Diego Supercomputing Center, and Microsoft Research Connections.
A Customizable Importer for the Clinical Data Warehouses PaDaWaN and I2B2.
Fette, Georg; Kaspar, Mathias; Dietrich, Georg; Ertl, Maximilian; Krebs, Jonathan; Stoerk, Stefan; Puppe, Frank
2017-01-01
In recent years, clinical data warehouses (CDW) storing routine patient data have become more and more popular to support scientific work in the medical domain. Although CDW systems provide interfaces to import new data, these interfaces have to be used by processing tools that are often not included in the systems themselves. In order to establish an extraction-transformation-load (ETL) workflow, already existing components have to be taken or new components have to be developed to perform the load part of the ETL. We present a customizable importer for the two CDW systems PaDaWaN and I2B2, which is able to import the most common import formats (plain text, CSV and XML files). In order to be run, the importer only needs a configuration file with the user credentials for the target CDW and a list of XML import configuration files, which determine how already exported data is indented to be imported. The importer is provided as a Java program, which has no further software requirements.
Automatic and efficient methods applied to the binarization of a subway map
NASA Astrophysics Data System (ADS)
Durand, Philippe; Ghorbanzadeh, Dariush; Jaupi, Luan
2015-12-01
The purpose of this paper is the study of efficient methods for image binarization. The objective of the work is the metro maps binarization. the goal is to binarize, avoiding noise to disturb the reading of subway stations. Different methods have been tested. By this way, a method given by Otsu gives particularly interesting results. The difficulty of the binarization is the choice of this threshold in order to reconstruct. Image sticky as possible to reality. Vectorization is a step subsequent to that of the binarization. It is to retrieve the coordinates points containing information and to store them in the two matrices X and Y. Subsequently, these matrices can be exported to a file format 'CSV' (Comma Separated Value) enabling us to deal with them in a variety of software including Excel. The algorithm uses quite a time calculation in Matlab because it is composed of two "for" loops nested. But the "for" loops are poorly supported by Matlab, especially in each other. This therefore penalizes the computation time, but seems the only method to do this.
Gendered depression: Vulnerability or exposure to work and family stressors?
Marchand, Alain; Bilodeau, Jaunathan; Demers, Andrée; Beauregard, Nancy; Durand, Pierre; Haines, Victor Y
2016-10-01
Research has shown that employed women are more prone to depression than men, but the pathways linking gender to depression remain poorly understood. The aim of this study was to examine how work and family conditions operated as potentially gendered antecedents of depression. It evaluated more specifically how differences in depressive symptoms in women and men could be explained by their differential vulnerability and exposure to work and family conditions, as well as by the mediating role of work-to-family conflict (WFC) and family-to-work conflict (FWC). Data were collected in 2009-2012 from a sample of 1935 employees (48.9% women) nested in 63 workplaces in the province of Quebec (Canada). Data were analyzed with multilevel path analysis models to test for the differential exposure hypothesis, and stratified by gender to test for the differential vulnerability hypothesis. Results supported both hypothesizes, but only WFC played a mediating role between work-family stressors and depression. Regarding the vulnerability hypothesis, WFC was more strongly associated with women depressive symptoms, and the magnitude of the association between family income and WFC was stronger for women. Overall, the differential exposure hypothesis seemed to reach a greater empirical support. After accounting for work and family stressors as well as WFC, differences in depressive symptoms in women and men were no longer significantly, as WFC, working hours, irregular work schedule and skill utilization acted as mediators. WFC associated with higher depressive symptoms and skill utilization with lower depressive symptoms. WFC related to higher working hours and irregular work schedule. Compared to men, women reported higher WFC, but lower working hours, less irregular work schedule and lower skill utilization at work. Women's higher rate of depression is intrinsically linked to their different social experiences as shaped by a gendered social structure and gendered organizations. Copyright © 2016 Elsevier Ltd. All rights reserved.
Lyons, Tara; Krüsi, Andrea; Pierre, Leslie; Small, Will; Shannon, Kate
2017-12-01
The objective of this study was to investigate how environmental and structural changes to a trans outdoor work environment impacted sex workers in Vancouver, Canada. The issue of changes to the work area arose during qualitative interviews with 33 trans sex workers. In response, ethnographic walks that incorporated photography were undertaken with trans sex workers. Changes to the work environment were found to increase vulnerabilities to client violence, displace trans sex workers, and affect policing practices. Within a criminalized context, construction and gentrification enhanced vulnerabilities to violence and harassment from police and residents.
NASA Astrophysics Data System (ADS)
Garcia Payne, D. G.; Novelo-Casanova, D. A.; Ponce-Pacheco, A. B.; Espinosa-Campos, O.; Huerta-Parra, M.; Reyes-Pimentel, T.; Rodriguez, F.; Benitez-Olivares, I.
2010-12-01
Valle de Chalco Solidaridad is located in Mexico City Metropolitan Area in Estado de Mexico, Mexico. In this town there is a sewage canal called “La Compañía”. A wall of this canal collapsed on February 5, 2010 due to heavy rains creating the flooding of four surrounding communities. It is important to point out that this area is frequently exposed to floods. In this work, we consider a critical facility as an essential structure for performance, health care and welfare within a community or/and as a place that can be used as shelter in case of emergency or disaster. Global vulnerability (the sum of the three measured vulnerabilities) of the 25 critical facilities identified in the locations of Avándaro, San Isidro and El Triunfo was assessed using the Community Vulnerability Assessment Tool developed by the National Oceanic and Atmospheric Administration (NOAA). For each critical facility we determined its operational, structural and physical vulnerabilities. For our analysis, we considered the four main natural hazards to which Valle de Chalco is exposed: earthquakes, floods, landslides and sinking. We considered five levels of vulnerability using a scale from 1 to 5, where values range from very low to very high vulnerability, respectively. A critical facilities database was generated by collecting general information for three categories: schools, government and church. Each facility was evaluated considering its location in relation to identified high-risk areas. Our results indicate that in average, the global vulnerability of all facilities is low, however, there are particular cases in which this global vulnerability is high. The average operational vulnerability of the three communities is moderate. The global structural vulnerability (sum of the structural vulnerability for the four analyzed hazards) is moderate. In particular, the structural vulnerability to earthquakes is low, to landslides is very low, to flooding is moderate and to sinking is low. Due to the location of the critical facilities, its global physical vulnerability (sum of the physical vulnerability to the four analyzed hazards) is moderate. Only three facilities have very high physical vulnerability to floods. Churches (six facilities) have the highest operational vulnerability, whereas its structural vulnerability is the lowest. Schools (13 facilities) have the lowest operational vulnerability, nevertheless, there are two schools with very high vulnerability. Regarding the six government facilities, we identified that their structural vulnerability range from moderate to high. As a result of this work, we believe in the importance of strengthening the culture of civil protection within the critical facilities of the communities of Valle de Chalco.
Mining Bug Databases for Unidentified Software Vulnerabilities
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dumidu Wijayasekara; Milos Manic; Jason Wright
2012-06-01
Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been suggested in previous work that some bugs are only identified as vulnerabilities long after the bug has been made public. These vulnerabilities are known as hidden impact vulnerabilities. This paper discusses the feasibility and necessity to mine common publicly available bug databases for vulnerabilities that are yet to be identified. We present bug database analysis of two well known and frequently used software packages, namely Linux kernel and MySQL. It is shown that for both Linux and MySQL, amore » significant portion of vulnerabilities that were discovered for the time period from January 2006 to April 2011 were hidden impact vulnerabilities. It is also shown that the percentage of hidden impact vulnerabilities has increased in the last two years, for both software packages. We then propose an improved hidden impact vulnerability identification methodology based on text mining bug databases, and conclude by discussing a few potential problems faced by such a classifier.« less
Navigator Approach to Improve Quality of Care for Vulnerable Populations in Mexico.
Ramos, Rebeca; Ferreira-Pinto, João; Loza, Oralia
2015-01-01
For nearly 30 years, Programa Compañeros Inc (Compañeros) has worked in Ciudad Juarez, Chihuahua, Mexico, to ensure that vulnerable populations can exercise their rights to receive HIV and substance abuse prevention and treatment services. Compañeros staff has worked to ameliorate the negative results that limit access to care to the most vulnerable individuals: those who are poor, homeless, sex workers, addicted, and others whose life context put them at greater risk for being infected with HIV. With support from the MAC AIDS Foundation, Compañeros has expanded its capacity to deliver services to persons living with HIV/AIDS (PLWHA) and to HIV-vulnerable populations. This short communication describes findings from an internal evaluation conducted to investigate the effectiveness of the MAC AIDS-funded navigator-based program implemented at Compañeros. © The Author(s) 2015.
Lee, Ayoung; Cho, Joonmo
2016-12-01
The vulnerability approach suggests that disasters such as epidemics have different effects according not only to physical vulnerability but also to economic class (status). This paper examines the effect of the Middle East Respiratory Syndrome epidemic on the labor market to investigate whether vulnerable groups become more vulnerable due to an interaction between the socio-economic structure and physical risk. This paper examines the effect of the Middle East Respiratory Syndrome epidemic on the labor market by considering unemployment status, job status, working hours, reason for unemployment and underemployment status. In particular, the study investigates whether the U-shaped curve becomes a J-shaped curve due to the interaction between medical vulnerability and labor market vulnerability after an outbreak, assuming that the relative vulnerability in the labor market by age shows a U curve with peaks for the young group and middle aged and old aged groups using the Economically Active Population Survey. We use the difference in difference approach and also conduct a falsification check and robustness check. The results suggest that older workers faced a higher possibility of unemployment after the Middle East Respiratory Syndrome outbreak. In particular, they experienced higher involuntary unemployment and underemployment status as well as decreased working hours. It was confirmed that the relative vulnerability of the labor market for older workers was higher than for the other age groups after the epidemic outbreak due to the double whammy of vulnerability in the medical and labor market. The vulnerability in the young group partially increased compared to the 30s and 40s age groups due to their relative vulnerability in the labor market despite being healthy. We find that assuming the relative vulnerability in the existing labor market shows a U shape with age increase, the U-shaped curve became J-shaped after the outbreak. Disasters like epidemics can occur unexpectedly and affect certain groups more than other. Therefore, medical protection should be enhanced for groups vulnerable to disease and economic measures are also required for the protection of their livelihoods in the labor market to prevent unemployment stemming from inequality.
ERIC Educational Resources Information Center
US Agency for International Development, 2009
2009-01-01
Public Law 109-95, the Assistance for Orphans and Other Vulnerable Children in Developing Countries Act of 2005 (hereinafter, referred to as PL 109-95), was signed into law four years ago to respond to the global orphans and vulnerable children crisis. It calls for the U.S. Government (USG) response to the crisis to be comprehensive, coordinated…
Data display and analysis with μView
NASA Astrophysics Data System (ADS)
Tucakov, Ivan; Cosman, Jacob; Brewer, Jess H.
2006-03-01
The μView utility is a new Java applet version of the old db program, extended to include direct access to MUD data files, from which it can construct a variety of spectrum types, including complex and RRF-transformed spectra. By using graphics features built into all modern Web browsers, it provides full graphical display capabilities consistently across all platforms. It has the full command-line functionality of db as well as a more intuitive graphical user interface and extensive documentation, and can read and write db, csv and XML format files.
DOE Office of Scientific and Technical Information (OSTI.GOV)
North, Michael J.
SchemaOnRead provides tools for implementing schema-on-read including a single function call (e.g., schemaOnRead("filename")) that reads text (TXT), comma separated value (CSV), raster image (BMP, PNG, GIF, TIFF, and JPG), R data (RDS), HDF5, NetCDF, spreadsheet (XLS, XLSX, ODS, and DIF), Weka Attribute-Relation File Format (ARFF), Epi Info (REC), Pajek network (PAJ), R network (NET), Hypertext Markup Language (HTML), SPSS (SAV), Systat (SYS), and Stata (DTA) files. It also recursively reads folders (e.g., schemaOnRead("folder")), returning a nested list of the contained elements.
ARC Cell Science Validation (CS-V) Payload Overview
NASA Technical Reports Server (NTRS)
Gilkerson, Nikita
2017-01-01
Automated cell biology system for laboratory and International Space Station (ISS) National Laboratory research. Enhanced cell culture platform that provides undisturbed culture maintenance, including feedback temperature control, medical grade gas supply, perfusion nutrient delivery and removal of waste, and automated experiment manipulations. Programmable manipulations include: media feeds change out, injections, fraction collections, fixation, flow rate, and temperature modification within a one-piece sterile barrier flow path. Cassette provides 3 levels of containment and allows Crew access to the bioculture chamber and flow path assembly for experiment initiation, refurbishment, or sample retrieval and preservation.
SedMob: A mobile application for creating sedimentary logs in the field
NASA Astrophysics Data System (ADS)
Wolniewicz, Pawel
2014-05-01
SedMob is an open-source, mobile software package for creating sedimentary logs, targeted for use in tablets and smartphones. The user can create an unlimited number of logs, save data from each bed in the log as well as export and synchronize the data with a remote server. SedMob is designed as a mobile interface to SedLog: a free multiplatform package for drawing graphic logs that runs on PC computers. Data entered into SedMob are saved in the CSV file format, fully compatible with SedLog.
Wyoming freight movement system vulnerabilities and ITS.
DOT National Transportation Integrated Search
2013-12-01
This report summarizes the work performed during the second phase of a two-phase : research project. The first phase focused on two main areas: freight safety and wind : vulnerability, and the identification of critical infrastructure. Phase I also t...
Decreasing Human Trafficking through Sex Work Decriminalization.
Albright, Erin; D'Adamo, Kate
2017-01-01
In order to decrease human trafficking, health care workers should support the full decriminalization of prostitution. Similar to trafficking in other forms of labor, preventing trafficking in the sex trade requires addressing the different forms of marginalization that create vulnerable communities. By removing punitive laws that prevent reporting of exploitation and abuse, decriminalization allows sex workers to work more safely, thereby reducing marginalization and vulnerability. Decriminalization can also help destigmatize sex work and help resist political, social, and cultural marginalization of sex workers. © 2017 American Medical Association. All Rights Reserved.
Hahn, Cheryl; Wilson, Timothy D; McRae, Kaichen; Gilbert, Daniel T
2013-10-01
Do people take risks to obtain rewards or experience suspense? We hypothesized that people vulnerable to gambling are motivated more by the allure of winning money whereas people less vulnerable to gambling are motivated more by the allure of suspense. Consistent with this hypothesis, participants with high scores on a subscale of the Gambling Attitudes and Beliefs Survey--a measure of vulnerability to gambling--reported more of a motivation to earn money (pilot study), were more likely to accept a certain or near-certain amount of money than to gamble for that same amount (Studies 1-2), and worked harder to earn money (Study 3). People vulnerable to gambling also made more accurate predictions about how much they would gamble. People less vulnerable to gambling, in contrast, gambled more than people vulnerable to gambling, but did not know that they would.
Construction of road network vulnerability evaluation index based on general travel cost
NASA Astrophysics Data System (ADS)
Leng, Jun-qiang; Zhai, Jing; Li, Qian-wen; Zhao, Lin
2018-03-01
With the development of China's economy and the continuous improvement of her urban road network, the vulnerability of the urban road network has attracted increasing attention. Based on general travel cost, this work constructs the vulnerability evaluation index for the urban road network, and evaluates the vulnerability of the urban road network from the perspective of user generalised travel cost. Firstly, the generalised travel cost model is constructed based on vehicle cost, travel time, and traveller comfort. Then, the network efficiency index is selected as an evaluation index of vulnerability: the network efficiency index is composed of the traffic volume and the generalised travel cost, which are obtained from the equilibrium state of the network. In addition, the research analyses the influence of traffic capacity decrease, road section attribute value, and location of road section, on vulnerability. Finally, the vulnerability index is used to analyse the local area network of Harbin and verify its applicability.
Bayer, Angela M; Garvich, Mijail; Díaz, David A; Sánchez, Hugo; García, Patricia J; Coates, Thomas J
2014-09-01
In Peru, there are few studies on male sex workers (MSWs), and existing studies explore limited subgroups or offer limited information about MSWs' perspectives. This study provides in-depth perspectives from 40 MSWs who work in downtown Lima (Cercado) and in surrounding urban neighborhoods (non-Cercado) through interviews on their identities, lives, and HIV/STI (sexually transmitted infection) risks and vulnerabilities. Findings are that entry into sex work links economy and affection, particularly among Cercado MSWs. Continued sex work cements this link, making it difficult to exit sex work and establish goals. Ties between economics and affections influence MSWs' perceived HIV/STI risks, vulnerabilities, and prevention practices. Although Cercado MSWs report higher HIV/STI risks and vulnerabilities than non-Cercado peers, they report fewer prevention practices given inability to buy condoms and acceptance of client offers of higher payment, especially clients they feel affection for. MSWs need support to strengthen their self-perceptions and define and pursue their goals in order to improve their HIV/STI prevention practices, health, and well-being. © The Author(s) 2013.
Bayer, Angela M.; Garvich, Mijail; Díaz, David A.; Sánchez, Hugo; García, Patricia J.; Coates, Thomas J.
2014-01-01
In Peru, there are few studies on male sex workers (MSWs) and existing studies explore limited sub-groups or offer limited information about MSWs’ perspectives. This study provides in-depth perspectives from 40 MSWs who work in downtown Lima (Cercado) and in surrounding urban neighborhoods (non-Cercado) through interviews on their identities, lives and HIV/STI risks and vulnerabilities. Findings are that entry into sex work links economy and affection, particularly among Cercado MSWs. Continued sex work cements this link, making it difficult to exit sex work and establish goals. Ties between economics and affections influence MSWs’ perceived HIV/STI risks, vulnerabilities and prevention practices. Although Cercado MSWs report higher HIV/STI risks and vulnerabilities than non-Cercado peers, they report fewer prevention practices given inability to buy condoms and acceptance of client offers of higher payment, especially clients they feel affection for. MSWs need support to strengthen their self-perceptions and define and pursue their goals in order to improve their HIV/STI prevention practices, health and well-being. PMID:24368712
The Naïve nurse: revisiting vulnerability for nursing
2012-01-01
Background Nurses in the Western world have given considerable attention to the concept of vulnerability in recent decades. However, nurses have tended to view vulnerability from an individualistic perspective, and have rarely taken into account structural or collective dimensions of the concept. As the need grows for health workers to engage in the global health agenda, nurses must broaden earlier works on vulnerability, noting that conventional conceptualizations and practical applications on the notion of vulnerability warrant extension to include more collective conceptualizations thereby making a more complete understanding of vulnerability in nursing discourse. Discussion The purpose of this paper is to examine nursing contributions to the concept of vulnerability and consider how a broader perspective that includes socio-political dimensions may assist nurses to reach beyond the immediate milieu of the patient into the dominant social, political, and economic structures that produce and sustain vulnerability. Summary By broadening nurse’s conceptualization of vulnerability, nurses can obtain the consciousness needed to move beyond a peripheral role of nursing that has been dominantly situated within institutional settings to contribute in the larger arena of social, economic, political and global affairs. PMID:22520841
Test Program for Assessing Vulnerability of Industrial Equipment to Nuclear Air Blast.
1983-10-01
PROJECT. TASK 4Scientific Servic, Inc. AREA & WORK UNIT NUMBERS 517 East Bayshore Work Unit 1124F Redwood City, CA 94063___ __________ 11. CONTROLLING ...vulnerability, but perhaps less expensive, to be selected and substituted, with an eye to cost control . 5. MODELING AND SCALING CONSIDERATIONS Reiterating...behavior and properties of the test items and Interfaces that control behavior (e4g., test objects/flow field, test objects/interfacing surface of
Work and Health among Latina Mothers in Farmworker Families
Arcury, Thomas A.; Trejo, Grisel; Suerken, Cynthia K.; Grzywacz, Joseph G.; Ip, Edward H.; Quandt, Sara A.
2014-01-01
Background Work organization is important for the health of vulnerable workers, particularly women. This analysis describes work organization for Latinas in farmworker families and delineates the associations of work organization with health indicators. Methods 220 Latino women in farmworker families completed interviews from October 2012 - July 2013. Interviews addressed job structure, job demand, job control, and job support. Health measures included stress, depressive symptoms, physical activity, family conflict, and family economic security. Results Three-fifths of the women were employed. Several work organization dimensions, including shift, psychological demand, work safety climate, and benefits, were associated with participant health as expected, based on the work organization and job demands-control-support models. Conclusions Research should address women's health and specific work responsibilities. Occupational safety policy must consider the importance of work organization in the health of vulnerable workers. PMID:25742536
A pragmatic analysis of vulnerability in clinical research.
Wendler, David
2017-09-01
Identifying which subjects are vulnerable, and implementing safeguards to protect them, is widely regarded as essential to clinical research. Commentators have endorsed a number of responses to these challenges and have thereby made significant progress in understanding vulnerability in clinical research. At the same time, this literature points to a central contradiction which calls into question its potential to protect vulnerable subjects in practice. Specifically, analysis suggests that all human subjects are vulnerable and vulnerability in clinical research is comparative and context dependent, in the sense that individuals are vulnerable relative to others and in some contexts only. Yet, if everyone is vulnerable, there seems to be no point in citing the vulnerability of some individuals. Moreover, the conclusion that everyone is vulnerable seems inconsistent with the claims that vulnerability is comparative and context dependent, raising concern over whether it will be possible to develop a comprehensive account of vulnerability that is internally consistent. The solution to this dilemma lies in recognition of the fact that the practical significance of claims regarding vulnerability depends on the context in which they are used. The claims that appear to lead to the central contradiction are in fact accurate conclusions that follow from different uses of the term 'vulnerability'. The present manuscript describes this 'pragmatic' approach to vulnerability in clinical research and considers its implications for ensuring that subjects receive appropriate protection. Published 2017. This article is a U.S. Government work and is in the public domain in the USA.
NASA Astrophysics Data System (ADS)
Boori, Mukesh S.; Choudhary, Komal; Kupriyanov, Alexander; Sugimoto, Atsuko; Evers, Mariele
2016-10-01
The aim of this research work is to understand natural and environmental vulnerability situation and its cause such as intensity, distribution and socio-economic effect in the Indigirka River basin, Eastern Siberia, Russia. This paper identifies, assess and classify natural and environmental vulnerability using landscape pattern from multidisciplinary approach, based on remote sensing and Geographical Information System (GIS) techniques. A model was developed by following thematic layers: land use/cover, vegetation, wetland, geology, geomorphology and soil in ArcGIS 10.2 software. According to numerical results vulnerability classified into five levels: low, sensible, moderate, high and extreme vulnerability by mean of cluster principal. Results are shows that in natural vulnerability maximum area covered by moderate (29.84%) and sensible (38.61%) vulnerability and environmental vulnerability concentrated by moderate (49.30%) vulnerability. So study area has at medial level vulnerability. The results found that the methodology applied was effective enough in the understanding of the current conservation circumstances of the river basin in relation to their environment with the help of remote sensing and GIS. This study is helpful for decision making for eco-environmental recovering and rebuilding as well as predicting the future development.
Current Simulation Methods in Military Systems Vulnerability Assessment
1990-11-01
Weapons * 1990: JASON Review of the Army Approach to Vulnerability Testing Many of the suggestions and recommendations made by these committees concern...damage vectors. Ongoing work by the JASONs 29 is also targeted to developing statistical methods for LF-test/SQuASH-model comparisons in Space 2]. We...Technical Report BRL-TR-3113, June 1990. 28. L. Tonnessen, A. Fries , L. Starkey and A. Stein, Live Fire Testing in the Evaluation of the Vulnerability of
DEMONSTRATING APPLICATIONS OF REGIONAL VULNERABILITY ASSESSMENT
This task is designed to respond to 2 Congressional earmarks of $1,000,000 to the Canaan Valley Institute (CVI) to work in close coordination with the Regional Vulnerability Assessment (ReVA) initiative to develop research and educational tools using integrative technologies to p...
Steenbeek, Romy; Giesen, Femke B M; Ybema, Jan Fekke
2009-08-01
To determine the effect of health on working conditions and outcomes. Data were collected in the longitudinal Study on Health at Work (n = 1597 employees), using multiple regression analyses and focusing on three groups of employees: 1) healthy, 2) chronic health complaints without a work handicap, and 3) chronic health complaints with a work handicap. 1) Employees with a work handicap experienced less favorable working conditions and outcomes than other employees. 2) Employees with a work handicap experienced less favorable working conditions and outcomes over time. 3) Employees with chronic health complaints were more vulnerable to the influence of working conditions on outcomes, whereas employees with a work handicap, unexpectedly, benefited from high work pressure and low autonomy. 1) Employees with a work handicap differ considerably from employees with chronic health complaints. 2) Employees with a work handicap drift into less favorable working conditions and outcomes. 3) Healthy employees, employees with chronic health complaints, and employees with a work handicap, all are vulnerable to different working conditions.
O'Higgins, Aoife
2012-01-01
Many young refugees face significant difficulties in securing support from social services providers. This study invited 21 young refugees aged 16 to 21 to take part in focus groups and follow-up interviews about their experiences of accessing this support. The findings reveal that young refugees may deliberately conform to expectations about their vulnerability in order to benefit from greater support from service providers. Social workers may fail to consider young refugees' abilities and understand the ways in which each individual is vulnerable. The study suggests that group work may be an effective way to engage young refugees to overcome this. Copyright © 2012 Wiley Periodicals, Inc., A Wiley Company.
Original data preprocessor for Femap/Nastran
NASA Astrophysics Data System (ADS)
Oanta, Emil M.; Panait, Cornel; Raicu, Alexandra
2016-12-01
Automatic data processing and visualization in the finite elements analysis of the structural problems is a long run concern in mechanical engineering. The paper presents the `common database' concept according to which the same information may be accessed from an analytical model, as well as from a numerical one. In this way, input data expressed as comma-separated-value (CSV) files are loaded into the Femap/Nastran environment using original API codes, being automatically generated: the geometry of the model, the loads and the constraints. The original API computer codes are general, being possible to generate the input data of any model. In the next stages, the user may create the discretization of the model, set the boundary conditions and perform a given analysis. If additional accuracy is needed, the analyst may delete the previous discretizations and using the same information automatically loaded, other discretizations and analyses may be done. Moreover, if new more accurate information regarding the loads or constraints is acquired, they may be modelled and then implemented in the data generating program which creates the `common database'. This means that new more accurate models may be easily generated. Other facility consists of the opportunity to control the CSV input files, several loading scenarios being possible to be generated in Femap/Nastran. In this way, using original intelligent API instruments the analyst is focused to accurately model the phenomena and on creative aspects, the repetitive and time-consuming activities being performed by the original computer-based instruments. Using this data processing technique we apply to the best Asimov's principle `minimum change required / maximum desired response'.
Facilitating the analysis of the multifocal electroretinogram using the free software environment R.
Bergholz, Richard; Rossel, Mirjam; Dutescu, Ralf M; Vöge, Klaas P; Salchow, Daniel J
2018-01-01
The large amount of data rendered by the multifocal electroretinogram (mfERG) can be analyzed and visualized in various ways. The evaluation and comparison of more than one examination is time-consuming and prone to create errors. Using the free software environment R we developed a solution to average the data of multiple examinations and to allow a comparison of different patient groups. Data of single mfERG recordings as exported in .csv format from a RETIport 21 system (version 7/03, Roland Consult) or manually compiled .csv files are the basis for the calculations. The R software extracts response densities and implicit times of N1 and P1 for the sum response, each ring eccentricity, and each single hexagon. Averages can be calculated for as many subjects as needed. The mentioned parameters can then be compared to another group of patients or healthy subjects. Application of the software is illustrated by comparing 11 patients with chloroquine maculopathy to a control group of 7 healthy subjects. The software scripts display response density and implicit time 3D plots of each examination as well as of the group averages. Differences of the group averages are presented as 3D and grayscale 2D plots. Both groups are compared using the t-test with Bonferroni correction. The group comparison is furthermore illustrated by the average waveforms and by boxplots of each eccentricity. This software solution on the basis of the programming language R facilitates the clinical and scientific use of the mfERG and aids in interpretation and analysis.
A novel microfluidic valve controlledby induced charge electro-osmotic flow
NASA Astrophysics Data System (ADS)
Wang, Chengfa; Song, Yongxin; Pan, Xinxiang; Li, Dongqing
2016-07-01
In this paper, a novel microfluidic valve by utilizing induced charge electro-osmotic flow (ICEOF) is proposed and analyzed. The key part of the microfluidic valve is a Y-shaped microchannel. A small metal plate is placed at each corner of the junction of the Y-shaped microchannel. When a DC electrical field is applied through the channels, electro-osmotic flows occur in the channels, and two vortices will be formed near each of the metal plates due to the ICEOF. The two vortices behave like virtual ‘blocking columns’ to restrain and direct the flow in the Y-channel. In this paper, effects of the length of the metal plates, the applied voltages, the width of the microchannel, the zeta potential of the non-metal microchannel wall, and the orientation of the branch channels on the flow switching between two outlet channels are numerically investigated. The results show that the flow switching between the two outlet channels can be flexibly achieved by adjusting the applied DC voltages. The critical switching voltage (CSV), under which one outlet channel is closed, decreases with the increase in the metal plate length and the orientation angle of the outlet channels. The CSV, however, increases with the increase in the inlet voltage, the width of the microchannel, and the absolute value of the zeta potential of the non-metal microchannel wall. Compared with other types of micro-valves, the proposed micro-valve is simple in structure without any moving parts. Only a DC power source is needed for its actuation, thus it can operate automatically by controlling the applied voltages.
Creating a Flood Risk Index to Improve Community Resilience
NASA Astrophysics Data System (ADS)
Klima, K.; El Gammal, L.
2017-12-01
While flood risk reduction is an existent discourse and agenda in policy and insurance, vulnerabilities vary between communities; some communities may have aging infrastructure, or an older/poorer population less able to absorb a flood, putting them at increased risk from the hazards. As a result, some are considering environmental justice aspects of flood risk reduction. To date, catastrophe models have focused on creating floodmaps (e.g., NOAA's Sea Level Rise Viewer, Climate Central's Surging Seas), or on linking hydrological models to economic loss models (e.g., HEC-RAS + HAZUS). However, this approach may be highly inequitable between areas of different income (as well as other demographics). Some have begun work on combining hydrology with vulnerability information (e.g., USACE's North Atlantic Comprehensive Coastal Study). To our knowledge, no one has tried to adapt the more advanced known heat risk theory to water risk by combining hydrology information (e.g., HEC-RAS, floodplain maps) with the social vulnerability (e.g., Cutter et al.) of the residents. This project will create a method to combine water hazard data with a derived water vulnerability index to help a community understand their current and future water risk. We will use the case study area of Pittsburgh, PA, which faces severe precipitation and riverine flooding hazards. Building on present literature of factors influencing water vulnerability contextualized to the Pittsburgh region, we will identify, quantify, and map the top factors impacting water vulnerability. We will combine these with flood maps to identify the geospatial distribution of water risk. This work will allow policy makers to identify location-specific aspects of water vulnerability and risk in any community, thus promoting environmental justice. It is possible that this type of original research would create maps of relative water risk that may prove as understandable to the general public as other flood maps, and may also help to promote "just resilience". This presentation will present a method to combine water hazard data with a derived water vulnerability index to present work on the geospatial distribution of water risk in Pittsburgh, PA.
Ranebennur, Virupax; Gaikwad, Sanjeevsingh; Ramesh, Sowmya; Bhende, Amrita
2014-01-01
It is important for targeted interventions to consider vulnerabilities of female sex workers (FSWs) such as poverty, work-related mobility, and literacy, for effective human immunodeficiency virus (HIV) prevention. This paper describes and examines the association of the Aastha HIV/sexually transmitted infection (STI) prevention project in Mumbai and Thane, India, on the relationship between vulnerability and behavioral outcomes. Data were drawn from the Behavioural Tracking Survey, a cross-sectional behavioral study conducted in 2010 with 2,431 FSWs recruited in Mumbai and Thane. The key independent measures used were program exposure and "vulnerability index", a composite index of literacy, factors of dependence (alternative livelihood options, current debt, and children), and aspects of sex work (mobility and duration in sex work). Dependent measures included service uptake, self-confidence, self-identity, and individual agency. Logistic regression analysis was used to examine the study objectives. Of the analytical sample of 2,431 FSWs, 1,295 (53.3%) were categorized as highly vulnerable. Highly vulnerable FSWs who were associated with the Aastha program for more than a year were more likely to have accessed crisis-response services in the past 6 months (adjusted odds ratio [AOR] 2.2, 95% confidence interval [CI] 1.4-3.6; P<0.001), to have visited a clinic to get a checkup for STI symptoms (AOR 2.4, 95% CI 1.2-4.8; P<0.015), not to be ashamed to disclose identity as an FSW to health workers (AOR 2.1, 95% CI 1.2-3.5; P<0.008), and to be confident in supporting a fellow FSW in crisis (AOR 1.7, 95% CI 1.0-2.8, P<0.033) compared to those less vulnerable with similar exposure to the Aastha program. It is critical for HIV/STI interventions to consider vulnerabilities of FSWs at project inception and address them with focused strategies, including a segmented service-delivery model and community involvement, in order to strengthen the structural response to HIV prevention.
Ranebennur, Virupax; Gaikwad, Sanjeevsingh; Ramesh, Sowmya; Bhende, Amrita
2014-01-01
Background It is important for targeted interventions to consider vulnerabilities of female sex workers (FSWs) such as poverty, work-related mobility, and literacy, for effective human immunodeficiency virus (HIV) prevention. This paper describes and examines the association of the Aastha HIV/sexually transmitted infection (STI) prevention project in Mumbai and Thane, India, on the relationship between vulnerability and behavioral outcomes. Materials and methods Data were drawn from the Behavioural Tracking Survey, a cross-sectional behavioral study conducted in 2010 with 2,431 FSWs recruited in Mumbai and Thane. The key independent measures used were program exposure and “vulnerability index”, a composite index of literacy, factors of dependence (alternative livelihood options, current debt, and children), and aspects of sex work (mobility and duration in sex work). Dependent measures included service uptake, self-confidence, self-identity, and individual agency. Logistic regression analysis was used to examine the study objectives. Results Of the analytical sample of 2,431 FSWs, 1,295 (53.3%) were categorized as highly vulnerable. Highly vulnerable FSWs who were associated with the Aastha program for more than a year were more likely to have accessed crisis-response services in the past 6 months (adjusted odds ratio [AOR] 2.2, 95% confidence interval [CI] 1.4–3.6; P<0.001), to have visited a clinic to get a checkup for STI symptoms (AOR 2.4, 95% CI 1.2–4.8; P<0.015), not to be ashamed to disclose identity as an FSW to health workers (AOR 2.1, 95% CI 1.2–3.5; P<0.008), and to be confident in supporting a fellow FSW in crisis (AOR 1.7, 95% CI 1.0–2.8, P<0.033) compared to those less vulnerable with similar exposure to the Aastha program. Conclusion It is critical for HIV/STI interventions to consider vulnerabilities of FSWs at project inception and address them with focused strategies, including a segmented service-delivery model and community involvement, in order to strengthen the structural response to HIV prevention. PMID:24600249
Filtering NetCDF Files by Using the EverVIEW Slice and Dice Tool
Conzelmann, Craig; Romañach, Stephanie S.
2010-01-01
Network Common Data Form (NetCDF) is a self-describing, machine-independent file format for storing array-oriented scientific data. It was created to provide a common interface between applications and real-time meteorological and other scientific data. Over the past few years, there has been a growing movement within the community of natural resource managers in The Everglades, Fla., to use NetCDF as the standard data container for datasets based on multidimensional arrays. As a consequence, a need surfaced for additional tools to view and manipulate NetCDF datasets, specifically to filter the files by creating subsets of large NetCDF files. The U.S. Geological Survey (USGS) and the Joint Ecosystem Modeling (JEM) group are working to address these needs with applications like the EverVIEW Slice and Dice Tool, which allows users to filter grid-based NetCDF files, thus targeting those data most important to them. The major functions of this tool are as follows: (1) to create subsets of NetCDF files temporally, spatially, and by data value; (2) to view the NetCDF data in table form; and (3) to export the filtered data to a comma-separated value (CSV) file format. The USGS and JEM will continue to work with scientists and natural resource managers across The Everglades to solve complex restoration problems through technological advances.
ERIC Educational Resources Information Center
Maxwell, Tim
2013-01-01
The evolving role of the educational psychologist (EP) is discussed with an emphasis on the supervision provided for a team of support workers for vulnerable adolescents, working within a Local Service Team. This development is considered in the context of the Every Child Matters (DfES, 2004) agenda and the Farrell, Woods, Lewis, Rooney, Squire…
DOT National Transportation Integrated Search
2002-10-01
As part of a work assignment issued by the Mississippi Department of Transportation, : Bridge Division, the following report has been prepared to document results of an : investigation of seismic vulnerability of the primary structural elements suppo...
Vulnerable subjects? The case of nonhuman animals in experimentation.
Johnson, Jane
2013-12-01
The concept of vulnerability is deployed in bioethics to, amongst other things, identify and remedy harms to participants in research, yet although nonhuman animals in experimentation seem intuitively to be vulnerable, this concept and its attendant protections are rarely applied to research animals. I want to argue, however, that this concept is applicable to nonhuman animals and that a new taxonomy of vulnerability developed in the context of human bioethics can be applied to research animals. This taxonomy does useful explanatory work, helping to pinpoint the limitations of the 3Rs/welfare approach currently adopted in the context of animal experimentation. On this account, the 3Rs/welfare approach fails to deliver for nonhuman animals in experimentation because it effectively addresses only one element of their vulnerability (inherent) and paradoxically through the institution of Animal Ethics Committees intended to protect experimental animals in fact generates new vulnerabilities that exacerbate their already precarious situation.
Lowe, Dianne B; Taylor, Michael J; Hill, Sophie J
2015-08-01
To estimate the prevalence of communication vulnerability (CV) and its association with various health measures among working-age Australians with musculoskeletal conditions (MSK). The various vulnerability characteristics may lead to inadequate communication between consumers and healthcare professionals. Prevalence of CV among 18-64 year olds, with or without MSK, was analyzed using the Australian Bureau of Statistics' National Health Survey 2007-08 data. Associations between CV and measures of health complexity (accumulating multimorbidity and risk factors) and health burden (poorer self-rated health, psychological distress, and pain restricting work) in the MSK population were estimated using logistic regression. Further analyses were conducted for each vulnerability characteristic to determine the degree of association (crude and adjusted) with measures of interest. CV were more prevalent in working-age Australians with MSK (65%) than those without (51%). Adjusted for age and sex among working-age Australians with at least 1 MSK, those with 1 or more CV were more likely to have multimorbidity [adjusted OR (aOR) = 1.8, 95% CI 1.5-2.2], lifestyle risk factors (aOR = 2.1, 95% CI 1.5-2.8), poorer self-rated health (aOR = 3.4, 95% CI 2.7-4.2), greater psychological distress (aOR = 2.9, 95% CI 2.3-3.7), and pain restricting employment (aOR = 1.7, 95% CI 1.4-2.1) compared with those without CV. For working-age people, there is an association between MSK and CV. For those with MSK, CV were associated with increased likelihood of health complexity and burden. These findings have policy and clinical relevance. Research is needed to determine whether interventions that address these specific CV characteristics reduce the burden of disease within these populations.
Gupta, Jhumka; Reed, Elizabeth; Kershaw, Trace; Blankenship, Kim M.
2011-01-01
Synopsis Findings from female sex workers in southern India indicate that women who enter sex work via trafficking are exposed to unique HIV vulnerabilities. Objectives To estimate the prevalence of sex trafficking as a mode of entry into sex work, and to examine associations between sex trafficking and recent violence experiences and HIV vulnerability among female sex workers (FSWs). Methods In a cross-sectional study in 2006 in coastal Andhra Pradesh, India, 812 FSWs were recruited via respondent-driven sampling to take part in an oral survey of their experiences in sex work. Results One in 5 (19.3%) FSWs met the UN definition of sex trafficking. Women trafficked into sex work were more likely than other FSWs to report recent violence experiences (adjusted odds ratio [AOR], 1.93; 95% confidence interval [CI], 1.32–2.81), more clients per week (AOR, 1.63; 95% CI, 1.11–2.41), and more days of sex work per week (AOR, 1.76; 95% CI, 1.18–2.63), and were less likely to report use of FSW-focused services (AOR, 0.60; 95% CI, 0.42–0.86). No significant differences emerged regarding HIV knowledge or consistent condom use. Conclusion There was a high prevalence of sex trafficking. A history of sex trafficking was associated with a greater vulnerability to recent violence and HIV risk behaviors, underscoring the need for increased attention to the public health needs of trafficked populations. PMID:21620402
NASA Technical Reports Server (NTRS)
2012-01-01
The NASA Thesaurus contains the authorized NASA subject terms used to index and retrieve materials in the NASA Aeronautics and Space Database (NA&SD) and NASA Technical Reports Server (NTRS). The scope of this controlled vocabulary includes not only aerospace engineering, but all supporting areas of engineering and physics, the natural space sciences (astronomy, astrophysics, planetary science), Earth sciences, and the biological sciences. The NASA Thesaurus Data File contains all valid terms and hierarchical relationships, USE references, and related terms in machine-readable form. The Data File is available in the following formats: RDF/SKOS, RDF/OWL, ZThes-1.0, and CSV/TXT.
VeriClick: an efficient tool for table format verification
NASA Astrophysics Data System (ADS)
Nagy, George; Tamhankar, Mangesh
2012-01-01
The essential layout attributes of a visual table can be defined by the location of four critical grid cells. Although these critical cells can often be located by automated analysis, some means of human interaction is necessary for correcting residual errors. VeriClick is a macro-enabled spreadsheet interface that provides ground-truthing, confirmation, correction, and verification functions for CSV tables. All user actions are logged. Experimental results of seven subjects on one hundred tables suggest that VeriClick can provide a ten- to twenty-fold speedup over performing the same functions with standard spreadsheet editing commands.
Vulnerability and risk in children living with a physical disability.
Heaslip, Vanessa; Hewitt-Taylor, Jaqui
2014-12-01
Children are identified as a vulnerable group in need of a degree of safeguarding. About 6% of children in the UK have a disability, which can increase their level of vulnerability. How disability is perceived by others may affect the way they work with these young people in coping with life's risks, which may be increased due to the disability. Each individual's perception of the risks and benefits of a given venture varies. Children's nurses work with these young people and their families, aiming to give them maximum autonomy, self-reliance, empowerment and independence in adulthood. This involves risk-taking, as every young person needs to learn from graduated exposure to new experiences, environments, associations and hazards; the chance of harm must be balanced with the disadvantages of over-protection.
Our work will yield an increased general understanding of interactions among the alteration of coastal ecosystem, species invasions, climate change, and human risk in coastal environments. In addition, we will conduct a quantitative vulnerability assessment of a specific coast...
Exploring Faculty Perceptions toward Working with Academically Vulnerable College Students
ERIC Educational Resources Information Center
Quick, Robin L.
2013-01-01
This study is an exploratory study of faculty members' knowledge and perceptions toward of with academically vulnerable college students who are specifically experiencing reading and writing difficulties. Data were gathered from 174 college faculty at six higher education institutions throughout northwestern Pennsylvania via an online electronic…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-01
... Climate Change (IPCC), Impacts, Adaptation & Vulnerability. SUMMARY: The United States Global Change... on Climate Change (IPCC), Impacts, Adaptation & Vulnerability. The United Nations Environment... socio-economic information for understanding the scientific basis of climate change, potential impacts...
Martial Arts and Socially Vulnerable Youth. An Analysis of Flemish Initiatives
ERIC Educational Resources Information Center
Theeboom, Marc; De Knop, Paul; Wylleman, Paul
2008-01-01
Notwithstanding the lack of empirical support for its positive socio-psychological effects, numerous educators and welfare workers make use of martial arts in their work with socially vulnerable youth. Using qualitative methodology, the aims, approaches and personal experiences were analysed of teachers and co-ordinators involved in specific…
Coastal vulnerability: climate change and natural hazards perspectives
NASA Astrophysics Data System (ADS)
Romieu, E.; Vinchon, C.
2009-04-01
Introduction Studying coastal zones as a territorial concept (Integrated coastal zone management) is an essential issue for managers, as they have to consider many different topics (natural hazards, resources management, tourism, climate change…). The recent approach in terms of "coastal vulnerability" studies (since the 90's) is the main tool used nowadays to help them in evaluating impacts of natural hazards on coastal zones, specially considering climate change. This present communication aims to highlight the difficulties in integrating this concept in risk analysis as it is usually practiced in natural hazards sciences. 1) Coastal vulnerability as a recent issue The concept of coastal vulnerability mainly appears in the International panel on climate change works of 1992 (IPCC. 2001), where it is presented as essential for climate change adaptation. The concept has been defined by a common methodology which proposes the assessment of seven indicators, in regards to a sea level rise of 1m in 2100: people affected, people at risk, capital value at loss, land at loss, wetland at loss, potential adaptation costs, people at risk assuming this adaptation. Many national assessments have been implemented (Nicholls, et al. 1995) and a global assessment was proposed for three indicators (Nicholls, et al. 1999). The DINAS-Coast project reuses this methodology to produce the DIVA-tool for coastal managers (Vafeidis, et al. 2004). Besides, many other methodologies for national or regional coastal vulnerability assessments have been developed (review by (UNFCCC. 2008). The use of aggregated vulnerability indicators (including geomorphology, hydrodynamics, climate change…) is widespread: the USGS coastal vulnerability index is used worldwide and was completed by a social vulnerability index (Boruff, et al. 2005). Those index-based methods propose a vulnerability mapping which visualise indicators of erosion, submersion and/or socio economic sensibility in coastal zones. This concept is a great tool for policy makers to help managing their action and taking into account climate change (McFadden, et al. 2006). However, in those approaches, vulnerability is the output itself (cost of effective impacts, geomorphologic impacts…), but is not integrated it in a risk analysis. Furthermore, those studies emerged from a climatic perspective, which leads to consider climate change as a hazard or pressure whereas risk studies commonly consider hazards such as erosion and flooding, where climate change modifies the drivers of the hazard. 2) The natural hazards and socio economic perspectives In order to reduce impacts of natural hazards, decision makers need a complete risk assessment (probability of losses). Past studies on natural risks (landslide, earthquake...) highlighted the pertinence of defining risk as a combination of : (1)hazard occurrence and intensity, (2) exposition and (3)vulnerability of assets and population to this hazard (e.g. Douglas. 2007, Sarewitz, et al. 2003). Following the Renn and Klinke risk assessment frame, high uncertainties associated with coastal risks considering climatic and anthropic change highlights the importance of working on that concept of "vulnerability" (Klinke and Renn. 2002). Past studies on vulnerability assessment showed a frequently mentioned gap between "impact based" and "human based" points of view. It is nowadays a great issue for natural risk sciences. Many research efforts in FP7 projects such as MOVE and ENSURE focus on integrating the different dimensions of vulnerability (Turner, et al. 2003, Birkmann. 2006). Coastal risk studies highlight another issue of concern. We previously detailed the different use of the term "vulnerability" in the coastal context, quite different of the "natural risk's" use. Interaction of social, economic and physical sciences is considered within two french research projects (Vulsaco, Miseeva), in order to identify the vulnerability of a system to flooding or erosion (i.e. its characteristics that create potential harm), and integrate them in a risk assessment. Global change is considered by modifications of hazard, anthropogenic pressure and exposition, in order to point out possible modification of vulnerabilities. 3) Learning from both perspectives Coastal vulnerability in its "end in itself" and climate change dimension is a widespread tool for decision makers but it can be inadequate when vulnerability is a component of risk. This is mainly due to the consideration of climate change as a "hazard", so that coastal vulnerability is seen as the possible adverse impacts of climate change. As a matter of fact, this concept is clearly well considered by managers, who feel deeply concerned by climate change. However, coastal risk managers would gain in considering climate change more like a driver able to modify existing hazards than like the pressure in itself. Using this concept could lead to new perspectives of coastal risk mitigation for decision makers (social vulnerability, risk perception…), learning from other disciplines and sciences thanks to research projects such as MOVE (FP7). Acknowledgements The authors would like to thank the BRGM coastal team for rich discussions and fruitful collaborations in coastal vulnerability studies, more specially Déborah Idier for animating the Vulsaco project and Manuel Garcin for his work on tsunamis in Sri Lanka. They are also grateful to the MISEEVA and MOVE teams, which are doing some great trans-disciplinary work. References Birkmann, J., 2006. Measuring vulnerability to Natural Hazards : towards disaster resilient societies. United Nations University Press. Boruff, B. J., Emrich, C., Cutter, S. L., 2005. Erosion hazard vulnerability of US coastal counties. Journal of Coastal Research. 21, 932-942. Douglas, J., 2007. Physical vulnerability modelling in natural hazard risk assessment. Natural Hazards and Earth System Sciences. 7, 283-288. IPCC, 2001. Climate change 2001 : synthesis report. A contribution of working groups I, II and III to the Third Assesment Report of the Intergovernmental Panel on Climate Change. Klinke, A. and Renn, O., 2002. A new approach to risk evaluation and management : risk based, precaution based and discourse based strategies. Risk Analysis. 22, 1071-1094. McFadden, L., Nicholls, R.J., Penning-Rowsell, E. (Eds.), 2006. Managing coastal vulnerability. Elsevier Science. Nicholls, R. J., Hoozemans, F. M. J., Marchand, M., 1999. Increasing flood risk and wetland losses due to global sea-level rise: regional and global analyses. Global Environmental Change, Part A: Human and Policy Dimensions. 9, S69-S87. Nicholls, R. J., Leatherman, S. P., Volonte, C. R., 1995. Impacts and responses to sea-level rise; qualitative and quantitative assessments; Potential impacts of accelerated sea-level rise on developing countries. Journal of Coastal Research. Special issue 14, 26-43. Sarewitz, D., Pielke, R., Keykhah, M., 2003. Vulnerability and Risk: Some Thoughts from a Political and Policy Perspective. Risk Analysis. 23, 805-810. Turner, B. L.,II, Kasperson, R. E., Matson, P. A., McCarthy, J. J., Corell, R. W., Christensen, L., Eckley, N., Kasperson, J. X., Luers, A., Martello, M. L., Polsky, C., Pulsipher, A., Schiller, A., 2003. A framework for vulnerability analysis in sustainability science. Proceedings of the National Academy of Sciences, USA. 100, 8074-8079. UNFCCC, 2008. Compendium on methods and tools to evaluate impacts of vulnerability and adaptation to climate change. Vafeidis, A., Nicholls, R., McFadden, L., 2004. Developing a database for global vulnerability analysis of coastal zones: The DINAS-COAST project and the DIVA tool.
NASA Technical Reports Server (NTRS)
Carroll, Mark L.; Brown, Molly E.; Wooten, Margaret R.; Donham, Joel E.; Hubbard, Alfred B.; Ridenhour, William B.
2016-01-01
As our climate changes through time there is an ever-increasing need to quantify how and where it is changing so that mitigation strategies can be implemented. Urban areas have a disproportionate amount of warming due, in part, to the conductive properties of concrete and asphalt surfaces, surface albedo, heat capacity, lack of water, etc. that make up an urban environment. The NASA Climate Adaptation Science Investigation working group at Goddard Space Flight Center in Greenbelt, MD, conducted a study to collect temperature and humidity data at 15 min intervals from 12 sites at the center. These sites represent the major surface types at the center: asphalt, building roof, grass field, forest, and rain garden. The data show a strong distinction in the thermal properties of these surfaces at the center and the difference between the average values for the center compared to a local meteorological station. The data have been submitted to Oak Ridge National Laboratory Distributed Active Archive Center (ORNL-DAAC) for archival in comma separated value (csv) file format (Carroll et al.,2016) and can be found by following this link: http:daac.ornl.govcgi-bindsviewer.pl?ds_id1319.
Gandy, Lisa M; Gumm, Jordan; Fertig, Benjamin; Thessen, Anne; Kennish, Michael J; Chavan, Sameer; Marchionni, Luigi; Xia, Xiaoxin; Shankrit, Shambhavi; Fertig, Elana J
2017-01-01
Scientists have unprecedented access to a wide variety of high-quality datasets. These datasets, which are often independently curated, commonly use unstructured spreadsheets to store their data. Standardized annotations are essential to perform synthesis studies across investigators, but are often not used in practice. Therefore, accurately combining records in spreadsheets from differing studies requires tedious and error-prone human curation. These efforts result in a significant time and cost barrier to synthesis research. We propose an information retrieval inspired algorithm, Synthesize, that merges unstructured data automatically based on both column labels and values. Application of the Synthesize algorithm to cancer and ecological datasets had high accuracy (on the order of 85-100%). We further implement Synthesize in an open source web application, Synthesizer (https://github.com/lisagandy/synthesizer). The software accepts input as spreadsheets in comma separated value (CSV) format, visualizes the merged data, and outputs the results as a new spreadsheet. Synthesizer includes an easy to use graphical user interface, which enables the user to finish combining data and obtain perfect accuracy. Future work will allow detection of units to automatically merge continuous data and application of the algorithm to other data formats, including databases.
Gumm, Jordan; Fertig, Benjamin; Thessen, Anne; Kennish, Michael J.; Chavan, Sameer; Marchionni, Luigi; Xia, Xiaoxin; Shankrit, Shambhavi; Fertig, Elana J.
2017-01-01
Scientists have unprecedented access to a wide variety of high-quality datasets. These datasets, which are often independently curated, commonly use unstructured spreadsheets to store their data. Standardized annotations are essential to perform synthesis studies across investigators, but are often not used in practice. Therefore, accurately combining records in spreadsheets from differing studies requires tedious and error-prone human curation. These efforts result in a significant time and cost barrier to synthesis research. We propose an information retrieval inspired algorithm, Synthesize, that merges unstructured data automatically based on both column labels and values. Application of the Synthesize algorithm to cancer and ecological datasets had high accuracy (on the order of 85–100%). We further implement Synthesize in an open source web application, Synthesizer (https://github.com/lisagandy/synthesizer). The software accepts input as spreadsheets in comma separated value (CSV) format, visualizes the merged data, and outputs the results as a new spreadsheet. Synthesizer includes an easy to use graphical user interface, which enables the user to finish combining data and obtain perfect accuracy. Future work will allow detection of units to automatically merge continuous data and application of the algorithm to other data formats, including databases. PMID:28437440
Psychological and health impact of working with victims of sex trafficking.
Kliner, Merav; Stroud, Laura
2012-01-01
The UK is a major destination country for trafficking for sexual exploitation, and so increasing numbers of victims of trafficking are managed within health and social services. This study aims to assess the psychological and physical impact on health and social care staff working with an identified sex-trafficked population in a Northern City within England and identify methods to assist staff to manage this complex population. This research is a qualitative study of 12 members of health and social care staff through semi-structured interviews. The subjects were identified using purposive sampling, and data were analyzed using thematic analysis. Staff found working with sex-trafficked populations more difficult than with other vulnerable groups. They frequently described burnout and other adverse effects on their psychological and physical health. In general, staff felt undersupported and undertrained by their organizations. This led to concerns about the quality and sustainability of the service. Working with victims of sex trafficking significantly impacts on the physical and psychological health of staff. Staff working with such vulnerable groups require training and high levels of support to ensure that they are not adversely affected by their work and to ensure that high quality services are maintained. Practices to promote occupational health must be instilled within workplace policy and the organizational culture to limit the impact on psychological and physical health in staff working with vulnerable populations.
Vanroelen, C; Levecque, K; Louckx, F
2010-10-01
In this article, the link between (1) psychosocial working conditions (job demands, job autonomy, task variation, social support), (2) self-reported health (persistent fatigue, musculoskeletal complaints, emotional well-being) and (3) socioeconomic position (skill levels, occupational status) is explored. The two theoretical pathways linking the psychosocial work environment to socioeconomic differences in health are explored: differential exposure and differential vulnerability. Previously, the focus has often been on social inequalities in exposure to the stressors. The pathway of differential vulnerability in different socioeconomic positions is often neglected. In a representative cross-sectional sample of 11,099 Flemish (Belgian) wage earners, 16-65 years of age (47.5% women), logit modelling is applied. Higher exposure to psychosocial occupational stressors is associated with a higher prevalence of adverse health outcomes. Lower skill levels and subordinate occupational positions show a higher prevalence of musculoskeletal complaints, but not of persistent fatigue or emotional well-being. High demands, job strain and iso-strain are more common in higher-skilled, supervisory and managerial positions, but have the strongest health-damaging effects in lower socioeconomic positions. Low control is more prevalent in lower-skilled and subordinate positions, while having stronger adverse health effects in higher socioeconomic positions-the same holds for social support, although it has no clear socioeconomic distribution. Differential exposure and differential vulnerability constitute two counteracting forces in constituting the association between the psychosocial work environment and socioeconomic differences in self-reported health complaints among wage earners.
Global Vulnerability Assessment in Santa María Tixmadeje, Estado de México, México
NASA Astrophysics Data System (ADS)
Monroy Salazar, S.; Novelo-Casanova, D. A.
2010-12-01
Santa María Tixmadejé (SMT), Estado de México, Mexico is a town located very close to the Acambay-Tixmadejé fault. This fault is located in the middle of the Trans Volcanic Belt in the center of the Mexican territory and generated a large seismic event in 1912 with magnitude 6.9 which combined with the local vulnerability, caused a disaster. In this work we measure the different vulnerabilities of the SMT community: structural, economical, social and educational. In addition, we determinate the total vulnerability, by summing all estimated vulnerabilities, for the critical facilities identified in this town. Vulnerability was determined using the methodology proposed by National Oceanic Atmospheric Administration (NOAA) and by Disaster Prevention National Center (CENAPRED). Besides, we considered a minimum sample statistically significant of the total houses with a random sampling for our survey. Our results indicate that 50% of the critical facilities have high and very high and the other 50% between low and moderate level of total vulnerability. The results for independent vulnerabilities are as follows: (1) Near to 75% of the community has high and very high level of social vulnerability and the range for the another 25% is between low and moderate; (2) About 43% of the community has high and very high economical vulnerability and 57% low and moderate; (3) Approximately 38% of the population has high and very high educational vulnerability. The 62% present low and moderate vulnerability; and (4) About 42% of the community has very high structural vulnerability and 58% between low and moderate.
The Vulnerable Worker? A Labor Law Challenge for WIL and Work Experience
ERIC Educational Resources Information Center
Cameron, Craig
2013-01-01
The Fair Work Act (2009) in Australia deregulates "work" in work-integrated learning (WIL) by distinguishing "vocational placement" from "employee". Following concerns about the legal position of WIL and work experience, the Fair Work Ombudsman (FWO) published a fact sheet and commenced a joint research project into…
The ethics and regulatory landscape of including vulnerable populations in pragmatic clinical trials
Welch, Mary Jane; Lally, Rachel; Miller, Jennifer E; Pittman, Stephanie; Brodsky, Lynda; Caplan, Arthur L; Uhlenbrauck, Gina; Louzao, Darcy M; Fischer, James H; Wilfond, Benjamin
2015-01-01
Policies have been developed to protect vulnerable populations in clinical research, particularly the US federal research regulations (45 CFR 46 subparts B, C, and D). These policies generally recognize vulnerable populations to include pregnant women, fetuses, neonates, children, prisoners, persons with physical handicaps or mental disabilities, and disadvantaged persons. The aim has been to protect these populations from harm, often by creating regulatory and ethical checks that may limit their participation in many clinical trials. The recent increase in pragmatic clinical trials (PCTs) raises at least two questions about this approach. First, is exclusion itself a harm to vulnerable populations, as these groups may be denied access to understanding how health interventions work for them in clinical settings? Second, are groups considered vulnerable in traditional clinical trials also vulnerable in PCTs? We argue first, that excluding vulnerable subjects from participation in PCTs can be harmful by preventing acquisition of data to meaningfully inform clinical decision-making in the future. Second, we argue that protections for vulnerable subjects in traditional clinical trial settings may not be translatable, feasible, or even ethical to apply in PCTs. We conclude by offering specific recommendations for appropriately protecting vulnerable research subjects in PCTs, focusing on pregnant women, fetuses, neonates, children, prisoners, persons with physical handicaps or mental disabilities, and disadvantaged persons. PMID:26374681
Support Needs of the Most Vulnerable Student Groups in Non-University Higher Education
ERIC Educational Resources Information Center
Tamuliene, Rasa
2014-01-01
This article presents the research on support needs of the most vulnerable students in nonuniversity higher education. The research results have revealed that older, part-time students who have family and/or work responsibilities focus on academic information and counselling, foreign language training, distance study centre, legal counselling and…
Vulnerability Discovery: Bridging the Gap Between Analysis and Engineering
2006-01-01
work in selected technologies © 2006 Carnegie Mellon University 16 An Easy Target: ActiveX 1995 – OLE 2 COM ActiveX 2000 – CERT/CC... ActiveX Security Workshop 2005 – VU#680526 New vector for exploiting COM vulnerabilities via Internet Explorer discovered 2006 – Dranzer, the COM Object
Working Vulnerability: Agency of Caring Children and Children's Rights
ERIC Educational Resources Information Center
Wihstutz, Anne
2011-01-01
A growing number of empirical studies deal with children's participation in care relationships in the family. Based on a review of empirical findings in the UK and Germany, this article discusses care-giving children in terms of vulnerability and agency. The focus is set on understandings of family life as interdependent and reciprocal…
Rooftop Energy Potential of Low Income Communities in America REPLICA
Mooney, Meghan (ORCID:0000000309406958); Sigrin, Ben
1970-01-01
The Rooftop Energy Potential of Low Income Communities in America REPLICA data set provides estimates of residential rooftop solar technical potential at the tract-level with emphasis on estimates for Low and Moderate Income LMI populations. In addition to technical potential REPLICA is comprised of 10 additional datasets at the tract-level to provide socio-demographic and market context. The model year vintage of REPLICA is 2015. The LMI solar potential estimates are made at the tract level grouped by Area Median Income AMI income tenure and building type. These estimates are based off of LiDAR data of 128 metropolitan areas statistical modeling and ACS 2011-2015 demographic data. The remaining datasets are supplemental datasets that can be used in conjunction with the technical potential data for general LMI solar analysis planning and policy making. The core dataset is a wide-format CSV file seeds_ii_replica.csv that can be tagged to a tract geometry using the GEOID or GISJOIN fields. In addition users can download geographic shapefiles for the main or supplemental datasets. This dataset was generated as part of the larger NREL-led SEEDSII Solar Energy Evolution and Diffusion Studies project and specifically for the NREL technical report titled Rooftop Solar Technical Potential for Low-to-Moderate Income Households in the United States by Sigrin and Mooney 2018. This dataset is intended to give researchers planners advocates and policy-makers access to credible data to analyze low-income solar issues and potentially perform cost-benefit analysis for program design. To explore the data in an interactive web mapping environment use the NREL SolarForAll app.
A New Paradigm to Analyze Data Completeness of Patient Data.
Nasir, Ayan; Gurupur, Varadraj; Liu, Xinliang
2016-08-03
There is a need to develop a tool that will measure data completeness of patient records using sophisticated statistical metrics. Patient data integrity is important in providing timely and appropriate care. Completeness is an important step, with an emphasis on understanding the complex relationships between data fields and their relative importance in delivering care. This tool will not only help understand where data problems are but also help uncover the underlying issues behind them. Develop a tool that can be used alongside a variety of health care database software packages to determine the completeness of individual patient records as well as aggregate patient records across health care centers and subpopulations. The methodology of this project is encapsulated within the Data Completeness Analysis Package (DCAP) tool, with the major components including concept mapping, CSV parsing, and statistical analysis. The results from testing DCAP with Healthcare Cost and Utilization Project (HCUP) State Inpatient Database (SID) data show that this tool is successful in identifying relative data completeness at the patient, subpopulation, and database levels. These results also solidify a need for further analysis and call for hypothesis driven research to find underlying causes for data incompleteness. DCAP examines patient records and generates statistics that can be used to determine the completeness of individual patient data as well as the general thoroughness of record keeping in a medical database. DCAP uses a component that is customized to the settings of the software package used for storing patient data as well as a Comma Separated Values (CSV) file parser to determine the appropriate measurements. DCAP itself is assessed through a proof of concept exercise using hypothetical data as well as available HCUP SID patient data.
Spreadsheet Toolkit for Ulysses Hi-Scale Measurements of Interplanetary Ions and Electrons
NASA Astrophysics Data System (ADS)
Reza, J. Z.; Lanzerotti, L. J.; Denker, C.; Patterson, D.; Amstrong, T. P.
2004-05-01
Throughout the entire Ulysses out-of-the-ecliptic solar polar mission, the Heliosphere Instrument for Spectra, Composition, and Anisotropy at Low Energies (HI-SCALE) has collected measurements of interplanetary ions and electrons. Time-series of electron and ion fluxes obtained since 1990 have been carefully calibrated and will be stored in a data management system, which will be publicly accessible via the WWW. The goal of the Virtual Solar Observatory (VSO) is to provide data uniformly and efficiently to a diverse user community. However, data dissemination can only be a first step, which has to be followed by a suite of data analysis tools that are tailored towards a diverse user community in science, technology, and education. The widespread use and familiarity of spreadsheets, which are available at low cost or open source for many operating systems, make them an interesting tool to investigate for the analysis of HI-SCALE data. The data are written in comma separated variable (CSV) format, which is commonly used in spreadsheet programs. CSV files can simply be linked as external data to spreadsheet templates, which in turn can be used to generate tables and figures of basic statistical properties and frequency distributions, temporal evolution of electron and ion spectra, comparisons of various energy channels, automatic detection of solar events, solar cycle variations, and space weather. Exploring spreadsheet-assisted data analysis in the context of information technology research, data base information search and retrieval, and data visualization potentially impacts other VSO components, where diverse user communities are targeted. Finally, this presentation is the result of an undergraduate research project, which will allow us to evaluate the performance of user-based spreadsheet analysis "benchmarked" at the undergraduate skill level.
A New Paradigm to Analyze Data Completeness of Patient Data
Nasir, Ayan; Liu, Xinliang
2016-01-01
Summary Background There is a need to develop a tool that will measure data completeness of patient records using sophisticated statistical metrics. Patient data integrity is important in providing timely and appropriate care. Completeness is an important step, with an emphasis on understanding the complex relationships between data fields and their relative importance in delivering care. This tool will not only help understand where data problems are but also help uncover the underlying issues behind them. Objectives Develop a tool that can be used alongside a variety of health care database software packages to determine the completeness of individual patient records as well as aggregate patient records across health care centers and subpopulations. Methods The methodology of this project is encapsulated within the Data Completeness Analysis Package (DCAP) tool, with the major components including concept mapping, CSV parsing, and statistical analysis. Results The results from testing DCAP with Healthcare Cost and Utilization Project (HCUP) State Inpatient Database (SID) data show that this tool is successful in identifying relative data completeness at the patient, subpopulation, and database levels. These results also solidify a need for further analysis and call for hypothesis driven research to find underlying causes for data incompleteness. Conclusion DCAP examines patient records and generates statistics that can be used to determine the completeness of individual patient data as well as the general thoroughness of record keeping in a medical database. DCAP uses a component that is customized to the settings of the software package used for storing patient data as well as a Comma Separated Values (CSV) file parser to determine the appropriate measurements. DCAP itself is assessed through a proof of concept exercise using hypothetical data as well as available HCUP SID patient data. PMID:27484918
Ertl, M; Moser, M; Boegle, R; Conrad, J; Zu Eulenburg, P; Dieterich, M
2017-07-15
The vestibular organ senses linear and rotational acceleration of the head during active and passive motion. These signals are necessary for bipedal locomotion, navigation, the coordination of eye and head movements in 3D space. The temporal dynamics of vestibular processing in cortical structures have hardly been studied in humans, let alone with natural stimulation. The aim was to investigate the cortical vestibular network related to natural otolith stimulation using a hexapod motion platform. We conducted two experiments, 1. to estimate the sources of the vestibular evoked potentials (VestEPs) by means of distributed source localization (n=49), and 2. to reveal modulations of the VestEPs through the underlying acceleration intensity (n=24). For both experiments subjects were accelerated along the main axis (left/right, up/down, fore/aft) while the EEG was recorded. We were able to identify five VestEPs (P1, N1, P2, N2, P3) with latencies between 38 and 461 ms as well as an evoked beta-band response peaking with a latency of 68 ms in all subjects and for all acceleration directions. Source localization gave the cingulate sulcus visual (CSv) area and the opercular-insular region as the main origin of the evoked potentials. No lateralization effects due to handedness could be observed. In the second experiment, area CSv was shown to be integral in the processing of acceleration intensities as sensed by the otolith organs, hinting at its potential role in ego-motion detection. These robust VestEPs could be used to investigate the mechanisms of inter-regional interaction in the natural context of vestibular processing and multisensory integration. Copyright © 2017 Elsevier Inc. All rights reserved.
Rosetta: Ensuring the Preservation and Usability of ASCII-based Data into the Future
NASA Astrophysics Data System (ADS)
Ramamurthy, M. K.; Arms, S. C.
2015-12-01
Field data obtained from dataloggers often take the form of comma separated value (CSV) ASCII text files. While ASCII based data formats have positive aspects, such as the ease of accessing the data from disk and the wide variety of tools available for data analysis, there are some drawbacks, especially when viewing the situation through the lens of data interoperability and stewardship. The Unidata data translation tool, Rosetta, is a web-based service that provides an easy, wizard-based interface for data collectors to transform their datalogger generated ASCII output into Climate and Forecast (CF) compliant netCDF files following the CF-1.6 discrete sampling geometries. These files are complete with metadata describing what data are contained in the file, the instruments used to collect the data, and other critical information that otherwise may be lost in one of many README files. The choice of the machine readable netCDF data format and data model, coupled with the CF conventions, ensures long-term preservation and interoperability, and that future users will have enough information to responsibly use the data. However, with the understanding that the observational community appreciates the ease of use of ASCII files, methods for transforming the netCDF back into a CSV or spreadsheet format are also built-in. One benefit of translating ASCII data into a machine readable format that follows open community-driven standards is that they are instantly able to take advantage of data services provided by the many open-source data server tools, such as the THREDDS Data Server (TDS). While Rosetta is currently a stand-alone service, this talk will also highlight efforts to couple Rosetta with the TDS, thus allowing self-publishing of thoroughly documented datasets by the data producers themselves.
Health needs and nursing care.
Petersen, Cristina Buischi; Lima, Regina Aparecida Garcia de; Boemer, Magali Roseira; Rocha, Semiramis Melani Melo
2016-01-01
to present the concept of needs according to different approaches to discuss the possibility of health care that incorporates a broader view of human vulnerabilities in health services. the arguments are founded on nursing theorists who worked on the construction of frameworks relevant to care, based on needs and on philosophers who show the possibility of identifying the vulnerabilities of human beings, defending art as a therapeutic instrument that can promote health care. although care can acquire a new dimension with the introduction of art, according to certain perspectives, philosophical studies on ethics and aesthetics should be resumed to identify human vulnerabilities that can in fact be compensated by sensible understanding of the outer world. To incorporate art in nursing care requires studies from theorists to be recovered, deepening concepts and working on empirical investigations for their adequate use.
A concept analysis of women's vulnerability during pregnancy, birth and the postnatal period.
Briscoe, Lesley; Lavender, Tina; McGowan, Linda
2016-10-01
To report an analysis of the concept of vulnerability associated with pregnancy, birth and the postnatal period. The concept of vulnerability during childbirth is complex and the term, 'to be vulnerable' frequently attains a vague application. Analysis about vulnerability is needed to guide policy, practice, education and research. Clarity around the concept has the potential to improve outcomes for women. Concept analysis. Searches were conducted in CINAHL, EMBASE, PubMed, Psychinfo, MEDLINE, MIDIRS and ASSIA and limited to between January 2000 - June 2014. Data were collected over 12 months during 2014. This concept analysis drew on Morse's qualitative methods. Vulnerability during pregnancy, birth and the postnatal period can be defined by three main attributes: (a) Threat; (b) Barrier; and (c) Repair. Key attributes have the potential to influence outcome for women. Inseparable sub-attributes such as mother and baby attachment, the woman's free will and choice added a level of complexity about the concept. This concept analysis has clarified how the term vulnerability is currently understood and used in relation to pregnancy, birth and the postnatal period. Vulnerability should be viewed as a complex phenomenon rather than a singular concept. A 'vulnerability journey plan' has the potential to identify how reparative interventions may develop the woman's capacity for resilience and influence the degree of vulnerability experienced. Methodology based around complex theory should be explored in future work about vulnerability. © 2016 John Wiley & Sons Ltd.
Providing web-based tools for time series access and analysis
NASA Astrophysics Data System (ADS)
Eberle, Jonas; Hüttich, Christian; Schmullius, Christiane
2014-05-01
Time series information is widely used in environmental change analyses and is also an essential information for stakeholders and governmental agencies. However, a challenging issue is the processing of raw data and the execution of time series analysis. In most cases, data has to be found, downloaded, processed and even converted in the correct data format prior to executing time series analysis tools. Data has to be prepared to use it in different existing software packages. Several packages like TIMESAT (Jönnson & Eklundh, 2004) for phenological studies, BFAST (Verbesselt et al., 2010) for breakpoint detection, and GreenBrown (Forkel et al., 2013) for trend calculations are provided as open-source software and can be executed from the command line. This is needed if data pre-processing and time series analysis is being automated. To bring both parts, automated data access and data analysis, together, a web-based system was developed to provide access to satellite based time series data and access to above mentioned analysis tools. Users of the web portal are able to specify a point or a polygon and an available dataset (e.g., Vegetation Indices and Land Surface Temperature datasets from NASA MODIS). The data is then being processed and provided as a time series CSV file. Afterwards the user can select an analysis tool that is being executed on the server. The final data (CSV, plot images, GeoTIFFs) is visualized in the web portal and can be downloaded for further usage. As a first use case, we built up a complimentary web-based system with NASA MODIS products for Germany and parts of Siberia based on the Earth Observation Monitor (www.earth-observation-monitor.net). The aim of this work is to make time series analysis with existing tools as easy as possible that users can focus on the interpretation of the results. References: Jönnson, P. and L. Eklundh (2004). TIMESAT - a program for analysing time-series of satellite sensor data. Computers and Geosciences 30, 833-845. Verbesselt, J., R. Hyndman, G. Newnham and D. Culvenor (2010). Detecting trend and seasonal changes in satellite image time series. Remote Sensing of Environment, 114, 106-115. DOI: 10.1016/j.rse.2009.08.014 Forkel, M., N. Carvalhais, J. Verbesselt, M. Mahecha, C. Neigh and M. Reichstein (2013). Trend Change Detection in NDVI Time Series: Effects of Inter-Annual Variability and Methodology. Remote Sensing 5, 2113-2144.
Heaslip, Vanessa; Hean, Sarah; Parker, Jonathan
2016-08-09
To present a new etemic model of vulnerability. Despite vulnerability being identified as a core consequence of health and health experiences, there has been little research exploring the meaning of vulnerability as a concept. Yet, being vulnerable is known to have dire physical/mental health consequences. It is therefore a fundamental issue for nurses to address. To date, the meaning of the term vulnerability has been influenced by the work of Spiers (Journal of Advanced Nursing, 31, 2000, 715, The Essential Concepts of Nursing: Building Blocks for Practice, 2005, Elsevier, London). Spiers identified two aspects of vulnerability: the etic (external judgment of another persons' vulnerability) and the emic (internal lived experience of vulnerability). This approach has led to a plethora of research which has explored the etic (external judgment) of vulnerability and rendered the internal lived (or emic) experience invisible. Consequences of this, for marginalised communities such as Gypsy Roma Travellers include a lack of culturally sensitive services compounding health inequalities. Position paper. Drawing upon a qualitative phenomenological research study exploring the lived experience of vulnerability from a Gypsy Roma Travelling community (published previously), this paper presents a new model of vulnerability. This etemic model of vulnerability values both external and internal dimensions of vulnerability and argues for a fusion of these two opposing perspectives. If nurses and other health- and social care professionals wish to develop practice that is successful in engaging with Gypsy Roma Travellers, then there is a need to both understand and respect their community. This can be achieved through an etemic approach to understanding their vulnerability achieved by eliciting lived experience alongside the appreciation of epidemiological studies. If nurses and health practitioners used this etemic approach to practice then it would enable both the development and delivery of culturally sensitive services facilitating health access to this community. Only then, will their poor health status be successfully addressed. © 2016 John Wiley & Sons Ltd.
Exploring the impact of underage sex work among female sex workers in two Mexico-U.S. border cities
Goldenberg, Shira M; Rangel, Gudelia; Vera, Alicia; Patterson, Thomas L; Abramovitz, Daniela; Silverman, Jay G; Raj, Anita; Strathdee, Steffanie A
2011-01-01
Although sex work and younger age increase HIV vulnerability, empirical data regarding the impacts of underage sex work are lacking. We explored associations between features of the risk environment, sex work and drug use history, and underage sex work entry among 624 female sex workers(FSWs) in Tijuana and Ciudad Juarez, Mexico. Forty-one percent (n=253) of women began sex work as minors, among whom HIV and any STI/HIV prevalence were 5.2% and 60.7%. Factors independently associated with increased odds of underage sex work were inhalants as the first drug used, forced first injection, number of drug treatment attempts, and recent receptive syringe-sharing. Number of recent condom negotiation attempts with steady partners and depression as a reason for first injecting were negatively associated with underage entry. These results underscore the importance of efforts to prevent underage sex work and the wider factors contributing to HIV risk among vulnerable youth and underage FSWs. PMID:22012147
Exploring the impact of underage sex work among female sex workers in two Mexico-US border cities.
Goldenberg, Shira M; Rangel, Gudelia; Vera, Alicia; Patterson, Thomas L; Abramovitz, Daniela; Silverman, Jay G; Raj, Anita; Strathdee, Steffanie A
2012-05-01
Although sex work and younger age increase HIV vulnerability, empirical data regarding the impacts of underage sex work are lacking. We explored associations between features of the risk environment, sex work, and drug use history, and underage sex work entry among 624 female sex workers (FSWs) in Tijuana and Ciudad Juarez, Mexico. Forty-one percent (n = 253) of women began sex work as minors, among whom HIV and any STI/HIV prevalence were 5.2 and 60.7%. Factors independently associated with increased odds of underage sex work were inhalants as the first drug used, forced first injection, number of drug treatment attempts, and recent receptive syringe sharing. Number of recent condom negotiation attempts with steady partners and depression as a reason for first injecting were negatively associated with underage entry. These results underscore the importance of efforts to prevent underage sex work and the wider factors contributing to HIV risk among vulnerable youth and underage FSWs.
Selling sex in unsafe spaces: sex work risk environments in Phnom Penh, Cambodia
2011-01-01
Background The risk environment framework provides a valuable but under-utilised heuristic for understanding environmental vulnerability to HIV and other sexually transmitted infections among female sex workers. Brothels have been shown to be safer than street-based sex work, with higher rates of consistent condom use and lower HIV prevalence. While entertainment venues are also assumed to be safer than street-based sex work, few studies have examined environmental influences on vulnerability to HIV in this context. Methods As part of the Young Women's Health Study, a prospective observational study of young women (15-29 years) engaged in sex work in Phnom Penh, we conducted in-depth interviews (n = 33) to explore vulnerability to HIV/STI and related harms. Interviews were conducted in Khmer by trained interviewers, transcribed and translated into English and analysed for thematic content. Results The intensification of anti-prostitution and anti-trafficking efforts in Cambodia has increased the number of women working in entertainment venues and on the street. Our results confirm that street-based sex work places women at risk of HIV/STI infection and identify significant environmental risks related to entertainment-based sex work, including limited access to condoms and alcohol-related intoxication. Our data also indicate that exposure to violence and interactions with the police are mediated by the settings in which sex is sold. In particular, transacting sex in environments such as guest houses where there is little or no oversight in the form of peer or managerial support or protection, may increase vulnerability to HIV/STI. Conclusions Entertainment venues may also provide a high risk environment for sex work. Our results indicate that strategies designed to address HIV prevention among brothel-based FSWs in Cambodia have not translated well to street and entertainment-based sex work venues in which increasing numbers of women are working. There is an urgent need for targeted interventions, supported by legal and policy reforms, designed to reduce the environmental risks of sex work in these settings. Future research should seek to investigate sex work venues as risk environments, explore the role of different business models in mediating these environments, and identify and quantify exposure to risk in different occupational settings. PMID:22099449
ERIC Educational Resources Information Center
Luguetti, Carla; Oliver, Kimberly L.; Dantas, Luiz Eduardo Pinto Basto Tourinho; Kirk, David
2017-01-01
Purpose: This study was a 2-phase activist research project aimed at co-creating a prototype pedagogical model for working with youth from socially vulnerable backgrounds in a sport context. This article addresses the learning aspirations (learning outcomes) that emerged when we created spaces for youth to develop strategies to manage the risks…
ERIC Educational Resources Information Center
Monds-Watson, Aisling; Manktelow, Roger; McColgan, Mary
2010-01-01
The 40 substantive rights contained within the United Nations Convention on the Rights of the Child (UNCRC) 1989, have applied, without discrimination, to all children in the United Kingdom since 1992. However, recurrent tragedies starkly highlight the potential vulnerability of some children when their parents experience mental health…
It Feels Like Home: The Role of the Aesthetic Space in Participatory Work with Vulnerable Children
ERIC Educational Resources Information Center
Hunka, Emily
2015-01-01
The author's entry into the Applied Theatre field coincided with "Research in Drama Education" ("RiDE's") inaugural issue in 1996 and, for the ensuing two decades, her practice has been primarily with "vulnerable" children. The purpose of this article is to interrogate a growing concern: that applied theatre's…
Transformative Inquiry While Learning-Teaching: Entry Points Through Mentor-Mentee Vulnerability
ERIC Educational Resources Information Center
Tanaka, Michele T. D.; Farish, Maureen; Nicholson, Diana; Tse, Vanessa; Doll, Jenn; Archer, Elizabeth
2014-01-01
In Transformative Inquiry (TI), pre-service teachers explore issues about which they are personally passionate in order to enter into the delicate work of transformation. We examine how shared vulnerability within three mentor-mentee pairs leads to new pedagogical possibilities. Michele and Vanessa discuss poetry as a way of entering into TI and…
ERIC Educational Resources Information Center
Ribeiro, Marcelo Afonso; da Conceição Coropos Uvaldo, Maria; da Silva, Fabiano Fonseca
2015-01-01
Facing a working world more flexible, unstable and potentially generator of vulnerabilities, the career counselling has required contemporary approaches that meet these demands, which ones have been present in Latin America for a long time. Thus, the present paper aimed to analyse some Latin American proposals and highlight general principles to…
Lee, Ching-Yi; Chen, Hsi-Chung; Meg Tseng, Mei-Chih; Lee, Hsin-Chien; Huang, Lian-Hua
2015-09-01
Shift work is a prominent feature of most nursing jobs. Although chronotype, emotional disturbance, and insomnia vulnerability are important factors for patients with insomnia in general, their effects on shift nurses are unknown. This study explores the relationships between the sleep quality of shift nurses and the variables of chronotype, emotional disturbance, and insomnia vulnerability. A survey was conducted with 398 shift nurses in a medical center. Chronotype, emotional disturbance, insomnia vulnerability, and sleep quality were evaluated using the Smith Morningness-Eveningness Questionnaire, the Brief Symptom Rating Scale, the Ford Insomnia Response to Stress Test, and the Pittsburgh Sleep Quality Index, respectively. On the Pittsburgh Sleep Quality Index, 70.1% of the participants scored higher than 5. Multiple regression analysis revealed that, together with night shift work (b [SE] = 1.05 [0.35], p = .003), higher levels of emotional disturbance (b [SE] = 0.30 [0.05], p < .001) and higher insomnia vulnerability (b [SE] = 0.18 [0.03], p < .001) were predictors of poor sleep quality and that chronotype was not a predictor of poor sleep quality. The multiple mediator model indicated that emotional disturbance significantly mediated an indirect effect of evening chronotype preference on poor subjective sleep quality (one subscale of the Pittsburgh Sleep Quality Index). In addition to shift patterns, emotional disturbance and high insomnia vulnerability are factors that may be used to identify shift nurses who face a higher risk of sleep disturbance. Because evening chronotype may indirectly influence subjective sleep quality through the pathway of emotional disturbance, further research into the mechanism that underlies this pathway is warranted.
Sexual hazards, life experiences and social circumstances among male sex workers in Nigeria.
Okanlawon, Kehinde; Adebowale, Ayo Stephen; Titilayo, Ayotunde
2013-01-01
The sexual health and rights needs of male sex workers in Nigeria remain poorly understood and served. Men who sell sex are at high risk of discrimination and violation because of laws criminalising same-sex activity and sex work. This paper examines the experiences, social circumstances, vulnerabilities and sexual hazards experienced by male sex workers in Nigeria. In-depth interviews were used to explore the experiences of six male sex workers who were selected by means of convenience sampling from among those who came for counselling. Findings reveal that economic disadvantage drives some men to engage in sex work and risky sexual behaviour. Subsequently, sex work may put their lives and health at risk as a result of violation by the police and clients, including ritual murder. Men's extreme vulnerability points to the need for appropriate interventions to improve well-being. Sexual health and rights programmes must identify ways of making male sex workers less vulnerable to abuse, and devise strategies for protecting their health and human rights, while empowering them economically to reduce their dependency on often risky sexual behaviour for livelihoods.
Welch, Mary Jane; Lally, Rachel; Miller, Jennifer E; Pittman, Stephanie; Brodsky, Lynda; Caplan, Arthur L; Uhlenbrauck, Gina; Louzao, Darcy M; Fischer, James H; Wilfond, Benjamin
2015-10-01
Policies have been developed to protect vulnerable populations in clinical research, including the US federal research regulations (45 Code of Federal Regulations 46 Subparts B, C, and D). These policies generally recognize vulnerable populations to include pregnant women, fetuses, neonates, children, prisoners, persons with physical handicaps or mental disabilities, and disadvantaged persons. The aim has been to protect these populations from harm, often by creating regulatory and ethical checks that may limit their participation in many clinical trials. The recent increase in pragmatic clinical trials raises at least two questions about this approach. First, is exclusion itself a harm to vulnerable populations, as these groups may be denied access to understanding how health interventions work for them in clinical settings? Second, are groups considered vulnerable in traditional clinical trials also vulnerable in pragmatic clinical trials? We argue first that excluding vulnerable subjects from participation in pragmatic clinical trials can be harmful by preventing acquisition of data to meaningfully inform clinical decision-making in the future. Second, we argue that protections for vulnerable subjects in traditional clinical trial settings may not be translatable, feasible, or even ethical to apply in pragmatic clinical trials. We conclude by offering specific recommendations for appropriately protecting vulnerable research subjects in pragmatic clinical trials, focusing on pregnant women, fetuses, neonates, children, prisoners, persons with physical handicaps or mental disabilities, and disadvantaged persons. © The Author(s) 2015.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Allan, Benjamin A.
We report on the use and design of a portable, extensible performance data collection tool motivated by modeling needs of the high performance computing systems co-design com- munity. The lightweight performance data collectors with Eiger support is intended to be a tailorable tool, not a shrink-wrapped library product, as pro ling needs vary widely. A single code markup scheme is reported which, based on compilation ags, can send perfor- mance data from parallel applications to CSV les, to an Eiger mysql database, or (in a non-database environment) to at les for later merging and loading on a host with mysqlmore » available. The tool supports C, C++, and Fortran applications.« less
2013-01-01
Background A growing body of work shows the benefits of applying social cognitive behavioural theory to investigate infection control and biosecurity practices. Protection motivation theory has been used to predict protective health behaviours. The theory outlines that a perception of a lack of vulnerability to a disease contributes to a reduced threat appraisal, which results in poorer motivation, and is linked to poorer compliance with advised health protective behaviours. This study, conducted following the first-ever outbreak of equine influenza in Australia in 2007, identified factors associated with horse managers’ perceived vulnerability to a future equine influenza outbreak. Results Of the 200 respondents, 31.9% perceived themselves to be very vulnerable, 36.6% vulnerable and 31.4% not vulnerable to a future outbreak of equine influenza. Multivariable logistic regression modelling revealed that managers involved in horse racing and those on rural horse premises perceived themselves to have low levels of vulnerability. Managers of horse premises that experienced infection in their horses in 2007 and those seeking infection control information from specific sources reported increased levels of perceived vulnerability to a future outbreak. Conclusion Different groups across the horse industry perceived differing levels of vulnerability to a future outbreak. Increased vulnerability contributes to favourable infection control behaviour and hence these findings are important for understanding uptake of recommended infection control measures. Future biosecurity communication strategies should be delivered through information sources suitable for the horse racing and rural sectors. PMID:23902718
Schemann, Kathrin; Firestone, Simon M; Taylor, Melanie R; Toribio, Jenny-Ann L M L; Ward, Michael P; Dhand, Navneet K
2013-07-31
A growing body of work shows the benefits of applying social cognitive behavioural theory to investigate infection control and biosecurity practices. Protection motivation theory has been used to predict protective health behaviours. The theory outlines that a perception of a lack of vulnerability to a disease contributes to a reduced threat appraisal, which results in poorer motivation, and is linked to poorer compliance with advised health protective behaviours. This study, conducted following the first-ever outbreak of equine influenza in Australia in 2007, identified factors associated with horse managers' perceived vulnerability to a future equine influenza outbreak. Of the 200 respondents, 31.9% perceived themselves to be very vulnerable, 36.6% vulnerable and 31.4% not vulnerable to a future outbreak of equine influenza. Multivariable logistic regression modelling revealed that managers involved in horse racing and those on rural horse premises perceived themselves to have low levels of vulnerability. Managers of horse premises that experienced infection in their horses in 2007 and those seeking infection control information from specific sources reported increased levels of perceived vulnerability to a future outbreak. Different groups across the horse industry perceived differing levels of vulnerability to a future outbreak. Increased vulnerability contributes to favourable infection control behaviour and hence these findings are important for understanding uptake of recommended infection control measures. Future biosecurity communication strategies should be delivered through information sources suitable for the horse racing and rural sectors.
Orellana, E Roberto; Alva, Isaac E; Cárcamo, Cesar P; García, Patricia J
2013-09-01
We examined structural factors-social, political, economic, and environmental-that increase vulnerability to HIV among indigenous people in the Peruvian Amazon. Indigenous adults belonging to 12 different ethnic groups were purposively recruited in four Amazonian river ports and 16 indigenous villages. Qualitative data revealed a complex set of structural factors that give rise to environments of risk where health is constantly challenged. Ferryboats that cross Amazonian rivers are settings where unprotected sex-including transactional sex between passengers and boat crew and commercial sex work-often take place. Population mobility and mixing also occurs in settings like the river docks, mining sites, and other resource extraction camps, where heavy drinking and unprotected sex work are common. Multilevel, combination prevention strategies that integrate empirically based interventions with indigenous knowledge are urgently needed, not only to reduce vulnerability to HIV transmission, but also to eliminate the structural determinants of indigenous people's health.
Understanding Risk Tolerance and Building an Effective Safety Culture
NASA Technical Reports Server (NTRS)
Loyd, David
2018-01-01
Estimates range from 65-90 percent of catastrophic mishaps are due to human error. NASA's human factors-related mishaps causes are estimated at approximately 75 percent. As much as we'd like to error-proof our work environment, even the most automated and complex technical endeavors require human interaction... and are vulnerable to human frailty. Industry and government are focusing not only on human factors integration into hazardous work environments, but also looking for practical approaches to cultivating a strong Safety Culture that diminishes risk. Industry and government organizations have recognized the value of monitoring leading indicators to identify potential risk vulnerabilities. NASA has adapted this approach to assess risk controls associated with hazardous, critical, and complex facilities. NASA's facility risk assessments integrate commercial loss control, OSHA (Occupational Safety and Health Administration) Process Safety, API (American Petroleum Institute) Performance Indicator Standard, and NASA Operational Readiness Inspection concepts to identify risk control vulnerabilities.
Chuah, Joon Hao; Lok, Benjamin; Black, Erik
2013-04-01
Health sciences students often practice and are evaluated on interview and exam skills by working with standardized patients (people that role play having a disease or condition). However, standardized patients do not exist for certain vulnerable populations such as children and the intellectually disabled. As a result, students receive little to no exposure to vulnerable populations before becoming working professionals. To address this problem and thereby increase exposure to vulnerable populations, we propose using virtual humans to simulate members of vulnerable populations. We created a mixed reality pediatric patient that allowed students to practice pediatric developmental exams. Practicing several exams is necessary for students to understand how to properly interact with and correctly assess a variety of children. Practice also increases a student's confidence in performing the exam. Effective practice requires students to treat the virtual child realistically. Treating the child realistically might be affected by how the student and virtual child physically interact, so we created two object interaction interfaces - a natural interface and a mouse-based interface. We tested the complete mixed reality exam and also compared the two object interaction interfaces in a within-subjects user study with 22 participants. Our results showed that the participants accepted the virtual child as a child and treated it realistically. Participants also preferred the natural interface, but the interface did not affect how realistically participants treated the virtual child.
Heat Wave Vulnerability Mapping for India.
Azhar, Gulrez; Saha, Shubhayu; Ganguly, Partha; Mavalankar, Dileep; Madrigano, Jaime
2017-03-30
Assessing geographic variability in heat wave vulnerability forms the basis for planning appropriate targeted adaptation strategies. Given several recent deadly heatwaves in India, heat is increasingly being recognized as a public health problem. However, to date there has not been a country-wide assessment of heat vulnerability in India. We evaluated demographic, socioeconomic, and environmental vulnerability factors and combined district level data from several sources including the most recent census, health reports, and satellite remote sensing data. We then applied principal component analysis (PCA) on 17 normalized variables for each of the 640 districts to create a composite Heat Vulnerability Index (HVI) for India. Of the total 640 districts, our analysis identified 10 and 97 districts in the very high and high risk categories (> 2SD and 2-1SD HVI) respectively. Mapping showed that the districts with higher heat vulnerability are located in the central parts of the country. On examination, these are less urbanized and have low rates of literacy, access to water and sanitation, and presence of household amenities. Therefore, we concluded that creating and mapping a heat vulnerability index is a useful first step in protecting the public from the health burden of heat. Future work should incorporate heat exposure and health outcome data to validate the index, as well as examine sub-district levels of vulnerability.
NASA Astrophysics Data System (ADS)
Liu, D. L.; Li, Y.
2015-11-01
Evaluating social vulnerability is a crucial issue in risk and disaster management. In this study, a household social vulnerability index (HSVI) to flood hazards was developed and used to assess the social vulnerability of rural households in western mountainous regions of Henan province, China. Eight key indicators were indentified through interactive discussions with multidisciplinary specialists and local farmers, and their weights were determined using principle component analysis (PCA). The results showed that (1) the ratio of perennial working in other places, hazard-related training and illiteracy ratio (15+) were the most dominant factors to social vulnerability. (2) The numbers of high, moderate and low vulnerable households were 14, 64 and 16, respectively, which accounted for 14.9, 68.1, and 17.0 % of the total interviewed rural households, respectively. (3) The correlation coefficient between household social vulnerability scores and casualties in a storm flood in July 2010 was significant at 0.05 significance level (r = 0.248), which indicated that the selected indicators and their weights were valid. (4) Some mitigation strategies to reduce the household social vulnerability to flood hazards were proposed based on the assessment results. The results provide useful information for rural households and local governments to prepare, mitigate and response to flood hazards.
2017-01-01
Severe and morbid obesity are associated with highly elevated risks of adverse health outcomes and the prevalence of severe obesity is increasing globally. To date, disaster literature has not considered severe and morbid obesity as a specific vulnerability, despite reports of people being left behind during disasters because of their body size, shape or weight. The complex causes of obesity are associated with the social determinants of health and one’s potential vulnerability to disasters. The absence of appropriate considerations may lead to people being exposed to disproportionate and potentially avoidable risk. The intersection of the social determinants of health, disaster vulnerability, severe and morbid obesity is explored. Previously identified vulnerable groups are also represented in severe and morbid obesity data. This poses the prospect for ‘triple jeopardy’ compounding the social determinants of health, disaster vulnerability and considerations with and for people with morbid obesity. When working to reduce disaster risk for vulnerable groups, the author proposes specific consideration is required to ensure ‘all-of-society engagement and partnership’ in an inclusive, accessible and non-discriminatory manner, to ensure no one is left behind.
Tran, Kathy V; Azhar, Gulrez S; Nair, Rajesh; Knowlton, Kim; Jaiswal, Anjali; Sheffield, Perry; Mavalankar, Dileep; Hess, Jeremy
2013-06-18
Extreme heat is a significant public health concern in India; extreme heat hazards are projected to increase in frequency and severity with climate change. Few of the factors driving population heat vulnerability are documented, though poverty is a presumed risk factor. To facilitate public health preparedness, an assessment of factors affecting vulnerability among slum dwellers was conducted in summer 2011 in Ahmedabad, Gujarat, India. Indicators of heat exposure, susceptibility to heat illness, and adaptive capacity, all of which feed into heat vulnerability, was assessed through a cross-sectional household survey using randomized multistage cluster sampling. Associations between heat-related morbidity and vulnerability factors were identified using multivariate logistic regression with generalized estimating equations to account for clustering effects. Age, preexisting medical conditions, work location, and access to health information and resources were associated with self-reported heat illness. Several of these variables were unique to this study. As sociodemographics, occupational heat exposure, and access to resources were shown to increase vulnerability, future interventions (e.g., health education) might target specific populations among Ahmedabad urban slum dwellers to reduce vulnerability to extreme heat. Surveillance and evaluations of future interventions may also be worthwhile.
Small Hands: Children in the Working World. Working Paper Number 16.
ERIC Educational Resources Information Center
Marcus, Rachel; Harper, Caroline
Recognizing the vulnerability of working children to possible exploitation and abuse, this report examines remunerated and unremunerated work performed by children worldwide, ranging from child labor in factories and agriculture to work conducted within the family household. Section 1 of the report describes the scale and importance of children's…
Ruptures of vulnerability: Linda Stein's Knight Series.
Bible, Ann Vollmann
2010-01-01
Drawing on the work of Monique Wittig, this article understands Linda Stein's Knight Series as a lacunary writing communicating both her challenges to come to representation and her creative registration of subjectivity. The argument is grounded in an exploration of the rich interplay of power and vulnerability across the series as against the discourse of escapist fashion. Specifically, Stein's critical contradictions of inside and outside, conflated temporality, disjunctions between decoration and abstraction, and fluidity of sex and gender are examined. The discussion is elaborated through consideration of the work of Julia Kristeva, Elizabeth Grosz, and Hayao Miyazaki.
The effects of loneliness on telemarketing fraud vulnerability among older adults.
Alves, Linda M; Wilson, Steve R
2008-01-01
Older adults are disproportionately affected by telemarketing fraud, especially those who are socially isolated. Twenty-eight older adult telemarketing fraud victims completed a questionnaire assessing loneliness and other variables related to telemarketing fraud vulnerability. Victims tended to be male, divorced/separated, and college-educated, between ages of 60 and 70. Age and marital status were significantly associated with loneliness. This study is an important first step for additional research in this area and may enhance the prevention and intervention efforts of social service providers who work with older adults who may be most vulnerable.
Climate challenges, vulnerabilities, and food security
Nelson, Margaret C.; Ingram, Scott E.; Dugmore, Andrew J.; Streeter, Richard; Peeples, Matthew A.; McGovern, Thomas H.; Hegmon, Michelle; Arneborg, Jette; Brewington, Seth; Spielmann, Katherine A.; Simpson, Ian A.; Strawhacker, Colleen; Comeau, Laura E. L.; Torvinen, Andrea; Madsen, Christian K.; Hambrecht, George; Smiarowski, Konrad
2016-01-01
This paper identifies rare climate challenges in the long-term history of seven areas, three in the subpolar North Atlantic Islands and four in the arid-to-semiarid deserts of the US Southwest. For each case, the vulnerability to food shortage before the climate challenge is quantified based on eight variables encompassing both environmental and social domains. These data are used to evaluate the relationship between the “weight” of vulnerability before a climate challenge and the nature of social change and food security following a challenge. The outcome of this work is directly applicable to debates about disaster management policy. PMID:26712017
Climate challenges, vulnerabilities, and food security.
Nelson, Margaret C; Ingram, Scott E; Dugmore, Andrew J; Streeter, Richard; Peeples, Matthew A; McGovern, Thomas H; Hegmon, Michelle; Arneborg, Jette; Kintigh, Keith W; Brewington, Seth; Spielmann, Katherine A; Simpson, Ian A; Strawhacker, Colleen; Comeau, Laura E L; Torvinen, Andrea; Madsen, Christian K; Hambrecht, George; Smiarowski, Konrad
2016-01-12
This paper identifies rare climate challenges in the long-term history of seven areas, three in the subpolar North Atlantic Islands and four in the arid-to-semiarid deserts of the US Southwest. For each case, the vulnerability to food shortage before the climate challenge is quantified based on eight variables encompassing both environmental and social domains. These data are used to evaluate the relationship between the "weight" of vulnerability before a climate challenge and the nature of social change and food security following a challenge. The outcome of this work is directly applicable to debates about disaster management policy.
Narrowing the Gap in Outcomes for Vulnerable Groups: A Review of the Research Evidence
ERIC Educational Resources Information Center
Kendall, Sally; Straw, Suzanne; Jones, Megan; Springate, Iain; Grayson, Hilary
2008-01-01
This report presents findings from a review of the best evidence on narrowing the gap in outcomes across the five Every Child Matters (ECM) areas for vulnerable groups in the context of improving outcomes for all. The review was commissioned to prepare the ground for work on "Narrowing the Gap" with participating local authorities (LAs).…
Safeguarding Vulnerable Groups Act 2006: The Implications for Employers in Educational Settings
ERIC Educational Resources Information Center
Oliver, Hazel; White, Laura
2008-01-01
Vetting those who work with children and vulnerable adults is an emotive topic and one which can prove a challenging area for employers. The legitimate interest that parents, carers and employers have in screening those charged with the care of others can be in direct conflict with the most fundamental principles of economic freedom and employees'…
ERIC Educational Resources Information Center
Peters, Ardith A.; McClatchey, Irene S.
2017-01-01
This paper addresses how professors in a Social Work and Human Services Program in the Southeastern United States include voices of the oppressed and vulnerable through art forms to develop analytical thinking to prepare human service practitioners. This pedagogical practice is based on Gardner's discussion of Multiple Intelligences. The authors…
USDA-ARS?s Scientific Manuscript database
Better understanding of vulnerability of coastal habitats to sea level rise and major storm events require the use of simulation models. Coastal habitats also undergo frequent nourishment restoration works in order to maintain their viability. Vulnerability models must be able to assess the combined...
When study participants are vulnerable: getting and keeping the right team.
Hill, Nikki L; Mogle, Jacqueline; Wion, Rachel; Kolanowski, Ann M; Fick, Donna; Behrens, Liza; Muhall, Paula; McDowell, Jane
2017-09-19
Research assistants (RAs) are critical members of all research teams. When a study involves vulnerable populations, it is particularly important to have the right team members. To describe the motivations, personal characteristics and team characteristics that promoted the job satisfaction of RAs who worked on two multi-year, randomised clinical trials involving older adults with dementia. A survey was conducted with 41 community members who worked as RAs for up to five years. Measures included demographics, work engagement, personality and characteristics of effective teams, as well as open-ended questions about respondents' experiences of the study. Quantitative analyses and coding of open-ended responses were used to summarise results. Almost all the RAs surveyed joined the team because of previous experiences of interacting with cognitively impaired older people. The RA respondents scored higher in 'dedication to work', 'extraversion', 'agreeableness' and 'conscientiousness' than average. An important aspect of their job satisfaction was team culture, including positive interpersonal interaction and the development of supportive team relationships. A positive work culture provides RAs with an opportunity to work with a study population that they are personally driven to help, and promotes motivation and satisfaction in team members. Results from this study can guide the recruitment, screening and retention of team members for studies that include vulnerable populations. ©2012 RCN Publishing Company Ltd. All rights reserved. Not to be copied, transmitted or recorded in any way, in whole or part, without prior permission of the publishers.
Working with HITRAN Database Using Hapi: HITRAN Application Programming Interface
NASA Astrophysics Data System (ADS)
Kochanov, Roman V.; Hill, Christian; Wcislo, Piotr; Gordon, Iouli E.; Rothman, Laurence S.; Wilzewski, Jonas
2015-06-01
A HITRAN Application Programing Interface (HAPI) has been developed to allow users on their local machines much more flexibility and power. HAPI is a programming interface for the main data-searching capabilities of the new "HITRANonline" web service (http://www.hitran.org). It provides the possibility to query spectroscopic data from the HITRAN database in a flexible manner using either functions or query language. Some of the prominent current features of HAPI are: a) Downloading line-by-line data from the HITRANonline site to a local machine b) Filtering and processing the data in SQL-like fashion c) Conventional Python structures (lists, tuples, and dictionaries) for representing spectroscopic data d) Possibility to use a large set of third-party Python libraries to work with the data e) Python implementation of the HT lineshape which can be reduced to a number of conventional line profiles f) Python implementation of total internal partition sums (TIPS-2011) for spectra simulations g) High-resolution spectra calculation accounting for pressure, temperature and optical path length h) Providing instrumental functions to simulate experimental spectra i) Possibility to extend HAPI's functionality by custom line profiles, partitions sums and instrumental functions Currently the API is a module written in Python and uses Numpy library providing fast array operations. The API is designed to deal with data in multiple formats such as ASCII, CSV, HDF5 and XSAMS. This work has been supported by NASA Aura Science Team Grant NNX14AI55G and NASA Planetary Atmospheres Grant NNX13AI59G. L.S. Rothman et al. JQSRT, Volume 130, 2013, Pages 4-50 N.H. Ngo et al. JQSRT, Volume 129, November 2013, Pages 89-100 A. L. Laraia at al. Icarus, Volume 215, Issue 1, September 2011, Pages 391-400
The Female Sex Work Industry in a District of India in the Context of HIV Prevention
Buzdugan, Raluca; Halli, Shiva S.; Hiremath, Jyoti M.; Jayanna, Krishnamurthy; Raghavendra, T.; Moses, Stephen; Blanchard, James; Scambler, Graham; Cowan, Frances
2012-01-01
HIV prevalence in India remains high among female sex workers. This paper presents the main findings of a qualitative study of the modes of operation of female sex work in Belgaum district, Karnataka, India, incorporating fifty interviews with sex workers. Thirteen sex work settings (distinguished by sex workers' main places of solicitation and sex) are identified. In addition to previously documented brothel, lodge, street, dhaba (highway restaurant), and highway-based sex workers, under-researched or newly emerging sex worker categories are identified, including phone-based sex workers, parlour girls, and agricultural workers. Women working in brothels, lodges, dhabas, and on highways describe factors that put them at high HIV risk. Of these, dhaba and highway-based sex workers are poorly covered by existing interventions. The paper examines the HIV-related vulnerability factors specific to each sex work setting. The modes of operation and HIV-vulnerabilities of sex work settings identified in this paper have important implications for the local programme. PMID:23346389
The Female Sex Work Industry in a District of India in the Context of HIV Prevention.
Buzdugan, Raluca; Halli, Shiva S; Hiremath, Jyoti M; Jayanna, Krishnamurthy; Raghavendra, T; Moses, Stephen; Blanchard, James; Scambler, Graham; Cowan, Frances
2012-01-01
HIV prevalence in India remains high among female sex workers. This paper presents the main findings of a qualitative study of the modes of operation of female sex work in Belgaum district, Karnataka, India, incorporating fifty interviews with sex workers. Thirteen sex work settings (distinguished by sex workers' main places of solicitation and sex) are identified. In addition to previously documented brothel, lodge, street, dhaba (highway restaurant), and highway-based sex workers, under-researched or newly emerging sex worker categories are identified, including phone-based sex workers, parlour girls, and agricultural workers. Women working in brothels, lodges, dhabas, and on highways describe factors that put them at high HIV risk. Of these, dhaba and highway-based sex workers are poorly covered by existing interventions. The paper examines the HIV-related vulnerability factors specific to each sex work setting. The modes of operation and HIV-vulnerabilities of sex work settings identified in this paper have important implications for the local programme.
NASA Astrophysics Data System (ADS)
Wang, Zhiqiang; Jiang, Jingyi; Ma, Qing
2016-12-01
Climate change is affecting every aspect of human activities, especially the agriculture. In China, extreme drought events caused by climate change have posed a great threat to food safety. In this work we aimed to study the drought risk of maize in the farming-pastoral ecotone in Northern China based on physical vulnerability assessment. The physical vulnerability curve was constructed from the relationship between drought hazard intensity index and yield loss rate. The risk assessment of agricultural drought was conducted from the drought hazard intensity index and physical vulnerability curve. The probability distribution of drought hazard intensity index decreased from south-west to north-east and increased from south-east to north-west along the rainfall isoline. The physical vulnerability curve had a reduction effect in three parts of the farming-pastoral ecotone in Northern China, which helped to reduce drought hazard vulnerability on spring maize. The risk of yield loss ratio calculated based on physical vulnerability curve was lower compared with the drought hazard intensity index, which suggested that the capacity of spring maize to resist and adapt to drought is increasing. In conclusion, the farming-pastoral ecotone in Northern China is greatly sensitive to climate change and has a high probability of severe drought hazard. Risk assessment of physical vulnerability can help better understand the physical vulnerability to agricultural drought and can also promote measurements to adapt to climate change.
Community-based cardiovascular health interventions in vulnerable populations: a systematic review.
Walton-Moss, Benita; Samuel, Laura; Nguyen, Tam H; Commodore-Mensah, Yvonne; Hayat, Matthew J; Szanton, Sarah L
2014-07-01
Although cardiovascular health has been improving for many Americans, this is not true of those in "vulnerable populations." To address this growing disparity, communities and researchers have worked for decades, and as a result of their work, a growing body of literature supports the use of community engagement as a component of successful interventions. However, little literature synthesizes community-based interventions that address this disparity among a wide range of vulnerable populations. This article provides a critical review of community-based cardiovascular disease interventions to improve cardiovascular health behaviors and factors among vulnerable populations based on the American Heart Association's 7 metrics of ideal cardiovascular health. In February 2011, 4 databases (PubMed, PsychInfo, CINAHL, and Scopus) were searched using the following keywords: vulnerable populations OR healthcare disparities AND cardiovascular disease AND clinical trials OR public health practice AND English. This search strategy resulted in the retrieval of 7120 abstracts. Each abstract was reviewed by at least 2 authors, and eligibility for the systematic review was confirmed after reading the full article. Thirty-two studies met eligibility criteria. Education was the most common intervention (41%), followed by counseling or support (38%) and exercise classes (28%). Half of the interventions were multicomponent. Healthcare providers were the most frequent interventionists. Interventions aimed at decreasing blood pressure were the most promising, whereas behavior change interventions were the most challenging. Almost all of the interventions were at the individual level and were proof-of-concept or efficacy trials. This analysis provides a step toward understanding the current literature on cardiovascular interventions for vulnerable population. The next step should be integrating the identified successful interventions into larger health systems and/or social policies.
Community Based Cardiovascular Health Interventions in Vulnerable Populations: A Systematic Review
Walton-Moss, Benita; Samuel, Laura; Nguyen, Tam H; Commodore-Mensah, Yvonne; Hayat, Matthew J.; Szanton, Sarah L.
2013-01-01
Background Although cardiovascular health has been improving for many Americans, this is not true of those in “vulnerable populations.” To address this growing disparity communities and researchers have worked for decades, and as a result of their work a growing body of literature supports the use of community engagement as a component of successful interventions. However, little literature synthesizes community-based interventions that address this disparity among a wide range of vulnerable populations. Objective This paper provides a critical review of community-based cardiovascular disease (CVD) interventions to improve cardiovascular health behaviors and factors among vulnerable populations based on the American Heart Association’s 7 metrics of ideal cardiovascular health. Methods In February 2011, four databases (PubMed, PsychInfo, CINAHL, and Scopus) were searched using the following keywords: vulnerable populations OR healthcare disparities AND cardiovascular disease AND clinical trials OR public health practice AND English. Results This search strategy resulted in the retrieval of 7,120 abstracts. Each abstract was reviewed by at least two authors and eligibility for the systematic review was confirmed after reading the full article. Thirty two studies met eligibility criteria. Education was the most common intervention (41%), followed by counseling or support (38%), and exercise classes (28%). Half of the interventions were multi-component. Health care providers were the most frequent interventionists. Interventions aimed at decreasing blood pressure were the most promising while behavior change interventions were the most challenging. Almost all of the interventions were at the individual level, and were proof of concept or efficacy trials. Conclusions This analysis provides a step towards understanding the current literature on cardiovascular interventions for vulnerable population. The next step should be integrating the identified successful interventions into larger health systems and/or social policies. PMID:23612036
Beard, Jennifer; Biemba, Godfrey; Brooks, Mohamad I; Costello, Jill; Ommerborn, Mark; Bresnahan, Megan; Flynn, David; Simon, Jonathon L
2010-06-23
Injection drug users and female sex workers are two of the populations most at risk for becoming infected with HIV in countries with concentrated epidemics. Many of the adults who fall into these categories are also parents, but little is known about the vulnerabilities faced by their children, their children's sources of resilience, or programmes providing services to these often fragile families. This review synthesizes evidence from disparate sources describing the vulnerabilities and resilience of the children of female sex workers and drug users, and documents some models of care that have been put in place to assist them. A large literature assessing the vulnerability and resilience of children of drug users and alcoholics in developed countries was found. Research on the situation of the children of sex workers is extremely limited. Children of drug users and sex workers can face unique risks, stigma and discrimination, but both child vulnerability and resilience are associated in the drug use literature with the physical and mental health of parents and family context. Family-centred interventions have been implemented in low- and middle-income contexts, but they tend to be small, piecemeal and struggling to meet demand; they are poorly documented, and most have not been formally evaluated. We present preliminary descriptive data from an organization working with pregnant and new mothers who are drug users in Ukraine and from an organization providing services to sex workers and their families in Zambia. Because parents' drug use or sex work is often illegal and hidden, identifying their children can be difficult and may increase children's vulnerability and marginalization. Researchers and service providers, therefore, need to proceed with caution when attempting to reach these populations, but documentation and evaluation of current programmes should be prioritized.
Susceptibility to mountain hazards in Austria - paradigms of vulnerability revisited
NASA Astrophysics Data System (ADS)
Fuchs, Sven
2010-05-01
The concept of vulnerability is pillared by multiple disciplinary theories underpinning either a technical or a social origin of the concept and resulting in a range of paradigms for either a qualitative or quantitative assessment of vulnerability. However, efforts to reduce susceptibility to hazards and to create disaster-resilient communities require intersections among these theories, since human activity cannot be seen independently from the environmental setting. Acknowledging different roots of disciplinary paradigms, issues determining structural, economic, institutional and social vulnerability are discussed with respect to mountain hazards in Austria. The underlying idea of taking such an integrative viewpoint was the cognition that human action in mountain environments affects the state of vulnerability, and the state of vulnerability in turn shapes the possibilities of human action. It is argued that structural vulnerability as originator results in considerable economic vulnerability, generated by the institutional settings of dealing with natural hazards and shaped by the overall societal framework. Hence, the vulnerability of a specific location and within a considered point of time is triggered by the hazardous event and the related physical susceptibility of structures, such as buildings located on a torrent fan. Depending on the specific institutional settings, economic vulnerability of individuals or of the society results, above all with respect to imperfect loss compensation mechanisms in the areas under investigation. While this potential for harm can be addressed as social vulnerability, the concept of institutional vulnerability has been developed with respect to the overall political settings of governmental risk management. As a result, the concept of vulnerability, as being used in natural sciences, can be extended by integration of possible reasons why such physical susceptibility of structures exists, and by integration of compensation mechanisms and coping strategies being developed within social sciences. If vulnerability and its counterpart, resilience, is analysed and evaluated by using a comprehensive approach, a better understanding of the vulnerability-influencing parameters could be achieved, taking into account the interdependencies and interactions between the disciplinary foci. Thereby the overall aim of this work is not to develop another integrative approach for vulnerability assessment, different approaches are rather applied by using a vulnerability-of-place criterion, and key issues of vulnerability are reconsidered aiming at a general illustration of the situation in a densely populated mountain region of Europe.
Vulnerability, Health Agency and Capability to Health.
Straehle, Christine
2016-01-01
One of the defining features of the capability approach (CA) to health, as developed in Venkatapuram's book Health Justice, is its aim to enable individual health agency. Furthermore, the CA to health hopes to provide a strong guideline for assessing the health-enabling content of social and political conditions. In this article, I employ the recent literature on the liberal concept of vulnerability to assess the CA. I distinguish two kinds of vulnerability. Considering circumstantial vulnerability, I argue that liberal accounts of vulnerability concerned with individual autonomy, align with the CA to health. Individuals should, as far as possible, be able to make health-enabling decisions about their lives, and their capability to do so should certainly not be hindered by public policy. The CA to health and a vulnerability-based analysis then work alongside to define moral responsibilities and designate those who hold them. Both approaches demand social policy to address circumstances that hinder individuals from taking health-enabling decisions. A background condition of vulnerability, on the other hand, even though it hampers the capability for health, does not warrant the strong moral claim proposed by the CA to health to define health as a meta-capability that should guide social policy. Nothing in our designing social policy could change the challenge to health agency when we deal with background conditions of vulnerability. © 2016 John Wiley & Sons Ltd.
Shenkman, Geva; Shrira, Amit; Ifrah, Kfir; Shmotkin, Dov
2018-01-01
The aim of the current study was to examine whether offspring of Holocaust survivors (OHS) gay men report higher interpersonal vulnerability in comparison to non-OHS gay men, and to further assess whether that vulnerability mediates the association between having a Holocaust background and mental health outcomes (depressive symptoms and life satisfaction). For this purpose, a community-dwelling sample of 79 middle-aged and older OHS and 129 non-OHS gay men completed measures of hostile-world scenario (HWS) in the interpersonal domain, satisfaction from current steady relationship, depressive symptoms and life satisfaction. Results indicated that OHS reported higher HWS interpersonal vulnerability and lower satisfaction from current relationship in comparison to non-OHS gay men. Also, having a Holocaust background had an indirect effect on depressive symptoms and life satisfaction through HWS interpersonal vulnerability as well as through satisfaction from current relationship. These findings are the first to suggest interpersonal vulnerability of older OHS, in comparison to non-OHS, gay men, and an association between this vulnerability and adverse psychological outcomes. This interpersonal vulnerability, possibly representing HWS threats of both early family-based trauma and current sexual minority stress, along with its implications, should be addressed by practitioners who work with older gay men having a Holocaust background. Copyright © 2017 Elsevier B.V. All rights reserved.
ERIC Educational Resources Information Center
Kendall, Sally; Straw, Suzanne; Jones, Megan; Springate, Iain; Lord, Pippa; Stoney, Sheila
2007-01-01
In 2007, the Local Government Association (LGA) commissioned the NFER to review the best evidence on what works in narrowing the gap in outcomes for vulnerable groups across the five Every Child Matters areas. The review aimed to underpin the Narrowing the Gap Programme, a major development programme being implemented by the LGA and the DCSF. …
USDA-ARS?s Scientific Manuscript database
The concept ‘‘hydraulic vulnerability segmentation’’ represents a mechanism in which expendable distal organs (e.g. leaves attached to a woody shoot) are more susceptible to water-stress induced cavitation than the main stem of the plant. In the present work we present the first in-vivo observation ...
ERIC Educational Resources Information Center
Williams, Samantha E.
2010-01-01
The South African Department of Education is working with multiple non-governmental organisations (NGOs) to transform schools into "caring schools" that emphasise: health promotion, safety, care for orphans and vulnerable children, quality education, community engagement and respect for rights and equality. Using a qualitative case study…
A synthesized biophysical and social vulnerability assessment for Taiwan
NASA Astrophysics Data System (ADS)
Lee, Yung-Jaan
2017-11-01
Taiwan, located in the Western Pacific, is a country that is one of the most vulnerable to disasters that are associated with the changing climate; it is located within the Ring of Fire, which is the most geologically active region in the world. The environmental and geological conditions in Taiwan are sensitive and vulnerable to such disasters. Owing to increasing urbanization in Taiwan, floods and climate-related disasters have taken an increasing toll on human lives. As global warming accelerates the rising of sea levels and increasing of the frequency of extreme weather events, disasters will continue to affect socioeconomic development and human conditions. Under such circumstances, researchers and policymakers alike must recognize the importance of providing useful knowledge concerning vulnerability, disaster recovery and resilience. Strategies for reducing vulnerability and climate-related disaster risks and for increasing resilience involve preparedness, mitigation and adaptation. In the last two decades, extreme climate events have caused severe flash floods, debris flows, landslides, and other disasters and have had negative effects of many sectors, including agriculture, infrastructure and health. Since climate change is expected to have a continued impact on socio-economic development, this work develops a vulnerability assessment framework that integrates both biophysical and social vulnerability and supports synthesized vulnerability analyses to identify vulnerable areas in Taiwan. Owing to its geographical, geological and climatic features, Taiwan is susceptible to earthquakes, typhoons, droughts and various induced disasters. Therefore, Taiwan has the urgent task of establishing a framework for assessing vulnerability as a planning and policy tool that can be used to identify not only the regions that require special attention but also hotspots in which efforts should be made to reduce vulnerability and the risk of climate-related disaster. To analyze the biophysical vulnerability of Taiwan, hazards on eight maps from Taiwan’s National Science and Technology Center for Disaster Reduction (NCDR) are analyzed. Statistical data from the NCDR on social vulnerability are also adopted. Finally, a GIS overlaying method was used to perform the synthesized vulnerability analysis of biophysical and social vulnerability for municipalities and counties in Taiwan.
[Empowerment, stress vulnerability and burnout among Portuguese nursing staff].
Orgambídez-Ramos, Alejandro; Borrego-Alés, Yolanda; Ruiz-Frutos, Carlos
2018-01-01
The work environment in Portuguese hospitals, characterized by economic cutbacks, can lead to higher levels of burnout experienced by nursing staff. Furthermore, vulnerability to stress can negatively affect the perception of burnout in the workplace. However, structural empowerment is an organizational process that can prevent and decrease burnout among nurses. Consequently, the aim of the study was to examine to what extent structural empowerment and vulnerability to stress can play a predictive role in core burnout in a sample of Portuguese nurses. A convenience sample of 297 nursing staff members from Portuguese hospitals was used in this study. Core burnout was negatively and significantly related to all the dimensions of structural empowerment, and it was positively and significantly related to vulnerability to stress. Regression models showed that core burnout was significantly predicted by access to funds, access to opportunities and vulnerability to stress. Organizational administrations must make every effort in designing interventions focused on structural empowerment, as well as interventions focused on individual interventions that enhance skills for coping with stress.
Rich, white, and vulnerable: rethinking oppressive socialization in the euthanasia debate.
Krag, Erik
2014-08-01
Anita Silvers (1998) has criticized those who argue that members of marginalized groups are vulnerable to a special threat posed by physician-assisted suicide (PAS) and voluntary active euthanasia (VAE). She argues that paternalistic measures prohibiting PAS/VAE in order to protect these groups only serve to marginalize them further by characterizing them as belonging to a definitively weak class. I offer a new conception of vulnerability, one that demonstrates how rich, educated, white males, who are typically regarded as having their autonomy enhanced by their social status, are just as, if not more, vulnerable to threats posed by PAS/VAE as a result of the harmful social messages at work just below the surface of contemporary Western culture. I use this new conception of vulnerability to reinforce arguments for continued statutory prohibitions on PAS/VAE. © The Author 2014. Published by Oxford University Press, on behalf of the Journal of Medicine and Philosophy Inc. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
[Hegemonic masculinity, vulnerability and the prevention of HIV/AIDS].
Marques, Joilson Santana; Gomes, Romeu; do Nascimento, Elaine Ferreira
2012-02-01
The study aims to examine the relationship between masculinity, vulnerability and the prevention of HIV/AIDS, based on reports from young men from the so-called urban working classes, taking into account not only the meanings attributed to prevention by these subjects, but also considering the dialectical relationship between the individual and society. The conceptual framework encompasses the three main aspects of hegemonic masculinity, prevention and vulnerability. This involves qualitative research based on the perspective of dialectical hermeneutics that uses the method of interpretation of meanings. The analysis yielded two main results, namely hegemonic masculinity as a vulnerability factor, and myths and prejudices as factors of vulnerability to HIV/AIDS. By way of conclusion, it reinforces the need for discussion of prevention encompassing the need to put on the agenda the construction of the sex/gender system around which to articulate the social meanings of masculinity and femininity that influence the structural plan of affective sexual relations in general and HIV/AIDS in particular.
Assessing climate change and health vulnerability at the local level: Travis County, Texas.
Prudent, Natasha; Houghton, Adele; Luber, George
2016-10-01
We created a measure to help comprehend population vulnerability to potential flooding and excessive heat events using health, built environment and social factors. Through principal component analysis (PCA), we created non-weighted sum index scores of literature-reviewed social and built environment characteristics. We created baseline poor health measures using 1999-2005 age-adjusted cardiovascular and combined diabetes and hypertension mortality rates to correspond with social-built environment indices. We mapped US Census block groups by linked age-adjusted mortality and a PCA-created social-built environment index. The goal was to measure flooding and excessive heat event vulnerability as proxies for population vulnerability to climate change for Travis County, Texas. This assessment identified communities where baseline poor health, social marginalisation and built environmental impediments intersected. Such assessments may assist targeted interventions and improve emergency preparedness in identified vulnerable communities, while fostering resilience through the focus of climate change adaptation policies at the local level. No claim to original US government works. Journal compilation © 2016 Overseas Development Institute.
Innstrand, Siw Tone; Langballe, Ellen Melbye; Espnes, Geir Arild; Aasland, Olaf Gjerløw; Falkum, Erik
2010-12-01
The aim of the present study was to examine the longitudinal relationship between job performance-based self-esteem (JPB-SE) and work-home interaction (WHI) in terms of the direction of the interaction (work-to-home vs. home-to-work) and the effect (conflict vs. facilitation). A sample of 3,475 respondents from eight different occupational groups (lawyers, physicians, nurses, teachers, church ministers, bus drivers, and people working in advertising and information technology) supplied data at two points of time with a two-year time interval. The two-wave, cross-lagged structural equations modeling (SEM) analysis demonstrated reciprocal relationships between these variables, i.e., job performance-based self-esteem may act as a precursor as well as an outcome of work-home interaction. The strongest association was between job performance-based self-esteem and work-to-home conflict. Previous research on work-home interaction has mainly focused on situational factors. This longitudinal study expands the work-home literature by demonstrating how individual vulnerability (job performance-based self-esteem) contributes to the explanation of work-home interactions. © 2010 The Authors. Scandinavian Journal of Psychology © 2010 The Scandinavian Psychological Associations.
NASA Astrophysics Data System (ADS)
Carroll, Mark L.; Brown, Molly E.; Wooten, Margaret R.; Donham, Joel E.; Hubbard, Alfred B.; Ridenhour, William B.
2016-09-01
As our climate changes through time there is an ever-increasing need to quantify how and where it is changing so that mitigation strategies can be implemented. Urban areas have a disproportionate amount of warming due, in part, to the conductive properties of concrete and asphalt surfaces, surface albedo, heat capacity, lack of water, etc. that make up an urban environment. The NASA Climate Adaptation Science Investigation working group at Goddard Space Flight Center in Greenbelt, MD, conducted a study to collect temperature and humidity data at 15 min intervals from 12 sites at the center. These sites represent the major surface types at the center: asphalt, building roof, grass field, forest, and rain garden. The data show a strong distinction in the thermal properties of these surfaces at the center and the difference between the average values for the center compared to a local meteorological station. The data have been submitted to Oak Ridge National Laboratory Distributed Active Archive Center (ORNL-DAAC) for archival in comma separated value (csv) file format (Carroll et al., 2016) and can be found by following this link: http://daac.ornl.gov/cgi-bin/dsviewer.pl?ds_id=1319.
Automated Estimation of the Orbital Parameters of Jupiter's Moons
NASA Astrophysics Data System (ADS)
Western, Emma; Ruch, Gerald T.
2016-01-01
Every semester the Physics Department at the University of St. Thomas has the Physics 104 class complete a Jupiter lab. This involves taking around twenty images of Jupiter and its moons with the telescope at the University of St. Thomas Observatory over the course of a few nights. The students then take each image and find the distance from each moon to Jupiter and plot the distances versus the elapsed time for the corresponding image. Students use the plot to fit four sinusoidal curves of the moons of Jupiter. I created a script that automates this process for the professor. It takes the list of images and creates a region file used by the students to measure the distance from the moons to Jupiter, a png image that is the graph of all the data points and the fitted curves of the four moons, and a csv file that contains the list of images, the date and time each image was taken, the elapsed time since the first image, and the distances to Jupiter for Io, Europa, Ganymede, and Callisto. This is important because it lets the professor spend more time working with the students and answering questions as opposed to spending time fitting the curves of the moons on the graph, which can be time consuming.
Teletesting at IABG - Technical Features and Security Issues
NASA Astrophysics Data System (ADS)
Goerner, E.
2004-08-01
In the space simulation department at IABG data handling systems are used to collect, evaluate and present all data gathered from different test chambers during thermal vacuum tests. In the year 2000 a redesign of the existing data handling systems gave us the opportunity to add some features like ethernet- based client / server systems and internet protocol TCP / IP. The results were state of the art internet-ready data handling systems. Based on this we started mid 2002 with a new project called teletesting to give our customers remote access to test data. For the realisation TCO (Total Cost of Ownership), QoS (Quality of Service), data confidentiality, restrictive access to test data and a plain and simple user interface with standard components, i.e. normal PC hardware and software, were mandatory. As a result of this project, our customers have now online access to their test data in CSV/EXCEL format, in display mode either in numerical or graphical form and through DynaWorks. ISDN teletesting is already used by our customers, internet teletesting is in test mode but some parts have already been approved and used. Although an extension to teleoperation is implemented in the control systems (WIN CC) of our test chambers, it is not yet in use.
The Particle Physics Playground website: tutorials and activities using real experimental data
NASA Astrophysics Data System (ADS)
Bellis, Matthew; CMS Collaboration
2016-03-01
The CERN Open Data Portal provides access to data from the LHC experiments to anyone with the time and inclination to learn the analysis procedures. The CMS experiment has made a significant amount of data availible in basically the same format the collaboration itself uses, along with software tools and a virtual enviroment in which to run those tools. These same data have also been mined for educational exercises that range from very simple .csv files that can be analyzed in a spreadsheet to more sophisticated formats that use ROOT, a dominant software package in experimental particle physics but not used as much in the general computing community. This talk will present the Particle Physics Playground website (http://particle-physics-playground.github.io/), a project that uses data from the CMS experiment, as well as the older CLEO experiment, in tutorials and exercises aimed at high school and undergraduate students and other science enthusiasts. The data are stored as text files and the users are provided with starter Python/Jupyter notebook programs and accessor functions which can be modified to perform fairly high-level analyses. The status of the project, success stories, and future plans for the website will be presented. This work was supported in part by NSF Grant PHY-1307562.
2012-01-01
Background Improvements in treatment have resulted in an increasing number of cancer survivors potentially being able to return to work after medical treatment. In this paper we focus on the considerations regarding return to work (RTW) of breast cancer absentees in the Belgian context and how these considerations are related to reactions from their social environment. Methods A qualitative study was performed to understand the RTW considerations of Belgian breast cancer absentees who had undergone breast cancer surgery in 2006. Twenty-two participants (mean age 46) were included and interviewed between May 2008 and August 2009 in their personal environment. An in-depth analysis (Grounded Theory) took place using the Qualitative Analysis Guide of Leuven (Quagol). Results Before the actual RTW, breast cancer employees try to build an image of the future resumption of work based on medical grounds and their knowledge of the workplace. Four matters are considered prior to RTW: (i) women want to leave the sick role and wish to keep their job; (ii) they consider whether working is worth the effort; (iii) they reflect on their capability; and (iv) they have doubts about being accepted in the workplace after returning. These inner thoughts are both product and input for the interaction with the social environment. The whole process is coloured by uncertainty and vulnerability. Conclusion Our study demonstrated that mental preparation for RTW is not a linear process of improvement. It shows a detailed picture of four types of considerations made by breast cancer survivors before they actually resume work. Vulnerability appears to be an overarching theme during mental preparation. As the social environment plays an important role, people from that environment must become more aware of their influence on decreasing or increasing a woman’s vulnerability while preparing for RTW. PMID:22824548
National Committee for the Prevention of Elder Abuse
... practitioners, and researchers across disciplines working to address abuse, neglect, and exploitation of elders and vulnerable adults. With members representing aging and social services, APS, healthcare, justice, domestic violence, and other arenas, NCPEA works to shape ...
Creativity and psychopathology: a shared vulnerability model.
Carson, Shelley H
2011-03-01
Creativity is considered a positive personal trait. However, highly creative people have demonstrated elevated risk for certain forms of psychopathology, including mood disorders, schizophrenia spectrum disorders, and alcoholism. A model of shared vulnerability explains the relation between creativity and psychopathology. This model, supported by recent findings from neuroscience and molecular genetics, suggests that the biological determinants conferring risk for psychopathology interact with protective cognitive factors to enhance creative ideation. Elements of shared vulnerability include cognitive disinhibition (which allows more stimuli into conscious awareness), an attentional style driven by novelty salience, and neural hyperconnectivity that may increase associations among disparate stimuli. These vulnerabilities interact with superior meta-cognitive protective factors, such as high IQ, increased working memory capacity, and enhanced cognitive flexibility, to enlarge the range and depth of stimuli available in conscious awareness to be manipulated and combined to form novel and original ideas.
Dittman, Patricia W
2015-01-01
Chemical use and dependency is a prevalent problem in society and among the members of the nursing profession. Nursing students, as the novice representatives of the profession, may be particularly vulnerable to chemical use. Nursing leaders in both educational institutions and practice settings must recognize highly vulnerable individuals, which nursing activities are most vulnerable, and interventions to assist and support the vulnerable individual while assuring a safe practice environment. As nurses, it is our responsibility, both ethically and legally, to provide a safe working environment not only for our patients but also for ourselves by reporting the behaviors of nurses who may be impaired through the proper channels according to your state's Nurse Practice Act. Through a united approach, nurse leaders from both the academic and practice environments should provide a safe and effective rehabilitation approach.
Socialization Processes and Clergy Offenders.
Anderson, Jane
2016-01-01
This article uses feminist theory to investigate how the socialization processes used to maintain the clergy community in the Roman Catholic Church contributes to a vulnerability in some clergy for sexually abusing children. This vulnerability is identified first in an examination of the literature on the impact of socialization processes on clergy offenders between the 1960s and 1980s. A comparison is then made with the implications of the apostolic exhortation, Pastores Dabo Vobis, which provides a theological basis to clergy formation. The article argues that the document works to ensure a continuity of socialization processes that not only have been shown to create a vulnerability for committing child sexual abuse but compound existing vulnerabilities. The article concludes that constraints produced by the preservation of a hegemonic masculinity and patriarchy retain a threat of violence against children and require recommended reforms.
lcps: Light curve pre-selection
NASA Astrophysics Data System (ADS)
Schlecker, Martin
2018-05-01
lcps searches for transit-like features (i.e., dips) in photometric data. Its main purpose is to restrict large sets of light curves to a number of files that show interesting behavior, such as drops in flux. While lcps is adaptable to any format of time series, its I/O module is designed specifically for photometry of the Kepler spacecraft. It extracts the pre-conditioned PDCSAP data from light curves files created by the standard Kepler pipeline. It can also handle csv-formatted ascii files. lcps uses a sliding window technique to compare a section of flux time series with its surroundings. A dip is detected if the flux within the window is lower than a threshold fraction of the surrounding fluxes.
Two-dimensional thermography image retrieval from zig-zag scanned data with TZ-SCAN
NASA Astrophysics Data System (ADS)
Okumura, Hiroshi; Yamasaki, Ryohei; Arai, Kohei
2008-10-01
TZ-SCAN is a simple and low cost thermal imaging device which consists of a single point radiation thermometer on a tripod with a pan-tilt rotator, a DC motor controller board with a USB interface, and a laptop computer for rotator control, data acquisition, and data processing. TZ-SCAN acquires a series of zig-zag scanned data and stores the data as CSV file. A 2-D thermal distribution image can be retrieved by using the second quefrency peak calculated from TZ-SCAN data. An experiment is conducted to confirm the validity of the thermal retrieval algorithm. The experimental result shows efficient accuracy for 2-D thermal distribution image retrieval.
Brown, Joseph; Pirrung, Meg; McCue, Lee Ann
2017-06-09
FQC is software that facilitates quality control of FASTQ files by carrying out a QC protocol using FastQC, parsing results, and aggregating quality metrics into an interactive dashboard designed to richly summarize individual sequencing runs. The dashboard groups samples in dropdowns for navigation among the data sets, utilizes human-readable configuration files to manipulate the pages and tabs, and is extensible with CSV data. FQC is implemented in Python 3 and Javascript, and is maintained under an MIT license. Documentation and source code is available at: https://github.com/pnnl/fqc . joseph.brown@pnnl.gov. © The Author(s) 2017. Published by Oxford University Press.
The Emotional Work of Discomfort and Vulnerability in Multicultural Teacher Education
ERIC Educational Resources Information Center
Cutri, Ramona Maile; Whiting, Erin Feinauer
2015-01-01
This study documents our efforts to implement an "ethic of discomfort" and a "pedagogy of discomfort" in our undergraduate multicultural teacher education courses. Commitments to these moral imperatives inherently involve emotional work for teacher candidates and teacher educators. Such emotional work, particularly in academia,…
The Counselor's Trauma as Counseling Motivation: Vulnerability or Stress Inoculation?
ERIC Educational Resources Information Center
Jenkins, Sharon Rae; Mitchell, Jessica L.; Baird, Stephanie; Whitfield, Sarah Roby; Meyer, Heather Lynn
2011-01-01
Should counselors with interpersonal trauma histories work with similarly traumatized clients? How does the work affect them? Current research is inconsistent. This study examines 101 sexual assault and domestic violence counselors' recalled motivations for trauma work, their reported subjective personal changes, and their secondary and vicarious…
Machado, Tanya; Sathyanarayanan, Vidya; Bhola, Poornima; Kamath, Kirthi
2013-01-01
The business process outsourcing (BPO) sector is a contemporary work setting in India, with a large and relatively young workforce. There is concern that the demands of the work environment may contribute to stress levels and psychological vulnerability among employees as well as to high attrition levels. As part of a larger study, questionnaires were used to assess psychological distress, burnout, and coping strategies in a sample of 1,209 employees of a BPO organization. The analysis indicated that 38% of the sample had significant psychological distress on the General Health Questionnaire (GHQ-28; Goldberg and Hillier, 1979). The vulnerable groups were women, permanent employees, data processors, and those employed for 6 months or longer. The reported levels of burnout were low and the employees reported a fairly large repertoire of coping behaviors. The study has implications for individual and systemic efforts at employee stress management and workplace prevention approaches. The results point to the emerging and growing role of mental health professionals in the corporate sector.
Hirsch, Jennifer S.
2013-01-01
This paper discusses labor migration as an example of how focusing on the meso-level highlights the social processes through which structural factors produce HIV risk. Situating that argument in relation to existing work on economic organization and HIV risk as well as research on labor migration and HIV vulnerabilities, the paper demonstrates how analyzing the processes through which labor migration creates vulnerability can shift attention away from the proximate behavioral determinants of HIV risk and towards the community and policy levels. Further, it presents the concepts of externalities and the ethics of consumption, which underline how both producers and consumers benefit from low-waged migrant labor, and thus are responsible for the externalization of HIV risk characteristic of supply chains that rely on migrant labor. These concepts point to strategies through which researchers and advocates could press the public and private sectors to improve the conditions in which migrants live and work, with implications for HIV as well as other health outcomes. PMID:24444837
Rickles, Michael; Rebeiro, Peter F; Sizemore, Lindsey; Juarez, Paul; Mutter, Mitchell; Wester, Carolyn; McPheeters, Melissa
2018-05-17
Knowing which factors contribute to county-level vulnerability to a human immunodeficiency virus (HIV)/hepatitis C virus (HCV) outbreak, and which counties are most vulnerable, guides public health and clinical interventions. We therefore examined the impact of locally available indicators related to the opioid epidemic on prior national models of HIV/HCV outbreak vulnerability. Tennessee's 95 counties were the study sample. Predictors from 2012 and 2013 were used, mirroring prior methodology from the US Centers for Disease Control and Prevention (CDC). Acute HCV incidence was the proxy measure of county-level vulnerability. Seventy-eight predictors were identified as potentially predictive for HIV/HCV vulnerability. We used multiple dimension reduction techniques to determine predictors for inclusion and Poisson regression to generate a composite index score ranking county-level vulnerability for HIV/HCV. There was overlap of high-risk counties with the national analysis (25 of 41 counties). The distribution of vulnerability reinforces earlier research indicating that eastern Tennessee is at particularly high risk but also demonstrates that the entire state has high vulnerability. Prior research placed Tennessee among the top states for opioid prescribing, acute HCV infection, and greatest risk for an HIV/HCV outbreak. Given this confluence of risk, the Tennessee Department of Health expanded upon prior work to include more granular, local data, including on opioid prescribing. We also explored nonfatal and fatal overdoses. The more complete statewide view of risk generated, not only in eastern counties but also in the western corridor, will enable local officials to monitor vulnerability and better target resources.
Participatory flood vulnerability assessment: a multi-criteria approach
NASA Astrophysics Data System (ADS)
Madruga de Brito, Mariana; Evers, Mariele; Delos Santos Almoradie, Adrian
2018-01-01
This paper presents a participatory multi-criteria decision-making (MCDM) approach for flood vulnerability assessment while considering the relationships between vulnerability criteria. The applicability of the proposed framework is demonstrated in the municipalities of Lajeado and Estrela, Brazil. The model was co-constructed by 101 experts from governmental organizations, universities, research institutes, NGOs, and private companies. Participatory methods such as the Delphi survey, focus groups, and workshops were applied. A participatory problem structuration, in which the modellers work closely with end users, was used to establish the structure of the vulnerability index. The preferences of each participant regarding the criteria importance were spatially modelled through the analytical hierarchy process (AHP) and analytical network process (ANP) multi-criteria methods. Experts were also involved at the end of the modelling exercise for validation. The final product is a set of individual and group flood vulnerability maps. Both AHP and ANP proved to be effective for flood vulnerability assessment; however, ANP is preferred as it considers the dependences among criteria. The participatory approach enabled experts to learn from each other and acknowledge different perspectives towards social learning. The findings highlight that to enhance the credibility and deployment of model results, multiple viewpoints should be integrated without forcing consensus.
ERIC Educational Resources Information Center
Brunila, Kristiina; Ikävalko, Elina; Kurki, Tuuli; Mertanen, Katariina; Mikkola, Anna
2016-01-01
The ethos of vulnerability has come to play an increasingly central role in shaping cross-sectoral transition policies and practices related to young people outside of education and working life. Yet the wider effects of this ethos in policies and practices are still rarely analysed. In this article, we draw our data from five separate studies.…
Source Code Vulnerability Assessment Methodology
2008-09-01
Information Sciences Directorate’s (CISD) Center for Intrusion Detection Monitoring and Protection ( CIMP ) to reverse engineer tools captured by...application terminates. It is possible, however, to write past the buffer boundary in a controlled way such that the value for EIP can be overwritten with...vulnerability is widely known and has been exploited in the past . This work provides a proof-of-concept for the ARL/SLAD CAM and exploit development process
Yang, Lawrence H; Chen, Fang-pei; Sia, Kathleen Janel; Lam, Jonathan; Lam, Katherine; Ngo, Hong; Lee, Sing; Kleinman, Arthur; Good, Byron
2014-02-01
To understand Chinese immigrants' experiences with mental illness stigma and mental health disparities, we integrate frameworks of 'structural vulnerability' and 'moral experience' to identify how interaction between structural discrimination and cultural engagements might shape stigma. Fifty Chinese immigrants, including 64% Fuzhounese immigrants who experienced particularly harsh socio-economical deprivation, from two Chinese bilingual psychiatric inpatient units in New York City were interviewed from 2006 to 2010 about their experiences of mental illness stigma. Interview questions were derived from 4 stigma measures, covering various life domains. Participants were asked to elaborate their rating of measure items, and thus provided open-ended, narrative data. Analysis of the narrative data followed a deductive approach, guided by frameworks of structural discrimination and "what matters most" - a cultural mechanism signifying meaningful participation in the community. After identifying initial coding classifications, analysis focused on the interface between the two main concepts. Results indicated that experiences with mental illness stigma were contingent on the degree to which immigrants were able to participate in work to achieve "what mattered most" in their cultural context, i.e., accumulation of financial resources. Structural vulnerability - being situated in an inferior position when facing structural discrimination - made access to affordable mental health services challenging. As such, structural discrimination increased healthcare spending and interfered with financial accumulation, often resulting in future treatment nonadherence and enforcing mental health disparities. Study participants' internalizing their structurally-vulnerable position further led to a depreciated sense of self, resulting in a reduced capacity to advocate for healthcare system changes. Paradoxically, the multi-layered structural marginalization experienced by Chinese immigrants with mental illness allowed those who maintained capacity to work to retain social status even while holding a mental illness status. Mental health providers may prioritize work participation to shift service users' positions within the hierarchy of structural vulnerability. Copyright © 2013 Elsevier Ltd. All rights reserved.
Pulkki-Råback, Laura; Elovainio, Marko; Virtanen, Marianna; Kivimäki, Mika; Hintsanen, Mirka; Hintsa, Taina; Jokela, Markus; Puttonen, Sampsa; Joensuu, Matti; Lipsanen, Jari; Raitakari, Olli T; Keltikangas-Järvinen, Liisa
2016-10-01
There have been calls to know more about vulnerability factors that may predispose to adverse health outcomes at work. We examined if childhood adverse experiences would affect vulnerability to psychosocial stress factors at work. A nationally representative sample of 1546 Finnish men and women was followed up from childhood to adulthood. Childhood adverse experiences consisted of socioeconomic and emotional factors. Job demands and job control were measured 21 years later, and depressive symptoms were measured 21 and 27 years after the childhood measurements. Job demands predicted depressive symptoms over 6 years, and the association was modified by childhood emotional adversity. Participants with three or more emotional adversities in childhood had more depressive symptoms in response to high job demands compared with participants with zero or one emotional adversities in childhood (Betas = -1.40 and -2.01, ps < 0.05 and <0.01). No such moderating effect by childhood adverse experiences was found for the association between job control and depressive symptoms. Although modest in effect size, these findings provide a developmental viewpoint for understanding the role of childhood experiences in work-related stress factors. Such knowledge can enhance understanding of individual differences in vulnerability to the demands of working life. Copyright © 2015 John Wiley & Sons, Ltd. Copyright © 2015 John Wiley & Sons, Ltd.
NASA Astrophysics Data System (ADS)
Bachelet, D. M.
2014-12-01
Climate change is projected to jeopardize ecosystems in the Pacific Northwest. Managing ecosystems for future resilience requires collaboration, innovation and communication. The abundance of data and documents describing the uncertainty around both climate change projections and impacts has become challenging to managers who have little funding and limited time to digest and incorporate these materials into planning and implementation documents. We worked with US Forest Service and BLM managers to help them develop vulnerability assessments and identify on-the-ground strategies to address climate change challenges on the federal lands in northwest Oregon (Siuslaw, Willamette and Mt. Hood National Forests; Eugene and Salem BLM Districts). We held workshops to promote dialogue about climate change, which were particularly effective in fostering discussions between the managers who often do not have the time to share their knowledge and compare experiences across administrative boundaries. We used the Adaptation for Conservation Targets (ACT) framework to identify measurable management objectives and rapidly assess local vulnerabilities. We used databasin.org to centralize usable information, including state-of-the-art CMIP5 climate projections, for the mandated assessments of vulnerability and resilience. We introduced participants to a decision support framework providing opportunities to develop more effective adaptation strategies. We built a special web page to hold the information gathered at the workshops and provide easy access to climate change information. We are now working with several Landscape Conservation Cooperatives (LCCs) to design gateways - conservation atlases - to their relevant data repositories on databasin.org and working with them to develop web tools that can provide usable information for their own vulnerability assessments.
RSLR-induced increase of vulnerability to storms along the Catalan coast (NW Mediterranean)
NASA Astrophysics Data System (ADS)
Bosom, Eva; Jiménez, José A.; Nicholls, Robert J.
2014-05-01
Climate-related hazards are affecting coasts worldwide and they are likely to increase during the next decades (Nicholls et al., 2007). If we also consider that values at exposure are also increasing, coastal areas will very likely be exposed to increasing risks. Due to this, to properly develop sustainable coastal risk management plans it is necessary to consider climate-change induced effects as an additional forcing. Within this context, vulnerability assessment is a useful tool to help managers to make decisions in resource allocation and development of DRR plans. Vulnerability can be simply defined as the potential of a coastal system to be harmed by a given hazard. The negative contribution (susceptibility) is characterized through the magnitude of main induced processes (erosion and inundation) whereas the positive one (resilience) is parameterized in function of beach geomorphology. With respect to extreme events, Bosom and Jiménez (2011) presented a framework to assess coastal vulnerability to storms at regional scale adopting a probabilistic approach. In this work, this framework is enlarged by including the potential effects of RSLR on the vulnerability assessment. Thus, RSLR-driven processes (erosion and inundation) are accounted through their induced modifications on beach morphology that can affect the beach capacity of response or, in other words, its adaptation capacity. The inclusion of this effect in the vulnerability framework significantly changes coastal vulnerability values to storms at any probability of occurrence without the need of considering any change in storminess. The magnitude of the vulnerability increase depends on the considered RSLR scenario and the coastal geomorphology. This integrated framework has been applied to 219 km of the Catalan coast (NW Mediterranean) considering different RSLR scenarios and time projections. Preliminary results obtained for a Tr = 50-y and the medium RSLR scenario (3.8 mm/y + subsidence) indicate a significant increase in coastal stretches with a high and very high vulnerability to storms. Thus, regarding erosion, these vulnerable stretches increase from 28 % of the coast under current conditions to 39 % and 49 % in 25-y and 50-y projections. With respect to inundation and, considering the dynamic response of the coast, the increase is smaller, from 31 % to 35 % and 40% respectively. References Nicholls RJ et al. 2007. Coastal systems and low-lying areas. Climate Change 2007: Impacts, Adaptation and Vulnerability. Contribution of WG II to 4th Assessment Report of IPCC, 315-356. Bosom E, Jiménez JA. 2011. Probabilistic coastal vulnerability assessment to storms at regional scale - application to Catalan beaches (NW Mediterranean). NHESS11:475-484. Acknowledgements This work has been done in the framework of the PaiRisC-M (CTM2011-29808) and RISC-KIT EU FP7 research project (603458). First author was supported by a Ph D Grant from the Spanish Ministry of Education.
Social Work and Juvenile Probation: Historical Tensions and Contemporary Convergences
ERIC Educational Resources Information Center
Peters, Clark M.
2011-01-01
Social work's weak presence in the field of corrections is peculiar, given that those involved in the criminal and juvenile justice systems are undeniably among the vulnerable and oppressed populations that the profession has traditionally served. The field of juvenile probation shares roots with the profession of social work but lacks a strong…
ERIC Educational Resources Information Center
World of Work, 1998
1998-01-01
Workplace violence has gone global, crossing borders, work settings, and occupational groups. A report from the International Labor Organization points out high-risk occupations and indicates that women are especially vulnerable. It highlights the problem and provides ways for policymakers to remove violence from the workplace. (JOW)
ERIC Educational Resources Information Center
Steingrímsdóttir, Sigrún Hulda; Halldórsdóttir, Sigríður
2016-01-01
The purpose of this phenomenological study was to explore people's experience of reduced working capacity and their encounters with professionals in that life situation. We collected data through in-depth interviews with eight individuals. The main finding of the current research is how illness and accident impairing work capacity "exacerbate…
Internationalizing Social Work Education: Models, Methods and Meanings
ERIC Educational Resources Information Center
Merrill, Martha C.; Frost, Caren J.
2011-01-01
International and intercultural learning requires flexibility, openness, and a willingness to adjust--on the part of the school as well as the student. Yet in social work, as in other professions requiring licensure and preparing professionals to work with vulnerable populations, flexibility is not simply a matter of convincing a department head…
Migrant women farm workers in the occupational health literature.
Habib, Rima R; Fathallah, Fadi A
2012-01-01
Little attention has been given to the vulnerable populations of migrant women agricultural workers. A systemic review in PubMed was carried out (1990-2008) using terms related to migrant agricultural workers, with specific focus on women. Case studies from Lebanon and California are presented to highlight key physical, psychosocial, and cultural risk factors among these working populations. The review revealed a host of potential problems that span from pesticide exposure and musculoskeletal disorders to socio-cultural barriers. Comprehensive exposure-outcome and intervention studies focusing specifically on migrant women in agriculture are lacking. In depth studies focusing on the work environment of migrant women workers in the agricultural sector are needed. Personal and environmental factors that influence health should be considered in any effective intervention aiming to influence policy making and have a positive impact on these vulnerable working populations.
Bachmann, Liv; Michaelsen, Ragnhild A; Vatne, Solfrid
2016-01-01
Milieu therapists' relationships with patients with severe mental illnesses are viewed as challenging. Elucidating vulnerability from their perspective in daily face-to-face encounters with patients might contribute to extending our knowledge about milieu therapists' vulnerability and the dynamics of the interaction between patients in mental health services and expertise in building caring and therapeutic relationships. The aim of this project was to study educated milieu therapists' experiences of their own vulnerability in their interactions with patients in mental health services. The data collection method was focus-group interviews. Thirteen part-time master's in mental health students (eight nurses, three social workers, two social educators) participated. All participants had experience with community or specialized mental health services (2-8 years). The milieu therapists mainly related their experiences of vulnerability to negative feelings elicited by challenging work conditions, disclosed as two main themes: 1) "overloaded", by the possibility of being physically and mentally hurt and the burdens of long-lasting close relationships; milieu therapists were extremely vulnerable because of their difficulty in protecting themselves; and 2) "shortcomings", connected to feelings of despair associated with not acting in concordance with their professional standards and insecurity about their skills to handle challenging situations, which was a threat to their professional integrity. There seemed to be coherence between vulnerability and professional inauthenticity. A misunderstanding that professionalism refers to altruism seems to increase milieu therapist vulnerability. Vulnerability in health care is of interest to multiple disciplines, and is of relevance for knowledge development in higher education. Extended knowledge and understanding about milieu therapists' vulnerability might strengthen their personal and professional integrity in professional practice in mental health services. Health care managers' focus on the supervision of individual professionals in practice and practical training is important. Further research on the coherence between vulnerability and professionalism is recommended.
WE-D-204-06: An Open Source ImageJ CatPhan Analysis Tool
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nelson, G
2015-06-15
Purpose: The CatPhan is a popular QA device for assessing CT image quality. There are a number of software options which perform analysis of the CatPhan. However, there is often little ability for the user to adjust the analysis if it isn’t running properly, and these are all expensive options. An open source tool is an effective solution. Methods: To use the software, the user imports the CT as an image sequence in ImageJ. The user then scrolls to the slice with the lateral dots. The user then runs the plugin. If tolerance constraints are not already created, the usermore » is prompted to enter them or to use generic tolerances. Upon completion of the analysis, the plugin calls pdfLaTex to compile the pdf report. There is a csv version of the report as well. A log of the results from all CatPhan scans is kept as a csv file. The user can use this to baseline the machine. Results: The tool is capable of detecting the orientation of the phantom. If the CatPhan was scanned backwards, one can simply flip the stack of images horizontally and proceed with the analysis. The analysis includes Sensitometry (estimating the effective beam energy), HU values and linearity, Low Contrast Visibility (using LDPE & Polystyrene), Contrast Scale, Geometric Accuracy, Slice Thickness Accuracy, Spatial resolution (giving the MTF using the line pairs as well as the point spread function), CNR, Low Contrast Detectability (including the raw data), Uniformity (including the Cupping Effect). Conclusion: This is a robust tool that analyzes more components of the CatPhan than other software options (with the exception of ImageOwl). It produces an elegant pdf and keeps a log of analyses for long-term tracking of the system. Because it is open source, users are able to customize any component of it.« less
The Construction and Validation of the Heat Vulnerability Index, a Review
Bao, Junzhe; Li, Xudong; Yu, Chuanhua
2015-01-01
The occurrence of extreme heat and its adverse effects will be exacerbated with the trend of global warming. An increasing number of researchers have been working on aggregating multiple heat-related indicators to create composite indices for heat vulnerability assessments and have visualized the vulnerability through geographic information systems to provide references for reducing the adverse effects of extreme heat more effectively. This review includes 15 studies concerning heat vulnerability assessment. We have studied the indicators utilized and the methods adopted in these studies for the construction of the heat vulnerability index (HVI) and then further reviewed some of the studies that validated the HVI. We concluded that the HVI is useful for targeting the intervention of heat risk, and that heat-related health outcomes could be used to validate and optimize the HVI. In the future, more studies should be conducted to provide references for the selection of heat-related indicators and the determination of weight values of these indicators in the development of the HVI. Studies concerning the application of the HVI are also needed. PMID:26132476
De Santis, Joseph P.; DeLeon, Diego A.
2013-01-01
Background Clients with HIV infection have been described as both vulnerable and resilient. In addition, the conceptualization of clients with HIV infection has also evolved. Purpose The purpose of this study is to examine this relationship among a sample of people with HIV infection. Method Qualitative description was the design used in this study. Interviews of 15 participants with HIV infection were conducted and analyzed using content analysis. Results All participants provided descriptions of the relationship of vulnerability and resilience in the context of HIV infection. Three different themes emerged from the data that were termed Simultaneity, Dichotomy, and Vacillation. These themes were used to describe the relationship of vulnerability and resilience for the participants’ perspectives. Conclusions/Implications Among people with HIV infection vulnerability and resilience are related concepts. In the context of HIV infection, the relationship of these concepts needs further work in order relate these concepts to physical and mental health of people living with HIV infection. The relationship of these concepts to physical and mental health may assist in making these concepts less abstract and more clinically useful. PMID:23663016
Czeisler, Charles A.
2009-01-01
The Institute of Medicine recently concluded that-on average-medical residents make more serious medical errors and have more motor vehicle crashes when they are deprived of sleep. In the interest of public safety, society has required limitations on work hours in many other safety sensitive occupations, including transportation and nuclear power generation. Those who argue in favor of traditional extended duration resident work hours often suggest that there are inter- individual differences in response to acute sleep loss or chronic sleep deprivation, implying that physicians may be more resistant than the average person to the detrimental effects of sleep deprivation on performance, although there is no evidence that physicians are particularly resistant to such effects. Indeed, recent investigations have identified genetic polymorphisms that may convey a relative resistance to the effects of prolonged wakefulness on a subset of the healthy population, although there is no evidence that physicians are over-represented in this cohort. Conversely, there are also genetic polymorphisms, sleep disorders and other inter-individual differences that appear to convey an increased vulnerability to the performance-impairing effects of 24 hours of wakefulness. Given the magnitude of inter-individual differences in the effect of sleep loss on cognitive performance, and the sizeable proportion of the population affected by sleep disorders, hospitals face a number of ethical dilemmas. How should the work hours of physicians be limited to protect patient safety optimally? For example, some have argued that, in contrast to other professions, work schedules that repeatedly induce acute and chronic sleep loss are uniquely essential to the training of physicians. If evidence were to prove this premise to be correct, how should such training be ethically accomplished in the quartile of physicians and surgeons who are most vulnerable to the effects of sleep loss on performance without unacceptably compromising patient safety? Moreover, once it is possible to identify reliably those most vulnerable to the adverse effects of sleep loss on performance, will academic medical centers have an obligation to evaluate the proficiency of both residents and staff physicians under conditions of acute and chronic sleep deprivation? Should work-hour policy limits be modified to ensure that they are not hazardous for the patients of the most vulnerable quartile of physicians, or should the limits be personalized to enable the most resistant quartile to work longer hours? Given that the prevalence of sleep disorders has increased in our society overall, and increases markedly with age, how should fitness for extended duration work hours be monitored over a physician's career? In the spirit of the dictum to do no harm, advances in understanding the medical and genetic basis of inter-individual differences in the performance vulnerability to sleep loss should be incorporated into the development of work-hour policy limits for both physicians and surgeons. PMID:19768182
Czeisler, Charles A
2009-01-01
The Institute of Medicine recently concluded that-on average-medical residents make more serious medical errors and have more motor vehicle crashes when they are deprived of sleep. In the interest of public safety, society has required limitations on work hours in many other safety sensitive occupations, including transportation and nuclear power generation. Those who argue in favor of traditional extended duration resident work hours often suggest that there are inter- individual differences in response to acute sleep loss or chronic sleep deprivation, implying that physicians may be more resistant than the average person to the detrimental effects of sleep deprivation on performance, although there is no evidence that physicians are particularly resistant to such effects. Indeed, recent investigations have identified genetic polymorphisms that may convey a relative resistance to the effects of prolonged wakefulness on a subset of the healthy population, although there is no evidence that physicians are over-represented in this cohort. Conversely, there are also genetic polymorphisms, sleep disorders and other inter-individual differences that appear to convey an increased vulnerability to the performance-impairing effects of 24 hours of wakefulness. Given the magnitude of inter-individual differences in the effect of sleep loss on cognitive performance, and the sizeable proportion of the population affected by sleep disorders, hospitals face a number of ethical dilemmas. How should the work hours of physicians be limited to protect patient safety optimally? For example, some have argued that, in contrast to other professions, work schedules that repeatedly induce acute and chronic sleep loss are uniquely essential to the training of physicians. If evidence were to prove this premise to be correct, how should such training be ethically accomplished in the quartile of physicians and surgeons who are most vulnerable to the effects of sleep loss on performance without unacceptably compromising patient safety? Moreover, once it is possible to identify reliably those most vulnerable to the adverse effects of sleep loss on performance, will academic medical centers have an obligation to evaluate the proficiency of both residents and staff physicians under conditions of acute and chronic sleep deprivation? Should work-hour policy limits be modified to ensure that they are not hazardous for the patients of the most vulnerable quartile of physicians, or should the limits be personalized to enable the most resistant quartile to work longer hours? Given that the prevalence of sleep disorders has increased in our society overall, and increases markedly with age, how should fitness for extended duration work hours be monitored over a physician's career? In the spirit of the dictum to do no harm, advances in understanding the medical and genetic basis of inter-individual differences in the performance vulnerability to sleep loss should be incorporated into the development of work-hour policy limits for both physicians and surgeons.
Through collaborative efforts with partners from around the world, EPA is working to facilitate commerce, promote sustainable development, protect vulnerable populations and engage diplomatically around the world.
Getman, Dan
2013-09-30
To help guide its future data collection efforts, The DOE GTO funded a data gap analysis in FY2012 to identify high potential hydrothermal areas where critical data are needed. This analysis was updated in FY2013 and the resulting datasets are represented by this metadata. The original process was published in FY 2012 and is available here: https://pangea.stanford.edu/ERE/db/GeoConf/papers/SGW/2013/Esposito.pdf Though there are many types of data that can be used for hydrothermal exploration, five types of exploration data were targeted for this analysis. These data types were selected for their regional reconnaissance potential, and include many of the primary exploration techniques currently used by the geothermal industry. The data types include: 1. well data 2. geologic maps 3. fault maps 4. geochemistry data 5. geophysical data To determine data coverage, metadata for exploration data (including data type, data status, and coverage information) were collected and catalogued from nodes on the National Geothermal Data System (NGDS). It is the intention of this analysis that the data be updated from this source in a semi-automated fashion as new datasets are added to the NGDS nodes. In addition to this upload, an online tool was developed to allow all geothermal data providers to access this assessment and to directly add metadata themselves and view the results of the analysis via maps of data coverage in Geothermal Prospector (http://maps.nrel.gov/gt_prospector). A grid of the contiguous U.S. was created with 88,000 10-km by 10-km grid cells, and each cell was populated with the status of data availability corresponding to the five data types. Using these five data coverage maps and the USGS Resource Potential Map, sites were identified for future data collection efforts. These sites signify both that the USGS has indicated high favorability of occurrence of geothermal resources and that data gaps exist. The uploaded data are contained in two data files for each data category. The first file contains the grid and is in the SHP file format (shape file.) Each populated grid cell represents a 10k area within which data is known to exist. The second file is a CSV (comma separated value) file that contains all of the individual layers that intersected with the grid. This CSV can be joined with the map to retrieve a list of datasets that are available at any given site. The attributes in the CSV include: 1. grid_id : The id of the grid cell that the data intersects with 2. title: This represents the name of the WFS service that intersected with this grid cell 3. abstract: This represents the description of the WFS service that intersected with this grid cell 4. gap_type: This represents the category of data availability that these data fall within. As the current processing is pulling data from NGDS, this category universally represents data that are available in the NGDS and are ready for acquisition for analytic purposes. 5. proprietary_type: Whether the data are considered proprietary 6. service_type: The type of service 7. base_url: The service URL
NASA Astrophysics Data System (ADS)
Liu, Delin; Li, Yue
2016-05-01
Evaluating social vulnerability is a crucial issue in risk and disaster management. In this study, a household social vulnerability index (HSVI) to flood hazards was developed and used to assess the social vulnerability of rural households in western mountainous regions of Henan province, China. Eight key indicators were identified using existing literature and discussions with experts from multiple disciplines and local farmers, and their weights were determined using principle component analysis (PCA) and an expert scoring method. The results showed that (1) the ratio of perennial work in other places, hazard-related training and illiteracy ratio (15+) were the most dominant factors of social vulnerability. (2) The numbers of high, moderate and low vulnerability households were 14, 64 and 16, respectively, which accounted for 14.9, 68.1 and 17.0 % of the total interviewed rural households, respectively. (3) The correlation coefficient between household social vulnerability scores and casualties in a storm flood in July 2010 was significant at 0.05 significance level (r = 0.748), which indicated that the selected indicators and their weights were valid. (4) Some mitigation strategies to reduce household social vulnerability to flood hazards were proposed, which included (1) improving the local residents' income and their disaster-related knowledge and evacuation skills, (2) developing emergency plans and carrying out emergency drills and training, (3) enhancing the accuracy of disaster monitoring and warning systems and (4) establishing a specific emergency management department and comprehensive rescue systems. These results can provide useful information for rural households and local governments to prepare, mitigate and respond to flood hazards, and the corresponding strategies can help local households to reduce their social vulnerability and improve their ability to resist flood hazard.
Vulnerability on the streets: female sex workers and HIV risk.
Pyett, P M; Warr, D J
1997-10-01
In-depth interviews were conducted with 24 purposively selected female sex workers who were perceived to be vulnerable to risks associated with their lifestyle and occupation. Brothel workers were found to be considerably less exposed to risk than the women working on the streets. Client resistance was the major obstacle to women maintaining safe sex practices. Physical threats and coercion from clients, the absence of legal protection for street workers, the workers' extreme social isolation and lack of community support added to the difficulties experienced by women in their attempts to insist on condoms for all sex services. Youth, homelessness and heavy drug use had contributed to women being at times even more vulnerable because they had less capacity to manage situations of potential violence or STD risk. Whether through sex work or in their private relationships, HIV remains a risk for some of these women. This study highlights the dangers associated with illegal sex work. While decriminalization of prostitution would reduce some of the dangers to which women were exposed and increase women's capacity to insist on safe sex practices, it is also important for community education programmes to address men's failure to accept responsibility for condom use when seeking the services of sex workers.
Migrant women domestic workers in Hong Kong, Singapore and Taiwan: a comparative analysis.
Cheng, S J
1996-01-01
This article discusses the legal systems in Hong Kong, Singapore, and Taiwan and the protection of migrant domestic workers who are vulnerable to domestic violence and abuse. Migration in the last 10 years in Asia has increasingly included female migrants who are usually employed in domestic services, the entertainment industry, and health care services. This work places women migrants in a vulnerable position in the isolation of households, away from public oversight. Labor laws are not applied to domestic workers, who are considered of low societal value. In Hong Kong, domestic work is covered under the labor laws, but the societal perception is that housework is not really work. Employer-employee relationships are more clear cut in institutional settings. Most domestic workers live with their employers. They are outsiders to families and must maintain professional relationships within an intimate environment. The isolation within a household discourages development of support systems and contacts with women doing similar work. There is a power struggle between women of unequal stature concerning the operation of the household and the interrelationships with family members. The power dynamic, the nature of the family structure, and culture are all interrelated. The first year's income covers the cost of securing foreign employment, and workers are vulnerable in this first year due to their debts. Employers protect their investment by working them to capacity or using fear and physical confinement to secure obedience. Workers are humiliated and immobilized. The comparison between the three countries illustrates the potential for protecting migrant domestic workers. Singapore and Taiwan lack sufficient legal and social support for migrant women, and Hong Kong must use a more comprehensive approach for integrating power dynamics, employment, work regulations, and labor status.
Goldman-Mellor, Sidra; Caspi, Avshalom; Arseneault, Louise; Ajala, Nifemi; Ambler, Antony; Danese, Andrea; Fisher, Helen; Hucker, Abigail; Odgers, Candice; Williams, Teresa; Wong, Chloe; Moffitt, Terrie E.
2016-01-01
Background Labour market disengagement among youths has lasting negative economic and social consequences, yet is poorly understood. We compared four types of work-related self-perceptions, as well as vulnerability to mental health and substance abuse problems, among youths not in education, employment, or training (NEET) and among their peers. Methods Participants were from the Environmental Risk (E-Risk) longitudinal study, a nationally representative U.K. cohort of 2,232 twins born in 1994–95. We measured commitment to work, job-search effort, professional/technical skills, “soft” skills (e.g., teamwork, decision-making, communication), optimism about getting ahead, and mental health and substance-use disorders at age 18. We also examined childhood mental health. Results At age 18, 11.6% of participants were NEET. NEET participants reported themselves as committed to work and searching for jobs with greater diligence than their non-NEET peers. However, they reported fewer “soft” skills (B = −0.98, p < .001) and felt less optimistic about their likelihood of getting ahead in life (B = −2.41, p < .001). NEET youths also had higher rates of concurrent mental health and substance-abuse problems, but these did not explain the relationship with work-related self-perceptions. Nearly 60% of NEET (vs. 35% of non-NEET) youths had already experienced ≥1 mental health problem in childhood/adolescence. Associations of NEET status with concurrent mental health problems were independent of pre-existing mental health vulnerability. Conclusions Our findings indicate that while NEET is clearly an economic and mental health issue, it does not appear to be a motivation issue. Alongside skills, work-related self-perceptions and mental-health problems may be targets for intervention and service provision among this high-risk population. PMID:26791344
Aase, M; Nordrehaug, J E; Malterud, K
2008-11-01
Physicians are exposed to matters of existential character at work, but little is known about the personal impact of such issues. To explore how physicians experience and cope with existential aspects of their clinical work and how such experiences affect their professional identities, a qualitative study using individual semistructured interviews has analysed accounts of their experiences related to coping with such challenges. Analysis was by systematic text condensation. The purposeful sample comprised 10 physicians (including three women), aged 33-66 years, residents or specialists in cardiology or cardiothoracic surgery, working in a university hospital with 24-hour emergency service and one general practitioner. Participants described a process by which they were able to develop a capacity for coping with the existential challenges at work. After episodes perceived as shocking or horrible earlier in their career, they at present said that they could deal with death and mostly keep it at a distance. Vulnerability was closely linked to professional responsibility and identity, perceived as a burden to be handled. These demands were balanced by an experience of meaning related to their job, connected to making a difference in their patients' lives. Belonging to a community of their fellows was a presupposition for coping with the loneliness and powerlessness related to their vulnerable professional position. Physicians' vulnerability facing life and death has been underestimated. Belonging to caring communities may assist growth and coping on exposure to existential aspects of clinical work and developing a professional identity.
Violence in contract work among female sex workers in Andhra Pradesh, India.
George, Annie; Sabarwal, Shagun; Martin, P
2011-12-01
Female sex workers (FSWs) are vulnerable to physical and sexual violence at work. This article examines the prevalence of recent physical and sexual violence victimization and associations of type of sex work among a large sample of young FSWs. We used data from a cross-sectional survey on sex trafficking and sex work in southern India that included 1138 FSWs aged 18-25 years residing in 3 districts of Andhra Pradesh state. The independent variable was organization of sex work. FSWs on contract at sex work establishments outside their home district were classified as contract workers, as compared with women who worked autonomously within their home district. Using logistic regression models adjusted for sociodemographic factors, we assessed the relation between contract/ non-contract sex work and various forms of violence experienced by FSWs. Results indicate a high prevalence of work-related physical and sexual violence; 50% FSWs reported physical violence, and 77% reported sexual violence. FSWs performing contract work were at increased risk of physical and sexual violence at work, compared with women engaged in sex work in their home districts. The findings that contract work outside the home district increases the vulnerabilities faced by FSWs in India suggest that violence and disease prevention services aimed at FSWs would be more effective if organization of sex work--as contract or noncontract--is taken into account.
Karoubi, Mohammad Taghi; Akhondi, Mohammad Mehdi
2011-01-01
The astonishing advance of medical science in recent decades has had endless advantages for humans, including improved level of health, prevention of disease and advances in treatment. These advances depend to a great extent on conducting continuous research. However, besides its enormous advantages, the sole interest of medical science undermines the principles of respect for human vulnerability and personal integrity, in both positive and negative approaches. The positive approach refers to the people who participate in research and practice, while the negative approach refers to people who are deprived of research and practice. The authors of this work, based on legal or moral grounds try to analyse the tension between the principle of respect for human vulnerability and personal integrity and the interest of medical science. Undoubtedly, in applying scientific knowledge and medical practice human vulnerability should be taken into account. In this regard, especially vulnerable individuals and groups should be protected and the personal integrity of such individuals respected. In the light of the merits of Islamic law, this paper is designed to examine the significance of the principles of human vulnerability and personal integrity in medical research by studying the international documents as formalised by UNESCO in order to explore the place of these principles in the Iranian legal system. PMID:23408269
Reed, M S; Podesta, G; Fazey, I; Geeson, N; Hessel, R; Hubacek, K; Letson, D; Nainggolan, D; Prell, C; Rickenbach, M G; Ritsema, C; Schwilch, G; Stringer, L C; Thomas, A D
2013-10-01
Experts working on behalf of international development organisations need better tools to assist land managers in developing countries maintain their livelihoods, as climate change puts pressure on the ecosystem services that they depend upon. However, current understanding of livelihood vulnerability to climate change is based on a fractured and disparate set of theories and methods. This review therefore combines theoretical insights from sustainable livelihoods analysis with other analytical frameworks (including the ecosystem services framework, diffusion theory, social learning, adaptive management and transitions management) to assess the vulnerability of rural livelihoods to climate change. This integrated analytical framework helps diagnose vulnerability to climate change, whilst identifying and comparing adaptation options that could reduce vulnerability, following four broad steps: i) determine likely level of exposure to climate change, and how climate change might interact with existing stresses and other future drivers of change; ii) determine the sensitivity of stocks of capital assets and flows of ecosystem services to climate change; iii) identify factors influencing decisions to develop and/or adopt different adaptation strategies, based on innovation or the use/substitution of existing assets; and iv) identify and evaluate potential trade-offs between adaptation options. The paper concludes by identifying interdisciplinary research needs for assessing the vulnerability of livelihoods to climate change.
Reed, M.S.; Podesta, G.; Fazey, I.; Geeson, N.; Hessel, R.; Hubacek, K.; Letson, D.; Nainggolan, D.; Prell, C.; Rickenbach, M.G.; Ritsema, C.; Schwilch, G.; Stringer, L.C.; Thomas, A.D.
2013-01-01
Experts working on behalf of international development organisations need better tools to assist land managers in developing countries maintain their livelihoods, as climate change puts pressure on the ecosystem services that they depend upon. However, current understanding of livelihood vulnerability to climate change is based on a fractured and disparate set of theories and methods. This review therefore combines theoretical insights from sustainable livelihoods analysis with other analytical frameworks (including the ecosystem services framework, diffusion theory, social learning, adaptive management and transitions management) to assess the vulnerability of rural livelihoods to climate change. This integrated analytical framework helps diagnose vulnerability to climate change, whilst identifying and comparing adaptation options that could reduce vulnerability, following four broad steps: i) determine likely level of exposure to climate change, and how climate change might interact with existing stresses and other future drivers of change; ii) determine the sensitivity of stocks of capital assets and flows of ecosystem services to climate change; iii) identify factors influencing decisions to develop and/or adopt different adaptation strategies, based on innovation or the use/substitution of existing assets; and iv) identify and evaluate potential trade-offs between adaptation options. The paper concludes by identifying interdisciplinary research needs for assessing the vulnerability of livelihoods to climate change. PMID:25844020
NASA Astrophysics Data System (ADS)
Guillard-Gonçalves, C.; Zêzere, J. L.; Pereira, S.; Garcia, R. A. C.
2015-09-01
This study offers a semi-quantitative assessment of the physical vulnerability of buildings to landslides in the Loures municipality, as well as an analysis of the landslide risk computed as the product of the vulnerability by the economic value of the buildings and by the landslide hazard. The physical vulnerability assessment, which was based on a questionnaire sent to a pool of Portuguese and European researchers, and the assessment of the subjectivity of their answers are innovative contributions of this work. The generalization of the vulnerability to the smallest statistical subsection was validated by changing the map unit and applying the vulnerability to all the buildings of a test site (approximately 800 buildings), which were inventoried during fieldwork. The economic value of the buildings of the Loures municipality was calculated using an adaptation of the Portuguese Tax Services formula. The hazard was assessed by combining the susceptibility of the slopes, the spatio-temporal probability and the frequency-magnitude relationship of the landslide. Finally, the risk was mapped for different landslide magnitudes and different spatio-temporal probabilities. The highest landslide risk was found for the landslide with a depth of 3 m in the landslide body, and a height of 1m in the landslide foot.
The upper limit of vulnerability of the heart
NASA Astrophysics Data System (ADS)
Mazeh, Nachaat
Fibrillation is a major cause of death worldwide and it affects a very large part of the population. Its mechanism is not fully understood and the immediate remedy is to defibrillate. While defibrillation has been very successful, defibrillators apply a shock strength that could itself reinduce fibrillation. There exists an upper limit of vulnerability above which a shock does not induce reentry and therefore does not expose the patient to the reinduction of fibrillation. This upper limit of vulnerability has been predicted theoretically and observed experimentally, but the mechanism of the upper limit has not been well understood. This work will investigate the upper limit of vulnerability using a computer simulation. The bidomain model of the cardiac tissue has been used extensively for the past thirty years. The Beeler-Reuter model of the membrane kinetics has also been used in conjunction with the bidomain. This computer simulation of the bidomain and the Beeler-Reuter model will allow us to investigate the response of the induced virtual electrodes necessary to produce reentry. We will look at the vulnerable window and investigate the upper limit above which defibrillators can safely apply any shock strength to stop a fibrillation. One main conclusion is that widespread, random heterogeneities must be included in our model of cardiac tissue in order to predict an upper limit of vulnerability.
Identifying typical patterns of vulnerability: A 5-step approach based on cluster analysis
NASA Astrophysics Data System (ADS)
Sietz, Diana; Lüdeke, Matthias; Kok, Marcel; Lucas, Paul; Carsten, Walther; Janssen, Peter
2013-04-01
Specific processes that shape the vulnerability of socio-ecological systems to climate, market and other stresses derive from diverse background conditions. Within the multitude of vulnerability-creating mechanisms, distinct processes recur in various regions inspiring research on typical patterns of vulnerability. The vulnerability patterns display typical combinations of the natural and socio-economic properties that shape a systems' vulnerability to particular stresses. Based on the identification of a limited number of vulnerability patterns, pattern analysis provides an efficient approach to improving our understanding of vulnerability and decision-making for vulnerability reduction. However, current pattern analyses often miss explicit descriptions of their methods and pay insufficient attention to the validity of their groupings. Therefore, the question arises as to how do we identify typical vulnerability patterns in order to enhance our understanding of a systems' vulnerability to stresses? A cluster-based pattern recognition applied at global and local levels is scrutinised with a focus on an applicable methodology and practicable insights. Taking the example of drylands, this presentation demonstrates the conditions necessary to identify typical vulnerability patterns. They are summarised in five methodological steps comprising the elicitation of relevant cause-effect hypotheses and the quantitative indication of mechanisms as well as an evaluation of robustness, a validation and a ranking of the identified patterns. Reflecting scale-dependent opportunities, a global study is able to support decision-making with insights into the up-scaling of interventions when available funds are limited. In contrast, local investigations encourage an outcome-based validation. This constitutes a crucial step in establishing the credibility of the patterns and hence their suitability for informing extension services and individual decisions. In this respect, working at the local level provides a clear advantage since, to a large extent, limitations in globally available observational data constrain such a validation on the global scale. Overall, the five steps are outlined in detail in order to facilitate and motivate the application of pattern recognition in other research studies concerned with vulnerability analysis, including future applications to different vulnerability frameworks. Such applications could promote the refinement of mechanisms in specific contexts and advance methodological adjustments. This would further increase the value of identifying typical patterns in the properties of socio-ecological systems for an improved understanding and management of the relation between these systems and particular stresses.
ERIC Educational Resources Information Center
Campbell, Stephen Matthew
2010-01-01
Internet access in the workplace has become ubiquitous in many organizations. Often, employees need this access to perform their duties. However, many studies report a large percentage of employees use their work Internet access for non-work-related activities. These activities can result in reduced efficiency, increased vulnerability to cyber…
Self-sacrifice, self-transcendence and nurses' professional self.
Pask, Elizabeth J
2005-10-01
In this paper I elaborate a notion of nurses' professional self as one who is attracted towards intrinsic value. My previous work in 2003 has shown how nurses, who see intrinsic value in their work, experience self-affirmation when they believe that they have made a difference to that which they see to have value. The aim of this work is to reveal a further aspect of nurses' professional self. I argue that nurses' desire towards that which they see to have intrinsic value, is a necessary and self-transcending aspect of a nurses' professional self. I argue further that nurses' desire towards intrinsic value inevitably involves their vulnerability. Nurses who see intrinsic value are shown to be vulnerable to self-sacrifice in their inclination to work for the good of their patients, at the expense of themselves. Yet an ability to transcend their self in this way remains a necessary aspect of a nurse's professional self, which requires nurture and support through nurse education.
Cook, Won Kim; Tseng, Winston; Ko Chin, Kathy; John, Iyanrick; Chung, Corina
2014-11-01
Working in small businesses has been identified as a key factor for low coverage rates in immigrant communities. In this study, we identify specific cultural and socioeconomic predictors of Asian Americans who work in small businesses to identify subgroups at a greater disadvantage than others in obtaining health insurance. Logistic regression models were fitted using a sample of 3,819 Asian American small business owners and employers extracted from pooled 2005–2012 California Health Interview Survey data. We found that individuals with low income levels, Korean Americans, U.S.-born South Asian and Southeast Asian (other than Vietnamese) Americans, immigrants without citizenship (particularly those lacking a green card), and individuals with limited English proficiency had higher odds of lacking coverage. The odds of being uninsured did not differ between small business owners and employees. Based upon these key findings, we propose several strategies to expand coverage for Asian Americans working in small businesses and their most vulnerable subgroups.
Medhi, G K; Mahanta, J; Hazarika, I; Armstrong, G; Adhikary, R; Mainkar, M; Paranjape, R S
2013-03-01
This paper describes the sex work characteristics and factors associated with syphilis among female sex workers (FSWs) in Dimapur district of high HIV prevalence Indian state, Nagaland. The study recruited 426 FSWs in 2006 using respondent-driven sampling. The prevalence of syphilis was 21.1% and HIV prevalence was 11.7%. Approximately half were under 25 years of age. Clients were solicited mainly in public places (32.7%), while hotels/lodges/rented rooms were the most common places of entertainment (57.2%). Condom use during the last sex was 36.5% with occasional and 27% with regular clients. Being married, being widowed/divorced/separated, being illiterate or having a history of drug use increased the likelihood of syphilis infection. Entertaining clients in bars/booze joints decreased the probability of syphilis. FSWs who moved between soliciting in public places or bars/booze joints and then entertaining in hotels/lodges/rented rooms had a higher vulnerability to syphilis. In summary, we found that the vulnerability to syphilis among mostly young FSWs in Dimapur varied according to their sex work characteristics, marital and educational status and drug use habits. They may be more vulnerable to HIV and sexually transmitted infections (HIV/STIs) due to the low rate of condom use. The findings have direct implications for HIV/STI prevention programmes in Northeast India.
Brody, Thomas M; Di Bianca, Paisly; Krysa, Jan
2012-10-01
Although coastal oil spills tend to be highly publicized, crude oil spills in the United States affect inland areas relatively often. Spills to inland areas often affect sensitive environments and can have greater impacts to health and welfare than spills to coastal areas. For these reasons, the authors investigated inland crude oil spill threats, vulnerabilities, and emergency response in the midwestern U.S. states of Illinois, Indiana, Michigan, Minnesota, Ohio, and Wisconsin. These states work with the Region 5 Offices of the U.S. Environmental Protection Agency. Region 5's geospatial data in the Inland Sensitivity Atlas were turned into metrics indicating inland crude oil spill threats and vulnerabilities among the Region's sub-watersheds. These threats and vulnerabilities were weighted using data from the National Response Center and the Department of Energy's Environmental Restoration Priority System. The locations of the Region's emergency responders were geocoded in GIS. The GIS calculated the emergency response times to the Region's sub-watersheds. The resulting scatter plots are connected to the sub-watersheds in the map so stakeholders can (1) see the outlying sub-watersheds of concern and (2) better understand how reducing threats and better response time can reduce the risk of inland crude oil spills. Published 2012. This article is a U.S. Government work and is in the public domain in the U.S.A.
Servin, Argentina E.; Strathdee, Steffanie; Muñoz, Fatima A.; Vera, Alicia; Rangel, Gudelia; Silverman, Jay G.
2014-01-01
Most studies of female sex workers (FSWs) conducted in the Mexico-US border region have focused on individual HIV risk, centered on sexual behaviors and substance abuse patterns. Little attention has been drawn to the reality that sex workers are often parents whose children potentially face vulnerabilities unique to their family situation. The objective of the present study was to identify the vulnerabilities faced by the children of FSWs in two Mexican-U.S. border cities. From 2008-2010, 628 FSW-IDUs underwent interviewer-administered surveys and HIV/STI testing. Approximately 1 in 5 participants (20%) reported having a parent involved in sex work and majority referred it was their mother (88%). Close to one third of participants (31%) reported first injecting drugs <18 years of age and 33% reported they began working regularly as a prostitute <18 years of age. First drinking alcohol <18 years old (AdjOR=1.87, 95%CI: 1.13–3.08), lifetime cocaine use (AOR=1.76, 95%CI: 1.09–2.84), ever being forced or coerced into non–consensual sex as a minor (<18 years of age) (AdjOR =1.54, 95%CI: 1.01-2.35) and injecting drugs with used syringes in the prior month (AOR=1.63, 95%CI:1.07 -2.49) were factors associated with having had a parent involved in sex work. These findings begin to lay the groundwork for understanding the potential vulnerabilities faced by the children of sex workers. Understanding these potential needs are necessary for creating relevant, evidence based interventions focused on supporting these women. PMID:25117749
Servin, Argentina E; Strathdee, Steffanie; Muñoz, Fatima A; Vera, Alicia; Rangel, Gudelia; Silverman, Jay G
2015-01-01
Most studies of female sex workers (FSWs) conducted in the Mexico-US border region have focused on individual HIV risk, centered on sexual behaviors and substance abuse patterns. Little attention has been drawn to the reality that sex workers are often parents whose children potentially face vulnerabilities unique to their family situation. The objective of the present study was to identify the vulnerabilities faced by the children of FSWs in two Mexican-US border cities. From 2008 to 2010, 628 FSW-injection drug users underwent interviewer-administered surveys and HIV/STI testing. Approximately one in five participants (20%) reported having a parent involved in sex work and majority referred it was their mother (88%). Close to one-third of participants (31%) reported first injecting drugs <18 years of age, and 33% reported they began working regularly as a prostitute <18 years of age. First drinking alcohol <18 years old (AOR = 1.87, 95%CI: 1.13-3.08), lifetime cocaine use (AOR = 1.76, 95%CI: 1.09-2.84), ever being forced or coerced into non-consensual sex as a minor (<18 years of age; AOR = 1.54, 95%CI: 1.01-2.35), and injecting drugs with used syringes in the prior month (AOR = 1.63, 95%CI: 1.07-2.49) were the factors associated with having had a parent involved in sex work. These findings begin to lay the groundwork for understanding the potential vulnerabilities faced by the children of sex workers. Understanding these potential needs is necessary for creating relevant, evidence-based interventions focused on supporting these women.
Stern, Michelle A.; Anderson, Frank A.; Flint, Lorraine E.; Flint, Alan L.
2018-05-03
In situ soil moisture datasets are important inputs used to calibrate and validate watershed, regional, or statewide modeled and satellite-based soil moisture estimates. The soil moisture dataset presented in this report includes hourly time series of the following: soil temperature, volumetric water content, water potential, and total soil water content. Data were collected by the U.S. Geological Survey at five locations in California: three sites in the central Sierra Nevada and two sites in the northern Coast Ranges. This report provides a description of each of the study areas, procedures and equipment used, processing steps, and time series data from each site in the form of comma-separated values (.csv) tables.
The Figure.tar.gz contains a directory for each WRF ensemble run. In these directories are *.csv files for each meteorology variable examined. These are comma delimited text files that contain statistics for each observation site. Also provided is an R script that reads these files (user would need to change directory pointers) and computes the variability of error and bias of the ensemble at each site and plots these for reproduction of figure 3.This dataset is associated with the following publication:Gilliam , R., C. Hogrefe , J. Godowitch, S. Napelenok , R. Mathur , and S.T. Rao. Impact of inherent meteorology uncertainty on air quality model predictions. JOURNAL OF GEOPHYSICAL RESEARCH-ATMOSPHERES. American Geophysical Union, Washington, DC, USA, 120(23): 12,259–12,280, (2015).
DOE Office of Scientific and Technical Information (OSTI.GOV)
The Sensor Fish collects information that can be used to evaluate conditions encountered by juvenile salmonids and other fish as they pass through hydroelectric dams on their way to the ocean. Sensor Fish are deployed in turbines, spillways, and sluiceways and measure changes in pressure, angular rate of change, and linear acceleration during passage. The software is need to make Sensor Fish fully functional and easy to use. Sensor Fish Communicator (SFC) links to Sensor Fish, allowing users to control data collection settings and download data. It may also be used to convert native raw data (.raw2) files into Commamore » Separated Variable (.csv) files and plot the results. The multiple capabilities of the SFC allow hardware communication, data conversion, and data plotting with one application.« less
Hirsch, Jennifer S
2014-01-01
This paper discusses labor migration as an example of how focusing on the meso-level highlights the social processes through which structural factors produce HIV risk. Situating that argument in relation to existing work on economic organization and HIV risk as well as research on labor migration and HIV vulnerabilities, the paper demonstrates how analyzing the processes through which labor migration creates vulnerability can shift attention away from the proximate behavioral determinants of HIV risk and toward the community and policy levels. Further, it presents the concepts of externalities and the ethics of consumption, which underline how both producers and consumers benefit from low-waged migrant labor, and thus are responsible for the externalization of HIV risk characteristic of supply chains that rely on migrant labor. These concepts point to strategies through which researchers and advocates could press the public and private sectors to improve the conditions in which migrants live and work, with implications for HIV as well as other health outcomes. Copyright © 2013 Elsevier Ltd. All rights reserved.
Machado, Tanya; Sathyanarayanan, Vidya; Bhola, Poornima; Kamath, Kirthi
2013-01-01
Background: The business process outsourcing (BPO) sector is a contemporary work setting in India, with a large and relatively young workforce. There is concern that the demands of the work environment may contribute to stress levels and psychological vulnerability among employees as well as to high attrition levels. Materials and Methods: As part of a larger study, questionnaires were used to assess psychological distress, burnout, and coping strategies in a sample of 1,209 employees of a BPO organization. Results: The analysis indicated that 38% of the sample had significant psychological distress on the General Health Questionnaire (GHQ-28; Goldberg and Hillier, 1979). The vulnerable groups were women, permanent employees, data processors, and those employed for 6 months or longer. The reported levels of burnout were low and the employees reported a fairly large repertoire of coping behaviors. Conclusions: The study has implications for individual and systemic efforts at employee stress management and workplace prevention approaches. The results point to the emerging and growing role of mental health professionals in the corporate sector. PMID:24459370
Exploration De La Résilience éducationnelle Chez Des Enseignants
NASA Astrophysics Data System (ADS)
Théorêt, Manon; Garon, Roseline; Hrimech, Mohamed; Carpentier, Anylène
2006-12-01
AN EXPLORATION OF THE EDUCATIONAL RESILIENCE OF TEACHING STAFF - This study focuses on the degree of resilience displayed by teaching staff with the aim of promoting their professional development and preventing job-related exhaustion. Seven underprivileged schools in Montreal were selected, and 24 teaching staff with contrasting personal profiles were interviewed on the subject of their work. The Alceste software was used to analyse the conversations, which revolved around techniques applied when dealing with critical incidents. The main analysis identified five different discourses among the respondents. Three of these were associated with the more resilient of the teachers and two were associated with the more vulnerable ones. Resilient teaching staff characteristically discussed dealing with aggressive behaviour, the teaching-learning relationship and the subject of social relationships, whereas vulnerable teaching staff focused on work beyond the classroom, people in positions of higher authority and the community. The authors note that teachers who are just embarking on their careers appear more vulnerable than more experienced teaching staff, which suggests that more resources should be provided to support teachers in their profession.
HIV vulnerabilities of sex-trafficked Indian women and girls.
Gupta, Jhumka; Raj, Anita; Decker, Michele R; Reed, Elizabeth; Silverman, Jay G
2009-10-01
To qualitatively explore potential mechanisms that may confer heightened risk for HIV infection among survivors of sex trafficking in India. Case narratives of 61 repatriated women and girls who reported being trafficked into sex work and were receiving services at an NGO in Mysore, India, were reviewed. Narratives were analyzed to examine potential sources of HIV risk related to sex trafficking. Participants were aged 14-30 years. Among the 48 women and girls tested for HIV, 45.8% were HIV positive. Narratives described very low levels of autonomy, with control exacted by brothel managers and traffickers. Lack of control appeared to heighten trafficked women and girls' vulnerability to HIV infection in the following ways: use of violent rape as a means of coercing initiation into sex work, inability to refuse sex, inability to use condoms or negotiate use, substance use as a coping strategy, and inadequate access to health care. Sex trafficked women and girls lack autonomy and are rendered vulnerable to HIV infection through several means. Development of HIV prevention strategies specifically designed to deal with lack of autonomy and reach sex-trafficked women and girls is imperative.
Multilevel Interventions Targeting Obesity: Research Recommendations for Vulnerable Populations.
Stevens, June; Pratt, Charlotte; Boyington, Josephine; Nelson, Cheryl; Truesdale, Kimberly P; Ward, Dianne S; Lytle, Leslie; Sherwood, Nancy E; Robinson, Thomas N; Moore, Shirley; Barkin, Shari; Cheung, Ying Kuen; Murray, David M
2017-01-01
The origins of obesity are complex and multifaceted. To be successful, an intervention aiming to prevent or treat obesity may need to address multiple layers of biological, social, and environmental influences. NIH recognizes the importance of identifying effective strategies to combat obesity, particularly in high-risk and disadvantaged populations with heightened susceptibility to obesity and subsequent metabolic sequelae. To move this work forward, the National Heart, Lung, and Blood Institute, in collaboration with the NIH Office of Behavioral and Social Science Research and NIH Office of Disease Prevention convened a working group to inform research on multilevel obesity interventions in vulnerable populations. The working group reviewed relevant aspects of intervention planning, recruitment, retention, implementation, evaluation, and analysis, and then made recommendations. Recruitment and retention techniques used in multilevel research must be culturally appropriate and suited to both individuals and organizations. Adequate time and resources for preliminary work are essential. Collaborative projects can benefit from complementary areas of expertise and shared investigations rigorously pretesting specific aspects of approaches. Study designs need to accommodate the social and environmental levels under study, and include appropriate attention given to statistical power. Projects should monitor implementation in the multiple venues and include a priori estimation of the magnitude of change expected within and across levels. The complexity and challenges of delivering interventions at several levels of the social-ecologic model require careful planning and implementation, but hold promise for successful reduction of obesity in vulnerable populations. Copyright © 2016. Published by Elsevier Inc.
Multilevel Interventions Targeting Obesity: Research Recommendations for Vulnerable Populations
Stevens, June; Pratt, Charlotte; Boyington, Josephine; Nelson, Cheryl; Truesdale, Kimberly P.; Ward, Dianne S.; Lytle, Leslie; Sherwood, Nancy E.; Robinson, Thomas N.; Moore, Shirley; Barkin, Shari; Cheung, Ying Kuen; Murray, David M.
2017-01-01
Introduction The origins of obesity are complex and multifaceted. To be successful, an intervention aiming to prevent or treat obesity may need to address multiple layers of biological, social, and environmental influences. Methods NIH recognizes the importance of identifying effective strategies to combat obesity, particularly in high-risk and disadvantaged populations with heightened susceptibility to obesity and subsequent metabolic sequelae. To move this work forward, the National Heart, Lung, and Blood Institute, in collaboration with the NIH Office of Behavioral and Social Science Research and NIH Office of Disease Prevention convened a working group to inform research on multilevel obesity interventions in vulnerable populations. The working group reviewed relevant aspects of intervention planning, recruitment, retention, implementation, evaluation, and analysis, and then made recommendations. Results Recruitment and retention techniques used in multilevel research must be culturally appropriate and suited to both individuals and organizations. Adequate time and resources for preliminary work are essential. Collaborative projects can benefit from complementary areas of expertise and shared investigations rigorously pretesting specific aspects of approaches. Study designs need to accommodate the social and environmental levels under study, and include appropriate attention given to statistical power. Projects should monitor implementation in the multiple venues and include a priori estimation of the magnitude of change expected within and across levels. Conclusions The complexity and challenges of delivering interventions at several levels of the social—ecologic model require careful planning and implementation, but hold promise for successful reduction of obesity in vulnerable populations. PMID:28340973
Williams, Robert Alan
2007-01-01
There is a developing body of research that investigates the links between masculinities and men's health experiences, but the links between masculinities and the health of fathers has been a neglected focus for research in the UK. This paper presents some of the findings drawn from a parent study which investigated African-Caribbean and white working class fathers' experiences of fathering, health and social connectedness. Data are drawn from interviews with 13 men (6 African-Caribbean and 7 White working class) living in a city in the West Midlands area of the UK. In this paper, I analyse and discuss African-Caribbean and white working class fathers' stories about the meaning of health, the influences upon their health, and their health practices. It was found that for the African-Caribbean fathers specifically, anticipated or perceived racist prejudice, abuse or discrimination influenced their health experiences. However, the meaning of health for both ethnic groups of fathers was as functional capacity, that is health was an asset that allowed fathers to meet the obligations of paid work and fathering. These obligations were also associated with a restricted sense of personal agency for the men interviewed, and the associated constraints were linked to transgressive consumption of alcohol, food and tobacco. In addition, fathers were also involved in solitary ways of dealing with their vulnerability, vulnerability that was associated with fathers' health concerns, and other difficult life experiences. Fathers' solitary experiences of vulnerability were also mediated by hegemonic forms of masculinity. Nevertheless, the experience of fathering within the lifecourse influenced men's health experiences: reflexivity and challenges to both transgressive consumption and solitary experiences were linked to fathers' perceived obligations to children. The significance of gender, ethnicity and social class for theory and future research with working class fathers and boys is identified, and the need for gender-sensitive public health and health promotion interventions regarding the 'work-family balance' and working class fathers' personal and social skills is also discussed.
Gerassi, Lara; Edmond, Tonya; Nichols, Andrea
2017-06-01
The study of sex trafficking, prostitution, sex work, and sexual exploitation is associated with many methodological issues and challenges. Researchers' study designs must consider the many safety issues related to this vulnerable and hidden population. Community advisory boards and key stakeholder involvement are essential to study design to increase safety of participants, usefulness of study aims, and meaningfulness of conclusions. Nonrandomized sampling strategies are most often utilized when studying exploited women and girls, which have the capacity to provide rich data and require complex sampling and recruitment methods. This article reviews the current methodological issues when studying this marginalized population as well as strategies to address challenges while working with the community in order to bring about social change. The authors also discuss their own experiences in collaborating with community organizations to conduct research in this field.
Gerassi, Lara; Edmond, Tonya; Nichols, Andrea
2016-01-01
The study of sex trafficking, prostitution, sex work, and sexual exploitation is associated with many methodological issues and challenges. Researchers’ study designs must consider the many safety issues related to this vulnerable and hidden population. Community advisory boards and key stakeholder involvement are essential to study design to increase safety of participants, usefulness of study aims, and meaningfulness of conclusions. Nonrandomized sampling strategies are most often utilized when studying exploited women and girls, which have the capacity to provide rich data and require complex sampling and recruitment methods. This article reviews the current methodological issues when studying this marginalized population as well as strategies to address challenges while working with the community in order to bring about social change. The authors also discuss their own experiences in collaborating with community organizations to conduct research in this field. PMID:28824337
Finn, Peter R
2002-09-01
This article presents a cognitive-motivational theory (CMT) of the mechanisms associated with three basic dimensions of personality vulnerability to alcoholism, impulsivity/novelty seeking, harm avoidance, and excitement seeking. CMT describes the interrelationships between activity in basic motivational systems and attentional, decision-making and working memory processes as the mechanisms associated with variation in each personality trait. Impulsivity/novelty seeking reflects activity in both appetitive and inhibitory motivational systems, greater attention to reward cues, and increased emotional reactivity to reward and frustration. Harm avoidance reflects individual differences in fearfulness and activity in specific inhibitory systems. Excitement seeking reflects the need to engage in appetitive behaviors in less predictable environments to experience positive affect. CMT also describes the impact of working memory and the specific motivational processes underlying each trait dimension on the dynamics of decision making from the perspective of decision field theory.
Foster care history and HIV infection among drug-using African American female sex workers.
Surratt, Hilary L; Kurtz, Steven P
2012-05-01
Foster care has been associated with increased HIV risk behaviors among youth, yet long-term association with HIV infection has not been examined. This study explored the associations between foster placement, victimization, mental health, onset of sex work and HIV infection among highly vulnerable female sex workers. 562 drug-involved African American women were enrolled into an intervention study to increase health services utilization and reduce HIV risk. Seventeen percent reported a history of foster placement. Foster history was associated with significantly lower educational attainment, higher victimization, and more severe mental health problems. Women with foster histories reported significantly earlier entry into paid sex work, with some 62% active in the sex trade before age 18. Multivariate analyses found that foster care was independently associated with HIV seropositivity, and that early sex work partially mediated this association. The potential long-term health vulnerabilities associated with foster placement are understudied and warrant additional research.
Mayhew, S; Collumbien, M; Qureshi, A; Platt, L; Rafiq, N; Faisel, A; Lalji, N; Hawkes, S
2009-04-01
To investigate the nature and extent of human rights abuses against three vulnerable groups (injecting drug users (IDUs) and male and female sex workers), to understand the social and sexual linkages between them and to examine how protecting their rights could enhance the impact of HIV prevention policies. In-depth interviews were carried out with 38 high-risk respondents (IDUs and female, male and transgender sex workers) and a bio-behavioural survey was performed of 813 IDU/sex worker respondents in Rawalpindi. People in all vulnerable groups interacted both sexually and socially. All groups experienced human rights abuses by state and non-state actors which increased their HIV risk. Non-state actors, including relations and sex worker clients, are responsible for verbal, physical and sexual violence. State actors (particularly police) perpetrate harassment, exploitation and abuse of all vulnerable groups with impunity. Health service providers fail to provide adequate services for vulnerable groups. High levels of discrimination and abuse of human dignity of all groups studied were revealed. This violates their physical and mental integrity and also leads to an increased risk of HIV. The sexual and social interactions between groups mean that human rights abuses experienced by one high-risk group can increase the risk of HIV both for them and other groups. The protection of human rights needs to become an integral part of a multisector response to the risk of HIV/AIDS by state and non-state agencies. The Government of Pakistan should work at both legal and programme levels to protect the rights of, and minimise discrimination against, groups vulnerable to HIV in order to reduce the potential for the spread of HIV before the epidemic takes hold.
Goldenberg, Shira M.; Silverman, Jay G.; Engstrom, David; Bojorquez-Chapela, Ietza; Usita, Paula; Rolón, María Luisa; Strathdee, Steffanie A.
2015-01-01
Coerced and adolescent sex industry involvement are linked to serious health and social consequences, including enhanced risk of HIV infection. Using ethnographic fieldwork, including interviews with 30 female sex workers with a history of coerced or adolescent sex industry involvement, we describe contextual factors influencing vulnerability to coerced and adolescent sex industry entry and their impacts on HIV risk and prevention. Early gender-based violence and economic vulnerabilities perpetuated subsequent vulnerability to coercion and adolescent sex exchange, while HIV risk mitigation capacities improved with increased age, control over working conditions, and experience. Structural interventions addressing gender-based violence, economic factors, and HIV prevention among all females who exchange sex are needed. PMID:25648946
[Vulnerabilities present in the path experienced by patients with HIV / AIDS in treatment failure].
Sousa, Petra Kelly Rabelo de; Torres, Daniele Viana Maia; Miranda, Karla Corrêa Lima; Franco, Amanda Carneiro
2013-01-01
A major breakthrough in AIDS treatment occurred with the advent of antiretroviral therapy. However, several vulnerabilities may be present in the path experienced by patients during treatment. This study aimed to analyze the vulnerabilities of patients with HIV / AIDS in treatment failure. It is a qualitative study, involving seven users with AIDS considered in treatment failure in an Outpatient Service Unit on HIV / AIDS, in Fortaleza-CE. To interpret the data, it was used the technique of content analysis. In the speeches, it was realized that the deponents faced conflicts in the family and, difficult relationships with people and stigma at work. It was observed that patients had experienced various situations that made them more susceptible to HIV infection and illness.
Changes to criminal records checks used to safeguard vulnerable patients.
Griffith, Richard; Tengnah, Cassam
2012-07-01
The Protection of Freedoms Act 2012 is introducing changes to the Criminal Records Bureau (CRB) checks carried out on those people who work with vulnerable groups. The new law is the coalition Government's response to the criticism of the Safeguarding Vulnerable Group Act 2006. It will merge the CRB and Independent Safeguarding Authority into a new Disclosure and Barring Service and will enhance the rights of applicants to challenge the CRB's right to disclose non-conviction information as part of an enhanced criminal records check. In the first of two articles on the Protection of Freedoms Act 2012, Richard Griffith and Cassam Tengnah discuss the current framework for disclosing criminal records and the impact of the changes on district nurses applying for new posts.
Goldenberg, Shira M; Silverman, Jay G; Engstrom, David; Bojorquez-Chapela, Ietza; Usita, Paula; Rolón, María Luisa; Strathdee, Steffanie A
2015-04-01
Coerced and adolescent sex industry involvement are linked to serious health and social consequences, including enhanced risk of HIV infection. Using ethnographic fieldwork, including interviews with 30 female sex workers with a history of coerced or adolescent sex industry involvement, we describe contextual factors influencing vulnerability to coerced and adolescent sex industry entry and their impacts on HIV risk and prevention. Early gender-based violence and economic vulnerability perpetuated vulnerability to coercion and adolescent sex exchange, while HIV risk mitigation capacities improved with increased age, control over working conditions, and experience. Structural interventions addressing gender-based violence, economic factors, and HIV prevention among all females who exchange sex are needed. © The Author(s) 2015.
NASA Astrophysics Data System (ADS)
Williams, G. T.; Kennedy, B. M.; Wilson, T. M.; Fitzgerald, R. H.; Tsunematsu, K.; Teissier, A.
2017-09-01
Recent casualties in volcanic eruptions due to trauma from blocks and bombs necessitate more rigorous, ballistic specific risk assessment. Quantitative assessments are limited by a lack of experimental and field data on the vulnerability of buildings to ballistic hazards. An improved, quantitative understanding of building vulnerability to ballistic impacts is required for informing appropriate life safety actions and other risk reduction strategies. We assessed ballistic impacts to buildings from eruptions at Usu Volcano and Mt. Ontake in Japan and compiled available impact data from eruptions elsewhere to identify common damage patterns from ballistic impacts to buildings. We additionally completed a series of cannon experiments which simulate ballistic block impacts to building claddings to investigate their performance over a range of ballistic projectile velocities, masses and energies. Our experiments provide new insights by quantifying (1) the hazard associated with post-impact shrapnel from building and rock fragments; (2) the effect of impact obliquity on damage; and (3) the additional impact resistance buildings possess when claddings are struck in areas directly supported by framing components. This was not well identified in previous work which may have underestimated building vulnerability to ballistic hazards. To improve assessment of building vulnerability to ballistics, we use our experimental and field data to develop quantitative vulnerability models known as fragility functions. Our fragility functions and field studies show that although unreinforced buildings are highly vulnerable to large ballistics (> 20 cm diameter), they can still provide shelter, preventing death during eruptions.
The vulnerabilities in childhood and adolescence and the Brazilian public policy intervention.
Fonseca, Franciele Fagundes; Sena, Ramony Kris R; dos Santos, Rocky Lane A; Dias, Orlene Veloso; Costa, Simone de Melo
2013-06-01
To review and discuss childhood and adolescence vulnerabilities, as well as Brazilian public policies of intervention. A narrative review was performed, considering studies published between 1990 and 2012, found in the Virtual Health Library databases (Biblioteca Virtual em Saúde - BVS). A combination of the following descriptors was used in the search strategy: "Adolescent Health", "Child Health", "Health Public Politics" and "Vulnerability". In addition, Brazilian official documents, the Statute of the Child and the Adolescent, Guardianship Council, Bolsa Família and Saúde na Escola Programs were evaluated. The results were divided into five categories of analysis: Vulnerability of Children and Adolescents in Brazil, Public Politics of Intervention to Risk Factors in Childhood and Adolescence, the Statute of the Child and the Adolescent and Guardianship Council, Bolsa Família Program and Saúde na Escola Program. The studies show that children and adolescents are vulnerable to environmental and social situations. Vulnerabilities are exhibited in daily violence within families and schools, which results in the premature entrance of children and adolescents in the work environment and/or in the drug traffic. To deal with these problems, the Brazilian Government established the Statute of the Child and the Adolescent as well as social programs. Literature exposes the risks experienced by children and adolescents in Brazil. In the other hand, a Government endeavor was identified to eliminate or minimize the suffering of those in vulnerable situations through public policies targeted to this population group.
Parker, Caroline M; Parker, Richard G; Philbin, Morgan M; Hirsch, Jennifer S
2018-04-01
This paper advances research on racism and health by presenting a conceptual model that delineates pathways linking policing practices to HIV vulnerability among Black men who have sex with men in the urban USA. Pathways include perceived discrimination based on race, sexuality and gender performance, mental health, and condom-carrying behaviors. The model, intended to stimulate future empirical work, is based on a review of the literature and on ethnographic data collected in 2014 in New York City. This paper contributes to a growing body of work that examines policing practices as drivers of racial health disparities extending far beyond violence-related deaths.
ERIC Educational Resources Information Center
Gjøtterud, Sigrid; Krogh, Erling
2017-01-01
Coming from a Nordic environment, professionally working in teacher education, both authors engaged in developmental work and research in the Uluguru mountains in Tanzania. The research is carried out in a community-based organization for vulnerable youth, Mgeta Orphan Education Foundation (MOEF), which builds on principles of action learning and…
Perinatal support to protect maternal mental health.
McCaul, Anthony; Stokes, Jayne
Family Action is a charity that helps more than 45,000 vulnerable families and children across England a year by offering emotional, practical and financial support. A pilot of a perinatal support project in Southwark, London was found to reduce mental health problems in vulnerable women and is now being extended. Such schemes complement the work of health visitors and other health professionals. Commissioners need to be aware of the long-term impact of such low-cost interventions in the early years.
Qcorp: an annotated classification corpus of Chinese health questions.
Guo, Haihong; Na, Xu; Li, Jiao
2018-03-22
Health question-answering (QA) systems have become a typical application scenario of Artificial Intelligent (AI). An annotated question corpus is prerequisite for training machines to understand health information needs of users. Thus, we aimed to develop an annotated classification corpus of Chinese health questions (Qcorp) and make it openly accessible. We developed a two-layered classification schema and corresponding annotation rules on basis of our previous work. Using the schema, we annotated 5000 questions that were randomly selected from 5 Chinese health websites within 6 broad sections. 8 annotators participated in the annotation task, and the inter-annotator agreement was evaluated to ensure the corpus quality. Furthermore, the distribution and relationship of the annotated tags were measured by descriptive statistics and social network map. The questions were annotated using 7101 tags that covers 29 topic categories in the two-layered schema. In our released corpus, the distribution of questions on the top-layered categories was treatment of 64.22%, diagnosis of 37.14%, epidemiology of 14.96%, healthy lifestyle of 10.38%, and health provider choice of 4.54% respectively. Both the annotated health questions and annotation schema were openly accessible on the Qcorp website. Users can download the annotated Chinese questions in CSV, XML, and HTML format. We developed a Chinese health question corpus including 5000 manually annotated questions. It is openly accessible and would contribute to the intelligent health QA system development.
DataUp: Helping manage and archive data within the researcher's workflow
NASA Astrophysics Data System (ADS)
Strasser, C.
2012-12-01
There are many barriers to data management and sharing among earth and environmental scientists; among the most significant are lacks of knowledge about best practices for data management, metadata standards, or appropriate data repositories for archiving and sharing data. We have developed an open-source add-in for Excel and an open source web application intended to help researchers overcome these barriers. DataUp helps scientists to (1) determine whether their file is CSV compatible, (2) generate metadata in a standard format, (3) retrieve an identifier to facilitate data citation, and (4) deposit their data into a repository. The researcher does not need a prior relationship with a data repository to use DataUp; the newly implemented ONEShare repository, a DataONE member node, is available for any researcher to archive and share their data. By meeting researchers where they already work, in spreadsheets, DataUp becomes part of the researcher's workflow and data management and sharing becomes easier. Future enhancement of DataUp will rely on members of the community adopting and adapting the DataUp tools to meet their unique needs, including connecting to analytical tools, adding new metadata schema, and expanding the list of connected data repositories. DataUp is a collaborative project between Microsoft Research Connections, the University of California's California Digital Library, the Gordon and Betty Moore Foundation, and DataONE.
Open source software to control Bioflo bioreactors.
Burdge, David A; Libourel, Igor G L
2014-01-01
Bioreactors are designed to support highly controlled environments for growth of tissues, cell cultures or microbial cultures. A variety of bioreactors are commercially available, often including sophisticated software to enhance the functionality of the bioreactor. However, experiments that the bioreactor hardware can support, but that were not envisioned during the software design cannot be performed without developing custom software. In addition, support for third party or custom designed auxiliary hardware is often sparse or absent. This work presents flexible open source freeware for the control of bioreactors of the Bioflo product family. The functionality of the software includes setpoint control, data logging, and protocol execution. Auxiliary hardware can be easily integrated and controlled through an integrated plugin interface without altering existing software. Simple experimental protocols can be entered as a CSV scripting file, and a Python-based protocol execution model is included for more demanding conditional experimental control. The software was designed to be a more flexible and free open source alternative to the commercially available solution. The source code and various auxiliary hardware plugins are publicly available for download from https://github.com/LibourelLab/BiofloSoftware. In addition to the source code, the software was compiled and packaged as a self-installing file for 32 and 64 bit windows operating systems. The compiled software will be able to control a Bioflo system, and will not require the installation of LabVIEW.
Open Source Software to Control Bioflo Bioreactors
Burdge, David A.; Libourel, Igor G. L.
2014-01-01
Bioreactors are designed to support highly controlled environments for growth of tissues, cell cultures or microbial cultures. A variety of bioreactors are commercially available, often including sophisticated software to enhance the functionality of the bioreactor. However, experiments that the bioreactor hardware can support, but that were not envisioned during the software design cannot be performed without developing custom software. In addition, support for third party or custom designed auxiliary hardware is often sparse or absent. This work presents flexible open source freeware for the control of bioreactors of the Bioflo product family. The functionality of the software includes setpoint control, data logging, and protocol execution. Auxiliary hardware can be easily integrated and controlled through an integrated plugin interface without altering existing software. Simple experimental protocols can be entered as a CSV scripting file, and a Python-based protocol execution model is included for more demanding conditional experimental control. The software was designed to be a more flexible and free open source alternative to the commercially available solution. The source code and various auxiliary hardware plugins are publicly available for download from https://github.com/LibourelLab/BiofloSoftware. In addition to the source code, the software was compiled and packaged as a self-installing file for 32 and 64 bit windows operating systems. The compiled software will be able to control a Bioflo system, and will not require the installation of LabVIEW. PMID:24667828
Recovery after shift work: Relation to coronary risk factors in women.
Axelsson, John; Lowden, Arne; Kecklund, Göran
2006-01-01
Shift work increases the risk for developing cardiovascular disease. There is, however, little knowledge of what aspects of shift scheduling that are detrimental and what characteristics promote good health. The aim of the present study was to evaluate whether coronary risk factors deteriorate after a hard work period and whether recovery, in the form of a week off, was sufficient to improve them. A total of 19 women worked an extremely rapidly rotating and clockwise shift schedule at a paper and pulp factory. They underwent two health examinations, one at the end of the work period and one after the week off. In addition, the women were divided into a tolerant and a vulnerable group, depending on their satisfaction with their work hours. Most risk factors did not change, but total cholesterol and low-density lipoprotein (LDL)-cholesterol were lower after the working period than after the week-off. In addition, vulnerable women had higher levels of total cholesterol and a higher ratio of total cholesterol/high-density lipoprotein (HDL) than tolerant ones. In conclusion, the finding that a week-off worsens cholesterol levels was against our hypothesis and suggests further studies on how activities/responsibilities outside the workplace affect shift-working women. It was also shown that susceptible shift workers had worse lipid profiles.
ERIC Educational Resources Information Center
Sensoy Bahar, Ozge
2017-01-01
This response article discusses opportunities to bridge social work and social innovation as a promising partnership to address the issues impacting vulnerable populations across the global context. It starts by revisiting the conceptualization of innovation in social work and continues by considering factors that contribute to the growing…
Kura, Nura Umar; Ramli, Mohammad Firuz; Ibrahim, Shaharin; Sulaiman, Wan Nor Azmin; Aris, Ahmad Zaharin; Tanko, Adamu Idris; Zaudi, Muhammad Amar
2015-01-01
In this work, the DRASTIC and GALDIT models were employed to determine the groundwater vulnerability to contamination from anthropogenic activities and seawater intrusion in Kapas Island. In addition, the work also utilized sensitivity analysis to evaluate the influence of each individual parameter used in developing the final models. Based on these effects and variation indices of the said parameters, new effective weights were determined and were used to create modified DRASTIC and GALDIT models. The final DRASTIC model classified the island into five vulnerability classes: no risk (110-140), low (140-160), moderate (160-180), high (180-200), and very high (>200), covering 4, 26, 59, 4, and 7 % of the island, respectively. Likewise, for seawater intrusion, the modified GALDIT model delineates the island into four vulnerability classes: very low (<90), low (90-110), moderate (110-130), and high (>130) covering 39, 33, 18, and 9 % of the island, respectively. Both models show that the areas that are likely to be affected by anthropogenic pollution and seawater intrusion are within the alluvial deposit at the western part of the island. Pearson correlation was used to verify the reliability of the two models in predicting their respective contaminants. The correlation matrix showed a good relationship between DRASTIC model and nitrate (r = 0.58). In a similar development, the correlation also reveals a very strong negative relationship between GALDIT model and seawater contaminant indicator (resistivity Ωm) values (r = -0.86) suggesting that the model predicts more than 86 % of seawater intrusion. In order to facilitate management strategy, suitable areas for artificial recharge were identified through modeling. The result suggested some areas within the alluvial deposit at the western part of the island as suitable for artificial recharge. This work can serve as a guide for a full vulnerability assessment to anthropogenic pollution and seawater intrusion in small islands and will help policy maker and manager with understanding needed to ensure sustainability of the island's aquifer.
Safety in Urban Environment and Emergency Notice Boards
NASA Astrophysics Data System (ADS)
Confortini, Claudia; Tira, Maurizio
2008-07-01
Reliable and safe urban system conditions have to be a crucial goal of ordinary planning activities. Among planning goals, priority must be given to indications relating to the safety levels to be achieved and to the amount of resources to be directed towards reducing the vulnerability of urban systems and therefore of the measures to be taken. Uban vulnerability cannot in fact be reduced to the sum of the vulnerability of single buildings or to the physical vulnerability of its various components. This research work consists of identifying those urban sub-areas that are important for safety in relation to natural risks, ambits that should be highlighted by means of permanent emergency notice boards/billboards. What are the hazard notices relating to all natural hazards and related risks? Where are they located? Are they clear and straightforward so that all residents and visitors are able to understand them, as it is already the case for road signs (or at least it should be)? What urban sub-areas are worth highlighting in relation to natural risks, acting for example as escape routes or meeting points? How is information for the public managed in order that people are immediately, easily and regularly notified? What is the relation of such signals to ordinary traffic signals? Research into the state of the art of permanent notice boards/billboards of this type, currently distinguished only by sporadic and local initiatives, aims at carrying out a census of and recognizing urban elements already considered as important for reducing the vulnerability of the urban system to different natural calamities and at providing new highlights as regards the identification of new ones. The next step is to work out a decision and common-language strategy for planning these elements and for their adequate signposting, so as to be able to live in the urban environment with awareness, safety and confidence, including with respect to more remote and therefore often neglected natural risks. The paper deals with literature in the field and shows the results of the few relevant case studies at work.
Vulnerability assessment at a national level in Georgia
NASA Astrophysics Data System (ADS)
Tsereteli, N.; Arabidze, V.; Varazanashvili, O.; Gugeshashvili, T.
2012-04-01
Vulnerability assessment at a national level in Georgia Nino Tsereteli, Vakhtang Arabidze, Otar Varazanashvili, Tengiz Gugeshashvili The risk always exists when cities are built on. Population growth in cities and urbanization in natural hazard-prone zones leads to infrastructure expansion. The goal of the society is to construct natural hazards resistant infrastructure and minimize the expected losses. This is a complicated task as there is always knowledge deficiency on real seismic hazard and vulnerability. Assessment of vulnerability is vital in risk analysis, as vulnerability is defined in many different ways. Work presented here mostly deals with assessment of infrastructure's and population vulnerability at national level in Georgia. This work was initiated by NATO SFP project "seismic Hazard and Risk Assessment for Southern Caucasus - Eastern Turkey Energy Corridors" and the two work packages WP4 (seismic risk) and WP5 (city scenarios) of risk module of EMME (Earthquake Model of the Middle East Region) project. First step was creation databases (inventory) of elements at risk in GIS. Element at risk were the buildings, population, pipelines. The inventories was studied and Created in GIS for the following categories: Building material, number of stories, number of entrances, condition of building, building period. For pipelines pipe tipe (continous or segmented), material, pipe diameter. Very important is to estimate the initial cost of building for assessment of economic losses. From this purpose the attempt was done and the algorithm of this estimation were prepared taking into account obtained the inventory. Build quality, reliability and durability are of special importance to corresponding state agencies and include different aesthetic, engineering, practical, social, technological and economical aspects. The necessity that all of these aspects satisfy existing normative requirements becomes evident as the building and structures come into exploitation. The long term usage of building is very complex. It relates to the reliability and durability of buildings. The long term usage and durability of a building is determined by the concept of depreciation. Depreciation of an entire building is calculated by summing the products of individual construction unit' depreciation rates and the corresponding value of these units within the building. This method of calculation is based on an assumption that depreciation is proportional to the building's (constructions) useful life. We used this methodology to create a matrix, which provides a way to evaluate the depreciation rates of buildings with different type and construction period and to determine their corresponding value. Finely some attempt was done to investigate how these structures were damaged by various hazards. In other words vulnerability curves were constrained on the basis on the relation between various hazard intensities and damage data.
Seawater intrusion vulnerability indicators for freshwater lenses in strip islands
NASA Astrophysics Data System (ADS)
Morgan, L.; Werner, A. D.
2014-12-01
Freshwater lenses on small islands have been described as some of the most vulnerable aquifer systems in the world. Yet, little guidance is available regarding methods for rapidly assessing the vulnerability of freshwater lenses to the potential effects of climate change. To address this gap we employ a steady-state analytic modelling approach to develop seawater intrusion (SWI) vulnerability indicator equations. The vulnerability indicator equations quantify the propensity for SWI to occur in strip islands due to both recharge change and sea-level rise (SLR) (incorporating the effect of land surface inundation (LSI)). This work extends that of Werner et al. (2012) who developed SWI vulnerability indicator equations for unconfined and confined continental aquifers, and did not consider LSI. Flux-controlled and head-controlled conceptualisations of freshwater lenses are adopted. Under flux-controlled conditions the water table is able to rise unencumbered by land surface effects. Under head-controlled conditions the head is fixed at the centre of the lens due to, for example, centrally located topographic controls, surface water features or pumping. A number of inferences about SWI vulnerability in freshwater lenses can be made from the analysis: (1) SWI vulnerability indicators for SLR (under flux-controlled conditions) are proportional to lens thickness (or volume) and the rate of LSI and inversely proportional to island width; (2) SWI vulnerability indicators for recharge change (under flux-controlled conditions) are proportional to lens thickness (or volume) and inversely proportional to recharge; (3) SLR has greater impact under head-controlled conditions rather than flux-controlled conditions, whereas the opposite is the case for LSI and recharge change. Example applications to several case studies illustrate use of the method for rapidly ranking lenses according to vulnerability, thereby allowing for prioritisation of areas where further and more detailed SWI investigations may be required. References Werner, A.D., Ward, J.D., Morgan, L.K., Simmons, C.T., Robinson, N.I., Teubner, M.D., 2012. Vulnerability indicators of seawater intrusion. Ground Water 50(1), 48-58. doi:10.1111/j.1745-6584.2011.00817.x.
Supporting secure programming in web applications through interactive static analysis.
Zhu, Jun; Xie, Jing; Lipford, Heather Richter; Chu, Bill
2014-07-01
Many security incidents are caused by software developers' failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE) and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases.
NASA Astrophysics Data System (ADS)
Alili, L.; Boukdir, A.; Maslouhi, M. R.; Ikhmerdi, H.
2018-05-01
The study area is located in the north of the province of Beni Mellal, it covers the Piedmont of the high Atlas between El Ksiba and Ouaoumana. It is characterized by a poorly developed hydrographic network and the presence of very important karstic forms. These forms condition the rapid infiltration to the karstic springs are the subject of this study. In this work we presented a method of mapping the vulnerability to pollution of Karstic springs located between El Ksiba and Ouaoumana. To do this, we have introduced a vulnerability index called F which takes into account four parameters (EPIK): Development of the Epikarst, importance of the protective cover, infiltration conditions and development of the Karst network. The overlay of the thematic maps of these parameters through a GIS software (ArcGIS) gave us a map of the vulnerability to contamination on the whole hydrogeological basin of the springs.
Supporting secure programming in web applications through interactive static analysis
Zhu, Jun; Xie, Jing; Lipford, Heather Richter; Chu, Bill
2013-01-01
Many security incidents are caused by software developers’ failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE) and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases. PMID:25685513
De Marchi, Bruna; Scolobig, Anna
2012-04-01
This paper reports on research work performed for Floodsite a European Community-funded project on the social aspects of vulnerability in the Adige/Sarca river basin of the Trentino-Alto Adige region, Italy. It identifies some limitations to the use of a fixed set of indicators, which fail to account for either local peculiarities or the intangible aspects that contribute to the shaping of social vulnerability. The authors employed a number of methods to investigate the opinions of professionals and residents on risk and safety, distinguishing between the individual and the institutional components of social vulnerability. Adopting a systemic perspective, they explored the interactions between these two elements, showing how they may give rise to unexpected phenomena. The 'safety paradox' and the 'efficiency paradox' are discussed, emerging when increased protection provided by structural devices and dedicated institutions translates into a lack of awareness and agency on the part of residents. © 2012 The Author(s). Disasters © Overseas Development Institute, 2012.
NASA Astrophysics Data System (ADS)
Vallianatos, Filippos; Koutalonis, Ioannis; Moisidi, Margarita; Chatzopoulos, Georgios
2018-05-01
In this work we study in terms of Tsallis statistical mechanics the properties of microtremors' fluctuations in two church bell towers, which are monuments of cultural heritage, in the city of Chania (Crete, Greece). We have shown that fluctuations of ambient vibrations recordings in the Church tower bells follow a q-Gaussian distribution. The behavior of Tsallis q parameter with the level (high) of the measuring point within the tower and the amplification factors at that points as extracted from horizontal-to-vertical (HVSR) spectral ratios are presented and discussed. Since q decreases as the amplification factor increases, we could suggest q as a vulnerability index, where, as q decreases approaching unity, then the structural system is getting more vulnerable. The latter approach suggests that introducing ideas of Tsallis statistics could be useful in characterizing extremely complex processes as that governed the estimation of seismic vulnerability in which a multidisciplinary approach is required.
Atilola, Olayinka
2014-01-01
Efforts at improving child-health and development initiatives in sub-Saharan Africa had focused on the physical health of children due to the neglect of child and adolescent mental health (CAMH) policy initiatives. A thorough and broad-based understanding of the prevalent child mental-health risk and vulnerability factors is needed to successfully articulate CAMH policies. In this discourse, we present a narrative on the child mental-health risk and vulnerability factors in sub-Saharan Africa. Through an ecological point of view, we identified widespread family poverty, poor availability and uptake of childcare resources, inadequate community and institutional childcare systems, and inadequate framework for social protection for vulnerable children as among the risk and vulnerability factors for CAMH in the region. Others are poor workplace policy/practice that does not support work-family life balance, poor legislative framework for child protection, and some harmful traditional practices. We conclude that an ecological approach shows that child mental-health risks are diverse and cut across different layers of the care environment. The approach also provides a broad and holistic template from which appropriate CAMH policy direction in sub-Saharan Africa can be understood. PMID:24834431
Atilola, Olayinka
2014-01-01
Efforts at improving child-health and development initiatives in sub-Saharan Africa had focused on the physical health of children due to the neglect of child and adolescent mental health (CAMH) policy initiatives. A thorough and broad-based understanding of the prevalent child mental-health risk and vulnerability factors is needed to successfully articulate CAMH policies. In this discourse, we present a narrative on the child mental-health risk and vulnerability factors in sub-Saharan Africa. Through an ecological point of view, we identified widespread family poverty, poor availability and uptake of childcare resources, inadequate community and institutional childcare systems, and inadequate framework for social protection for vulnerable children as among the risk and vulnerability factors for CAMH in the region. Others are poor workplace policy/practice that does not support work-family life balance, poor legislative framework for child protection, and some harmful traditional practices. We conclude that an ecological approach shows that child mental-health risks are diverse and cut across different layers of the care environment. The approach also provides a broad and holistic template from which appropriate CAMH policy direction in sub-Saharan Africa can be understood.
Communicating effectively with vulnerable populations during water contamination events.
Nsiah-Kumi, Phyllis A
2008-01-01
Water contamination events are a public health concern worldwide with significant potential to impact the global community. When communicating with the public during these crisis situations, it is vital to consider the multiple audiences who receive the messages. Before developing or delivering messages to a particular community, it is essential to be familiar with the community's characteristics, needs, concerns, and who is considered credible to that community. Vulnerable populations are those with difficulties in comprehension or accessibility that may limit their full understanding of risks and may mitigate the effectiveness of public health strategies. Vulnerable populations include, but are not limited to, the urban/rural poor, those who are mentally ill, intellectually disabled, medically vulnerable, at the extremes of age (children and the elderly), racial/ethnic minorities, and those with low literacy or limited English proficiency.A water contamination event poses a unique opportunity to work with diverse populations to effectively convey important health messages. Each population needs to receive appropriate public health messages. Becoming familiar with vulnerable populations and their needs prior to a water contamination event will help in identifying barriers and developing and refining effective messages in such a crisis. In water contamination crises, our publics' health depends on effective, targeted crisis communication.
A new approach to flood vulnerability assessment for historic buildings in England
NASA Astrophysics Data System (ADS)
Stephenson, V.; D'Ayala, D.
2014-05-01
The recent increase in frequency and severity of flooding in the UK has led to a shift in the perception of risk associated with flood hazards. This has extended to the conservation community, and the risks posed to historic structures that suffer from flooding are particularly concerning for those charged with preserving and maintaining such buildings. In order to fully appraise the risks in a manner appropriate to the complex issue of preservation, a new methodology is presented here that studies the nature of the vulnerability of such structures, and places it in the context of risk assessment, accounting for the vulnerable object and the subsequent exposure of that object to flood hazards. The testing of the methodology is carried out using three urban case studies and the results of the survey analysis provide guidance on the development of fragility curves for historic structures exposed to flooding. This occurs through appraisal of vulnerability indicators related to building form, structural and fabric integrity, and preservation of architectural and archaeological values. Key findings of the work include determining the applicability of these indicators to fragility analysis, and the determination of the relative vulnerability of the three case study sites.
Muhanguzi, Florence Kyoheirwe
2011-06-01
Sexuality is part and parcel of students' experiences of schooling manifested in personal friendships, relations and social interaction. These encounters constitute sites within which sexual identities are developed, practiced and actively produced through processes of negotiation. Drawing on qualitative research conducted in 14 selected secondary schools in Central and Western Uganda, the study illuminates gendered sexual vulnerability within patterns of social interaction and young girls gendered experiences and negotiation of their sexuality. The study reveals that through social and discursive practices, students construct complex gendered relations of domination and subordination that position boys and girls differently, often creating gender inequalities and sexual vulnerability for those gendered as girls. Girls' vulnerability is characterised by confusing and traumatic experiences fraught with double standards and silences. Typical of these experiences are complex tensions and contradictions surrounding constructions of sexuality that are predicated upon unequal power and gender relations characterised by homophobia, misogyny, control of female sexuality and sexual abuse and exploitation, all which work against girls' expression of sexuality. Gender sensitive sexuality education is identified as a valuable site of intervention to address such vulnerabilities and promote gender equality and equity in society.
Remote Sensing Data for Coastal Zone Vulnerability Assessment- the Bay of Algiers Case
NASA Astrophysics Data System (ADS)
Rabehi, Walid; Guerfi, Mokhtar; Mahi, Habib
2016-08-01
Like many of South Mediterranean coastlines, the Algerian coastal zone and Algiers' bay specifically, is one of the most vulnerable zone. Because of the natural pressures occurring in the region such as earthquake, tsunami risk, erosion / accretion, marine intrusion, etc. Combined with other anthropogenic factors as urban sprawl, pollution, loss of biodiversity and economic value etc... A high degradation of this coastline is noticeable despite all the protection measures brought to these zones, which have sometimes increased its vulnerability.The aim of this work is to generate the Coastal Vulnerability Index (CVI) map related to erosion and flooding. This index, created by Gornitz & White (1990), was particularly focused on "physical parameters of the coast" [3], Then it was improved by McLaughlin & Cooper (2010), who added a socio-economical approach by calculating parameters like demography, land use...etc. The index is obtained by integrating in a GIS, different vulnerability factors of the coastal area.. Many relevant parameters were derived from remote sensing, combined with other data; they are analyzed with a Multicriteria method after being grouped in three sub- indexes; coastal physical characteristics, coastal forcing and socioeconomic factors, in order to produce the CVI.
Valuing Opportunities to Learn
ERIC Educational Resources Information Center
Bullock, Quintin B.
2015-01-01
With community colleges in the national spotlight as never before, a lot of talk has focused on the excellent work that community colleges are doing to help students succeed, especially the inroads that community colleges are making among their most academically vulnerable students. Thanks to the efforts of hard-working, dedicated faculty and…
Working with Child Prostitutes in Thailand: Problems of Practice and Interpretation
ERIC Educational Resources Information Center
Montgomery, Heather
2007-01-01
Conducting anthropological fieldwork on the emotive issue of child prostitution raises difficult issues for anthropologists and other researchers. This article examines the ethical dilemmas of working with these extremely vulnerable children, focusing on the difference between the researcher's own interpretations and those given by the children…
Joining Forces for Families: An Embedded Response to Neighborhood Poverty
ERIC Educational Resources Information Center
Bruce, Michael; Chance, Ron; Meulemans, Laurie
2015-01-01
The authors reflect on how they, as social work practitioners, support the school systems in supporting homeless youth and families. They emphasize the importance of relationships and trust in working with this vulnerable population. The reflexive vignettes highlight the challenges and success of developing community-based programming for homeless…
ERIC Educational Resources Information Center
Jenkins, Peter
2010-01-01
Confidentiality presents particular challenges to practitioners working with young people, on account of the latter's vulnerability and emotional immaturity. Ethical codes place a key importance on confidentiality, from deontological and teleological perspectives. However, young clients may rely on a more pragmatic approach in deciding whether to…
Coastal Vulnerability to Erosion Processes: Study Cases from Different Countries
NASA Astrophysics Data System (ADS)
Anfuso, Giorgio; Martinez Del Pozo, Jose Angel; Rangel-Buitrago, Nelson
2010-05-01
When natural processes affect or threaten human activities or infrastructures they become a natural hazard. In order to prevent the natural hazards impact and the associated economic and human losses, coastal managers need to know the intrinsic vulnerability of the littoral, using information on the physical and ecological coastal features, human occupation and present and future shoreline trends. The prediction of future coastline positions can be based on the study of coastal changes which have occurred over recent decades. Vertical aerial photographs, satellite imagery and maps are very useful data sources for the reconstruction of coast line changes at long (>60 years) and medium (between 60 and 10 years) temporal and spatial scales. Vulnerability maps have been obtained for several coastal sectors around the world through the use of Geographical Information Systems (GIS), computer-assisted multivariate analysis and numerical models. In the USA, "Flood Insurance Rate Maps" have been created by the government and "Coastal Zone Hazard Maps" have been prepared for coastal stretches affected by hurricane Hugo. In Spain, the vulnerability of the Ebro and an Andalusia coastal sector were investigated over different time scales. McLaughlin et al., (2002) developed a GIS based coastal vulnerability index for the Northern Ireland littoral that took into account socio-economic activities and coastal resistance to erosion and energetic characteristics. Lizárraga et al., (2001) combined beach reduction at Rosario (Mexico) with the probability of damage to landward structures, obtaining a vulnerability matrix. In this work several coastal vulnerability maps have also been created by comparing data on coastal erosion/accretion and land use along different coastal sectors in Italy, Morocco and Colombia. Keywords: Hazard, Vulnerability, Coastal Erosion, Italy, Morocco, Colombia.
Mothers' Concerns for Personal Safety and Privacy While Breastfeeding: An Unexplored Phenomenon.
Rosen-Carole, Casey; Allen, Katherine; Fagnano, Maria; Dozier, Ann; Halterman, Jill
2018-04-01
Preliminary qualitative research in upstate NY shows new mothers are worried about safety while breastfeeding. Little is known regarding prevalence of these concerns and their effect on breastfeeding outcomes. (1) Determine frequency of breastfeeding safety and privacy concerns; (2) Explore their association with breastfeeding outcomes. Mothers were surveyed immediately and 1-month postpartum about breastfeeding goals; both surveys addressed privacy and safety concerns at home, work, and in public. Outcome data included breastfeeding intent, exclusivity, and duration. Breastfeeding/non-breastfeeding mothers were compared using Chi-square and multivariate analyses. A total of 279 women enrolled. Of these 82.8% initiated breastfeeding; at 1-month 72% provided any breast milk, and 44% were exclusively breastfeeding. About 99% felt safe breastfeeding at home; 25% reported privacy concerns; and 5% felt "vulnerable or unsafe" while breastfeeding. At 1-month, 49% agreed there was a safe place to breastfeed/express milk at work (20% unsure). Non-breastfeeding mothers expressed more safety concerns outside home/at work: 18% breastfeeding versus 28% non-breastfeeding outside home; 27% breastfeeding versus 40% non-breastfeeding at work. Nearly 54% who reported feeling vulnerable/unsafe with breastfeeding initiated breastfeeding, compared with 86% not reporting this concern (p = 0.008). Fewer women initiating breastfeeding reported vulnerability/safety (3% breastfeeding versus 14% non-breastfeeding, p = 0.008) or privacy (22% breastfeeding versus 40% non-breastfeeding, p = 0.19) concerns. Associations held after controlling for age, race, parity, insurance, geography, and marital-status. Significant associations between initiation, privacy, and safety concerns did not extend to duration or exclusivity. Many breastfeeding women reported safety and privacy concerns, especially outside the home and at work, which may influence breastfeeding initiation. Further study may identify methods to address these issues, potentially increasing breastfeeding rates.
Groundwater vulnerability mapping in Guadalajara aquifers system (Western Mexico)
NASA Astrophysics Data System (ADS)
Rizo-Decelis, L. David; Marín, Ana I.; Andreo, Bartolomé
2016-04-01
Groundwater vulnerability mapping is a practical tool to implement strategies for land-use planning and sustainable socioeconomic development coherent with groundwater protection. The objective of vulnerability mapping is to identify the most vulnerable zones of catchment areas and to provide criteria for protecting the groundwater used for drinking water supply. The delineation of protection zones in fractured aquifers is a challenging task due to the heterogeneity and anisotropy of hydraulic conductivities, which makes difficult prediction of groundwater flow organization and flow velocities. Different methods of intrinsic groundwater vulnerability mapping were applied in the Atemajac-Toluquilla groundwater body, an aquifers system that covers around 1300 km2. The aquifer supplies the 30% of urban water resources of the metropolitan area of Guadalajara (Mexico), where over 4.6 million people reside. Study area is located in a complex neotectonic active volcanic region in the Santiago River Basin (Western Mexico), which influences the aquifer system underneath the city. Previous works have defined the flow dynamics and identified the origin of recharge. In addition, the mixture of fresh groundwater with hydrothermal and polluted waters have been estimated. Two main aquifers compose the multilayer system. The upper aquifer is unconfined and consists of sediments and pyroclastic materials. Recharge of this aquifer comes from rainwater and ascending vertical fluids from the lower aquifer. The lower aquifer consists of fractured basalts of Pliocene age. Formerly, the main water source has been the upper unit, which is a porous and unconsolidated unit, which acts as a semi-isotropic aquifer. Intense groundwater usage has resulted in lowering the water table in the upper aquifer. Therefore, the current groundwater extraction is carried out from the deeper aquifer and underlying bedrock units, where fracture flow predominates. Pollution indicators have been reported in some monitoring wells, which have been related to anthropogenic activity. Vulnerability maps were produced using different parametric methods (e.g.: DRASTIC, GOD, DISCO, AVI), then the results are compared and assessed. Since each one of these methods use different number of parameters and weights, relatively different results were obtained, although the results have been evaluated with common cartographic inputs. The comparison between selected methods shows that the GOD method results are more correlated with the other methods and produces vulnerability maps comparable with them. Even though groundwater vulnerability is a critical issue around the world, no protection zones have been delineated in Guadalajara city, one of the biggest in Latin America. The groundwater contamination in the study area poses a serious risk for a large population and the environment. This work aims to propose an approach for groundwater protection cartography, based on the application and the comparison of results from different contamination vulnerability methods. These outcomes may assist water authorities to identify the higher vulnerable zones of the aquifers, in order to improving and adapting the land planning and management according to the protection of the own water resources.
Tsunami Risk in the NE Atlantic: Pilot Study for Algarve Portugal and Applications for future TWS
NASA Astrophysics Data System (ADS)
Omira, R.; Baptista, M. A.; Catita, C.; Carrilho, F.; Matias, L.
2012-04-01
Tsunami risk assessment is an essential component of any Tsunami Early Warning System due to its significant contribution to the disaster reduction by providing valuable information that serve as basis for mitigation preparedness and strategies. Generally, risk assessment combines the outputs of the hazard and the vulnerability assessment for considered exposed elements. In the NE Atlantic region, the tsunami hazard is relatively well established through compilation of tsunami historical events, evaluation of tsunamigenic sources and impact computations for site-specific coastal areas. While, tsunami vulnerability remains poorly investigated in spite of some few studies that focused on limited coastal areas of the Gulf of Cadiz region. This work seeks to present a pilot study for tsunami risk assessment that covers about 170 km of coasts of Algarve region, south of Portugal. This area of high coastal occupation and touristic activities was strongly impacted by the 1755 tsunami event as reported in various historical documents. An approach based upon a combination of tsunami hazard and vulnerability is developed in order to take into account the dynamic aspect of tsunami risk in the region that depends on the variation of hazard and vulnerability of exposed elements from a coastal point to other. Hazard study is based upon the consideration of most credible earthquake scenarios and the derivation of hazard maps through hydrodynamic modeling of inundation and tsunami arrival time. The vulnerability assessment is performed by: i) the analysis of the occupation and the population density, ii) derivation of evacuation maps and safe shelters, and iii) the analysis of population response and evacuation times. Different risk levels ranging from "low" to "high" are assigned to the coats of the studied area. Variation of human tsunami risk between the high and low touristic seasons is also considered in this study and aims to produce different tsunami risk-related scenarios. Results are presented in terms of thematic maps and GIS layers highlighting information on inundation depths and limits, evacuation plans and safe shelters, tsunami vulnerability, evacuation times and tsunami risk levels. Results can be used for national and regional tsunami disaster management and planning. This work is funded by TRIDEC (Collaborative, Complex and Critical Decision-Support in Evolving Crises) FP7, EU project and by MAREMOTI (Mareograph and field tsunami observations, modeling and vulnerability studies for Northeast Atlantic and western Mediterranean) French project. Keywords: Tsunami, Algarve-Portugal, Evacuation, Vulnerability, Risk
P-TRAP: a Panicle TRAit Phenotyping tool.
A L-Tam, Faroq; Adam, Helene; Anjos, António dos; Lorieux, Mathias; Larmande, Pierre; Ghesquière, Alain; Jouannic, Stefan; Shahbazkia, Hamid Reza
2013-08-29
In crops, inflorescence complexity and the shape and size of the seed are among the most important characters that influence yield. For example, rice panicles vary considerably in the number and order of branches, elongation of the axis, and the shape and size of the seed. Manual low-throughput phenotyping methods are time consuming, and the results are unreliable. However, high-throughput image analysis of the qualitative and quantitative traits of rice panicles is essential for understanding the diversity of the panicle as well as for breeding programs. This paper presents P-TRAP software (Panicle TRAit Phenotyping), a free open source application for high-throughput measurements of panicle architecture and seed-related traits. The software is written in Java and can be used with different platforms (the user-friendly Graphical User Interface (GUI) uses Netbeans Platform 7.3). The application offers three main tools: a tool for the analysis of panicle structure, a spikelet/grain counting tool, and a tool for the analysis of seed shape. The three tools can be used independently or simultaneously for analysis of the same image. Results are then reported in the Extensible Markup Language (XML) and Comma Separated Values (CSV) file formats. Images of rice panicles were used to evaluate the efficiency and robustness of the software. Compared to data obtained by manual processing, P-TRAP produced reliable results in a much shorter time. In addition, manual processing is not repeatable because dry panicles are vulnerable to damage. The software is very useful, practical and collects much more data than human operators. P-TRAP is a new open source software that automatically recognizes the structure of a panicle and the seeds on the panicle in numeric images. The software processes and quantifies several traits related to panicle structure, detects and counts the grains, and measures their shape parameters. In short, P-TRAP offers both efficient results and a user-friendly environment for experiments. The experimental results showed very good accuracy compared to field operator, expert verification and well-known academic methods.
P-TRAP: a Panicle Trait Phenotyping tool
2013-01-01
Background In crops, inflorescence complexity and the shape and size of the seed are among the most important characters that influence yield. For example, rice panicles vary considerably in the number and order of branches, elongation of the axis, and the shape and size of the seed. Manual low-throughput phenotyping methods are time consuming, and the results are unreliable. However, high-throughput image analysis of the qualitative and quantitative traits of rice panicles is essential for understanding the diversity of the panicle as well as for breeding programs. Results This paper presents P-TRAP software (Panicle TRAit Phenotyping), a free open source application for high-throughput measurements of panicle architecture and seed-related traits. The software is written in Java and can be used with different platforms (the user-friendly Graphical User Interface (GUI) uses Netbeans Platform 7.3). The application offers three main tools: a tool for the analysis of panicle structure, a spikelet/grain counting tool, and a tool for the analysis of seed shape. The three tools can be used independently or simultaneously for analysis of the same image. Results are then reported in the Extensible Markup Language (XML) and Comma Separated Values (CSV) file formats. Images of rice panicles were used to evaluate the efficiency and robustness of the software. Compared to data obtained by manual processing, P-TRAP produced reliable results in a much shorter time. In addition, manual processing is not repeatable because dry panicles are vulnerable to damage. The software is very useful, practical and collects much more data than human operators. Conclusions P-TRAP is a new open source software that automatically recognizes the structure of a panicle and the seeds on the panicle in numeric images. The software processes and quantifies several traits related to panicle structure, detects and counts the grains, and measures their shape parameters. In short, P-TRAP offers both efficient results and a user-friendly environment for experiments. The experimental results showed very good accuracy compared to field operator, expert verification and well-known academic methods. PMID:23987653
Working with South Florida County Planners to Understand and Mitigate Uncertain Climate Risks
NASA Astrophysics Data System (ADS)
Knopman, D.; Groves, D. G.; Berg, N.
2017-12-01
This talk describes a novel approach for evaluating climate change vulnerabilities and adaptations in Southeast Florida to support long-term resilience planning. The work is unique in that it combines state-of-the-art hydrologic modeling with the region's long-term land use and transportation plans to better assess the future climate vulnerability and adaptations for the region. Addressing uncertainty in future projections is handled through the use of decisionmaking under deep uncertainty methods. Study findings, including analysis of key tradeoffs, were conveyed to the region's stakeholders through an innovative web-based decision support tool. This project leverages existing groundwater models spanning Miami-Dade and Broward Counties developed by the USGS, along with projections of land use and asset valuations for Miami-Dade and Broward County planning agencies. Model simulations are executed on virtual cloud-based servers for a highly scalable and parallelized platform. Groundwater elevations and the saltwater-freshwater interface and intrusion zones from the integrated modeling framework are analyzed under a wide range of long-term climate futures, including projected sea level rise and precipitation changes. The hydrologic hazards are then combined with current and future land use and asset valuation projections to estimate assets at risk across the range of futures. Lastly, an interactive decision support tool highlights the areas with critical climate vulnerabilities; distinguishes between vulnerability due to new development, increased climate hazards, or both; and provides guidance for adaptive management and development practices and decisionmaking in Southeast Florida.
DOE Office of Scientific and Technical Information (OSTI.GOV)
MacDonald, Douglas G.; Clements, Samuel L.; Patrick, Scott W.
Securing high value and critical assets is one of the biggest challenges facing this nation and others around the world. In modern integrated systems, there are four potential modes of attack available to an adversary: • physical only attack, • cyber only attack, • physical-enabled cyber attack, • cyber-enabled physical attack. Blended attacks involve an adversary working in one domain to reduce system effectiveness in another domain. This enables the attacker to penetrate further into the overall layered defenses. Existing vulnerability assessment (VA) processes and software tools which predict facility vulnerabilities typically evaluate the physical and cyber domains separately. Vulnerabilitiesmore » which result from the integration of cyber-physical control systems are not well characterized and are often overlooked by existing assessment approaches. In this paper, we modified modification of the timely detection methodology, used for decades in physical security VAs, to include cyber components. The Physical and Cyber Risk Analysis Tool (PACRAT) prototype illustrates an integrated vulnerability assessment that includes cyber-physical interdependencies. Information about facility layout, network topology, and emplaced safeguards is used to evaluate how well suited a facility is to detect, delay, and respond to attacks, to identify the pathways most vulnerable to attack, and to evaluate how often safeguards are compromised for a given threat or adversary type. We have tested the PACRAT prototype on critical infrastructure facilities and the results are promising. Future work includes extending the model to prescribe the recommended security improvements via an automated cost-benefit analysis.« less
NASA Astrophysics Data System (ADS)
Choi, D.; Jun, H. D.; Kim, S.
2012-04-01
Vulnerability assessment plays an important role in drawing up climate change adaptation plans. Although there are some studies on broad vulnerability assessment in Korea, there have been very few studies to develop and apply locally focused and specific sector-oriented climate change vulnerability indicators. Especially, there has seldom been any study to investigate the effect of an adaptation project on assessing the vulnerability status to climate change for fundamental local governments. In order to relieve adverse effects of climate change, Korean government has performed the project of the Major Four Rivers (Han, Geum, Nakdong and Yeongsan river) Restoration since 2008. It is expected that water level in main stream of 4 rivers will be dropped through this project, but flood effect will be mainly occurred in small and mid-sized streams which flows in main stream. Hence, we examined how much the project of the major four rivers restoration relieves natural disasters. Conceptual framework of vulnerability-resilience index to climate change for the Korean fundamental local governments is defined as a function of climate exposure, sensitivity, and adaptive capacity. Then, statistical data on scores of proxy variables assumed to comprise climate change vulnerability for local governments are collected. Proxy variables and estimated temporary weights of them are selected by surveying a panel of experts using Delphi method, and final weights are determined by modified Entropy method. Developed vulnerability-resilience index was applied to Korean fundamental local governments and it is calculated under each scenario as follows. (1) Before the major four rivers restoration, (2) 100 years after represented climate change condition without the major four rivers restoration, (3) After the major four rivers restoration without representing climate change (this means present climate condition) and (4) After the major four rivers restoration and 100 years after represented climate change condition. In the results of calculated vulnerability-resilience index of each scenario, it can be noticed that vulnerability of watersheds which are located near main stream of four rivers is alleviated, but because of climate change, vulnerability is getting high in most watersheds. Also, considering future climate change and river restoration, vulnerability of several watersheds is relieved by river restoration. Acknowledges This work was funded by the National Emergency Management Agency (NEMA) in Korea Program under Grant NEMA-10-NH-04.
New mechanism of spiral wave initiation in a reaction-diffusion-mechanics system.
Weise, Louis D; Panfilov, Alexander V
2011-01-01
Spiral wave initiation in the heart muscle is a mechanism for the onset of dangerous cardiac arrhythmias. A standard protocol for spiral wave initiation is the application of a stimulus in the refractory tail of a propagating excitation wave, a region that we call the "classical vulnerable zone." Previous studies of vulnerability to spiral wave initiation did not take the influence of deformation into account, which has been shown to have a substantial effect on the excitation process of cardiomyocytes via the mechano-electrical feedback phenomenon. In this work we study the effect of deformation on the vulnerability of excitable media in a discrete reaction-diffusion-mechanics (dRDM) model. The dRDM model combines FitzHugh-Nagumo type equations for cardiac excitation with a discrete mechanical description of a finite-elastic isotropic material (Seth material) to model cardiac excitation-contraction coupling and stretch activated depolarizing current. We show that deformation alters the "classical," and forms a new vulnerable zone at longer coupling intervals. This mechanically caused vulnerable zone results in a new mechanism of spiral wave initiation, where unidirectional conduction block and rotation directions of the consequently initiated spiral waves are opposite compared to the mechanism of spiral wave initiation due to the "classical vulnerable zone." We show that this new mechanism of spiral wave initiation can naturally occur in situations that involve wave fronts with curvature, and discuss its relation to supernormal excitability of cardiac tissue. The concept of mechanically induced vulnerability may lead to a better understanding about the onset of dangerous heart arrhythmias via mechano-electrical feedback.
Bachar, Eytan; Canetti, Laura; Hadar, Hilit; Baruch, Julia; Dor, Yehuda; Freedman, Sara
2015-10-01
The aim of the present study is to determine whether narcissistic vulnerability can aid in clarifying the debate regarding the relationship between childhood sexual abuse (CSA) and adulthood adjustment to traumatic events. 157 survivors (mean age = 31.1, SD = 10.9) of a traumatic event (war activities and road and work accidents) were assessed 1 week, 1, and 4 months following the event. Of the 157 participants, 15 reported experiencing CSA, and 26 reported experiencing childhood physical abuse (CPA). In the first-week assessment, patients were administered the Narcissistic Vulnerability Scale (NVS) and the Beck Depression Inventory (BDI). In the follow-up assessments, subjects were interviewed on the Clinician-Administered PTSD Scale. Narcissistic vulnerability was found, both in 1- and 4-month follow-ups, to increase the likelihood of participants who experienced CSA to develop PTSD symptoms later in their adult life, when exposed to other additional trauma. Narcissistic vulnerability, in both follow-ups, did not increase the likelihood of participants who experienced CPA to develop PTSD symptoms later in their life when exposed to other additional trauma. The NVS predicted the development of PTSD symptoms in the whole sample, both in the 1- and 4-month follow-ups, above and beyond the prediction of the BDI. In other words, narcissistic vulnerability can add additional information above and beyond general negative emotionality. In conclusion, it is recommended to take into consideration the interplay between CSA and the individual's narcissistic vulnerability when assessing the long term effects of CSA such as acute or chronic PTSD.
Booker, Lauren A; Magee, Michelle; Rajaratnam, Shantha M W; Sletten, Tracey L; Howard, Mark E
2018-03-27
Shift workers often experience reduced sleep quality, duration and/or excessive sleepiness due to the imposed conflict between work and their circadian system. About 20-30% of shift workers experience prominent insomnia symptoms and excessive daytime sleepiness consistent with the circadian rhythm sleep disorder known as shift work disorder. Individual factors may influence this vulnerability to shift work disorder or sleep-related impairment associated with shift work. This paper was registered with Prospero and was conducted using recommended standards for systematic reviews and meta-analyses. Published literature that measured sleep-related impairment associated with shift work including reduced sleep quality and duration and increased daytime sleepiness amongst healthcare shift workers and explored characteristics associated with individual variability were reviewed. Fifty-eight studies were included. Older age, morning-type, circadian flexibility, being married or having children, increased caffeine intake, higher scores on neuroticism and lower on hardiness were related to a higher risk of sleep-related impairment in response to shift work, whereas physical activity was a protective factor. The review highlights the diverse range of measurement tools used to evaluate the impact of shift work on sleep. Use of standardised and validated tools would enable cross-study comparisons. Longitudinal studies are required to establish causal relationships between individual factors and the development of shift work disorder. Copyright © 2018 Elsevier Ltd. All rights reserved.
[Women in informal economy health and work conditions Bogotá. 2007].
Sotelo-Suárez, Nidia R; Quiroz-Arcentáles, Jorge L; Mahecha-Montilla, Charo P; López-Sánchez, Paola A
2012-06-01
To determine work and health conditions of women working in informal economy in Bogotá, as well as to recommend priority action plans for preventing illnesses and accidents related to work and their consequences. Descriptive observational study. This study analyzed information collected by local groups in work-related contexts during 2007 as part of a set of forms of intervention established according to the Plan de Atención Básica (Primary Care Plan). This plan included 3 715 units of informal work from every point of the city. 3 936 women registers in all were analyzed. This study reveals evident precariousness conditions of women in this economic sector. Specifically, there are certain evident conditions that had shown in this study such as low education levels, incomes below the minimum legal standards, high exposure to damaging health work conditions, long work hours, and few hours for leisure and free time. Furthermore, 75 % of women included in this study are female head of household. This condition makes them more vulnerable to a heavier family and social burden. Closer attention to informal economy phenomenon is suggested in order to avoid vulnerable conditions of working women. Besides, it is necessary to improve the articulation between Academy and forms of intervention through public policies for knowing deeply repeated phenomena regarding the population of study. This articulation can be thought for implementing programs designed for improving women's quality of life.
NASA Astrophysics Data System (ADS)
Jaunat, Jessy; Huneau, Frédéric; Garel, Emilie; Devos, Alain; Lejeune, Olivier
2016-04-01
KEYWORDS: Alluvial aquifer, Vulnerability mapping, Index-based methods, DRASTIC, SINTACS, SI, GOD The geographical position of the Biguglia lagoon watershed south of the Bastia city (80 000 inhabitants), lead to a highly vulnerable hydrosystem setting. This littoral plain is the unique territory available for the urbanisation and for the agriculture activities (cattle breeding). All the activities developed are likely to have a qualitative impact on water infiltration and therefore on groundwater, which is in hydraulic connection with the lagoon system. Beyond this ecological issue, groundwater of this watershed is intensively used as drinking water supply. It appears essential to control the long-term groundwater quality of the Biguglia plain which is the major economic zone of Corsica. Achievement of this issue requires the identification of the areas where the alluvial aquifer is mostly vulnerable to anthropogenic activities. The results given by 4 of the most popular index-based vulnerability mapping methods (DRASTIC, SI, SINTACS and GOD) are compared. The water table, net recharge, aquifer and soils properties, topography, vadose zone and land uses have been precisely mapped and numerically translated in GIS with a 25m precision. 4 final maps were finally compiled according to the weighting factors of each methods. Hydrochemical investigations were also carried out on 30 sampling points (major ions and anthropogenic tracers) to evaluate the effect of anthropogenic activities on groundwater quality and also to validate the results of the vulnerability mapping. A comparison between the parametric models shows a significant agreement between the DRASTIC, SINTACS and SI results (2% to 5% of the total area in very low vulnerability class, 10% to 13% in low vulnerability, 16% to 23% in medium vulnerability, 31% to 53% in high vulnerability and 14% to 23% in very high vulnerability). The two first methods are quite similar, which explains the proximity of the obtained results. High vulnerability and very high vulnerability classes are noticeably different for the SI results. This can be partly explained by the consideration of the land use and the absence of parameters related to soil media, vadose zone and hydraulic conductivity in this model, which generates a larger surface in highly vulnerable class at the expense of the very highly vulnerable one. Conversely, the GOD method gives very different results especially in the very low and low vulnerability classes with 11% and 17% of the total area respectively. This last method underestimates the vulnerability in the hydrological context of this work. The DRASTIC and SINTACS models are those that best transcribe the field observations. With these models the most vulnerable zones are correlated with the highest concentrations of nitrates measured in groundwater. Thereafter, it will be essential to integrate the temporal variability of the imputed parameters and to link these results with the acquired data on origin and residence time of groundwater in the alluvial aquifer of Biguglia lagoon. This study was supported by CNRS Labex DRIIHM OHM Littoral méditerranéen (HYDROGEO-LAG project).
Vulnerable to Exclusion: The Place for Segregated Education within Conceptions of Inclusion
ERIC Educational Resources Information Center
Nusbaum, Emily A.
2013-01-01
This research was undertaken to understand how general education teachers who work in inclusive classrooms conceptualise inclusive education and understand their individual commitments to this practice. This study intended to make explicit the social meaning that resides in and is constituted by teachers doing their everyday work in schools…
Caught in Uncertain Futures, Now: A Reflexive Moment
ERIC Educational Resources Information Center
Reyes, Reynaldo, III
2016-01-01
This reflexive vignette reveals the emotional risks of ethnographic work by a Chicano researcher, educator, and advocate doing work in the Texas-Mexico Borderlands, caught at the intersection of vulnerable Latina/o youth and their possible futures. Data in this creative piece are derived from field notes of one classroom observation from an…
ERIC Educational Resources Information Center
Briscoe, J.; Rankin, P. M.
2009-01-01
Background: Children with specific language impairment (SLI) often experience difficulties in the recall and repetition of verbal information. Archibald and Gathercole (2006) suggested that children with SLI are vulnerable across two separate components of a tripartite model of working memory (Baddeley and Hitch 1974). However, the hierarchical…
Triple jeopardy: adolescent experiences of sex work and migration in Zimbabwe.
Busza, Joanna; Mtetwa, Sibongile; Chirawu, Petronella; Cowan, Frances
2014-07-01
Adolescence, migration and sex work are independent risk factors for HIV and other poor health outcomes. They are usually targeted separately with little consideration on how their intersection can enhance vulnerability. We interviewed ten women in Zimbabwe who experienced sex work and migration during adolescence, exploring implications for their health and for services to meet their needs. For most, mobility was routine throughout childhood due to family instability and political upheaval. The determinants of mobility, e.g. inability to pay school fees or desire for independence from difficult circumstances, also catalysed entry into sex work, which then led to further migration to maximise income. Respondents described their adolescence as a time of both vulnerability and opportunity, during which they developed survival skills. While these women did not fit neatly into separate risk profiles of "sex worker" "migrant" or "adolescent", the overlap of these experiences shaped their health and access to services. To address the needs of marginalised populations we must understand the intersection of multiple risks, avoiding simplified assumptions about each category. Copyright © 2014 Elsevier Ltd. All rights reserved.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Choi, Eric Y.; Flory, Adam E.; Lamarche, Brian L.
2014-06-01
The Juvenile Salmon Acoustic Telemetry System (JSATS) Detector is a software and hardware system that captures JSATS Acoustic Micro Transmitter (AMT) signals. The system uses hydrophones to capture acoustic signals in the water. This analog signal is then amplified and processed by the Analog to Digital Converter (ADC) and Digital Signal Processor (DSP) board in the computer. This board digitizes and processes the acoustic signal to determine if a possible JSATS tag is present. With this detection, the data will be saved to the computer for further analysis. This document details the features and functionality of the JSATS Detector software.more » The document covers how to install the software, setup and run the detector software. The document will also go over the raw binary waveform file format and CSV files containing RMS values« less
Vulnerability of water supply systems to cyber-physical attacks
NASA Astrophysics Data System (ADS)
Galelli, Stefano; Taormina, Riccardo; Tippenhauer, Nils; Salomons, Elad; Ostfeld, Avi
2016-04-01
The adoption of smart meters, distributed sensor networks and industrial control systems has largely improved the level of service provided by modern water supply systems. Yet, the progressive computerization exposes these critical infrastructures to cyber-physical attacks, which are generally aimed at stealing critical information (cyber-espionage) or causing service disruption (denial-of-service). Recent statistics show that water and power utilities are undergoing frequent attacks - such as the December power outage in Ukraine - , attracting the interest of operators and security agencies. Taking the security of Water Distribution Networks (WDNs) as domain of study, our work seeks to characterize the vulnerability of WDNs to cyber-physical attacks, so as to conceive adequate defense mechanisms. We extend the functionality of EPANET, which models hydraulic and water quality processes in pressurized pipe networks, to include a cyber layer vulnerable to repeated attacks. Simulation results on a medium-scale network show that several hydraulic actuators (valves and pumps, for example) can be easily attacked, causing both service disruption - i.e., water spillage and loss of pressure - and structural damages - e.g., pipes burst. Our work highlights the need for adequate countermeasures, such as attacks detection and reactive control systems.
HIV vulnerabilities of sex-trafficked Indian women and girls
Gupta, Jhumka; Raj, Anita; Decker, Michele R.; Reed, Elizabeth; Silverman, Jay G.
2009-01-01
Objective To qualitatively explore potential mechanisms that may confer heightened risk for HIV infection among survivors of sex trafficking in India. Methods Case narratives of 61 repatriated women and girls who reported being trafficked into sex work and were receiving services at an NGO in Mysore, India, were reviewed. Narratives were analyzed to examine potential sources of HIV risk related to sex trafficking. Results Participants were aged 14–30 years. Among the 48 women and girls tested for HIV, 45.8% were HIV positive. Narratives described very low levels of autonomy, with control exacted by brothel managers and traffickers. Lack of control appeared to heighten trafficked women and girls’ vulnerability to HIV infection in the following ways: use of violent rape as a means of coercing initiation into sex work, inability to refuse sex, inability to use condoms or negotiate use, substance use as a coping strategy, and inadequate access to health care. Conclusion Sex trafficked women and girls lack autonomy and are rendered vulnerable to HIV infection through several means. Development of HIV prevention strategies specifically designed to deal with lack of autonomy and reach sex-trafficked women and girls is imperative. PMID:19625022
Exploring Coping Strategies Among Young Asian American Women Breast Cancer Survivors.
Yoo, Grace J; Sudhakar, Anantha; Le, Mai Nhung; Levine, Ellen G
2017-03-01
In recent years, breast cancer rates among young Asian American women have been increasing. Despite increases in breast cancer among young Asian American women, little is known about how this population copes throughout diagnosis, treatment, and survivorship. This study was a qualitative exploration of how young Asian American women cope with breast cancer diagnosis, treatment, and survivorship. In-depth interviews with 22 young (under the age of 50) Asian American women diagnosed with early stage breast cancer were conducted. Through qualitative data analysis, three major themes emerged including moving from managing the emotions of others to expressing emotional vulnerability, moving from work and productivity to work-life balance, and moving beyond the family and reaching out to breast cancer survivors. At diagnosis, participants worked to maintain normalcy including caring for others and working during treatment. Once treatment was over, women worked to find ways to use their experience as a transformative one and also to develop more positive coping skills including expressing emotional vulnerability and reaching out to others. Further studies are needed to create and test culturally tailored supportive interventions that enhance positive coping tools among young Asian American women diagnosed by breast cancer.
NASA Astrophysics Data System (ADS)
Schwarz, A. M.; Ray, P.; Brown, C.; Wi, S.
2016-12-01
For nearly 2 years the California Department of Water Resources (CDWR) has been working with the University of Massachusetts Amherst (UMass) to evaluate climate change vulnerabilities to the California State Water Project. Working cooperatively, the team has developed tools and methods to employ a decision scaling approach to CDWR's existing water system model (CalSim-II/CalLite 3.0). This presentation will discuss how and why this partnership came to be, the co-production model the team has developed to share expertise, the new understanding of the system that has been gained through the process, and current and future efforts to influence planning and investments based on the findings of the work. This cooperative decision-maker-with-scientist engagement is unique in that CDWR has not outsourced the application of the science to their systems, and instead has worked directly with UMass researchers to develop the process, produce results, and interpret findings. Further, CDWR staff has worked with UMass researchers to present results in ways that are more useable and actionable for decision-makers. As will be shown, many of these graphics allow the team to use the science differently to improve decision making.
Work organization and health among immigrant women: Latina manual workers in North Carolina.
Arcury, Thomas A; Grzywacz, Joseph G; Chen, Haiying; Mora, Dana C; Quandt, Sara A
2014-12-01
We sought to describe work organization attributes for employed immigrant Latinas and determine associations of work organization with physical health, mental health, and health-related quality of life. We conducted a cross-sectional survey with 319 employed Latinas in western North Carolina (2009-2011). Measures included job demands (heavy load, awkward posture, psychological demand), decision latitude (skill variety, job control), support (supervisor control, safety climate), musculoskeletal symptoms, mental health (depressive symptoms), and mental (MCS) and physical component score (PCS) health-related quality of life. Three fifths reported musculoskeletal symptoms. Mean scores for depression, MCS, and PCS were 6.2 (SE = 0.2), 38.3 (SE = 0.5), and 42.8 (SE = 0.3), respectively. Greater job demands (heavy load, awkward posture, greater psychological demand) were associated with more musculoskeletal and depressive symptoms and worse MCS. Less decision latitude (lower skill variety, job control) was associated with more musculoskeletal and depressive symptoms. Greater support (supervisor's power and safety climate) was associated with fewer depressive symptoms and better MCS. Work organization should be considered to improve occupational health of vulnerable women workers. Additional research should delineate the links between work organization and health among vulnerable workers.
Goldman-Mellor, Sidra; Caspi, Avshalom; Arseneault, Louise; Ajala, Nifemi; Ambler, Antony; Danese, Andrea; Fisher, Helen; Hucker, Abigail; Odgers, Candice; Williams, Teresa; Wong, Chloe; Moffitt, Terrie E
2016-02-01
Labour market disengagement among youths has lasting negative economic and social consequences, yet is poorly understood. We compared four types of work-related self-perceptions, as well as vulnerability to mental health and substance abuse problems, among youths not in education, employment or training (NEET) and among their peers. Participants were from the Environmental Risk (E-Risk) longitudinal study, a nationally representative UK cohort of 2,232 twins born in 1994-1995. We measured commitment to work, job-search effort, professional/technical skills, 'soft' skills (e.g. teamwork, decision-making, communication), optimism about getting ahead, and mental health and substance use disorders at age 18. We also examined childhood mental health. At age 18, 11.6% of participants were NEET. NEET participants reported themselves as committed to work and searching for jobs with greater diligence than their non-NEET peers. However, they reported fewer 'soft' skills (B = -0.98, p < .001) and felt less optimistic about their likelihood of getting ahead in life (B = -2.41, p < .001). NEET youths also had higher rates of concurrent mental health and substance abuse problems, but these did not explain the relationship with work-related self-perceptions. Nearly 60% of NEET (vs. 35% of non-NEET) youths had already experienced ≥1 mental health problem in childhood/adolescence. Associations of NEET status with concurrent mental health problems were independent of pre-existing mental health vulnerability. Our findings indicate that while NEET is clearly an economic and mental health issue, it does not appear to be a motivation issue. Alongside skills, work-related self-perceptions and mental health problems may be targets for intervention and service provision among this high-risk population. © 2015 Association for Child and Adolescent Mental Health.
Hwahng, Sel Julian; Nuttbrock, Larry
2007-12-01
This article describes 3 distinct ethnocultural male-to-female transgender communities in New York City: the low-income African American/Black and Latina(o) House Ball community; low-income, often undocumented immigrant Asian sex workers; and middle-class White cross-dressers. These communities are highly socially isolated from each other and are more connected to their ethnocultural contexts than to an abstract and shared transgender identity. Whereas previous research either has viewed male-to-female transgender people as one monolithic group or has separated them into abstract racial categories unconnected to their communities and lifestyles, this article positions them within specific social networks, cultures, neighborhoods, and lifestyles. With regard to HIV vulnerabilities, violence, and rape, House Ball community members seemed to engage in the riskiest form of survival sex work, whereas Asian sex workers seemed to engage in moderate-risk survival sex work. White cross-dressers seemed to engage in very low-risk recreational sex work.
Blanchard, Andrea K; Nair, Sapna G; Bruce, Sharon G; Ramanaik, Satyanarayana; Thalinja, Raghavendra; Murthy, Srikanta; Javalkar, Prakash; Pillai, Priya; Collumbien, Martine; Heise, Lori; Isac, Shajy; Bhattacharjee, Parinita
2018-05-11
Research has increasingly documented the important role that violence by clients and the police play in exacerbating HIV vulnerability for women in sex work. However few studies have examined violence in the intimate relationships of women in sex work, or drawn on community partnerships to explore the social dynamics involved. A community-based participatory research study was undertaken by community and academic partners leading intimate partner violence (IPV) and HIV prevention programs in Bagalkot district, Karnataka state, India. The purpose was to explore the experience and understandings of intimate partner violence and HIV/AIDS among women in sex work and their intimate partners in Bagalkot that would inform both theory and practice. A community-based, interpretive qualitative methodology was used. Data was collected between July and October 2014 through in-depth interviews with 38 participants, including 10 couples, 13 individual female sex workers, and 5 individual male intimate partners. Purposive sampling was done to maximize variation on socio-demographic characteristics. Thematic content analysis was conducted through coding and categorization for each interview question in NVivo 10.0, followed by collaborative analysis to answer the research questions. The results showed that an array of interrelated, multi-level factors underlay the widespread acceptance and perpetuation of violence and lack of condom use in participants' intimate relationships. These included individual expectations that justified violence and reflected societal gender norms, compounded by stigma, legal and economic constraints relating to sex work. The results demonstrate that structural vulnerability to IPV and HIV must be addressed not only on the individual and relationship levels to resolve relevant triggers of violence and lack of condom use, but also the societal-level to address gender norms and socio-economic constraints among women in sex work and their partners. The study contributes to a better understanding on the interplay of individual agency and structural forces at a time when researchers and program planners are increasingly pondering how best to address complex and intersecting social and health issues. Ongoing research should assess the generalizability of the results and the effectiveness of structural interventions aiming to reduce IPV and HIV vulnerability in other contexts.
Sheynin, Jony; Beck, Kevin D.; Pang, Kevin C.H.; Servatius, Richard J.; Shikari, Saima; Ostovich, Jacqueline; Myers, Catherine E.
2014-01-01
Acquisition and maintenance of avoidance behaviour is a key feature of all human anxiety disorders. Animal models have been useful in understanding how anxiety vulnerability could translate into avoidance learning. For example, behaviourally-inhibited temperament and female sex, two vulnerability factors for clinical anxiety, are associated with faster acquisition of avoidance responses in rodents. However, to date, the translation of such empirical data to human populations has been limited since many features of animal avoidance paradigms are not typically captured in human research. Here, using a computer-based task that captures many features of rodent escape-avoidance learning paradigms, we investigated whether avoidance learning would be faster in humans with inhibited temperament and/or female sex and, if so, whether this facilitation would take the same form. Results showed that, as in rats, both vulnerability factors were associated with facilitated acquisition of avoidance behaviour in humans. Specifically, inhibited temperament was specifically associated with higher rate of avoidance responding, while female sex was associated with longer avoidance duration. These findings strengthen the direct link between animal avoidance work and human anxiety vulnerability, further motivating the study of animal models while also providing a simple testbed for a direct human testing. PMID:24412263
Ribeiro, Luís; Pindo, Juan Carlos; Dominguez-Granda, Luis
2017-01-01
The Guayas region in Ecuador is economically very important, producing 68% of the national crops. The main agricultural activities threaten the groundwater therein with nitrate contamination given the large fertiliser and water needs. The present work tests the applicability of the susceptibility index assessment method in evaluating the impact of agricultural activities on groundwater quality, using as a case study an aquifer of the Guayas river basin in Ecuador. The index adapts four parameters of the DRASTIC method and incorporated a new land use parameter. Results show that the areas highly vulnerable to contamination are located in irrigation perimeters of dominant paddy fields associated with the high recharge rates in the alluvial deposits. Respectively, moderately vulnerable and low-vulnerability areas correspond to aquatic environments and forests, semi-natural zones and water bodies. One of the main contributions of the Daule aquifer vulnerability is likely its wide, flat topography. A great part of the aquifer is at high risk of contamination by nitrates if a code of good agricultural practices is not applied. Therefore the implementation of a monitoring network to control the nitrates concentrations is the first step to assure groundwater quality for drinking purposes. Copyright © 2016 Elsevier B.V. All rights reserved.
Addressing Issues for Land Change Science
NASA Astrophysics Data System (ADS)
Braimoh, Ademola; Huang, He Qing
2009-09-01
Workshop on Vulnerability and Resilience of Land Systems in Asia; Beijing, China, 15-17 June 2009; There is a growing international community of scholars who work within the interdisciplinary field of land change science, a scientific domain that seeks to understand the dynamics of the land system as a coupled human-environment system. A coupled human-environment system is one in which the social and biophysical subsystems are intertwined so that the system's condition and responses to external forcing are based on the synergy of the two subsystems. Research on land system vulnerability, defined as a function of exposure and sensitivity to natural and anthropogenic perturbations, such as climate variability and sudden changes in macroeconomic conditions and the ability to cope with the impacts of those perturbations, is a fundamental component of land change science. To address issues related to land system vulnerability, the Global Land Project (GLP; http://www.glp-beijing.org.cn/index.php and http://www.glp.hokudai.ac.jp) brought together an interdisciplinary group of researchers with backgrounds ranging from environmental to social sciences. Participants came from both developed and developing countries. The workshop sought to (1) improve knowledge of the causal processes that affect a system's vulnerability and capacity to cope with different perturbations and (2) identify factors that hinder the integration of vulnerability assessment into policies and decision making.
NASA Astrophysics Data System (ADS)
Klima, K.
2013-12-01
Today's environmental problems stretch beyond the bounds of most academic disciplines, and thus solutions require an interdisciplinary approach. For instance, the scientific consensus is changes in the frequency and severity of many types of extreme weather events are increasing (IPCC 2012). Yet despite our efforts to reduce greenhouse gases, we continue to experience severe weather events such as Superstorm Sandy, record heat and blizzards, and droughts. These natural hazards, combined with increased vulnerability and exposure, result in longer-lasting disruptions to critical infrastructure and business continuity throughout the world. In order to protect both our lives and the economy, we must think beyond the bounds of any one discipline to include an integrated assessment of relevant work. In the wake of recent events, New York City, Washington, DC, Chicago, and a myriad of other cities have turned to their academic powerhouses for assistance in better understanding their vulnerabilities. This talk will share a case study of the state of integrated assessments and vulnerability studies of energy, transportation, water, real estate, and other main sectors in Pittsburgh, PA. Then the talk will use integrated assessment models and other vulnerability studies to create coordinated sets of climate projections for use by the many public agencies and private-sector organizations in the region.
NASA Astrophysics Data System (ADS)
Chen, Junhua
2013-03-01
To cope with a large amount of data in current sensed environments, decision aid tools should provide their understanding of situations in a time-efficient manner, so there is an increasing need for real-time network security situation awareness and threat assessment. In this study, the state transition model of vulnerability in the network based on semi-Markov process is proposed at first. Once events are triggered by an attacker's action or system response, the current states of the vulnerabilities are known. Then we calculate the transition probabilities of the vulnerability from the current state to security failure state. Furthermore in order to improve accuracy of our algorithms, we adjust the probabilities that they exploit the vulnerability according to the attacker's skill level. In the light of the preconditions and post-conditions of vulnerabilities in the network, attack graph is built to visualize security situation in real time. Subsequently, we predict attack path, recognize attack intention and estimate the impact through analysis of attack graph. These help administrators to insight into intrusion steps, determine security state and assess threat. Finally testing in a network shows that this method is reasonable and feasible, and can undertake tremendous analysis task to facilitate administrators' work.
Prefrontal vulnerabilities and whole brain connectivity in aging and depression.
Lamar, Melissa; Charlton, Rebecca A; Ajilore, Olusola; Zhang, Aifeng; Yang, Shaolin; Barrick, Thomas R; Rhodes, Emma; Kumar, Anand
2013-07-01
Studies exploring the underpinnings of age-related neurodegeneration suggest fronto-limbic alterations that are increasingly vulnerable in the presence of disease including late life depression. Less work has assessed the impact of this specific vulnerability on widespread brain circuitry. Seventy-nine older adults (healthy controls=45; late life depression=34) completed translational tasks shown in non-human primates to rely on fronto-limbic networks involving dorsolateral (Self-Ordered Pointing Task) or orbitofrontal (Object Alternation Task) cortices. A sub-sample of participants also completed diffusion tensor imaging for white matter tract quantification (uncinate and cingulum bundle; n=58) and whole brain tract-based spatial statistics (n=62). Despite task associations to specific white matter tracts across both groups, only healthy controls demonstrated significant correlations between widespread tract integrity and cognition. Thus, increasing Object Alternation Task errors were associated with decreasing fractional anisotropy in the uncinate in late life depression; however, only in healthy controls was the uncinate incorporated into a larger network of white matter vulnerability associating fractional anisotropy with Object Alternation Task errors using whole brain tract-based spatial statistics. It appears that the whole brain impact of specific fronto-limbic vulnerabilities in aging may be eclipsed in the presence of disease-specific neuropathology like that seen in late life depression. Copyright © 2013 Elsevier Ltd. All rights reserved.
NASA Astrophysics Data System (ADS)
Wing-Yuen Chow, Candace; Bründl, Michael; Keiler, Margreth
2017-04-01
In mountain regions, high economic losses have increased significantly in the past decades due to severe hazard processes, in spite of notable investments in hazard management. Assessing the vulnerability of built structures to high magnitude torrent events is a part of consequence analysis, where hazard intensity is related to the degree of loss sustained. While vulnerability curves have been developed for different countries, the presented work contributes new data from Swiss-based case studies that address a known gap associated with the consequences of high magnitude events. Data for this stage of the investigation communicates the degree of loss associated with affected structures and has been provided by local authorities dealing with natural hazards (e.g. Amt für Wald des Kantons Bern (KAWA) and cantonal insurance providers). Information used for the empirical quantification of vulnerability to torrent processes is derived from detailed post-event documentation and the loss database and verified with field visits. Building the initial database supports data sharing and the systematic inclusion of additional case studies as they become available. The collection of this new data is fundamental to the development of a local vulnerability curve based on observed sediment deposition heights, a proxy for describing hazard intensity. The result will then be compared to curves derived from Austrian and Italian datasets.
Mehrabadi, Azar; Craib, Kevin J P; Patterson, Katharina; Adam, Warner; Moniruzzaman, Akm; Ward-Burkitt, Barbara; Schechter, Martin T; Spittal, Patricia M
2008-04-01
In Canada, Aboriginal women and youth continue to be overrepresented amongst new cases of HIV, and are considered at increased risk for sex and drug-related harm. Young women involved in sex work are particularly vulnerable. The purpose of this study is to determine HIV-related vulnerabilities associated with sex work amongst young Aboriginal women in two Canadian cities. This study is based on a community-based cohort of Aboriginal young people (status and non-status First Nations, Inuit and Métis) between the ages of 14 and 30 who used injection or non-injection illegal drugs (street drugs) in the previous month. Participants lived in Vancouver, Canada, or Prince George, a remote, northern Canadian city. Between October 2003 and July 2005, 543 participants were recruited by word of mouth, posters, and street outreach. A baseline questionnaire was administered by Aboriginal interviewers, and trained nurses drew blood samples for HIV and HCV antibodies and provided pre- and post-test counselling. This study included 262 young women who participated at baseline. Analyses were conducted to compare socio-demographics, drug use patterns, injection practices, sexual experiences, and HIV and HCV prevalence between young women who reported being involved in sex work in the last 6 months (n=154) versus young women who did not (n=108). Logistic regression was used to identify factors independently associated with recent sex work involvement. Both sexual violence and drug using patterns were found to be markedly different for women having recently been involved in sex work. Multivariate analysis revealed daily injection of cocaine (AOR=4.4; 95% CI: 1.9, 10.1 and smoking crack (AOR=2.9; 95% CI: 1.6, 5.2) in the previous 6 months, and lifetime sexual abuse (AOR=2.5; 95% CI: 1.4, 4.4) to be independently associated with sex work. Harm reduction and treatment programs that address historical and lifetime trauma amongst Aboriginal people and prioritize emotional and physical safety for young Aboriginal women involved in sex work are required.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pavlickova, Katarina; Vyskupova, Monika, E-mail: vyskupova@fns.uniba.sk
Cumulative environmental impact assessment deals with the occasional use in practical application of environmental impact assessment process. The main reasons are the difficulty of cumulative impact identification caused by lack of data, inability to measure the intensity and spatial effect of all types of impacts and the uncertainty of their future evolution. This work presents a method proposal to predict cumulative impacts on the basis of landscape vulnerability evaluation. For this purpose, qualitative assessment of landscape ecological stability is conducted and major vulnerability indicators of environmental and socio-economic receptors are specified and valuated. Potential cumulative impacts and the overall impactmore » significance are predicted quantitatively in modified Argonne multiple matrixes while considering the vulnerability of affected landscape receptors and the significance of impacts identified individually. The method was employed in the concrete environmental impact assessment process conducted in Slovakia. The results obtained in this case study reflect that this methodology is simple to apply, valid for all types of impacts and projects, inexpensive and not time-consuming. The objectivity of the partial methods used in this procedure is improved by quantitative landscape ecological stability evaluation, assignment of weights to vulnerability indicators based on the detailed characteristics of affected factors, and grading impact significance. - Highlights: • This paper suggests a method proposal for cumulative impact prediction. • The method includes landscape vulnerability evaluation. • The vulnerability of affected receptors is determined by their sensitivity. • This method can increase the objectivity of impact prediction in the EIA process.« less
Use of modeling to identify vulnerabilities to human error in laparoscopy.
Funk, Kenneth H; Bauer, James D; Doolen, Toni L; Telasha, David; Nicolalde, R Javier; Reeber, Miriam; Yodpijit, Nantakrit; Long, Myra
2010-01-01
This article describes an exercise to investigate the utility of modeling and human factors analysis in understanding surgical processes and their vulnerabilities to medical error. A formal method to identify error vulnerabilities was developed and applied to a test case of Veress needle insertion during closed laparoscopy. A team of 2 surgeons, a medical assistant, and 3 engineers used hierarchical task analysis and Integrated DEFinition language 0 (IDEF0) modeling to create rich models of the processes used in initial port creation. Using terminology from a standardized human performance database, detailed task descriptions were written for 4 tasks executed in the process of inserting the Veress needle. Key terms from the descriptions were used to extract from the database generic errors that could occur. Task descriptions with potential errors were translated back into surgical terminology. Referring to the process models and task descriptions, the team used a modified failure modes and effects analysis (FMEA) to consider each potential error for its probability of occurrence, its consequences if it should occur and be undetected, and its probability of detection. The resulting likely and consequential errors were prioritized for intervention. A literature-based validation study confirmed the significance of the top error vulnerabilities identified using the method. Ongoing work includes design and evaluation of procedures to correct the identified vulnerabilities and improvements to the modeling and vulnerability identification methods. Copyright 2010 AAGL. Published by Elsevier Inc. All rights reserved.
Correlates of HIV/STD testing and willingness to test among rural-to-urban migrants in China.
Wang, Bo; Li, Xiaoming; Stanton, Bonita; McGuire, James
2010-08-01
This study investigates socio-demographic, behavioral, psychological, and structural factors associated with self-reported HIV/STD testing and willingness to test among 1,938 Chinese migrants. Overall, 6% and 14% of participants had ever been tested for HIV and STD, respectively. The results of multivariate analyses indicate that working at entertainment sectors, engaging in commercial sex, and utilization of health care were positively associated with both HIV and STD testing. Younger age, selling blood, perceived peer sexual risk involvement, and satisfaction with life were associated with HIV testing only. Female gender, early sexual debut, multiple sexual partners, and perceived vulnerability to HIV/STD were associated with STD testing only. Male gender, having premarital sex, perceived higher severity of and vulnerability to HIV/STD, and utilization of health care were associated with willingness to be tested for both HIV and STD. Interventions designed to raise the perception of vulnerability to HIV/STD and to improve access to and utilization of health care may be effective in encouraging more HIV testing in this vulnerable population.
Gontijo, Daniela; Medeiros, Marcelo
2009-01-01
The concept of vulnerability is being discussed in the public health area as a potential tool toward the transformation of the health practices for allowing an articulation individual-community. Understanding health as a process of subjectivation determined by social, cultural and historical contexts, this article aims to approach the question children and adolescents in street situation on the basis of the concept of civil vulnerability, using the theoretical background presented by Robert Castel. This author understands the social marginalization lived by different individuals and social groups in a dynamic form, determined by the association of work and social insertion. As refers to children and adolescents in street situation, we believe that they are reflecting a process of intensified vulnerability (culminating in disaffiliation) to which thousands of Brazilian families are subject due to the extreme social inequalities in our country. We hope that our theoretical discussion will be able to contribute to the development of a theoretical reference in public health and to the planning and implementation of health actions directed to this population.
Dworkin, Shari L.
2014-01-01
This paper examines the shifting nature of contemporary epidemiological classifications in the HIV/ AIDS epidemic. It first looks at assumptions that guide a discourse of vulnerability and circulate around risk categories. It then examines the underlying emphasis in public health on the popular frame of “vulnerable women” who acquire HIV through heterosexual transmission. Drawing on work on gender, sexuality, and intersectionality, the paper asks why a discourse of vulnerability is infused into discussions of heterosexually-active women's HIV risks but not those pertaining to heterosexually-active men's. The paper then moves to current surveillance categories that are hierarchically and differentially applied to women's and men's risks in the HIV epidemic. Here, the focus is on the way in which contemporary classifications allow for the emergence of the vulnerable heterosexually-active woman while simultaneously constituting lack of fathomability concerning bisexual and lesbian transmission risk. Lastly, theories of intersectionality, are used to examine current research on woman-to-woman transmission, and to suggest future more productive options. PMID:16864226
Monk, Christopher Thomas; Arlinghaus, Robert
2017-01-01
Fish personality traits, such as swimming activity, or personality related emergent behavioural properties, such as the degree of space use shown by an individual fish, should affect encounter rates between individual fish and fishing gear. Increased encounters should in turn drive vulnerability to capture by passively operated gears. However, empirical evidence documenting a relationship between activity-based behaviours and vulnerability to capture by passive fishing gear in the wild is limited. Using whole-lake acoustic telemetry, we first documented significant repeatabilities over several months in a suite of encounter rate-associated behaviours (swimming distance, activity space size, time on baited feeding sites, switching frequency among baited feeding sites, distance to the lake bottom) in two recreationally important benthivorous cyprinid species, the common carp (Cyprinus carpio) and tench (Tinca tinca). We then experimentally targeted both species using stationary angling on baited feeding sites. Individual fish regularly visited the angling sites, documenting that the fishes encountered the angling baits. When attempting to explain individual variation in vulnerability as a function of repeatable behavioural traits, we found no evidence of a significant relationship among various encounter-based behaviours and vulnerability to angling for both species. There was also no evidence for size selection or for energetically less conditioned fish to be more vulnerable. The data cumulatively suggest that fine-scale behaviours after encountering a bait (e.g., frequency of bait intake) may be ultimately decisive for determining vulnerability to angling in benthivorous fish. Based on our work, fishing-induced selection on encounter-based behaviours in recreational angling for benthivorous fish in the wild appears unlikely. PMID:28301558
Security challenge to using smartphones for SHM
NASA Astrophysics Data System (ADS)
Abueh, Yeka; Liu, Hong
2016-04-01
Pervasive smartphones have demonstrated great potential in structural health monitoring (SHM) of civil infrastructures. Their sensing, processing, and communication capabilities along with crowdsourcing facility ease technical difficulties and reduce financial burdens of instrumentation and monitoring for SHM in civil infrastructures. However, smartphones are vulnerable to unintentional misuses and malicious attacks. This paper analyzes the vulnerabilities of smartphones in performing SHM and reveals the exploitation of those vulnerabilities. The work probes the attack surface of both devices and data. Device attack scenarios include hacking individual smartphones to modify the data stored on them and orchestrating smartphones to launch a distributed denial-of-service attack. Specifically, experiments are conducted to remotely access an Android smartphone and modify the sensing data of structural health stored on it. The work also presents a case study that reveals the sensitivity of a popular perturbation analysis method to faulty data delivered by a smartphone. The paper provides the direction of meeting the security challenge to using smartphones for SHM. As the first line of defense, device authentication is implemented in the smartphone to stop spoofing. Subsequently, message authentication is devised to maintain data integrity. There is a need to apply data science for the SHM immunity system against the sensitivity to data inaccuracy. The work also evaluates the cost-effectiveness of the proposed security measures, recommending varying levels of security to mitigate the adversaries to smartphones used in SHM systems. It calls for security solutions at the design stage of SHM systems rather than patching up after their implementations.
Loignon, Christine; Fortin, Martin; Bedos, Christophe; Barbeau, David; Boudreault-Fournier, Alexandrine; Gottin, Thomas; Goulet, Émilie; Laprise, Elisha; Haggerty, Jeannie L
2015-01-01
Background. Communication barriers between persons living in poverty and healthcare professionals reduce care effectiveness. Little is known about the strategies general practitioners (GPs) use to enhance the effectiveness of care for their patients living in poverty. Objective. The aim of this study was to identify strategies adopted by GPs to deliver appropriate care to patients living in poverty. Methods. We conducted in-depth semi-structured interviews with 35 GPs practising in Montreal, Canada, who regularly provide care to underprivileged patients in primary care clinics located in deprived urban areas. Analysis consisted of interview debriefing, transcript coding, thematic analysis and data interpretation. Results. GPs develop specific skills for caring for these patients that are responsive to their complex medical needs and challenging social context. Our respondents used three main strategies in working with their patients: building a personal connection to overcome social distance, aligning medical expectations with patients’ social vulnerability and working collaboratively to empower patients. With these strategies, the physicians were able to enhance the patient–physician relationship and to take into account the impact of poverty on illness self-management. Conclusions. Our results may help GPs improve the health and care experience of their vulnerable patients by adopting these strategies. The strategies’ impacts on patients’ experience of care and health outcomes should be evaluated as a prelude to integrating them into primary care practice and the training of future physicians. PMID:25670205
Coastal erosion risk assessment using natural and human factors in different scales.
NASA Astrophysics Data System (ADS)
Alexandrakis, George; Kampanis, Nikolaos
2015-04-01
Climate change, including sea-level rise and increasing storms, raise the threats of coastal erosion. Mitigating and adapting to coastal erosion risks in areas of human interest, like urban areas, culture heritage sites, and areas of economic interest, present a major challenge for society. In this context, decision making needs to be based in reliable risk assessment that includes environmental, social and economic factors. By integrating coastal hazard and risk assessments maps into coastal management plans, risks in areas of interest can be reduced. To address this, the vulnerability of the coast to sea level rise and associated erosion, in terms of expected land loss and socioeconomic importance need to be identified. A holistic risk assessment based in environmental, socioeconomic and economics approach can provide managers information how to mitigate the impact of coastal erosion and plan protection measures. Such an approach needs to consider social, economic and environmental factors, which interactions can be better assessed when distributed and analysed along the geographical space. In this work, estimations of climate change impact to coastline are based on a combination of environmental and economic data analysed in a GIS database. The risk assessment is implemented through the estimation of the vulnerability and exposure variables of the coast in two scales. The larger scale estimates the vulnerability in a regional level, with the use environmental factors with the use of CVI. The exposure variable is estimated by the use of socioeconomic factors. Subsequently, a smaller scale focuses on highly vulnerable beaches with high social and economic value. The vulnerability assessment of the natural processes to the environmental characteristics of the beach is estimated with the use of the Beach Vulnerability Index. As exposure variable, the value of beach width that is capitalized in revenues is implemented through a hedonic pricing model. In this econometric modelling, Beach Value is related with economic and environmental attributes of the beach. All calculations are implemented in a GIS database, organised in five levels. In the first level the gathering of raw data is been made. In the second level data are organized in different scales. Third level, concerns the generating of new thematic data for further use. Risk assessment analysis and cost benefit analysis for protection measures is been made in level four. In the fifth level the results are transformed in user friendly form to be used by coastal managers. As case study area for the application of the method is selected Crete Island, while for the small scale the city of Rethymnon, which at the regional vulnerability analysis was found as high vulnerable. In the small scale vulnerability analysis, the sectors of the beach which are most vulnerable were identified, and risk analysis was made based on the revenue losses. Acknowledgments This work was implemented within the framework of the Action «Supporting Postdoctoral Researchers» of the Operational Program "Education and Lifelong Learning" (Action's Beneficiary: General Secretariat for Research and Technology), and is co-financed by the European Social Fund (ESF) and the Greek State.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-08
... Science Basis. Contribution of Working Group I to the Fourth Assessment Report of the Intergovernmental Panel on Climate Change [Solomon, S., D. Qin, M. Manning, Z. Chen, M. Marquis, K.B. Averyt, M. Tignor... Vulnerability. Contribution of Working Group II to the Fourth Assessment Report of the Intergovernmental Panel...
ERIC Educational Resources Information Center
Morey, Candice C.; Miron, Monica D.
2016-01-01
Among models of working memory, there is not yet a consensus about how to describe functions specific to storing verbal or visual-spatial memories. We presented aural-verbal and visual-spatial lists simultaneously and sometimes cued one type of information after presentation, comparing accuracy in conditions with and without informative…
ERIC Educational Resources Information Center
Hawkins, Amy L.; Haskett, Mary E.
2014-01-01
Background: Abused children's internal working models (IWM) of relationships are known to relate to their socioemotional adjustment, but mechanisms through which negative representations increase vulnerability to maladjustment have not been explored. We sought to expand the understanding of individual differences in IWM of abused children and…
Financial Capability and Asset Building in Social Work Education: Is It "The Big Piece Missing?"
ERIC Educational Resources Information Center
Sherraden, Margaret; Birkenmaier, Julie; McClendon, Gena G.; Rochelle, Michael
2017-01-01
Although social workers recently have renewed the profession's historical focus on the financial well-being of vulnerable families, they receive little professional education to prepare them for this work. This study examines the implementation and outcomes of infusing a financial capability and asset building (FCAB) curriculum in a variety of…
A Powerful Partner: Philanthropy's Role in Promoting Positive Approaches to School Discipline
ERIC Educational Resources Information Center
Mediratta, Kavitha
2016-01-01
The author works at The Atlantic Philanthropies, an international foundation dedicated to advancing lasting change for those who are unfairly disadvantaged or vulnerable to life's circumstances. At the heart of The Atlantic Philanthropies work is the belief that all people have the right to opportunity, equity, and dignity. The urgency of school…
ERIC Educational Resources Information Center
Shuma Rudberg, Mary R.
2017-01-01
Certified rehabilitation counselors (CRCs) are required to work with one of the nation's most vulnerable populations--people with disabilities. In order for CRCs to deliver optimum services and stay mentally nourished, a healthy working environment is essential. Workplace bullying is defined by WBI (2014) as "repeated, health harming…
ERIC Educational Resources Information Center
Kumazawa, Masako
2011-01-01
This study is a longitudinal, qualitative, interpretive inquiry into the work motivation of four novice EFL teachers at public secondary schools in Japan. I employed constructivism as my philosophical framework and narrative inquiry as my primary methodological tool, and attempted to capture the four young teachers' changing motivation as embedded…
NASA Astrophysics Data System (ADS)
Coca-Domínguez, Oswaldo; Ricaurte-Villota, Constanza; Morales-Giraldo, David; Rangel-Buitrago, Nelson
2014-05-01
Analysis of hazards and vulnerability associated to coastal erosion along coastlines is a first issue in order to establish plans for adaptation to climate change in coastal areas. La Barra Town, Buenaventura (Pacific ocean of Colombia) and Providence - Santa Catalina Islands (Colombian Caribbean) were selected to develop a detailed analysis of coastal erosion hazard and vulnerability from different perspectives: i) physical (hazard) , ii) social , iii) conservation approach and iv) cultural heritage (Raizal). The analysis was made by a semi quantitative approximation method, applying variables associated with the intrinsic coastal zone properties (i.e. type of beach, exposure of the coast to waves, etc.). Coastal erosion data and associated variables as well land use; conservation and heritage data were used to carry out a further detailed analysis of the human - structural vulnerability and exposure to hazards. The data shows erosion rates close to -17 m yr-1 in La Barra Town (highlighting their critical condition and urgent relocation process), while in some sectors of Providence Island, such as Old Town, erosion rate was -5 m yr-1. The observed erosion process affects directly the land use and the local and regional economy. The differences between indexes and the structural and physical vulnerability as well the use of methodological variables are presented in the context of each region. In this work, all the information was worked using a GIS environment since this allows editing and updating the information continuously. The application of this methodology generates useful information in order to promote risk management as well prevention, mitigation and reduction plans. In both areas the adaptation must be a priority strategy to be considered, including relocation alternatives and sustainable protection with the support of studies of uses and future outlooks in the coast. The methodology is framed into the use of GIS tools and it highlights their benefits in the analysis of information.
IPCC Climate Change 2013: Impacts, Adaptation and Vulnerability: Key findings and lessons learned
NASA Astrophysics Data System (ADS)
Giorgi, Filippo; Field, Christopher; Barros, Vicente
2014-05-01
The Working Group II contribution to the Fifth Assessment Report of the Intergivernmental Panel on Climate Change, Impacts, Adaptation and Vulnerability, will be completed and approved in March 2014. It includes two parts, Part A covering Global and Sectoral Aspects, and Part B, covering Regional Aspects. The WGII report spans a very broad range of topics which are approached in a strong interdisciplinary context. It highlights how observed impacts of climate change are now widespread and consequential, particularly for natural systems, and can be observed on all continents and across the oceans. Vulnerability to climate change depends on interactions with non-climatic stressors and inequalities, resulting in highly differential risks associated with climate change. It is also found that adaptation is already occurring across scales and is embedded in many planning processes. Continued sustained warming thrughout the 21st century will exacerbate risks and vulnerabilities across multiple sectors, such as freshwater resources, terrestrial and inland water systems, coastal and marine systems, food production, human health, security and livelihood. The report stresses how risks and vulnerabilities need to be assessed within a multi-stressor and regionally specific context, and can be reduced and managed by adopting climate-resilient pathwyas combining suitable adaptation and mitigation options with synergies and tradeoffs occurring both within and across regions. The Working group II report includes a large number of Chapters (30) and contributors (310 including authors and review editors), with expertise in a broad range of disciplines, from the physical science to the impact and socio-economic sciences. The communication across chapters and disciplines has been a challenge, and will continue to be one as the Global Change problem will increasingly require a fully integrated and holistic approach. Note that text on this abstract is not approved at the time its submission, but it will be discussed in the report.
Hamershock, Rose A; Rajabiun, Serena; Fox, Jane E; Mofidi, Mahyar; Abel, Stephen N; York, Jill A; Kunzel, Carol; Sanogo, Moussa; Mayfield, Theresa G
2014-08-01
Access to oral health care for vulnerable populations is one of the concerns addressed by the U.S. Health Resources and Services Administration HIV/AIDS Bureau's Community-Based Dental Partnership Program (CBDPP). The program introduces dental students and residents at several dental schools to care for vulnerable patients through didactic and clinical work in community-based dental settings. This study of the dental students and residents in this program answered three questions: 1) What are their HIV knowledge, attitudes, and behaviors? 2) How has participation in the CBDPP impacted their knowledge, attitudes, and behaviors? 3) Has the intervention affected their work placement decisions and attitudes after graduation, particularly with respect to treating people living with HIV and other underserved populations? A total of 305 first- through fourth-year dental students and first- and second-year residents at five dental schools across the United States completed surveys before and after a community-based rotation and following graduation. Response rates at each of the five schools ranged from 82.4 to 100 percent. The results showed an increase in the participants' knowledge and positive attitudes regarding treatment for patients with HIV and other vulnerable populations post-rotation compared to pre-rotation. Results after graduation found that most respondents were practicing in private settings or in academic institutions as residents but were willing to treat a diverse patient population. These findings support the role of training programs, such as the CBDPP, for expanding the dental workforce to treating vulnerable populations including people living with HIV/AIDS.
2013-01-01
Background HIV risks for women who inject drugs and those who engage in sex work are well documented. Women who are dependent on non-injecting drugs and alcohol are also likely to have increased vulnerability to HIV infection, but until they actually inject drugs or engage in sex work, are unlikely to come to the attention of HIV prevention programs. Methods We undertook a qualitative study involving nine focus group discussions (FGDs) and 27 key informant interviews to investigate the context of female drug and alcohol use in two high HIV prevalence states of India (Manipur and Nagaland) and to describe their HIV risks. The FGD and interview transcripts were thematically analyzed Results The women were relatively young (mean age 31 years in Manipur and 28 years in Nagaland), but 64% in Manipur and 35% in Nagaland were widowed or divorced. Both heroin and alcohol were commonly used by the women from Manipur, while alcohol was primarily used by the women from Nagaland, especially in the context of ‘booze joints’ (illicit bars). Reasons for drug and alcohol use included: to avoid symptoms of withdrawal, to suppress emotional pain, to overcome the shame of sex work, pleasure, and widowhood. HIV vulnerability was clearly described, not only in relation to injecting drug use and sex work, but also alcohol consumption. Conclusions The contribution of alcohol use to the HIV vulnerability of women is not currently considered when HIV prevention programs are being designed and implemented leaving a group of high-risk women uncovered by much needed services such as treatment for a range of health problems including alcohol dependence. PMID:23360360
NASA Astrophysics Data System (ADS)
Blauhut, V.; Stahl, K.; Stagge, J. H.; Tallaksen, L. M.; De Stefano, L.; Vogt, J.
2015-12-01
Drought is one of the most costly natural hazards in Europe. Due to its complexity, drought risk, the combination of the natural hazard and societal vulnerability, is difficult to define and challenging to detect and predict, as the impacts of drought are very diverse, covering the breadth of socioeconomic and environmental systems. Pan-European maps of drought risk could inform the elaboration of guidelines and policies to address its documented severity and impact across borders. This work (1) tests the capability of commonly applied hazard indicators and vulnerability factors to predict annual drought impact occurrence for different sectors and macro regions in Europe and (2) combines information on past drought impacts, drought hazard indicators, and vulnerability factors into estimates of drought risk at the pan-European scale. This "hybrid approach" bridges the gap between traditional vulnerability assessment and probabilistic impact forecast in a statistical modelling framework. Multivariable logistic regression was applied to predict the likelihood of impact occurrence on an annual basis for particular impact categories and European macro regions. The results indicate sector- and macro region specific sensitivities of hazard indicators, with the Standardised Precipitation Evapotranspiration Index for a twelve month aggregation period (SPEI-12) as the overall best hazard predictor. Vulnerability factors have only limited ability to predict drought impacts as single predictor, with information about landuse and water resources as best vulnerability-based predictors. (3) The application of the "hybrid approach" revealed strong regional (NUTS combo level) and sector specific differences in drought risk across Europe. The majority of best predictor combinations rely on a combination of SPEI for shorter and longer aggregation periods, and a combination of information on landuse and water resources. The added value of integrating regional vulnerability information with drought risk prediction could be proven. Thus, the study contributes to the overall understanding of drivers of drought impacts, current practice of drought indicators selection for specific application, and drought risk assessment.
NASA Astrophysics Data System (ADS)
Blauhut, Veit; Stahl, Kerstin; Stagge, James Howard; Tallaksen, Lena M.; De Stefano, Lucia; Vogt, Jürgen
2016-07-01
Drought is one of the most costly natural hazards in Europe. Due to its complexity, drought risk, meant as the combination of the natural hazard and societal vulnerability, is difficult to define and challenging to detect and predict, as the impacts of drought are very diverse, covering the breadth of socioeconomic and environmental systems. Pan-European maps of drought risk could inform the elaboration of guidelines and policies to address its documented severity and impact across borders. This work tests the capability of commonly applied drought indices and vulnerability factors to predict annual drought impact occurrence for different sectors and macro regions in Europe and combines information on past drought impacts, drought indices, and vulnerability factors into estimates of drought risk at the pan-European scale. This hybrid approach bridges the gap between traditional vulnerability assessment and probabilistic impact prediction in a statistical modelling framework. Multivariable logistic regression was applied to predict the likelihood of impact occurrence on an annual basis for particular impact categories and European macro regions. The results indicate sector- and macro-region-specific sensitivities of drought indices, with the Standardized Precipitation Evapotranspiration Index (SPEI) for a 12-month accumulation period as the overall best hazard predictor. Vulnerability factors have only limited ability to predict drought impacts as single predictors, with information about land use and water resources being the best vulnerability-based predictors. The application of the hybrid approach revealed strong regional and sector-specific differences in drought risk across Europe. The majority of the best predictor combinations rely on a combination of SPEI for shorter and longer accumulation periods, and a combination of information on land use and water resources. The added value of integrating regional vulnerability information with drought risk prediction could be proven. Thus, the study contributes to the overall understanding of drivers of drought impacts, appropriateness of drought indices selection for specific applications, and drought risk assessment.
Defining and Measuring Coastal Vulnerability and Resilience to Natural Hazards
NASA Astrophysics Data System (ADS)
Becker, M. K.; Hoagland, P.
2014-12-01
Accounting for an estimated 23 percent of the world's population, coastal communities face many types of natural hazards. In particular, they may be vulnerable to the effects of tropical cyclones, flooding due to tsunamis or storm surges, erosion, saltwater intrusion, and subsidence. These coastal hazards are further exacerbated by population growth and climate change. There is a lack of consensus in the literature about what constitutes vulnerability (negative impacts) and resilience (recovery from negative impacts) and how to measure these phenomena. While some important work has focused on the long-term effects of coastal hazards on economic growth, little has been done to understand, in quantitative terms, the extent to which coastal communities may be vulnerable to such hazards and, if so, whether they can be resilient. We surveyed nine indicators of human well-being in order to determine their potential suitability as measures of coastal vulnerability or resilience. Some measures, such as the Gross Domestic Product, the Human Development Index, and the Gini coefficient, comprise economic or distributional indicators of human welfare; others, such as the Social Vulnerability Index, are more complex and difficult to interpret. We selected per capita personal income as the most viable indicator, due largely to its simplicity and its availability over several decades. We used it to examine human community vulnerability and resilience to a specific coastal hazard—significant storm surges from major coastal hurricanes—in several US coastal metropolitan areas. We compiled data on per capita personal income from the US Bureau of Economic Analysis for 15 to 20 years prior and subsequent to four major hurricanes: Hugo, which hit the Charleston, South Carolina, metropolitan area in 1989; Bob, Cape Cod, Massachusetts, in 1991; Andrew, Miami, Florida, in 1992; and Opal, Pensacola, Florida, in 1995. Intervention analysis using linear regression suggests that these coastal areas exhibited the full range of possible combinations of vulnerability and resilience.
Consequence reduction : response and recovery
DOT National Transportation Integrated Search
2003-01-01
Because of the September 11, 2001 terrorist attacks, there is a heightened awareness of both the importance and vulnerability of transportation systems and the need for improved emergency response planning. This article reviews the work of the Volpe ...
NINJA: a noninvasive framework for internal computer security hardening
NASA Astrophysics Data System (ADS)
Allen, Thomas G.; Thomson, Steve
2004-07-01
Vulnerabilities are a growing problem in both the commercial and government sector. The latest vulnerability information compiled by CERT/CC, for the year ending Dec. 31, 2002 reported 4129 vulnerabilities representing a 100% increase over the 2001 [1] (the 2003 report has not been published at the time of this writing). It doesn"t take long to realize that the growth rate of vulnerabilities greatly exceeds the rate at which the vulnerabilities can be fixed. It also doesn"t take long to realize that our nation"s networks are growing less secure at an accelerating rate. As organizations become aware of vulnerabilities they may initiate efforts to resolve them, but quickly realize that the size of the remediation project is greater than their current resources can handle. In addition, many IT tools that suggest solutions to the problems in reality only address "some" of the vulnerabilities leaving the organization unsecured and back to square one in searching for solutions. This paper proposes an auditing framework called NINJA (acronym for Network Investigation Notification Joint Architecture) for noninvasive daily scanning/auditing based on common security vulnerabilities that repeatedly occur in a network environment. This framework is used for performing regular audits in order to harden an organizations security infrastructure. The framework is based on the results obtained by the Network Security Assessment Team (NSAT) which emulates adversarial computer network operations for US Air Force organizations. Auditing is the most time consuming factor involved in securing an organization's network infrastructure. The framework discussed in this paper uses existing scripting technologies to maintain a security hardened system at a defined level of performance as specified by the computer security audit team. Mobile agents which were under development at the time of this writing are used at a minimum to improve the noninvasiveness of our scans. In general, noninvasive scans with an adequate framework performed on a daily basis reduce the amount of security work load as well as the timeliness in performing remediation, as verified by the NINJA framework. A vulnerability assessment/auditing architecture based on mobile agent technology is proposed and examined at the end of the article as an enhancement to the current NINJA architecture.
TCGA2BED: extracting, extending, integrating, and querying The Cancer Genome Atlas.
Cumbo, Fabio; Fiscon, Giulia; Ceri, Stefano; Masseroli, Marco; Weitschek, Emanuel
2017-01-03
Data extraction and integration methods are becoming essential to effectively access and take advantage of the huge amounts of heterogeneous genomics and clinical data increasingly available. In this work, we focus on The Cancer Genome Atlas, a comprehensive archive of tumoral data containing the results of high-throughout experiments, mainly Next Generation Sequencing, for more than 30 cancer types. We propose TCGA2BED a software tool to search and retrieve TCGA data, and convert them in the structured BED format for their seamless use and integration. Additionally, it supports the conversion in CSV, GTF, JSON, and XML standard formats. Furthermore, TCGA2BED extends TCGA data with information extracted from other genomic databases (i.e., NCBI Entrez Gene, HGNC, UCSC, and miRBase). We also provide and maintain an automatically updated data repository with publicly available Copy Number Variation, DNA-methylation, DNA-seq, miRNA-seq, and RNA-seq (V1,V2) experimental data of TCGA converted into the BED format, and their associated clinical and biospecimen meta data in attribute-value text format. The availability of the valuable TCGA data in BED format reduces the time spent in taking advantage of them: it is possible to efficiently and effectively deal with huge amounts of cancer genomic data integratively, and to search, retrieve and extend them with additional information. The BED format facilitates the investigators allowing several knowledge discovery analyses on all tumor types in TCGA with the final aim of understanding pathological mechanisms and aiding cancer treatments.
Krenzelok, Edward P; Mrvos, Rita
2009-05-01
In 2007, medication identification requests (MIRs) accounted for 26.2% of all calls to U.S. poison centers. MIRs are documented with minimal information, but they still require an inordinate amount of work by specialists in poison information (SPI). An analysis was undertaken to identify options to reduce the impact of MIRs on both human and financial resources. All MIRs (2003-2007) to a certified regional poison information center were analyzed to determine call patterns and staffing. The data were used to justify an efficient and cost-effective solution. MIRs represented 42.3% of the 2007 call volume. Optimal staffing would require hiring an additional four full-time equivalent SPI. An interactive voice response (IVR) system was developed to respond to the MIRs. The IVR was used to develop the Medication Identification System that allowed the diversion of up to 50% of the MIRs, enhancing surge capacity and allowing specialists to address the more emergent poison exposure calls. This technology is an entirely voice-activated response call management system that collects zip code, age, gender and drug data and stores all responses as .csv files for reporting purposes. The query bank includes the 200 most common MIRs, and the system features text-to-voice synthesis that allows easy modification of the drug identification menu. Callers always have the option of engaging a SPI at any time during the IVR call flow. The IVR is an efficient and effective alternative that creates better staff utilization.
NASA Astrophysics Data System (ADS)
Strigaro, Daniele; Moretti, Massimiliano; Mattavelli, Matteo; Frigerio, Ivan; Amicis, Mattia De; Maggi, Valter
2016-09-01
The aim of this work is to integrate the Minimal Glacier Model in a Geographic Information System Python module in order to obtain spatial simulations of glacier retreat and to assess the future scenarios with a spatial representation. The Minimal Glacier Models are a simple yet effective way of estimating glacier response to climate fluctuations. This module can be useful for the scientific and glaciological community in order to evaluate glacier behavior, driven by climate forcing. The module, called r.glacio.model, is developed in a GRASS GIS (GRASS Development Team, 2016) environment using Python programming language combined with different libraries as GDAL, OGR, CSV, math, etc. The module is applied and validated on the Rutor glacier, a glacier in the south-western region of the Italian Alps. This glacier is very large in size and features rather regular and lively dynamics. The simulation is calibrated by reconstructing the 3-dimensional dynamics flow line and analyzing the difference between the simulated flow line length variations and the observed glacier fronts coming from ortophotos and DEMs. These simulations are driven by the past mass balance record. Afterwards, the future assessment is estimated by using climatic drivers provided by a set of General Circulation Models participating in the Climate Model Inter-comparison Project 5 effort. The approach devised in r.glacio.model can be applied to most alpine glaciers to obtain a first-order spatial representation of glacier behavior under climate change.
Characterizing nonconstant instrumental variance in emerging miniaturized analytical techniques.
Noblitt, Scott D; Berg, Kathleen E; Cate, David M; Henry, Charles S
2016-04-07
Measurement variance is a crucial aspect of quantitative chemical analysis. Variance directly affects important analytical figures of merit, including detection limit, quantitation limit, and confidence intervals. Most reported analyses for emerging analytical techniques implicitly assume constant variance (homoskedasticity) by using unweighted regression calibrations. Despite the assumption of constant variance, it is known that most instruments exhibit heteroskedasticity, where variance changes with signal intensity. Ignoring nonconstant variance results in suboptimal calibrations, invalid uncertainty estimates, and incorrect detection limits. Three techniques where homoskedasticity is often assumed were covered in this work to evaluate if heteroskedasticity had a significant quantitative impact-naked-eye, distance-based detection using paper-based analytical devices (PADs), cathodic stripping voltammetry (CSV) with disposable carbon-ink electrode devices, and microchip electrophoresis (MCE) with conductivity detection. Despite these techniques representing a wide range of chemistries and precision, heteroskedastic behavior was confirmed for each. The general variance forms were analyzed, and recommendations for accounting for nonconstant variance discussed. Monte Carlo simulations of instrument responses were performed to quantify the benefits of weighted regression, and the sensitivity to uncertainty in the variance function was tested. Results show that heteroskedasticity should be considered during development of new techniques; even moderate uncertainty (30%) in the variance function still results in weighted regression outperforming unweighted regressions. We recommend utilizing the power model of variance because it is easy to apply, requires little additional experimentation, and produces higher-precision results and more reliable uncertainty estimates than assuming homoskedasticity. Copyright © 2016 Elsevier B.V. All rights reserved.
Extreme Goal Setting and Vulnerability to Mania Among Undiagnosed Young Adults
Carver, Charles S.
2010-01-01
During euthymia people with bipolar disorder and their unaffected family members accomplish more than the general population. People with bipolar disorder, or those who are at risk for it, also set higher goals in laboratory tasks than other people. The work reported here examines whether persons vulnerable to mania set elevated goals in their lives. In two studies, a measure of lifetime vulnerability to mania was related to traits bearing on incentive sensitivity, and also to endorsement of high ambitions for fame, wealth, and political influence (assessed by a new measure). Relations were weaker to ambitions for other kinds of extreme goals. The effects were independent of current symptoms of mania and depression and lifetime depression. There was also evidence that incentive sensitivity and elevated aspirations made independent contributions to variance in the measure of manic risk. Discussion focuses on the implications of high goal setting for understanding goal dysregulation and mania. PMID:20198117
Joiner, T E
1995-05-01
The hypothesis that people who seek and receive negative feedback are vulnerable to increases in depressed symptoms was tested among 100 undergraduates and their roommates. Students and roommates completed questionnaires on their views of each other and on their own levels of negative feedback seeking, depressed and anxious symptoms, negative and positive affect, and self-esteem. Three weeks later, students and roommates completed the same questionnaires. Results were, in general, consistent with prediction. Students who reported an interest in their roommates' negative feedback and who lived with a roommate who viewed them negatively were at heightened risk for increases in depressed symptoms. These results could not be explained in terms of the variables' relations to trait self-esteem. The symptom specificity of the effect was moderately supported. Implications for work on interpersonal vulnerability to depression are discussed.
Orellana, E. Roberto; Alva, Isaac E.; Cárcamo, Cesar P.; García, Patricia J.
2015-01-01
We examined structural factors—social, political, economic, and environmental—that increase vulnerability to HIV among indigenous people in the Peruvian Amazon. Indigenous adults belonging to 12 different ethnic groups were purposively recruited in four Amazonian river ports and 16 indigenous villages. Qualitative data revealed a complex set of structural factors that give rise to environments of risk where health is constantly challenged. Ferryboats that cross Amazonian rivers are settings where unprotected sex—including transactional sex between passengers and boat crew and commercial sex work—often take place. Population mobility and mixing also occurs in settings like the river docks, mining sites, and other resource extraction camps, where heavy drinking and unprotected sex work are common. Multilevel, combination prevention strategies that integrate empirically based interventions with indigenous knowledge are urgently needed, not only to reduce vulnerability to HIV transmission, but also to eliminate the structural determinants of indigenous people’s health. PMID:23925407
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
1994-09-01
This report provides the input to and results of the Department of Energy (DOE) - Oak Ridge Operations (ORO) DOE Plutonium Environment, Safety and Health (ES & H) Vulnerability Assessment (VA) self-assessment performed by the Site Assessment Team (SAT) for the Oak Ridge National Laboratory (ORNL or X-10) and the Oak Ridge Y-12 Plant (Y-12) sites that are managed by Martin Marietta Energy Systems, Inc. (MMES). As initiated (March 15, 1994) by the Secretary of Energy, the objective of the VA is to identify and rank-order DOE-ES&H vulnerabilities associated for the purpose of decision making on the interim safe managementmore » and ultimate disposition of fissile materials. This assessment is directed at plutonium and other co-located transuranics in various forms.« less
[Nurses' autonomy and vulnerability in the Nursing Assistance Systematization practice].
Menezes, Silvia Regina Tamae; Priel, Margareth Rose; Pereira, Luciane Lucio
2011-08-01
The objective of this study was to recognize the autonomy and vulnerability of nurses in the implementation of the Sistema da Assistência de Enfermagem (SAE) Nursing Care System through an integrative literature review, using content analysis. A survey was conducted, and 40 articles published between 1998 and 2008 were selected based on their relevance. Results showed two main categories of meaning: Benefits associated to the SAE practice (to patients, to the profession and to the institution) and Determinants for the Implementation of SAE (nurse's competence, training and education, record-instruments, infrastructure and collective sharing-construction). From the integration of the two categories, the highlights were the autonomy in acting with freedom and responsibility, science-based decision-making, and being valued for their social work, as well as the vulnerability expressed by interpersonal relationships, the wear generated by professional stress and the risk inherent to the service.
Hankin, Benjamin L.; Oppenheimer, Caroline; Jenness, Jessica; Barrocas, Andreas; Shapero, Benjamin G.; Goldband, Jessica
2011-01-01
Cognitive theories of depression have been shown to be potent predictors of future increases in depressive symptoms and disorder in children, adolescents, and adults. This article focuses on potential developmental origins of the main cognitive vulnerabilities, including dysfunctional attitudes, negative cognitive style, and rumination. We selectively review processes and factors that have been hypothesized to contribute to the emergence and stabilization of these cognitive risk factors. This review focuses on genetic factors, temperament, parents and peers as salient interpersonal influences, and stressful life events. We end with suggestions for future theory development and research. In particular, we emphasize the need for additional conceptual and empirical work integrating these disparate processes together into a coherent, developmental psychopathological model, and we highlight the coexistence of both stability and change in the development of cognitive vulnerabilities to depression across the lifespan. PMID:19827008
NASA Astrophysics Data System (ADS)
Zaborowicz, M.; Przybył, J.; Koszela, K.; Boniecki, P.; Mueller, W.; Raba, B.; Lewicki, A.; Przybył, K.
2014-04-01
The aim of the project was to make the software which on the basis on image of greenhouse tomato allows for the extraction of its characteristics. Data gathered during the image analysis and processing were used to build learning sets of artificial neural networks. Program enables to process pictures in jpeg format, acquisition of statistical information of the picture and export them to an external file. Produced software is intended to batch analyze collected research material and obtained information saved as a csv file. Program allows for analysis of 33 independent parameters implicitly to describe tested image. The application is dedicated to processing and image analysis of greenhouse tomatoes. The program can be used for analysis of other fruits and vegetables of a spherical shape.
Database Performance Monitoring for the Photovoltaic Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Klise, Katherine A.
The Database Performance Monitoring (DPM) software (copyright in processes) is being developed at Sandia National Laboratories to perform quality control analysis on time series data. The software loads time indexed databases (currently csv format), performs a series of quality control tests defined by the user, and creates reports which include summary statistics, tables, and graphics. DPM can be setup to run on an automated schedule defined by the user. For example, the software can be run once per day to analyze data collected on the previous day. HTML formatted reports can be sent via email or hosted on a website.more » To compare performance of several databases, summary statistics and graphics can be gathered in a dashboard view which links to detailed reporting information for each database. The software can be customized for specific applications.« less
Luckey, T D
2008-01-01
Media reports of deaths and devastation produced by atomic bombs convinced people around the world that all ionizing radiation is harmful. This concentrated attention on fear of miniscule doses of radiation. Soon the linear no threshold (LNT) paradigm was converted into laws. Scientifically valid information about the health benefits from low dose irradiation was ignored. Here are studies which show increased health in Japanese survivors of atomic bombs. Parameters include decreased mutation, leukemia and solid tissue cancer mortality rates, and increased average lifespan. Each study exhibits a threshold that repudiates the LNT dogma. The average threshold for acute exposures to atomic bombs is about 100 cSv. Conclusions from these studies of atomic bomb survivors are: One burst of low dose irradiation elicits a lifetime of improved health.Improved health from low dose irradiation negates the LNT paradigm.Effective triage should include radiation hormesis for survivor treatment.
Hutchinson, Nancy L; Versnel, Joan; Poth, Cheryl; Berg, Derek; deLugt, Jenn; Dalton, C J; Chin, Peter; Munby, Hugh
2011-01-01
This paper describes and compares exemplary work-based education (WBE) programs in Ontario Canada designed to meet the needs of two groups of vulnerable youth - at-risk youth and youth with severe disabilities. Two focus group interviews were held, one with professionals from exemplary programs designed to meet the needs of at-risk youth and one with professionals from exemplary programs for youth with severe disabilities. Standard qualitative analyses were conducted on each focus group transcript to generate themes which were subsequently grouped into larger patterns. Then cross-case analyses identified consistencies and unique features within the two types of WBE programs. Two major patterns that characterize the WBE programs emerged from the analyses: the first pattern described the programmatic approaches to WBE appropriate for each type of type of student (which included themes such as the need for an alternative learning environment for at-risk youth), and the second pattern highlighted the rationale for each kind of program (which included themes like ensuring equity for youth with severe disabilities). The findings suggest that schools should continue to provide distinct WBE programs for each of these groups of vulnerable youth - at-risk youth and youth with severe disabilities.
Shefer, Tamara; Kruger, Lou-Marie; Schepers, Yeshe
2015-01-01
South Africa has seen a rapid increase in scholarship and programmatic interventions focusing on gender and sexuality, and more recently on boys, men and masculinities. In this paper, we argue that a deterministic discourse on men's sexuality and masculinity in general is inherent in many current understandings of adolescent male sexuality, which tend to assume that young women are vulnerable and powerless and young men are sexually powerful and inevitably also the perpetrators of sexual violence. Framed within a feminist, social constructionist the oretical perspective, the current research looked at how the masculinity and sexuality of South African young men is constructed, challenged or maintained. Focus groups were conducted with young men between the ages of 15 and 20 years from five different schools in two regions of South Africa, the Western and Eastern Cape. Data were analysed using Gilligan's listening guide method. Findings suggest that participants in this study have internalised the notion of themselves as dangerous, but were also exploring other possible ways of being male and being sexual, demonstrating more complex experiences of manhood. We argue for the importance of documenting and highlighting the precariousness, vulnerability and uncertainty of young men in scholarly and programmatic work on masculinities.
Empowering sex workers in India to reduce vulnerability to HIV and sexually transmitted diseases⋆
Swendeman, Dallas; Basu, Ishika; Das, Sankari; Jana, Smarajit; Rotheram-Borus, Mary Jane
2010-01-01
The Sonagachi Project was initiated in Kolkata, India in 1992 as a STD/HIV intervention for sex workers. The project evolved to adopt strategies common to women’s empowerment programs globally (i.e., community mobilization, rights-based framing, advocacy, micro-finance) to address common factors that support effective, evidence-based HIV/STD prevention. The Sonagachi model is now a broadly diffused evidence-based empowerment program. We previously demonstrated significant condom use increases among female sex workers in a 16 month replication trial of the Sonagachi empowerment intervention (n = 110) compared to a control community (n = 106) receiving standard care of STD clinic, condom promotion, and peer education in two randomly assigned rural towns in West Bengal, India (Basu et al., 2004). This article examines the intervention’s impacts on 21 measured variables reflecting five common factors of effective HIV/STD prevention programs to estimate the impact of empowerment strategies on HIV/STD prevention program goals. The intervention which was conducted in 2000–2001 significantly: 1) improved knowledge of STDs and condom protection from STD and HIV, and maintained STD/HIV risk perceptions despite treatment; 2) provided a frame to motivate change based on reframing sex work as valid work, increasing disclosure of profession, and instilling a hopeful future orientation reflected in desire for more education or training; 3) improved skills in sexual and workplace negotiations reflected in increased refusal, condom decision-making, and ability to change work contract, but not ability to take leave; 4) built social support by increasing social interactions outside work, social function participation, and helping other sex workers; and 5) addressed environmental barriers of economic vulnerabilities by increasing savings and alternative income, but not working in other locations, nor reduced loan taking, and did not increase voting to build social capital. This study’s results demonstrate that, compared to narrowcast clinical and prevention services alone, empowerment strategies can significantly impact a broader range of factors to reduce vulnerability to HIV/STDs. PMID:19716639
Empowering sex workers in India to reduce vulnerability to HIV and sexually transmitted diseases.
Swendeman, Dallas; Basu, Ishika; Das, Sankari; Jana, Smarajit; Rotheram-Borus, Mary Jane
2009-10-01
The Sonagachi Project was initiated in Kolkata, India in 1992 as a STD/HIV intervention for sex workers. The project evolved to adopt strategies common to women's empowerment programs globally (i.e., community mobilization, rights-based framing, advocacy, micro-finance) to address common factors that support effective, evidence-based HIV/STD prevention. The Sonagachi model is now a broadly diffused evidence-based empowerment program. We previously demonstrated significant condom use increases among female sex workers in a 16 month replication trial of the Sonagachi empowerment intervention (n=110) compared to a control community (n=106) receiving standard care of STD clinic, condom promotion, and peer education in two randomly assigned rural towns in West Bengal, India (Basu et al., 2004). This article examines the intervention's impacts on 21 measured variables reflecting five common factors of effective HIV/STD prevention programs to estimate the impact of empowerment strategies on HIV/STD prevention program goals. The intervention which was conducted in 2000-2001 significantly: 1) improved knowledge of STDs and condom protection from STD and HIV, and maintained STD/HIV risk perceptions despite treatment; 2) provided a frame to motivate change based on reframing sex work as valid work, increasing disclosure of profession, and instilling a hopeful future orientation reflected in desire for more education or training; 3) improved skills in sexual and workplace negotiations reflected in increased refusal, condom decision-making, and ability to change work contract, but not ability to take leave; 4) built social support by increasing social interactions outside work, social function participation, and helping other sex workers; and 5) addressed environmental barriers of economic vulnerabilities by increasing savings and alternative income, but not working in other locations, nor reduced loan taking, and did not increase voting to build social capital. This study's results demonstrate that, compared to narrowcast clinical and prevention services alone, empowerment strategies can significantly impact a broader range of factors to reduce vulnerability to HIV/STDs.
ERIC Educational Resources Information Center
Topuzova, Lazarina N.
2009-01-01
Because child welfare workers serve the most vulnerable children and families, it is necessary that they have sufficient knowledge, skills, and values (competencies) to provide quality services. This study focuses on competencies that the Division of Child and Family Services, Utah (DCFS) views as essential for entry-level child welfare work, and…
ERIC Educational Resources Information Center
Sampson, Carrie R.
2017-01-01
Community-based organizations have long influenced education reforms, and urban areas are especially vulnerable to community work that transcends racial and economic boundaries. The purpose of this study is to explore how The League of Women Voters of Las Vegas Valley, a mostly White, middle-upper-class women's organization, worked to pursue one…
ERIC Educational Resources Information Center
Annie E. Casey Foundation, 2005
2005-01-01
This essay, taken from the 2005 KIDS COUNT Data Book, examines four employment barriers that policymakers and others consider among the most difficult to overcome: substance abuse, domestic violence, a history of incarceration, and depression. These burdens can diminish a person's motivation and ability to find work. Furthermore, they can make it…
ERIC Educational Resources Information Center
Shin, Junseob
2011-01-01
This study investigated the prevalence of client violence toward child protection workers and its negative impacts on the work attitudes of those workers compared with community service workers in South Korea. This study is based on the assumption that child protection workers are more vulnerable to violence than are community service workers…
ERIC Educational Resources Information Center
Midgley, Nick
2008-01-01
This is an edited version of a recent interview with Annette Mendelsohn, Child and Adolescent Psychotherapist at the Royal Free Hospital, London, UK. It aims to make available in published form Mendelsohn's thinking and approach in relation to her work with traumatised children in a hospital setting. Mendelsohn also discusses her work in a…
A Preliminary Tsunami Vulnerability Analysis for Yenikapi Region in Istanbul
NASA Astrophysics Data System (ADS)
Ceren Cankaya, Zeynep; Suzen, Lutfi; Cevdet Yalciner, Ahmet; Kolat, Cagil; Aytore, Betul; Zaytsev, Andrey
2015-04-01
One of the main requirements during post disaster recovery operations is to maintain proper transportation and fluent communication at the disaster areas. Ports and harbors are the main transportation hubs which must work with proper performance at all times especially after the disasters. Resilience of coastal utilities after earthquakes and tsunamis have major importance for efficient and proper rescue and recovery operations soon after the disasters. Istanbul is a mega city with its various coastal utilities located at the north coast of the Sea of Marmara. At Yenikapi region of Istanbul, there are critical coastal utilities and vulnerable coastal structures and critical activities occur daily. Fishery ports, commercial ports, small craft harbors, passenger terminals of intercity maritime transportation, water front commercial and/or recreational structures are some of the examples of coastal utilization which are vulnerable against marine disasters. Therefore their vulnerability under tsunami or any other marine hazard to Yenikapi region of Istanbul is an important issue. In this study, a methodology of vulnerability analysis under tsunami attack is proposed with the applications to Yenikapi region. In the study, high resolution (1m) GIS database of Istanbul Metropolitan Municipality (IMM) is used and analyzed by using GIS implementation. The bathymetry and topography database and the vector dataset containing all buildings/structures/infrastructures in the study area are obtained for tsunami numerical modeling for the study area. GIS based tsunami vulnerability assessment is conducted by applying the Multi-criteria Decision Making Analysis (MCDA). The tsunami parameters from deterministically defined worst case scenarios are computed from the simulations using tsunami numerical model NAMI DANCE. The vulnerability parameters in the region due to two different classifications i) vulnerability of buildings/structures and ii) vulnerability of (human) evacuation are defined and scored. The risk level is computed using tsunami intensity (level of flow depth from simulations) and vulnerability (structural and human-based) at each node in Yenikapi. The results are presented at high resolution (1m) and discussed. Acknowledgements: Partial support by EU 603839 ASTARTE Project, UDAP-C-12-14 of AFAD of Turkey, 108Y227 and 113M556 of TUBITAK Turkey, RAPSODI (CONCERT_Dis-021) of CONCERT-Japan Joint Call, 2011K140210 of DPT, Istanbul Metropolitan Municipality, Japan-Turkey Joint Research Project by JICA on earthquakes and tsunamis in Marmara Region by SATREPS are acknowledged.
Luguetti, Carla; Oliver, Kimberly L; Dantas, Luiz Eduardo Pinto Basto Tourinho; Kirk, David
2017-03-01
This study was a 2-phase activist research project aimed at co-creating a prototype pedagogical model for working with youth from socially vulnerable backgrounds in a sport context. This article addresses the learning aspirations (learning outcomes) that emerged when we created spaces for youth to develop strategies to manage the risks they face in their community. This study took place in a socially and economically disadvantaged neighborhood in a Brazilian city where we worked with a group of 17 boys aged 13 to 15 years old, 4 coaches, a pedagogic coordinator, and a social worker. During a 6-month period, we collected multiple sources of data including field journal entries/observations (38) and audio records of youth work sessions (18), coaches' work sessions (16), combined coaches and youth work sessions (3), and meetings between the lead and the 2nd author for debriefing and planning sessions (36). By using an activist approach, 4 learning aspirations emerged: becoming responsible/committed, learning from mistakes, valuing each other's knowledge, and communicating with others. Findings suggest there is a need for more sports programs that start from young people's concrete needs and life situations and look to create places for youth to see alternative possibilities and take action.
Kauffman, L.J.; Chapelle, F.H.
2010-01-01
A process-based methodology was used to compare the vulnerability of public supply wells tapping seven study areas in four hydrologically distinct regional aquifers to volatile organic compound (VOC) contamination. This method considers (1) contributing areas and travel times of groundwater flowpaths converging at individual supply wells, (2) the oxic and/or anoxic conditions encountered along each flowpath, and (3) the combined effects of hydrodynamic dispersion and contaminant- and oxic/anoxic-specific biodegradation. Contributing areas and travel times were assessed using particle tracks generated from calibrated regional groundwater flow models. These results were then used to estimate VOC concentrations relative to an unspecified initial concentration (C/C0) at individual public supply wells. The results show that the vulnerability of public supply wells to VOC contamination varies widely between different regional aquifers. Low-recharge rates, long travel times, and the predominantly oxic conditions characteristic of Basin and Range aquifers in the western United States leads to lower vulnerability to VOCs, particularly to petroleum hydrocarbons such as benzene and toluene. On the other hand, high recharge rates and short residence times characteristic of the glacial aquifers of the eastern United States leads to greater vulnerability to VOCs. These differences lead to distinct patterns of C/C0 values estimated for public supply wells characteristic of each aquifer, information that can be used by resource managers to develop monitoring plans based on relative vulnerability, to locate new public supply wells, or to make land-use management decisions. Journal compilation ?? 2010 National Ground Water Association. No claim to original US government works.
Duguy, Beatriz; Alloza, José Antonio; Baeza, M Jaime; De la Riva, Juan; Echeverría, Maite; Ibarra, Paloma; Llovet, Juan; Cabello, Fernando Pérez; Rovira, Pere; Vallejo, Ramon V
2012-12-01
Forest fires represent a major driver of change at the ecosystem and landscape levels in the Mediterranean region. Environmental features and vegetation are key factors to estimate the ecological vulnerability to fire; defined as the degree to which an ecosystem is susceptible to, and unable to cope with, adverse effects of fire (provided a fire occurs). Given the predicted climatic changes for the region, it is urgent to validate spatially explicit tools for assessing this vulnerability in order to support the design of new fire prevention and restoration strategies. This work presents an innovative GIS-based modelling approach to evaluate the ecological vulnerability to fire of an ecosystem, considering its main components (soil and vegetation) and different time scales. The evaluation was structured in three stages: short-term (focussed on soil degradation risk), medium-term (focussed on changes in vegetation), and coupling of the short- and medium-term vulnerabilities. The model was implemented in two regions: Aragón (inland North-eastern Spain) and Valencia (eastern Spain). Maps of the ecological vulnerability to fire were produced at a regional scale. We partially validated the model in a study site combining two complementary approaches that focused on testing the adequacy of model's predictions in three ecosystems, all very common in fire-prone landscapes of eastern Spain: two shrublands and a pine forest. Both approaches were based on the comparison of model's predictions with values of NDVI (Normalized Difference Vegetation Index), which is considered a good proxy for green biomass. Both methods showed that the model's performance is satisfactory when applied to the three selected vegetation types.
[A anthropological critique of the ethic of care].
Bertrand, Aliénor
2011-03-01
This article is a critique of the anthropology of vulnerability and of the needs on which the ethics of care are based. Firstly, this critique confronts the universal postulate of the anthropology of vulnerability to the history of the anthropology of illness. The latter manages to build up a specific disciplinary field in refusing the supervision of the medical sciences and the implicit principle to consider illness as an universal fact. The paper refers to the anthropology of nature and Philippe Descola's work in order to develop a comparative study of the systems of representations, including the naturalism of biomedicine as a model among others. It then presents the descriptions of the representations of vulnerability and the needs which are linked to the four main ontologies defined by anthropology of nature, animism, totemism, analogy and naturalism, and gives a new light to the anthropology on which the ethics of care rest. That anthropology of vulnerability could be an involuntary factor in order to make societies conform to an hygienic constraint. The ethics of care would therefore benefit greatly in freeing themselves from anthropology of vulnerability and focus on their original contextualism; in particular, they would benefit of the knowledge of the limits of naturalism at their basis. It will also allow them to provide a new tool for engineering social transformations in a time, the beginning of XXI century, when cultures happen to mix.
Camden, New Jersey Uses Green Infrastructure to Manage Stormwater
Working with the EPA, CCMUA used the Climate Ready Evaluation and Awareness Tool (CREAT) to gain greater appreciation of the magnitude of its Combined Sewer Overflow (CSO) and other vulnerabilities and identify potential adaptation strategies.
Adolescent female sex workers: invisibility, violence and HIV.
Silverman, Jay G
2011-05-01
A large number of female sex workers are children. Multiple studies demonstrate that up to 40% of women in prostitution started this work prior to age 18. In studies across India, Nepal, Thailand and Canada, young age at entry to sex work has been found to heighten vulnerability to physical and sexual violence victimisation in the context of prostitution, and relates to a two to fourfold increase in HIV infection. Although HIV risk reduction among adult female sex workers has been a major focus of HIV prevention efforts across the globe, no public health interventions, to date, have addressed the increased hazards and HIV risk faced by adolescent female sex workers. Beyond the structural barriers that limit access to this vulnerable group, historical tensions between HIV prevention and child protection agencies must be overcome in order to develop effective strategies to address this large scale yet little recognised human rights and HIV-related crisis.
Cohen, Alison
2013-01-01
Policy decisions regarding the quality of the physical school environment—both, school siting and school facility planning policies—are often considered through the lens of environmental planning, public health, or education policy, but rarely through all three. Environmental planners consider environmental justice issues on a local level and/or consider the regional impact of a school. Public health professionals focus on toxic exposures and populations particularly vulnerable to negative health outcomes. Educators and education policymakers emphasize investing in human capital of both students and staff. By understanding these respective angles and combining these efforts around the common goals of achieving adequacy and excellence, we can work towards a regulatory system for school facilities that recognizes children as a uniquely vulnerable population and seeks to create healthier school environments in which children can learn and adults can work. PMID:20359991
Stability Training for Convolutional Neural Nets in LArTPC
NASA Astrophysics Data System (ADS)
Lindsay, Matt; Wongjirad, Taritree
2017-01-01
Convolutional Neural Nets (CNNs) are the state of the art for many problems in computer vision and are a promising method for classifying interactions in Liquid Argon Time Projection Chambers (LArTPCs) used in neutrino oscillation experiments. Despite the good performance of CNN's, they are not without drawbacks, chief among them is vulnerability to noise and small perturbations to the input. One solution to this problem is a modification to the learning process called Stability Training developed by Zheng et al. We verify existing work and demonstrate volatility caused by simple Gaussian noise and also that the volatility can be nearly eliminated with Stability Training. We then go further and show that a traditional CNN is also vulnerable to realistic experimental noise and that a stability trained CNN remains accurate despite noise. This further adds to the optimism for CNNs for work in LArTPCs and other applications.
NASA Astrophysics Data System (ADS)
Bird, Neil; Benabdallah, Sihem; Gouda, Nadine; Hummel, Franz; La Jeunesse, Isabelle; Meyer, Swen; Soddu, Antonino; Woess-Gallasch, Susanne
2014-05-01
A work package in the FP-7 funded CLIMB Project - Climate Induced Changes on the Hydrology of Mediterranean Basins Reducing Uncertainty and Quantifying Risk through an Integrated Monitoring and Modeling System had the goal of assessing socioeconomic vulnerability in two super-sites in future climates (2040-2070). The work package had deliverables to describe of agricultural adaptation measures appropriate to each site under future water availability scenarios and assess the risk of income losses due to water shortages in agriculture. The FAO model AQUACROP was used to estimate losses of agricultural productivity and indicate possible adaptation strategies. The presentation will focus on two interesting crops which show extreme vulnerability to expected changes in climate; irrigated lettuce in Sardinia and irrigated tomatoes in Tunisia. Modelling methodology, results and possible adaptation strategies will be presented.
The experience of demanding work environments in younger workers.
Winding, T N; Labriola, M; Nohr, E A; Andersen, J H
2015-06-01
Investigating whether certain individual or background characteristics are associated with an increased risk of experiencing an excessively demanding work environment in younger workers may help to reduce future inequality in health and maximize their labour market participation. To describe the work environment of Danish 20- to 21-year olds and to investigate the influence of family socioeconomic background and individual characteristics at age 14-15 on later experience of physical and psychosocial work environments. We obtained information on subjects' school performance, vulnerability, health and parental socioeconomic status from registers and a questionnaire completed in 2004. A questionnaire concerning eight measures of subjects' psychosocial and physical work environment in 2010 was used to determine the outcomes of interest. The study population consisted of 679 younger workers aged 20-21. The psychosocial work environment was in general good but younger workers experienced more demanding physical work than the general working population. Overall, individual as well as family factors had a limited impact on their assessment of the work environment. Low self-esteem at age 14-15 was associated with experiencing high demands and lack of trust and fairness at work, whereas low parental socioeconomic status was associated with a demanding physical work environment. This study showed a social gradient in experiencing a demanding physical work environment at age 20-21. The psychosocial work environment experienced by younger workers was generally good, but vulnerable young people may need special attention to protect them from or prepare them for psychosocially demanding jobs later in life. © The Author 2015. Published by Oxford University Press on behalf of the Society of Occupational Medicine. All rights reserved. For Permissions, please email: journals.permissions@oup.com.
Vulnerability of the Built Environment to Tsunamis - an Overview of Where We Are in 2012
NASA Astrophysics Data System (ADS)
Petroff, C. M.
2012-12-01
The last twenty years have seen great strides in the understanding and prediction of tsunami behavior. Though study of these disasters has always been motivated by the need to reduce casualties and damage, early work focused primarily on predicting magnitude, propagation and inundation from tsunami waves. Investigations have expanded to include a burgeoning field concentrated on the landward effects of tsunamis on communities: examining building and infrastructure vulnerability, assessing the probabilities of varying levels of damage and applying these findings to planning of land-use, development, evacuation and response. Catastrophic events of the last decade in the Indian Ocean and Japan have brought these issues to the fore and raise the question: Where are we in our understanding of vulnerability to tsunamis? What have we learned? What are the lessons that the most recent events teach us? This overview summarizes recent investigations of the vulnerability of engineered structures to damage from tsunamis - from individual buildings of various uses to larger facilities and structural systems. Examples are provided of both successes and failures in design for tsunami resistance. Vulnerability of critical infrastructure and lifelines is discussed in the context of tsunamis in Sumatra, Chile and Japan. This includes the ability of critical systems to function during and immediately after a disaster as well as the short and long term resilience of utilities, services and coastal facilities after tsunamis. Recent work on probabilistic prediction of damage and development of fragility functions is summarized for the Chile 2010 and Japan 2011 tsunamis. Finally, a commentary is presented on building vulnerability issues as they relate to land use planning, building design and codes and vertical evacuation planning.; Three views of the Oya Train Station in Miyagi Prefecture: Prior to (top), two months after (middle), and one year after (bottom) the March 11, 2011 Tohoku Japan tsunami. The top view shows the rail line, shops, residences, coastal vegetation, tourist beach and coastal slope protection. All these were damaged or destroyed in the tsunami. One year after, a sand bag barrier had been installed inland of remaining low profile shore protection at Oya Kaigan. Rail lines had not been replaced and the station building remained closed. The area remained evacuated. Power line installation and road repairs were complete. (top photo courtesy F. Imamura)
A rainfall risk analysis thanks to an GIS based estimation of urban vulnerability
NASA Astrophysics Data System (ADS)
Renard, Florent; Pierre-Marie, Chapon
2010-05-01
The urban community of Lyon, situated in France in the north of the Rhône valley, comprises 1.2 million inhabitants within 515 km ². With such a concentration of issues, policy makers and local elected officials therefore attach great importance to the management of hydrological risks, particularly due to the inherent characteristics of the territory. If the hazards associated with these risks in the territory of Lyon have been the subject of numerous analyses, studies on the vulnerability of greater Lyon are rare and have common shortcomings that impair their validity. We recall that the risk is seen as the classic relationship between the probability of occurrence of hazards and vulnerability. In this article, this vulnerability will be composed of two parts. The first one is the sensitivity of the stakes facing hydrological hazards as urban runoff, that is to say, their propensity to suffer damage during a flood (Gleize and Reghezza, 2007). The second factor is their relative importance in the functioning of the community. Indeed, not all the stakes could provide the same role and contribution to the Greater Lyon. For example, damage to the urban furniture such as bus shelter seems less harmful to the activities of the urban area than that of transport infrastructure (Renard and Chapon, 2010). This communication proposes to assess the vulnerability of Lyon urban area facing to hydrological hazards. This territory is composed of human, environmental and material stakes. The first part of this work is to identify all these issues so as to completeness. Then, is it required to build a "vulnerability index" (Tixier et al, 2006). Thus, it is necessary to use methods of multicriteria decision aid to evaluate the two components of vulnerability: the sensitivity and the contribution to the functioning of the community. Finally, the results of the overall vulnerability are presented, and then coupled to various hazards related to water such as runoff associated with heavy rains, to locate areas of risk in the urban area. The targets that share the same rank of this vulnerability index do not possess the same importance, or the same sensitivity to the flood hazard. Therefore, the second part of this work is to define the priorities and sensitivities of different targets based on the judgments of experts. Multicriteria decision methods are used to prioritize elements and are therefore adapted to the modelling of the sensitivity of the issues of greater Lyon (Griot, 2008). The purpose of these methods is the assessment of priorities between the different components of the situation. Thomas Saaty's analytic hierarchy process (1980) is the most frequently used because of its many advantages. On this basis, the formal calculations of priorities and sensitivities of the elements have been conducted. These calculations are based on the judgments of experts. Indeed, during semi-structured interview, the 38 experts in our sample delivered a verdict on issues that seem relatively more important than others by binary comparison. They carry the same manner to determine sensitivity's stakes to hazard flooding. Finally, the consistency of answers given by experts is validated by calculating a ratio of coherence, and their results are aggregated to provide functions of priority (based on the relative importance of each stakes), and functions of sensitivity (based on the relative sensitivity of each stakes). From these functions of priority and sensitivity is obtained the general function of vulnerability. The vulnerability functions allow defining the importance of the stakes of Greater Lyon and their sensitivity to hydrological hazards. The global vulnerability function is obtained from sensitivity and priority functions and shows the great importance of human issues (75 %). The vulnerability factor of environmental targets represents 12 % of the global vulnerability function, as much as the materials issues. However, it can be seen that the environmental and material stakes do not represent the same weight into the priority and sensitivity functions. Indeed, the environmental issues seem more important than the material ones (17 % for the environmental stakes whereas only 5 % for the material stakes in the priority function), but less sensitive to an hydrological hazard (6 % for the environmental issues while 20 % for the material issues in the sensitivity function). Similarly, priority functions and sensitivity are established for all stakes at all levels. The stakes are then converted into a mesh form (100 meters wide). This will standardize the collection framework and the heterogeneous nature of data to allow their comparison. Finally, it is obtained a detailed, consistent and objective vulnerability of the territory of Greater Lyon. At the end, to get a direct reading of risk, combination of hazard and vulnerability, it is overlaid the two maps.
Hwahng, Sel Julian; Nuttbrock, Larry
2008-01-01
This article describes 3 distinct ethnocultural male-to-female transgender communities in New York City: the low-income African American/Black1 and Latina(o) House Ball community; low-income, often undocumented immigrant Asian sex workers; and middle-class White cross-dressers. These communities are highly socially isolated from each other and are more connected to their ethnocultural contexts than to an abstract and shared transgender identity. Whereas previous research either has viewed male-to-female transgender people as one monolithic group or has separated them into abstract racial categories unconnected to their communities and lifestyles, this article positions them within specific social networks, cultures, neighborhoods, and lifestyles. With regard to HIV vulnerabilities, violence, and rape, House Ball community members seemed to engage in the riskiest form of survival sex work, whereas Asian sex workers seemed to engage in moderate-risk survival sex work. White cross-dressers seemed to engage in very low-risk recreational sex work.2 PMID:19079558
Aging and the Vulnerability of Speech to Dual Task Demands
Kemper, Susan; Schmalzried, RaLynn; Hoffman, Lesa; Herman, Ruth
2010-01-01
Tracking a digital pursuit rotor task was used to measure dual task costs of language production by young and older adults. Tracking performance by both groups was affected by dual task demands: time on target declined and tracking error increased as dual task demands increased from the baseline condition to a moderately demanding dual task condition to a more demanding dual task condition. When dual task demands were moderate, older adults’ speech rate declined but their fluency, grammatical complexity, and content were unaffected. When the dual task was more demanding, older adults’ speech, like young adults’ speech, became highly fragmented, ungrammatical, and incoherent. Vocabulary, working memory, processing speed, and inhibition affected vulnerability to dual task costs: vocabulary provided some protection for sentence length and grammaticality, working memory conferred some protection for grammatical complexity, and processing speed provided some protection for speech rate, propositional density, coherence, and lexical diversity. Further, vocabulary and working memory capacity provided more protection for older adults than for young adults although the protective effect of processing speed was somewhat reduced for older adults as compared to the young adults. PMID:21186917
NASA Astrophysics Data System (ADS)
Ford, James D.; Pearce, Tristan
2010-01-01
This letter systematically reviews and synthesizes scientific and gray literature publications (n = 420) to identify and characterize the nature of climate change vulnerability in the Inuvialuit Settlement Region of the western Canadian Arctic and identify gaps in understanding. The literature documents widespread evidence of climate change, with implications for human and biophysical systems. Adaptations are being employed to manage changing conditions and are indicative of a high adaptive capacity. However, barriers to adaptation are evident and are expected to constrain adaptive capacity to future climate change. Continued climate change is predicted for the region, with differential exposure sensitivity for communities, groups and sectors: a function of social-economic-biophysical characteristics and projected future climatic conditions. Existing climate risks are expected to increase in magnitude and frequency, although the interaction between projected changes and socio-economic-demographic trends has not been assessed. The capacity for adapting to future climate change has also not been studied. The review identifies the importance of targeted vulnerability research that works closely with community members and other stakeholders to address research needs. Importantly, the fully categorized list of reviewed references accompanying this letter will be a valuable resource for those working or planning to work in the region, capturing climate change research published since 1990. At a broader level, the systematic review methodology offers a promising tool for climate/environmental change studies in general where there is a large and emerging body of research but limited understanding of research gaps and needs.
NASA Technical Reports Server (NTRS)
Valdivia, Roberto O.; Antle, John M.; Rosenzweig, Cynthia; Ruane, Alexander C.; Vervoort, Joost; Ashfaq, Muhammad; Hathie, Ibrahima; Tui, Sabine Homann-Kee; Mulwa, Richard; Nhemachena, Charles;
2015-01-01
The global change research community has recognized that new pathway and scenario concepts are needed to implement impact and vulnerability assessment where precise prediction is not possible, and also that these scenarios need to be logically consistent across local, regional, and global scales. For global climate models, representative concentration pathways (RCPs) have been developed that provide a range of time-series of atmospheric greenhouse-gas concentrations into the future. For impact and vulnerability assessment, new socio-economic pathway and scenario concepts have also been developed, with leadership from the Integrated Assessment Modeling Consortium (IAMC).This chapter presents concepts and methods for development of regional representative agricultural pathways (RAOs) and scenarios that can be used for agricultural model intercomparison, improvement, and impact assessment in a manner consistent with the new global pathways and scenarios. The development of agriculture-specific pathways and scenarios is motivated by the need for a protocol-based approach to climate impact, vulnerability, and adaptation assessment. Until now, the various global and regional models used for agricultural-impact assessment have been implemented with individualized scenarios using various data and model structures, often without transparent documentation, public availability, and consistency across disciplines. These practices have reduced the credibility of assessments, and also hampered the advancement of the science through model intercomparison, improvement, and synthesis of model results across studies. The recognition of the need for better coordination among the agricultural modeling community, including the development of standard reference scenarios with adequate agriculture-specific detail led to the creation of the Agricultural Model Intercomparison and Improvement Project (AgMIP) in 2010. The development of RAPs is one of the cross-cutting themes in AgMIP's work plan, and has been the subject of ongoing work by AgMIP since its creation.
Who's lost first? Susceptibility of retinal ganglion cell types in experimental glaucoma.
Della Santina, Luca; Ou, Yvonne
2017-05-01
The purpose of this article is to summarize our current knowledge about the susceptibility of specific retinal ganglion cell (RGC) types in experimental glaucoma, and to delineate the initial morphological and functional alterations that occur in response to intraocular pressure (IOP) elevation. There has been debate in the field as to whether RGCs with large somata and axons are more vulnerable, with definitive conclusions still in progress because of the wide diversity of RGC types. Indeed, it is now estimated that there are greater than 30 different RGC types, and while we do not yet understand the complete details, we discuss a growing body of work that supports the selective vulnerability hypothesis of specific RGC types in experimental glaucoma. Specifically, structural and functional degeneration of various RGC types have been examined across different rodent models of experimental glaucoma (acute vs. chronic) and different strains, and an emerging consensus is that OFF RGCs appear to be more vulnerable to IOP elevation compared to ON RGCs. Understanding the mechanisms by which this selective vulnerability manifests across different RGC types should lead to novel and improved strategies for neuroprotection and neuroregeneration in glaucoma. Copyright © 2016 Elsevier Ltd. All rights reserved.
Vulnerability and adaptation to severe weather events in the American southwest
Boero, Riccardo; Bianchini, Laura; Pasqualini, Donatella
2015-05-04
Climate change can induce changes in the frequency of severe weather events representing a threat to socio-economic development. It is thus of uttermost importance to understand how the vulnerability to the weather of local communities is determined and how adaptation public policies can be effectively put in place. We focused our empirical analysis on the American Southwest. Results show that, consistently with the predictions of an investment model, economic characteristics signaling local economic growth in the near future decrease the level of vulnerability. We also show that federal governments transfers and grants neither work to support recovery from and adaptationmore » to weather events nor to distribute their costs over a broader tax base. Finally, we show that communities relying on municipal bonds to finance adaptation and recovery policies can benefit from local acknowledgment of the need for such policies and that they do not have to pay lenders a premium for the risk induced by weather events. In conclusion, our findings suggest that determinants of economic growth support lower vulnerability to the weather and increase options for financing adaptation and recovery policies, but also that only some communities are likely to benefit from those processes.« less
Intersecting vulnerabilities in professionals and patients in intensive care.
Meunier-Beillard, Nicolas; Dargent, Auguste; Ecarnot, Fiona; Rigaud, Jean-Philippe; Andreu, Pascal; Large, Audrey; Quenot, Jean-Pierre
2017-12-01
In the context of healthcare delivery, the vulnerabilities of patients in the intensive care unit (ICU) are intricately linked with those experienced on a daily basis by caregivers in the ICU in a symbiotic relation, whereby patients who are suffering can in turn engender suffering in the caregivers. In the same way, caregivers who are suffering themselves may be a source of suffering for their patients. The vulnerabilities of both patients and caregivers in the ICU are simultaneously constituted through a process that is influenced on the one hand by the healthcare objectives of the ICU, and on the other hand, by the conformity of the patients who are managed in that ICU. The specific challenges of management in high-technology units such as an ICU may have consequences on the practices and work conditions of healthcare professionals. Constructing the patient, collectively redefining the patient's identity, and ascribing the patient to a specific healthcare trajectory enables professionals to circumscribe, contain and fight against the spectrum of extreme vulnerabilities of their patients. Imposing this normative framework is the sole means of guiding these professionals through their daily practices. In spite of this, situations of suffering remain a constitutive feature of the caregiving relation in the ICU.
Tsasis, Peter; Nirupama, N.
2008-01-01
Understanding the way perception of risk is shaped and constructed is crucial in understanding why it has been so difficult to mitigate the spread of HIV/AIDS. This paper uses the Pressure and Release (PAR) model, used to predict the onset of natural disasters as the conceptual framework. It substitutes vulnerability and risk perception as the trigger factors in the model, in making the case that HIV/AIDS can be characterized as a slow onset disaster. The implications are that vulnerability must be managed and reduced by addressing root causes, dynamic pressures, and unsafe conditions that contribute to the HIV/AIDS pandemic. HIV/AIDS programs must be culturally appropriate and work toward influencing risk perception, while addressing social norms and values that negatively impact vulnerable populations. By impacting cultural and social expectations, individuals will be able to more readily adopt safer sex behaviors. The development of policies and programs addressing the issues in context, as opposed to individual behaviors alone, allows for effective public health intervention. This may have implications for public health measures implemented for combating the spread of HIV/AIDS. PMID:22312198