2,019 research outputs found

    A hybrid and integrated approach to evaluate and prevent disasters

    Get PDF

    Identifying and investigating pesticide application types to promote a more sustainable pesticide use: the case of smallholders in Boyacá, Colombia

    Get PDF
    The present paper investigates pesticide application types adopted by smallholder potato producers in the Department of Boyacá , Colombia. In this region, environmental, health and adverse economic effects due to pesticide mis- or over-use respectively have been observed. Firstly, pesticide application types were identified based on input-effectiveness. Secondly, their determinants of adoption were investigated. Finally suggestions were given to develop intervention options for transition towards a more sustainable pesticide use. Three application types were identified for fungicide and insecticide. The types differed in terms of input (intensity of pesticide application), effect (damage control), frequency of application, average quantity applied per application, chemical class, and productivity. Then, the determinants of different pesticide application types were investigated with a multinomial logistic regression approach and applying the integrative agent centred (IAC) framework. The area of the plot, attendance at training sessions and educational and income levels were among the most relevant determinants. The analysis suggested that better pesticide use could be fostered to reduce pesticide-related risks in the region. Intervention options were outlined, which may help in targeting this issue. They aim not only at educating farmers, but to change their social and institutional context, by involving other agents of the agricultural system (i.e. pesticide producers), facilitating new institutional settings (i.e. cooperatives) and targeting social dynamics (i.e. conformity to social norms)

    Simulating human and environmental exposure from hand-held knapsack pesticide application: Be-WetSpa-Pest, an integrative, spatially explicit modeling approach

    Get PDF
    This paper presents an integrative and spatially explicit modeling approach for analyzing human and environmental exposure from pesticide application of smallholders in the potato producing Andean region in Colombia. The modeling approach fulfills the following criteria: (i) it includes environmental and human compartments; (ii) it contains a behavioral decision-making model for estimating the effect of policies on pesticide flows to humans and the environment; (iii) it is spatially explicit; and (iv) it is modular and easily expandable to include additional modules, crops or technologies. The model was calibrated and validated for the Vereda La Hoya and was used to explore the effect of different policy measures in the region. The model has moderate data requirements and can be adapted relatively easy to other regions in developing countries with similar conditions

    Space Station communications and tracking systems modeling and RF link simulation

    Get PDF
    In this final report, the effort spent on Space Station Communications and Tracking System Modeling and RF Link Simulation is described in detail. The effort is mainly divided into three parts: frequency division multiple access (FDMA) system simulation modeling and software implementation; a study on design and evaluation of a functional computerized RF link simulation/analysis system for Space Station; and a study on design and evaluation of simulation system architecture. This report documents the results of these studies. In addition, a separate User's Manual on Space Communications Simulation System (SCSS) (Version 1) documents the software developed for the Space Station FDMA communications system simulation. The final report, SCSS user's manual, and the software located in the NASA JSC system analysis division's VAX 750 computer together serve as the deliverables from LinCom for this project effort

    Public key cryptosystems : theory, application and implementation

    Get PDF
    The determination of an individual's right to privacy is mainly a nontechnical matter, but the pragmatics of providing it is the central concern of the cryptographer. This thesis has sought answers to some of the outstanding issues in cryptography. In particular, some of the theoretical, application and implementation problems associated with a Public Key Cryptosystem (PKC).The Trapdoor Knapsack (TK) PKC is capable of fast throughput, but suffers from serious disadvantages. In chapter two a more general approach to the TK-PKC is described, showing how the public key size can be significantly reduced. To overcome the security limitations a new trapdoor was described in chapter three. It is based on transformations between the radix and residue number systems.Chapter four considers how cryptography can best be applied to multi-addressed packets of information. We show how security or communication network structure can be used to advantage, then proposing a new broadcast cryptosystem, which is more generally applicable.Copyright is traditionally used to protect the publisher from the pirate. Chapter five shows how to protect information when in easily copyable digital format.Chapter six describes the potential and pitfalls of VLSI, followed in chapter seven by a model for comparing the cost and performance of VLSI architectures. Chapter eight deals with novel architectures for all the basic arithmetic operations. These architectures provide a basic vocabulary of low complexity VLSI arithmetic structures for a wide range of applications.The design of a VLSI device, the Advanced Cipher Processor (ACP), to implement the RSA algorithm is described in chapter nine. It's heart is the modular exponential unit, which is a synthesis of the architectures in chapter eight. The ACP is capable of a throughput of 50 000 bits per second

    Theory and Applications of Robust Optimization

    Full text link
    In this paper we survey the primary research, both theoretical and applied, in the area of Robust Optimization (RO). Our focus is on the computational attractiveness of RO approaches, as well as the modeling power and broad applicability of the methodology. In addition to surveying prominent theoretical results of RO, we also present some recent results linking RO to adaptable models for multi-stage decision-making problems. Finally, we highlight applications of RO across a wide spectrum of domains, including finance, statistics, learning, and various areas of engineering.Comment: 50 page

    Biodiversity protection prioritisation: a 25-year review

    Get PDF
    There are insufficient resources available globally, nationally and in many regions, to conserve all species, habitats and ecosystems. Prioritisation of targets or actions is a rational response to resource scarcity. Prioritisation can be directed at areas for reservation, species, habitats or ecosystems for management, and threat management actions. The scale at which prioritisation is applied is a fundamental decision, and the range includes global, national, regional and patch. Choice of scale influences availability of data and methods available for prioritisation. Since 1986 availability of data, computing power and expertise available have all improved globally and in many countries. Approaches to prioritisation have evolved during the past 25 years as researchers from several disciplines, including biology, ecology, decision sciences, mathematics and economics, have sought ways to achieve greater output from the resources available for biodiversity conservation. This review surveys the literature and groups prioritisation approaches into the following four categories: reserves and reserve selection, prescriptive costed biodiversity prioritisation, ranked costed biodiversity projects and contracted costed conservation actions. A concluding section considers the limitations of current prioritisation approaches and points to areas for further development
    • …
    corecore