نتایج جستجو برای: vulnerability assessment

تعداد نتایج: 598326  

2007
Peter L. deFur Gary W. Evans Elaine A. Cohen Hubal Amy D. Kyle Rachel A. Morello-Frosch David R. Williams

BACKGROUND The field of risk assessment has focused on protecting the health of individual people or populations of wildlife from single risks, mostly from chemical exposure. The U.S. Environmental Protection Agency recently began to address multiple risks to communities in the "Framework for Cumulative Risk Assessment" [EPA/630/P02/001F. Washington DC:Risk Assessment Forum, U.S. Environmental ...

Journal: :اقتصاد و توسعه کشاورزی 0
حسام ایرجی منصور زیبایی فاطمه نصرنیا

introduction: iran is constantly exposed to natural disasters such as floods, earthquakes and drought. in the meantime, drought is the major natural disaster which leads to numerous losses in agriculture and water resources, and this phenomenon is slow and creeping.available evidence suggests that drought management is based on crisis management. as the present management in our country is base...

2017
Won Seok Jang Bernard Engel Larry Theller Nikhil Soni

Groundwater management and protection has been facilitated by computational modeling of aquifer vulnerability and monitoring aquifers using groundwater sampling. The DRASTIC (Depth to water, Recharge, Aquifer media, Soil media, Topography, Impact of vadose zone media, and hydraulic Conductivity) model, an overlay and index GIS model, has been used for groundwater quality assessment because it r...

2008
Jochen Hinkel

This paper explores how transdisciplinary knowledge integration can be facilitated in the context of integrated assessments (IAs) and vulnerability assessments (VAs) of climate change. Even though knowledge from a wide range of natural and social science disciplines must be integrated in such transdisciplinary assessments (TAs), the actual process of integration is rarely addressed explicitly a...

Journal: :محیط شناسی 0
الهه محمودزاده دانشجوی کارشناسی ارشد علوم محیط زیست دانشگاه آزاد اسلامی واحد علوم و تحقیقات خوزستان سحر رضایان استادیار گروه محیط زیست دانشگاه آزاد اسلامی واحد شاهرود آزاده احمدی استادیار دانشکده مهندسی عمران دانشگاه صنعتی اصفهان

introduction one of the most vulnerable water resources against contamination is ground water table. these resources are exposed to contamination in various forms. identifying and controlling contamination in these resources are more difficult and costly than surface waters. also because of the persistence of contamination in these resources, the best way to prevent their contamination is to id...

Journal: :Mathematical Structures in Computer Science 2016
Cezar Ionescu

We present an interdisciplinary effort in the field of global environmental change, related to the understanding of the concept of “vulnerability”. We have used functional programming to capture the generic aspects of the myriad of definitions of vulnerability, and have used the resulting formalisation to learn something new about vulnerability and to write some better software for vulnerabilit...

Background and Aims: Urban texture assessment with passive defense approach is one of the most important issues in the field of urban planning. In this research, we try to evaluate the vulnerability of urban tissue to the enemy's threats, because inactive defense by using unarmed measures reduces Vulnerability and increased deterrence at the time of the threat. Noghan Neighborhood located in th...

Journal: :JCM 2015
Tao Wen Yuqing Zhang Ying Dong Gang Yang

—Security vulnerabilities play an important role in network security. With the development of the network and the increasing number of vulnerabilities, many Quantitative Vulnerability Assessment Standards (QVAS) was proposed in order to enable professionals to prioritize the most important vulnerabilities with limited energy. However, it is difficult to apply QVAS manually due to the large num...

2015

While some situations clearly may require bringing in highly skilled resources to test systems, a sound basis for good security would be to develop in-house expertise in vulnerability testing by the system administrators, and to develop an effective method of performing testing. The challenge for this effort, then, is to combine freeware tools with a methodology for using them that effectively ...

2015
Binita KC J. Marshall Shepherd Cassandra Johnson Gaither

Climate change is occurring in the Southeastern United States, and one manifestation is changes in frequency and intensity of extreme events. A vulnerability assessment is performed in the state of Georgia (United States) at the county level from 1975 to 2012 in decadal increments. Climate change vulnerability is typically measured as a function of exposure to physical phenomena (e.g., droughts...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید