Losses from environmental hazards have escalated in the past decade, prompting a reorientation of emergency management systems away from simple postevent response. There is a noticeable change in policy, with more emphasis on loss reduction through mitigation, preparedness, and recovery programs. Effective mitigation of losses from hazards requires hazard identification, an assessment of all the hazards likely to affect a given place, and risk-reduction measures that are compatible across a multitude of hazards. The degree to which populations are vulnerable to hazards, however, is not solely dependent upon proximity to the source of the threat or the physical nature of the hazard-social factors also play a significant role in determining vulnerability. This paper presents a method for assessing vulnerability in spatial terms using both biophysical and social indicators. A geographic information system was utilized to establish areas of vulnerability based upon twelve environmental threats and eight social characteristics for our study area, Georgetown County, South Carolina. Our results suggest that the most biophysically vulnerable places do not always spatially intersect with the most vulnerable populations. This is an important finding because it reflects the likely "social costs" of hazards on the region. While economic losses might be large in areas of high biophysical risk, the resident population also may have greater safety nets (insurance, additional financial resources) to absorb and recover from the loss quickly. Conversely, it would take only a moderate hazard event to disrupt the well-being of the majority of county residents (who are more socially vulnerable, but perhaps do not reside in the highest areas of biophysical risks) and retard their longer-term recovery from disasters. This paper advances our theoretical and conceptual understanding of the spatial dimensions of vulnerability. It further highlights the merger of conceptualizations of human environment relationships with geographical techniques in understanding contemporary public policy issues.
Abstract. Wake steering is a form of wind farm control in which turbines use yaw offsets to affect wakes in order to yield an increase in total energy production. In this first phase of a study of wake steering at a commercial wind farm, two turbines implement a schedule of offsets. Results exploring the observed performance of wake steering are presented and some first lessons learned. For two closely spaced turbines, an approximate 14 % increase in energy was measured on the downstream turbine over a 10∘ sector, with a 4 % increase in energy production of the combined upstream–downstream turbine pair. Finally, the influence of atmospheric stability over the results is explored.
This article presents findings from a large-scale newspaper analysis of climate change discourses in four developed countries, using corpus linguistics methodology. We map the discourse over time, showing peaks and troughs of attention and explaining their causes. Different connotations of common terms such as global warming and climate change in different countries are analysed. Cluster and key-word analysis show the relative salience of specific words and word combinations during crucial periods. We identify main claims makers and the relative visibility of advocates and sceptics. The main finding is that former are far more prominent in all countries. We also look at the coverage of 'climategate'. Finally, we make reference to existing theoretical frameworks.
We present an investigation into the security of three practical pairing algorithms; the Tate, Eta and Ate pairing, in terms of side channel vulnerability. These three algorithms have recently shown to be efficiently computable on the resource constrained smart card, yet no in depth side channel analysis has yet appeared in the literature. Since the secret parameter input to the pairing can potentially be entered in either of the two possible positions, there exist two avenues of attack, i.e. e(P, Q) or e(Q, P) where P is public and Q is private. We analyse the core operations fundamental to pairings and not only highlight how each implementation may potentially succumb to a side channel attack, but also show how one path is more susceptible than the other in Tate and Ate. For those who wish to deploy pairing based systems we make a simple suggestion to improve resistance to SCA.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.