Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "vulnerability" wg kryterium: Wszystkie pola


Tytuł:
Assessment of groundwater vulnerability mapping methods for sustainable water resource management: An overview
Autorzy:
Moges, Simeneh Shiferaw
Dinka, Megersa Olumana
Powiązania:
https://bibliotekanauki.pl/articles/2073742.pdf
Data publikacji:
2022
Wydawca:
Instytut Technologiczno-Przyrodniczy
Tematy:
aquifer vulnerability
groundwater
intrinsic vulnerability
specific vulnerability
vulnerability assessment method
Opis:
Groundwater is a vital resource for domestic, agricultural, and industrial activities, as well as for ecosystem services. Despite this, the resource is under significant threat, due to increasing contamination from anthropogenic activities. Therefore, to ensure its reliability for present and future use, effective management of groundwater is important not only in terms of quantity (i.e. abstraction) but also quality. This can be achieved by identifying areas that are more vulnerable to contamination and by implementing protective measures. To identify the risk and delineate areas that are more exposed to pollution, various groundwater vulnerability assessment techniques have been developed across the globe. This paper presents an overview of some of the commonly used groundwater vulnerability assessment models in terms of their unique features and their application. Special emphasis is placed on statistical methods and overlay-index techniques. The assessment of the literature shows that statistical methods are limited in application to the assessment of groundwater vulnerability to pollution because they rely heavily on the availability of sufficient and quality data. However, in areas where extensive monitoring data are available, these methods estimate groundwater vulnerability more realistically in quantitative terms. Many works of research indicate that index-overlay methods are used extensively and frequently in groundwater vulnerability assessments. Due to the qualitative nature of these models, however, they are still subject to modification. This study offers an overview of a selection of relevant groundwater vulnerability assessment techniques under a specific set of hydro-climatic and hydrogeological conditions.
Źródło:
Journal of Water and Land Development; 2022, 52; 186--198
1429-7426
2083-4535
Pojawia się w:
Journal of Water and Land Development
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
ICT security in tax administration : Rapid7 Nexpose vulnerability analysis
Autorzy:
Muliński, Tomasz
Powiązania:
https://bibliotekanauki.pl/articles/2052441.pdf
Data publikacji:
2021
Wydawca:
Uniwersytet Przyrodniczo-Humanistyczny w Siedlcach
Tematy:
ICT security
vulnerability scanning tool
tax administration
Rapid7 Nexpose
computer network
vulnerability tests
Opis:
The article focuses on the subject of IT security in tax administration. This study presents the research on the security level of endpoints, servers, printing devices, network switches and other ICT devices using the Rapid Nexpose vulnerability scanner. We discuss the specifics of security research in public administration resulting from the laws in force in these institutions.
Źródło:
Studia Informatica : systems and information technology; 2020, 1-2(24); 36-50
1731-2264
Pojawia się w:
Studia Informatica : systems and information technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Mutual Vulnerability? Asymmetric Relationships in Biblical Anthropology
Autorzy:
Martos, Levente Balazs
Powiązania:
https://bibliotekanauki.pl/articles/2089936.pdf
Data publikacji:
2022-07-15
Wydawca:
Katolicki Uniwersytet Lubelski Jana Pawła II
Tematy:
vulnerability
asymmetric relationships
reciprocity
obedience
Opis:
The 2019 PBC document views relationships between parents and children, masters and servants, “shepherds” and “the flock,” civil authority and citizens as asymmetric. The structure of the document suggests that these relationship systems are based on shared human experience and a common theological foundation: they appear to repeat the pattern of the parent-child relationship and originate in the obligation to obey God. Using the document as a starting point, I would like to outline what the concept of asymmetric relationships can mean today. In search of common perspectives, I will compare New Testament texts with the interpretation of asymmetry in today’s social ethics discourse. The inequality and asymmetry of different persons and groups seem to be an undeniable fact, causing tension that can be resolved fruitfully by parties who take responsibility for each other in the presence of a “third.”
Źródło:
The Biblical Annals; 2022, 12, 3; 431-449
2083-2222
2451-2168
Pojawia się w:
The Biblical Annals
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Vulnerability of power system to cyberattacks
Autorzy:
Chyła, Tomasz
Maciejewska, Weronika
Powiązania:
https://bibliotekanauki.pl/articles/2085635.pdf
Data publikacji:
2021
Wydawca:
Instytut Polityki Energetycznej im. Ignacego Łukasiewicza
Tematy:
SCADA
energetics system vulnerability
cybersecurity
Opis:
Electricity significantly determines the possibility of development of technical civilisation, both on a global and local scale. The availability of energy determines the diversity of civilisational development of communities inhabiting particular areas of the earth. The Internet, in turn, as a tool conducive to the human species, induces many opportunities while simultaneously generating threats. The Supervisory Control and Data Acquisition (SCADA) systems used in the power industry are key elements in the operation of industrial facilities and critical infrastructure, while also being vulnerable to cyberattacks. Successful cyberattacks can cripple internal processes, cause financial losses and potentially lead to unwanted block-outs.
Źródło:
Energy Policy Studies; 2021, No. 2 (8); 13-24
2545-0859
Pojawia się w:
Energy Policy Studies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Parameterization of drought vulnerability assessment in agriculture
Autorzy:
Łabędzki, L.
Powiązania:
https://bibliotekanauki.pl/articles/101351.pdf
Data publikacji:
2017
Wydawca:
Polska Akademia Nauk. Stowarzyszenie Infrastruktura i Ekologia Terenów Wiejskich PAN
Tematy:
drought
agriculture
vulnerability
crop water deficit
soil
Opis:
The aim of the present study has been an attempt at the assessment of agricultural drought vulnerability. The paper presents the proposal of the methodology and the preliminary results. The assessment is performed for the voivodships and the regions in Poland and takes into account two factors: the crop water deficit in the growing season and the share of light and very light soil area in the overall arable soil area. The vulnerability is evaluated for five crops with the largest area of cultivation in Poland. A differentiation of vulnerability to drought between crops and a spatial differentiation for each crop are determined. A spatial differentiation is similar for all crops. The most vulnerable region is the central and central-western part of Poland. The results indicate that late potato is the most vulnerable crop to be damaged by drought among all studied crops, whereas winter rape is the least vulnerable crop.
Źródło:
Infrastruktura i Ekologia Terenów Wiejskich; 2017, II/1; 535-544
1732-5587
Pojawia się w:
Infrastruktura i Ekologia Terenów Wiejskich
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
COVID-19 and Consumer Financial Vulnerability
Autorzy:
van Ophem, Johan
Powiązania:
https://bibliotekanauki.pl/articles/14137444.pdf
Data publikacji:
2020-12-17
Wydawca:
Wyższa Szkoła Bankowa we Wrocławiu
Tematy:
Corona
COVID-19
financial vulnerability
income decline
unemployment
Opis:
Aim: This paper provides an overview of the impact of COVID-19 on consumer (household) financial vulnerability in the Netherlands in the context of socio-economic developments for households in the period 2008-2016.   Design/ research methods: After a discussion of the socio-economic developments for household in the period 2008-2016, financial vulnerability analytics is used to discuss the implications of the published results of two surveys on the impact of COVID-19 on the financial situation of households in the Netherlands (AFM/CPB, NIBUD).   Findings: It appears that problems are to be expected in households with uncertain incomes (e.g., flex workers and self-employed), in households with inflexible budgets (with fixed and necessary expenses higher than disposable income), in households that are fragile because of lack of buffers, and in households with a low income for a longer period of time. Some households such as the ones of singles and the young are less able to cope with the financial risks than others. There are lifecycle effects to be noted: the young will have difficulty in finding and keeping jobs, and therefore in making ends meet.   Value of research: The analytics and results are of interest and relevant for cross-cultural research in other Western Countries.
Źródło:
Central European Review of Economics and Management; 2020, 4, 4; 115-132
2543-9472
Pojawia się w:
Central European Review of Economics and Management
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Vulnerability analysis in critical infrastructures: A methodology
Autorzy:
Ferreira, António
Powiązania:
https://bibliotekanauki.pl/articles/576131.pdf
Data publikacji:
2019-04-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
vulnerability
critical infrastructure
terrorist threat
assessment model
Macbeth
Opis:
Vulnerability assessment is a crucial aspect for the development of methodologies to define the levels of protection in critical infrastructures. Throughout this research, we discussed the concept of vulnerability and methodologies and processes for its assessment in critical infrastructures due to a terrorist threat. The research focused on the development of an analysis model, exploring a multi-criteria decision method, in order to limit the risks to the maximum extent possible. Through a qualitative research methodology, in which we applied an analysis model based on the Threat and Infrastructure dimensions and their respective factors, we verified that the vulnerability of a critical infrastructure consists in the probability of the success of an attack, conducted by a threat - properly identified, characterised, analysed and categorised - against an infrastructure with certain characteristics, which value is defined by the user and aggressor’s point of view. The construction of an algorithmic model for vulnerability assessment, complemented by tools to support the calculations and records, allows, through a rational, scientific and algebraic process, a qualitative analysis of factors to be transformed into measurable and quantifiable values, whose algebraic operation integrates them into a final result that expresses, as a percentage, the degree of vulnerability of a critical infrastructure facing a terrorist threat.
Źródło:
Security and Defence Quarterly; 2019, 24, 2; 65-86
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Assessment of characteristics, water quality and groundwater vulnerability in Pakis District, East Java Province, Indonesia
Autorzy:
Rubiantoro, Prasetyo
Bisri, Mohammad
Afandhi, Aminudin
Powiązania:
https://bibliotekanauki.pl/articles/2073736.pdf
Data publikacji:
2022
Wydawca:
Instytut Technologiczno-Przyrodniczy
Tematy:
geoelectrics
groundwater
intrinsic vulnerability
pollution
groundwater quality
specific vulnerability
Opis:
Groundwater is a very important natural resource to support the activities of the residents of Pakis District, Malang Regency. On the other hand, increased activity puts pressure on groundwater quality. Agricultural intensification, urbanisation, and industrialisation can be sources of pollutants. Hydrological factors, topography, lithology, and surrounding rainfall are triggers for contamination of groundwater. The main objective of this research is to determine the characteristics, quality of groundwater, and its susceptibility to pollution. To complete this research, geoelectric measurements were carried out at 43 points spread throughout the study area and sampling of 18 shallow wells in agricultural, residential, and industrial areas for chemical analysis. All data obtained were analysed to create a map of the spatial distribution of groundwater vulnerability. The results show that the groundwater in the study location is in the transition zone and flows through the volcanic rock layers. The level of groundwater pollution is in the uncontaminated status to heavily polluted with pollutants in the form of heavy metal manganese and Escherichia coli bacteria. The spatial distribution of groundwater intrinsic vulnerability shows low, moderate, and high levels of vulnerability, respectively 32.99%, 60.87%, and 6.14% of the research area. Groundwater specific vulnerability associated with land use factors shows that 26.25% are negligible, 42.46% are low, and 31.29% are moderate. From this it can be concluded that the study area has been polluted both geogenically and anthropogenically, therefore, special actions must be taken to restore the quality of groundwater.
Źródło:
Journal of Water and Land Development; 2022, 52; 124--132
1429-7426
2083-4535
Pojawia się w:
Journal of Water and Land Development
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Assessment of factors affecting the intrinsic vulnerability of groundwater rated by the mean residence time estimation method
Autorzy:
Duda, Robert
Kowalczyk, Paweł
Powiązania:
https://bibliotekanauki.pl/articles/2058610.pdf
Data publikacji:
2019
Wydawca:
Państwowy Instytut Geologiczny – Państwowy Instytut Badawczy
Tematy:
groundwater vulnerability
intrinsic vulnerability
residence time
travel time
MRT
GIS
Opis:
We analyse the factors used for assessing groundwater intrinsic vulnerability to pollution in the mean residence time estimation method, providing a final vulnerability evaluation. The following factors were analysed: depth to shallow groundwater, effective precipitation infiltration coefficient, terrain inclination, volumetric water content of soils and rocks in the unsaturated zone and volumetric water content of the topsoil. GIS surveys were performed for two geomorphologically diverse regions: a highland piedmont and a lowland plain in Poland (Central Europe). In both cases, groundwater had spatially diverse vulnerability to contamination. The research method used relied on determining the percentage participation of the area with particular values of the parameters analysed in areas of different degrees of vulnerability. Knowledge of the extent and distribution of variability of the parameters analysed in areas of particular degrees of vulnerability helps explain the causes of spatial variation in groundwater intrinsic vulnerability to contamination in given areas.
Źródło:
Geological Quarterly; 2019, 63, 1; 126--138
1641-7291
Pojawia się w:
Geological Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Vulnerability parameters of tensor product of complete equipartite graphs
Autorzy:
Paulraja, P.
Sheeba-Agnes, V.
Powiązania:
https://bibliotekanauki.pl/articles/255883.pdf
Data publikacji:
2013
Wydawca:
Akademia Górniczo-Hutnicza im. Stanisława Staszica w Krakowie. Wydawnictwo AGH
Tematy:
fault tolerance
tensor product
vulnerability parameters
Opis:
Let G1 and G2 be two simple graphs. The tensor product of G1 and G2, denoted by G1 × G2, has vertex set V (G1 × G2) = V (G1) × V (G2) and edge set E(G1 × G2) ={(u1, v1)(u2, v2) : u1u2 ∈ E(G1) and v1v2 ∈ E(G2)}. In this paper, we determine vulnerability parameters such as toughness, scattering number, integrity and tenacity of the tensor product of the graphs Kr(s) × Km(n) for r ≥ 3,m ≥ 3, s ≥ 1 and n ≥ 1, where Kr(s) denotes the complete r-partite graph in which each part has s vertices. Using the results obtained here the theorems proved in [Aygul Mamut, Elkin Vumar, Vertex Vulnerability Parameters of Kronecker Products of Complete Graphs, Information Processing Letters 106 (2008), 258–262] are obtained as corollaries.
Źródło:
Opuscula Mathematica; 2013, 33, 4; 741-750
1232-9274
2300-6919
Pojawia się w:
Opuscula Mathematica
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies