scholarly journals The Tunnel Type Road Interchange Vulnerability Assessment Model

Author(s):  
A V Ginzburg ◽  
S A Kachanov ◽  
S I Kozminykh
1991 ◽  
Author(s):  
RONALD LEVY ◽  
LISA DIXON-HIESTER

2012 ◽  
Vol 170-173 ◽  
pp. 1265-1268
Author(s):  
Yu Chen ◽  
Long Cang Shu

It is well-known that land subsidence seriously affects the regional social and economic development and becomes a world-wide problem. Xixi-Chengnan district, Jiangsu province is one of the most important area affected by land subsidence in China. The damage of the hazard to physical, social, economical and environmental systems has been increasing during recent years, which mainly caused by the long period groundwater overexpolitation in the area. This research presents a vulnerability assessment model based on grey correlation analysis (GCA) for the regional land subsidence in Xixi-Chengnan district of Jiangsu province, by the assessment results, the rank of relative vulnerability of each township in the study area can be obtained without weighting and aggregating the vulnerbaility indicators and with avoiding the subjectivity of weighting in general vulnerability evaluation methods. The study can be expected to raise public awareness of land subsidence risk and vulnerability, lay the foundation for risk decision-making, and provide theories and technological supports for taking comprehensive and active measures to prevent and alleviate land subsidence vulnerability.


2020 ◽  
Author(s):  
Pedro Rau ◽  
Wouter Buytaert ◽  
Fabian Drenkhan ◽  
Waldo Lavado ◽  
Juan Jimenez ◽  
...  

<p>The Peruvian Andes are a hotspot of vulnerabilities to impacts in water resources due to the propensity for water stress, the highly unpredictable weather, the sensitivity of glaciers, and the socio-economic vulnerability of its population. In this context, we selected the Vilcanota-Urubamba catchment in Southern Peru for addressing these challenges aiming at our objectives within a particular hydrological high-mountain context in the tropical Andes: a) Develop a fully-distributed, physically-based glacier surface energy balance model that allows for a realistic representation of glacier dynamics in glacier melt projections; b) Design and implement a glacio-hydrological monitoring and data collection approach to quantify non-glacial contributions to water resources and the impact of catchments interventions; c) Mapping of human water use at high spatiotemporal resolution and determining current and future levels of water (in)security; and d) Integrate last objectives in a glacier - water security assessment model and evaluate the tool's capacity to support locally embedded climate change adaptation strategies. </p><p>The RAHU project intends to transform the scientific understanding of the impact of glacier shrinkage on water security and, at the same time, to connect to and inform policy practices in Peru. It follows a "source to tap" paradigm, in which is planned to deliver a comprehensive and fully integrated water resources vulnerability assessment framework for glacier-fed basins, comprising state-of-the-art glaciology, hydrology, water demand characterisation, and water security assessment. It includes glacio-hydrological and water resources monitoring campaigns, to complement existing monitoring efforts of our project partners and collaborators, and new remotely sensed data sets. Those campaigns will be implemented using the principles and tools of participatory monitoring and knowledge co-creation that our team has pioneered in the tropical Andes. The datasets produced by this approach, combined with existing monitoring implemented by our team and collaborators, will allow us to build an integrated water supply-demand-vulnerability assessment model for glacierized basins, and to use this to evaluate adaptation strategies at the local scale. </p><p>This research is part of the multidisciplinary collaboration between British and Peruvian scientists (Newton Fund, Newton-Paulet).</p>


2016 ◽  
Vol 75 (17) ◽  
Author(s):  
Vladimir Živanović ◽  
Igor Jemcov ◽  
Veselin Dragišić ◽  
Nebojša Atanacković ◽  
Sava Magazinović

2014 ◽  
Vol 644-650 ◽  
pp. 2920-2924
Author(s):  
Yun Zhi Li

Assessment model of the vulnerability for information system is improved by using Bayesian equilibrium algorithm. The mathematical evaluation model of combined complex network information systems is established through the combination of weighted directional algorithm, and the algorithmic routine of network vulnerability assessment is designed. In order to verify the validity and reliability of the model and the algorithm, the test platform of complex network is built, and the vulnerability of network is detected with the weighted directional method, which has got the probability distribution nephogram of network vulnerability and the curve of network performance with time changing. At the last, the effect of different nodes of the network on the vulnerability of system is calculated with directed weights. And the results shown that the attacked number of different nodes and the attacked probability have improved the credibility of information analysis, which has provided theory reference for the research of information system vulnerability.


Due to the wide application of SCADA systems in national critical infrastructure, their cyber security issues and vulnerabilities have been a primary concern; whereas, the impact and consequences of cyber-attacks to these systems have the potential to result in catastrophic consequences in the physical domain. Therefore, estimating possible attack impacts and identifying system vulnerabilities are major concern in SCADA management and operations. However, it is quite difficult to plan, execute and review vulnerability analysis in critical infrastructure systems as well as in industrial control systems (such as SCADA system) due to its complexity, large-scale and heterogeneity. Consequently, a consistent domain-specific conceptual model is required to establish a generic framework for cyber security analysis to examine and investigate security threats on cyber-physical systems, the role of the entities within the system as well as system operations. The main contribution of this work is to present a multi-facets model to support cyber security analysis practices such as penetration testing, vulnerability assessment and risk analysis. The proposed model presents a common insight among different SCADA configurations, implementations and the employed protocols to handle its complexity, heterogeneous and scale. To demonstrate the usability as a proof of concept and applicability of the proposed model, the paper also presents an example illustrating how the proposed model can be employed to carry out security vulnerability assessment.


Sign in / Sign up

Export Citation Format

Share Document