Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "vulnerability" wg kryterium: Wszystkie pola


Tytuł:
Assessment of groundwater vulnerability mapping methods for sustainable water resource management: An overview
Autorzy:
Moges, Simeneh Shiferaw
Dinka, Megersa Olumana
Powiązania:
https://bibliotekanauki.pl/articles/2073742.pdf
Data publikacji:
2022
Wydawca:
Instytut Technologiczno-Przyrodniczy
Tematy:
aquifer vulnerability
groundwater
intrinsic vulnerability
specific vulnerability
vulnerability assessment method
Opis:
Groundwater is a vital resource for domestic, agricultural, and industrial activities, as well as for ecosystem services. Despite this, the resource is under significant threat, due to increasing contamination from anthropogenic activities. Therefore, to ensure its reliability for present and future use, effective management of groundwater is important not only in terms of quantity (i.e. abstraction) but also quality. This can be achieved by identifying areas that are more vulnerable to contamination and by implementing protective measures. To identify the risk and delineate areas that are more exposed to pollution, various groundwater vulnerability assessment techniques have been developed across the globe. This paper presents an overview of some of the commonly used groundwater vulnerability assessment models in terms of their unique features and their application. Special emphasis is placed on statistical methods and overlay-index techniques. The assessment of the literature shows that statistical methods are limited in application to the assessment of groundwater vulnerability to pollution because they rely heavily on the availability of sufficient and quality data. However, in areas where extensive monitoring data are available, these methods estimate groundwater vulnerability more realistically in quantitative terms. Many works of research indicate that index-overlay methods are used extensively and frequently in groundwater vulnerability assessments. Due to the qualitative nature of these models, however, they are still subject to modification. This study offers an overview of a selection of relevant groundwater vulnerability assessment techniques under a specific set of hydro-climatic and hydrogeological conditions.
Źródło:
Journal of Water and Land Development; 2022, 52; 186--198
1429-7426
2083-4535
Pojawia się w:
Journal of Water and Land Development
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
ICT security in tax administration : Rapid7 Nexpose vulnerability analysis
Autorzy:
Muliński, Tomasz
Powiązania:
https://bibliotekanauki.pl/articles/2052441.pdf
Data publikacji:
2021
Wydawca:
Uniwersytet Przyrodniczo-Humanistyczny w Siedlcach
Tematy:
ICT security
vulnerability scanning tool
tax administration
Rapid7 Nexpose
computer network
vulnerability tests
Opis:
The article focuses on the subject of IT security in tax administration. This study presents the research on the security level of endpoints, servers, printing devices, network switches and other ICT devices using the Rapid Nexpose vulnerability scanner. We discuss the specifics of security research in public administration resulting from the laws in force in these institutions.
Źródło:
Studia Informatica : systems and information technology; 2020, 1-2(24); 36-50
1731-2264
Pojawia się w:
Studia Informatica : systems and information technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Mutual Vulnerability? Asymmetric Relationships in Biblical Anthropology
Autorzy:
Martos, Levente Balazs
Powiązania:
https://bibliotekanauki.pl/articles/2089936.pdf
Data publikacji:
2022-07-15
Wydawca:
Katolicki Uniwersytet Lubelski Jana Pawła II
Tematy:
vulnerability
asymmetric relationships
reciprocity
obedience
Opis:
The 2019 PBC document views relationships between parents and children, masters and servants, “shepherds” and “the flock,” civil authority and citizens as asymmetric. The structure of the document suggests that these relationship systems are based on shared human experience and a common theological foundation: they appear to repeat the pattern of the parent-child relationship and originate in the obligation to obey God. Using the document as a starting point, I would like to outline what the concept of asymmetric relationships can mean today. In search of common perspectives, I will compare New Testament texts with the interpretation of asymmetry in today’s social ethics discourse. The inequality and asymmetry of different persons and groups seem to be an undeniable fact, causing tension that can be resolved fruitfully by parties who take responsibility for each other in the presence of a “third.”
Źródło:
The Biblical Annals; 2022, 12, 3; 431-449
2083-2222
2451-2168
Pojawia się w:
The Biblical Annals
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Vulnerability of power system to cyberattacks
Autorzy:
Chyła, Tomasz
Maciejewska, Weronika
Powiązania:
https://bibliotekanauki.pl/articles/2085635.pdf
Data publikacji:
2021
Wydawca:
Instytut Polityki Energetycznej im. Ignacego Łukasiewicza
Tematy:
SCADA
energetics system vulnerability
cybersecurity
Opis:
Electricity significantly determines the possibility of development of technical civilisation, both on a global and local scale. The availability of energy determines the diversity of civilisational development of communities inhabiting particular areas of the earth. The Internet, in turn, as a tool conducive to the human species, induces many opportunities while simultaneously generating threats. The Supervisory Control and Data Acquisition (SCADA) systems used in the power industry are key elements in the operation of industrial facilities and critical infrastructure, while also being vulnerable to cyberattacks. Successful cyberattacks can cripple internal processes, cause financial losses and potentially lead to unwanted block-outs.
Źródło:
Energy Policy Studies; 2021, No. 2 (8); 13-24
2545-0859
Pojawia się w:
Energy Policy Studies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Parameterization of drought vulnerability assessment in agriculture
Autorzy:
Łabędzki, L.
Powiązania:
https://bibliotekanauki.pl/articles/101351.pdf
Data publikacji:
2017
Wydawca:
Polska Akademia Nauk. Stowarzyszenie Infrastruktura i Ekologia Terenów Wiejskich PAN
Tematy:
drought
agriculture
vulnerability
crop water deficit
soil
Opis:
The aim of the present study has been an attempt at the assessment of agricultural drought vulnerability. The paper presents the proposal of the methodology and the preliminary results. The assessment is performed for the voivodships and the regions in Poland and takes into account two factors: the crop water deficit in the growing season and the share of light and very light soil area in the overall arable soil area. The vulnerability is evaluated for five crops with the largest area of cultivation in Poland. A differentiation of vulnerability to drought between crops and a spatial differentiation for each crop are determined. A spatial differentiation is similar for all crops. The most vulnerable region is the central and central-western part of Poland. The results indicate that late potato is the most vulnerable crop to be damaged by drought among all studied crops, whereas winter rape is the least vulnerable crop.
Źródło:
Infrastruktura i Ekologia Terenów Wiejskich; 2017, II/1; 535-544
1732-5587
Pojawia się w:
Infrastruktura i Ekologia Terenów Wiejskich
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
COVID-19 and Consumer Financial Vulnerability
Autorzy:
van Ophem, Johan
Powiązania:
https://bibliotekanauki.pl/articles/14137444.pdf
Data publikacji:
2020-12-17
Wydawca:
Wyższa Szkoła Bankowa we Wrocławiu
Tematy:
Corona
COVID-19
financial vulnerability
income decline
unemployment
Opis:
Aim: This paper provides an overview of the impact of COVID-19 on consumer (household) financial vulnerability in the Netherlands in the context of socio-economic developments for households in the period 2008-2016.   Design/ research methods: After a discussion of the socio-economic developments for household in the period 2008-2016, financial vulnerability analytics is used to discuss the implications of the published results of two surveys on the impact of COVID-19 on the financial situation of households in the Netherlands (AFM/CPB, NIBUD).   Findings: It appears that problems are to be expected in households with uncertain incomes (e.g., flex workers and self-employed), in households with inflexible budgets (with fixed and necessary expenses higher than disposable income), in households that are fragile because of lack of buffers, and in households with a low income for a longer period of time. Some households such as the ones of singles and the young are less able to cope with the financial risks than others. There are lifecycle effects to be noted: the young will have difficulty in finding and keeping jobs, and therefore in making ends meet.   Value of research: The analytics and results are of interest and relevant for cross-cultural research in other Western Countries.
Źródło:
Central European Review of Economics and Management; 2020, 4, 4; 115-132
2543-9472
Pojawia się w:
Central European Review of Economics and Management
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Vulnerability analysis in critical infrastructures: A methodology
Autorzy:
Ferreira, António
Powiązania:
https://bibliotekanauki.pl/articles/576131.pdf
Data publikacji:
2019-04-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
vulnerability
critical infrastructure
terrorist threat
assessment model
Macbeth
Opis:
Vulnerability assessment is a crucial aspect for the development of methodologies to define the levels of protection in critical infrastructures. Throughout this research, we discussed the concept of vulnerability and methodologies and processes for its assessment in critical infrastructures due to a terrorist threat. The research focused on the development of an analysis model, exploring a multi-criteria decision method, in order to limit the risks to the maximum extent possible. Through a qualitative research methodology, in which we applied an analysis model based on the Threat and Infrastructure dimensions and their respective factors, we verified that the vulnerability of a critical infrastructure consists in the probability of the success of an attack, conducted by a threat - properly identified, characterised, analysed and categorised - against an infrastructure with certain characteristics, which value is defined by the user and aggressor’s point of view. The construction of an algorithmic model for vulnerability assessment, complemented by tools to support the calculations and records, allows, through a rational, scientific and algebraic process, a qualitative analysis of factors to be transformed into measurable and quantifiable values, whose algebraic operation integrates them into a final result that expresses, as a percentage, the degree of vulnerability of a critical infrastructure facing a terrorist threat.
Źródło:
Security and Defence Quarterly; 2019, 24, 2; 65-86
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Assessment of characteristics, water quality and groundwater vulnerability in Pakis District, East Java Province, Indonesia
Autorzy:
Rubiantoro, Prasetyo
Bisri, Mohammad
Afandhi, Aminudin
Powiązania:
https://bibliotekanauki.pl/articles/2073736.pdf
Data publikacji:
2022
Wydawca:
Instytut Technologiczno-Przyrodniczy
Tematy:
geoelectrics
groundwater
intrinsic vulnerability
pollution
groundwater quality
specific vulnerability
Opis:
Groundwater is a very important natural resource to support the activities of the residents of Pakis District, Malang Regency. On the other hand, increased activity puts pressure on groundwater quality. Agricultural intensification, urbanisation, and industrialisation can be sources of pollutants. Hydrological factors, topography, lithology, and surrounding rainfall are triggers for contamination of groundwater. The main objective of this research is to determine the characteristics, quality of groundwater, and its susceptibility to pollution. To complete this research, geoelectric measurements were carried out at 43 points spread throughout the study area and sampling of 18 shallow wells in agricultural, residential, and industrial areas for chemical analysis. All data obtained were analysed to create a map of the spatial distribution of groundwater vulnerability. The results show that the groundwater in the study location is in the transition zone and flows through the volcanic rock layers. The level of groundwater pollution is in the uncontaminated status to heavily polluted with pollutants in the form of heavy metal manganese and Escherichia coli bacteria. The spatial distribution of groundwater intrinsic vulnerability shows low, moderate, and high levels of vulnerability, respectively 32.99%, 60.87%, and 6.14% of the research area. Groundwater specific vulnerability associated with land use factors shows that 26.25% are negligible, 42.46% are low, and 31.29% are moderate. From this it can be concluded that the study area has been polluted both geogenically and anthropogenically, therefore, special actions must be taken to restore the quality of groundwater.
Źródło:
Journal of Water and Land Development; 2022, 52; 124--132
1429-7426
2083-4535
Pojawia się w:
Journal of Water and Land Development
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Assessment of factors affecting the intrinsic vulnerability of groundwater rated by the mean residence time estimation method
Autorzy:
Duda, Robert
Kowalczyk, Paweł
Powiązania:
https://bibliotekanauki.pl/articles/2058610.pdf
Data publikacji:
2019
Wydawca:
Państwowy Instytut Geologiczny – Państwowy Instytut Badawczy
Tematy:
groundwater vulnerability
intrinsic vulnerability
residence time
travel time
MRT
GIS
Opis:
We analyse the factors used for assessing groundwater intrinsic vulnerability to pollution in the mean residence time estimation method, providing a final vulnerability evaluation. The following factors were analysed: depth to shallow groundwater, effective precipitation infiltration coefficient, terrain inclination, volumetric water content of soils and rocks in the unsaturated zone and volumetric water content of the topsoil. GIS surveys were performed for two geomorphologically diverse regions: a highland piedmont and a lowland plain in Poland (Central Europe). In both cases, groundwater had spatially diverse vulnerability to contamination. The research method used relied on determining the percentage participation of the area with particular values of the parameters analysed in areas of different degrees of vulnerability. Knowledge of the extent and distribution of variability of the parameters analysed in areas of particular degrees of vulnerability helps explain the causes of spatial variation in groundwater intrinsic vulnerability to contamination in given areas.
Źródło:
Geological Quarterly; 2019, 63, 1; 126--138
1641-7291
Pojawia się w:
Geological Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Vulnerability parameters of tensor product of complete equipartite graphs
Autorzy:
Paulraja, P.
Sheeba-Agnes, V.
Powiązania:
https://bibliotekanauki.pl/articles/255883.pdf
Data publikacji:
2013
Wydawca:
Akademia Górniczo-Hutnicza im. Stanisława Staszica w Krakowie. Wydawnictwo AGH
Tematy:
fault tolerance
tensor product
vulnerability parameters
Opis:
Let G1 and G2 be two simple graphs. The tensor product of G1 and G2, denoted by G1 × G2, has vertex set V (G1 × G2) = V (G1) × V (G2) and edge set E(G1 × G2) ={(u1, v1)(u2, v2) : u1u2 ∈ E(G1) and v1v2 ∈ E(G2)}. In this paper, we determine vulnerability parameters such as toughness, scattering number, integrity and tenacity of the tensor product of the graphs Kr(s) × Km(n) for r ≥ 3,m ≥ 3, s ≥ 1 and n ≥ 1, where Kr(s) denotes the complete r-partite graph in which each part has s vertices. Using the results obtained here the theorems proved in [Aygul Mamut, Elkin Vumar, Vertex Vulnerability Parameters of Kronecker Products of Complete Graphs, Information Processing Letters 106 (2008), 258–262] are obtained as corollaries.
Źródło:
Opuscula Mathematica; 2013, 33, 4; 741-750
1232-9274
2300-6919
Pojawia się w:
Opuscula Mathematica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Selected Options of Vulnerability Assessment – State of the Art in Literature Review
Autorzy:
Nowakowski, Tomasz
Valis, David
Powiązania:
https://bibliotekanauki.pl/articles/503770.pdf
Data publikacji:
2013
Wydawca:
Międzynarodowa Wyższa Szkoła Logistyki i Transportu
Tematy:
vulnerability assessment
risk
consequences
system protection
Opis:
The paper deals with the selected aspects of vulnerability assessment of systems. Historically, the vulnerability is recognised as one of the important aspects of system properties – system quality. The wide utilization of vulnerability can be observed in the IT area. Some approaches to vulnerability assessment are based on experiences and empiricism. For some other works it is necessary to have a quantitative value used for expressing vulnerability. In this paper we have applied the methods of analytical research, information search and a synthesis. They serve to introduce selected approaches expressing system vulnerability. The attention is paid mainly to the environmental and critical infrastructure systems. The results are presented in the form of definitions, equations or graphs. All these alternatives are further usable for assessing critical infrastructure elements. The results are also suitable for deeper development of a safety research scientific discipline.
Źródło:
Logistics and Transport; 2013, 17, 1; 33-40
1734-2015
Pojawia się w:
Logistics and Transport
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Źródła użytecznych informacji o zagrożeniach w internecie rzeczy
Autorzy:
Felkner, Anna
Powiązania:
https://bibliotekanauki.pl/articles/13947910.pdf
Data publikacji:
2023-02-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
Internet of Things
IoT
vulnerability
exploit
vulnerability and exploit
database
actionable information
Opis:
One of the many problems facied by users, producers or network owners as well as those who deal with cybersecurity on a daily basis is the issue of vulnerabilities in Internet of Things devices. Although the most popular vulnerabilities are often presented to the general public, the vast majority of them are still known only to cybersecurity specialists, and not to the users who own the vulnerable device. Consequently, it is the users who are most likely to be at risk. It is advisable to increase user awareness of the dangers of owning and using unsecured devices as well as provide access to information about vulnerabilities. Ideally, we would like to have a single source where information about vulnerabilities and exploits related to IoT devices would be collected, aggregated and correlated. Among other things, the article presents various sources of actionable information as well as an open repository that presents information about vulnerabilities and exploits in an accessible way.
Źródło:
Cybersecurity and Law; 2023, 9, 1; 144-154
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Vulnerability and adaptation of Polish coast to impact of sea-level rise (SLR)
Autorzy:
Pruszak, Z.
Powiązania:
https://bibliotekanauki.pl/articles/241039.pdf
Data publikacji:
2001
Wydawca:
Polska Akademia Nauk. Instytut Budownictwa Wodnego PAN
Tematy:
vulnerability
Polish coast
sea level rise (SLR)
Opis:
The paper presented contains results of the latest studies on assessment of the vulner-ability of the Polish coast to sea-level rise, thus providing the synthesis, development and update of all current works in this field. Apart from a general description of the basic physical and socio-economic coastal characteristics, boundary conditions were defined for further studies on Poland's vulnerability to ASLR. For each of the four areas, into which the Polish coastal zone was divided, a synthesis of threats and vul-nerability to the expected SLR was carried out, taking into account characteristic elements and features of the regions. Basing upon two extreme scenarios of sea-level rise, i.e. ASLR1 with 30 cm/100 yrs (optimistic variant) and ASLR2 with 100 cm/100 yrs (pessimistic variant), the assessment and cost calculation of total protection measures of the endangered areas in the coastal zone related to their capital value to be lost was executed. Finally, it was found that the protective investments should mainly be undertaken on the west and east coasts, where economically justified. Because of limited funds, it is necessary to concentrate on particularly important and simultaneously strongly threatened regions. The detailed analysis of costs implies that the activities should be undertaken first on the coastal segments adjacent to Gdańsk and Szczecin, where vast agglomerations are located, with concentrated industry and related infrastructure, as well as centres of science and culture.
Źródło:
Archives of Hydro-Engineering and Environmental Mechanics; 2001, 48, 2; 73-90
1231-3726
Pojawia się w:
Archives of Hydro-Engineering and Environmental Mechanics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Vulnerability of the Biological Elements of River Bed Ecosystem on Regulatory Works
Autorzy:
Hachoł, J.
Bondar-Nowakowska, E.
Powiązania:
https://bibliotekanauki.pl/articles/124219.pdf
Data publikacji:
2017
Wydawca:
Polskie Towarzystwo Inżynierii Ekologicznej
Tematy:
vulnerability
ecological risk
aquatic plants
biodiversity
Opis:
The vulnerability of the system to changes is an additional factor that is often taken into account in risk analysis. Usually this assessment takes into account only two elements – probability and consequences of an event. The study attempts to assess the vulnerability of vascular aquatic plant communities to the qualitative and quantitative changes as a result of regulatory works in a river bed. The aim of the paper is to assess the possibility of using biological indicators, commonly used in assessing the status of aquatic ecosystems, as indicators of the vulnerability of analyzed communities. These are: the number of plant species, the degree of their bottom coverage, Shannon-Wiener diversity index, Pielou evenness index and ecological status. Field studies were carried out in growing seasons from 2008–2014 in small and medium-sized lowland watercourses in Lower Silesia. The field study included an inventory of vascular aquatic plants. Based on the results of the research, values of biological indicators were calculated and statistical analysis (cluster analysis and Spearman’s rank correlation) were performed. On this basis it was found that the number of aquatic plants species and diversity index may be indicators of the vulnerability of plant communities to the changes as a result of river regulation.
Źródło:
Journal of Ecological Engineering; 2017, 18, 2; 51-56
2299-8993
Pojawia się w:
Journal of Ecological Engineering
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Design Vulnerability as the Key Element of the Logistics Efficiency of a Product
Autorzy:
Bielecki, Maciej Mieczysław
Madej, Mateusz
Skoczylas, Aleksandra
Powiązania:
https://bibliotekanauki.pl/articles/504309.pdf
Data publikacji:
2014
Wydawca:
Międzynarodowa Wyższa Szkoła Logistyki i Transportu
Tematy:
design
vulnerability
efficiency
product
Opis:
The article highlights the importance of the influence a product itself has on the broadly understood logistics-related issues, referred to as the logistical efficiency of a product. It constitutes the foundation for the concept of design vulnerability of a product, along with its determinants. The paper shows the impact these determinants have on logistics processes on selected examples from the market. The authors of the article also suggest what actions might be undertaken in the strategic and operational sphere of the company logistics, depending on the design vulnerability of a product.
Źródło:
Logistics and Transport; 2014, 21, 1; 5-12
1734-2015
Pojawia się w:
Logistics and Transport
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Supply Chain Vulnerability and Resilience – Case Study of Footwear Retail Distribution Network
Autorzy:
Tubis, Agnieszka
Nowakowski, Tomasz
Werbińska-Wojciechowska, Sylwia
Powiązania:
https://bibliotekanauki.pl/articles/504206.pdf
Data publikacji:
2017
Wydawca:
Międzynarodowa Wyższa Szkoła Logistyki i Transportu
Tematy:
supply chain
vulnerability
resilience
assessment methods
Opis:
The aim of this article is to present and investigate the main concepts of supply chain vulnerability and resilience. Thus, the fundamental differences between vulnerability and resilience definitions are discussed. The main issues on vulnerability and resilience assessment are investigated, and the case study of footwear retail supply chain disruption problems is analysed.
Źródło:
Logistics and Transport; 2017, 33, 1; 15-24
1734-2015
Pojawia się w:
Logistics and Transport
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Nota o książce: Judith Butler, Zeynep Gambetti, Leticia Sabsay <i>Vulnerability in Resistance</i>
A Critical Note on <i>Vulnerability in Resistance</i> by Judith Butler, Zeynep Gambetti and Leticia Sabsay (eds.)
Autorzy:
Kisiel, Anna
Powiązania:
https://bibliotekanauki.pl/articles/467667.pdf
Data publikacji:
2018
Wydawca:
Wydawnictwo Uniwersytetu Śląskiego
Tematy:
opór
bezbronność
kobiecość
protest
Turcja
resistance
vulnerability
femininity
Turkey
Opis:
Anna KisielInstitute of English Cultures and LiteraturesFaculty of PhilologyUniversity of Silesia in KatowicePolandA Critical Note on Vulnerability in Resistance by Judith Butler, Zeynep Gambetti and Leticia Sabsay (eds.)Abstract: The present note is dedicated to the book Vulnerability in Resistance edited by Judith Butler, Zeynep Gambetti, and Leticia Sabsay. The volume consists of 13 chapters, of which each tells an altogether different story, yet what connects all of them are the ever-returning keywords: resistance and vulnerability. In the English language, the latter term covers a broader gamut of meanings than its Polish equivalent (bezbronność), comprising in itself such concepts as helplessness, exposure, proneness to harm, but also fragility. The editors of the volume and the authors of the contributions alike attempt to revisit the relation between these two central terms.Keywords: resistance, vulnerability, femininity, protest, Turkey
For an abstract in English, scroll down.Anna KisielInstytut Kultur i Literatur AnglojęzycznychWydział FilologicznyUniwersytet Śląski w KatowicachNota o książce: Judith Butler, Zeynep Gambetti, Leticia Sabsay Vulnerability in ResistanceAbstrakt: Nota poświęcona jest książce Vulnerability in Resistance pod redakcją Judith Butler, Zeynep Gambetti, oraz Leticii Sabsay. Na pozycję składa się trzynaście rozdziałów, z których każdy opowiada zgoła inną historię, ale wszystkie łączą powracające tytułowe słowa-klucze - resistance (opór) oraz vulnerability, który to termin w języku angielskim posiada szerszą gamę znaczeń, mieszcząc w sobie bezbronność, narażenie, podatność na zranienie, ale i swoistą kruchość. Redaktorki i autorki tego tomu próbują przemyśleć relację między tymi dwoma pojęciami.Słowa kluczowe: opór, bezbronność, kobiecość, protest, TurcjaA Critical Note on Vulnerability in Resistance by Judith Butler, Zeynep Gambetti and Leticia Sabsay (eds.)Abstract: The present note is dedicated to the book Vulnerability in Resistance edited by Judith Butler, Zeynep Gambetti, and Leticia Sabsay. The volume consists of 13 chapters, of which each tells an altogether different story, yet what connects all of them are the ever-returning keywords: resistance and vulnerability. In the English language, the latter term covers a broader gamut of meanings than its Polish equivalent (bezbronność), comprising in itself such concepts as helplessness, exposure, proneness to harm, but also fragility. The editors of the volume and the authors of the contributions alike attempt to revisit the relation between these two central terms.Keywords: resistance, vulnerability, femininity, protest, Turkey
Źródło:
ER(R)GO: Teoria – Literatura – Kultura; 2018, 37
1508-6305
2544-3186
Pojawia się w:
ER(R)GO: Teoria – Literatura – Kultura
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Automatyczne skanery podatności aplikacji internetowych
Automated web application vulnerability scanners
Autorzy:
Turlewicz, P.
Powiązania:
https://bibliotekanauki.pl/articles/273397.pdf
Data publikacji:
2012
Wydawca:
Wojskowa Akademia Techniczna im. Jarosława Dąbrowskiego
Tematy:
skanery podatności aplikacji internetowych
kryteria WASC
ACTA
web application
vulnerability scanner
WASC criteria
Opis:
W artykule przedstawiono narzędzia, zarówno komercyjne jak i darmowe, przydatne w utrzymywaniu wymaganego poziomu zabezpieczenia informacji – automatyczne skanery podatności aplikacji internetowych. W załączniku zamieszczono zmodyfikowaną listę Web Application Security Scanner Evaluation Criteria, opracowaną przez organizację Web Application Security Consortium (WASC).
The paper describes tools, both commercial and free, useful in maintaining the required level of information security protection - automated web application vulnerability scanners. The appendix contains the modified Web Application Security Scanner Evaluation Criteria list, the project of Web Application Security Consortium (WASC).
Źródło:
Biuletyn Instytutu Automatyki i Robotyki; 2012, R. 18, nr 32, 32; 85-106
1427-3578
Pojawia się w:
Biuletyn Instytutu Automatyki i Robotyki
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Vulnerability as a perceptual category – Martha Nussbaum’s capabilities approach from the perspective of political aesthetics
Autorzy:
Lisowska, Urszula
Powiązania:
https://bibliotekanauki.pl/articles/18688809.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Łódzki. Wydawnictwo Uniwersytetu Łódzkiego
Tematy:
capabilities
vulnerability
perception
emotions
imagination
compassion
wonder
Opis:
The aim of the paper is to draw politico-aesthetic consequences from Martha Nussbaum’s capabilities approach. It is argued that this can be achieved by focusing on the notion of vulnerability implied by the idea of capabilities. The recognition of the vulnerability of the human good inspires a new model of practical rationality based on perception. This idea, in turn, explores the aesthetic connotations of perception implied by its etymology (the ancient Greek for perception being aesthesis). Thus, political aesthetics is understood as the inquiry into the political consequences of the affinity between ethics and aesthetics, as well as the political relevance of the notion of beauty.
Źródło:
Internetowy Magazyn Filozoficzny Hybris; 2015, 28, 1; 116-140
1689-4286
Pojawia się w:
Internetowy Magazyn Filozoficzny Hybris
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The concept of vulnerability within research ethics and health policies on rare diseases
Koncepcja „vulnerability” a etyka badawcza i polityki zdrowotne w kontekście chorób rzadkich
Autorzy:
Rajtar, Małgorzata
Powiązania:
https://bibliotekanauki.pl/articles/1047016.pdf
Data publikacji:
2020-11-23
Wydawca:
Łódzkie Towarzystwo Naukowe
Tematy:
vulnerability
research ethics
rare diseases
ethnography
health policies
etyka badawcza
choroby rzadkie
etnografia
polityki zdrowotne
Opis:
Rare diseases have held a special status within health policy of the European Union (EU) since the 1990s. According to key EU legal documents on this issue, patients who suffer from a rare disease are entitled to the same good quality care as others. Due to the “low prevalence” of each rare disease and simultaneously the large total number of patients affected by them – between 27 and 36 million people in the EU – individuals who belong to this group are regarded as particularly vulnerable. Classifying people with rare diseases as vulnerable raises ethical issues that have rarely been discussed by scholarship in social sciences and humanities. Drawing on existing literature, I argue that research ethics as well as ethics and politics of public health espouse a negative and labelling understanding of vulnerability. According to this concept of vulnerability some individuals, groups or populations are classified as being subjected to greater harm or hurt than others; thus, they require special support from, for instance, researchers and/or the healthcare system. As a result, such an understanding increases the danger of paternalistic practices and “pathogenic vulnerability” [Mackenzie 2013]. It may also contribute to discrimination, stigmatising and victimising. As I show in this article, health policies tailored to rare diseases often run the risk of increasing “pathogenic vulnerability”.
Od lat 90. XX wieku choroby rzadkie zaczęły zyskiwać specjalny status w polityce zdrowotnej Unii Europejskiej (UE). Zgodnie z kluczowymi aktami prawnymi UE pacjenci cierpiący na choroby rzadkie powinni mieć prawo do dobrej jakości leczenia, tak samo jak i inni pacjenci. „Niska częstość występowania” każdej z chorób rzadkich, a jednocześnie duża liczba chorych nimi dotkniętych (szacuje się, że jest to około 27–36 milionów osób w UE) sprawiają, że osoby należące do tej grupy uznaje się jako szczególny sposób vulnerable. W niniejszym artykule analizuję rzadko poruszane w piśmiennictwie z zakresu nauk społecznych i humanistycznych kwestie etyczne związane z klasyfikowaniem osób z chorobami rzadkimi jako grupy określanej mianem vulnerable. Argumentuję, odwołując się do literatury, że w etyce badawczej oraz etyce i polityce zdrowia publicznego dominuje negatywne i etykietyzujące rozumienie vulnerability, w ramach którego pewne jednostki, grupy lub populacje są klasyfikowane jako podatne na większe ryzyko szkody czy zranienia niż inne i w związku z tym wymagają szczególnej ochrony, czy to ze strony prowadzących badania, czy na przykład systemu opieki zdrowotnej. Takie rozumienie niesie ze sobą niebezpieczeństwo praktyk paternalistycznych i „patogennej vulnerability” [Mackenzie 2013] oraz może przyczynić się do procesów dyskryminacji, stygmatyzacji i wiktymizacji. Jak pokazuję w artykule, polityki zdrowotne odnoszące się do chorób rzadkich przyczyniają się często do zwiększenia „patogennej vulnerability”.
Źródło:
Przegląd Socjologiczny; 2020, 69, 3; 107-127
0033-2356
Pojawia się w:
Przegląd Socjologiczny
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Markov Model of Cyber Attack Life Cycle Triggered by Software Vulnerability
Autorzy:
Hoffmann, Romuald
Powiązania:
https://bibliotekanauki.pl/articles/1844613.pdf
Data publikacji:
2021
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
Markov model
cyber-attack
vulnerability
life cycle
homogenous Markov process
continuous time Markov chain
Opis:
Software vulnerability life cycles illustrate changes in detection processes of software vulnerabilities during using computer systems. Unfortunately, the detection can be made by cyber-adversaries and a discovered software vulnerability may be consequently exploited for their own purpose. The vulnerability may be exploited by cyber-criminals at any time while it is not patched. Cyber-attacks on organizations by exploring vulnerabilities are usually conducted through the processes divided into many stages. These cyber-attack processes in literature are called cyber-attack live cycles or cyber kill chains. The both type of cycles have their research reflection in literature but so far, they have been separately considered and modeled. This work addresses this deficiency by proposing a Markov model which combine a cyber-attack life cycle with an idea of software vulnerability life cycles. For modeling is applied homogeneous continuous time Markov chain theory.
Źródło:
International Journal of Electronics and Telecommunications; 2021, 67, 1; 35-41
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Badanie bezpieczeństwa wybranych platform CMS za pomocą skanerów podatności
Analysis of security CMS platforms by vulnerability scanners
Autorzy:
Zamościński, Patryk
Kozieł, Grzegorz
Powiązania:
https://bibliotekanauki.pl/articles/1203884.pdf
Data publikacji:
2020
Wydawca:
Politechnika Lubelska. Instytut Informatyki
Tematy:
CMS
security
vulnerability scanner
bezpieczeństwo
skaner podatności
Opis:
Subject of security the most popular CMS platforms has been undertaken in the following thesis. There were introduced fundamental informations about subject CMS platforms and vulnerability scanners utilised to research. For research purposes Wordpress and Joomla websites were created and investigated for security by vulnerability scanners OWASP ZAP, Vega, Detectify and Skipfish. Results were grouped by some criteria: vulnerabilities by category and vulnerabilities by threat level. Obtained results were examined in two ways: analysis of residual results, for each website scanning and analysis of aggregated results from all scanners. After that, conclusions about CMS platforms security have been drawn.
W niniejszej pracy został podjęty temat bezpieczeństwa najbardziej popularnych platform CMS. Przedstawiono podstawowe informacje o badanych platformach CMS oraz o skanerach podatności użytych w badaniach. W celach badawczych zostały utworzone witryny Wordpress i Joomla, które następnie przebadano pod kątem bezpieczeństwa za pomocą skanerów OWASP ZAP, Vega, Detectify oraz Skipfish. Wyniki zostały pogrupowane według kryteriów: podatności w poszczególnych kategoriach oraz podatności według poziomu zagrożenia. Wyniki były rozpatrywane na dwa sposoby: analiza wyników szczątkowych, oraz analiza zbiorcza zsumowanych wyników ze wszystkich skanerów. Na koniec zostały wyciągnięte wnioski w odniesieniu do obu platform.
Źródło:
Journal of Computer Sciences Institute; 2020, 16; 261-268
2544-0764
Pojawia się w:
Journal of Computer Sciences Institute
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Physical vulnerability to flood inundation: As the mitigation strategies design
Autorzy:
Azmeri, Azmeri
Yunita, Halida
Safrida, Safrida
Satria, Indra
Jemi, Faris Z.
Powiązania:
https://bibliotekanauki.pl/articles/292316.pdf
Data publikacji:
2020
Wydawca:
Instytut Technologiczno-Przyrodniczy
Tematy:
architectural damage
flood
physical vulnerability
structural damage
Opis:
Flood with intense rainfall and inadequate drainage system leads to flood inundation in residential areas, which in turn damages the housing components and causes a loss. The different level of flood inundation at various affected locations caused varying degrees of losses. This study aimed to identify the damage conditions and analysed the physical loss of the residential building components. The physical vulnerability level is influenced by two damage qualification: the structural and architectural damages. The third-order polynomial function approach produces the best model for both qualifications, yielding the smallest average of errors (RMSE) of 0.0187 for the structural quality and 0.0672 for the architectural quality. The amount of losses related to the architectural elements of the house is smaller compared to the structural one as it is not its main component. This approach is useful as a guide in determining the post-flood handling rehabilitation cost of both structural and architectural elements that will be more appropriate for future conditions. This information is essential as effective management to design flood disaster mitigation strategies and may serve as a basis for flood risk management.
Źródło:
Journal of Water and Land Development; 2020, 46; 20-28
1429-7426
2083-4535
Pojawia się w:
Journal of Water and Land Development
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The Effect of Dual Hyperparameter Optimization on Software Vulnerability Prediction Models
Autorzy:
Bassi, Deepali
Singh, Hardeep
Powiązania:
https://bibliotekanauki.pl/articles/2203949.pdf
Data publikacji:
2023
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
software vulnerability
hyperparameter optimization
machine learning algorithm
data balancing techniques
data complexity measures
Opis:
Background: Prediction of software vulnerabilities is a major concern in the field of software security. Many researchers have worked to construct various software vulnerability prediction (SVP) models. The emerging machine learning domain aids in building effective SVP models. The employment of data balancing/resampling techniques and optimal hyperparameters can upgrade their performance. Previous research studies have shown the impact of hyperparameter optimization (HPO) on machine learning algorithms and data balancing techniques. Aim: The current study aims to analyze the impact of dual hyperparameter optimization on metrics-based SVP models. Method: This paper has proposed the methodology using the python framework Optuna that optimizes the hyperparameters for both machine learners and data balancing techniques. For the experimentation purpose, we have compared six combinations of five machine learners and five resampling techniques considering default parameters and optimized hyperparameters. Results: Additionally, the Wilcoxon signed-rank test with the Bonferroni correction method was implied, and observed that dual HPO performs better than HPO on learners and HPO on data balancers. Furthermore, the paper has assessed the impact of data complexity measures and concludes that HPO does not improve the performance of those datasets that exhibit high overlap. Conclusion: The experimental analysis unveils that dual HPO is 64% effective in enhancing the productivity of SVP models.
Źródło:
e-Informatica Software Engineering Journal; 2023, 17, 1; art. no. 230102
1897-7979
Pojawia się w:
e-Informatica Software Engineering Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Comparative analysis of the empirical seismic vulnerability of typical structures in multiple intensity zones
Autorzy:
Li, S. Q.
Yu, T. L.
Chen, Y. S.
Powiązania:
https://bibliotekanauki.pl/articles/230122.pdf
Data publikacji:
2019
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
sejsmiczność
porównanie podatności
analiza podatności
dane empiryczne
baza danych sejsmicznych
MDI
struktura typowa
seismicity
vulnerability comparison
vulnerability analysis
empirical data
seismic database
typical structure
Opis:
To study the difference in seismic vulnerability of multiple typical structures in multiple intensity zones, the seismic damage of 7099 buildings of Dujiangyan masonry structure (MS), reinforced concrete structure (RC) and bottom frame seismic wall masonry (BFM) in the 2008 Wenchuan earthquake in China is summarized and analysed. First, a statistical analysis of the data is carried out, the empirical seismic vulnerability matrix and model curves are established by considering the number of storeys, the age and the fortification factors.The vulnerability curves of the cumulative exceeding probability of the empirical seismic damage and the grade of the seismic damage in multiple intensity zones are shown. The mean damage index vulnerability matrix model is proposed and verified using the empirical seismic damage matrix of typical structures.
Źródło:
Archives of Civil Engineering; 2019, 65, 3; 167-183
1230-2945
Pojawia się w:
Archives of Civil Engineering
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Impacts of ICT on the Spatial Differentiation of Social Vulnerability to Natural Hazards in Poland
Autorzy:
Werner, Piotr
Iwańczak, Bartłomiej
Powiązania:
https://bibliotekanauki.pl/articles/1035986.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Warszawski. Wydział Geografii i Studiów Regionalnych
Tematy:
ICT
social vulnerability
natural hazards
electric energy
rebound effect
Polska
Opis:
The development of information and communication technologies (ICTs) has significant economic and social impacts at both the global and regional level. Some of these implications have been perceived as positive and unexpected. While both the positive and negative social and economic impacts have been highlighted in the literature, opinions on these impacts remain ambiguous. Those aspects considered to be advantageous include faster communication, ease of use, development in the range of services and revenues, and an increase in individuals’ free time allowance. ICT penetrates all branches of the economy as a set of general purpose technologies. New information and communication technologies ease everyday life, serve as tools to help people in extreme situations, e.g. accidents, illnesses or natural disasters, and are also the pillars of contemporary entertainment media. The usefulness of ICT has been stressed and loudly disseminated to a large extent by the media. On the other hand, these new technologies sensitize society in quite new ways to the well-known natural hazards that people have encountered in the past.
Źródło:
Miscellanea Geographica. Regional Studies on Development; 2015, 19, 4; 64-71
0867-6046
2084-6118
Pojawia się w:
Miscellanea Geographica. Regional Studies on Development
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
WRAŻLIWOŚĆ GOSPODARKI MONGOLII NA ZMIANY KLIMATYCZNE
THE VULNERABILITY OF MONGOLIAN ECONOMY TO CLIMATE CHANGES
Autorzy:
Erdenekhuu, Khaliunaa
Powiązania:
https://bibliotekanauki.pl/articles/658533.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Łódzki. Wydawnictwo Uniwersytetu Łódzkiego
Tematy:
zmiana klimatu
Mongolia
rozwój gospodarczy
wrażliwość
adaptacja
climate change
economic development
vulnerability
adaptation
Opis:
Nowadays climate change is one of the greatest global problems that affects in different extent particular countries and regions. Negative impact of global warming shows not only in form of ecosystem degradation, but also in affecting societies and economies. In this paper, based on available literature, a vulnerability of economy and society of Mongolia to climate change was presented. It is a starting point for assessment of adaptive capabilities of socio-economic system of Mongolia.
Dziś zmiany klimatu są jednym z głównych problemów globalnych, w różnym stopniu dotyczącym poszczególnych krajów i regionów. Niekorzystne oddziaływanie globalnego ocieplenia przejawia się nie tylko w degradacji ekosystemów, ale dotyka także społeczeństw i gospodarek. W artykule na podstawie dostępnej literatury przedstawiona została wrażliwość gospodarki i społeczeństwa Mongolii na zmiany klimatu. Stanowi to punkt wyjścia do oceny zdolności adaptacyjnej systemu społeczno-gospodarczego Mongolii do tych zmian.
Źródło:
Acta Universitatis Lodziensis. Folia Oeconomica; 2015, 2, 313
0208-6018
2353-7663
Pojawia się w:
Acta Universitatis Lodziensis. Folia Oeconomica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A regional variation in the vulnerability of socioeconomic systems to climate change. A case study of Poland
Autorzy:
Burchard-Dziubińska, Małgorzata
Grzelak, Maria
Powiązania:
https://bibliotekanauki.pl/articles/2123340.pdf
Data publikacji:
2022
Wydawca:
Uniwersytet w Białymstoku. Wydawnictwo Uniwersytetu w Białymstoku
Tematy:
climate change
vulnerability
sustainable development
insurance
Polska
Opis:
Purpose – The aim of the study was to identify the differences in the vulnerability of Polish voivod-ships to climate change, which may pose a threat to the sustainable development of particular regions. Research method – To achieve the purpose of the research, for each voivodship, a Synthetic Measure of Socioeconomic Vulnerability to Climate Change (SMSEVCC) was calculated. The SMSEVCC was applied in the linear ordering of objects characterized by several diagnostic variables, which were later replaced by one diagnostic value. Results – The implementation of sustainable development in Poland is strongly determined by cli-mate change and the associated extreme weather phenomena. The risk varies regionally and depends on the natural vulnerability of a given area that results from environmental conditions and the level of socioeconomic development. Originality /value / implications / recommendations –The paper presents a comprehensive analysis, eva-luation of socioeconomic vulnerability of voivodeships in Poland to climate change. Progress in the im-plementation of sustainable development requires strengthening adaptation measures to climate change, which should be adapted to the specifics of individual regions. An important element of actions for sustainable development should be the increased importance of the economic insurance system.
Źródło:
Optimum. Economic Studies; 2022, 2(108); 50-66
1506-7637
Pojawia się w:
Optimum. Economic Studies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Determination of Groundwater Vulnerability Using the DRASTIC Method in Ouargla Shallow Aquifer (Algerian Sahara)
Autorzy:
Satouh, Adel
Boualem, Bouselsal
Chellat, Smaine
Benaabidate, Lahcen
Powiązania:
https://bibliotekanauki.pl/articles/1838286.pdf
Data publikacji:
2021
Wydawca:
Polskie Towarzystwo Inżynierii Ekologicznej
Tematy:
Ouargla
shallow aquifer
vulnerability
DRASTIC
land-use
Opis:
Groundwater is the main source for many uses around the city of Ouargla. In this study, the DRASTIC method was used to assess the vulnerability of the groundwater aquifer. Seven hydrogeological parameters of the model (D water depth, R efficient charging, A aquifer type, S soil type, T topography, I unsaturated zone and C hydraulic conductivity) were measured and mapped. The intrinsic vulnerability map of the shallow aquifer, using the DRASTIC method, shows a high to very high vulnerability to pollution; 91.6% of the study area has high vulnerability, 8.4% of it has very high vulnerability. The comparison of the DRASTIC maps with the land use map illustrates that the agglomerations and irrigated areas are the most vulnerable areas to pollution, due to the low depth of the aquifer and the infiltration of significant domestic and irrigation wastewater. The results show that the relationship coefficient between the DRASTIC index and nitrate concentration is R = 0.73. This indicates that the groundwater vulnerability mapping by using the DRASTIC method can be applied for sensible groundwater resources management and land-use planning in the study area.
Źródło:
Journal of Ecological Engineering; 2021, 22, 6; 12-19
2299-8993
Pojawia się w:
Journal of Ecological Engineering
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Determination of Groundwater Vulnerability Using the DRASTIC Method in Ouargla Shallow Aquifer (Algerian Sahara)
Autorzy:
Satouh, Adel
Boualem, Bouselsal
Chellat, Smaine
Benaabidate, Lahcen
Powiązania:
https://bibliotekanauki.pl/articles/1838393.pdf
Data publikacji:
2021
Wydawca:
Polskie Towarzystwo Inżynierii Ekologicznej
Tematy:
Ouargla
shallow aquifer
vulnerability
DRASTIC
land-use
Opis:
Groundwater is the main source for many uses around the city of Ouargla. In this study, the DRASTIC method was used to assess the vulnerability of the groundwater aquifer. Seven hydrogeological parameters of the model (D water depth, R efficient charging, A aquifer type, S soil type, T topography, I unsaturated zone and C hydraulic conductivity) were measured and mapped. The intrinsic vulnerability map of the shallow aquifer, using the DRASTIC method, shows a high to very high vulnerability to pollution; 91.6% of the study area has high vulnerability, 8.4% of it has very high vulnerability. The comparison of the DRASTIC maps with the land use map illustrates that the agglomerations and irrigated areas are the most vulnerable areas to pollution, due to the low depth of the aquifer and the infiltration of significant domestic and irrigation wastewater. The results show that the relationship coefficient between the DRASTIC index and nitrate concentration is R = 0.73. This indicates that the groundwater vulnerability mapping by using the DRASTIC method can be applied for sensible groundwater resources management and land-use planning in the study area.
Źródło:
Journal of Ecological Engineering; 2021, 22, 6; 12-19
2299-8993
Pojawia się w:
Journal of Ecological Engineering
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Development of the flood vulnerability index using a multi-element approach
Autorzy:
Hidayah, Entin
Agung Wiyono, Retno Utami
Wicaksono, Ageng Dwi
Powiązania:
https://bibliotekanauki.pl/articles/1841942.pdf
Data publikacji:
2021
Wydawca:
Instytut Technologiczno-Przyrodniczy
Tematy:
analytical hierarchy process
fluvial flood
multi-element
vulnerability index
Opis:
The problem of flood vulnerability has been reviewed in several studies, however, the reviews focused exclusively either on the social or on the physical component of the problem. The components of flood vulnerability are interdependent and each of them makes an equally important contribution to the flood vulnerability index. This study identifies and evaluates the integrated flood vulnerability index (FVI) of an area by considering its multiple components (social, economic, and environmental). The Analytic Hierarchy Process (AHP) method was applied to evaluate the weight of each component. The evaluation was based on the judgements of experts working at local government policy-making agencies. The input data for the AHP were acquired through a questionnaire survey. Eleven indicators that delivered significant results were then selected. The FVI results show high flood vulnerability at the local scale. The FVI provides the basis for the identification of villages with high vulnerability indices. The results provide essential information about pluvial flood vulnerability at the local scale, about the area with the highest vulnerability index, and the most vulnerable villages. The results also show that the components that have a significant impact on the flood vulnerability index include environmental components (43.4%), social components (28.5%), and physical components (28.1%).
Źródło:
Journal of Water and Land Development; 2021, 50; 255-264
1429-7426
2083-4535
Pojawia się w:
Journal of Water and Land Development
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Vulnerability of Rural Areas to Climate Change – Analysis of Similar Units in Terms of Spatial Conditions for Warmińsko-Mazurskie Voivodeship
Autorzy:
Kocur-Bera, Katarzyna
Powiązania:
https://bibliotekanauki.pl/articles/124808.pdf
Data publikacji:
2019
Wydawca:
Polskie Towarzystwo Inżynierii Ekologicznej
Tematy:
climate change
exposure
vulnerability
space's adaptive capacity
Opis:
In the current decade, the fact that climate change is a continuous process and that humans have been contributing to this change is indisputable. Therefore, the whole society and the decision-makers who guide the process of application of regional policy principles, are facing a challenge as to which measures need to be taken to minimise the consequences of this change. Although we live in a global world, it can be observed that interactions occur in each unit on an individual basis. As we have more and more knowledge and information on the space, we can indicate which units, regions and spaces have the greatest predisposition to be subject to climate change. Moreover, being aware of the level of risk, we can attempt to implement tools that will help society to accept climate change and properly adapt to it. A space’s predisposition to climate change is not only determined by the weather, environmental or geographical conditions. The literature on the subject indicates three basic determinants of the predisposition, i.e. the exposure, vulnerability and the adaptive capacity. Only all of these elements grouped together can provide an answer to the question about a unit’s predisposition. The article focuses on the indices which represent all three determinants of the predisposition. It should be noted that depending on the availability of data and their aggregation, there is no possibility of using the same indices for all countries. This, however, does not prevent the performance of a uniform analysis for spaces included in the same statistics. The article presents a case study for agricultural land in the province of Warmia and Mazury. Using Ward’s method, four subregions with similar determinants of the predisposition to climate change were distinguished. Three subregions stand out, as two of them have a significant impact of exposure (S.1) and vulnerability (S.2), while the third subregion dominates in terms of adaptive capacity (S.4).
Źródło:
Journal of Ecological Engineering; 2019, 20, 6; 198-206
2299-8993
Pojawia się w:
Journal of Ecological Engineering
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
An integrated assessment of vulnerability to water scarcity measurement in small islands of Indonesia
Autorzy:
Kusumartono, F. X. Hermawan
Rizal, Achmad
Powiązania:
https://bibliotekanauki.pl/articles/1076715.pdf
Data publikacji:
2019
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
adaptation
fresh water
small islands
social capital
sustainability
vulnerability index
Opis:
Water scarcity, especially in the small islands of Indonesia, has caused trouble for social maintenence of water needs. While many instruments have been developed to measure community vulnerability indexes, the majority do not reflect the overall condition. Therefore, this research will formulate a vulnerability index for water fulfillment in small islands, using a comprehensive method so that the result can be used as a reference in policy-making. This research applied the deductive-positivist approach of the quantitative method. It started off with establishing the dimensions of vulnerability: exposure, adaptive capacity, and sensitivity. These were then operationalized into indicator/parameter of indexes to measure vulnerable conditions. The result shows that this vulnerability index can be utilized as a basis for policy decision-making as it considers the attributes that had proved to be sustainable. To reduce vulnerability in small islands, there is a need for a policy that considers community capacity and adaptive patterns that could improve their social and economic capital.
Źródło:
World News of Natural Sciences; 2019, 24; 117-133
2543-5426
Pojawia się w:
World News of Natural Sciences
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Vulnerability assessment of structures along river channels in Oyo metropolis, Oyo State, Nigeria
Autorzy:
Odedare, Kayode Oyeniyi
Amusa, Idowu Adigun
Titus Olusina, Titus Olusina
Gbiri, Isaac Adelakun
Powiązania:
https://bibliotekanauki.pl/articles/1179180.pdf
Data publikacji:
2017
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
Assessment
Vulnerability
flood and hazards
metropolis
Opis:
This study makes use of Remote Sensing and Geographic Information System techniques to assess the vulnerability of structures along river channels in Oyo metropolis. The vulnerable rates were classified into High, Medium and Low using 30m, 45m and 60m buffer distances from the middle of the river channels while network analysis was also carried out to attend to any emergency operation. To achieve this feat, a geospatial database was designed and created with various analyses carried out on the entities extracted from the satellite image of the study area. Such analyses include, buffering to categorize the vulnerable zones into the various classes, network analyst menu of ArcGIS 10.2.2 was employed to find the best route from the Fire Service Station to the point of accident and also an alternative route in case of a barrier or barriers on the best route. This showed that a total of 881 buildings will be affected in any instance of flooding that is within 60m from the middle of the river channels in the study area. 399 buildings fall in high vulnerable zone accounting for 45.29% of the buildings examined for vulnerability in the study area, 245 buildings fall within the moderately vulnerable zone accounting for 27.81% and 237 buildings fall within low vulnerable zone at 26.90%. The best route from the Fire Service Station to the point of accident is gotten to be 2.3 Km while the alternative route is 2.7 Km when a barrier is placed on the best route during rescue mission indicating 0.4 Km difference between the two routes. Maps, tables and a chart were produced for various results.
Źródło:
World Scientific News; 2017, 83; 130-149
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
"Lissa": An EthnoGraphic Experiment
Autorzy:
Ferens, Dominika
Powiązania:
https://bibliotekanauki.pl/articles/1366501.pdf
Data publikacji:
2020
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
graphic novel
ethnography
vulnerability
body illness
Opis:
The paper analyzes a recent experiment in the collaborative production of ethnographic knowledge and the use of the graphic novel form as an alternative to the conventional academic monograph. Lissa: A Story about Medical Promise, Friendship, and Revolution (2017) is discussed here as a useful tool in the age of globalization for building recognition of the need to protect the lives of people other than our immediate kin, tribe, race, or nation. The paper argues that both the collaborative research behind the story and the formal experimentation stem from the authors’ sense of accountability to their informants. By telling a story about distant others who are given names and faces, Lissa’s authors encourage readers to develop empathy across borders.
Źródło:
Lublin Studies in Modern Languages and Literature; 2020, 44, 2; 83-97
0137-4699
Pojawia się w:
Lublin Studies in Modern Languages and Literature
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Flood risk and vulnerability in the changing climate
Ryzyko i wrażliwość na powodzie w zmieniającym się klimacie
Autorzy:
Kundzewicz, Z.W.
Powiązania:
https://bibliotekanauki.pl/articles/81497.pdf
Data publikacji:
2008
Wydawca:
Szkoła Główna Gospodarstwa Wiejskiego w Warszawie. Wydawnictwo Szkoły Głównej Gospodarstwa Wiejskiego w Warszawie
Tematy:
flood risk
risk
vulnerability
climate change
heavy precipitation
flood protection
flood preparedness
Opis:
Floods are a natural phenomenon, striking the humankind since the dawn of history. Yet, recent fl ood damages are dramatically higher than before, so that it is necessary to seek interpretation of this fact. River fl ooding is a complex phenomenon which can be affected by changes coupled to physical, terrestrial, climate and socio-economic systems. The climate track in the observed changes is likely, even if human encroaching into the harm’s way and increase in the damage potential in fl oodplains can be the dominating factors in many river basins. Increase in heavy precipitation has been observed, with consequences to increasing risk of rain-induced fl ooding. Projections for the future, based on regional climate models, indicate increase of fl ood risk and vulnerability in many areas. Impacts on urban fl ooding, in a multi-factor context are examined. The present contribution is following the global IPCC perspective, in the context of the IPCC Fourth Assessment Report and the IPCC Technical Paper on Water, where ZWK was a Coordinating Lead Author.
Powodzie są zjawiskiem naturalnym, które nęka ludzkość od początku historii. Jednak w ostatnich latach straty powodziowe są znacznie wyższe niż kiedyś, więc trzeba szukać interpretacji tego faktu. Powodzie rzeczne są złożonym procesem, na który wpływać mogą zmiany związane z systemami fizycznymi, klimatycznymi i społeczno-ekonomicznymi. Udział klimatu w obserwowanych zmianach jest prawdopodobny, nawet jeśli wkraczanie ludzi na tereny zagrożone powodzią i wzrost potencjału strat na obszarach zalewowych mogą być w wielu zlewniach rzecznych czynnikiem dominującym. Zaobserwowano wzrost silnych opadów, a w konsekwencji – rosnące ryzyko wezbrań deszczowych. Projekcje na przyszłość, oparte na regionalnych modelach klimatu, wskazują na wzrost ryzyka i wrażliwości na powodzie w wielu regionach. Rozważono konsekwencje dla wezbrań na obszarach zurbanizowanych, w kontekście wielu czynników. Obecny artykuł przedstawia globalną perspektywę IPCC, w kontekście Czwartego Raportu IPCC oraz technicznego dokumentu dotyczącego zmian klimatu i wody, gdzie ZWK pełnił rolę koordynatora i autora prowadzącego.
Źródło:
Annals of Warsaw University of Life Sciences - SGGW. Land Reclamation; 2008, 39
0208-5771
Pojawia się w:
Annals of Warsaw University of Life Sciences - SGGW. Land Reclamation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Assessment of groundwater vulnerability to pollution in an Arid environment
Autorzy:
Slimani, Rabia
Charikh, Messaouda
Aljaradin, Mohammad
Powiązania:
https://bibliotekanauki.pl/articles/27311555.pdf
Data publikacji:
2023
Wydawca:
Polska Akademia Nauk. Czasopisma i Monografie PAN
Tematy:
Groundwater
Vulnerability
pollution
Risks
GIS
Algerian Sahara
wody gruntowe
podatność na skażenie
zanieczyszczenie
ryzyko
Sahara Algierska
Opis:
This study focuses on mapping the groundwater’s vulnerability to pollution in the region of Ouargla, located in the North-East of the northern Sahara, exposed to potential risks of alteration. By applying the methods (GOD, DRASTIC, and SINTACS), coupled with a Geographic Information System (GIS), we were able to identify a medium to high vulnerability trend. In light of the results recorded, the DRASTIC and SINTACS methods prove to be more suitable for our study region. This makes it possible to highlight the recharge zones and land use as being the most vulnerable in the territory studied. The GOD method presents a strong vulnerability trend over 77.02% of the study area. Such a result is directly related to the depth of the water table. It can therefore be argued that this method is far from being representative of the reality on the ground because of these very heterogeneous characteristics.
Źródło:
Archives of Environmental Protection; 2023, 49, 2; 50--58
2083-4772
2083-4810
Pojawia się w:
Archives of Environmental Protection
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Podatność naturalna i specyficzna wód podziemnych na obszarach rolniczych
Intrinsic and specific groundwater vulnerability in the agricultural areas
Autorzy:
Zabłocki, S.
Powiązania:
https://bibliotekanauki.pl/articles/2075260.pdf
Data publikacji:
2015
Wydawca:
Państwowy Instytut Geologiczny – Państwowy Instytut Badawczy
Tematy:
wrażliwość
wody podziemne
zagospodarowanie terenu
rolnictwo
azotany
vulnerability
groundwater
land use
agriculture
nitrates
Opis:
The main aim of the work was to evaluate intrinsic and specific vulnerability of groundwater. An assessment of intrinsic vulnerability to groundwater pollution was elaborated on the basis of the original DRASTIC method. An assessment of specific vulnerability to groundwater pollution by nitrate was elaborated by two independent methods. First method – Nitrate Vulnerability Index (NV) was an adaptation of DRASTIC method, second was based on the quotient of nitrate loads (LN) and recharge rate (R), and expected nitrate concentration (NO3exp) were computed in this method. The results were presented in the relation to four homogenous regions called hydrozones: upland, top of the upland, plain and valley. The results of the DRASTIC method indicated on higher vulnerability of the aquifer in the plain (average IPZ = 155) and lower in the upland (IPZ = 125). The results of both specific vulnerability methods confirmed high vulnerability of the aquifer in the upland unit (the nitrate concentration in the range of 10–25 mg/dm3 in 25% of the unit area; average NV = 94) and lower in the plain area (the range of 0–5 mg/dm3 in the 47% /of unit area; average NV = 81). The results present a high difference between intrinsic and specific vulnerability mainly caused by agricultural activity in the upland.
Źródło:
Przegląd Geologiczny; 2015, 63, 10/2; 1135--1139
0033-2151
Pojawia się w:
Przegląd Geologiczny
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Seismic vulnerability functional method for rapid visual screening of existing buildings
Autorzy:
Yadollahi, M.
Adnan, A.
Zin, R. M.
Powiązania:
https://bibliotekanauki.pl/articles/230200.pdf
Data publikacji:
2012
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
redukcja ryzyka
wrażliwość sejsmiczna
budynek
obrazowanie szybkie
risk reduction
seismic vulnerability
rapid visual screening
building
Opis:
Rapid Visual Screening (RVS) method for buildings was originally developed by the Applied Technology Council (ATC) in the late 1980’s for potential seismic hazards. This is a simple and almost a quick way of assessing the building seismic vulnerability score based on visual screening. The logarithmic relationship between final score and the probability of collapse at the maximum considered earthquake (MCE) makes results somewhat difficult to interpret, especially for less technical users. This study is developed to improve the simplicity and usefulness of RVS methodology to determine the numeric scores for seismic vulnerability of buildings using vulnerability functional form. The proposed approach applies the existing method in FEMA 154 (2002) for calculating the building rank based on RVS method. In this study RVS scores are used to evaluate populations of buildings to prioritize detailed evaluations and seismic retrofits. The alternate non-logarithmic format of scoring scheme is much better meeting the needs of the project managers and decision makers, as they require results that are easier to understand. It shows the linear equivalent of RVS final scores which is consistent with the existing ranking systems used in the buildings management program such as budget allocation decision making. The results demonstrate that the weight determined for the factor of “Region Seismicity”, which is 0.4033, has the highest contribution to seismic vulnerability scores of buildings. The applicability of the proposed method is demonstrated through a hypothetical example to rank ten seismically vulnerable buildings.
Źródło:
Archives of Civil Engineering; 2012, 58, 3; 363-377
1230-2945
Pojawia się w:
Archives of Civil Engineering
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
VULNERABILITY IN FAMILY AND CREATIVITY SUPPORT BY LIVING-LEARNING WORKSHOPS
ZRANIENIA W RODZINIE I KREATYWNA PODPORA POPRZEZ WARSZTATY ŻYWEGO UCZENIA
Autorzy:
Szopiński, Józef
Powiązania:
https://bibliotekanauki.pl/articles/479763.pdf
Data publikacji:
2017
Wydawca:
Wyższa Szkoła Humanitas
Tematy:
Living-Learning,
vulnerability,
family,
growth
Żywe uczenie,
słabość,
rodzina,
dojrzałość,
wzrost
Opis:
The family is a source of greatest creativity, but also, at times, a source of greatest vulnerability. Neither of these factors can remain hidden within the family relations, but they manifest themselves in professional life. Here, we focus on exploring vulnerabilities which do not allow a person to use his or her creative potential, in a way that is similar to the disproportionate growth of the seed in the picture. The author found that, by providing Living Learning workshops in which participants are encouraged to examine and face family dynamics,creative energy may be generated in the context of their own personal growth and applied not only in the workplace, but also in successful performance in society. Qualitative language is used in the paper, which is based on actual field experience in the form of workshops for managers and leaders in the business, educational, and spiritual fields. The article includes only a small example of narratives to pinpoint certain family-related aspects that can exert a powerful influence upon self-image and self-efficacy towards creative action in society.
Rodzina może być albo źródłem kreatywności, albo źródłem zranień. Żaden z tych czynników nie ogranicza się tylko do systemu rodzinnego, ale manifestuje się także w życiu zawodowym. W tym artykule skupiono się na odkrywaniu czynnika słabości, który nie pozwala danej osobie na użycie swojego kreatywnego potencjału, który można porównać do nasiona,które nie jest w stanie wydać dużego owocu. Autor sugeruje, że poprzez warsztaty Żywego uczenia uczestnicy zachęcani są do tego, aby rozpoznać dynamikę funkcjonowania swojej rodziny oraz odkrywać kreatywną energię, która jest generowana w kontekście ich osobistego wzrostu i aplikowana nie tylko w ich miejscu pracy, ale która ujawnia się także w życiu społecznym. Jakościowy język, użyty w tym artykule, wynika z ostatnich lat pracy autora z menedżerami i liderami w zakresie biznesu, edukacji i kapłaństwa. Zawiera nie tylko przykład funkcjonowania danych czynników, według których funkcjonuje rodzina, ale wskazuje jak te czynniki wpływają na sposób widzenia siebie oraz skuteczność własnego działania w społeczeństwie.
Źródło:
Zeszyty Naukowe Wyższej Szkoły Humanitas. Pedagogika; 2017, 15; 277-286
1896-4591
Pojawia się w:
Zeszyty Naukowe Wyższej Szkoły Humanitas. Pedagogika
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
PODATNOŚĆ NA STRES ZAWODOWY PRACOWNIKÓW BANKÓW
OCCUPATIONAL STRESS VULNERABILITY OF BANK EMPLOYEES
Autorzy:
Białczyk, Katarzyna
Wyszkowska, Zofia
Powiązania:
https://bibliotekanauki.pl/articles/446870.pdf
Data publikacji:
2017
Wydawca:
Mazowiecka Uczelnia Publiczna w Płocku
Tematy:
podatność na stres
temperament afektywny
pracownicy banku
Stres zawodowy
occupational stress
stress vulnerability
affective temperament
bank employees
Opis:
Badania nad stresem zawodowym koncentrują się obecnie nad określeniem indywidualnych predyspozycji do pracy w warunkach dystresu psychologicznego. Stres przewlekły lub o wysokim natężeniu jest istotny w etiologii wypalenia zawodowego, zwiększonej chorobowości,w tym na choroby psychiczne. Współczesne badania wskazują znaczenie pięciu wymiarów temperamentu afektywnego w percepcji stresu zawodowego w pracy o dużym nasileniu stresu. Temperament depresyjny, cyklotymiczny, drażliwy i lękowy wiążą się z mniejszą odpornością na stres zawodowy, podczas gdy wymiar hiertymiczny ma znaczenie protekcyjne. Koncepcja temperamentu afektywnego może okazać się przydatna w badaniu etiologii stresu zawodowego i jego następstw u pracowników sektora bankowości.
The study on occupational stress are currently concentrating on individual predisposition to work in psychological distress identification. Prolonged or high intensity occupational stress is considered to be of significance in etiology of burnout syndrome, high rate of illnesses and psychiatric disorders. Recent studies have indicated the importance of five dimensions of affective temperament in occupational stress perception of excessively stressful work. Depressive, cyclothymic, irritable and anxious tempers are associated with lower stress resistance, while hyperthymic ones show protective action. The concept of affective temperament may occur as useful in studies on etiology and consequences of occupational stress of bank sector employees.
Źródło:
Zeszyty Naukowe PWSZ w Płocku. Nauki Ekonomiczne; 2017, 2(26); 339-353
1644-888X
Pojawia się w:
Zeszyty Naukowe PWSZ w Płocku. Nauki Ekonomiczne
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Socio-environmental vulnerability of water in the estuary of the metropolitan region of Santos (Brazil)
Autorzy:
Martins, Fernando L.C.
Giordano, Fabio
Barrella, Walter
Powiązania:
https://bibliotekanauki.pl/articles/2043628.pdf
Data publikacji:
2021-12-30
Wydawca:
Uniwersytet im. Adama Mickiewicza w Poznaniu
Tematy:
population growth
slums
shantytown
coastal zone
urban slums
urban vulnerability
Opis:
Santos and São Vicente Estuarine Complex (SSEC) is a densely populated coastal area that houses the main port in Latin America and the most prominent Brazilian industrial complex. Irregular occupations in preservation areas result in a disorderly increase in population, with negative social and environmental impacts. We evaluated the average annual growth of 74 slums occurring in this area and variations in water quality from 2005 to 2018. We monitor the growth of the occupied areas and estimate their respective populations. The average annual population growth was over 6% per year (p.a.). Invasions of new areas and verticalisation of already occupied areas represent 85% of the growth seen. The monthly polluting loads exceeded 450 tonnes or 2,086,000 m3, compromising the waters and local and regional public health. We strongly recommend re-urbanising the area using the resource savings caused by water loss to reduce the risks of ecosystem degradation, damage to health and disease spread.
Źródło:
Quaestiones Geographicae; 2021, 40, 4; 113-125
0137-477X
2081-6383
Pojawia się w:
Quaestiones Geographicae
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Critical infrastructure preparedness : cascading of disruptions considering vulnerability and Dependency
Autorzy:
Eid, M.
Hakkarainen, T.
Terhi, K.
Souza-Cursi-de, E.
El-Hami, A.
Powiązania:
https://bibliotekanauki.pl/articles/2069144.pdf
Data publikacji:
2016
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
CIP
cascade
disruption
vulnerability
dependency
model
simulation
stochastic
Poisson
probability
Opis:
Critical Infrastructures’ disruptions may result in crises of unacceptable outcomes in modern societies. Thus, it is important to develop models that allow describing CIs’ disruptions and their propagation characteristics. CI disruptions depend on both the type of the threat and on the nature of the CIs’ mutual dependencies. A model describing the cascade of disruptions should, then, be able to consider the CI-threat vulnerability and the CI-CI dependency. The paper presents a model where cascades are exactly described using an integral equation. The integral equation admits an analytical solution if the occurrence probability distribution functions (pdf) of the disruptions obey Stochastic Poisson Processes (SPP). The introduction of the “vulnerability to the threat” and the “CIs’ (inter)dependencies” is carried out with the help of time constant factors called: “vulnerability strain factor” and “disruption strain factor”, respectively. An academic case is presented in order to demonstrate the applicability of the model and illustrate some interesting features of the model. A complete set of numerical applications will be published separately.
Źródło:
Journal of Polish Safety and Reliability Association; 2016, 7, 1; 61--66
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Use of slope failures inventory and climatic data for landslide susceptibility, vulnerability, and risk mapping in souk Ahras region
Autorzy:
El Mekki, A.
Hadji, R.
Chemseddine, F.
Powiązania:
https://bibliotekanauki.pl/articles/88942.pdf
Data publikacji:
2017
Wydawca:
Politechnika Wrocławska. Wydział Geoinżynierii, Górnictwa i Geologii. Instytut Górnictwa
Tematy:
risk
GIS
vulnerability
slope failures
landslide susceptibility
Opis:
Slope failures (SF) in mountainous terrain often occur during or after heavy rainstorms, resulting in the loss of life and damage to the natural and/or built environment. Assessing areas susceptible to SF is essential for land use planning in threatened areas. This article presents an didactic basedanalysis of the potential contribution to geo-spatial approaches for predicting SF qualitative exposure in mountainous environment. Its main aim is to assess the impact of the geologic, geomorphic, rainstorms, and anthropogenic factors in the initiation of SF in Zaarouria region. 219 events (1996–2016) were inventoried through images interpretation and field surveys and were compared to the physical parameters of the terrain to give a SF susceptibility index value using a simplified model. Vulnerability and risk maps are also established. The Standard deviation classification was used to delineate various susceptibility, vulnerability and risk zones, namely, nil, low, moderate and high. Field data on SF were employed to evaluate and validate the susceptibility zonation map. The results of this study demonstrate that SF are largely governed not only by geoenvironmental conditions but also by human activities, mainly roads and construction.
Źródło:
Mining Science; 2017, 24; 237-249
2300-9586
2353-5423
Pojawia się w:
Mining Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Analysis and modelling of territorial vulnerability to epidemiological diseases in the Wilaya of Batna (Algeria) – case of tuberculosis
Autorzy:
Asma, Douha
Mahdi, Kalla
Powiązania:
https://bibliotekanauki.pl/articles/2029709.pdf
Data publikacji:
2021
Wydawca:
Uniwersytet Rolniczy im. Hugona Kołłątaja w Krakowie
Tematy:
GIS
AHP
tuberculosis
Batna
vulnerability
environment
gruźlica
środowisko
podatność na zagrożenia
Opis:
Some epidemiological situations, because of their magnitude and their propagation dynamics, can escape local or national control. For example, the world is currently experiencing an uncontrollable cross-border spread of the corona virus (Covid-19). The Wilaya of Batna is among the most affected in Algeria by many epidemiological diseases, including tuberculosis, which raises questions about possible causal links between this contagious and often fatal disease and the environmental and socio-economic reality of this territory. We based our study on a number of factors, covering economic, societal and health aspects, which constitute indicators of the standard of living in each of the 61 communes of the Wilaya of Batna. The relationship between the epidemiological status of tuberculosis in these communes and these indicators showed significant correlations and thus confirmed the reliability of the choice of parameters of vulnerability to tuberculosis. To understand their interaction and impact on the disease and its spatial distribution, we used the hierarchical multicriteria analysis (AHP) method, the results of which were implemented in a GIS database. The aim was to provide health and territorial decision makers with a decision support tool. The results show that the spatial distribution of tuberculosis cases which reappeared in the Wilaya of Batna after its eradication since years is in good correlation with the socio-economic situation of each commune of the territory and confirm that this scourge of tuberculosis is closely linked to the degradation of the living conditions of the inhabitants.
Źródło:
Geomatics, Landmanagement and Landscape; 2021, 4; 31-45
2300-1496
Pojawia się w:
Geomatics, Landmanagement and Landscape
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Assessment of coastal vulnerability in Chabahar Bay due to climate change scenarios
Autorzy:
Armanfar, M.
Goharnejad, H.
Niri, M.Z.
Perrie, W.
Powiązania:
https://bibliotekanauki.pl/articles/48175.pdf
Data publikacji:
2019
Wydawca:
Polska Akademia Nauk. Instytut Oceanologii PAN
Tematy:
climate change
sea level rise
coast vulnerability
wind speed
storm
bathymetry
Chabahar Bay
Źródło:
Oceanologia; 2019, 61, 4
0078-3234
Pojawia się w:
Oceanologia
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Praktyczne aspekty oceny podatności wód podziemnych na zanieczyszczenie metodą drastic
Practical aspects of assessing groundwater vulnerability to pollution using drastic system
Autorzy:
Kondratiuk, P.
Powiązania:
https://bibliotekanauki.pl/articles/908414.pdf
Data publikacji:
2013
Wydawca:
Fundacja Ekonomistów Środowiska i Zasobów Naturalnych
Tematy:
wody podziemne
podatność na zanieczyszczenia
DRASTIC
groundwater
vulnerability to pollution
DRASTIC system
Opis:
Wody podziemne są jednym z ważniejszych abiotycznych elementów środowiska przyrodniczego, w stosunku do którego prowadzi się działania ochronne. W większości kraju są one bowiem podstawowym źródłem wody pitnej i na potrzeby gospodarcze. Coraz większą uwagę zwraca się na procedury pozwalające zminimalizować zagrożenie zanieczyszczenia tych wód. W praktyce, w wyraźny sposób, znajduje to odzwierciedlenie w raportach oddziaływania na środowisko sporządzanych przy realizacji inwestycji zagrażających środowisku. Często istotnym, a w wielu przypadkach niezbędnym elementem takiego raportu jest ocena podatności wód podziemnych na zanieczyszczenia.
Assessment of groundwater vulnerability to pollution is important for its utilization and the resources protection. The DRASTIC model is one of the mostly often used models for groundwater vulnerability assessment. The model uses seven environmental parameters. The model can be modified, basing on local hydrogeological conditions, in order to obtain more reliable results. In this study two variants of the model were tested. It was found that the DRASTIC model in the environmental conditions of NE Poland gives correct, sensible results and should be recommended for practical use. However, standardization of the method would be a good idea and would make the method more widely applicable.
Źródło:
Ekonomia i Środowisko; 2013, 4; 87-95
0867-8898
Pojawia się w:
Ekonomia i Środowisko
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Evaluation of intrinsic vulnerability of an Upper Jurassic karst-fissured aquifer in the Jura Krakowska (southern Poland) to anthropogenic pollution using the DRASTIC method
Autorzy:
Różkowski, J.
Powiązania:
https://bibliotekanauki.pl/articles/2059477.pdf
Data publikacji:
2007
Wydawca:
Państwowy Instytut Geologiczny – Państwowy Instytut Badawczy
Tematy:
Silesian-Cracow Monocline
karst-fissured waters
vulnerability to pollution
DRASTIC
Opis:
This paper demonstrates the evaluation of in trinsic vulnerability of karst-fissured waters in an Upper Jurassic aquifer by applying modified DRASTIC method. The area investigated is the Jura Krakowska (South Poland) - an area of upland merokarst (or relictkarst), where the Upper Jurassic aquifer is mainly unconfined. The method applied is a combination of a simulation model of the ground water aquifer (factors: netre charge, hydraulic conductivity, ground wa ter flow velocity in the aquifer) and a geographical in formation system - GIS model (depth of ground water table, lithology of vadosezone, thickness of Upper Jurassic aquifer), and additionally a soil factor was taken into account. In the area of the Jura Krakowska, 5 classes of intrinsic vulnerability to pollution were distinguished according to the values of vulnerability factors. These classes range from extremely high to low vulnerability (IP 200-50). Based on the synthetic map of vulnerability it emerges that high vulnerability indices cover 54% of the area studied while medium and low vulnerability indices cover 46% of this area. The modified DRASTIC method presented seems to be a useful tool to evaluate the intrinsic vulnerability of karst-fis sured aquifers of "Torcal" type with a scattered system of recharge and discharge, and a thick vadosezone of variable permeability. This is consistent with the method developed with European programme COST ACTION 620. All rating methods recommended for karst have limitations, there fore the method applied is constantly updated. Many of them are particularly use ful for areas of bare karst, mountain systems of "Aliou" type and in ar eas of complete karst develop ment (holokarst).
Źródło:
Geological Quarterly; 2007, 51, 1; 17-26
1641-7291
Pojawia się w:
Geological Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Poziom wrażliwości łańcuchów dostaw a zdolności wzmacniające ich odporność
The level of supply chains vulnerability and abilitiesstrengthening their resilience
Autorzy:
Zaczyk, M.
Powiązania:
https://bibliotekanauki.pl/articles/324439.pdf
Data publikacji:
2018
Wydawca:
Politechnika Śląska. Wydawnictwo Politechniki Śląskiej
Tematy:
supply chain vulnerability
supply chain resilience
steel products
wrażliwość łańcucha dostaw
odporność łańcucha dostaw
wyroby hutnicze
Opis:
The activity of steel products' supply chains in today's realities is exposed to numerous disruptions resulting from operating in a turbulent environment full of unforeseen negative phenomena, as well as from the way of managing the supply chains themselves. This susceptibility to disruptions is called the vulnerability of the supply chain, the level of which is measurable. This article aims to show how to assess the level of supply chains' vulnerability and to present the research leading to the determination of vulnerability level for five example supply chains of steel products. In addition, the article presents a set of thirteen capabilities that respond to supply chains for excessive vulnerability. They were called capacities that strengthen the resilience of the supply chain. The level of these abilities is also possible to investigate, and this article describes one of the ways to achieve it. In the article, a procedure was carried out to assess the thirteen abilities to shape resilience for five exemplary steel products' supply chains. Conclusions from conducted sensitivity and resilience analyzes are the construction of the resilience map and a table summarizing the options for strengthening resilience for five steel products' supply chains considered in this article.
Działalność łańcuchów dostaw wyrobów hutniczych w dzisiejszych realiach narażona jest na liczne zakłócenia, wynikające z funkcjonowania w turbulentnym otoczeniu pełnym nieprzewidzianych zjawisk o charakterze negatywnym, a także ze sposobu zarządzania samymi łańcuchami dostaw. Ta podatność na zakłócenia określana jest mianem wrażliwości łańcucha dostaw, której poziom możliwy jest do zmierzenia. Niniejszy artykuł ma na celu wskazanie sposobu prowadzenia oceny poziomu wrażliwości łańcuchów dostaw oraz prezentację badań prowadzących do określenia tegoż poziomu w przypadku pięciu przykładowych łańcuchów dostaw wyrobów hutniczych. Ponadto, w artykule zaprezentowano zestaw trzynastu zdolności stanowiących odpowiedź łańcuchów dostaw na nadmierną wrażliwość. Nazwano je zdolnościami wzmacniającymi odporność łańcucha dostaw. Poziom tych zdolności jest również możliwy do zbadania, a niniejszy artykuł opisuje jeden ze sposobów do tego prowadzący. W artykule przeprowadzono procedurę oceny trzynastu zdolności do kształtowania odporności dla pięciu przykładowych łańcuchów dostaw wyrobów hutniczych. Wnioski z przeprowadzonych analiz wrażliwości oraz odporności stanowi konstrukcja mapy odporności oraz tabeli podsumowującej warianty wzmacniania odporności pięciu rozpatrywanych w niniejszym artykule łańcuchów dostaw wyrobów hutniczych.
Źródło:
Zeszyty Naukowe. Organizacja i Zarządzanie / Politechnika Śląska; 2018, 129; 631-642
1641-3466
Pojawia się w:
Zeszyty Naukowe. Organizacja i Zarządzanie / Politechnika Śląska
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Podatność na zagrożenia procesów logistycznych - problem oceny
Vulnerability of logistic process - evaluation problems
Autorzy:
Nowakowski, T.
Powiązania:
https://bibliotekanauki.pl/articles/793902.pdf
Data publikacji:
2017
Wydawca:
Szkoła Główna Gospodarstwa Wiejskiego w Warszawie. Wydawnictwo Szkoły Głównej Gospodarstwa Wiejskiego w Warszawie
Źródło:
Zeszyty Naukowe Szkoły Głównej Gospodarstwa Wiejskiego w Warszawie. Ekonomika i Organizacja Logistyki; 2017, 2[2]
2450-8055
Pojawia się w:
Zeszyty Naukowe Szkoły Głównej Gospodarstwa Wiejskiego w Warszawie. Ekonomika i Organizacja Logistyki
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Groundwater vulnerability based on four different assessment methods and their quantitative comparison in a typical North European Lowland river catchment (the Pliszka River catchment, western Poland)
Autorzy:
Hermanowski, P.
Ignaszak, T.
Powiązania:
https://bibliotekanauki.pl/articles/2060348.pdf
Data publikacji:
2017
Wydawca:
Państwowy Instytut Geologiczny – Państwowy Instytut Badawczy
Tematy:
vulnerability mapping
groundwater protection
Pliszka River
Polska
Opis:
The assessment of groundwater vulnerability is a crucial part of planning and water management because it can identify areas where aquifers are more susceptible to contamination. Depending on the vulnerability assessment method, the results can differ significantly. Consequently, different methods can provide ambiguous information that could further influence decision-making processes in planning or water management. For the Pliszka River catchment, the intrinsic groundwater vulnerability of the uppermost aquifer was estimated using four different methods: DRASTIC, GOD, and two methods that are based on empirical formulas of water residence time in an unsaturated zone. The input data include a series of thematic maps supplemented by 1,322 shallow borehole profiles and laboratory tests of samples collected in the course of fieldwork. The collected data were processed in GIS software, and the results of each method were mapped in high resolution. The resulting maps of groundwater vulnerability were then quantitatively compared to validate their applicability for the assessment of groundwater vulnerability in a typical North European Lowland river catchment. The maps generated by the DRASTIC and GOD methods are dominated by areas with moderately high (54.6 and 48.4%, respectively) and moderate groundwater vulnerability (32.7 and 32.3%, respectively). No areas of high groundwater vulnerability are present. One of the water residence time methods provides results similar to the previous methods at the catchment scale, and one method yields high groundwater vulnerability values for the majority of area.
Źródło:
Geological Quarterly; 2017, 61, 1; 166--176
1641-7291
Pojawia się w:
Geological Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Vulnerability Assessment of Steel Structures with Plan Irregularities Subjected to Fire
Autorzy:
Jadhav, Bhavana
Ramanand, Ravindra
Powiązania:
https://bibliotekanauki.pl/articles/2023797.pdf
Data publikacji:
2021
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
vulnerability
progressive collapse
demand capacity ratio (DCR)
fire cases
plan irregularity
podatność
postępujące załamanie
współczynnik wydajności popytu (DCR)
przypadki pożarów
nieregularność planu
Opis:
Understanding the performance of steel frames under fire loading is crucial, as numerous recent instances have revealed vulnerability of steel frames to such hazard. The present study is carried out to evaluate the vulnerability of regular and irregular steel structures in plan to fire event. Irregular buildings are encountered in practice due to various reasons. In this regard, three dimensional four storey steel moment resisting frame structures with rectangular, C-shape, H-shape and L-shape are considered for the analysis. All moment resisting frames are subjected to five different fire cases in each floor and the most critical member is identified. The effect on stress resultants of the surrounding structural elements is investigated at critical temperatures applied to the critical member. Linear static analysis is performed and the results in terms of DCR, axial forces, bending moments and shear forces are obtained and variation in internal forces are calculated. Significant variations in the internal forces indicate that the affected column distributes force on the neighbouring members that are greater than the forces initially carried by them, potentially resulting in member failure and gradual collapse. It is observed that irregularity considerably affects the performance of the structure. The critical components of irregular structures fail at a much lower temperature when compared to regular structures. Among the various structures analysed, maximum difference in axial force, bending moment and shear forces before and after fire exposure are observed in H-shape structure.
Źródło:
Advances in Science and Technology. Research Journal; 2021, 15, 4; 273-282
2299-8624
Pojawia się w:
Advances in Science and Technology. Research Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Hydrogeochemical Characterization and Vulnerability Assessment of Shallow Groundwater in Basement Complex Area, Southwest Nigeria
Autorzy:
Adewumi, A. J.
Anifowose, A. Y. B.
Olabode, F. O.
Laniyan, T. A.
Powiązania:
https://bibliotekanauki.pl/articles/100830.pdf
Data publikacji:
2018
Wydawca:
Uniwersytet Śląski. Wydział Nauk o Ziemi
Tematy:
DRASTIC
groundwater
hydrogeochemical
Owo
vulnerability
WQI
wody podziemne
zanieczyszczenie
podatność
hydrogeochemia
Opis:
Thirty-five (35) groundwater samples from Owo area were analyzed for physicochemical parameters. Results show that the mean value of pH is 6.32, TDS is 208.92 mg/l, temperature is 28.77oC, EC is 545.16 μs/cm; TH is 111.09 mg/l, SO4 is 71.73 mg/l, Cl is 0.07 mg/l, HCO3 is 14.09 mg/l, Na is 25.06 mg/l, Ca is 37.07 mg/l, K is 24.36 mg/l and Mg is 4.41 mg/l. The results were compared to the WHO and NDSQW standards. All parameters were within the permissible limit except EC in well OW6 and K is above the stipulated standards in 69% of the total samples. The high concentration of K is linked to the use of NPK fertilizer in the area for agricultural purposes. The groundwater belongs to Ca-Na-K-SO4 and Na-Ca-SO4 water type respectively. The ionic concentration in the groundwater is due to the dissolution of the rock that makes up the aquifer. Plagioclase and silicate-bearing rocks are the sources of major ions in the water. SAR, PI, RSBC and KR reveals that groundwater in the area is good for irrigation purpose. DRASTIC model further revealed that groundwater in the area is less vulnerable to contamination under the current environmental conditions.
Źródło:
Contemporary Trends in Geoscience; 2018, 7, 1; 72-103
2299-8179
Pojawia się w:
Contemporary Trends in Geoscience
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Neurophysiological maturation in adolescence - vulnerability and counteracting addiction to alcohol
Autorzy:
Chwedorowicz, Roman
Skarżyński, Henryk
Pucek, Weronika
Powiązania:
https://bibliotekanauki.pl/articles/989898.pdf
Data publikacji:
2017
Wydawca:
Instytut Medycyny Wsi
Tematy:
adolescence
neurophysiological maturation
alcohol vulnerability
alcohol addiction
genetic markers
event-related potential (erp)
p3 amplitude
event-related oscillation (ero
electroencephalography (eeg)
Opis:
The results of contemporary studies confirm the formation of two neural networks in the brain during the period of adolescence. The first is defined as emotional, located in the limbic system, develops earlier, quicker, and more intensively than the second one in the prefrontal cortex, called the judgement network, which fulfils the role of control and inhibition of emotional reactions. The domination of the emotional network in adolescence is manifested by hyperactivity of the limbic system, accompanied by intensified undertaking of courageous, reckless, risky, or even sometimes dangerous actions, so very characteristic in the maturation. The aim of the article is to present the state of the art in the field of latest achievements in experimental neurophysiology related to the maturation of the structural end functional processes in adolescents, and to alcohol vulnerability. Alcohol effect initiation starts in early adolescence, and therefore is connected with alcohol abuse and addiction in adulthood, which confirms the necessity for provision of an early prophylactic protection for juveniles, even before entering the phase of early adolescence. Some electrophysiological characteristics, such as low P3 amplitude of the Event-Related Potential (ERP) and Event-Related Oscillations (EROs), are manifested by their high risk offspring, and are considered to be biological markers (endophenotypes) of a predisposition to develop alcohol use disorders. Electroencephalographic oscillations induced within the range of the theta and delta waves (Event-Related Oscillation- ERO), considered as endophenotypes and markers of increased vulnerability for addiction, present three groups of genes and three types of neurotransmitters, with gamma aminobutyric acid, acetylcholine and glutamate as neurotransmitters in the central nervous system. A new research approach consisting in the application of electroencephalographic methods and techniques in developmental and genetic studies of the conditioning of varied vulnerability, and especially increased preferences for alcohol tasting and abuse in adolescence, provide unique possibilities for comprehensive and deepened studies which may contribute to the prevention of alcohol addiction, the genesis of which, to a great extent, is related with the effect of causative environmental and genetic factors during adolescent development.
Źródło:
Annals of Agricultural and Environmental Medicine; 2017, 24, 1
1232-1966
Pojawia się w:
Annals of Agricultural and Environmental Medicine
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Novel Approach to National-level Cyber Risk Assessment Based on Vulnerability Management and Threat Intelligence
Autorzy:
Janiszewski, Marek
Felkner, Anna
Lewandowski, Piotr
Powiązania:
https://bibliotekanauki.pl/articles/308992.pdf
Data publikacji:
2019
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
digital services
essential services
incident management
risk assessment
risk management
situational awareness
threat intelligence vulnerability management
Opis:
Real-time assessment of IT-related risks, performed at the national level, is very important due to the evolving nature of threats that may originate from individual hackers, organized cyber-criminal groups, as well as state activities. Evaluation of risk that is based on technical information, as well as on mutual relationships between various institutions and services, may result in very valuable situational awareness. The paper describes (in general) cyber risk analysis method which will be implemented in Polish National Cybersecurity Platform.
Źródło:
Journal of Telecommunications and Information Technology; 2019, 2; 5-14
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Metody usuwania podatności URL na ataki na aplikacje internetowe
Discarding methods of URL vulnerability on Internet applications attacks
Autorzy:
Furtak, J.
Strzelecki, Ł.
Renczewski, K.
Powiązania:
https://bibliotekanauki.pl/articles/273405.pdf
Data publikacji:
2006
Wydawca:
Wojskowa Akademia Techniczna im. Jarosława Dąbrowskiego
Tematy:
podatność URL
szyfrowanie URL
bezpieczeństwo aplikacji internetowych
URL vulnerability
URL encryption
Internet applications security
Opis:
W artykule przedstawione zostały wybrane problemy bezpieczeństwa aplikacji internetowych dotyczące przechowywania danych i pobierania danych od użytkownika. Przedstawiono różne przykładowe rozwiązania zmniejszające możliwość przeprowadzenia skutecznego ataku na system portalowy.
The Internet application selected security problems related to preserving data and receiving data from user was presented in article. Several sample solutions decreasing possibility to carrying efficacious portal system attack was described.
Źródło:
Biuletyn Instytutu Automatyki i Robotyki; 2006, R. 12, nr 23, 23; 79-97
1427-3578
Pojawia się w:
Biuletyn Instytutu Automatyki i Robotyki
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Ocena podatności na degradację zbiornika retencyjnego Przebędowo
Assessment of vulnerability to degradation of the Przebędowo reservoir
Autorzy:
Sojka, M
Korytowski, M.
Jaskuła, J.
Waligórski, B.
Powiązania:
https://bibliotekanauki.pl/articles/400301.pdf
Data publikacji:
2017
Wydawca:
Polskie Towarzystwo Inżynierii Ekologicznej
Tematy:
zlewnia nizinna
zbiornik retencyjny
eutrofizacja
podatność na degradację
lowland catchment
reservoir
eutrophication
degradation vulnerability
Opis:
W pracy dokonano oceny podatności na degradację zbiornika retencyjnego Przebędowo, który został oddany do eksploatacji w 2014 roku. Zbiornik Przebędowo zlokalizowany jest w zlewni rzeki Trojanki (Strugi Goślińskiej), która uchodzi do rzeki Warty w km 218+500. Pole powierzchni zbiornika wynosi 12,03 ha, a pojemność całkowita 0,162 mln m3. Zbiornik Przebędowo charakteryzuje się wydłużonym kształtem, jego długość wynosi 1450 m, a szerokości maksymalna 120 m. W pierwszym etapie pracy przeprowadzono analizę potencjalnego dopływu związków biogennych ze zlewni do zbiornika oraz dokonano oceny podatności zbiornika na degradację. W drugim etapie dokonano oceny jakości wody rzeki Trojanki zasilającej zbiornik i następnie obliczono ładunki azotu i fosforu dopływające do zbiornika. Ładunki azotu i fosforu wprowadzane do zbiornika porównano wielkościami ładunków dopuszczalnych (Łdop.) i niebezpiecznych (Łnieb.) określone wg modelu hydraulicznego Vollenweidera. Pozwoliło to na określenie kategorii zagrożenia zbiornika. Przeprowadzone badania wykazują, że zbiornik Przebędowo jest silnie podatny na degradację. Uzyskane wyniki pozwalają stwierdzić, że wynika to przede wszystkim z geometrii zbiornika: kształtu, wydłużonej linii brzegowej i niskiej głębokości średniej. Analiza wykazała również, że ze względu na wysoki udział użytków rolnych w zlewni bezpośredniej, istnieje potencjalne zagrożenie wymywania związków biogennych do zbiornika Przebędowo.
The paper presents the results of the assessment pertaining to the Przebędowo reservoir, opened for exploitation in 2014, in terms of vulnerability to degradation. The reservoir is located in the catchment of Trojanka River (Struga Goślińska). Trojanka falls into the river Warta at km 218 + 500. The construction of the reservoir was completed in 2014. The surface area of the reservoir is 12.03 hectares and its total volume is 0.162 million m3. The reservoir has an elongated shape, its length is 1450 m and its maximum width is 120 m. In the first stage of the work, the potential inflow of biogenic compounds from the catchment area was analyzed and the reservoir vulnerability to degradation was assessed. In the second stage, the water quality of the Trojka River was evaluated and the nitrogen and phosphorus loads were calculated. Nitrogen and phosphorus loads flowing into the reservoir were compared with the allowable and critical values calculated according to the hydrological model of Vollenweider. This comparison permitted the classification of the reservoir vulnerability to degradation. The Przebędowo reservoir was found to be highly vulnerable to degradation. The obtained results show that this state is mainly due to the geometry of the reservoir: shape, elongated coastline and low average depth. Moreover, a high share of arable land in the catchment area increases the potential risk associated with the inflow of biogenic compounds into the reservoir.
Źródło:
Inżynieria Ekologiczna; 2017, 18, 5; 118-125
2081-139X
2392-0629
Pojawia się w:
Inżynieria Ekologiczna
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Utilization of diffusion processes and fuzzy logic for vulnerability assessment
Wykorzystanie procesów dyfuzyjnych i logiki rozmytej do oceny podatności na zagrożenie
Autorzy:
Valis, D.
Pietrucha-Urbanik, K.
Powiązania:
https://bibliotekanauki.pl/articles/301806.pdf
Data publikacji:
2014
Wydawca:
Polska Akademia Nauk. Polskie Naukowo-Techniczne Towarzystwo Eksploatacyjne PAN
Tematy:
podatność na zagrożenie
kluczowa infrastruktura
procesy dyfuzyjne
vulnerability
critical infrastructure
diffusion processes
Opis:
Ocena podatności na zagrożenie kluczowych obiektów infrastruktury jest głównym problemem rozpatrywanym w kontekście procesu niezawodności oraz zarządzania ryzykiem. Szczególną uwagę przywiązuje się do obiektów wysokiej rangi, takich jak elektrownie jądrowe. Pomimo ochrony tych obiektów, nadal istnieje pewien poziom potencjalnego ich zagrożenia. Celem artykułu jest opisanie możliwego sposobu zaatakowania obiektu z zamiarem dostania się do konkretnej jego części. Otrzymano kilka charakterystyk próby ataku ze strony przeciwnika. Do tego celu, jak również do zamodelowania zachowania przeciwnika, wykorzystano procesy dyfuzyjne.
Assessing the vulnerability of critical infrastructure objects is of major concern when dealing with the process of dependability and risk management. Special attention is paid to the objects of higher interest, such as nuclear power plants. In spite of the protection of these objects, there is still a certain level of a potential threat. The aim of the paper is to describe a possible way of attacking on the object in order to get into a particular part of it. Several characteristics of an adversary´s attempt were obtained. For this reason as well as for modelling adversary´s behaviour diffusion processes have been used.
Źródło:
Eksploatacja i Niezawodność; 2014, 16, 1; 45-48
1507-2711
Pojawia się w:
Eksploatacja i Niezawodność
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Characteristics of the trophic status, vulnerability to degradation, habitat conditions ichthyofauna and bioconcentration factors of lakes in the Barlinek-Gorzów Landscape Park
Autorzy:
Daniszewski, Piotr
Powiązania:
https://bibliotekanauki.pl/articles/1119301.pdf
Data publikacji:
2016
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
Barlinek-Gorzów Landscape Park
bioconcentration factors
habitat conditions ichthyofauna
lakes
trophic status
vulnerability to degradation
Opis:
Urbanization is the cause of many changes which are taking place in the environment, including those found in the catchment. With this in mind, it is an important issue to properly protect water reservoirs and also take action to counter the adverse effects of human activities on the natural environment, including water bodies. To address the increasing degradation of surface waters in the European Union, the approach to the evaluation and protection of water resources was changed. This approach was formulated in the European Union Water Framework Directive (2000/60/EC), which calls for the protection of water, as well as an environment-friendly and comprehensive approach to water assessment. Herein, the ecological status of surface waters and groundwater is assessed on the basis of the ecological potential of the biological, physico-chemical and hydromorphological indicators.
Źródło:
World News of Natural Sciences; 2016, 5; 42-49
2543-5426
Pojawia się w:
World News of Natural Sciences
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Land vulnerability evaluation and climate change impacts in Andalucia, Spain: soil erosion and contamination
Autorzy:
De La Rosa, D.
Crompvoets, J.
Mayol, F.
Moreno, J.A.
Powiązania:
https://bibliotekanauki.pl/articles/24342.pdf
Data publikacji:
1996
Wydawca:
Polska Akademia Nauk. Instytut Agrofizyki PAN
Tematy:
land vulnerability
land evaluation
soil survey
soil erosion
erosion model
Spain
Andalucia
climate change
Źródło:
International Agrophysics; 1996, 10, 3
0236-8722
Pojawia się w:
International Agrophysics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Gospodarki wschodzące w obliczu kryzysu finansowego: duża odporność czy podatność?
Emerging Market Economies in the Face of a Financial Crisis: Resilience or Vulnerability?
Autorzy:
Wojtyna, Andrzej
Powiązania:
https://bibliotekanauki.pl/articles/574580.pdf
Data publikacji:
2010-09-30
Wydawca:
Szkoła Główna Handlowa w Warszawie. Kolegium Analiz Ekonomicznych
Tematy:
vulnerability and resilience to financial crisis
emerging market economies
decoupling hypothesis
global financial flows
Opis:
The paper is concerned with selected aspects oftheoretical and empirical analysis that help better understand the role of factors determining the resilience of medium-developed countries to financial crises. The analysis is made in the context of the latest crisis, which began in highly developed economies. The second part of the paper focuses on some widely disputed issues involving a theoretical explanation of the causes behind the latest crisis. Even though, in the case of emerging market economies, the original causes behind the crisis can be treated as external ones, Wojtyna says, they need to be scrutinized because of the interaction between the financial sector and the real economy. This interaction is similar in both medium-developed and highly developed countries, according to the author. Part 3 focuses on global imbalances and their role in transmitting the crisis to and from medium-developed countries. This trend is linked with the wider problem of the costs and benefits of financial globalization and the decoupling hypothesis debated in the context of business cycles in highly and medium-developed economies. Part 4 discusses the results of empirical studies designed to check the importance of factors determining the resilience of medium-developed countries to the latest crisis. A more detailed evaluation of the resilience of emerging market economies to the latest crisis could be made after anti-crisis measures taken by governments and central banks in highly developed countries cease to influence these countries’ economies, Wojtyna says. Preliminary findings in this area are encouraging for medium-developed countries, he adds. According to the author, changes in macroeconomic policy as well as structural and institutional changes carried out in response to previous crises have significantly reduced medium-developed countries’ vulnerability to global crises.
Źródło:
Gospodarka Narodowa. The Polish Journal of Economics; 2010, 242, 9; 25-45
2300-5238
Pojawia się w:
Gospodarka Narodowa. The Polish Journal of Economics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Wybrane zagadnienia dotyczące narażenia obiektów fizycznych na atak : stan wiedzy
Selected aspects of physical structures vulnerability : state of the art
Autorzy:
Vališ, D,
Vintr, Z.
Malach, J.
Powiązania:
https://bibliotekanauki.pl/articles/301622.pdf
Data publikacji:
2012
Wydawca:
Polska Akademia Nauk. Polskie Naukowo-Techniczne Towarzystwo Eksploatacyjne PAN
Tematy:
ochrona fizyczna
cel ataku
narażenie na atak
zagrożenie
physical protection
target
vulnerability
risk
Opis:
W artykule omówiono wybrane aspekty narażenia obiektów fizycznych na atak w kontekście ochrony fizycznej. Określono możliwe zagrożenia wynikające z ataku terrorystycznego, zdefiniowano potencjalne cele ataku i podano ich charakterystyki, opisano zjawisko wytrzymałości obiektu na atak, oraz ustalono sposoby zmniejszania prawdopodobieństwa dotarcia do celu ataku terrorystycznego lub zwiększania odporności obiektu. Przedstawione wyniki odzwierciedlają bieżący stan wiedzy w dziedzinie ochrony fizycznej.
The paper is to deal with the selected aspects of structures vulnerability in terms of the physical protection. It is going to specify possible risks following from a terrorist attack, define a potential target and its characteristics, describe the resistance of an object to an attack, and determine the ways to reduce the probability of reaching a terrorist target, or increase object resilience. The results we are going to introduce reflect current knowledge in the area of physical protection.
Źródło:
Eksploatacja i Niezawodność; 2012, 14, 3; 189-194
1507-2711
Pojawia się w:
Eksploatacja i Niezawodność
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Zagrożenia chemiczne zamierzone, redukcja podatności i kultura bezpieczeństwa chemicznego
Chemical security threats, vulnerability reduction and chemical security culture
Autorzy:
Górniak, L.
Kalisz, D.
Młynarczyk, K.
Powiązania:
https://bibliotekanauki.pl/articles/142258.pdf
Data publikacji:
2015
Wydawca:
Stowarzyszenie Inżynierów i Techników Przemysłu Chemicznego. Zakład Wydawniczy CHEMPRESS-SITPChem
Tematy:
bezpieczeństwo chemiczne
CBRNE
redukcja podatności
społeczna odpowiedzialność biznesu
chemical security
vulnerability reduction
corporate social responsibility
Opis:
W artykule omówiono zagadnienie zagrożenia dla bezpieczeństwa publicznego wynikające z nieprawnego, bądź intencjonalnego użycia chemikaliów. Wskazano na związek kultury bezpieczeństwa chemicznego z redukcją zagrożeń i przedstawiono opracowywane w Instytucie Chemii Przemysłowej (IChP), we współpracy z Międzynarodowym Centrum Bezpieczeństwa Chemicznego, narzędzia przydatne w redukcji podatności na zagrożenia.
The Authors discuss reduction of threat to public security caused by unlawful, intentional use of chemical substances. The authors argument that the effective threat reduction has to involve creation of a proper chemical security culture. The tools useful in reducing vulnerability elaborated in Industrial Chemistry Research Institute in cooperation with the International Centre for Chemical Security and Safety are explained.Keywords: nanosilver, extraction, white grapes, chemical reduction.
Źródło:
Chemik; 2015, 69, 4; 201-208
0009-2886
Pojawia się w:
Chemik
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Resilience and vulnerability in Ostrava and Karviná from the socio-cultural perspective
Rezyliencja i wrażliwość w Ostrawie oraz Karvinie perspektywa społeczno-kulturowa
Autorzy:
Suchácek, Jan
Powiązania:
https://bibliotekanauki.pl/articles/1837615.pdf
Data publikacji:
2016
Wydawca:
Uniwersytet Opolski
Tematy:
resilience
vulnerability
Ostrava
Karvina
socio-cultural perspective of resilience
rezyliencja
wrażliwość
społeczno-kulturowa perspektywa rezyliencji
Opis:
This article deals with the evaluation of resilience and vulnerability in Ostrava and Karviná between 2000 and 2010 from the socio-cultural perspective. These cities embody typical representatives of post-industrial urban entities in the Czech Republic. The socio-cultural component of life is indispensable for the explanation of other processes in researched territories. Ostrava’s higher resilience can be accounted for by its more favorable position within settlement system of the whole region.
Artykuł dotyczy ewaluacji rezyliencji i wrażliwości Ostravy oraz Karviny w latach 2000–2010 analizowanej z perspektywy społeczno-kulturowej. Tego rodzaju miasta reprezentują typowe jednostki poprzemysłowe w Republice czeskiej. komponent społeczno-kulturowy jest nieodzowny do wyjaśnienia innych procesów w ramach badanych terytoriów. Wysoka rezyliencja Ostravy może być tłumaczona przez jej bardziej korzystna pozycje w systemie osadniczym całego regionu
Źródło:
Studia Miejskie; 2016, 24; 157-169
2543-5302
2082-4793
Pojawia się w:
Studia Miejskie
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Spatial Analysis of Coastal Vulnerability Index to Sea Level Rise in Biak Numfor Regency (Indonesia)
Autorzy:
Rumahorbo, Basa T.
Warpur, Maklon
Tanjung, Rosye H. R.
Hamuna, Baigo
Powiązania:
https://bibliotekanauki.pl/articles/24201621.pdf
Data publikacji:
2023
Wydawca:
Polskie Towarzystwo Inżynierii Ekologicznej
Tematy:
spatial mapping
coastal vulnerability
coastal geologic variable
physical process variable
sea level rise
Biak Island
Opis:
Assessing the vulnerability of coastal areas is important in evaluating impact of sea level rise due to global climate change. This study aimed to spatially analyze and map the vulnerability level of the Biak Numfor Regency’s coastal area on Biak Island to the threat of sea level rise. The study area is limited to 500 m from the coastline and is divided into 383 grid cells. The Coastal Vulnerability Index (CVI) method was used to map the level of vulnerability of coastal areas based on four coastal geological variables (coastal elevation, coastal slope, geomorphology, and shoreline change) and three ocean physical process variables (tidal range, average significant wave height, and relative sea level rise). The results showed that the coastal areas of Biak Numfor Regency, belonging to the low, medium and high-risk vulnerability categories, were 77,685.63 km (32.18%), 159,084.38 km (65.74%), and 5,024.96 km (2.08%), respectively. The variables that contribute significantly to the level of vulnerability are coastal elevation, coastal slope, coastal geomorphology, and shoreline changes due to abrasion compared to tidal range, significant wave heights, and sea level rise rates. Vulnerability studies of other variables that can contribute to the vulnerability of coastal areas are needed, such as socio-economic variables and the impact of human activities on changes in the coastal environment, to obtain a comprehensive CVI value in supporting coastal mitigation planning efforts against sea level rise disasters so that they are more focused.
Źródło:
Journal of Ecological Engineering; 2023, 24, 3; 113--125
2299-8993
Pojawia się w:
Journal of Ecological Engineering
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Semi-automatic geo-processing procedure for the vulnerability mapping of industrial facilities in areas with the potential volcanic ash fallout
Autorzy:
Ancione, G.
Milazzo, M. F.
Salzano, E.
Maschio, G.
Powiązania:
https://bibliotekanauki.pl/articles/2069382.pdf
Data publikacji:
2013
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
Na-Tech risk
vulnerability mapping
threshold value
ash fallout
exceedance probability
geoprocessing
Opis:
Following recent severe natural events, attention has been focused on industrial installations located in areas prone to natural hazards. This work concerns the study of volcanic Na-Tech events (i.e. technological risks triggered by natural causes) and aims at defining a procedure for the representation of the vulnerability of industrial facilities in areas with the potential volcanic ash fallout by means a Geographical Information System (GIS). Here, we focused on the construction of a semi-automatic procedure for the vulnerability mapping for cases where input data is very limited; it is based on the use of a specific tool named ModelBuilder of the ArcGIS software.
Źródło:
Journal of Polish Safety and Reliability Association; 2013, 4, 1; 1--8
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Methods of improving the jamming resistance of GNSS receiver
Autorzy:
Felski, A.
Powiązania:
https://bibliotekanauki.pl/articles/320565.pdf
Data publikacji:
2016
Wydawca:
Polskie Forum Nawigacyjne
Tematy:
jamming
jamming monitoring
GNSS vulnerability
Opis:
Jamming of GNSS signals can be both a consequence of accidental activities and an intentional act. This issue is lately discussed as an essential threat for the use of satellite navigation systems. This is especially dangerous in the face of common usage of GPS — like systems in everyday life and the great belief of everyday users in the truth of devices indications. In spite of the legal prohibition of using them, jammers are commonly accessible, especially in the Internet. Until recently even specialists have shared the conviction that the broadband GPS signal is not a subject of disturbances in contrast to older wire-less communication techniques because its power level is below natural level of noises and in addition it is randomly coded. But nowadays jammers are very often successfully applied, which is confirmed in many reports. The average user has not the suitable knowledge about the specificity of the jamming and has no technical possibilities of the detection of jammer signals. Receivers, which can indicate the presence of perturbative signals, became accessible a few months ago only. Presently accessible jamming monitors can also determine the direction of interferer signal transmission. There are also specially designed receivers with anti-jamming mechanism, which are, however, not commonly accessible. The possible way of countermeasure the jamming in the GNSS receiver are discussed in this paper.
Zagłuszanie sygnałów GNSS, które może być skutkiem zarówno przypadkowych, jak i celowych działań, jest ostatnio oceniane jako jedno z największych zagrożeń dla użytkowania satelitarnych systemów nawigacyjnych. Jest to szczególnie istotne w obliczu stosowania systemów opartych na idei GPS w życiu codziennym i przy powszechnym zaufaniu przeciętnych użytkowników we wskazania tych systemów. Pomimo oficjalnego zakazu posługiwania się zagłuszaczami, są one powszechnie dostępne, zwłaszcza za pośrednictwem Internetu. Jeszcze do niedawna specjaliści podzielali pogląd, że bardzo szerokie pasmo sygnału GPS nie jest podatne na zagłuszanie, w przeciwieństwie do klasycznych technik radiowych, ponieważ i tak w warunkach naturalnych poziom sygnału w tym systemie jest niższy od poziomu szumów, a ponadto jest kodowany losowo. Jednakże obecnie z pożądanym skutkiem stosowane są tzw. jammery, co potwierdza wiele doniesień. Przeciętny użytkownik nie ma dostatecznej wiedzy na temat specyfiki zagłuszania, jak również nie dysponuje odpowiednim oprzyrządowaniem, aby wykryć sygnały zagłuszające. Zaledwie w ostatnich miesiącach pojawiły się pierwsze odbiorniki, które są zdolne uprzedzać obecność sygnałów zakłócających. Dostępne są również monitory zagłuszania zdolne wskazać nawet kierunek, z którego sygnał zakłócający dochodzi. Istnieją też odbiorniki mające specjalne rozwiązania umożliwiające pracę w warunkach zakłóceń, jednak nie są powszechnie dostępne. W artykule przedstawiono zasadnicze możliwości przeciwdziałania zagłuszaniu w systemach klasy GNSS.
Źródło:
Annual of Navigation; 2016, 23; 185-198
1640-8632
Pojawia się w:
Annual of Navigation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Assessment of groundwater vulnerability using the DRASTIC model: A case study of Quaternary catchment A21C, Limpopo River Basin, South Africa
Autorzy:
Moges, Simeneh S.
Dinka, Megersa O.
Powiązania:
https://bibliotekanauki.pl/articles/1844324.pdf
Data publikacji:
2021
Wydawca:
Instytut Technologiczno-Przyrodniczy
Tematy:
A21C Quaternary catchment
DRASTIC model
groundwater vulnerability
sensitivity analysis
South Africa
Opis:
Groundwater is a vital resource for domestic, agricultural, industrial activities and ecosystem services. Despite its multiple purposes, the resource is under significant threat owing to increasing contamination from anthropogenic activities and climate change. Hence, in order to ensure the reliability and sustainable use of groundwater for the present and future generations, effective management of groundwater (quality and quantity) is highly important. This can be achieved by identifying areas more vulnerable to contamination and implementing protective measures. The present study aims at assessing the vulnerability of groundwater using GIS-based DRASTIC index in the Quaternary catchment (A21C) within Limpopo River Basin. The vulnerability index varied from 87 to 207. About 53.6% (408 km2) of the catchment area also exhibited high risk of groundwater contamination mostly in central, north-eastern and western part of the sub-catchment. The medium and low vulnerability classes cover only 18.1% (137.5 km2) and 21.7% (165.1 km2) of the study area, respectively. The shallow groundwater at the Doornfontein Campus belongs to very high vulnerability area. The sensitivity analysis indicates that depth to water level, recharge, aquifer media, soil and topography are the important contributors to vulnerability assessment. The correlation analysis performed to validate the final vulnerability map shows a moderate positive correlation, indicating the model’s applicability to the urbanised environment. The study indicates an area that is highly vulnerable to pollution, and hence protective measures are necessary for sustainable management of the groundwater resource in the study area. The result of this study can also be further improved and verified by using other vulnerability assessment models.
Źródło:
Journal of Water and Land Development; 2021, 49; 35-46
1429-7426
2083-4535
Pojawia się w:
Journal of Water and Land Development
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Vulnerability to Cyber Threats: A Qualitative Analysis From Societal and Institutional Perspectives
Autorzy:
Kaczmarek, Krzysztof
Powiązania:
https://bibliotekanauki.pl/articles/31342040.pdf
Data publikacji:
2024-05-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
digital society
technological progress
vulnerability to cyber threats
security of institutions
Opis:
With the rapid development of ICT and the shifting of much of social activity online, countering cyber threats has become a challenge both for individuals and governments. The research hypothesis is that the number and type of cyber attacks are directly related to an individual’s vulnerability to cyber threats. In order to verify this hypothesis, quantitative and qualitative methods, literature survey and the desk research method were used. The analyses conducted by the Author explicitly indicated that what is the weakest element in a cyber security system is the human factor. At the same time, it is fatigue and routine that are the worst enemies, even for a cyber security professional. One way to increase the level of security is to assume that every time a network service is used, it may carry the risk of a cyber attack with consequences that are difficult to predict. This allows for vigilance even in everyday activities that require access to the network.
Źródło:
Cybersecurity and Law; 2024, 12, 2; 106-116
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Ballistic Analysis of Polish Low-Vulnerability Gun Propellants
Analiza balistyczna polskich małowrażliwych kompozycji prochowych
Autorzy:
Czyżewska, M.
Fikus, B.
Leciejewski, Z.
Michalski, J.
Surma, Z.
Trębiński, R.
Powiązania:
https://bibliotekanauki.pl/articles/403947.pdf
Data publikacji:
2018
Wydawca:
Wojskowa Akademia Techniczna im. Jarosława Dąbrowskiego
Tematy:
mechanics
internal ballistics
closed vessel tests
low-vulnerability propellant
mechanika
balistyka wewnętrzna
badania pirostatyczne
małowrażliwy materiał miotający
Opis:
One direction of modern artillery ammunition development is to reduce its vulnerability to the effects of mechanical and thermal factors during transport, storage and operation. For LOVA, the reduced vulnerability of propellant explosives intended for loading into this ammunition is usually connected with a higher thermal ignition impulse threshold and reduced burning rate under low propellant gas pressure. Since 2016, work has been under way at the Military University of Technology (Warsaw, Poland), intended to develop a Polish low-vulnerability gun propellant for 120 mm tank ammunition. It was established during the initial stage of research and analysis, that the JA-2 gun propellant (more specifically, its energy and ballistics characteristics and geometrical dimensions of grains) will be the reference propellant for the low-vulnerability propellant in development. To this end, the authors performed closed vessel tests with JA-2 propellant (with seven-perforated grains designated LO5460). This paper contains comparative (with the JA-2 propellant) results of closed vessel tests of several propellant blends developed by the MUT Faculty of New Technologies and Chemistry research team. Closed vessel tests of these propellant blends were performed in the Ballistics Laboratory of the MUT Institute of Armament Technology using a manometric chamber with a volume W₀ = 200 cm³. Experimental tests and theoretical analyses were performed based on provisions of the standardisation agreement STANAG 4115 [6], American military standard MIL-STD 286C [7] and original test procedures developed based on [8, 9]. The tests focused mainly on the issue of correlation between the chemical composition of the given propellant blend with the expected values of energy and ballistics characteristics in connection with the required shape of propellant grains.
Jednym z kierunków rozwoju współczesnej amunicji artyleryjskiej jest zmniejszenie jej wrażliwości na działanie czynników mechanicznych i termicznych podczas transportu, przechowywania i eksploatacji. W przypadku amunicji LOVA zmniejszona wrażliwość wybuchowych materiałów miotających przeznaczonych do elaboracji tej amunicji jest z reguły powiązana z wyższą wartością progową cieplnego impulsu zapłonowego i zmniejszeniem szybkości spalania przy niskim ciśnieniu gazów prochowych. Od 2016 r. w Wojskowej Akademii Technicznej trwają prace nad opracowaniem polskiego małowrażliwego materiału miotającego do 120 mm amunicji czołgowej. Na wstępnym etapie badań i analiz przyjęto, że proch JA-2 (a właściwie jego charakterystyki energetyczno-balistyczne oraz kształt i wymiary geometryczne ziaren) będzie prochem referencyjnym w stosunku do opracowywanego prochu małowrażliwego. W tym celu przeprowadzono własne badania pirostatyczne prochu JA-2 (z ziarnami siedmiokanalikowymi o symbolu LO5460). Artykuł zawiera porównawcze (z prochem JA-2) wyniki badań pirostatycznych kilku kompozycji prochowych, opracowanych przez zespół badawczy Wydziału Nowych Technologii i Chemii WAT. Badania pirostatyczne tych kompozycji prochowych przeprowadzono w Laboratorium Balistyki Instytutu Techniki Uzbrojenia WAT z wykorzystaniem komory manometrycznej o objętości W₀ = 200 cm³. Badania doświadczalne i analizy teoretyczne realizowano w oparciu o zapisy porozumienia standaryzacyjnego STANAG 4115 [6], amerykańskiej normy MIL-STD 286C [7] oraz własne procedury badawcze opracowane na podstawie prac [8, 9]. W badaniach skoncentrowano się głównie na kwestii korelacji pomiędzy składem chemicznym badanej kompozycji prochowej a oczekiwanymi wartościami charakterystyk energetyczno-balistycznych, w powiązaniu z wymaganym kształtem ziaren prochowych.
Źródło:
Problemy Mechatroniki : uzbrojenie, lotnictwo, inżynieria bezpieczeństwa; 2018, 9, 3 (33); 75-92
2081-5891
Pojawia się w:
Problemy Mechatroniki : uzbrojenie, lotnictwo, inżynieria bezpieczeństwa
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Odporność chemiczna szkieł krzemianowych w aspekcie podatności ich na procesy korozyjne
Chemical resistance of silica glasses in aspect of its vulnerability to corrosion processes
Autorzy:
Grochal, E.
Powiązania:
https://bibliotekanauki.pl/articles/392458.pdf
Data publikacji:
2008
Wydawca:
Sieć Badawcza Łukasiewicz - Instytut Ceramiki i Materiałów Budowlanych
Tematy:
szkło krzemianowe
odporność chemiczna
korozja
podatność na korozję
silica glass
chemical resistance
corrosion process
corrosion vulnerability
Opis:
Odporność chemiczna, tj. zdolność do przeciwstawienia się niszczącemu działaniu roztworów wodnych i czynników atmosferycznych, to jedna z ważniejszych właściwości szkła. Zależy ona przede wszystkim od składu chemicznego szkła oraz od jego podatności na procesy korozyjne w środowisku o znacznej wilgotności. W artykule przedstawiono mechanizm procesu korozji szkła oraz warunki wpływające na podatność opakowań szklanych na procesy korozyjne.
Chemical resistance is ability to resist of destructing activity of water solutions and atmospheric factors which is one of most important glass feature. It depends predominantly from chemical composition of glass and from its vulnerability to corrosion processes in high humidity environment. In the article was presented glass corrosion mechanism and conditions influencing glass packaging vulnerability to corrosion processes.
Źródło:
Prace Instytutu Szkła, Ceramiki, Materiałów Ogniotrwałych i Budowlanych; 2008, R. 1, nr 2, 2; 77-90
1899-3230
Pojawia się w:
Prace Instytutu Szkła, Ceramiki, Materiałów Ogniotrwałych i Budowlanych
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Podatność wód podziemnych w warunkach suszy hydrogeologicznej w płytkich systemach hydrogeologicznych
Groundwater vulnerability in hydrogeological drought conditions in shallow aquifers
Autorzy:
Krogulec, Ewa
Sawicka, Katarzyna
Zabłocki, Sebastian
Powiązania:
https://bibliotekanauki.pl/articles/2061542.pdf
Data publikacji:
2019
Wydawca:
Państwowy Instytut Geologiczny – Państwowy Instytut Badawczy
Tematy:
podatność wód podziemnych
DRASTIC
głębokość do zwierciadła wód
susza hydrogeologiczna
groundwater vulnerability
groundwater table depth
hydrogeological drought
Opis:
Badania podatności wód podziemnych przeprowadzono w dolinie Wisły, na obszarze płytkiego występowania wód podziemnych. Wykonano analizę zmian stanów wód podziemnych w celu identyfikacji wartości średnich oraz wartości najniższych w wieloleciu 1999–2013. Na modelu hydrodynamicznym określono wartości zasilania infiltracyjnego odpowiadające stanom średnim w wieloleciu oraz stanom najniższym w warunkach suszy hydrogeologicznej. Przeprowadzono wariantową ocenę podatności wód podziemnych na zanieczyszczenia przy zastosowaniu metody DRASTIC, przyjmując do obliczeń średnie i najniższe stany wód podziemnych i odpowiadające im wartości zasilania infiltracyjnego. Mapy podatności dla obu wariantów podatności: podatności średniej (A) oraz w warunkach suszy hydrogeologicznej (B), przedstawiają zróżnicowanie przestrzenne występowania poszczególnych klas podatności. W wariancie A największą powierzchnię zajmuje średniowysoka i średnia klasa podatności. W okresie suszy hydrogeologicznej największą powierzchnię zajmuje średnia klasa podatności. Wyniki badań potwierdzają potrzebę wariantowej oceny podatności, szczególnie w płytkich systemach hydrogeologicznych, w których objęte są ochroną zróżnicowane ekosystemy, w tym ekosystemy zależne od wód podziemnych.
The study of groundwater vulnerability was carried out in the Vistula river valley, in the area of shallow groundwater occurrence. An analysis of groundwater level changes was preformed to identify average values and the lowest values in the period of 1999–2013. On the hydrodynamic model, infiltration rate was determined corresponding to average groundwater levels and the lowest levels representing hydrogeological drought. A variant evaluation of groundwater vulnerability to pollutions was done using the DRASTIC method, assuming the average and the lowest groundwater levels and the corresponding infiltration rates for the calculation. The vulnerability maps for both vulnerability options: medium (A) and hydrogeological drought conditions (B), show the spatial diversity of individual vulnerability classes. In Variant A, the medium and medium high classes occupy the largest area. During the hydrogeological drought the medium class is the largest area. The research results support the need for a variant susceptibility assessment, especially in shallow hydrogeological systems in which diverse ecosystems are protected, including groundwater-dependent ecosystems.
Źródło:
Biuletyn Państwowego Instytutu Geologicznego; 2019, Hydrogeologia z. 16; 101--108
0867-6143
Pojawia się w:
Biuletyn Państwowego Instytutu Geologicznego
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Climate change and water resources in Algeria: vulnerability, impact and adaptation strategy
ZMIANY KLIMATYCZNE I ZASOBY WODNE W ALGIERII: PODATNOŚĆ, WPŁYW I STRATEGIA ADAPTACYJNA
Autorzy:
MOHAMMED, Touitou
AL-AMIN, Abul Quasem
Powiązania:
https://bibliotekanauki.pl/articles/435066.pdf
Data publikacji:
2018-03-01
Wydawca:
Uniwersytet Opolski
Tematy:
climate changes
water
vulnerability
strategy of adaptation
Algeria
zmiany klimatyczne
woda
podatność
strategia adaptacyjna
Algieria
Opis:
The climate changes going on for a long time now have ceased to be a scientific curiosity. They constitute the major environmental question which dominates our time and pose the major challenge to environmental organizations of control. Water is one of the most important raw materials in Algeria. Because of its importance, it is essential to know its vulnerability with the climate changes. In Algeria, the vulnerability due to the climate changes is expressed through several aspects: demographic explosion, probable reduction in the water run-offs, scarcity of the resources, the degradation of the hydraulic infrastructures, threats to wetlands, etc. In the face of this situation, Algeria has taken quantitative and qualitative adaptive measures within the framework of durable management of this invaluable resource for the future.
Zmiany klimatu przez długi czas przestały być ciekawostką naukową. Stanowią one główne zagadnienie ekologiczne, które dominuje nad naszym czasem i główne wyzwanie, na które muszą odpowiedzieć organizacje ochrony środowiska. Woda jest jednym z najważniejszych surowców w Algierii. Ze względu na jego znaczenie niezbędne jest poznanie jego wrażliwości na zmiany klimatu. W Algierii wrażliwość na zmiany klimatyczne wyraża się w kilku aspektach: eksplozja demograficzna, prawdopodobna redukcja spływów wody, niedobór zasobów, degradacja infrastruktury hydraulicznej, zagrożenia na mokradłach ... itd. Staw czoła tej sytuacji, Algieria dostosował środki ilościowe i jakościowe w ramach trwałego zarządzania tym nieocenionym zasobem na przyszłość.
Źródło:
Economic and Environmental Studies; 2018, 18, 1; 411-429
1642-2597
2081-8319
Pojawia się w:
Economic and Environmental Studies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The concept of social risk: a geographical approach
Autorzy:
Lupu, Laura
Powiązania:
https://bibliotekanauki.pl/articles/1051224.pdf
Data publikacji:
2019-12-30
Wydawca:
Uniwersytet im. Adama Mickiewicza w Poznaniu
Tematy:
social risk
social vulnerability
interdisciplinarity
sustainability
social geography
Opis:
Social risk is an interdisciplinary concept used with various meanings in the social and in the natural sciences. The article presents some of the social insights into this concept, particularly in connection with the global environmental research project and with geography. The special dimension of social risks, as well as some current methodological aspects regarding models and the main indicators used in the multidimensional assessment of social risks are analysed at local, regional and national levels. Of special interest is the link between social risks and a series of key-concepts, such as: hazard, impact, social vulnerability, resilience, adaptive capacity.
Źródło:
Quaestiones Geographicae; 2019, 38, 4; 5-13
0137-477X
2081-6383
Pojawia się w:
Quaestiones Geographicae
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Warunki hydrogeochemiczne i podatność na zanieczyszczenie wód podziemnych w zlewni górnej Raduni
Hydrochemical conditions and groundwater vulnerability in the upper Radunia River catchment area
Autorzy:
Pruszkowska-Caceres, M.
Potrykus, D.
Powiązania:
https://bibliotekanauki.pl/articles/2075653.pdf
Data publikacji:
2017
Wydawca:
Państwowy Instytut Geologiczny – Państwowy Instytut Badawczy
Tematy:
jakość wód podziemnych
podatność wód podziemnych
młody obszar polodowcowy
groundwater quality
groundwater vulnerability
young glacial area
Opis:
The paper presents results of long-term studies in the Kashubian Lake district that have been completed with data gathered over the lastfive years. The purpose of this research was to assess a temporal variability of groundwater chemical composition and to analyze risk of pollutant migration to subsurface water. Investigation indicates local, however, significant anthropogenic influence on a shallow aquifers.The assessment of shallow groundwater vulnerability to pollution has been performed with the use of DRASTIC method. The results revealed that about 60% of the catchment area is moderately high susceptible to pollution and 28% is potentially at high risk. The use of DRASTIC method has helped to explain the causes of a local contaminants in shallow aquifers.
Źródło:
Przegląd Geologiczny; 2017, 65, 11/2; 1350--1355
0033-2151
Pojawia się w:
Przegląd Geologiczny
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Analysis of Structural and Non-Structural Disaster Mitigation Due to Erosion in the Timbulsloko Village, Demak – Central Java
Autorzy:
Sugianto, Denny Nugroho
Widiaratih, Rikha
Widada, Sugeng
Suripin, -
Handayani, Elinna Putri
Cahyaningtyas, Putri
Powiązania:
https://bibliotekanauki.pl/articles/2027833.pdf
Data publikacji:
2022
Wydawca:
Polskie Towarzystwo Inżynierii Ekologicznej
Tematy:
wave damping
permeable breakwater
coastal erosion
Timbulsloko Village
coastal vulnerability analysis
coastal vulnerability index
Opis:
Timbulsloko is a village on the coast of Sayung District, Demak Regency that is severely affected by coastal erosion. The coastal erosion in the Timbulsloko Village is mainly caused by the removal of mangrove areas, which has eliminated the function of the natural breakwater for the coast of the Timbulsloko Village. This study aimed to mitigate the coastal erosion in the form of structural and non-structural protection. Structurally (physically), mitigation is conducted by protecting the coastal area with the application of environmentally friendly coastal protection technology in the form of a Permeable breakwater with a Hybrid Engineering structure. Furthermore, the effectiveness of two different structure segments in damping waves from September 2020 – March 2021 will be measured. In contrast, non-structurally, mitigation is conducted in a non-physical way by analyzing the Coastal Vulnerability Index of Timbulsloko Village based on the parameters of Coastal Typology, Average Tidal Range, Significant Wave Height, Coastal Slope, Coastal Geomorphology, Sea Level Rises, and Shoreline Displacement using the CVI method. The effectiveness of the permeable structure’s wave damping is determined by the initial wave height and transmission wave height measured by the ultrasonic sensor. On the basis of segment differences, the Permeable Breakwater Segment 2 with a distance between bamboo of 0.25 m has better effectiveness than a Permeable Breakwater Segment 1 with a distance between bamboo of 0.5 m. The results of the Coastal Vulnerability Analysis show that the Timbulsloko Village is vulnerable to coastal disasters, especially coastal erosion.
Źródło:
Journal of Ecological Engineering; 2022, 23, 2; 246-254
2299-8993
Pojawia się w:
Journal of Ecological Engineering
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Development of an Information Security System Based on Modeling Distributed Computer Network Vulnerability Indicators of an Informatization Object
Autorzy:
Lakhno, Valerii
Alimseitova, Zhuldyz
Kalaman, Yerbolat
Kryvoruchko, Olena
Desiatko, Alona
Kaminskyi, Serhii
Powiązania:
https://bibliotekanauki.pl/articles/27311974.pdf
Data publikacji:
2023
Wydawca:
Polska Akademia Nauk. Czasopisma i Monografie PAN
Tematy:
information security
informatization object
distributed computing network
mathematical model
vulnerability coefficient
virtualization
IDS
SIEM
Opis:
A methodology for development for distributed computer network (DCN) information security system (IS) for an informatization object (OBI) was proposed. It was proposed to use mathematical modeling at the first stage of the methodology. In particular, a mathematical model was presented based on the use of the apparatus of probability theory to calculate the vulnerability coefficient. This coefficient allows one to assess the level of information security of the OBI network. Criteria for assessing the acceptable and critical level of risks for information security were proposed as well. At the second stage of the methodology development of the IS DCN system, methods of simulation and virtualization of the components of the IS DCN were used. In the course of experimental studies, a model of a protected DCN has been built. In the experimental model, network devices and DCN IS components were emulated on virtual machines (VMs). The DCN resources were reproduced using the Proxmox VE virtualization system. IPS Suricata was deployed on RCS hosts running PVE. Splunk was used as SIEM. It has been shown that the proposed methodology for the formation of the IS system for DCN and the model of the vulnerability coefficient makes it possible to obtain a quantitative assessment of the levels of vulnerability of DCN OBI.
Źródło:
International Journal of Electronics and Telecommunications; 2023, 69, 3; 475--483
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Towards web applications reliability engineering
Autorzy:
Albeanu, G.
Averian, A.
Duda, I.
Powiązania:
https://bibliotekanauki.pl/articles/2069682.pdf
Data publikacji:
2009
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
web application
software reliability
software vulnerability
software security
Opis:
There is an increasing request for web-based software systems, some of them to be used very intensive. The customers ask not only for fast design and implementation, but also for a high quality product. Considering reliability as an important quality attribute, this paper describes the current state of the art in designing, implementing, and testing web-based applications. An important attention is given to web-based software vulnerabilities and how to deliver secure software. Then, reliability modeling in the case of secure web-based software is discussed.
Źródło:
Journal of Polish Safety and Reliability Association; 2009, 1; 15--22
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Wildland fire risk management using GIS tools – case study
Autorzy:
Majlingová, Andrea
Sedliak, Maroš
Powiązania:
https://bibliotekanauki.pl/articles/1878655.pdf
Data publikacji:
2014
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
GIS
susceptibility
risk
vulnerability
wildland fire
Opis:
In the paper we introduce a general approach to wildland fire risk management that we applied for the Slovensky raj territory. The risk management concept is based on assessment of several risk components: susceptibility in the form of calculation of a priori probability of forest destroying by fire, vulnerability based on calculation of posteriori probability of forest destroying by fire and based on modelling the fire behaviour in FARSITE environment. We also briefly introduce an approach to set the measures to prevent the forest fire occurrence and to manage it to minimize its impacts on human, environment and property (resilience).
Źródło:
Security Dimensions; 2014, 11(11); 57-63
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Charakterystyka głównych geotypów obszarowych ocen podatności wód podziemnych na zanieczyszczenia
The characteristics of main area geotypes for the evaluation of groundwater vulnerability to pollution
Autorzy:
Bukowski, Przemysław
Krogulec, Ewa
Haładus, Andrzej
Powiązania:
https://bibliotekanauki.pl/articles/2076055.pdf
Data publikacji:
2020
Wydawca:
Państwowy Instytut Geologiczny – Państwowy Instytut Badawczy
Tematy:
podatność wód podziemnych
zanieczyszczenia
hydrogeologia
górnictwo podziemne
dokumentowanie hydrogeologiczne
groundwater vulnerability
pollution
hydrogeology
underground mining
hydrogeological documenting
Opis:
The article presents a proposal of the classification of hydrogeological and environmental conditions in relation to different intensities of the impact of factors affecting groundwater threat in assessments of groundwater vulnerability to pollution. Due to the complexity and high degree of transformation of the natural environment, including aquatic, types of areas subjected to ordinary and strong anthropopressure, the so-called Area Geotypes (GO), are distinguished and discussed. The main factors characterizing the impact of mining activity on the water environment (typical and specific) are discussed, and the mine ’s characteristics are highlighted, emphasizing its role and importance as an influator constituting a large, multifactorial source threatening the groundwater environment. The role of the mine as an influator is presented against the background of the mine ’s "life cycle”(development phases) along with an indication of the desirability of carrying out assessments of groundwater vulnerability to pollution and groundwater threat assessments. The need to develop legal regulations regarding the preparation of vulnerability assessments is indicated.
Źródło:
Przegląd Geologiczny; 2020, 68, 4; 226--232
0033-2151
Pojawia się w:
Przegląd Geologiczny
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Nadużycia niebezpiecznych chemikaliów. Jak analizować podatność i skąd czerpać wiedzę?
Misuses of hazardous chemicals. How to analyze vulnerability and where to get knowledge?
Autorzy:
Kalisz, D.
Powiązania:
https://bibliotekanauki.pl/articles/142551.pdf
Data publikacji:
2015
Wydawca:
Stowarzyszenie Inżynierów i Techników Przemysłu Chemicznego. Zakład Wydawniczy CHEMPRESS-SITPChem
Tematy:
analiza podatności
zagrożenia chemiczne
bezpieczeństwo chemiczne
baza danych niebezpiecznych chemikaliów
vulnerability analysis
chemical threats
chemical security
database of potentially hazardous chemicals
Opis:
W Instytucie Chemii Przemysłowej w Warszawie w latach 2013–2015 realizowany był projekt „Ku kulturze bezpieczeństwa chemicznego”, w ramach programu ramowego UE “Prewencja i zwalczanie przestępczości”. W niniejszej publikacji poruszono problem nadużyć niebezpiecznych chemikaliów wraz z podaniem dostępnych źródeł wiedzy – bazując na osiągnięciach tego Projektu.
In 2013–2015 the project „Towards the Chemical Security Culture” being part of the „Prevention and Fight against Crime” Programme was implemented in Industrial Chemistry Research Institute in Warsaw. The issue of misuses of hazardous chemicals is raised in this publication and the sources of knowledge on the basis of the Project achievements are indicated.
Źródło:
Chemik; 2015, 69, 10; 647-648
0009-2886
Pojawia się w:
Chemik
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Reliability and vulnerability of transformers for electricity transmission and distribution
Autorzy:
Berg, H.
Fritze, N.
Powiązania:
https://bibliotekanauki.pl/articles/2069269.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
critical infrastructure
transformer
reliability
ageing
blackouts
Opis:
In the last years the failure frequency of transformers increased, e.g. due to ageing or external hazards. In particular fires and explosions of main oil-filled transformers are considered as critical. Therefore, international experiences of transformer failures at nuclear and non-nuclear power plants and at substations have been investigated in more detail. Consequences of transformer failures with respect to a reliable electricity transmission and distribution as well as measures to enhance the reliability of critical infrastructure and to avoid blackouts are addressed.
Źródło:
Journal of Polish Safety and Reliability Association; 2015, 6, 3; 15--24
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Groundwater vulnerability to pollution in degraded coal mining areas: modifying the DRASTIC method using the factor of exploitation impact on land surface
Autorzy:
Krogulec, Ewa
Bukowski, Przemysław
Niedbalska, Katarzyna
Trzeciak, Joanna
Zabłocki, Sebastian
Powiązania:
https://bibliotekanauki.pl/articles/27310140.pdf
Data publikacji:
2023
Wydawca:
Akademia Górniczo-Hutnicza im. Stanisława Staszica w Krakowie. Wydawnictwo AGH
Tematy:
groundwater vulnerability to pollution
mining area
coal activities
mining exploitation phases
Upper Silesia Coal Basin
Polska
Opis:
Mining activities such as underground exploitation of hard coal deposits and open cast mining are strong factors on groundwater depending on mine life cycle phases. The impact of coal mining activities on groundwater have been reported from many countries. In this case, a vulnerability assessment was conducted base on standard DRASTIC method and its modification DRASTIC MINE (DRASTICM) method. In order to take into account, the impact of mining activities, a new parameter was added which defined the impact of coal seams on the rock mass above, including the degree of its drainage and the range of its impact. In the standard DRASTIC method, the results indicate that groundwater vulnerability with high (38.6%) and very high occurrence classes (16.9% of the area), mostly covers the central part of the cast mine. In contrast, the reclaimed area of the excavation is a low-class area. The DRASTICM method increased the vulnerability index from 3 to 24 on 95% of the area, so a new vulnerability class of extremely high was delineated, which occurred in 1.6% of the area. This indicates areas that should be treated as a priority in order to avoid pollution, and in the final stage to plan activities in the field of the reclamation of mining areas. The results showed that groundwater vulnerability assessment in coal mining areas can be significantly improved.
Źródło:
Geology, Geophysics and Environment; 2023, 49, 4; 313--334
2299-8004
2353-0790
Pojawia się w:
Geology, Geophysics and Environment
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyber security in industrial control systems (ICS):a survey of rowhammer vulnerability
Autorzy:
Aydin, Hakan
Sertbaş, Ahmet
Powiązania:
https://bibliotekanauki.pl/articles/2097442.pdf
Data publikacji:
2022
Wydawca:
Polskie Towarzystwo Promocji Wiedzy
Tematy:
RowHammer
Cyber Security
DRAM
Opis:
Increasing dependence on Information and Communication Technologies (ICT) and especially on the Internet in Industrial Control Systems (ICS) has made these systems the primary target of cyber-attacks. As ICS are extensively used in Critical Infrastructures (CI), this makes CI more vulnerable to cyber-attacks and their protection becomes an important issue. On the other hand, cyberattacks can exploit not only software but also physics; that is, they can target the fundamental physical aspects of computation. The newly discovered RowHammer (RH) fault injection attack is a serious vulnerability targeting hardware on reliability and security of DRAM (Dynamic Random Access Memory). Studies on this vulnerability issue raise serious security concerns. The purpose of this study was to overview the RH phenomenon in DRAMs and its possible security risks on ICSs and to discuss a few possible realistic RH attack scenarios for ICSs. The results of the study revealed that RH is a serious security threat to any computer-based system having DRAMs, and this also applies to ICS.
Źródło:
Applied Computer Science; 2022, 18, 2; 86--100
1895-3735
Pojawia się w:
Applied Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Groundwater vulnerability in the light of information layers of the hydrogeological map of Poland, scale 1:50,000
Autorzy:
Herbich, P
Przytuła, E.
Woźnicka, M.
Powiązania:
https://bibliotekanauki.pl/articles/1182787.pdf
Data publikacji:
2008
Wydawca:
Państwowy Instytut Geologiczny – Państwowy Instytut Badawczy
Tematy:
pierwszy poziom wodonośny
główny użytkowy poziom wodonośny
podatność
stopy
mapa hydrogeologiczna Polski
first aquifer
groundwater degradation risk
Hydrogeological Map of Poland
usable aquifer
vulnerability
Opis:
Określenie naturalnych możliwości ochronnych wód podziemnych jest jednym z ważniejszych zadań jakie podejmowane są obecnie w związku z wdrażaniem w Polsce ustaleń wynikających z Ramowej Dyrektywy Wodnej. Dotyczy to zarówno płytkich systemów krążenia wód podziemnych, jak i głównych użytkowych poziomów wodonośnych. W niniejszym opracowaniu przedstawiono warstwy informacyjne Mapy hydrogeologicznej Polski w skali 1:50 000, które określają wrażliwość na zanieczyszczenie pierwszego poziomu wodonośnego oraz stopień zagrożenia głównego użytkowego poziomu wodonośnego.
Źródło:
Polish Geological Institute Special Papers; 2008, 24; 69-74
1507-9791
Pojawia się w:
Polish Geological Institute Special Papers
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Wulnerabilność Doroty Masłowskiej w obliczu „syndromu drugiej powieści” jako temat "Pawia królowej"
Dorota Masłowska’s vulnerability in the face of the “second novel syndrome” as a theme in "Paw Królowej" [The Queen’s Peacock]
Autorzy:
Michalak, Anna
Powiązania:
https://bibliotekanauki.pl/articles/1853623.pdf
Data publikacji:
2018
Wydawca:
Narodowe Centrum Kultury
Tematy:
wulnerabilność
podatność na zranienie
piętno
dorota masłowska
vulnerability
susceptibility to being hurt
stigma
Opis:
Basing on the example of Paw królowej [The Queen’s Peacock], the article presents the manner in which Dorota Masłowska problematizes her own situation and position in the world of (pop) culture after the spectacular success of her debut novel White and Red. The paper defines the category of vulnerability and uses it to determine the subject position of the author. Female characters in the book are treated as metaphorical incarnations of Dorota Masłowska, reflecting her emotions related to her vulnerable position.
Źródło:
Kultura Współczesna. Teoria. Interpretacje. Praktyka; 2018, 103, 4; 211-224
1230-4808
Pojawia się w:
Kultura Współczesna. Teoria. Interpretacje. Praktyka
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The Threat of Optical Transmission Jamming
Autorzy:
Kowalczyk, Marcin
Marzecki, Michał
Siuzdak, Jerzy
Powiązania:
https://bibliotekanauki.pl/articles/27312945.pdf
Data publikacji:
2023
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
clip-on coupler
optical communication jamming
optical networks vulnerability
Opis:
In this paper, we investigate how data transmissions may be affected by various types of optical interference introduced into the fiber on purpose, via a clip-on coupler. The research proved that transmissions may be jammed completely using inexpensive equipment readily available on the market, provided that the attacker has physical access to the fiber optic cable. The most dangerous attacks rely on a typical, slowly modulated communication laser with a rectangular waveform. This study urges further research aimed at counteracting such attacks.
Źródło:
Journal of Telecommunications and Information Technology; 2023, 4; 93--101
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Survey on cloud computing vulnerability and cyber attacks: a defensive approach
Autorzy:
Turel, Y.
Powiązania:
https://bibliotekanauki.pl/articles/1933939.pdf
Data publikacji:
2013
Wydawca:
Politechnika Gdańska
Tematy:
cloud computing
security
Iaas
PaaS
SaaS
forensic
encryption
Opis:
Cyber attacks against cloud computing discourage users to migrate to cloud computing. Cloud computing currently has weaknesses in terms of securing data. Unprotected data and weak storage security are potential threats to cloud computing. There are security risks and they should be considered carefully before enterprises migrate to cloud computing. Specifying cloud computing vulnerabilities and defining cyber attacks against infrastructure of the Cloud are the targets of this research. Mitigation of the non-technical problems may decrease the security problems. However, cryptographies, distributed denial of service and flooding attacks damage the servers and services. In this research, my aim is to demonstrate cloud computing vulnerability and the threats against data and storage. Once the cloud security problems are defined, the next step is to look for a solution. Using forensic methods to inspect intrusion attempts, implementing an online forensic workstation monitoring the login details of cloud authentication server, providing evidence of cyber crime are recommended.
Źródło:
TASK Quarterly. Scientific Bulletin of Academic Computer Centre in Gdansk; 2013, 17, 1-2; 95-107
1428-6394
Pojawia się w:
TASK Quarterly. Scientific Bulletin of Academic Computer Centre in Gdansk
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Ocena podatności na zagrożenia wód podziemnych metodą DRASTIC we wschodniej części Drawieńskiego Parku Narodowego
Vulnerability assessment to contamination of groundwater of the eastern part of Drawa National Park by DRASTIC method
Autorzy:
Stańczak, E.
Powiązania:
https://bibliotekanauki.pl/articles/2075223.pdf
Data publikacji:
2015
Wydawca:
Państwowy Instytut Geologiczny – Państwowy Instytut Badawczy
Tematy:
DRASTIC
Ocena podatności
analiza GIS
wody gruntowe
Drawieński Park Narodowy
vulnerability assessment
GIS analysis
groundwater
Drawa National Park
Opis:
In article shown question vulnerability to contamination, natural characteristic of groundwater, for the eastern part of Drawa National Park (DNP). To vulnerability assessment used usually known range DRASTIC method. Based on input data determined pixel size of map Δx = Δy = 50 m. The DRASTIC parameters were exactly checked. One of the most important recharging infiltration (162.5 mm/year), compared with result of hydrological method. It shown similar value and this data are reliable. By means of GIS analysis calculated the DRASTIC index. Visualization superficial distribution of classes of vulnerability is shown as map of groundwater vulnerability. The results indicate that more than 90% study area is located high vulnerability class.
Źródło:
Przegląd Geologiczny; 2015, 63, 10/2; 1074--1079
0033-2151
Pojawia się w:
Przegląd Geologiczny
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Review of Promising Insensitive Energetic Materials
Autorzy:
Badgujar, D. M.
Talawar, M. B.
Mahulikar, P. P.
Powiązania:
https://bibliotekanauki.pl/articles/358792.pdf
Data publikacji:
2017
Wydawca:
Sieć Badawcza Łukasiewicz - Instytut Przemysłu Organicznego
Tematy:
ammunition
azoxyfurazan
insensitive munitions
safety
vulnerability
Opis:
During the last twenty years military explosives, and energetic materials in general, have changed significantly. Worldwide, research and development programs are active in developing promising insensitive HEMs with higher performance. This has been due to several factors, which include new operational requirements such as Insensitive Munitions (IM), but it is also due to the availability of new materials and to new assessment and modelling techniques. The present review focuses on the basic idea and necessity for IM, and the conditions, technical requirements and tests for IM. The review also explains the various promising insensitive high explosives, their synthesis and formulation used in different propellants.
Źródło:
Central European Journal of Energetic Materials; 2017, 14, 4; 821-843
1733-7178
Pojawia się w:
Central European Journal of Energetic Materials
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Reliability and vulnerability of critical infrastructure : electricity distribution
Autorzy:
Berg, H, P.
Fritze, N.
Powiązania:
https://bibliotekanauki.pl/articles/2069366.pdf
Data publikacji:
2013
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
critical infrastructure
reliability
transformer
ageing
failure statistics
blackouts
Opis:
In recent years the failure frequency of transformers increased. In particular fires and explosions of main oilfilled transformers are considered as critical. Therefore, international experiences of transformer failures at nuclear and non-nuclear power plants and at substations have been investigated in more detail. Consequences of transformer failures with respect to a reliable electric power supply and distribution are addressed and proactive measures to enhance the reliability of critical infrastructure and to avoid blackouts are described.
Źródło:
Journal of Polish Safety and Reliability Association; 2013, 4, 1; 9--20
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Social Virtues in Taking Care of the Image of Others
Autorzy:
Cataño, Rafael Jiménez
Powiązania:
https://bibliotekanauki.pl/articles/2016100.pdf
Data publikacji:
2018
Wydawca:
Komisja Nauk Filologicznych Polskiej Akademii Nauk, Oddział we Wrocławiu
Tematy:
Care Philosophy
Politeness
Social Virtues
Affability
Vulnerability question
Opis:
The Philosophy of Care finds in human life a sort of calling to take care of each other. This vocation for every human being is based on the vulnerability that belongs to the human condition. Among ordinary dimensions of vulnerability/care (such as eating, resting, learning, transporting, nurturing), one that is very ordinary and even broader is that of image. Theory of Politeness deals with this image care, responding to its vulnerabilities.Care is a central reality of human relationality, which requires a process of practical learning. Virtues are the concrete reality of the growth of the person. Pertinent for image care are the virtues related to truth, those related to dependence and autonomy, and the traditionally-called social virtues. After a long evolution of the latter from classical thought to the Middle Ages, it remains a system of virtues that illuminates the current way to perceive the image, its care, and the rights and duties related to image. The current propensity to safeguard goods through laws is transforming the type of “debt” that corresponds to virtues like truthfulness, liberality and affability, earlier acknowledged as being not very coercive. Leaving aside possible political proposals, this phenomenon draws attention to the deep humanity of such fields, where people sometimes presume a responsibility that presses the conscience more than duties endorsed by laws. The vocation to care transforms everybody into a caregiver, with the widest sphere in the case of the image.
Źródło:
Academic Journal of Modern Philology; 2018, 7; 79-87
2299-7164
2353-3218
Pojawia się w:
Academic Journal of Modern Philology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Tworzenie map ryzyka i map podatności jako elementu systemu zarządzania kryzysowego
Creation of risk maps and vulnerability maps as part of crisis management system
Autorzy:
Kopczewski, M.
Pająk, K.
Powiązania:
https://bibliotekanauki.pl/articles/348407.pdf
Data publikacji:
2011
Wydawca:
Akademia Wojsk Lądowych imienia generała Tadeusza Kościuszki
Tematy:
zarządzanie kryzysowe
identyfikacja zagrożeń
ryzyko
mapa zagrożeń
mapa ryzyka
mapa podatności
crisis management
identification of hazards
risk
hazard map
risk map
vulnerability map
Opis:
Zgodnie z zapisami ustawy o zarządzaniu kryzysowym istotnym elementem krajowego, wojewódzkiego, powiatowego i gminnego planu zarządzania kryzysowego jest stworzenie mapy zagrożeń i mapy ryzyka. Przydatnym elementem w zarządzaniu kryzysowym są też mapy podatności, która określa wzajemną zależność, wrażliwość i odporność społeczności lokalnej oraz środowiska na zagrożenia. Niniejszy artykuł opisuje sposób tworzenia map ryzyka i map podatności.
In accordance with the provisions of the Act on crisis management, a significant element of the national, voivodeship, poviat and commune crisis management plans is to create hazard and risk maps. A useful element in risk management is also vulnerability maps. Vulnerability determines the interdependence of the sensitivity and resistance of the local population and the environment to risk. This article describes how to create risk maps and vulnerability maps.
Źródło:
Zeszyty Naukowe / Wyższa Szkoła Oficerska Wojsk Lądowych im. gen. T. Kościuszki; 2011, 4; 297-306
1731-8157
Pojawia się w:
Zeszyty Naukowe / Wyższa Szkoła Oficerska Wojsk Lądowych im. gen. T. Kościuszki
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A relational concept of inclusion. Critical perspectives
Autorzy:
Caroline, Schmitt,
Powiązania:
https://bibliotekanauki.pl/articles/892988.pdf
Data publikacji:
2019-07-29
Wydawca:
Uniwersytet Warszawski. Wydawnictwa Uniwersytetu Warszawskiego
Tematy:
inclusion
relational inclusion
integration
separation
social work
special needs education
participation
agency
vulnerability
Opis:
The adoption of the Convention on the Rights of Persons with Disabilities (CRPD) underlines the status of inclusion as a human right. In this context, inclusion means being involved in society, and people being acknowledged whatever their abilities and needs. The article gives an insight into the international debate on inclusion, and the discussion and state of implementation in Germany. It advocates a relational concept of inclusion making use of an “agency-vulnerability nexus”. Just like the human rights understanding of inclusion, relational theories of agency and vulnerability examine the processes in social environments which enable or hinder agency. They focus on professional practice, the organisational structures of social services, political conditions and social discourse (for example on disability or refugeeism) and how they are relevant to subjective scopes of action. A perspective of this kind has inherent potential with regard to social criticism, and this is indispensable for a debate which understands inclusion as a task to be tackled by society as a whole.
Źródło:
Papers of Social Pedagogy; 2019, 11(1); 60-76
2392-3083
Pojawia się w:
Papers of Social Pedagogy
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Modelling of discrete recognition and information vulnerability search procedures
Modelirovaniye diskretnykh protsedur raspoznavaniya ugroz i poiska uyazvimostey informatsii
Autorzy:
Lahno, V.
Petrov, A.
Powiązania:
https://bibliotekanauki.pl/articles/792978.pdf
Data publikacji:
2011
Wydawca:
Komisja Motoryzacji i Energetyki Rolnictwa
Źródło:
Teka Komisji Motoryzacji i Energetyki Rolnictwa; 2011, 11A
1641-7739
Pojawia się w:
Teka Komisji Motoryzacji i Energetyki Rolnictwa
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
„We will go through this TOGETHER!“ Bemerkungen zu Vulnerabilität und zum kompulsiven Resilienzvarieté in politischen COVID-19-Krankheitsnarrativen
„We will go through this TOGETHER!“ Notes on Vulnerability and Compulsive Resilience Vaudeville in Political COVID-19 Illness Narratives
Autorzy:
Bonacchi, Silvia
Warnke, Ingo H.
Powiązania:
https://bibliotekanauki.pl/articles/2056808.pdf
Data publikacji:
2021
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
Vulnerabilität
Resilienz
Gender
Covid-19
Soft Authoritarianism
vulnerability
resilience
gender
soft authoritarianism
Opis:
Das Paper diskutiert in einer ersten, tentativen und explorativen Sichtung Fragen der Resilienzperformanz in sozial adressierten Krankheitsnarrativen im Rahmen politischer Kommunikation und Selbstdarstellung. Am Beispiel des US-Präsidenten Donald Trump und des Britischen Premierministers Boris Johnson und ihrer Covid-19-Erkrankungen wird auf Formen der medialen Selbstdarstellung als resiliente Politiker eingegangen. Die gendercodierten Displays von Vulnerabilität und maskuliner Resilienz werden in einer kritischen Lesart auf die Performanz des vermeintlich Normalen bezogen. Dabei werden ausgehend von Judith Butler die Krankheitsnarrative der Stärke interpretiert als Abwehr und Angst vor Schwäche und Bedrohung. Im Fazit werden die ersten Beobachtungen auf Fragen neuer Formen des Autoritarismus, des so genannten Soft Authoritarianism bezogen. Der Beitrag versteht sich als Skizze und als Vorüberlegung zu einer späteren systematischen Beschäftigung mit Vulnerabilität, Gender und politischer Kommunikation.
In a first, tentative and explorative review, the paper discusses issues of resilience performance in socially addressed illness narratives in the context of political communication and self-representation. Using the examples of U.S. President Donald Trump and British Prime Minister Boris Johnson and their Covid-19 disorders, the paper explores forms of media self-representation as resilient politicians. In a critical reading, the gender-coded displays of vulnerability and masculine resilience are related to the performance of the supposedly normal. Taking Judith Butler as a reference point, the illness narratives of strength are interpreted as a defense against and fear of weakness and threat. In the conclusion, the initial observations are related to questions of new forms of authoritarianism, so-called soft authoritarianism. The article is intended as a sketch and as a preliminary consideration for a future systematic study of vulnerability, gender, and political communication. 
Źródło:
Lublin Studies in Modern Languages and Literature; 2021, 45, 2; 53-64
0137-4699
Pojawia się w:
Lublin Studies in Modern Languages and Literature
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Niepewność oceny podatności wód podziemnych na zanieczyszczenia dla obszarów miejskich na przykładzie warszawskiej dzielnicy Bielany
Uncertainty of the assessment of groundwater vulnerability for urban areas on the example of the Bielany Warsaw’s district
Autorzy:
Krogulec, E.
Trzeciak, J.
Powiązania:
https://bibliotekanauki.pl/articles/2075756.pdf
Data publikacji:
2017
Wydawca:
Państwowy Instytut Geologiczny – Państwowy Instytut Badawczy
Tematy:
podatność wód podziemnych
metoda DRASTIC
obszar miejski
analiza wrażliwości
groundwater vulnerability assessment
DRASTIC
urban areas
sensitivity analysis
Opis:
Groundwater vulnerability assessment is an important environment management tool. In this study assessment of groundwater vulnerability to pollution was conducted by DRASTIC method in urban area, represented by the Bielany - district of Warsaw. The results of this study showed that 70% of the study area has medium or moderately high pollution potential and nearly 30% area has low and very low pollution potential. Two sensitivity tests were performed: the map removal sensitivity analysis and the single-parameter sensitivity analysis. Sensitivity analysis is defined as the evaluation of the effect of changes of input values on the output of the model, therefore, in order to reduce subjectivity of groundwater vulnerability assessment sensitivity analysis was performed for DRASTIC procedure. Both tests highlighted the role of the parameter „depth to water" in groundwater vulnerability assessment.
Źródło:
Przegląd Geologiczny; 2017, 65, 11/1; 1090--1095
0033-2151
Pojawia się w:
Przegląd Geologiczny
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A cross-lagged study of gender discrimination in entry-level jobs: a vulnerability theory perspective
Wspólne badanie dyskryminacji płci w okresie początkowym pracy: perspektywa teorii wrażliwości
Autorzy:
Vazeerjan, Begum
Tahseen, Arshi
AbdelFatah, Arman
Xuan, Chan S.
Maniyarasi, Gowindasamy
Powiązania:
https://bibliotekanauki.pl/articles/27315195.pdf
Data publikacji:
2022
Wydawca:
Politechnika Częstochowska
Tematy:
gender discrimination
perception
vulnerability
Malaysia
retail sector
dyskryminacja ze względu na płeć
percepcja
wrażliwość
Malezja
sektor detaliczny
Opis:
This study contributes to understanding early-career entry-level women's discrimination by analyzing the drivers of gender discrimination in entry-level jobs in the Malaysian retail sector. It uses vulnerability theory to explain the susceptibility of women and the conditions and perceptions that lead to their discrimination through a cross-lagged study. The study sample consisted of 349 women working in the Malaysian retail industry in Klang Valley. The findings reveal that several factors make women vulnerable in the Malaysian retail sector, including economic compulsion, organizational injustice, stereotyping and perceived social discrimination. Perceptions and practices become stronger over time. However, resilience can moderate vulnerabilities and, therefore, reduce women's discrimination. The significance of this study lies in its ability to understand vulnerability-enhancing discriminators and the utilization of resilience to address them.
Niniejsze badanie przyczynia się do zrozumienia dyskryminacji kobiet na początku kariery zawodowej, analizując przyczyny dyskryminacji ze względu na płeć w początkowych pracach w malezyjskim sektorze detalicznym. Wykorzystuje teorię podatności, aby wyjaśnić podatność kobiet oraz warunki i percepcje, które prowadzą do ich dyskryminacji poprzez badanie cross-lagged. Próba badawcza składała się z 349 kobiet pracujących w malezyjskiej branży detalicznej w Klang Valley. Wyniki pokazują, że kilka czynników sprawia, że kobiety w malezyjskim sektorze handlu detalicznego są narażone, w tym przymus ekonomiczny, niesprawiedliwość organizacyjna, stereotypy i postrzegana dyskryminacja społeczna. Postrzeganie i praktyki stają się z czasem silniejsze. Jednak odporność może łagodzić podatność na zagrożenia, a tym samym zmniejszać dyskryminację kobiet. Znaczenie tego badania polega na jego zdolności do zrozumienia czynników dyskryminujących zwiększających podatność na zagrożenia i wykorzystania odporności do ich rozwiązania.
Źródło:
Polish Journal of Management Studies; 2022, 25, 2; 396--410
2081-7452
Pojawia się w:
Polish Journal of Management Studies
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies