Learning from nature: favoring small lahars formation for hazard mitigation

Author(s):  
Valeria Lupiano ◽  
Claudia Calidonna ◽  
Paolo Catelan ◽  
Francesco Chidichimo ◽  
Gino Mirocle Crisci ◽  
...  

<p>Lahars represent one of the world destructive natural phenomena as number of casualties (Manville et al., 2013). Lahars originate as mixtures of water and volcanic deposits frequently by heavy rainfalls; they are erosive floods capable of increase in volume along its path to more than 10 times their initial size, moving up to 100 km/h in steeply sloping as far as an extreme distance of hundreds of kilometers.</p><p>Beside tools of early warning, security measures have been adopted in volcanic territory, by constructing retaining dams and embankments in key positions for containing and deviating possible lahars (Leung et al., 2003). This solution could involve a strong environmental impact both for the works and the continuous accumulation of volcanic deposits, such that equilibrium conditions could lack far, triggering more disastrous events.</p><p>The growing frequency of lahars in the Vascún Valley area, Tungurahua Volcano Ecuador, maybe for the climatic change, has recently produced smaller (shorter accumulation periods) and therefore less dangerous events.</p><p>Momentary ponds form along rivers in volcanic areas, when they become usually blocked by landslides of volcanic deposits, which are originated by pyroclastic flows and lahars. The most frequent cause of a breakout of such natural ponds is the overflow of water across the newly formed dam and subsequent erosion and rapid downcutting into the loose rock debris.</p><p>Dam collapse can occur by sliding of the volcanic deposit or by its overturning. By eroding the blockage and flowing out river channel downstream, the initial surge of water will incorporate a dangerous volume of sediments. This produces lahars with possible devastating effects for settlements in their path (Leung et al., 2003).</p><p>The use of simulation tools (from the cellular automata model LLUNPIY) and field data (including necessary subsoil survey) permit to individuate points, where dams by backfills, easy to collapse, can produce momentary ponds.</p><p>Small temporary dams with similar (but controlled) behavior of above mentioned dams can be designed and built at low cost by local backfills in order to allow the outflow of streams produced by regular rainfall events. This result is achieved by properly dimensioning a discharge channel at the dam base (Lupiano et al., 2020).</p><p>So small lahars can be triggered for minor rainfall events, lahar detachments can be anticipated for major events, avoiding simultaneous confluence with other lahars (Lupiano et al., 2020).</p><p><strong>REFERENCES</strong></p><p>Leung, MF, Santos, JR, Haimes, YY (2003). Risk modeling, assessment, and management of lahar flow threat. Risk Analysis, 23(6), 1323-1335.</p><p>Lupiano, V., Chidichimo, F., Machado, G., Catelan, P., Molina, L., Calidonna, C.R., Straface, S., Crisci, G. M., And Di Gregorio, S. (2020) - From examination of natural events to a proposal for risk mitigation of lahars by a cellular-automata methodology: a case study for Vascún valley, Ecuador. Nat. Hazards Earth Syst. Sci., 20, 1–20, 2020.</p><p>Manville, V., Major, J.J. and Fagents, S.A. (2013). Modeling lahar behavior and hazards. in Fagents, SA, Gregg, TKP, and Lopes, RMC (eds.) Modeling Volcanic Processes: The Physics and Mathematics of Volcanism. Cambridge: Cambridge University Press, pp. 300–330.</p>

2020 ◽  
Vol 20 (1) ◽  
pp. 1-20 ◽  
Author(s):  
Valeria Lupiano ◽  
Francesco Chidichimo ◽  
Guillermo Machado ◽  
Paolo Catelan ◽  
Lorena Molina ◽  
...  

Abstract. Lahars are erosive floods, mixtures of water and pyroclastic detritus, known for being the biggest environmental disaster and causing a large number of fatalities in volcanic areas. Safety measures have been recently adopted in the threatened territories by constructing retaining dams and embankments in key positions. More disastrous events could be generated by the difficulty of maintaining these works in efficiency and for the changed risk conditions originating from their presence and the effects of their functioning. LLUNPIY/3r, a version of the cellular-automaton model LLUNPIY for lahar simulations, is presented. The growing frequency of lahars in the Vascún valley of Tungurahua volcano (Ecuador), probably due to the effects of the climatic change, has recently produced smaller and less dangerous events, sometimes favored by the collapse of ponds generated by small landslides. An investigation is performed here in order to reproduce such situations in a controlled way by the use of LLUNPIY/3r simulations. Using precise field data, points are individuated where dams by backfill, which are easy to collapse, can produce the formation of ponds; LLUNPIY/3r simulations permit projecting the triggering of small lahars by minor rainfall events or projecting, in the case of more rainfall, the anticipation of lahar detachment, avoiding simultaneous and dangerous confluence with other lahars.


2018 ◽  
Vol 7 (3) ◽  
pp. 28 ◽  
Author(s):  
Angela Lonzetta ◽  
Peter Cope ◽  
Joseph Campbell ◽  
Bassam Mohd ◽  
Thaier Hayajneh

Bluetooth technology is a key component of wireless communications. It provides a low-energy and low-cost solution for short-range radio transmissions. Bluetooth, more specifically Bluetooth Low Energy (BLE) has become the predominant technology for connecting IoT (Internet of Things). It can be found in cell phones, headsets, speakers, printers, keyboards, automobiles, children’s toys, and medical devices, as well as many other devices. The technology can also be found in automated smart homes, to provide monitors and controls for lights, thermostats, door locks, appliances, security systems, and cameras. Bluetooth offers convenience and ease of use, but it lacks a centralized security infrastructure. As a result, it has serious security vulnerabilities, and the need for awareness of the security risks are increasing as the technology becomes more widespread. This paper presents an overview of Bluetooth technology in IoT including its security, vulnerabilities, threats, and risk mitigation solutions, as well as real-life examples of exploits. Our study highlights the importance of understanding attack risks and mitigation techniques involved with using Bluetooth technology on our devices. Real-life examples of recent Bluetooth exploits are presented. Several recommended security measures are discussed to secure Bluetooth communication.


Author(s):  
Valeria Lupiano ◽  
Francesco Chidichimo ◽  
Guillermo Machado ◽  
Paolo Catelan ◽  
Lorena Molina ◽  
...  

Abstract. Lahars are erosive floods, mixtures of water and pyroclastic deposits, they look the biggest environmental disaster as number of fatalities in the volcanic areas. Security measures have been recently adopted in the threatened territories, by constructing retaining dams and embankments in key positions. Such solutions could involve a strong environmental impact for the works and the continuous accumulation of volcanic deposits, such that equilibrium conditions could lack far, triggering more disastrous events. An improved version of the Cellular Automaton model LLUNPIY for lahars simulations is presented. The growing frequency of lahars, maybe for the climatic change, in the Vascún Valley of Tungurahua Volcano, Ecuador has recently produced smaller and less dangerous events, sometimes favoured by the collapse of temporary ponds, generated by small landslides. An investigation is here performed in order to reproduce such situations in controlled way by the use of LLUNPIY simulations. Using precise field data, points are individuated where dams by backfills, easy to collapse, can produce momentary ponds; LLUNPIY simulations permit to project triggering of small lahars by minor rainfall events or to project in the case of larger rainfalls the anticipation of lahar detachment, avoiding simultaneous and dangerous confluence with other lahars.


2017 ◽  
Author(s):  
JOSEPH YIU

The increasing need for security in microcontrollers Security has long been a significant challenge in microcontroller applications(MCUs). Traditionally, many microcontroller systems did not have strong security measures against remote attacks as most of them are not connected to the Internet, and many microcontrollers are deemed to be cheap and simple. With the growth of IoT (Internet of Things), security in low cost microcontrollers moved toward the spotlight and the security requirements of these IoT devices are now just as critical as high-end systems due to:


2021 ◽  
Vol 13 (4) ◽  
pp. 815
Author(s):  
Mary-Anne Fobert ◽  
Vern Singhroy ◽  
John G. Spray

Dominica is a geologically young, volcanic island in the eastern Caribbean. Due to its rugged terrain, substantial rainfall, and distinct soil characteristics, it is highly vulnerable to landslides. The dominant triggers of these landslides are hurricanes, tropical storms, and heavy prolonged rainfall events. These events frequently lead to loss of life and the need for a growing portion of the island’s annual budget to cover the considerable cost of reconstruction and recovery. For disaster risk mitigation and landslide risk assessment, landslide inventory and susceptibility maps are essential. Landslide inventory maps record existing landslides and include details on their type, location, spatial extent, and time of occurrence. These data are integrated (when possible) with the landslide trigger and pre-failure slope conditions to generate or validate a susceptibility map. The susceptibility map is used to identify the level of potential landslide risk (low, moderate, or high). In Dominica, these maps are produced using optical satellite and aerial images, digital elevation models, and historic landslide inventory data. This study illustrates the benefits of using satellite Interferometric Synthetic Aperture Radar (InSAR) to refine these maps. Our study shows that when using continuous high-resolution InSAR data, active slopes can be identified and monitored. This information can be used to highlight areas most at risk (for use in validating and updating the susceptibility map), and can constrain the time of occurrence of when the landslide was initiated (for use in landslide inventory mapping). Our study shows that InSAR can be used to assist in the investigation of pre-failure slope conditions. For instance, our initial findings suggest there is more land motion prior to failure on clay soils with gentler slopes than on those with steeper slopes. A greater understanding of pre-failure slope conditions will support the generation of a more dependable susceptibility map. Our study also discusses the integration of InSAR deformation-rate maps and time-series analysis with rainfall data in support of the development of rainfall thresholds for different terrains. The information provided by InSAR can enhance inventory and susceptibility mapping, which will better assist with the island’s current disaster mitigation and resiliency efforts.


2017 ◽  
Vol 11 (7) ◽  
pp. 1 ◽  
Author(s):  
Yi-Jian Liu ◽  
Jian Cao ◽  
Xiao-Yan Cao ◽  
Yuan-Biao Zhang

As an important field in traffic control science, the research in design of toll plazas has increasingly attracted attention of scholars and society. A good design of toll plaza needs to meet a lot of conditions, such as high safety coefficient, high throughput and low cost level. In this study, we established an evaluation model of toll plaza based on cellular automata and M/M/C queuing theory applying to three aspects: safety coefficient, throughput and cost. Then, we took the Asbury Park Toll Plaza in New Jersey as an example to analyze its performance and further optimized the design of the toll plaza. Compared with the original design, the optimized toll plaza we designed is proved to be safer and preferable. Last but not least, we further analyzed the robustness of the designed toll plaza, proving that the designed toll plaza had a preferable performance in reality.


Web Services ◽  
2019 ◽  
pp. 1393-1410
Author(s):  
Alaa Hussein Al-Hamami ◽  
Rafal A. Al-Khashab

Cloud computing provides the full scalability, reliability, high performance and relatively low cost feasible solution as compared to dedicated infrastructure. These features make cloud computing more attractive to users and intruders. It needs more and complex security measures to protect user privacy and data centers. The main concern in this chapter is security, privacy and trust. This chapter will give a discussion and a suggestion for using cloud computing to preserve security and privacy. The malicious hacker and other threats are considering the major cause of leaking security of the personal cloud due to centralized location and remote accesses to the cloud. According to attacks, a centralized location can be easier target rather than several goals and remote access is insecure technologies which offer a boundary of options for attackers to infiltrate enterprises. The biggest concern is attackers that will use the remote connection as a jumping point to get deeper into an organization.


2020 ◽  
Vol 9 (12) ◽  
pp. 725
Author(s):  
Christos Tzioutzios ◽  
Aristeidis Kastridis

The potential of woodland and floodplain woodland plantations in a wide area, of high flood risk, along the Spey River (Scotland) is investigated, to mitigate the floods’ catastrophic impact. The spatial analysis required various datasets to be overlaid, to define the suitable sites for woodland and floodplain woodland establishment. These datasets that concern the topography, the physical and technical characteristics (existing woodland, road system, urban and rural areas, river system and open water areas, railway) and the protected sites of the study area were obtained and merged using Geographical Information System (GIS) techniques. The most suitable and unsuitable areas within the region were identified, using multi-criteria evaluation methods (Boolean approach). In total, 13 constraints were created by expressing true/false statements for each factor, and were combined together using spatial analysis tools. The results revealed the high potential of woodland and floodplain woodland plantations to prevent floods, with 59.2% of the total study area (177.5 km2) determined to be appropriate for such practices’ application. The River Dulnain tributary demonstrated the highest potential for floodplain woodland planting, followed by Rivers Avon and Fiddich, and the southwestern and northeastern Spey River parts. The methodology proposed is simple and provides rapid and accurate results at low cost, while the datasets can be easily accessed and are available in convenient type/format. This useful methodology for researchers and authorities could be applied successfully to similar watersheds, contributing significantly to flood risk mitigation and the enhancement of the flood-preventative measures’ planning efficiency.


Author(s):  
Sheikh I. Ahamed ◽  
Mohammad Zulkernine ◽  
Munirul M. Haque

Pervasive computing has progressed significantly during this decade due to the developments and advances in portable, low-cost, and light-weight devices along with the emergence of short range and low-power wireless communication networks. Pervasive computing focuses on combining computing and communications with the surrounding physical environment to make computing and communication transparent to the users in day-to-day activities. In pervasive computing, numerous, casually accessible, often invisible, frequently mobile or embedded devices form an ad-hoc network that occasionally connects to fixed networks structure too. These pervasive computing devices often collect information about the surrounding environment using various sensors. Pervasive computing has the inherent disadvantages of slow, expensive connections, frequent line disconnections, limited host bandwidth, location dependent data, and so forth. These challenges make pervasive computing applications more vulnerable to various security-related threats. However, traditional security measures do not fit well in pervasive computing applications. Since location and context are key attributes of pervasive computing applications, privacy issues need to be handled in a sophisticated manner. The devices in a pervasive computing network leave and join in an ad-hoc manner. This device behavior creates a need for new trust models for pervasive computing applications. In this chapter, we address the challenges and requirements of security, privacy, and trust for pervasive applications. We also discuss the state-of-the-art of pervasive security, privacy, and trust along with some open issues.


Sign in / Sign up

Export Citation Format

Share Document