Results 1 to 10 of about 104,626 (245)
This study aimed to develop the Five Cognitive Biases in Risk-Taking Scale (5 CBR-S) to measure five cognitive biases associated with risk-taking: overconfidence, illusion of control, belief in the law of small numbers, escalation of commitment, and ...
Sébastien Lhardy +2 more
doaj +1 more source
Introduction, Purpose. One of the major tasks in the system of the country economic safety support is the monitoring the economy status provided by the Russian Federation Strategy of Economic Safety Support until 2030.
S. A. Pobyvaev +4 more
doaj +1 more source
Traditional poverty measures neglect several important dimensions of household welfare. In this paper we construct a measure of "vulnerability" which allows us to quantify the welfare loss associated with poverty as well as the loss associated with any of a variety of different sources of uncertainty.
Ligon, Ethan, Schechter, Laura
openaire +2 more sources
In this article, we examine how sensitive the methodology for calculating a “Typical Meteorological Year” (TMY) is to changes in the source of the meteorological data series and the weighting factors used. Three different sources of meteorological data –
Anna Tippett +5 more
doaj +1 more source
Vulnerability to water shortages in the 21st Century’s arid and semi-arid American West
Scientific studies agree to stress the growing risk of water shortages in the arid and semi-arid American West. Over the next fifty years, at least part of the local population will likely face water shortages which will call into question the ...
Nicolas Barbier
doaj +1 more source
Background People experiencing homelessness (PEH) are disproportionately affected by health issues yet remain underserved by the health care system. Emerging findings suggest that complementary medicine (CM) approaches might help address the low access ...
Véronique S. Grazioli +12 more
doaj +1 more source
Vulnerability Assessment of Ubiquitous Cities Using the Analytic Hierarchy Process
Urbanization is a challenge faced by most countries worldwide and leads to several problems. Due to rapid communication capabilities, conforming the megacities into Ubiquitous cities (U-cities) seems to be a potential solution to mitigate the problems ...
Muhammad Atiq Ur Rehman Tariq +2 more
doaj +1 more source
Genome instability and crosstalk with the immune response
Genome instability, tumour-promoting inflammation, and immune escape are three distinct hallmarks of cancer. However, accumulating scientific and clinical evidence over the past decade have uncovered a multifaceted interplay of complex dynamic network of
Roman M. Chabanon +3 more
doaj +1 more source
Vulnerable places are usually the targets of terrorist attacks everywhere in the world. The scenario is quite the same in Nigeria. Boko Haram and other terrorist groups in Nigeria have attacked ordinary citizens and infrastructure like schools and ...
OLALERE, Usamotu Basheer, TUNDE, Agara
doaj +1 more source
Investigating the Security of OpenPLC: Vulnerabilities, Attacks, and Mitigation Solutions
Open-source Programmable Logic Controller (OpenPLC) software is designed to be vendor-natural and run on almost any computer or low-cost embedded devices e.g., Raspberry Pi, Ardunio, and other controllers.
Wael Alsabbagh +2 more
doaj +1 more source

