Abstract: The seismic risk mitigation from the perspective of
the old buildings stock is truly essential in Algerian urban areas,
particularly those located in seismic prone regions, such as Annaba
city, and which the old buildings present high levels of degradation
associated with no seismic strengthening and/or rehabilitation
concerns. In this sense, the present paper approaches the issue of the
seismic vulnerability assessment of old masonry building stocks
through the adaptation of a simplified methodology developed for a
European context area similar to that of Annaba city, Algeria.
Therefore, this method is used for the first level of seismic
vulnerability assessment of the masonry buildings stock of the old
city center of Annaba. This methodology is based on a vulnerability
index that is suitable for the evaluation of damage and for the
creation of large-scale loss scenarios. Over 380 buildings were
evaluated in accordance with the referred methodology and the
results obtained were then integrated into a Geographical Information
System (GIS) tool. Such results can be used by the Annaba city
council for supporting management decisions, based on a global view
of the site under analysis, which led to more accurate and faster
decisions for the risk mitigation strategies and rehabilitation plans.
Abstract: Most people today are aware that global climate
change is not just a scientific theory but also a fact with worldwide
consequences. Global climate change is due to rapid urbanization,
industrialization, high population growth and current vulnerability of
the climatic condition. Water is becoming scarce as a result of global
climate change. To mitigate the problem arising due to global climate
change and its drought effect, harvesting rainwater from green roofs,
an environmentally-friendly and versatile technology, is becoming
one of the best assessment criteria and gaining attention in Malaysia.
This paper addresses the sustainability of green roofs and examines
the quality of water harvested from green roofs in comparison to
rainwater. The factors that affect the quality of such water, taking
into account, for example, roofing materials, climatic conditions, the
frequency of rainfall frequency and the first flush. A green roof was
installed on the Humid Tropic Centre (HTC) is a place of the study
on monitoring program for urban Stormwater Management Manual
for Malaysia (MSMA), Eco-Hydrological Project in Kuala Lumpur,
and the rainwater was harvested and evaluated on the basis of four
parameters i.e., conductivity, dissolved oxygen (DO), pH and
temperature. These parameters were found to fall between Class I and
Class III of the Interim National Water Quality Standards (INWQS)
and the Water Quality Index (WQI). Some preliminary treatment
such as disinfection and filtration could likely to improve the value of
these parameters to class I. This review paper clearly indicates that
there is a need for more research to address other microbiological and
chemical quality parameters to ensure that the harvested water is
suitable for use potable water for domestic purposes. The change in
all physical, chemical and microbiological parameters with respect to
storage time will be a major focus of future studies in this field.
Abstract: A new concept of response system is proposed for
filling the gap that exists in reducing vulnerability during immediate
response to natural disasters. Real Time Early Response Systems
(RTERSs) incorporate real time information as feedback data for
closing control loop and for generating real time situation assessment.
A review of the state of the art on works that fit the concept of
RTERS is presented, and it is found that they are mainly focused on
manmade disasters. At the same time, in response phase of natural
disaster management many works are involved in creating early
warning systems, but just few efforts have been put on deciding what
to do once an alarm is activated. In this context a RTERS arises as a
useful tool for supporting people in their decision making process
during natural disasters after an event is detected, and also as an
innovative context for applying well-known automation technologies
and automatic control concepts and tools.
Abstract: Livestock is one of the fastest-growing sectors in
agriculture. If carefully managed, have potential opportunities for
economic growth, food sovereignty and food security. In this study
we mainly analyse and compare long-term i.e. for year 2030 climate
variability impact on predicted productivity of meat i.e. beef, mutton
and poultry for the Kingdom of Saudi Arabia w.r.t three factors i.e. i)
climatic-change vulnerability ii) CO2 fertilization and iii) water
scarcity and compare the results with two countries of the region i.e.
Iraq and Yemen. We do the analysis using data from diverse sources,
which was extracted, transformed and integrated before usage. The
collective impact of the three factors had an overall negative effect on
the production of meat for all the three countries, with adverse impact
on Iraq. High similarity was found between CO2 fertilization
(effecting animal fodder) and water scarcity i.e. higher than that
between production of beef and mutton for the three countries
considered. Overall, the three factors do not seem to be favorable for
the three Middle-East countries considered. This points to possibility
of a vegetarian year 2030 based on dependency on indigenous livestock
population.
Abstract: In the present study we evaluated the nutritional status of 214 institutionalized elderly residents of both genders, aged 65 years and older of 11 care homes located in the district of Viseu (center of Portugal). The evaluation was based on anthropometric measurements and the Mini Nutritional Assessment (MNA) score.
The mean age of the subjects was 82.3 ± 6.1 years-old. Most of the elderly residents were female (72.0%). The majority had 4 years of formal education (51.9%) and was widowed (74.3%) or married (14.0%).
Men presented a mean age of 81.2±8.5 years-old, weight 69.3±14.5 kg and BMI 25.33±6.5 kg/m2. In women, the mean age was 84.5±8.2 years-old, weight 61.2±14.7 kg and BMI 27.43±5.6 kg/m2.
The evaluation of the nutritional status using the MNA score showed that 24.0% of the residents show a risk of undernutrition and 76.0% of them were well nourished.
There was a high prevalence of obese (24.8%) and overweight residents (33.2%) according to the BMI. 7.5% were considered underweight.
We also found that according to their waist circumference measurements 88.3% of the residents were at risk for cardiovascular disease (CVD) and 64.0% of them presented very high risk for CVD (WC≥88 cm for women and WC ≥102 cm for men).
The present study revealed the coexistence of a dual form of malnutrition (undernourished and overweight) among the institutionalized Portuguese concomitantly with an excess of abdominal adiposity. The high prevalence of residents at high risk for CVD should not be overlooked.
Given the vulnerability of the group of institutionalized elderly, our study highlights the importance of the classification of nutritional status based on both instruments: the BMI and the MNA.
Abstract: The objectives of the research are to study patterns of fire location distribution and develop techniques of Geographic Information System application in fire risk assessment for fire planning and management. Fire risk assessment was based on two factors: the vulnerability factor such as building material types, building height, building density and capacity for mitigation factor such as accessibility by road, distance to fire station, distance to hydrants and it was obtained from four groups of stakeholders including firemen, city planners, local government officers and local residents. Factors obtained from all stakeholders were converted into Raster data of GIS and then were superimposed on the data in order to prepare fire risk map of the area showing level of fire risk ranging from high to low. The level of fire risk was obtained from weighted mean of each factor based on the stakeholders. Weighted mean for each factor was obtained by Analytical Hierarchy Analysis.
Abstract: In this study, we estimated the seismic ground motion parameters based on microtremor measurements atPalu City. Several earthquakes have struck along the Palu-Koro Fault during recent years. The USGS epicenter, magnitude Mw 6.3 event that occurred on January 23, 2005 caused several casualties. We conducted a microtremor survey to estimate the strong ground motion distribution during the earthquake. From this surveywe produced a map of the peak ground acceleration, velocity, seismic vulnerability index and ground shear strain maps in Palu City. We performed single observations of microtremor at 151 sites in Palu City. We also conducted8-site microtremors array investigation to gain a representative determination of the soil condition of subsurface structures in Palu City.From the array observations, Palu City corresponds to relatively soil condition with Vs ≤ 300m/s, the predominant periods due to horizontal vertical ratios (HVSRs) are in the range of 0.4 to 1.8 s and the frequency are in the range of 0.7 to 3.3 Hz. Strong ground motions of the Palu area were predicted based on the empirical stochastic green’s function method. Peak ground acceleration and velocity becomes more than 400 gal and 30 kine in some areas, which causes severe damage for buildings in high probability. Microtremor survey results showed that in hilly areas had low seismic vulnerability index and ground shear strain, whereas in coastal alluvium was composed of material having a high seismic vulnerability and ground shear strain indication.
Abstract: The tremendous loss of life that resulted in the aftermath of recent earthquakes in developing countries is mostly due to the collapse of non-engineered and semi-engineered building structures. Such structures are used as houses, schools, primary healthcare centers and government offices. These building are classified structurally into two categories viz. non-engineered and semi-engineered. Non-engineered structures include: adobe, unreinforced masonry (URM) and wood buildings. Semi-engineered buildings are mostly low-rise (up to 3 story) light concrete frame structures or masonry bearing walls with reinforced concrete slab. This paper presents an overview of the typical damage observed in non-engineered structures and their most likely causes in the past earthquakes with specific emphasis on the performance of such structures in the 2005 Kashmir earthquake. It is demonstrated that seismic performance of these structures can be improved from life-safety viewpoint by adopting simple low-cost modifications to the existing construction practices. Incorporation of some of these practices in the reconstruction efforts after the 2005 Kashmir earthquake are examined in the last section for mitigating seismic risk hazard.
Abstract: Farming households faces lots of disaster which contribute to endemic poverty. Anticipated increases in extreme weather events will exacerbate this. Primary data was administered to farming household using multi-stage random sampling technique. The result of the analysis shows that majority of the respondents (69.9%) are male, have mean household size, years of formal education and age of 5±1.14, 6±3.41, and 51.06±10.43 respectively. The major (48.9%) type of disaster experienced is flooding. Major coping mechanism adopted is sourcing for support from family and friends. Age, education, experience, access to extension agent, and mitigation control method contribute significantly to vulnerability to disaster. The major adaptation method (62.3%) is construction of drainage.
The study revealed that the coping mechanisms employed may become less effective as increasingly fragile livelihood systems struggle to withstand disaster shocks. Thus there is need for training of the farmers on measures to adapt to mitigate the shock from disasters
Abstract: Some of the key aspects of vulnerability—discovery, dissemination, and disclosure—have received some attention recently. However, the role of interaction among the vulnerability discoverers and vulnerability acquirers has not yet been adequately addressed. Our study suggests that a major percentage of discoverers, a majority in some cases, are unaffiliated with the software developers and thus are free to disseminate the vulnerabilities they discover in any way they like. As a result, multiple vulnerability markets have emerged. In some of these markets, the exchange is regulated, but in others, there is little or no regulation. In recent vulnerability discovery literature, the vulnerability discoverers have remained anonymous individuals. Although there has been an attempt to model the level of their efforts, information regarding their identities, modes of operation, and what they are doing with the discovered vulnerabilities has not been explored.
Reports of buying and selling of the vulnerabilities are now appearing in the press; however, the existence of such markets requires validation, and the natures of the markets need to be analyzed. To address this need, we have attempted to collect detailed information. We have identified the most prolific vulnerability discoverers throughout the past decade and examined their motivation and methods. A large percentage of these discoverers are located in Eastern and Western Europe and in the Far East. We have contacted several of them in order to collect firsthand information regarding their techniques, motivations, and involvement in the vulnerability markets. We examine why many of the discoverers appear to retire after a highly successful vulnerability-finding career. The paper identifies the actual vulnerability markets, rather than the hypothetical ideal markets that are often examined. The emergence of worldwide government agencies as vulnerability buyers has significant implications. We discuss potential factors that can impact the risk to society and the need for detailed exploration.
Abstract: Child care policy must be a priority area of public authorities in any country. This study investigates child care policy in Kazakhstan in accordance with the current position of children and laws. The results show that Kazakhstan policy in this sphere needs more systematic model including state economic and social measures, parental involvement and role of non-government organizations.
Abstract: Background: Dimensional and transdiagnostic approaches as a result of high comorbidity among mental disorders have captured researchers and clinicians interests for exploring the latent factors to development and maintenance of some psychological disorders. The goal of present study is comparing some of these common factors between generalized anxiety disorder and unipolar mood disorder. Methods: 27 patients with generalized anxiety disorder, 29 patients with depression disorder were recruited by using SCID-I and 69 non-clinical populations were selected by using GHQ cut off point. MANCOVA was used for analyzing data. Results: The results show that worry, rumination, intolerance of uncertainty, maladaptive metacognitive beliefs, and experiential avoidance were all significantly different between GAD and unipolar mood disorder groups. However, there weren’t any significant differences in difficulties in emotion regulation and neuroticism between GAD and unipolar mood disorder groups. Discussion: Results indicate that although there are some transdiagnostic and common factors in GAD and unipolar mood disorder, there may be some specific vulnerability factors for each disorder. Further study is needed for answering these questions.
Abstract: Remote sensing image processing, spatial data analysis through GIS approach, and analytical hierarchy process were introduced in this study for assessing the vulnerability area and inundation area due to tsunami hazard in the area of Rikuzentakata, Iwate Prefecture, Japan. Appropriate input parameters were derived from GSI DEM data, ALOS AVNIR-2, and field data. We used the parameters of elevation, slope, shoreline distance, and vegetation density. Five classes of vulnerability were defined and weighted via pairwise comparison matrix. The assessment results described that 14.35km2 of the study area was under tsunami vulnerability zone. Inundation areas are those of high and slightly high vulnerability. The farthest area reached by a tsunami was about 7.50km from the shoreline and shows that rivers act as flooding strips that transport tsunami waves into the hinterland. This study can be used for determining a priority for land-use planning in the scope of tsunami hazard risk management.
Abstract: Post-disaster reconstruction projects offer
opportunities to facilitate physical, social and economic development
and to reduce future hazard vulnerability long after the disasters.
Sustainability of post-disaster reconstruction project conducted in the
villages of Dinar following the 1995 earthquake was investigated in
this paper. Officials of the Government who were involved in the
project were interviewed. Besides, two field surveys were done in 12
villages of Dinar in winter months of 2008. Beneficiaries were
interviewed and physical, socio-cultural and economic impacts of the
reconstruction were examined. The research revealed that the postdisaster
reconstruction project has negative aspects from the point
view of sustainability. The physical, socio-cultural and economic
factors were not considered during decision making process of the
project.
Abstract: Attack graph is an integral part of modeling the
overview of network security. System administrators use attack graphs to determine how vulnerable their systems are and to determine
what security measures to deploy to defend their systems. Previous methods on AGG(attack graphs generation) are aiming at
the whole network, which makes the process of AGG complex and
non-scalable. In this paper, we propose a new approach which is
simple and scalable to AGG by decomposing the whole network into atomic domains. Each atomic domain represents a host with a specific privilege. Then the process for AGG is achieved by communications
among all the atomic domains. Our approach simplifies the process
of design for the whole network, and can gives the attack graphs including each attack path for each host, and when the network changes we just carry on the operations of corresponding atomic
domains which makes the process of AGG scalable.
Abstract: Climate change causes severe effects on natural
habitats, especially wetlands. These challenges require the adaptation
of their management to probable effects of climate change. A
compilation of necessary changes in land management was collected
in a Hungarian area being both national park and Natura 2000 SAC
and SCI site in favor of increasing the resilience and reducing
vulnerability. Several factors, such as ecological aspects, nature
conservation and climatic adaptation should be combined with social
and economic factors during the process of developing climate
change adapted management on vulnerable wetlands. Planning
adaptive management should be determined by a priority order of
conservation aims and evaluation of factors at the determined
planning unit. Mowing techniques, frequency and exact date should
be observed as well as grazing species and their breed, due to
different grazing, group forming and trampling habits. Integrating
landscape history and historical land development into the planning
process is essential.
Abstract: Today many developers use the Java components
collected from the Internet as external LIBs to design and
develop their own software. However, some unknown security
bugs may exist in these components, such as SQL injection bug
may comes from the components which have no specific check
for the input string by users. To check these bugs out is very
difficult without source code. So a novel method to check the
bugs in Java bytecode based on points-to dataflow analysis is in
need, which is different to the common analysis techniques base
on the vulnerability pattern check. It can be used as an assistant
tool for security analysis of Java bytecode from unknown
softwares which will be used as extern LIBs.
Abstract: In 2011, Debiao et al. pointed out that S-3PAKE protocol proposed by Lu and Cao for password-authenticated key exchange in the three-party setting is vulnerable to an off-line dictionary attack. Then, they proposed some countermeasures to eliminate the security vulnerability of the S-3PAKE. Nevertheless, this paper points out their enhanced S-3PAKE protocol is still vulnerable to undetectable on-line dictionary attacks unlike their claim.
Abstract: Software security testing is an important means to ensure software security and trustiness. This paper first mainly discusses the definition and classification of software security testing, and investigates methods and tools of software security testing widely. Then it analyzes and concludes the advantages and disadvantages of various methods and the scope of application, presents a taxonomy of security testing tools. Finally, the paper points out future focus and development directions of software security testing technology.
Abstract: Paper is dealing with vulnerability concerning elements of hydrological structures and elements of technological equipments which are acceptable for groundwater resources. The vulnerability assessment stems from the application of the register of hazards and a potential threat to individual water source elements within each type of hazard. The proposed procedure is pattern for assessing the risks of disturbance, damage, or destruction of water source by the identified natural or technological hazards and consequently for classification of these risks in relation to emergency water supply. Using of this procedure was verified on selected groundwater resource in particular region, which seems to be as potentially useful for crisis planning system.