1,718 research outputs found

    Climate change amplifies plant invasion hotspots in Nepal

    Get PDF
    Aim Climate change has increased the risk of biological invasions, particularly by increasing the climatically suitable regions for invasive alien species. The distribution of many native and invasive species has been predicted to change under future climate. We performed species distribution modelling of invasive alien plants (IAPs) to identify hotspots under current and future climate scenarios in Nepal, a country ranked among the most vulnerable countries to biological invasions and climate change in the world. Location Nepal. Methods We predicted climatically suitable niches of 24 out of the total 26 reported IAPs in Nepal under current and future climate (2050 for RCP 6.0) using an ensemble of species distribution models. We also conducted hotspot analysis to highlight the geographic hotspots for IAPs in different climatic zones, land cover, ecoregions, physiography and federal states. Results Under future climate, climatically suitable regions for 75% of IAPs will expand in contrast to a contraction of the climatically suitable regions for the remaining 25% of the IAPs. A high proportion of the modelled suitable niches of IAPs occurred on agricultural lands followed by forests. In aggregation, both extent and intensity (invasion hotspots) of the climatically suitable regions for IAPs will increase in Nepal under future climate scenarios. The invasion hotspots will expand towards the high‐elevation mountainous regions. In these regions, land use is rapidly transforming due to the development of infrastructure and expansion of tourism and trade. Main conclusions Negative impacts on livelihood, biodiversity and ecosystem services, as well as economic loss caused by IAPs in the future, may be amplified if preventive and control measures are not immediately initiated. Therefore, the management of IAPs in Nepal should account for the vulnerability of climate change‐induced biological invasions into new areas, primarily in the mountains

    Incorporating Crash Severity and Continuous Improvement of SHIFT

    Get PDF
    The Strategic Highway Investment Formula for Tomorrow (SHIFT) is the Kentucky Transportation Cabinet\u27s data-informed approach for comparing capital improvement projects and prioritizing limited transportation funds. SHIFT 2022 incorporates advancements in methods and flexibility. This project revises the SHIFT crash data safety metric. The crash data safety metric from the previous version of SHIFT was excess expected crashes (EECs). It is computed using the total number of crashes of all severities. Locations with a higher proportion of severe (fatal and injury) crashes received the same weight as locations with an equal number of property damage only crashes. This project redefines the SHIFT crash data safety metric, increasing the weight of serious (KAB) crashes while still accounting for the potential to reduce less serious crashes. It also attends to the five-year and ultimate goals of Kentucky’s Strategic Highway Safety Plan by developing a metric sensitive to these policy goals. The five-year goal is represented by a new definition of EEC (the difference between expected crashes, the Empirical Bayes estimate, and the number of systemwide crashes when the goal is achieved). The ultimate goal is represented by the potential to reduce crashes on all road sections to zero, which is the EB estimate itself

    IPv6 Network Mobility

    Get PDF
    Network Authentication, Authorization, and Accounting has been used since before the days of the Internet as we know it today. Authentication asks the question, “Who or what are you?” Authorization asks, “What are you allowed to do?” And fi nally, accounting wants to know, “What did you do?” These fundamental security building blocks are being used in expanded ways today. The fi rst part of this two-part series focused on the overall concepts of AAA, the elements involved in AAA communications, and highlevel approaches to achieving specifi c AAA goals. It was published in IPJ Volume 10, No. 1[0]. This second part of the series discusses the protocols involved, specifi c applications of AAA, and considerations for the future of AAA

    Advisory Committee on Immunization Practices (ACIP) summary report : September 22, 2020, Atlanta, Georgia

    Get PDF
    Publication date from document properties.min-2020-09.pdf2020https://www.cdc.gov/vaccines/acip/meetings/downloads/min-archive/min-2020-09.pdf878

    Refining the Search and Recovery Process: A Predictive Model for Vehicle Repossessions

    Get PDF
    The automotive repossession industry has been transitioning to locationally aware hardware that permits the use of geographic data to enhance business intelligence operations. GIS initiatives in this industry are relatively new meaning that geospatial trends in repossession data have not been studied in an academic context. This project focuses on identifying trends in license plate recognition scan data collected from high-resolution cameras in Houston, Texas in order to predict future repossession locations. Through the use of opportunity terrain modeling with spatial statistics, a prediction surface was generated that accurately described the habitat of debt by combining seven opportunity variables that were significantly correlated with repossession densities. The findings can be used to narrow the search for vehicles by targeting high-opportunity locations for scanning and recovery

    Herramientas de código abierto: Incidencia en la seguridad inalámbrica de la Universidad Técnica de Babahoyo

    Get PDF
    Computer security is a fundamental part of an organization, especially in Higher Education institutions, where there is very sensitive information, capable of being vulnerable by diffeerent methods of intrusion, the most common being free access through wireless points. The main objective of this research is to analyze the impact of the open source tools in charge of managing the security information of the wireless network, such as OSSIM, a set of active and passive components used to manage events that generate tra c within the network. net. This research exposes the use of free software as a viable option of low cost to solve the problems that a ict student sta , such as lack of access to academic services, problems of wireless interconnectivity, with the purpose to restore confidence in students in the Use of the services offered by the institution for research-related development, guaranteeing free and free access to the internet. The level of dissatisfaction on the part of the students con rms the problem presented at the Technical University of Babahoyo, thus confirming the positive influence of the Open-Source tools for the institution’s wireless security.La seguridad informática es una parte fundamental de una organización, especialmente en Higher Instituciones educativas, donde hay información muy sensible, capaz de ser vulnerables por diferentes métodos de intrusión, siendo el acceso libre más común a través de puntos inalámbricos. El objetivo principal de esta investigación es analizar el impacto de las herramientas de código abierto encargadas de administrar la información de seguridad de la red inalámbrica, como OSSIM, un conjunto de componentes activos y pasivos utilizados para administrar eventos que generan tráfico dentro de la red. red. Esta investigación expone el uso de software libre como una opción viable de bajo costo para resolver los problemas que afligen al estudiante personal, como la falta de acceso a servicios académicos, problemas de interconexión inalámbrica, con el propósito de restaurar la confianza en los estudiantes en el uso de los servicios. ofrecido por la institución para el desarrollo relacionado con la investigación, garantizando de forma gratuita y gratuita acceso a Internet. El nivel de insatisfacción por parte de los estudiantes confirma el problema presentado en la Universidad Técnica de Babahoyo, confirmando así la influencia positiva de las herramientas de código abierto para la seguridad inalámbrica de la institución
    corecore