Results 41 to 50 of about 1,382,065 (344)

Emergent vulnerability to climate-driven disturbances in European forests

open access: yesNature Communications, 2021
Forest disturbance regimes are expected to intensify as Earth’s climate changes. Quantifying forest vulnerability to disturbances and understanding the underlying mechanisms is crucial to develop mitigation and adaptation strategies.
G. Forzieri   +10 more
semanticscholar   +1 more source

A measure of vulnerability [PDF]

open access: yesGeographica Helvetica, 2002
Abstract. The article, based on an extensive field study carried out from 1995–1998 in a South Indian village, is concerned with the question of how vulnerable people can be identified and targeted. By focusing on the most important activity areas in the study village, i.e.
openaire   +4 more sources

Vulnerability and vulnerable groups from an intersectionality perspective

open access: yesInternational Journal of Disaster Risk Reduction, 2020
In general, the identification and protection of vulnerable groups in the case of hazards or when a crisis unfolds is an issue that any crisis and disaster risk management should address, since people have different levels of exposure to hazards and crises. In this article, we promote the application of the intersectionality perspective in the study of
Kuran, Christian Henrik Alexander   +12 more
openaire   +6 more sources

Family violence and COVID‐19: Increased vulnerability and reduced options for support

open access: yesInternational Journal of Mental Health Nursing, 2020
Family violence refers to threatening or other violent behaviour within families that may be physical, sexual, psychological, or economic, and can include child abuse and intimate partner violence (Peterman et al. 2020, van Gelder et al. 2020).
K. Usher   +4 more
semanticscholar   +1 more source

VulDeeLocator: A Deep Learning-Based Fine-Grained Vulnerability Detector [PDF]

open access: yesIEEE Transactions on Dependable and Secure Computing, 2020
Automatically detecting software vulnerabilities is an important problem that has attracted much attention from the academic research community. However, existing vulnerability detectors still cannot achieve the vulnerability detection capability and the
Zhuguo Li   +5 more
semanticscholar   +1 more source

Impacts of illegal solid waste dumping on the water quality of the Mthatha River

open access: yesWater Practice and Technology, 2023
The world faces problems such as improper waste disposal that have spread to include disposal near water bodies. It is getting difficult to find fresh water everywhere.
Lazola Bangani   +4 more
doaj   +1 more source

Seasonal dynamics of soil CO2 emissions from different semi-arid land-use systems

open access: yesActa Agriculturae Scandinavica. Section B, Soil and Plant Science
Soil carbon dioxide (CO2) fluxes are a critical component in understanding carbon sequestration. In sub-Saharan Africa, empirically measured CO2 emissions data from diverse land-use systems is limited. Soil CO2 emission rates were measured in the Limpopo
Lawrence Munjonji   +6 more
doaj   +1 more source

Network topology drives population temporal variability in experimental habitat networks

open access: yesPopulation Ecology, EarlyView.
Habitat patches connected by dispersal pathways form habitat networks. We explored how network topology affects population outcomes in laboratory experiments using a model species (Daphnia carinata). Central habitat nodes in complex lattice networks exhibited lower temporal variability in population sizes, suggesting they support more stable ...
Yiwen Xu   +3 more
wiley   +1 more source

Menstrual hygiene knowledge and practices among adolescent schoolgirls in flood-affected rural Bangladesh

open access: yesReproductive Health
Objectives This study aimed to evaluate the level of knowledge and practices related to menstrual hygiene among adolescent schoolgirls in a flood-affected rural area of Bangladesh and identify the factors influencing their menstrual hygiene knowledge and
Tamima Ahmed   +4 more
doaj   +1 more source

Smart Contract Vulnerability Detection using Graph Neural Network

open access: yesInternational Joint Conference on Artificial Intelligence, 2020
The security problems of smart contracts have drawn extensive attention due to the enormous financial losses caused by vulnerabilities. Existing methods on smart contract vulnerability detection heavily rely on fixed expert rules, leading to low ...
Yuan Zhuang   +5 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy