Conservationists fear defeat on revised flood control policies
نویسندگان
چکیده
منابع مشابه
What is the revised Fear Survey Schedule for Children measuring?
This study was designed to investigate parameters of children's fear in terms of frequency of fearful thoughts and avoidance behaviour. It is suggested that current measures such as the Fear Survey Schedule for Children--Revised (FSSC-R) do not assess fearful behaviour in the sense of the occurrence of fearful responding in daily life, but rather reflect a negative affective response to the tho...
متن کاملApplying the Consumat Model to Flood Management Policies
The number and severity of weather related catastrophes is increasing. Economic losses from these catastrophes are escalating, mainly as a result of concentration of assets and population in high-risk areas. How to deal with these economic liabilities in a fair way at the level of the individual property owners is the focus of our research. As a case study we choose the Tisza, a river in Hungar...
متن کاملClimatic control on the variability of flood distribution
The variability of the second order moments of flood peaks with respect to geomorphoclimatic basin characteristics was investigated. In particular, the behaviour of the coefficient of variation (Cv) of the series of annual maximum floods was analysed with respect to its dependence on physically consistent quantities. The results achieved were in fairly good agreement with real world observed ch...
متن کاملSpecifying Access Control Policies on Data Streams
Many data stream processing systems are increasingly being used to support applications that handle sensitive information, such as credit card numbers and locations of soldiers in battleground [1,2,3,6]. These data have to be protected from unauthorized accesses. However, existing access control models and mechanisms cannot be adequately adopted on data streams. In this paper, we propose a nove...
متن کاملOn the Negotiation of Access Control Policies
Although the notion of negotiation has been used extensively in secure communication protocols to establish common keying states, protocol modes and services, this notion is only now emerging in the area of access control policies. In this paper, we review the motivation for access policy negotiation and we provide some examples of use in practice. In particular, we illustrate the meaning, the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nature
سال: 1993
ISSN: 0028-0836,1476-4687
DOI: 10.1038/365478a0