نتایج جستجو برای: the vulnerability map

تعداد نتایج: 16073642  

Journal: :Journal of environmental management 2008
Mohammad N Almasri

Gaza coastal aquifer (GCA) is the major source of fresh water for the 1.5 million residents of Gaza Strip, Palestine. The aquifer is under deteriorating quality conditions mainly due to the excessive application of fertilizers. The intrinsic vulnerability of GCA to contamination was assessed using the well-known DRASTIC method. Detailed analysis of the intrinsic vulnerability map of GCA was car...

2006
Shuichi Aono Masahiro Wada Yoshifumi Nishio

A chaotic map has various features. A chaotic map has sensitivity to a change in initial conditions and parameters, and a long-term forecast becomes impossible by the iterations of a chaotic map. These features looks similar to the properties of the cryptology. For that reason, it is effective to use chaotic maps for cryptosystems. The chaotic cryptosystem is researched as an application of cha...

Journal: :journal of algorithms and computation 0
dara moazzami university of tehran, college of engineering, department of engineering science

if we think of the graph as modeling a network, the vulnerability measure the resistance of the network to disruption of operation after the failure of certain stations or communication links. many graph theoretical parameters have been used to describe the vulnerability of communication networks, including connectivity, integrity, toughness, binding number and tenacity.in this paper we discuss...

Journal: :مدیریت مخاطرات محیطی 0
شکور سلطانی دکتری ژئومورفولوژی، وزارت نیرو ایثار نورایی صفت دانشجوی کارشناسی ارشد آموزش محیط زیست، دانشگاه تهران طاهر ولی پور دانشجوی کارشناسی ارشد هیدروژئومورفولوژی، دانشگاه شهید بهشتی عبدالکریم ویسی دانشجوی دکتری ژئومورفولوژی، دانشگاه تهران احمد عباسیان کارشناس ارشد ژئومورفولوژی، دانشگاه تهران

vulnerability and contamination risk assessment is of great importance in karst aquifer management. because of vastness of karst in zagros, natural conditions and human activity within the region of aquifer, pollution emission has become one of the most important challenges in front of zagros aquifers. the purpose of this study is to assess marab aquifer vulnerability, using riske model and, de...

Journal: :Fire 2023

Although it is hard to predict wildfires, risky areas can be systematically assessed and managed. Some of the factors for decision-making are hazard, vulnerability, risk maps, which end product wildfire mapping. This study deals with analysis in Queensland, Australia. A review previous studies focusing on each aspect has been done used records from 2011 2019 Australia, compile required input mo...

2015
Wen-Ching Chuang Patricia Gober

BACKGROUND Vulnerability mapping based on vulnerability indices is a pragmatic approach for highlighting the areas in a city where people are at the greatest risk of harm from heat, but the manner in which vulnerability is conceptualized influences the results. OBJECTIVES We tested a generic national heat-vulnerability index, based on a 10-variable indicator framework, using data on heat-rela...

2009
Cyrille Bertelle Antoine Dutot Michel Nabaa Damien Olivier Phillipe Lebon Pascal Mallet

The utilization of the road network by vehicles with different behaviors can generate a danger under normal and especially under evacuation situations. In Le Havre agglomeration (CODAH), there are 33 establishments classified SEVESO with high threshold. The modeling and assessment of the danger is useful when it intersects with the exposed stakes. The most important factor is people. In the lit...

2007
Shuichi Aono Yoshifumi Nishio

A chaotic map has sensitivity to a change in initial conditions and parameters, and a long-term forecast becomes impossible by iterations of a chaotic map. These features look similar to the properties of the cryptology. For that reason, it is effective to use chaotic maps for cryptosystems. In this research, we propose a cryptosystem using iterations of a chaotic map. This cryptosystem uses ex...

Journal: :مهندسی سازه 0
سید ادریس جوادین محمدعلی لطف الهی یقین

according to non-existence of accurate inspection tools on various steps of design and construction of buildings in the past, also due to any change in function of some structures and finally of seismic activities of residential regions of the country, vulnerability assessment of existing structures is necessary. evaluation of vulnerability of the structures is classified in two categories, qua...

Journal: :رفاه اجتماعی 0
حسین راغفر h. raghfar لیلا صانعی l . sane

objective: poverty alleviation is an essential step to achieve economic development. this is why identification exercise is so crucial. traditionally, different aspects of insecurities have not be taken into poverty measurement. many types of insecurities have adverse impacts on household welfare. identifying vulnerability of household can serve identification of the poor households. methodolog...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید