Catchment-scale vulnerability assessment of groundwater pollution from diffuse sources using the DRASTIC method : a case study [PDF]
The catchment-scale groundwater vulnerability assessment that delineates zones representing different levels of groundwater susceptibility to contaminants from diffuse agricultural sources has become an important element in groundwater pollution ...
Blundell, J.R. +3 more
core +3 more sources
Reinforced concrete (RC) beams face potential near-field blast threats as key structural components in building structures. To investigate the failure modes and dynamic responses of RC beams subjected to near-field blast loading, this paper presents both
Zhijie Zhang +6 more
doaj +1 more source
Vulnerability curves vs. vulnerability indicators: application of an indicator-based methodology for debris-flow hazards [PDF]
The assessment of the physical vulnerability of elements at risk as part of the risk analysis is an essential aspect for the development of strategies and structural measures for risk reduction.
M. Papathoma-Köhle
doaj +1 more source
Vulnerability Assessment untuk Meningkatkan Kesadaran Pentingnya Keamanan Informasi [PDF]
The information security awareness is just become priority after data loss or damage happen. This makes the information system user is not ready to solve or minimize the risk that could be happen.
Priandoyo, A. (Anjar)
core
Prevalence and Trajectory of Household Material Hardship Among Children With Advanced Cancer
ABSTRACT Background/Objectives Families of children with advanced cancer living in poverty experience inferior outcomes including poor parent mental health and worse child quality of life. Household material hardship (HMH: food, housing, transportation, and/or utility insecurity) is a modifiable poverty exposure—and potential intervention target—that ...
Sarah Wright +13 more
wiley +1 more source
SHA512 and MD5 Algorithm Vulnerability Testing Using Common Vulnerability Scoring System (CVSS)
This paper discusses the comparison of the results of testing the OTP (One Time Password) algorithm on two encryptions, namely SHA512 and MD5 which are applied to the Reconciliation Application of the Dinas Pemberdayaan Masyarakat dan Desa Kabupaten ...
Fahmi Basya +2 more
doaj +1 more source
Vulnerability Assessment of Settlements During Emergencies [PDF]
During emergencies which occur as a result of uncontrolled effects of natural disasters, major technical and technological accidents and major epidemics of infectious diseases, the health and life of people and the persistent environmental degradation ...
Djordvevic, Amelija +3 more
core +1 more source
Organoids in pediatric cancer research
Organoid technology has revolutionized cancer research, yet its application in pediatric oncology remains limited. Recent advances have enabled the development of pediatric tumor organoids, offering new insights into disease biology, treatment response, and interactions with the tumor microenvironment.
Carla Ríos Arceo, Jarno Drost
wiley +1 more source
Seismic response of mountain tunnel induced by fault slip
With the rapid development of Chinese transportation networks, such as the Sichuan-Tibet railway, numerous tunnels are under construction or planned in mountainous regions. Some of these tunnels must traverse or be situated near active fault zones, which
Chen Xia +6 more
doaj +1 more source
The Anti-Penetration Performance and Mechanism of Metal Materials: A Review
This article reviews the anti-penetration principles and strengthening mechanisms of metal materials, ranging from macroscopic failure modes to microscopic structural characteristics, and further summarizes the micro–macro correlation in the anti ...
Jialin Chen +7 more
doaj +1 more source

