نتایج جستجو برای: vulnerability mitigation

تعداد نتایج: 74066  

Journal: :Transactions in GIS : TG 2016
Mengyao Zhang Debarchana Ghosh

The disinclination of chain supermarkets to locate or pull out existing stores from impoverished neighborhoods is termed as "supermarket redlining". This paper attempts to map and understand the spatial effects of potential supermarket redlining on food vulnerability in urban disadvantaged neighborhoods of Hartford, Connecticut. Using a combination of statistical and spatial analysis functions,...

2012
Zhiwei Xu Perry E. Sheffield Wenbiao Hu Hong Su Weiwei Yu Xin Qi Shilu Tong

Climate change is affecting and will increasingly influence human health and wellbeing. Children are particularly vulnerable to the impact of climate change. An extensive literature review regarding the impact of climate change on children's health was conducted in April 2012 by searching electronic databases PubMed, Scopus, ProQuest, ScienceDirect, and Web of Science, as well as relevant websi...

2006
Tim Storer

Recently, the ThreeBallot voting scheme has been proposed as a means of providing a voter with a non-transferable receipt for their vote without resorting to more traditional means of cryptography. The ThreeBallot scheme is attractive because voters are not required to either understand complex cryptography present in other voting schemes, or more usually, trust a software or hardware artifact ...

2017
Monika M. L. dos Santos

As the Earth’s systems are under increasing unsustainable pressures, human security is clearly at stake. Cities are regarded to be increasingly important sites for climate responses, and something can still be solved if humankind acts quickly. Novel methods to long-standing quandaries, such as climate change, can now be applied. It is proposed that city adaptation and mitigation strategies shou...

Journal: :Environmental science & technology 2015
Julian Fulton Heather Cooley

California's energy and water systems are interconnected and have evolved in recent decades in response to changing conditions and policy goals. For this analysis, we use a water footprint methodology to examine water requirements of energy products consumed in California between 1990 and 2012. We combine energy production, trade, and consumption data with estimates of the blue and green water ...

2015
Alessandro Di Federico Amat Cama Yan Shoshitaishvili Christopher Krügel Giovanni Vigna

Throughout the last few decades, computer software has experienced an arms race between exploitation techniques leveraging memory corruption and detection/protection mechanisms. Effective mitigation techniques, such as Address Space Layout Randomization, have significantly increased the difficulty of successfully exploiting a vulnerability. A modern exploit is often two-stage: a first informati...

Journal: :CoRR 2017
Georgios Bakirtzis Bryan T. Carter Carl R. Elks Cody Harrison Fleming

Evaluating the security of cyber-physical systems throughout their life cycle is necessary to assure that they can be deployed and operated in safety-critical applications, such as infrastructure, military, and transportation. Most safety and security decisions that can have major effects on mitigation strategy options after deployment are made early in the system’s life cycle. To allow for a c...

Journal: :Revue scientifique et technique 1999
S E Heath S J Kenyon C A Zepeda Sein

Different disasters have similar consequence on the health and welfare of livestock. Numerous geophysical disasters can exacerbate epizootics, resulting in the deaths of many animals and the reduction of production efficiency. These disasters also present a considerable threat of spoilage of processed foods, endangering public health. Furthermore, large-scale disasters involving animals can mod...

Journal: :European journal of sustainable development research 2023

Emergence of climate change signal attributed to in mean temperature can bring serious implications economic stability developing countries like Pakistan. Likewise, unawareness vulnerability regions a country direct mitigation efforts towards unwanted areas instead ones that are genuinely deprived of. To address these two issues for Pakistan, we adopted compendium five metrics by using model da...

Journal: :Environmental management 2012
Neelam C Poudyal Cassandra Johnson-Gaither Scott Goodrick J M Bowker Jianbang Gan

Wildland fire in the South commands considerable attention, given the expanding wildland urban interface (WUI) across the region. Much of this growth is propelled by higher income retirees and others desiring natural amenity residential settings. However, population growth in the WUI increases the likelihood of wildfire fire ignition caused by people, as humans account for 93% of all wildfires ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید