Vulnerability mapping and its application in Sample Clauses

Vulnerability mapping and its application in urban planning (1) The technical stream constructed the vulnerability map as a composite of three source maps that addressed (i) exposure, (ii) sensitivity, and (iii) adaptation capacity as defined by the Intergovernmental Panel on Climate Change (IPCC)3. To develop these source maps, the joint technical team of the municipalities and CCAP assessed the cities’ vulnerability to climate change and other environmental hazards, focused on natural disasters and extreme weather events. They used topographic maps from the National Cartography and Remote Sensing Centre, CENACARTA, (topographic maps at scale 1:5,000) and the Millennium Challenge Account (MCA). Data from Shuttle Radar Topographic Mission (SRTM) was used to fill the gaps of the topographic data from CENACARTA. The Normalized Difference Vegetation Index (NDVI) was calculated from Spot image and Landsat image for Quelimane and Pemba respectively. (2) The consultation stream consisted of engagement with the communities to bring into the process, both their experience and their priorities. The municipalities and CCAP organized meetings in each municipality, bringing together local leaders, NGO representatives, religious leaders, local experts, and other influential stakeholders to gather the necessary community input. In the meetings, the participants shared their experiences dealing with natural disasters in order to contribute to the creation of vulnerability concepts to guide the mapping process. Through this discussion, the team was able to break down the vulnerability concepts into 30 parameters, applying participant experiences and perspectives to rank them according to their perceived relevance. Following the production of these vulnerability maps, in February 2015, CCAP conducted an introductory vulnerability mapping training course for municipal and other local technical experts. The course addresses: (1) how these maps are prepared, from consultation to final production; (2) what each of the layers mean and how they are interpreted for effective decision-making; and (3) how they can use them to contribute to developing local adaptation, infrastructure and the other plans that cities need to operate effectively. The vulnerability maps produced reflect present conditions, and they will be updated regularly to track change in key variables that may affect the vulnerability profile over time, such as population settlements and density, and social infrastructure (e.g., schools, hospitals, roads). Th...
AutoNDA by SimpleDocs

Related to Vulnerability mapping and its application in

  • Reporting on Utilization of Subject Inventions 1. The Performer agrees to submit, during the term of the Agreement, an annual report on the utilization of a subject invention or on efforts at obtaining such utilization that are being made by the Performer or its licensees or assignees. Such reports shall include information regarding the status of development, date of first commercial sale or use, gross royalties received by the Performer, and such other data and information as the agency may reasonably specify. The Performer also agrees to provide additional reports as may be requested by DARPA in connection with any march-in proceedings undertaken by DARPA in accordance with Paragraph I of this Article. DARPA agrees it shall not disclose such information to persons outside the Government without permission of the Performer, unless required by law. 2. All required reporting shall be accomplished, to the extent possible, using the i-Edison reporting website: xxxxx://x-xxxxxx.xxxx.xxx.xxx/iEdison/. To the extent any such reporting cannot be carried out by use of i-Edison, reports and communications shall be submitted to the Agreements Officer and Administrative Agreements Officer.

  • Investment Analysis and Implementation In carrying out its obligations under Section 1 hereof, the Advisor shall: (a) supervise all aspects of the operations of the Funds; (b) obtain and evaluate pertinent information about significant developments and economic, statistical and financial data, domestic, foreign or otherwise, whether affecting the economy generally or the Funds, and whether concerning the individual issuers whose securities are included in the assets of the Funds or the activities in which such issuers engage, or with respect to securities which the Advisor considers desirable for inclusion in the Funds' assets; (c) determine which issuers and securities shall be represented in the Funds' investment portfolios and regularly report thereon to the Board of Trustees; (d) formulate and implement continuing programs for the purchases and sales of the securities of such issuers and regularly report thereon to the Board of Trustees; and (e) take, on behalf of the Trust and the Funds, all actions which appear to the Trust and the Funds necessary to carry into effect such purchase and sale programs and supervisory functions as aforesaid, including but not limited to the placing of orders for the purchase and sale of securities for the Funds.

  • LIMITATIONS ON REVERSE ENGINEERING, DECOMPILATION AND DISASSEMBLY You may not reverse engineer, decompile, or disassemble the Software, except and only to the extent that such activity is expressly permitted by applicable law notwithstanding this limitation.

  • Tax Examinations Abroad 1. A Contracting Party may allow representatives of the competent authority of the other Contracting Party to enter the territory of the first-mentioned Party to interview individuals and examine records with the written consent of the persons concerned. The competent authority of the second-mentioned Party shall notify the competent authority of the first-mentioned Party of the time and place of the meeting with the individuals concerned. 2. At the request of the competent authority of one Contracting Party, the competent authority of the other Contracting Party may allow representatives of the competent authority of the first-mentioned Party to be present at the appropriate part of a tax examination in the second-mentioned Party. 3. If the request referred to in paragraph 2 is acceded to, the competent authority of the Contracting Party conducting the examination shall, as soon as possible, notify the competent authority of the other Party about the time and place of the examination, the authority or official designated to carry out the examination and the procedures and conditions required by the first-mentioned Party for the conduct of the examination. All decisions with respect to the conduct of the tax examination shall be made by the Party conducting the examination.

  • Emergency Maintenance LightEdge reserves the right to perform emergency Service maintenance as needed outside the Scheduled Maintenance window, in which case LightEdge will make a reasonable effort to notify the Customer if feasible under the circumstances. Any such maintenance will be considered an “Emergency Maintenance”. All Service SLAs will apply during Emergency Maintenance.

  • Application of Funding Techniques to Programs 6.3.1 The State shall apply the following funding techniques when requesting Federal funds for the component cash flows of the programs listed in sections 4.2 and 4.3 of this Agreement. 6.3.2 Programs Below are programs listed in Section 4.2 and Section 4.3.

  • DEVELOPMENT OR ASSISTANCE IN DEVELOPMENT OF SPECIFICATIONS REQUIREMENTS/ STATEMENTS OF WORK

  • Information Systems Acquisition Development and Maintenance a. Client Data – Client Data will only be used by State Street for the purposes specified in this Agreement.

  • Technical Feasibility of String While ICANN has encouraged and will continue to encourage universal acceptance of all top-­‐level domain strings across the Internet, certain top-­‐level domain strings may encounter difficulty in acceptance by ISPs and webhosters and/or validation by web applications. Registry Operator shall be responsible for ensuring to its satisfaction the technical feasibility of the TLD string prior to entering into this Agreement.

  • Scope of Collaboration As part of the collaboration, the Controllers will act as Joint Controller. The roles of the Controller and the associated tasks are specified in more detail in Appendix 1. If one party is solely responsible for a data processing operation, this party will implement all relevant data protection provisions on its own responsibility. However, such data processing procedures are not subject to this Agreement. Joint data processing and the type of Personal Data collected and processed within the framework of collaboration are specified in Appendix 1.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!