Buscar
Mostrando ítems 1-10 de 12280
Individual and social vulnerabilities upon acquiring tuberculosis: a literature systematic review
(BioMed Central, 2014)
Abstract
Tuberculosis is a contagious infectious disease mainly caused by the bacteria Mycobacterium tuberculosis that still meets the priority criteria - high magnitude, transcendence and vulnerability - ...
Modal pushover analysis for seismic vulnerability analysis
(Universität für Bodenkultur, Institut für Konstruktiver Ingenieurbau, 2014)
A simple introduction of inelastic structural analysis for seismic vulnerability by considering the definition of pushover analysis and using a simple elasto-plastic material model to compare analytical and numerical ...
Multi-vulnerability analysis for seismic risk management in historic city centres: an application to the historic city centre of La Serena, Chile
(2023)
A comprehensive understanding of the elements at risk, through the identification of the main hazards, level of exposure and different dimensions of the vulnerability of the communities, is an essential step toward the ...
THE VULNERABLE IN TIMES OF PANDEMIC - AN ANALYSIS FROM THE SUBALTERN WORKERS AND THE ELDERLY
(Univ Estadual Paulista Julio Mesquita Filho, Fac Ciencias & Tecnologia, 2020-05-01)
This article brings together two researchers who undertake investigations in different geographical contexts and with different actors, but who approach them by paying attention to their social vulnerability. The first is ...
Legislative vulnerability of minority groups
(Ciência & Saúde Coletiva, 2018)
Spatial analysis of the social vulnerability of adolescent pregnancy
(CADERNOS SAUDE PUBLICARIO DE JANIERO, 2012)
The purpose of this study was to present a spatial analysis of the social vulnerability of teenage pregnancy by geoprocessing data on births and deaths present on the Brazilian Ministry of Health databases in order to ...
On Combining Static, Dynamic and Interactive Analysis Security Testing Tools to Improve OWASP Top Ten Security Vulnerability Detection in Web Applications
The design of the techniques and algorithms used by the static, dynamic and interactive security testing tools differ. Therefore, each tool detects to a greater or lesser extent each type of vulnerability for which they ...
Proposal of an Integrated Index for Prioritization of Bridge Maintenance
(ASCE-AMER SOC CIVIL ENGINEERS, 2010)
The bridge rating used in bridge management systems commonly uses only a structural condition. Factors such as seismic risk, hydraulic vulnerability, and strategic importance are commonly used in an isolated fashion. ...