نتایج جستجو برای: nonstructural and functional vulnerability
تعداد نتایج: 16906624 فیلتر نتایج به سال:
INTRODUCTION At the time of disasters, hospitals are considered as one of the most important facilities which should provide emergency services continuously. The purpose of this study was to determine the functional vulnerability of Tehran hospitals in dealing with natural disasters. METHODS This cross-sectional study was conducted in educational hospitals of Tehran University of Medical Scie...
with respect to population growth and agricultural development in ardabil plain, vulnerability assessment of the plain aquifer is necessary for management of groundwater resources and the prevention of groundwater contamination. in this study, vulnerability of ardabil plain aquifer to pollution was evaluated by drastic method. drastic model was prepared by seven effective parameters on vulnerab...
background: groundwater nitrate pollution is an important environmental problem in water resources management. in this regard, specific measures aiming at prevention of water pollution will be helpful to managers and decision-makers. identification of aquifers’ vulnerable areas and determination of groundwater protection zones using most widely used models, such as drastic and cd, are one of th...
Background and Objectives: Studies have documented the morhplogical, neurochemical and functional difference between the dorsal and ventral zones of hippocampus. The aim of this study was to assess the effects of chronic diabetes mellitus type1 on ventral and dorsal zones of hippocampus. Methods: Experimental diabetes was induced by stereptozotocin at a dose of 60 mg/kg. At the end of 8 wee...
Mobile computing devices and the services offered by them are utilized by millions of users on a daily basis. However, they operate in hostile environments getting exposed to a wide variety of threats. Accordingly, vulnerability management mechanisms are highly required. We present in this paper a novel approach for increasing the security of mobile devices by efficiently detecting vulnerable c...
As the proliferation of on-line information storage and interaction continues, so does the continued threat to the security of users and their data. New vulnerabilities are found daily in various pieces of software, used by both users and providers of on-line services, not to mention the myriad of web applications that are not tracked by any central system. Previous research into trends in vuln...
Background & Aim: The Sistan region with over 320 dry days is one of the focal points of the rainstorms, and every year the number of days with dust increases, which results in socio-economic consequences for more than 400,000 people in the region. This study investigated the social vulnerability of the population to air pollution with a different perspective. Methods: The present study is a d...
Fisheries support livelihood of over half a billion of people globally. Many of these people live in coastal regions of developing countries; and have limited capacity to adapt and build resilience in the face of climate change. This research assesses the biophysical and socioeconomic characteristics of fishers in four coastal communities, Komenda, Elmina, Cape coast and Morree, in Ghana. Stru...
Background: Determining social vulnerability of elderly people is a prerequisite for risk analysis in natural disasters. Understanding and comprehension of different dimensions of elderly social vulnerability by using international experiences is a must to determine and ultimately measure this phenomenon. In this study, we tried to understand the dimensions of elderly social vulnerability in na...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید