Showing 1 - 10 of 140
Sugarcane breeders in Australia combine data across four selection programs to obtain estimates of breeding value for parents. When these data are combined with full pedigree information back to founding parents, computing limitations mean it is not possible to obtain information on all parents....
Persistent link: https://www.econbiz.de/10009448819
' vulnerability to energy supply disruptions. Crude oil is stored in geologic formations, or salt domes, located under these …
Persistent link: https://www.econbiz.de/10009435453
For over ten years, the Counterproliferation Analysis and Planning System (CAPS) at Lawrence Livermore National Laboratory (LLNL) has been a planning tool used by U.S. combatant commands for mission support planning against foreign programs engaged in the manufacture of weapons of mass...
Persistent link: https://www.econbiz.de/10009435516
important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil … countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus … proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations …
Persistent link: https://www.econbiz.de/10009435670
The CFE Treaty will provide for limits on NATO and WTO forces, particularly tanks, armored personnel carriers, artillery, and helicopters. In addition to the overall limits on TLEs in the ATTU zone, there are expected to be secondary limits on single country forces, limits on forces based in...
Persistent link: https://www.econbiz.de/10009435974
systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research …
Persistent link: https://www.econbiz.de/10009436080
The Internet is a culmination of information age technologies and an agent of change. As with any infrastructure, dependency upon the so-called global information infrastructure creates vulnerabilities. Moreover, unlike physical infrastructures, the Internet is a multi-use technology. While...
Persistent link: https://www.econbiz.de/10009436221
pressure and other variables related to damage by pyroclastic flow into underground structures, and vulnerability criteria for …
Persistent link: https://www.econbiz.de/10009436263
assets using the ECIP program and ultimately produced individual protective measure and vulnerability values through the … protective measure and vulnerability indices (PMI/VI). The PMI/VI assess the protective measures posture of individual facilities …
Persistent link: https://www.econbiz.de/10009436387
The Nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes, and organizations across which these goods and services move are called "critical infrastructures".1 This statement is as true in the U.S....
Persistent link: https://www.econbiz.de/10009436554