Science topics: GeographyVulnerability
Science topic

Vulnerability - Science topic

Explore the latest questions and answers in Vulnerability, and find Vulnerability experts.
Questions related to Vulnerability
  • asked a question related to Vulnerability
Question
2 answers
Could anyone help how to do heat vulnerability mapping?
Steps in ArcGIS
and data required
Relevant answer
Answer
You can process MODIS data using GIS. You can do research on Landsat8 data, one of the band on Landsat8 too may give you temperature data. Processing the data to generate maps is very easy using GIS.
  • asked a question related to Vulnerability
Question
1 answer
1. Looking for a suitable model/index for Landscape Ecological Vulnerability assessment.
2. Which parameters are appropriate for this assessment?
Thank you.
Relevant answer
Answer
Landscape ecological vulnerability (LEV) is an important concept in landscape ecology, as it helps us to understand the impact of human activities on ecosystems. There are several models and indices that can be used to assess LEV, such as the Landscape Vulnerability Assessment (LVA), the Landscape Fragmentation Index (LFI), and the Ecological Vulnerability Index (EVI).
The LVA model is based on a set of criteria that measure the susceptibility of a landscape to disturbance. It takes into account factors such as land use, vegetation cover, population density, climate change, and wildfire risk. The LFI measures fragmentation of natural habitats by looking at how much habitat has been lost or fragmented due to human activities. Finally, the EVI uses a combination of biophysical and socio-economic indicators to measure ecological vulnerability.
Each model has its own strengths and weaknesses, so it is important to choose one that best suits your needs. For example, if you are looking for a comprehensive assessment of LEV across a large area, then the LVA may be the most suitable option. On the other hand, if you need to focus on specific areas or species within a landscape then the LFI or EVI may be more appropriate.
No matter which model you choose, it is important to remember that LEV assessments should always take into account both biophysical and socio-economic factors in order to get an accurate picture of how vulnerable an ecosystem is.
Sources
  • asked a question related to Vulnerability
Question
4 answers
I am trying to make a dataset based on MITRE ATT&CK (https://attack.mitre.org/) website to create AI-based threat intelligence. However, I didn't find any automated tools or readymade datasets for it.
Is there any dataset based on the MITRE ATT&CK?
Thanks in advance.
Relevant answer
Answer
Anik Islam Abhi I am working on a relevant paper currently (happy to share findings offline). It covers a regression analysis and AI modeling of data to detect anomalies.
I suspect that another thing you'll need to deal with is how to do this threat analysis in a manner that does not lead to data privacy concerns for both those in the dataset and the data being analyzed for threat intelligence (i.e., ensuring anonymity). I do have a paper that addresses this. Although it is not directed toward your specific research question, it may be useful for that challenge of structuring your dataset:
  • asked a question related to Vulnerability
Question
3 answers
I am a master's student in cloud computing and internet security, I need a topic in relation to the threats and vulnerabilities associated to cloud computing
Relevant answer
Answer
One potential topic in relation to the threats and vulnerabilities associated with cloud computing is "Data Privacy and Security Risks in Cloud Computing." This topic explores the various security risks that can arise when businesses store sensitive data and applications on third-party cloud servers.
Some of the potential threats and vulnerabilities associated with cloud computing include unauthorized access to data, data breaches, insider attacks, data loss, and data leakage. These risks can be exacerbated by the fact that data is often stored in a shared environment and accessed remotely, making it more difficult to monitor and control access.
Note that there may be challenges in maintaining compliance with data privacy regulations and standards when using cloud services, particularly when data is stored in multiple locations or across different jurisdictions.
The objective/research goal for this topic "Cloud-Based Infrastructure Security Threats and Mitigation Strategies" could be:
To analyze the security threats associated with cloud-based infrastructure and identify effective mitigation strategies that can be used to protect sensitive data and applications stored in the cloud.
Understanding the potential security risks and vulnerabilities associated with cloud computing is essential for businesses that rely on cloud services. By taking steps to mitigate these risks, such as implementing strong access controls, using encryption, and regularly monitoring network activity, businesses can help protect their data and ensure the privacy and security of their customers.
Other topics:
"Cloud-Based Infrastructure Security Threats and Mitigation Strategies"
"Risk Management in Cloud Computing: Identifying and Addressing Potential Vulnerabilities"
"Cloud Service Provider Security: Assessing the Risks and Ensuring Compliance"
  • asked a question related to Vulnerability
Question
2 answers
Social networks, as we all know, make it easy for us to be connected with a multitude of people or groups from different parts of the world.
But how necessary is the domain of ICT for job search?
Relevant answer
Answer
Cinta Quintero Martos In addition to the suggestions by Rana Abhyendra Singh LinkedIn Is a good job seekers forum as it can link you to job adverts as well as suport groups with useful suggestions.
  • asked a question related to Vulnerability
Question
1 answer
Dear Respected Patron!
Now a days, its a burning question of the creations that "How to predetermine the Earthquake Signal?" So that, the early precaution may take measure to mitigate huge demolition and vulnerable lose of life.
Relevant answer
Answer
  • asked a question related to Vulnerability
Question
2 answers
Before crusteacean invertibrates radiated from one organism residing in the era of the proteriozoic period, as the phylogenetic tree theory states. It is widely predicted that the vulnerable troposphere of the Ediacaran era with an irregular crust morphology was the result of layering the earth surface with silica and magnetite, small air layers of cooling pockets consisting of the carbon dioxide and inorganic mineral composite items of tourmaline, gneiss material and the formation of a particular organic substance of carbon spheres that are thought to be residual airbourne materials of methane and carbon dioxide. The way tourmaline is deposited is from the very same way iron, berylium and manganese came to the surface as igneus movement. Of course the layering of certain chemicals is quite vast with the formation of sandstone and carbon spheres created spontaneously from on-earth eruptions of primarily condensed oxides.
Relevant answer
Answer
So pete, have you by chance found carbon spheres an interesting side of scientific research?
  • asked a question related to Vulnerability
Question
2 answers
I have been researching on bullet proof military technology and wanted to asses the vulnerability of human body on the battlefield. I would love an layout and explanation of this question.
Relevant answer
Answer
This is not a simple question. You do not sacrifice mobility for protection from blast and/or projectile wounds. There are trade-offs. The development of body armor is a science. I suggest that you read about the development of recent body armor systems of the United States Armed Forces (e.g., Improved Outer Tactical Vest, Interceptor Body Armor). Wikipedia does a decent job describing these two.
  • asked a question related to Vulnerability
Question
3 answers
Zero day attacks exploit path lof ittle resistance while some vendor may leave backdoors in sytems that enhances vulnerability
Relevant answer
Answer
Very True and real problem.
  • asked a question related to Vulnerability
Question
6 answers
Flooding do affect vulnerable citizens in the community and mostly affected by the impact of rainfall.
Relevant answer
Answer
Mainly focus on non-structural mitigation measures like flood forecasting, flood insurance and landuse planning. There are many related studies and reports to cover the mentioned issue.
  • asked a question related to Vulnerability
Question
1 answer
How can we measure/calculate the hazard vulnerability and capacity of any given area having no or not specified sub-level boundaries data?
  • asked a question related to Vulnerability
Question
7 answers
Hello,
I would like to make as broad as possible an inventory of all indices and indicators of vulnerability to climate change. Can you point me to articles or indicators that you know of to help me with this task !?
Thanks in advance !
Relevant answer
  • asked a question related to Vulnerability
Question
3 answers
My research topic is such that I need to gather data from the financially vulnerable sectors or from employees/ individuals who are financially unstable. which segment is most appropriate where can add value as well as data could be fetched? Please give your opinions.
Relevant answer
Answer
As far as my knowledge and experience is concerned that Primary, Secondary and Tertiary Sectors have been generally considered for sectoral performance of the stakeholders in the society.
In Primary Sector implies that agriculture and agriculture related occupations will be considered for the survey research.
In Secondary Sector focused on the Industry and allied fields that is also required the stakeholders for different jobs.
The Tertiary Sector on Government Institutions or Organization's including different stakeholders to execute the activities with help of Good Governance.
The researchers are selecting their research titles based on their convenience like budget, time and resource availability in his/her hands.
Apart from this some of the selected thesis titles are encouraged to the research scholars in time to motivate to select based on the demands of the respective Governments.
  • asked a question related to Vulnerability
Question
2 answers
I am looking for a book to suggest to my university students to study the response of natural environments to external factors, including climate change. I am interested in one that deals in some depth with the issues of vulnerability, resilience, resistance and adaptation. thank you to anyone who suggests something :)
  • asked a question related to Vulnerability
Question
3 answers
Hi,
I've read the paper "Majority is not Enough: Bitcoin Mining is Vulnerable", where there is the following state machine (in "state machine.png")
Then they calculate the probabilities of the state space using the following equations. (in "equations.png")
These equations were given to the readers at the beginning of the State Probabilities section.
Equations 13-14 are clear and straightforward but equations 10-12 contradict my intuition and I think I am missing something.
Relevant answer
Answer
technically, for every cut we have an equilibrium:
rate-to-the-left = equals = rate-to-the-right
(or, rate-in = rate-out)
  • asked a question related to Vulnerability
Question
4 answers
I don't know how to get some different kinds of code injection vulnerability, and I just get some database about sql injection, please recommend some articles to me, or please give me some advice about how to collect database. Thank you~
Relevant answer
Answer
Maybe xss-injection dataset will be useful for you https://figshare.com/articles/dataset/XSS_dataset1_csv/13046138/4
  • asked a question related to Vulnerability
Question
1 answer
Note that the majority of articles I have read use nitrates as a validation élément for the Model.
Relevant answer
Answer
Think of other toxic minerals !!. Regards
  • asked a question related to Vulnerability
Question
12 answers
  1. Dear researcher i would like to know about functional traits. How should be considered functional traits in any Forest ecosystem ? How we can traits be measured or inferred? Are the traits correlated or traded-off. Despite which, and how many, traits should be assessed and monitored in particular study site? And are the functional traits various with respect to region or location habitat, altitude gradient and most importantly how should trait data be analysed?
  • asked a question related to Vulnerability
Question
2 answers
I have a cell line that is vulnerable to liquid N2 and vapor phase nitrogen storage. I am looking for any homemade protocols that allow long term storage of cells under -80oC to -100oC preferably in a ultra low temperature freezer.
Relevant answer
Answer
An ultra low temperature (ULT) freezer is a refrigerator that stores contents at between −40 to −86 °C (−40 to −123 °F). An ultra low temperature freezer is commonly referred to as a "minus 80 freezer" or a "negative 80 freezer", referring to the most common temperature standard and is suitable for soring of cells other than CRYO.
  • asked a question related to Vulnerability
Question
1 answer
Hello team,
Hope all of you are doing well!
I had a DC server running Microsoft windows server 2008 R2 x64. After a vulnerability scan launched on this server using Nexpose, the CVE-2017-8563 was reported by the vulnerability scanner with the message " Vulnerable software installed: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTDS\Parameters LdapEnforceChannelBinding - contains unexpected value 0". As I understand from the CVE report, I have to : 1. Install the KB4025337 2. Create the registry key LdapEnforceChannelBinding" and set it to 1 to enable the KB to fix the CVE reported.
I checked from the server-side, the kb KB4025337 required is already applied after running the "Get-HotFix -Id KB4025337"(but installed on 08/20/2017), so the missed action was to create and set a registry key value "LdapEnforceChannelBinding" to enable the KB to fix the CVE reported.
I relaunch the Nexpose scan I get the same vulnerability reported with the message " Vulnerable software installed: non-vulnerable test results suppressed for readability.HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTDS\Parameters LdapEnforceChannelBinding - contains unexpected value 1 "
I checked also the Local Group Policy, I can see that : DC: LDAP server channel Binding token requirement is set to: When supported DC: LDAP server signing requirement is set to: None
Could someone please help in resolving this issue as it's an emergency for me? should I remove the KB and install it again, could this fix the vulnerability reported?
Relevant answer
  • asked a question related to Vulnerability
Question
2 answers
I'm working on a project and I need the data of these articles :
1-Assessment of runup predictions by empirical models on non-truncated beaches on the south-east Australian coast
2-Coastal vulnerability assessment based on video wave run-up observations at a mesotidal, steep-sloped beach
Can someone help me?
Relevant answer
Answer
Please see the link below:
https://ncu.libanswers.com/faq/279391#:~:text=A%20dataset%20(also%20spelled%20'data,used%20in%20a%20research%20article.
My regards
  • asked a question related to Vulnerability
Question
5 answers
I have to assess the vulnerability of forests to climate change, and therefore, which models are effective for forest type distributions and carbon-related functions, and which could be another model effective to estimate forest carbon flux/storage in the context of Nepal.
Relevant answer
Answer
I think the type of model that you use will depend to a large extent on what data you have you input - especially with carbon flux models. The 'gold standard' models use extensive datasets. Can you give us an idea of what data you have access to?
  • asked a question related to Vulnerability
Question
8 answers
How to compute the Households Vulnerability Index ? Can someone provide me articles, if possible, with supplementary materials related about Households Vulnerability Index ?
  • asked a question related to Vulnerability
Question
3 answers
Focusing on the vulnerabilities in consensus protocols
Relevant answer
Answer
Permissioned Blockchain makes building consensus protocols a linear functionality of considering the vulnerabilities that may exist within other protocols. It is similar to making some variables in a programming language general to the set or looking for a subset to accommodate such variables.
Check this:
I hope this is helpful.
  • asked a question related to Vulnerability
Question
10 answers
Climate change vulnerability is not an emerging issue but the importance of adaptation is always neglected. Inequity makes women’s health vulnerable from their birth and regional variation makes it more prominent specially due to climate change vulnerability. Disparity in healthcare access is more problematic in third world countries like Bangladesh and it occurs at each level: individual, family, social and even in regional variation. Men’s perception about women’s health is not satisfactory at rural-coastal level in Bangladesh and the problem is more deeply rooted in disaster prone areas where early marriage and adolescent pregnancy are just in epidemic always.
Relevant answer
Answer
Climate change makes countries more vulnerable, especially developing countries.
Adaptation is everyone's business: Men, women, and even children must adapt, even though it has an impact on the environment, the economy, health, among others.
Climate displaced or refugees, especially women and girls, are sometimes victims of violence and sexual abuse.
With early pregnancies, children who have no known father, girls who have become young adults/mothers seek and do whatever they can to support themselves.
In Haiti, 12 years after the earthquake, the evidence is clear...
  • asked a question related to Vulnerability
Question
12 answers
In order to assess the socio-economic vulnerability of households, what data would be needed and can be obtained from the National Statistics Institute ?
Relevant answer
Answer
Data on illiteracy, poverty, and unemployment rates can be searched
  • asked a question related to Vulnerability
Question
5 answers
How to do landslide vulnerability index?
Relevant answer
Answer
Kongeswaran Thangaraj - You need to create a database of landslide incidences and corresponding loss to elements at risk to prepare landslide vulnerability index. You will find an useful exercise for this by Prof. Cees van Westen (ITC, The Netherlands).
  • asked a question related to Vulnerability
Question
5 answers
I want a clear solution for measuring economic vulnerability and social vulnerability of a household or an individual in normal weather settings or normal environment. Please help me from your side, if possible
Relevant answer
Answer
Vulnerability to a household/inhabitation may be due to various risk/hazard and other factors and may depend upon time and local geo-environmental setting. It may vary in space and time depending upon various factors, be it anthropogenic changes being rendered to local geo-environment by the residents/local society concerned or be it situations such as extreme events.
  • asked a question related to Vulnerability
Question
3 answers
The states (S) are V -vulnerable people as S1, S2 Rate of people with HIV diagnosis, S3 rate of people with AIDS diagnosis, S4 Rate of deaths from HIV/AIDS virus
Relevant answer
Answer
One of my own algorithms does that. It is called Discrete Probability Detector (DPD). DPD transforms any sequence of symbols into a transition matrix. Please look at the project:
  • asked a question related to Vulnerability
Question
5 answers
Educational discourse leads to a defined career path. However, educational revolutions have ensured that we move and transition from conventional militaristic ways of teaching to self-education and flexible expandable ways of learning and teaching. An epistemological crisis arises when there is a realization and a pressing need of more knowledge systems to blossom and take shape. Usually such knowledge systems have existed longer than the knowledge systems we are already used to in our institutions. Epistemology in its simplest form is knowledge production. The creation of knowledge on the basis of what exists, what is known and what is knowable. When learning, knowledge and what is allowed to exist is based on the power associated with that knowledge. From its creators such as the first people to come up with those concepts, the models, the illustrations and demonstrations. The knowledge systems in conventional environments such as higher learning institutions usually does not take into account how such knowledges can be diffused in indegenous communities. Indegenous knowledge systems have sought to be discovered for exploration, recognition and for the mere fact of one not defaulting to ignorance on the basis that knowledge systems are hierarchically matched as superior against each other. On the basis that there exists no objective truth, epistemology has seized to be systematic, categorised, typologised, patternised, or sequentialized, but rather has spread out into fragments, and some knowledge systems have emanated from areas and places not yet explored, they need to be afforded the same attention and effort if they are to sprout into fruition. However, we need to distinguish if epistemology is career oriented, power oriented or simply knowledge oriented.
Relevant answer
Answer
https://www.jstor.org/stable/3699950 ( Epistemological diversity and education research ) .
  • asked a question related to Vulnerability
Question
5 answers
Can electricity consumption (KWh) be used as an indicator or proxy variable for drought vulnerability assessment? What is the relationship between electricity consumption and drought vulnerability?
Relevant answer
Answer
We have worked on the technological package of crops (including electrical consumption) in these manuscripts that can serve you:
  • asked a question related to Vulnerability
Question
6 answers
I am currently looking for a new research topic for my Ph.D. Specifically, what I did in MA courses was explore the determinants of vulnerability. Here, I consider poverty, covariate risk, and idiosyncratic (household-specific risks) as elements of vulnerability. Then, during my Ph.D. (near future), I want to do my research about land reform and climate change especially in the context of the philippine focusing on CARP and Livelihood by using panel data and some qualitative data. Does anyone have an idea about it?
Relevant answer
Answer
Dear Masahiko Jin,
You are planning to cover an interesting, important and developmental topic as part of your doctoral dissertation. I invite you to my discussion profile of the Research Gate portal, where various issues related to climate change, pro-environmental transformation of the economy, environmental policy, sustainable development, the impact of the pandemic on ecology, food security, sustainable organic farming, etc. have been taken up on my RG portal profile. also publications on specific issues of this issue.
Best regards,
Dariusz
  • asked a question related to Vulnerability
Question
10 answers
Dear Colleagues,
Kindly guide how to arrive at the evaluation of inherent vulnerability to climate change of agriculture sector of the economy?. What are the important parameters to consider? At what scale it is to be evaluated?
Regards
Meraj
Relevant answer
Answer
Thank you very much for the insightful suggestions.
Regards
Gowhar Meraj
  • asked a question related to Vulnerability
Question
4 answers
SCADA, security of SCADA Network, vulnerabilities and security recommendations.
Relevant answer
Answer
Simply: No. That's part of the problem. There are multiple different requirements and implementations for different industries and purposes that all get lumped under the banner "SCADA". They have different ways of doing things. Some equipment vendors discuss this sort of thing as part of product manuals, but typically in a very narrow way of "how to do exactly this one thing with exactly this one product". It takes a lot of reading and thinking to understand where things will work together and where they won't.
In a similar way, there are not many "SCADA" courses or text books and those that exist tend to have a particular viewpoint (e.g. factory automation or wide-spread utilities like power or water). This focus in different areas can lead to a quite different content. I haven't seen anything that attempts to address the wide range of things that get called SCADA and explain how they differ.
I attended a conference last week where a product vendor was explaining how they had implemented a redundant system. It simply could not work they way it was described. Hence I'm pretty sure they didn't do what they said they did, but it may have been too complicated to explain. I suspect they kept a simple diagram that looked good, but the story was contradictory if you know how some of the individual parts work.
If nothing else, this is complicated (meaning lots of simple, but interacting things happen, not "complex" meaning that it is difficult to model or analyze what is actually happening). That might make it a fruitful ground for research by identifying the factors that interact or need to be considered and how they impact the choices that need to be made.
There is an IEC technical report in development (but probably not due for completion for another 12-18 months) that talks about some of the issues that should be considered in the power system automation space when using redundant devices. This is planned to be published as IEC 61850-90-20 "Guideline to redundancy systems". This report probably won't tell you what to do, but it will identify a range of things that should be considered and offer some suggestions.
  • asked a question related to Vulnerability
Question
3 answers
I am working on a project to access the coastal vulnerability. I have different variables like elevation, LULC, bathymetry, etc. of the entire study area.
My analysis steps would loosely be based on the value extraction method followed in this paper ( ). In my understanding, the authors here have extracted the value of different input parameters to some point along the coastline. Then used CVI equation on the attributes of those points to find the CVI value.
My problem is, I have no idea how to transfer these input values to point.
It will be very helpful if anyone could give some hints. I am doing processes in ArcMap.
The image shows part of my study area. The area is covered with elevation raster. The red, green, and yellow points are the points to which I want the data to be extracted.
Relevant answer
Answer
Hi
Since you don't have any sample points for calculating Vulnerability for Coastal areas either you can use the MCDM methods or AHP/Fuzzy AHP methods.
  • asked a question related to Vulnerability
Question
1 answer
Is VPR going to replace CVSS or is it going to be an addition to it?
Relevant answer
Answer
Both are valuable, preference may be considered subject to implementation and security policies set by the Cloud Administrator.
  • asked a question related to Vulnerability
Question
19 answers
Today being World Mental Health Day
The main objective of this day is to raise awareness of mental health cases around the world. It is even more important today as we still struggle with the COVID-19 pandemic. Furthermore, some of the challenges our unjust and unequal world is facing are inequality coupled with corruption, especially in the developing world. It is our responsibility irrespective of how small or big our individual or collective contributions could be, do the very best that we can do to educate ourselves on mental health issues. Accordingly, we can support those we know who are affected by mental health issues of any kind. Some of the limiting factors to offering support are ignorance, unconscious bias, discrimination, stigma, and shame. Therefore let us come together as one in the spirit of common humanity to support our fellow humans! Thank you so much for your time.
What activities can we implement to raise awareness of mental health issues? How can we support those who are affected and vulnerable?
Relevant answer
من خلال توفير المادي وتزويدهم بالتامين ووسائل التقنيات الحديثة كبرامج او تطبيقات بالموبايل فيها توعية صحية او تذكير بممارسة الانشطة وتشجيع ذالك
  • asked a question related to Vulnerability
Question
7 answers
Can "forest cover" be used as an indicator of "drought vulnerability"? If so, what qualitative relationship can there be between the two?
Relevant answer
Answer
Drought may be termed as a hydro-climatic disaster and forest cover can be used as an indicator of drought vulnerability both from environment and socio-economic perspective. Drought vulnerability depends on various socio-economic and environmental indicators in concerned area.
  • asked a question related to Vulnerability
Question
6 answers
Survey on social vulnerability to floods and pandemics
Who is vulnerable to floods and pandemics and why? We want to find this out and ask you to kindly participate in our survey. It is anonymous and takes 10 minutes. Thank you very much for participating and forwarding it to as many as you know in this field.
Here is the link to the survey in different languages:
Thank you very much for supporting research!
Alexander Fekete, Technical University Cologne, Germany
Samuel Rufat, France, Université de Cergy Paris, France
Relevant answer
Answer
I have answered it Prof. Fekete.
  • asked a question related to Vulnerability
Question
4 answers
Groundwater is one of the main sources of drinking water in urban and semi-ur
ban areas, thus assessment of vulnerability to delineate areas that are more susceptible to contamination is very important.
Relevant answer
Answer
Generally speaking, shallow aquifers, and phreatic aquifers are more easily polluted than deep and confined aquifers. The methodologies to find out the vulnerability of an aquifer depands on the hydrogeological conditions of your area of concern. For example, if your site is close to the landfill, or if your aquifer is fed by the river that is polluted, or if your well field is near a oil field-related operation including transportation pipelines, and so on, you would have different methods to use. There are novel developments in these relevant methods to consider. Generally speaking, it is useful to apply novel groundwater dating tools to find out how vulnerable your aquifer is regarding pollution as well as the baseline of water quality parameters.
Hope you find these useful. Good luck!
  • asked a question related to Vulnerability
Question
8 answers
Dear researchers
i want to know the methods to determination te mechanical properties of URM hostiric buildings, and if is there theoretical methods with Safety factor
Relevant answer
Answer
Dear Hatem,
There are several experimental techniques with which you can determine the mechanical properties of unreinforced masonry subjected to different types of actions (i.e., compression, shear, flexure etc.). But if you want to know the range of these values for different types of masonry, then you need to refer to several codes/guidelines/standards like:
1) FEMA 274, P-774, 356, 308, P-751
2) ASCE 41-06
3) ASCE 41-13
4) MSJC 2011
5) AS 3700
6) IS 1905
7) IBC 2009
8) TMS 0403-13
9) EN 1996
I hope this information will be helpful to you.
Regards,
Pravin Kumar
  • asked a question related to Vulnerability
Question
4 answers
Actually i want to do research on Aircraft Communication Vulnerabilities, and i need to know that is there any simulations or desktop softwares of Flight Management System (FMS), ACARS and ADS-B, if it is then please guide me and also from where i get the datasets of all these.
Please guide.
Relevant answer
Answer
Hello Muhammad
You can use Flight simulators such as X-plane or P3D or FSX with addons such as PMDG B737 NG or Aerosoft Airbus A320 family which is provide you the realistic FMS. For ACARS you can use FSX or P3D flight simulator addons too(Search Google). But at all i recommend you to install FSX or P3D beacause i think X-Plane aircraft addons doesn't have and support any ACARS.
  • asked a question related to Vulnerability
Question
67 answers
Update: Consider publishing your work with Routledge in the context of tourism-COVID19 ! Click here https://bit.ly/2SBqmdH for more details
Read my paper on impact of C-19 on events tourism at https://tinyurl.com/yxbd7zs3
Tourism, one of the biggest and fastest growing sector has been considered as a vulnerable industry i.e. in comparison to other industries, tourism industry gets more affected due to any external or internal shocks or stresses. In this regard, the latest outbreak of Corona (COVID-19) virus has caused havoc across the world. The aim of this discussion is to gather the status of impacts of the virus on various national and international tourism policies, inflow, outflow, and tourism sector as a whole. Please provide any data pertaining to this context.
In this regard, you can consider publishing your work in the Routledge Call for Book Chapters: COVID-19 and Tourism Sustainability: Ethics, Responsibilities, Challenges and New Directions. Click on the link given at the beginning of this discussion!
  • asked a question related to Vulnerability
Question
3 answers
Basic, preclinical and clinical research has shown the presence of biological differences between the sexes from the beginning of embryonic development and throughout the entire lifecycle. This dimorphism affects health, protective or vulnerability factors, social and relational life, the search for treatment, and responses to therapeutic interventions. However, studies of addiction and dual diagnosis continue to be carried out mainly in male patients. This prevents obtaining knowledge on the specific characteristics and needs of women.
A first step to improve this knowledge is to update the sex and gender differences found in research into addiction and dual disorders. We encourage original research and review articles about sex and gender differences in addiction and dual disorders: preclinical and clinical models; genetic background; neurobiological, psychological, and social mechanisms; vulnerability factors; biomarkers; social and developmental factors; diagnosis and diagnostic instruments; clinical presentation; response to existing pharmacological and psychological therapies; unmet research, diagnosis and treatment needs; and gender perspectives.
You are invited to contribute a research article or a comprehensive review for consideration and publication in Brain Sciences (ISSN 2076-3425). Brain Sciences is an open access, peer-reviewed scientific journal that publishes original articles, critical reviews, research notes, and short communications on neuroscience. The scientific community and the general public can access the content free of charge as soon as it is published.
Brain Sciences | Special Issue : Sexual Differences in Addictions and Dual Disorders: Importance in Gender Perspective (mdpi.com)
Relevant answer
Answer
Thank you very much indeed Dr. Gonzalo for the opportunity to contribute to Brain Sciences Journal.
As far as the question on the need for gender equality in research related to addiction is considered I completely agree with Dr.Nestor. We cannot have any understanding of the addictive behaviours if we do not include both the genders. If you are thinking of conducting research on social media addiction and concentrate only on the male gender then I don't think this is correct.
All the very best@ Dr. Gonzalo
  • asked a question related to Vulnerability
Question
6 answers
COVID-19 has severely affected social, and economic conditions of people in developing countries and has further exacerbated old risks and vulnerabilities. The governmental and non-governmental organizations have announced and implemented different plans and programs to support communities and SMEs for their recovery. How effective are those plans and programs and do they address the underlying issues that contribute to their vulnerability to disasters, including pandemic?
Relevant answer
Answer
Giving out palliatives truthfully and maintaining social distancing
  • asked a question related to Vulnerability
Question
7 answers
Pregnant women are vulnerable to coronavirus disease 2019 (COVID-19). They have a higher risk of hospitalization and death than those with no pregnancy.
Safety is a critical issue but pregnant women were not included in COVID-19 vaccine research. They may greatly concern about the safety and effectiveness of vaccines that could harm their fetus.
Relevant answer
Answer
Breast-feeding COVID-19 vaccinated mothers also protect their new-borns through their milk
In fact the pregnant lactating women who had been COVID-19 vaccinated can also protect their new-born by breast-feeding them through the SARS-CoV-2 antibodies in their milk.
For details have a look at this article in JAMA in the link below:
  • asked a question related to Vulnerability
Question
9 answers
Microplastics - studies revealed that microplastics enters human placenta!!!! It is threatening our ecosystem and society in more vulnerable way. Are there any purifiers currently applying the filters to filter out microplastics in drinking water?
Relevant answer
Answer
I also agreed with Tarafdar sir
  • asked a question related to Vulnerability
Question
11 answers
May 27, 2020. Things are still bound to get worse, for a while. But for a few hundred thousand, so far, you have survived the Covid-19 infection and have now convalesced. There is no evidence proving you can catch it again. If you had evidence of infection by the actual viral secretion test, and have recovered, you should have antibodies built up to fight the Covid-19. These antibodies can be tested on a blood serum test. You should then be able to resume normal activities, without fear of being re-infected. You can also potentially be a donor of those blood antibodies to help those who are seriously ill from the virus, and hopefully this will be established through the usual blood donor clinics, etc. my main point here though, is that you if you are tested immune, you can probably go fearlessly to the frontline and protect those who are still vulnerable from infection. I hope that the confirmatory Covid-19 serology test will soon be freely available, allowing those fearless warriors to protect the vulnerable from the invisible enemy.
Relevant answer
Answer
Okay, here is a paper/study that tried to answer the question:
JUNE 25, 2021 Lancet study on Losartin treatment in COVID-19. A randomized placebo controlled study, but of limited numbers, so not definitive.
"Trial findings do not support initiation of losartan in outpatients with mild symptomatic COVID-19
Data from a Phase II randomised controlled trial published in EClinicalMedicine suggest that initiation of losartan did not reduce hospitalisations in outpatients with mild symptomatic coronavirus disease 2019 (COVID-19)".
“Losartan treatment did not improve functional status, reduce self-reported dyspnea, and/or affect viral load. These data do not support the initiation of losartan in angiotensin-converting enzyme (ACE) inhibitor- or angiotensin receptor blocker (ARB)-naive outpatients with mild COVID-19 disease,” wrote Michael A. Puskarich, University of Minnesota, Minneapolis, Minnesota, and colleagues.
The trial included symptomatic outpatients with COVID-19 not already taking ACE-inhibitors or ARBs who were enrolled within 7 days of symptom onset across three hospital systems in Minnesota. From April to November 2020, 117 patients were randomised to receive either losartan (n= 59), at 25 mg orally twice daily (reduced to once daily if estimated glomerular filtration rate was reduced), or placebo (n = 58) for 10 days.
The primary outcome was all-cause hospitalisation within 15 days, while secondary outcomes included functional status, dyspnea, temperature, and viral load.
Overall, 4 patients (3.4%) met the primary outcome of all-cause hospitalization at or before day 15, lower than the expected rate of 11% (15% in the control group vs 7% hypothesised in the treatment group). Researchers did not observe a statistically significant difference in the primary outcome between both groups, with 3 hospitalisations occurring in the losartan group (5.2%; 95% confidence interval [CI] 1.1 to 14.4%) compared with 1 hospitalisation in the placebo group (1.7%; 95% CI 0.0 to 9.1%), corresponding to an absolute difference of -3.5% (95% CI -13.2 to 4.8%; P = 0.320) favouring the placebo group.
Additionally, losartan was found to not have a statistically significant impact on functional status or dyspnea. Similarly, maximum daily temperature did not statistically differ by treatment allocation (P = 0.12), while no statistically significant difference by treatment allocation was observed in viral loads at any point.
Meanwhile, adverse events per 10 patient days did not differ significantly between the two groups (0.33 [95% CI 0.22–0.49] for losartan vs 0.37 [95% CI 0.25–0.55] for placebo).
“Due to a lower than expected hospitalisation rate and low likelihood of a clinically important treatment effect, the trial was terminated early,” the authors noted.
“To our knowledge this is the first randomised blinded clinical trial testing the effect of initiation of a renin-angiotensin-aldosterone system inhibitor to naive outpatients with COVID-19.” the authors wrote. “We tested the hypothesis that blockade of angiotensin II activity with losartan would decrease both hospitalisation and respiratory symptoms of COVID-19.”
“Based on the 95% CI we can rule out a treatment effect larger than a 4.8% absolute decrease in the hospitalisation rate in favour of losartan, less than our a priori threshold for clinical significance,” the authors explained.
Nonetheless, the authors acknowledged that the assessment was limited by low event rate.
SOURCE: EClinicalMedicine
(I don't like studies that lack both the methodology and statistical power to prove anything, and then publish that the treatment is not useful, seems like a wasted effort. But presented for your perusal. Thank you for your consideration. Gary Ordog, MD. June 25, 2021)
  • asked a question related to Vulnerability
Question
3 answers
More than 25 years ago, Mark Moore from Harvard’s Kennedy School expressed an idea that the task of public sector managers is to create public value.
Within the last decade, the public value approach to public administration has become increasingly hot. Despite a lot of researches and practical cases on the measurement of public value as a product of public organizations, there has been a lack of clarity about how to measure the public value that public organisations produce.
This particular question is a subject of my research interest. I research public value as a result of corruption prevention policy. For instance, corruption prevention policy development is a key subject to the National Agency on Corruption Prevention of Ukraine established since 2016. Institutionalization of prevention policy does not lead to serious results in Ukraine yet. According to Transparency International CPI for 2020, Ukraine still vulnerable to corruption. The country has reached 117 place among 180 countries of the world with 33 points.
Relevant answer
Answer
Talbot, Colin. (2008). Measuring Public Value - a competing values approach. 10.13140/RG.2.2.36824.90888.
  • asked a question related to Vulnerability
Question
8 answers
I've read numerous papers about socioeconomic vulnerability assessment and I found out that most of the papers focused on natural hazards and disease(such as COVID-19 pandemic). I can't find anything related specifically to water pollution. Therefore, what are the potential parameters/indicators for adaptive capacity for socioeconomic vulnerability assessment of water pollution?
Based on the article, the indicators are risk awareness, early warning capacity, regulation control and emergency response.
In this article, education, access to mobile connection, income, access to water facilities and health awareness camp were as indicators.
However, the indicators used in this article were in demographic domain such as population growth rate, population density and percentage of illiterate households.
I think the biggest challenge is finding a way on how to quantify it. Another obstacle is the availability of socioeconomic data of appropriate geographical coverage.
Relevant answer
Answer
Just a suggestion
Use the Cause and Effect logic to create a flow chart of events and then prioritise your indicators
  • asked a question related to Vulnerability
Question
63 answers
Following an influential analysis published in February, a team of Stanford University researchers has conducted the first large survey into the very modern phenomenon of "Zoom Fatigue."Over the last year, millions of people have been working from home. Meetings previously conducted in person suddenly shifted to video conferencing platforms such as Zoom. And as 2020 progressed, more and more people started noticing a unique kind of exhaustion at the end of a day filled with video meetings. Referred to as "Zoom Fatigue," this new phenomenon is now the subject of novel academic research. https://newatlas.com/telecommunications/stanford-zoom-fatigue-first-study-women-more-affected/
So, what do you know about "zoom fatigue" ...Who are the groups most vulnerable to it ??? And why ??? Can its effects be minimized ???
All comments and contributions are welcome.
Relevant answer
Answer
Manal Hadi Kanaan amazing answers by the experts and I do agree with most of the experts particularly with Len Leonid Mizrah Ranjan Parekh Gioacchino de Candia Terekh Alexandr M. their comments are in line with your question and yes even if I try to answer this question my answer would be the same..
Most important being the EYE Strain and the above answer by Len Leonid Mizrah gives you the detailed explanation about the same
  • asked a question related to Vulnerability
Question
4 answers
Hi Folks,
You know that most of the European Countries including UK are in NVZ, and therefore could you please give some idea for longer term how could we reduce Eutrophication / toxic effect from those NVZ?
Thank you!
Dr K M Rahman
Research Fellow and Lecturer (BCU)
Relevant answer
  • asked a question related to Vulnerability
Question
19 answers
Tourism is known for pumping income to the local economy while bringing many negative social and environmental impacts. In this regard, tourism distorts the shape of asset pentagon which can make the livelihood unsustainable. Therefore, providing a comprehensive report of the tourism based livelihood financial asset may be sustainable, but social asset may be unsustainable. In this context, can tourism be a source of sustainable livelihood? And if yes, kindly throw some light upon potential of tourism substituting a primary source of income as agriculture or fishing.
Relevant answer
Answer
The approach of Dr. Michael W. Marek , gives more pressure to the question and opens new edges in this discussion. Sounds good to me.
  • asked a question related to Vulnerability
Question
3 answers
Risk and vulnerability equations, Data analyzing using vulnerability equations in SPSS or Arc GIS, Exposure , sensitivity and adaptive capacity in livelihood vulnerability assessment
Relevant answer
Answer
Please, go through this paper which will support you to calculate vulnerability.
  • DOI:10.3126/gjn.v14i0.35557
  • asked a question related to Vulnerability
Question
6 answers
I am working on a dissertation and I want to measure the vulnerability to cognitive delusions in depression. I am doing an calitative research with case studies.
Relevant answer
Answer
Because depression is one of the main causes of suicide, and according to the World Health Organization, it is the second cause of death after heart disease
  • asked a question related to Vulnerability
Question
4 answers
I am currently synthesising polymers in DMF through a simple Michael addition. In the current procedure, the polymer is isolated by precipitiation when added to cold diethyl ether (crashes out into a viscous mass when vortexed). After repeat washings with ether and overnight drying, the NMR data shows residual DMF still present in the sample.
As the polymer is vulnerable to hydrolysis, is there any way to fully remove the DMF without aqueous washes?
Relevant answer
So first of all, You need to test the solubility of your polymer in some solvent which should be very miscible with DMF. The best one is probably water but it is not a option, alcohols could be also good but same problem of water, so THF should be a good start point, indeed THF is the cyclic version of Et2O if you think about, so for dialysis it is almost the same. For that approach is important to know average molar mass of your polymer. non-solvent/precipitation is more effective as higher the molar mass. So if your polymer are short chains they are pretty soluble and so more difficult to precipitate, it could be a problem for dialysis as well because the "cut-off" is based in a mean size of pores so the cut-off should be pretty lower than the Mn of your polymer. I suggest you to leave your polymer long time connected to a vacuum line, after this first precipitation. DMF is dificult to remove without heating, just vacuum but it could help. I already used acetone or methanol(not a option) to wash/evacuation cycles in rotavapor it drives the DMF out, or even Et2O since it is volatile solvent, think about other candidates which could fits your system/product. Worked for sucrose methacrylate, could work for you. So I give you some suggestion I hope they could be useful in your case. Best regards.
  • asked a question related to Vulnerability
Question
4 answers
Researchers usually define the Drought Risk Index (DRI) as the multiplication of Drought Hazard Index (DHI) and Drought Vulnerability Index (DVI) or DRI = DHI×DVI. Besides adding the Drought Resilience Index (DREI), in our study, we consider using geometric mean to aggregate the different components in the risk index. Geometric mean is chosen for its simplicity in calculation and application compared to other methods. Furthermore, high accuracy has been reported when the geometric mean is applied in composite indices making it widely used.
Please find the full text of our open-access paper at the following link. Feel free to contact me for further discussion and feedback:
Relevant answer
Answer
Thank you for your response!
We proposed our new method based on geometric mean, instead of multiplication. Let's say DHI=0.6 and DVI=0.6, then if we use multiplication, DRI=0.36, that seems not reasonable! When we combine two good ranges of DHI and DVI, but DRI is not good!
But when we use the geometric mean, DRI=0.6.
That is one of the reasons that we used geometric mean in our framework. We add also DREI to the DRI calculation method. Because the resilience of the system (the power of the system to cope with a disaster or hazard) is usually neglected in the literature.
Please read our paper here:
  • asked a question related to Vulnerability
Question
5 answers
Hi RG colleagues,
Is anyone familiar with a good climate-related vulnerability scale? I have not landed on a valid climate-related psychological vulnerability scale so far. Now I am wondering if someone can make a recommendation. Please advise if adapting The Psychological Vulnerability Scale would be a good idea? The psychological vulnerability scale is a 6 items scale (PVS; Sinclair & Wallston, 1999). I have used it in the past with high reliability in the covid related PVS.
Best wishes,
Gulnaz
Relevant answer
Answer
Thanks for your answer. I must admit, I'm still unclear on the context. "We" was changed to "he" in the passage you included here, which is otherwise identical to the first passage I asked about, but I have no idea who "he" or "we" are referring to.
  • asked a question related to Vulnerability
Question
10 answers
What are the effective methods to predict Drought Vulnerability?
What are variables needed for prediction?
Recommend me some useful softwares where can i perform this.
Any related articles will be also helpful.
Relevant answer
Answer
  • asked a question related to Vulnerability
Question
5 answers
In order to save energy on consensus in a consortium blockchain, I want to limit the number of members. But I am curious how it impacts consensus resilience and vulnerability to attacks. Also, is there any optimum size of the consortium ? I would appreciate any help guidance, comment, a reference to literature.
Relevant answer
  • asked a question related to Vulnerability
Question
8 answers
Underlying health conditions that play a role in increasing vulnerability to coronaviruses and risks of higher mortality among young adults and children
  • asked a question related to Vulnerability
Question
3 answers
Most of the elder people in Africa is facing a lot of trouble concerning their welfare and they are affected by many difficulties, making them vulnerable to poverty. So the research about this issue a relatively scarce, what is demand a full intervention to clarify it. This is the reason for my question, What is the big problem that make elder people vulnerable in Africa?
Relevant answer
Answer
I believe that the old occupation caused a lot of damage to many African countries and entrenched extreme poverty.
  • asked a question related to Vulnerability
Question
27 answers
Climate change and agriculture are interrelated processes, both of which take place on a global scale. Climate change affects agriculture in a number of ways, including through changes in average temperatures, rainfall, and climate extremes (e.g., heat waves); changes in pests and diseases; changes in atmospheric carbon dioxide and ground-level ozone concentrations; changes in the nutritional quality of some foods;[1] and changes in sea level.[2]
Climate change is already affecting agriculture, with effects unevenly distributed across the world.[3]Future climate change will likely negatively affect crop production in low latitude countries, while effects in northern latitudes may be positive or negative.[3] Climate change will probably increase the risk of food insecurity for some vulnerable groups, such as the poor.[4] Animal agriculture is also responsible for CO2 greenhouse gas production and a percentage of the world's methane, and future land infertility, and the displacement of local species.
Relevant answer
Answer
The rise in temperature leads to an increase in the amount of water loss through Evaporation and transpiration. Therefore, greater quantities of water are needed for agricultural production, and higher temperatures lead to an increase in fungal and viral diseases and insect infestation.
I think that high temperatures are more dangerous than a reduced rainfall
  • asked a question related to Vulnerability
Question
1 answer
In the 4 largest EMERGE healthcare database networks where investigators have evaluated 106,000 plus genomes of schizophrenic patients found that obesity has protective or relatively less chance of genetic risk penetration for schizophrenic process.
Their study is published in recent issue of Am J Psychiatry 2019, October.
My question is how does obesity influences the polygenic risk and pleiotropy for the vulnerability of schizophrenia?
Relevant answer
Answer
Possibly a Darwinian process
  • asked a question related to Vulnerability
Question
10 answers
Humans (Homo sapiens) are the best creature of the world. It's universal truth. Which worths / attributes are responsible to uphold the human's best position. Interpret please.
Relevant answer
Answer
Of all the life forms found on planet Earth, man is a species, he is the most intelligent being, whose brain has acquired specific features of unique awareness and abstract thinking. On the other hand, how special a man is and how it will be assessed in the future, it will be shown in the effects of the development of the civilization that man has created. These effects will also include how a person will cope with the solution of key problems in the development of civilization, i.e. pandemic crises, economic crises, political crises, ecological crises, climate crises, including the ongoing global warming process, increasing environmental pollution, more frequent droughts and forest fires and other negative effects of progressive climate change.
Regards,
Dariusz Prokopowicz
  • asked a question related to Vulnerability
Question
4 answers
I'm searching a (free) software that simulates the effect of strong wind on the vulnerability a tree.
Relevant answer
Answer
Just a small correction to Osama's answer, there are some free CFD packages and OpenFOAM is one of them.
  • asked a question related to Vulnerability
Question
5 answers
It promotes tolerance and understanding above and beyond our political, cultural and religious differences, putting special emphasis on the defence of human rights, the protection of ethnic minorities and the most vulnerable groups, and the conservation of the environment.
Relevant answer
Answer
Dear M.M. Fazil .. we have done similar project in Bahrain after the Arab Spring. I believe it is very important that you bring the different parties into one field or community project that would address a common value. Both you and they (the students) would learn a lot from the experience.
  • asked a question related to Vulnerability
Question
6 answers
In conducting a Climate Change Vulnerability Assessment at the household level using a survey questionnaire, there is a need to ask participants how they characterize their experience of various hazards in terms of exposure, sensitivity, and adaptive capacity. Is there a set of categories for each of the factors of vulnerability?
Relevant answer
Answer
There are three dimensions of vulnerability to climate change: exposure, sensitivity, and adaptive capacity.
  1. Exposure is the degree to which people and the things they value could be exposed to climate variation or change;
  2. sensitivity is the degree to which they could be harmed by that exposure; and
  3. adaptive capacity is the degree to which they could mitigate the potential for harm by taking action to reduce exposure or sensitivity.
  • asked a question related to Vulnerability
Question
5 answers
In the paper:
Hoque, M.A.A., Pradhan, B., Ahmed, N. and Roy, S., 2019. Tropical cyclone risk assessment using geospatial techniques for the eastern coastal region of Bangladesh. Science of the Total Environment, 692, pp.10-22.
How is the rainfall intensity calculated using daily precipitation data from 1950 to 2018?
Relevant answer
Answer
Dear Piyush
This is a question that is asked frequently on ResearchGate (see here for an example of a recent discussion: https://www.researchgate.net/post/How-to-obtain-short-duration-rainfall-from-daily-rainfall)
The simple answer is that you cannot accurately calculate rainfall intensities for short durations (i.e. less than 24 hours) if you only have a daily time series. However, you can attempt to disaggregate the daily extreme rainfall values. As I mention in the link above the process is as follows:
1. Carry out an extreme value analysis on your annual maximum (AMAX) daily rainfall time series for the period 1950 to 2018. Generally it is best to fit a General Extreme Value (GEV) distribution to your AMAX daily rainfall data. This will allow you to estimate daily rainfall for a range of annual exceedance probabilities (i.e. return periods)
2. Calculate the 24 hour extreme value rainfalls for the annual exceedance probabilities (AEPs) (i.e. return periods) you’re interested in e.g. 1% AEP (1 in 100 year return period) etc
3. Disaggregate the 24 hour rainfall data for different return periods to shorter time durations
I am making the assumption that the site you're interested in is somewhere in India?
If so you could non-dimensionalise a rainfall intensity - duration - frequency (IDF) curve for a location close to your site of interest relative to the daily rainfall e.g. if the 1 in 10 year 20 minute rainfall intensity is 30 mm and the 1 in 10 year 24 hour (i.e. daily) rainfall is 60 mm the ratio would be 30/60 = 0.5.
Following your statistical analysis (i.e. using a GEV distribution) on your daily rainfall at your site of interest you find you 1 in 10 year daily rainfall is 70 mm, you can estimate your 1 in 10 year 20 minute rainfall using the non-diemnsionalised ration i.e. 1 in 10 year 20 minute rainfall at your site of interest = 0.5 x 70 mm = 35 mm.
There are several papers which detail rainfall IDF curves for India see: There are many others if you search online.
I hope that this is of help.
Darren
  • asked a question related to Vulnerability
Question
2 answers
Find out as much about the vulnerability as is publicly available. Analyse the security vulnerability using each of the 27 cells within the McCumber cube. For each cell,
Relevant answer
Answer
The McCumber Cube is used for assessment and management of security risks in information technology systems. It is a three dimensional model. X axis represent information states (storage, processing , and transmission), Y axis represent critical information characteristics (CIA Triad), and Z axis represent security measures (policy, education, and technology). Intersection of three axes give rise to 27 cubes. For example if we focus on transmission, confidentiality and technology security measure cube, we will be able to identify cryptography as a security measure to protect confidentiality of information while it is being transmitted. This implies we need to use symmetric or asymmetric cryptographic algorithms.
  • asked a question related to Vulnerability
Question
7 answers
South Africa has a significant number of refugees, asylum seekers and migrant workers, coming mostly from the rest of Africa, but also elsewhere. The Covid-19 pandemic has accentuated the vulnerabilities already experienced by the poor in accessing housing and basic services. How has the refugee, asylum seeker and migrant population in your country (for those who live in countries with this group) been affected by the pandemic in respect of access to and affordability of housing and services, what interventions have been put in place to assist them, and how effective have such been?
Relevant answer
Answer
Pauline Adebayo very important issue.
  • asked a question related to Vulnerability
Question
3 answers
ROC/AUC
Vulnerability
Groundwater
Machine learning
Relevant answer
Answer
Please Find the attachment link given below.
  • asked a question related to Vulnerability
Question
3 answers
Evaluation of vulnerability of school children below 10 years being investigated.
Relevant answer
  • asked a question related to Vulnerability
Question
3 answers
We have seen the lack of preparedness to manage the emergency health crisis and almost locked everything other than Corona when it was out of control. It was almost same across the world and after the crisis we have to think more about the reformation of healthcare system. Global cases top 11 million already and COVID-19 causes more than half a million deaths worldwide. The elderly with comorbidity are more vulnerable. The healthcare system everywhere is focusing mainly on COVID-19 management. Unluckily many more patients mainly old cases with hypertension, cardiac problems, chronic obstructive lung diseases or cancers are not getting priority and deaths are acceptable in silence. The vulnerability is more in poor and low income countries where they can’t afford to provide all the necessary healthcare together during the Corona crisis. We saw lots of disparity in healthcare even within the country with regional variations.
Relevant answer