Conservationists fear defeat on revised flood control policies

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

What is the revised Fear Survey Schedule for Children measuring?

This study was designed to investigate parameters of children's fear in terms of frequency of fearful thoughts and avoidance behaviour. It is suggested that current measures such as the Fear Survey Schedule for Children--Revised (FSSC-R) do not assess fearful behaviour in the sense of the occurrence of fearful responding in daily life, but rather reflect a negative affective response to the tho...

متن کامل

Applying the Consumat Model to Flood Management Policies

The number and severity of weather related catastrophes is increasing. Economic losses from these catastrophes are escalating, mainly as a result of concentration of assets and population in high-risk areas. How to deal with these economic liabilities in a fair way at the level of the individual property owners is the focus of our research. As a case study we choose the Tisza, a river in Hungar...

متن کامل

Climatic control on the variability of flood distribution

The variability of the second order moments of flood peaks with respect to geomorphoclimatic basin characteristics was investigated. In particular, the behaviour of the coefficient of variation (Cv) of the series of annual maximum floods was analysed with respect to its dependence on physically consistent quantities. The results achieved were in fairly good agreement with real world observed ch...

متن کامل

Specifying Access Control Policies on Data Streams

Many data stream processing systems are increasingly being used to support applications that handle sensitive information, such as credit card numbers and locations of soldiers in battleground [1,2,3,6]. These data have to be protected from unauthorized accesses. However, existing access control models and mechanisms cannot be adequately adopted on data streams. In this paper, we propose a nove...

متن کامل

On the Negotiation of Access Control Policies

Although the notion of negotiation has been used extensively in secure communication protocols to establish common keying states, protocol modes and services, this notion is only now emerging in the area of access control policies. In this paper, we review the motivation for access policy negotiation and we provide some examples of use in practice. In particular, we illustrate the meaning, the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Nature

سال: 1993

ISSN: 0028-0836,1476-4687

DOI: 10.1038/365478a0