نتایج جستجو برای: vulnerability risk

تعداد نتایج: 976669  

2015
Michael Hagenlocher Marcia C Castro

BACKGROUND Outbreaks of vector-borne diseases (VBDs) impose a heavy burden on vulnerable populations. Despite recent progress in eradication and control, malaria remains the most prevalent VBD. Integrative approaches that take into account environmental, socioeconomic, demographic, biological, cultural, and political factors contributing to malaria risk and vulnerability are needed to effective...

2002
F. C. Dai C. F. Lee Y. Y. Ngai

Landslides can result in enormous casualties and huge economic losses in mountainous regions. In order to mitigate landslide hazard effectively, new methodologies are required to develop a better understanding of landslide hazard and to make rational decisions on the allocation of funds for management of landslide risk. Recent advances in risk analysis and risk assessment are beginning to provi...

Journal: :پژوهش های روستایی 0
عبدالرضا رکن الدین افتخاری دانشگاه تربیت مدرس ، دکترای جغرافیا و برنامه ریزی روستایی مجید پریشان دانشگاه تربیت مدرس، دانشجوی دکترای جغرافیا و برنامه ریزی روستایی مهدی پورطاهری دانشگاه تربیت مدرس، دکترای جغرافیا و برنامه ریزی روستایی علی عسگری دانشگاه یورک کانادا، دکترای برنامه ریزی شهری و منطقه ای

introduction natural hazards as recurring phenomenon have always existed in human life and will in the future, too. nowadays natural hazards occur throughout the world, but their impacts have been increasing and are generally much greater in developing countries than in developed ones. earthquake is a kind of natural hazard that has the most damages for humankind. earthquakes pose inevitable ri...

پایان نامه :0 1392

it is definitely necessary to understand the concept and behavior of causation of life insurance policies and its determinants for insurance managers, regulators, and customers. for insurance managers, the profitability and liquidity of insurers can be increasingly influenced by the number of causation through costs, adverse selection, and cash surrender values. therefore, causation is a materi...

2007
HUA CHEN TAO ZOU DONGXIA WANG

The security of information systems has been the focus because of network applications. Vulnerability analysis is widely used to evaluate the security of a system to assure system security. With the help of vulnerability analysis, the security risk of a system can be predicted so that the countermeasures are arranged in advance. These will promote system security effectively. The object of vuln...

2012
James Lewis

In understanding and trying to reduce the risk from disasters, connections are often articulated amongst poverty, vulnerability, risk, and disasters. These are welcome steps, but the approach taken in top-down international documents is rarely to articulate explicitly that vulnerability accrues from a wide variety of dynamic and long-term processes. Neglecting these processes-and failing to exp...

Journal: :جغرافیا و مخاطرات محیطی 0
سعید ملکی الیاس مودت

introduction vulnerability is a term used to show the amount and extent of damage and the losses caused by natural disasters in different communities (social, formal-physical, etc.). vulnerabilities is identified as the sensitivity of the environment against the hazards. from among natural disasters, earthquakes can have a vast scope of losses for desert regions. therefore, in order to reduce a...

2016
Zhiqiang Wang Jingyi Jiang Qing Ma

Climate change is affecting every aspect of human activities, especially the agriculture. In China, extreme drought events caused by climate change have posed a great threat to food safety. In this work we aimed to study the drought risk of maize in the farming–pastoral ecotone in Northern China based on physical vulnerability assessment. The physical vulnerability curve was constructed from th...

Journal: :The Journal of law, medicine & ethics : a journal of the American Society of Law, Medicine & Ethics 2009
Carl H Coleman

This article examines and critiques the use of the term "vulnerability" in U.S. and international regulations and guidelines on research ethics. After concluding that the term is currently used in multiple, often inconsistent, senses, it calls on regulators to differentiate between three distinct types of vulnerability: "consent-based vulnerability,""risk-based vulnerability," and "justice-base...

Journal: :Journal of Flood Risk Management 2009

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید