Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Vulnerability" wg kryterium: Temat


Tytuł:
Assessment of groundwater vulnerability mapping methods for sustainable water resource management: An overview
Autorzy:
Moges, Simeneh Shiferaw
Dinka, Megersa Olumana
Powiązania:
https://bibliotekanauki.pl/articles/2073742.pdf
Data publikacji:
2022
Wydawca:
Instytut Technologiczno-Przyrodniczy
Tematy:
aquifer vulnerability
groundwater
intrinsic vulnerability
specific vulnerability
vulnerability assessment method
Opis:
Groundwater is a vital resource for domestic, agricultural, and industrial activities, as well as for ecosystem services. Despite this, the resource is under significant threat, due to increasing contamination from anthropogenic activities. Therefore, to ensure its reliability for present and future use, effective management of groundwater is important not only in terms of quantity (i.e. abstraction) but also quality. This can be achieved by identifying areas that are more vulnerable to contamination and by implementing protective measures. To identify the risk and delineate areas that are more exposed to pollution, various groundwater vulnerability assessment techniques have been developed across the globe. This paper presents an overview of some of the commonly used groundwater vulnerability assessment models in terms of their unique features and their application. Special emphasis is placed on statistical methods and overlay-index techniques. The assessment of the literature shows that statistical methods are limited in application to the assessment of groundwater vulnerability to pollution because they rely heavily on the availability of sufficient and quality data. However, in areas where extensive monitoring data are available, these methods estimate groundwater vulnerability more realistically in quantitative terms. Many works of research indicate that index-overlay methods are used extensively and frequently in groundwater vulnerability assessments. Due to the qualitative nature of these models, however, they are still subject to modification. This study offers an overview of a selection of relevant groundwater vulnerability assessment techniques under a specific set of hydro-climatic and hydrogeological conditions.
Źródło:
Journal of Water and Land Development; 2022, 52; 186--198
1429-7426
2083-4535
Pojawia się w:
Journal of Water and Land Development
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
We Just Want to Lead Ordinary Lives – Internal Con icts and Politics of Disintegration in Post-Disaster Indigenous Village in Taiwan
Autorzy:
Kot-Gilewicz, Olimpia
Powiązania:
https://bibliotekanauki.pl/articles/942336.pdf
Data publikacji:
2016
Wydawca:
Szkoła Główna Handlowa w Warszawie
Tematy:
relocation
disaster
vulnerability
Opis:
This paper draws on ethnographic fieldwork to present an account of the current situation of one of the indigenous villages of Taiwan in the face of a natural disaster related interference of the state and non-government organisations, and the struggle of its inhabitants to maintain cultural integrity and socio-political independence. After Morakot typhoon hit the island of Taiwan in August 2009 causing numerous landslides, several indigenous villages including those situated in the mountains' interior, were permanently relocated to the vicinity of the plains and mainstream Han Chinese society. In the process of relocation the government as well as non-government organizations were involved. To the villagers who took an active part in the negotiations process, the new relocation site became an opportunity to unite most of the previously scattered members of the community However the conflicts instigated during the negotiations led several families to refuse relocation. In order to survive in the abandoned village they have returned to traditional mode of subsistence. In their eyes they have become the protectors of their group's traditional territory and sole guardians of the village. Hence by the means of traditional and state provided socio-political structures the villagers have successfully blocked government as well as non-government projects regarding the village, which led to shift of internal authority Through this experience the villagers came to realize increasing sociocultural differences between the mainstream Han Chinese society and their own heritage as well as growing distance between the inhabitants of the original village and the residents of the relocated settlement. Their experience led them to a firm conviction about traditional knowledge to be the guarantor of prosperity and solution to any problems.
Źródło:
Warsaw Forum of Economic Sociology; 2016, 7, 14; 71-85
2081-9633
Pojawia się w:
Warsaw Forum of Economic Sociology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Assessment of characteristics, water quality and groundwater vulnerability in Pakis District, East Java Province, Indonesia
Autorzy:
Rubiantoro, Prasetyo
Bisri, Mohammad
Afandhi, Aminudin
Powiązania:
https://bibliotekanauki.pl/articles/2073736.pdf
Data publikacji:
2022
Wydawca:
Instytut Technologiczno-Przyrodniczy
Tematy:
geoelectrics
groundwater
intrinsic vulnerability
pollution
groundwater quality
specific vulnerability
Opis:
Groundwater is a very important natural resource to support the activities of the residents of Pakis District, Malang Regency. On the other hand, increased activity puts pressure on groundwater quality. Agricultural intensification, urbanisation, and industrialisation can be sources of pollutants. Hydrological factors, topography, lithology, and surrounding rainfall are triggers for contamination of groundwater. The main objective of this research is to determine the characteristics, quality of groundwater, and its susceptibility to pollution. To complete this research, geoelectric measurements were carried out at 43 points spread throughout the study area and sampling of 18 shallow wells in agricultural, residential, and industrial areas for chemical analysis. All data obtained were analysed to create a map of the spatial distribution of groundwater vulnerability. The results show that the groundwater in the study location is in the transition zone and flows through the volcanic rock layers. The level of groundwater pollution is in the uncontaminated status to heavily polluted with pollutants in the form of heavy metal manganese and Escherichia coli bacteria. The spatial distribution of groundwater intrinsic vulnerability shows low, moderate, and high levels of vulnerability, respectively 32.99%, 60.87%, and 6.14% of the research area. Groundwater specific vulnerability associated with land use factors shows that 26.25% are negligible, 42.46% are low, and 31.29% are moderate. From this it can be concluded that the study area has been polluted both geogenically and anthropogenically, therefore, special actions must be taken to restore the quality of groundwater.
Źródło:
Journal of Water and Land Development; 2022, 52; 124--132
1429-7426
2083-4535
Pojawia się w:
Journal of Water and Land Development
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Assessment of factors affecting the intrinsic vulnerability of groundwater rated by the mean residence time estimation method
Autorzy:
Duda, Robert
Kowalczyk, Paweł
Powiązania:
https://bibliotekanauki.pl/articles/2058610.pdf
Data publikacji:
2019
Wydawca:
Państwowy Instytut Geologiczny – Państwowy Instytut Badawczy
Tematy:
groundwater vulnerability
intrinsic vulnerability
residence time
travel time
MRT
GIS
Opis:
We analyse the factors used for assessing groundwater intrinsic vulnerability to pollution in the mean residence time estimation method, providing a final vulnerability evaluation. The following factors were analysed: depth to shallow groundwater, effective precipitation infiltration coefficient, terrain inclination, volumetric water content of soils and rocks in the unsaturated zone and volumetric water content of the topsoil. GIS surveys were performed for two geomorphologically diverse regions: a highland piedmont and a lowland plain in Poland (Central Europe). In both cases, groundwater had spatially diverse vulnerability to contamination. The research method used relied on determining the percentage participation of the area with particular values of the parameters analysed in areas of different degrees of vulnerability. Knowledge of the extent and distribution of variability of the parameters analysed in areas of particular degrees of vulnerability helps explain the causes of spatial variation in groundwater intrinsic vulnerability to contamination in given areas.
Źródło:
Geological Quarterly; 2019, 63, 1; 126--138
1641-7291
Pojawia się w:
Geological Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Design Vulnerability as the Key Element of the Logistics Efficiency of a Product
Autorzy:
Bielecki, Maciej Mieczysław
Madej, Mateusz
Skoczylas, Aleksandra
Powiązania:
https://bibliotekanauki.pl/articles/504309.pdf
Data publikacji:
2014
Wydawca:
Międzynarodowa Wyższa Szkoła Logistyki i Transportu
Tematy:
design
vulnerability
efficiency
product
Opis:
The article highlights the importance of the influence a product itself has on the broadly understood logistics-related issues, referred to as the logistical efficiency of a product. It constitutes the foundation for the concept of design vulnerability of a product, along with its determinants. The paper shows the impact these determinants have on logistics processes on selected examples from the market. The authors of the article also suggest what actions might be undertaken in the strategic and operational sphere of the company logistics, depending on the design vulnerability of a product.
Źródło:
Logistics and Transport; 2014, 21, 1; 5-12
1734-2015
Pojawia się w:
Logistics and Transport
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Źródła użytecznych informacji o zagrożeniach w internecie rzeczy
Autorzy:
Felkner, Anna
Powiązania:
https://bibliotekanauki.pl/articles/13947910.pdf
Data publikacji:
2023-02-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
Internet of Things
IoT
vulnerability
exploit
vulnerability and exploit
database
actionable information
Opis:
One of the many problems facied by users, producers or network owners as well as those who deal with cybersecurity on a daily basis is the issue of vulnerabilities in Internet of Things devices. Although the most popular vulnerabilities are often presented to the general public, the vast majority of them are still known only to cybersecurity specialists, and not to the users who own the vulnerable device. Consequently, it is the users who are most likely to be at risk. It is advisable to increase user awareness of the dangers of owning and using unsecured devices as well as provide access to information about vulnerabilities. Ideally, we would like to have a single source where information about vulnerabilities and exploits related to IoT devices would be collected, aggregated and correlated. Among other things, the article presents various sources of actionable information as well as an open repository that presents information about vulnerabilities and exploits in an accessible way.
Źródło:
Cybersecurity and Law; 2023, 9, 1; 144-154
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Mutual Vulnerability? Asymmetric Relationships in Biblical Anthropology
Autorzy:
Martos, Levente Balazs
Powiązania:
https://bibliotekanauki.pl/articles/2089936.pdf
Data publikacji:
2022-07-15
Wydawca:
Katolicki Uniwersytet Lubelski Jana Pawła II
Tematy:
vulnerability
asymmetric relationships
reciprocity
obedience
Opis:
The 2019 PBC document views relationships between parents and children, masters and servants, “shepherds” and “the flock,” civil authority and citizens as asymmetric. The structure of the document suggests that these relationship systems are based on shared human experience and a common theological foundation: they appear to repeat the pattern of the parent-child relationship and originate in the obligation to obey God. Using the document as a starting point, I would like to outline what the concept of asymmetric relationships can mean today. In search of common perspectives, I will compare New Testament texts with the interpretation of asymmetry in today’s social ethics discourse. The inequality and asymmetry of different persons and groups seem to be an undeniable fact, causing tension that can be resolved fruitfully by parties who take responsibility for each other in the presence of a “third.”
Źródło:
The Biblical Annals; 2022, 12, 3; 431-449
2083-2222
2451-2168
Pojawia się w:
The Biblical Annals
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Vulnerability of power system to cyberattacks
Autorzy:
Chyła, Tomasz
Maciejewska, Weronika
Powiązania:
https://bibliotekanauki.pl/articles/2085635.pdf
Data publikacji:
2021
Wydawca:
Instytut Polityki Energetycznej im. Ignacego Łukasiewicza
Tematy:
SCADA
energetics system vulnerability
cybersecurity
Opis:
Electricity significantly determines the possibility of development of technical civilisation, both on a global and local scale. The availability of energy determines the diversity of civilisational development of communities inhabiting particular areas of the earth. The Internet, in turn, as a tool conducive to the human species, induces many opportunities while simultaneously generating threats. The Supervisory Control and Data Acquisition (SCADA) systems used in the power industry are key elements in the operation of industrial facilities and critical infrastructure, while also being vulnerable to cyberattacks. Successful cyberattacks can cripple internal processes, cause financial losses and potentially lead to unwanted block-outs.
Źródło:
Energy Policy Studies; 2021, No. 2 (8); 13-24
2545-0859
Pojawia się w:
Energy Policy Studies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Methods of improving the jamming resistance of GNSS receiver
Autorzy:
Felski, A.
Powiązania:
https://bibliotekanauki.pl/articles/320565.pdf
Data publikacji:
2016
Wydawca:
Polskie Forum Nawigacyjne
Tematy:
jamming
jamming monitoring
GNSS vulnerability
Opis:
Jamming of GNSS signals can be both a consequence of accidental activities and an intentional act. This issue is lately discussed as an essential threat for the use of satellite navigation systems. This is especially dangerous in the face of common usage of GPS — like systems in everyday life and the great belief of everyday users in the truth of devices indications. In spite of the legal prohibition of using them, jammers are commonly accessible, especially in the Internet. Until recently even specialists have shared the conviction that the broadband GPS signal is not a subject of disturbances in contrast to older wire-less communication techniques because its power level is below natural level of noises and in addition it is randomly coded. But nowadays jammers are very often successfully applied, which is confirmed in many reports. The average user has not the suitable knowledge about the specificity of the jamming and has no technical possibilities of the detection of jammer signals. Receivers, which can indicate the presence of perturbative signals, became accessible a few months ago only. Presently accessible jamming monitors can also determine the direction of interferer signal transmission. There are also specially designed receivers with anti-jamming mechanism, which are, however, not commonly accessible. The possible way of countermeasure the jamming in the GNSS receiver are discussed in this paper.
Zagłuszanie sygnałów GNSS, które może być skutkiem zarówno przypadkowych, jak i celowych działań, jest ostatnio oceniane jako jedno z największych zagrożeń dla użytkowania satelitarnych systemów nawigacyjnych. Jest to szczególnie istotne w obliczu stosowania systemów opartych na idei GPS w życiu codziennym i przy powszechnym zaufaniu przeciętnych użytkowników we wskazania tych systemów. Pomimo oficjalnego zakazu posługiwania się zagłuszaczami, są one powszechnie dostępne, zwłaszcza za pośrednictwem Internetu. Jeszcze do niedawna specjaliści podzielali pogląd, że bardzo szerokie pasmo sygnału GPS nie jest podatne na zagłuszanie, w przeciwieństwie do klasycznych technik radiowych, ponieważ i tak w warunkach naturalnych poziom sygnału w tym systemie jest niższy od poziomu szumów, a ponadto jest kodowany losowo. Jednakże obecnie z pożądanym skutkiem stosowane są tzw. jammery, co potwierdza wiele doniesień. Przeciętny użytkownik nie ma dostatecznej wiedzy na temat specyfiki zagłuszania, jak również nie dysponuje odpowiednim oprzyrządowaniem, aby wykryć sygnały zagłuszające. Zaledwie w ostatnich miesiącach pojawiły się pierwsze odbiorniki, które są zdolne uprzedzać obecność sygnałów zakłócających. Dostępne są również monitory zagłuszania zdolne wskazać nawet kierunek, z którego sygnał zakłócający dochodzi. Istnieją też odbiorniki mające specjalne rozwiązania umożliwiające pracę w warunkach zakłóceń, jednak nie są powszechnie dostępne. W artykule przedstawiono zasadnicze możliwości przeciwdziałania zagłuszaniu w systemach klasy GNSS.
Źródło:
Annual of Navigation; 2016, 23; 185-198
1640-8632
Pojawia się w:
Annual of Navigation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
ICT security in tax administration : Rapid7 Nexpose vulnerability analysis
Autorzy:
Muliński, Tomasz
Powiązania:
https://bibliotekanauki.pl/articles/2052441.pdf
Data publikacji:
2021
Wydawca:
Uniwersytet Przyrodniczo-Humanistyczny w Siedlcach
Tematy:
ICT security
vulnerability scanning tool
tax administration
Rapid7 Nexpose
computer network
vulnerability tests
Opis:
The article focuses on the subject of IT security in tax administration. This study presents the research on the security level of endpoints, servers, printing devices, network switches and other ICT devices using the Rapid Nexpose vulnerability scanner. We discuss the specifics of security research in public administration resulting from the laws in force in these institutions.
Źródło:
Studia Informatica : systems and information technology; 2020, 1-2(24); 36-50
1731-2264
Pojawia się w:
Studia Informatica : systems and information technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Analysis of Structural and Non-Structural Disaster Mitigation Due to Erosion in the Timbulsloko Village, Demak – Central Java
Autorzy:
Sugianto, Denny Nugroho
Widiaratih, Rikha
Widada, Sugeng
Suripin, -
Handayani, Elinna Putri
Cahyaningtyas, Putri
Powiązania:
https://bibliotekanauki.pl/articles/2027833.pdf
Data publikacji:
2022
Wydawca:
Polskie Towarzystwo Inżynierii Ekologicznej
Tematy:
wave damping
permeable breakwater
coastal erosion
Timbulsloko Village
coastal vulnerability analysis
coastal vulnerability index
Opis:
Timbulsloko is a village on the coast of Sayung District, Demak Regency that is severely affected by coastal erosion. The coastal erosion in the Timbulsloko Village is mainly caused by the removal of mangrove areas, which has eliminated the function of the natural breakwater for the coast of the Timbulsloko Village. This study aimed to mitigate the coastal erosion in the form of structural and non-structural protection. Structurally (physically), mitigation is conducted by protecting the coastal area with the application of environmentally friendly coastal protection technology in the form of a Permeable breakwater with a Hybrid Engineering structure. Furthermore, the effectiveness of two different structure segments in damping waves from September 2020 – March 2021 will be measured. In contrast, non-structurally, mitigation is conducted in a non-physical way by analyzing the Coastal Vulnerability Index of Timbulsloko Village based on the parameters of Coastal Typology, Average Tidal Range, Significant Wave Height, Coastal Slope, Coastal Geomorphology, Sea Level Rises, and Shoreline Displacement using the CVI method. The effectiveness of the permeable structure’s wave damping is determined by the initial wave height and transmission wave height measured by the ultrasonic sensor. On the basis of segment differences, the Permeable Breakwater Segment 2 with a distance between bamboo of 0.25 m has better effectiveness than a Permeable Breakwater Segment 1 with a distance between bamboo of 0.5 m. The results of the Coastal Vulnerability Analysis show that the Timbulsloko Village is vulnerable to coastal disasters, especially coastal erosion.
Źródło:
Journal of Ecological Engineering; 2022, 23, 2; 246-254
2299-8993
Pojawia się w:
Journal of Ecological Engineering
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Vulnerability assessment of structures along river channels in Oyo metropolis, Oyo State, Nigeria
Autorzy:
Odedare, Kayode Oyeniyi
Amusa, Idowu Adigun
Titus Olusina, Titus Olusina
Gbiri, Isaac Adelakun
Powiązania:
https://bibliotekanauki.pl/articles/1179180.pdf
Data publikacji:
2017
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
Assessment
Vulnerability
flood and hazards
metropolis
Opis:
This study makes use of Remote Sensing and Geographic Information System techniques to assess the vulnerability of structures along river channels in Oyo metropolis. The vulnerable rates were classified into High, Medium and Low using 30m, 45m and 60m buffer distances from the middle of the river channels while network analysis was also carried out to attend to any emergency operation. To achieve this feat, a geospatial database was designed and created with various analyses carried out on the entities extracted from the satellite image of the study area. Such analyses include, buffering to categorize the vulnerable zones into the various classes, network analyst menu of ArcGIS 10.2.2 was employed to find the best route from the Fire Service Station to the point of accident and also an alternative route in case of a barrier or barriers on the best route. This showed that a total of 881 buildings will be affected in any instance of flooding that is within 60m from the middle of the river channels in the study area. 399 buildings fall in high vulnerable zone accounting for 45.29% of the buildings examined for vulnerability in the study area, 245 buildings fall within the moderately vulnerable zone accounting for 27.81% and 237 buildings fall within low vulnerable zone at 26.90%. The best route from the Fire Service Station to the point of accident is gotten to be 2.3 Km while the alternative route is 2.7 Km when a barrier is placed on the best route during rescue mission indicating 0.4 Km difference between the two routes. Maps, tables and a chart were produced for various results.
Źródło:
World Scientific News; 2017, 83; 130-149
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Analysis of the safety efficiency of a road network : a real case study
Autorzy:
Zio, E.
Sansavini, G.
Maja, R.
Marchionni, G.
Powiązania:
https://bibliotekanauki.pl/articles/2069613.pdf
Data publikacji:
2007
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
complex systems
road networks
safety
vulnerability
Opis:
In this paper, recently introduced topological measures of interconnection and efficiency of network systems are applied to the safety analysis of the road transport system of the Province of Piacenza in Italy. The vulnerability of the network is evaluated with respect to the loss of a road link, e.g. due to a car accident, road work or other jamming occurrences. Eventually, the improvement in the global and local safety indicators following the implementation of a road development plan is evaluated.
Źródło:
Journal of Polish Safety and Reliability Association; 2007, 2; 401--406
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Wildland fire risk management using GIS tools – case study
Autorzy:
Majlingová, Andrea
Sedliak, Maroš
Powiązania:
https://bibliotekanauki.pl/articles/1878655.pdf
Data publikacji:
2014
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
GIS
susceptibility
risk
vulnerability
wildland fire
Opis:
In the paper we introduce a general approach to wildland fire risk management that we applied for the Slovensky raj territory. The risk management concept is based on assessment of several risk components: susceptibility in the form of calculation of a priori probability of forest destroying by fire, vulnerability based on calculation of posteriori probability of forest destroying by fire and based on modelling the fire behaviour in FARSITE environment. We also briefly introduce an approach to set the measures to prevent the forest fire occurrence and to manage it to minimize its impacts on human, environment and property (resilience).
Źródło:
Security Dimensions; 2014, 11(11); 57-63
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies