scholarly journals Erratum to: Human Vulnerability Mapping Facing Critical Service Disruptions for Crisis Managers

Author(s):  
Amélie Grangeat ◽  
Julie Sina ◽  
Vittorio Rosato ◽  
Aurélia Bony ◽  
Marianthi Theocharidou
Author(s):  
Amélie Grangeat ◽  
Julie Sina ◽  
Vittorio Rosato ◽  
Aurélia Bony ◽  
Marianthi Theocharidou

2016 ◽  
Vol 7 ◽  
pp. 18005 ◽  
Author(s):  
Lionel Berthet ◽  
Olivier Piotte ◽  
Éric Gaume ◽  
Renaud Marty ◽  
Constantin Ardilouze

PLoS Biology ◽  
2013 ◽  
Vol 11 (10) ◽  
pp. e1001682 ◽  
Author(s):  
Camilo Mora ◽  
Chih-Lin Wei ◽  
Audrey Rollo ◽  
Teresa Amaro ◽  
Amy R. Baco ◽  
...  

Author(s):  
Ryan Mullins ◽  
Deirdre Kelliher ◽  
Ben Nargi ◽  
Mike Keeney ◽  
Nathan Schurr

Recently, cyber reasoning systems demonstrated near-human performance characteristics when they autonomously identified, proved, and mitigated vulnerabilities in software during a competitive event. New research seeks to augment human vulnerability research teams with cyber reasoning system teammates in collaborative work environments. However, the literature lacks a concrete understanding of vulnerability research workflows and practices, limiting designers’, engineers’, and researchers’ ability to successfully integrate these artificially intelligent entities into teams. This paper contributes a general workflow model of the vulnerability research process, and identifies specific collaboration challenges and opportunities anchored in this model. Contributions were derived from a qualitative field study of work habits, behaviors, and practices of human vulnerability research teams. These contributions will inform future work in the vulnerability research domain by establishing an empirically-driven workflow model that can be adapted to specific organizational and functional constraints placed on individual and teams.


Water ◽  
2021 ◽  
Vol 13 (9) ◽  
pp. 1288
Author(s):  
Husam Musa Baalousha ◽  
Bassam Tawabini ◽  
Thomas D. Seers

Vulnerability maps are useful for groundwater protection, water resources development, and land use management. The literature contains various approaches for intrinsic vulnerability assessment, and they mainly depend on hydrogeological settings and anthropogenic impacts. Most methods assign certain ratings and weights to each contributing factor to groundwater vulnerability. Fuzzy logic (FL) is an alternative artificial intelligence tool for overlay analysis, where spatial properties are fuzzified. Unlike the specific rating used in the weighted overlay-based vulnerability mapping methods, FL allows more flexibility through assigning a degree of contribution without specific boundaries for various classes. This study compares the results of DRASTIC vulnerability approach with the FL approach, applying both on Qatar aquifers. The comparison was checked and validated against a numerical model developed for the same study area, and the actual anthropogenic contamination load. Results show some similarities and differences between both approaches. While the coastal areas fall in the same category of high vulnerability in both cases, the FL approach shows greater variability than the DRASTIC approach and better matches with model results and contamination load. FL is probably better suited for vulnerability assessment than the weighted overlay methods.


Sign in / Sign up

Export Citation Format

Share Document