Contributions Of The Women Groups Of West Bengal, India For Solving Rural Water Challenges,
2021
Nishtha, India
Contributions Of The Women Groups Of West Bengal, India For Solving Rural Water Challenges, Mina Das
wH2O: The Journal of Gender and Water
Poor rural communities suffer from many socio-economic issues; however, the availability of clean and safe water is the fundamental challenge amongst all other hindrances confronted by these communities. This article focuses on the non-profit organization, Nishtha (meaning dedication) and their intervention in women empowerment for better water accessibility in rural communities of West Bengal, India. The paper will further highlight the so-called “rural ignorant women’s endeavour” in innovative thought and strategy to protect their own families and the community. The article also discusses Nishtha’s intervention during water crises and disasters using a participatory approach involving women.
Community Effort For Drinking Water Management Near India- China Border At Jamak Village District Uttarkashi, Uttarakhand, India,
2021
Reliance Foundation, India
Community Effort For Drinking Water Management Near India- China Border At Jamak Village District Uttarkashi, Uttarakhand, India, Kamlesh Gururani
wH2O: The Journal of Gender and Water
In Uttarakhand, drinking water is a major problem and a burning issue for the last decade. Many natural springs that dotted the hillside have been damaged due to the climate conditions and other unplanned or illegal activities such as deforestation and human-made forest fires have affected spring catchments, resulting in reduced discharge from springs. To tackle this major problem of drinking water security, the community of mountain village Jamak, district Uttarkashi came together for community-led drinking water supply by adopting participatory planning and ownership. The village community’s participation and ownership improved the village’s drinking water situation, and villagers ...
Review And Analysis Of Failure Detection And Prevention Techniques In It Infrastructure Monitoring,
2021
Symbiosis Institute of Technology, Symbiosis International University, Pune, Maharashtra, India
Review And Analysis Of Failure Detection And Prevention Techniques In It Infrastructure Monitoring, Deepali Arun Bhanage, Ambika Vishal Pawar, K Kotecha
Library Philosophy and Practice (e-journal)
Maintaining the health of IT infrastructure components for improved reliability and availability is a research and innovation topic for many years. Identification and handling of failures are crucial and challenging due to the complexity of IT infrastructure. System logs are the primary source of information to diagnose and fix failures.
In this work, we address three essential research dimensions about failures, such as the need for failure handling in IT infrastructure, understanding the contribution of system-generated log in failure detection and reactive & proactive approaches used to deal with failure situations.
This study performs a comprehensive analysis of existing literature by ...
Jack Voltaic 3.0 Cyber Research Report,
2021
Army Cyber Institute
Jack Voltaic 3.0 Cyber Research Report, Erica Mitchell, Douglas Fletcher, Erik Korn, Steven Whitham, Jason Hillman, Ron Yearwood, Clint Walker, Aryn Pyke, Gabriel Weaver, Brandon Pugh, Katherine Hutton, George Platsis, Timothy Klett, Ryan Hruska
ACI Technical Reports
The Jack Voltaic (JV) Cyber Research project is an innovative, bottom-up approach to critical infrastructure resilience that informs our understanding of existing cybersecurity capabilities and identifies gaps. JV 3.0 contributed to a repeatable framework cities and municipalities nationwide can use to prepare. This report on JV 3.0 provides findings and recommendations for the military, federal agencies, and policy makers.
Jack Voltaic 3.0 Cyber Research Report Executive Summary,
2021
Army Cyber Institute
Jack Voltaic 3.0 Cyber Research Report Executive Summary, Douglas Fletcher, Erica Mitchell, Erik Korn, Steven Whitham, Jason Hillman, Aryn Pyke
ACI Technical Reports
This condensed Executive summary provides an overview of the information contained in the full JV 3.0 Cyber Research Report.
Developing Infrastructure Adaptation Pathways To Combat Hurricane Intensification: A Coupled Storm Simulation And Economic Modeling Framework For Coastal Installations,
2021
Air Force Institute of Technology
Developing Infrastructure Adaptation Pathways To Combat Hurricane Intensification: A Coupled Storm Simulation And Economic Modeling Framework For Coastal Installations, Alexander J. Baldwin
Theses and Dissertations
Climate change projections suggest intensification of extreme weather events, including hurricanes, is expected throughout the 21st century. This will lead to increased destruction for coastal military bases unless infrastructure resiliency and adaptation measures are implemented. This research focuses on examining the simulation of probabilistic, climate-intensified hurricane events at Eglin Air Force Base. FEMA Hazus models are combined with climate projections for wind Intensity, tide, and sea-level rise to produce an assessment of losses to the installation. Damage estimates and hurricane intensity outputs are downscaled to the facility-level so that climate adaptation signals can be identified. The facility losses and climate ...
Complete Issue, Volume 4, Issue 1,
2021
University of Central Florida
Complete Issue, Volume 4, Issue 1
Journal of International Crisis and Risk Communication Research
This is the complete issue of JICRCR Volume 4, Issue 1.
How College Students Assess The Threat Of Infectious Diseases: Implications For University Leaders And Health Communicators,
2021
University of Georgia
How College Students Assess The Threat Of Infectious Diseases: Implications For University Leaders And Health Communicators, Yan Jin, Yen-I Lee, Brooke F. Liu, Lucinda Austin, Seoyeon Kim
Journal of International Crisis and Risk Communication Research
Higher education institutions and their students face a wide range of infectious disease threats (IDTs). However, there is a lack of theory-driven research on how to provide communication for multiple IDTs to motivate protective action taking. To close this gap, this study focuses on college students and two IDT types: respiratory and sexually transmitted infections. We tested an IDT appraisal model with data from an online survey conducted at two U.S. universities with 842 students. Findings indicate that IDT type led to different patterns of threat appraisal and protective action taking intentions. More specifically, participants perceived sexually transmitted threats ...
Victims As Stakeholders: Insights From The Intersection Of Psychosocial, Ethical, And Crisis Communication Paths,
2021
Leiden University, The Netherlands
Victims As Stakeholders: Insights From The Intersection Of Psychosocial, Ethical, And Crisis Communication Paths, Wouter Jong, Kjell Brataas
Journal of International Crisis and Risk Communication Research
This article examines the position of victims and those affected within communication theory. Current research has broadly been skewed toward reputation management and protecting brand value as primary goals of crisis communication efforts. As crises affect real people, crisis communication theory needs to be adapted to include their needs. To assure their needs are met, an integration of business ethics and psychosocial mechanisms in the field of crisis communication is proposed. This integration prevents crisis communication output from becoming an additional source of stress to the affected in the aftermath of crises. We offer recommendations for crisis communication scholarship to ...
The Conceptualization Of Risk Tolerance And Scale Development For Measuring Publics’ Tolerance Of Individual Health Risks,
2021
Salve Regina University
The Conceptualization Of Risk Tolerance And Scale Development For Measuring Publics’ Tolerance Of Individual Health Risks, Hyoyeun Jun, Yan Jin
Journal of International Crisis and Risk Communication Research
Risk tolerance, identified by scholars over two decades ago as an essential concept in risk communication, has remained understudied without clear conceptual and operational definitions. As the first study developing a multiple-item scale for measuring at-risk publics’ tolerance of different risk types, this study refines the conceptualization of risk tolerance and advances its operationalization in the setting of individual health risks. Qualitative research (in-depth interviews: n = 28; focus group: n = 30) and two survey datasets (sample 1: n = 500; sample 2: n = 500) were employed for scale development and testing. Results identify that two types of individual health risk tolerance ...
Open-Field Scale-Model Experiments Of Fire Whirls Over L-Shaped Line Fires,
2021
Yamagata University
Open-Field Scale-Model Experiments Of Fire Whirls Over L-Shaped Line Fires, Yuto Iga, Kazunori Kuwana, Kozo Sekimoto, Yuji Nakamura
Progress in Scale Modeling, an International Journal
This paper presents the results of open-field scale-model experiments of fire-whirl formation over line fires. L-shaped line fires were burned in crosswinds, and the processes of fire-whirl formation were observed. The flame height was measured using an image-processing technique, while two-dimensional velocity components were measured at two different locations using ultrasonic anemometers. Two tests were selected for comparison: test A, in which intense fire whirls repeatedly formed, and test B, in which no whirls were observed. In test A, the wind flow was bent by the fire plume, creating swirling flows near the burning area, thereby forming fire whirls. On ...
Effect Of Reduced Plume Entrainment On The Burning Rate Of Porous Fuel Beds,
2021
USDA Forest Service
Effect Of Reduced Plume Entrainment On The Burning Rate Of Porous Fuel Beds, Sara Mcallister
Progress in Scale Modeling, an International Journal
Large outdoor fires often exhibit unexpected fire behavior, particularly compared with much smaller fires. Understanding the difference between large- and small-scale fires is of importance for both fire behavior predictions and safety. Large fires are often characterized by very tall plumes that can extend to the stratosphere. Particularly as the actively burning area increases, plumes in large-scale fires likely entrain relatively little and may act in a similar fashion to a chimney. To explore the possible changes in burning rate due to the chimney effect, experiments were conducted with wood cribs burned with a chimney of variable height. The burning ...
A Study On Fire Hazards Of Oil Tanks In Urban Areas With Scale Model Experiments,
2021
Hong Kong Polytechnic University
A Study On Fire Hazards Of Oil Tanks In Urban Areas With Scale Model Experiments, Ho Yin Ng, Yu Wan, Wan Ki Chow
Progress in Scale Modeling, an International Journal
Large fuel tanks are located in an urban area of Tsing Yi in Hong Kong, giving potentially high risks to people living nearby if a fire was to occur. Scale modeling experiments were carried out to investigate the potential of fire hazards. Propanol pool fires with five different scales of oil tanks were studied first. Appropriate tank sizes were then put in a 1/2500 architectural scale model on the Tsing Yi Island to study a fuel tank fire. Results show that the heat and smoke from a fire would affect occupants staying in areas near to the fuel tanks ...
Risk Management Decision Making For Security And Trust In Hardware Supply Chains,
2021
Radford University
Risk Management Decision Making For Security And Trust In Hardware Supply Chains, Zachary A. Collier, Thomas L. Polmateer, James H. Lambert
CESUN Conference
Modern cyber-physical systems are enabled by electronic hardware and embedded systems. The security of these sub-components is a concern during the design and operational phases of cyber-physical system life cycles. Compromised electronics can result in mission-critical failures, unauthorized access, and other severe consequences. As systems become more complex and feature greater connectivity, system owners must make decisions regarding how to mitigate risks and ensure resilience and trust. This paper provides an overview of research efforts related to assessing and managing risks, resilience, and trust with an emphasis on electronic hardware and embedded systems. The research takes a decision-oriented perspective, drawing ...
Improving Real-Time Methane Monitoring In Longwall Coal Mines Through System Response Characterization Of A Multi-Nodal Methane Detection Network,
2021
West Virginia University
Improving Real-Time Methane Monitoring In Longwall Coal Mines Through System Response Characterization Of A Multi-Nodal Methane Detection Network, Brian Philip Cappellini
Graduate Theses, Dissertations, and Problem Reports
Machine automation and atmospheric monitoring are used by many industries to improve safety and productivity in the workplace. The underground Methane Watchdog System (MWS) is a multi-nodal network of sensors currently under development. The MWS aims to improve safety and productivity by introducing 10 compact sampling units designed to be easily integrated within the current roof support equipment of the mine. Each unit contains an array of sensors used to continuously monitor the environmental conditions which include methane concentration, temperature, pressure, and relative humidity. All MWS units report information back to a remote central processing hub (CPH) which collects nodal ...
Open Voting Client Architecture And Op-Ed Voting: A Novel Framework For Solving Requirement Conflicts In Secret Ballot Elections,
2021
University of North Florida
Open Voting Client Architecture And Op-Ed Voting: A Novel Framework For Solving Requirement Conflicts In Secret Ballot Elections, Aaron M. Wilson
UNF Graduate Theses and Dissertations
Building voting systems for secret ballot elections has many challenges and is the subject of significant academic research efforts. These challenges come from conflicting requirements. In this paper, we introduce a novel architectural approach to voting system construction that may help satisfy conflicting requirements and increase voter satisfaction. Our design, called Open Voting Client Architecture, defines a voting system architectural approach that can harness the power of individualized voting clients. In this work, we contribute a voting system reference architecture to depict the current voting system construction and then use it to define Open Voting Client Architecture. We then detail ...
Quantum Safety Metrics Framework For Commercial Unmanned Aircraft Operators,
2021
Embry-Riddle Aeronautical University
Quantum Safety Metrics Framework For Commercial Unmanned Aircraft Operators, Tracy L. Lamb, Nathan A. Phillips, Trong Van Nguyen
International Journal of Aviation, Aeronautics, and Aerospace
Commercial unmanned aircraft systems continue to increase in applications and diversity; however, mishaps and accidents erode safety, investment return, and efficiency. Most unmanned aircraft accidents are preceded by leading indicators; the ability to forecast and quantify these may provide increased safety and profitability. This mixed-method research study used a non-experimental parallel convergence approach with multiple instruments, multiple-case study n = 22, and one exemplar case design to develop a quantum safety metric program. This study used a combination of previously validated methods as development instruments, including; the HFACS, STAMP, 'Sierra Scale,' and Accident Prevention Effort equations. The study extended the Accident ...
Identifying Scotomata In Hazard Identification Caused By Ignorance And Overconfidence,
2021
Eastern Illinois University
Identifying Scotomata In Hazard Identification Caused By Ignorance And Overconfidence, Allen Johanson
Masters Theses
The manufacturing and construction industries are two of the most dangerous professions, and employees are frequently exposed to hazards and hazardous conditions which can lead to serious injury or even death. An observed phenomenon, frequently called the Dunning-Kruger Effect states that unskilled people are often unaware of their shortcomings and those with the higher-level skills often underestimate their abilities. This study examines employees’ training, years of experience, and performance to gauge any correlations among these variables in the area of hazard awareness. The goal of this study is to help individuals to recognize blind spots in their knowledge to identify ...
The Ftc And Ai Governance: A Regulatory Proposal,
2020
Seattle University School of Law
The Ftc And Ai Governance: A Regulatory Proposal, Michael Spiro
Seattle Journal of Technology, Environmental & Innovation Law
No abstract provided.
Small Modular Reactors And Advanced Reactor Security: Regulatory Perspectives On Integrating Physical And Cyber Security By Design To Protect Against Malicious Acts And Evolving Threats,
2020
Canadian Nuclear Safety Commission
Small Modular Reactors And Advanced Reactor Security: Regulatory Perspectives On Integrating Physical And Cyber Security By Design To Protect Against Malicious Acts And Evolving Threats, Raphael Duguay
International Journal of Nuclear Security
How can future nuclear technologies and Small Modular Reactors (SMRs) deter and prevent organized crime groups, terrorists, and malicious actors from attempting to steal or sabotage nuclear materials and facilities? This paper presents the benefits of integrating Security by Design (SeBD) into a regulatory framework to allow more a flexible and effective design of physical protection systems for SMRs. During its effort to modernize the Nuclear Security Regulations, the Canadian Nuclear Safety Commission (CNSC) licensing application process provides for the option of SeBD in moving toward a performance-based approach with less prescriptive requirements. CNSC also recognizes the need for a ...