Analysis of cumulative climate risks and associated impact cascades in Switzerland

Author(s):  
Raphael Neukom ◽  
Nadine Salzmann ◽  
Christian Huggel ◽  
Veruska Muccione ◽  
Sabine Kleppek ◽  
...  

<p>A recent study on ‘climate-related risks and opportunities’ of the Swiss Federal Office for the Environment (FOEN) identified knowledge gaps and related missing planning tools for risks with low probability of occurrence but potentially very severe impacts for society and/or the environment. Such risks refer in particular to risks triggered by cumulating meteorological/climatic extremes events, which (i) exacerbate through process cascades or (ii) return within shorter time intervals than expected.</p><p>To respond to these knowledge gaps and ‘blind spots’ in climate risks, a collaborative effort including academic and government institutions at different administrative levels is undertaken in order to explore and analyse the potential of such large cumulative, complex risks and to suggest actions needed to manage them in Switzerland. The project is based on two case studies, which are developed in consultation with stakeholders from science, policy and practice at the national and sub-national level.</p><p>The case studies analyse risks triggered by meteorological events based on projected and recently published Swiss Climate Scenarios CH2018, considering rare but plausible scenarios where such triggering events cumulate and/or occur in combinations.</p><p>The first case study focuses on mountain systems in the southern Swiss Alps, with a potential reduction of the protective capacity of forests caused by extreme drought and heat, and subsequent increase of risks due to multiple natural hazards (fires, snow avalanches, landslides). A semi-quantitative analysis based on expert surveys allows us to estimate the probability of different levels of loss of the protective function caused by the given meteorological trigger event. In a parallel bottom-up approach we perform the analysis with an impacts-perspective and estimate the ecological and climatological thresholds that lead to a partial or complete loss of protective function. Results from the two methods are qualitatively compatible, but the bottom-up approach tends to show a higher risk of damage compared to the more ‘classical’ top-down analysis for similar meteorological events.</p><p>The second case study focuses on cascading impacts in relation with recurrent large-scale drought and heat events on urban systems and their vulnerable elements. We draw potential process cascades across various socio-economic systems for the urban area of Basel based on a systematic analysis of potentially relevant precedent information from selected past cases worldwide.</p><p>Our study is expected to provide important information concerning highly vulnerable systems and elements, their protection, and tipping points towards severe risk amplification. Moreover, we point to feasible risk management approaches and suggest transformative adaptation measures.</p>

2020 ◽  
Author(s):  
Raphael Neukom ◽  
Nadine Salzmann ◽  
Christian Huggel ◽  
Veruska Mucchione ◽  
Sabine Kleppek ◽  
...  

<div> <p>The study on ‘climate-related risks and opportunities’ of the Swiss Federal Office for the Environment (FOEN) provides a comprehensive analysis of climate-related risks and opportunities for Switzerland until 2060. The synthesis of the study results has been the basis for the development of adaptation strategies and measures in Switzerland. The study also identifies knowledge gaps and related missing planning tools for risks, which are difficult to assess as they typically have a low probability of occurrence but have potentially very high impacts for society and/or the environment. Such risks refer in particular to risks, which cumulate through process cascades or are triggered by meteorological/climatic extremes events, which return within shorter time intervals than expected.</p> <p>To respond to these gaps, a collaborative effort including academic and government institutions at different administrative levels is undertaken in order to explore and analyse the potential of such cumulative risks and actions needed to manage them in Switzerland. The project focuses on two case studies, which are developed in consultation with stakeholders from science, policy and practice at the national and sub-national level.</p> <p>The case studies analyse risks triggered by meteorological events based on projected and recently published Swiss Climate Scenarios CH2018, considering rare but plausible scenarios where such triggering events cumulate and/or occur in combinations.</p> <p>We discuss international terminologies and experience with unexpected and cumulative extreme events and put them in relation to the Swiss context. Specifically, we present the cascading processes of the first case study, which focuses on the protective forests in the eastern Swiss Alps. Potential reduction of the protective capacity caused by extreme drought and heat and subsequent increase of risks caused by multiple natural hazards, such as fires and mass movements (snow avalanche, landslide), are assessed in this case study using semi-quantitative methods of risk analysis.</p> </div>


Author(s):  
Ashish Singla ◽  
Jyotindra Narayan ◽  
Himanshu Arora

In this paper, an attempt has been made to investigate the potential of redundant manipulators, while tracking trajectories in narrow channels. The behavior of redundant manipulators is important in many challenging applications like under-water welding in narrow tanks, checking the blockage in sewerage pipes, performing a laparoscopy operation etc. To demonstrate this snake-like behavior, redundancy resolution scheme is utilized using two different approaches. The first approach is based on the concept of task priority, where a given task is split and prioritize into several subtasks like singularity avoidance, obstacle avoidance, torque minimization, and position preference over orientation etc. The second approach is based on Adaptive Neuro Fuzzy Inference System (ANFIS), where the training is provided through given datasets and the results are back-propagated using augmentation of neural networks with fuzzy logics. Three case studies are considered in this work to demonstrate the redundancy resolution of serial manipulators. The first case study of 3-link manipulator is attempted with both the approaches, where the objective is to track the desired trajectory while avoiding multiple obstacles. The second case study of 7-link manipulator, tracking trajectory in a narrow channel, is investigated using the concept of task priority. The realistic application of minimum-invasive surgery (MIS) based trajectory tracking is considered as the third case study, which is attempted using ANFIS approach. The 5-link spatial redundant manipulator, also known as a patient-side manipulator being developed at CSIR-CSIO, Chandigarh is used to track the desired surgical cuts. Through the three case studies, it is well demonstrated that both the approaches are giving satisfactory results.


Author(s):  
Alex Ryan ◽  
Mark Leung

This paper introduces two novel applications of systemic design to facilitate a comparison of alternative methodologies that integrate systems thinking and design. In the first case study, systemic design helped the Procurement Department at the University of Toronto re-envision how public policy is implemented and how value is created in the broader university purchasing ecosystem. This resulted in an estimated $1.5 million in savings in the first year, and a rise in user retention rates from 40% to 99%. In the second case study, systemic design helped the clean energy and natural resources group within the Government of Alberta to design a more efficient and effective resource management system and shift the way that natural resource departments work together. This resulted in the formation of a standing systemic design team and contributed to the creation of an integrated resource management system. A comparative analysis of the two projects identifies a shared set of core principles for systemic design as well as areas of differentiation that reveal potential for learning across methodologies. Together, these case studies demonstrate the complementarity of systems thinking and design thinking, and show how they may be integrated to guide positive change within complex sociotechnical systems.


Risks ◽  
2021 ◽  
Vol 9 (11) ◽  
pp. 204
Author(s):  
Chamay Kruger ◽  
Willem Daniel Schutte ◽  
Tanja Verster

This paper proposes a methodology that utilises model performance as a metric to assess the representativeness of external or pooled data when it is used by banks in regulatory model development and calibration. There is currently no formal methodology to assess representativeness. The paper provides a review of existing regulatory literature on the requirements of assessing representativeness and emphasises that both qualitative and quantitative aspects need to be considered. We present a novel methodology and apply it to two case studies. We compared our methodology with the Multivariate Prediction Accuracy Index. The first case study investigates whether a pooled data source from Global Credit Data (GCD) is representative when considering the enrichment of internal data with pooled data in the development of a regulatory loss given default (LGD) model. The second case study differs from the first by illustrating which other countries in the pooled data set could be representative when enriching internal data during the development of a LGD model. Using these case studies as examples, our proposed methodology provides users with a generalised framework to identify subsets of the external data that are representative of their Country’s or bank’s data, making the results general and universally applicable.


1997 ◽  
Vol 15 (1) ◽  
pp. 40-53 ◽  
Author(s):  
E. G. Bradshaw ◽  
M. Lester

Abstract. The characteristics of substorm-associated Pi2 pulsations observed by the SABRE coherent radar system during three separate case studies are presented. The SABRE field of view is well positioned to observe the differences between the auroral zone pulsation signature and that observed at mid-latitudes. During the first case study the SABRE field of view is initially in the eastward electrojet, equatorward and to the west of the substorm-enhanced electrojet current. As the interval progresses, the western, upward field-aligned current of the substorm current wedge moves westward across the longitudes of the radar field of view. The westward motion of the wedge is apparent in the spatial and temporal signatures of the associated Pi2 pulsation spectra and polarisation sense. During the second case study, the complex field-aligned and ionospheric currents associated with the pulsation generation region move equatorward into the SABRE field of view and then poleward out of it again after the third pulsation in the series. The spectral content of the four pulsations during the interval indicate different auroral zone and mid-latitude signatures. The final case study is from a period of low magnetic activity when SABRE observes a Pi2 pulsation signature from regions equatorward of the enhanced substorm currents. There is an apparent mode change between the signature observed by SABRE in the ionosphere and that on the ground by magnetometers at latitudes slightly equatorward of the radar field of view. The observations are discussed in terms of published theories of the generation mechanisms for this type of pulsation. Different signatures are observed by SABRE depending on the level of magnetic activity and the position of the SABRE field of view relative to the pulsation generation region. A twin source model for Pi2 pulsation generation provides the clearest explanation of the signatures observed.


Author(s):  
Roi Wagner

This chapter examines two case studies that illustrate the limitations of the cognitive theory of mathematical metaphor in accounting for the formation of actual historical mathematical life worlds. The first case study deals with four medieval and early modern examples of relating algebra to geometry. These examples show that when two mathematical domains are linked, what passes between them cannot be reduced to “inferences,” as assumed by the theory of mathematical metaphor. The second case study reviews notions of infinity since early modernity and demonstrates that these notions are far too variegated and complex to be subsumed under a single metaphor—namely, George Lakoff and Rafael Núñez's basic metaphor of infinity, which tries to read all mathematical infinities as metaphorically projecting final destinations on indefinite sequences.


Author(s):  
Roi Wagner

This chapter presents two case studies that highlight the problems of mathematical semiosis: how mathematical signs obtain and change their senses. The first case study follows the paradigmatic mathematical sign, x, as it is used in applications of powers series to combinatorics via generating functions. The second case study concerns gender role stereotypes involving the so-called “stable marriage problem.” Both case studies open up questions of how meaning is transferred within and across mathematical contexts and try to substantiate the book's claims about interpretation, formalization, and constraints over mathematical objects and statements. The chapter also considers gender-neutral mathematical language in the context of sexuality.


Author(s):  
Gencer Erdogan ◽  
Phu H. Nguyen ◽  
Fredrik Seehusen ◽  
Ketil Stølen ◽  
Jon Hofstad ◽  
...  

Risk-driven testing and test-driven risk assessment are two strongly related approaches, though the latter is less explored. This chapter presents an evaluation of a test-driven security risk assessment approach to assess how useful testing is for validating and correcting security risk models. Based on the guidelines for case study research, two industrial case studies were analyzed: a multilingual financial web application and a mobile financial application. In both case studies, the testing yielded new information, which was not found in the risk assessment phase. In the first case study, new vulnerabilities were found that resulted in an update of the likelihood values of threat scenarios and risks in the risk model. New vulnerabilities were also identified and added to the risk model in the second case study. These updates led to more accurate risk models, which indicate that the testing was indeed useful for validating and correcting the risk models.


Author(s):  
Grant Goodall

Courses on invented languages can do much more than just introduce students to linguistics. Through three case studies, it is shown that as students learn how to design a language, they also learn about the design of human language in a way that is unlikely to occur in other courses. The first case study involves the creation of a lexicon, in relation to John Wilkins’ invented language of 1668 and to Saussurean arbitrariness, commonly regarded as a fundamental design property of human language. The second case study concerns phonemic inventories. By designing their own from scratch, students see the competing pressures that phonemic inventories must satisfy in all languages. The third case study concerns inflectional morphology and the pressures that determine the form of particular morphemes. All of these case studies are accessible to students and help them engage with important aspects of the design properties of human language.


2016 ◽  
pp. 1016-1037
Author(s):  
Gencer Erdogan ◽  
Fredrik Seehusen ◽  
Ketil Stølen ◽  
Jon Hofstad ◽  
Jan Øyvind Aagedal

The authors present the results of an evaluation in which the objective was to assess how useful testing is for validating and correcting security risk models. The evaluation is based on two industrial case studies. In the first case study the authors analyzed a multilingual financial Web application, while in the second case study they analyzed a mobile financial application. In both case studies, the testing yielded new information which was not found in the risk assessment phase. In particular, in the first case study, new vulnerabilities were found which resulted in an update of the likelihood values of threat scenarios and risks in the risk model. New vulnerabilities were also identified and added to the risk model in the second case study. These updates led to more accurate risk models, which indicate that the testing was indeed useful for validating and correcting the risk models.


Sign in / Sign up

Export Citation Format

Share Document