p-EMA (II): evaluating ecological risks of pesticides for a farm-level risk assessment system

Agronomie ◽  
2003 ◽  
Vol 23 (1) ◽  
pp. 75-84 ◽  
Author(s):  
Andy Hart ◽  
Colin D. Brown ◽  
Kathy A. Lewis ◽  
John Tzilivakis
Agronomie ◽  
2003 ◽  
Vol 23 (1) ◽  
pp. 67-74 ◽  
Author(s):  
Colin D. Brown ◽  
Andy Hart ◽  
Kathy A. Lewis ◽  
Igor G. Dubus

Author(s):  
Bogdan Korniyenko ◽  
Lilia Galata

In this article, the research of information system protection by ana­ ly­ zing the risks for identifying threats for information security is considered. Information risk analysis is periodically conducted to identify information security threats and test the information security system. Currently, various information risk analysis techni­ ques exist and are being used, the main difference being the quantitative or qualitative risk assessment scales. On the basis of the existing methods of testing and evaluation of the vulnerabilities for the automated system, their advantages and disadvantages, for the possibility of further comparison of the spent resources and the security of the information system, the conclusion was made regarding the deter­ mi­ nation of the optimal method of testing the information security system in the context of the simulated polygon for the protection of critical information resources. A simula­ tion ground for the protection of critical information resources based on GNS3 application software has been developed and implemented. Among the considered methods of testing and risk analysis of the automated system, the optimal iRisk methodology was identified for testing the information security system on the basis of the simulated. The quantitative method Risk for security estimation is considered. Generalized iRisk risk assessment is calculated taking into account the following parameters: Vulnerabili­ ty  — vulnerability assessment, Threat — threat assessment, Control — assessment of security measures. The methodology includes a common CVSS vul­ nerability assessment system, which allows you to use constantly relevant coefficients for the calculation of vulnerabilities, as well as have a list of all major vulnerabilities that are associated with all modern software products that can be used in the automated system. The known software and hardware vulnerabilities of the ground are considered and the resistance of the built network to specific threats by the iRisk method is calculated.


2020 ◽  
Vol 9 (1) ◽  
pp. 17
Author(s):  
Zexing Kuang ◽  
Yangguang Gu ◽  
Yiyong Rao ◽  
Honghui Huang

The concentrations of heavy metals in sediments and marine organisms in Daya Bay were investigated, and the Monte Carlo method was used to analyze the uncertainty of the results of geo-accumulation characteristics and ecological and health risks. The mean concentrations of metal elements in sediments were in the following order: Zn > Cr > Cu > As > Cd > Hg, while those in marine organisms were Zn > Cu > As > Cr ≈ Cd > Hg. The geo-accumulation index (Igeo) indicated that the primary pollutant was Hg, with 5.46% moderately polluted, and 39.52% for unpolluted to moderately polluted. Potential ecological risks (RI) were between low and high risks, and the contributions of Hg, Cd, and As to ecological risks were 50.85%, 33.92%, and 11.47%, respectively. The total hazard coefficients (THQ) were less than 1, but on the basis of total carcinogenic risks (TCR), the probability of children and adults exceeded the unacceptable risk threshold of 22.27% and 11.19%, respectively. Sensitivity analysis results showed that the concentrations of carcinogenic elements contributed to risk in the order of As > Cd > Cr. Therefore, in order to effectively control heavy metals contamination in Daya Bay, it is necessary to strengthen the management of Hg, Cd, and As emissions.


Water ◽  
2021 ◽  
Vol 13 (4) ◽  
pp. 420
Author(s):  
Zening Wu ◽  
Yuhai Cui ◽  
Yuan Guo

With the progression of climate change, the intensity and frequency of extreme rainfall have increased in many parts of the world, while the continuous acceleration of urbanization has made cities more vulnerable to floods. In order to effectively estimate and assess the risks brought by flood disasters, this paper proposes a regional flood disaster risk assessment model combining emergy theory and the cloud model. The emergy theory can measure many kinds of hazardous factor and convert them into unified solar emergy (sej) for quantification. The cloud model can transform the uncertainty in flood risk assessment into certainty in an appropriate way, making the urban flood risk assessment more accurate and effective. In this study, the flood risk assessment model combines the advantages of the two research methods to establish a natural and social dual flood risk assessment system. Based on this, the risk assessment system of the flood hazard cloud model is established. This model was used in a flood disaster risk assessment, and the risk level was divided into five levels: very low risk, low risk, medium risk, high risk, and very high risk. Flood hazard risk results were obtained by using the entropy weight method and fuzzy transformation method. As an example for the application of this model, this paper focuses on the Anyang region which has a typical continental monsoon climate. The results show that the Anyang region has a serious flood disaster threat. Within this region, Linzhou County and Anyang County have very high levels of risk for flood disaster, while Hua County, Neihuang County, Wenfeng District and Beiguan District have high levels of risk for flood disaster. These areas are the core urban areas and the economic center of local administrative regions, with 70% of the industrial clusters being situated in these regions. Only with the coordinated development of regional flood control planning, economy, and population, and reductions in the uncertainty of existing flood control and drainage facilities can the sustainable, healthy and stable development of the region be maintained.


2015 ◽  
Vol 3 ◽  
pp. 1880-1887
Author(s):  
Koji Kitamura ◽  
Kenta Imai ◽  
Yoshifumi Nishida ◽  
Hiroshi Takemura ◽  
Tatushiro Yamanaka

Sign in / Sign up

Export Citation Format

Share Document