• No results found

Regional Vulnerability

Spatial Clustering based Meteorological Fields Construction for Regional Vulnerability Assessment

Spatial Clustering based Meteorological Fields Construction for Regional Vulnerability Assessment

... This study aims to create a common meteorological field for companies that can influence each other when performing a regional vulnerability assessment. The smaller the total size of the generated ...

6

Regional vulnerability: the case of East Asia

Regional vulnerability: the case of East Asia

... of regional vulnerability proceeds in three ...of regional stress. Finally, we extract the component of the regional stress index that can be explained by measures of macroeconomic and ...

28

Connectivity, not region-intrinsic properties, predicts regional vulnerability to progressive tau pathology in mouse models of disease

Connectivity, not region-intrinsic properties, predicts regional vulnerability to progressive tau pathology in mouse models of disease

... and regional vulnerability against cell-intrinsic explanation, using regional gene expression profiles as a ...than regional gene expression profiles, even when such profiles are limited to ...

17

Anthropogenic Activity and Regional Vulnerability to Change: The Case of Sardinia (Italy)

Anthropogenic Activity and Regional Vulnerability to Change: The Case of Sardinia (Italy)

... The indicator PI explains the level of emissions of GHG produced by each economic activity; the covariance (COV) relates Added Value, (AV) to the PI. Looking at figure 3, the first column lists all the economic activity ...

5

Child Exposure to Climate Change: A Regional Index of Vulnerability for Better Targeted Policies

Child Exposure to Climate Change: A Regional Index of Vulnerability for Better Targeted Policies

... 4 From a policy standpoint, our findings show that exploring the geographical differences in the effects of temperature variability allows for a better identification of vulnerable areas in terms of the health burden due ...

42

Assessment of coastal vulnerability to climate change hazards at the regional scale: the case study of the North Adriatic Sea

Assessment of coastal vulnerability to climate change hazards at the regional scale: the case study of the North Adriatic Sea

... the regional vulnerability matrix The first step for the implementation of the proposed re- gional vulnerability assessment methodology is the defini- tion of a regional vulnerability ...

22

1696 0 cyberissue2002 20 pdf

1696 0 cyberissue2002 20 pdf

... potential vulnerability/impact, identified patches/workarounds/alerts, common name of the vulnerability, potential risk, and an indication of whether attacks have utilized this vulnerability or an ...

44

Modeling the Specific Seismic Risk Considering the Weight of Determining Variables

Modeling the Specific Seismic Risk Considering the Weight of Determining Variables

... Geological risks are events or circumstances that occur in the geological environment and can cause damage or harm to communities or infrastructure that are occupying a territory vulnerable areas [1]. According to Galbán ...

11

Probabilistic coastal vulnerability assessment to storms at regional scale – application to Catalan beaches (NW Mediterranean)

Probabilistic coastal vulnerability assessment to storms at regional scale – application to Catalan beaches (NW Mediterranean)

... low vulnerability, on one hand, because the expected erosion for these beaches is relatively small and, on the other hand, many of them are very ...medium vulnerability or higher. The area with the high- ...

10

Coastal vulnerability assessment: through regional to local downscaling of wave characteristics along the Bay of Lalzit (Albania)

Coastal vulnerability assessment: through regional to local downscaling of wave characteristics along the Bay of Lalzit (Albania)

... leads to lower VLs compared to those obtained through the regional analysis. If the VLs are similarly distributed along the bay (depending on the single section profiles), the long- term run-up estimates are ...

12

Social vulnerability and Lyme disease incidence: a regional analysis of the United States, 2000-2014

Social vulnerability and Lyme disease incidence: a regional analysis of the United States, 2000-2014

... Given the increasing distribution of Lyme disease, coupled with the fact that LD is the most common vector- borne disease in the USA, policy-level efforts directed toward the prevention of LD are needed. First, research ...

12

Impacts of Climate Change on Water Resources: Findings of The IPCC Regional Assessment of Vulnerability for North America

Impacts of Climate Change on Water Resources: Findings of The IPCC Regional Assessment of Vulnerability for North America

... at regional scales and a lack of fundamental understanding of many of the effects of climate variability on the physical, chemical, and biological characteristics of water ...better regional climate models, ...

6

Research on Quantitative Assessment of Cyberspace Security Status, Based on AHP and Optimized ERM Mix Algorithm

Research on Quantitative Assessment of Cyberspace Security Status, Based on AHP and Optimized ERM Mix Algorithm

... of vulnerability, the scale of threat, the impact range of threats, ...including vulnerability details, vulnerability remediation, threat event response, ...

10

The Effects of Extreme Media on Political Behavior, Attitudes, and Media Selection

The Effects of Extreme Media on Political Behavior, Attitudes, and Media Selection

... early vulnerability hypothesis, and given the theoretical and empirical evidence for an early cognitive vulnerability to radiation treatment, it is hypothesized that younger age at diagnosis of brain tumor ...

45

Cyber-bullying from a socio-ecological perspective: a review of evidence from cross-national data

Cyber-bullying from a socio-ecological perspective: a review of evidence from cross-national data

... Vulnerability / Resilience Internet use girls Social disadvantage Psychological difficulties Sensation seeking Self-efficacy Vulnerability.. Victimisation[r] ...

24

Fear and Cheating in Atlanta: Evidence for the Vulnerability Thesis

Fear and Cheating in Atlanta: Evidence for the Vulnerability Thesis

... extreme vulnerability of [American] schoolmen to public criticism and pressure and that [such] vulnerability is built into [the American] pattern of local support and control” ...

12

Vulnerability Assessment of Landscapes of the Kaliningrad Oblast for Environmental Management and Spatial Planning Optimization

Vulnerability Assessment of Landscapes of the Kaliningrad Oblast for Environmental Management and Spatial Planning Optimization

... Current approaches to the choice and substantiation of methods for comprehensive assessment of territories under human impact differ in the character of the assessed subject, types of technogenic impact and sets of ...

7

A Novel Framework for Security Requirement Prioritization

A Novel Framework for Security Requirement Prioritization

... of uncharacterized system behavior. He also distinguished security requirements had been discriminated from security related architectural constraints so that true security requirements can be figured out by the ...

6

Lab_6_BufferOverflow.pdf

Lab_6_BufferOverflow.pdf

... Exploit Integer Overflow vulnerability in order to buy the iPhone for free.. Try to fix or mitigate the vulnerability..[r] ...

21

An Empirical Analysis of Vulnerability to Poverty in Nigeria: Do Household and Regional Characteristics Matter?

An Empirical Analysis of Vulnerability to Poverty in Nigeria: Do Household and Regional Characteristics Matter?

... households vulnerability in Madagascar by extending the proposed method by Chaudhuri et ...household vulnerability, urban household vulnerability is largely determined by idiosyncratic ...household ...

6

Show all 10000 documents...

Related subjects