• Title/Summary/Keyword: vulnerability of mapping

Search Result 41, Processing Time 0.027 seconds

Groundwater pollution risk mapping using modified DRASTIC model in parts of Hail region of Saudi Arabia

  • Ahmed, Izrar;Nazzal, Yousef;Zaidi, Faisal
    • Environmental Engineering Research
    • /
    • v.23 no.1
    • /
    • pp.84-91
    • /
    • 2018
  • The present study deals with the management of groundwater resources of an important agriculture track of north-western part of Saudi Arabia. Due to strategic importance of the area efforts have been made to estimate aquifer proneness to attenuate contamination. This includes determining hydrodynamic behavior of the groundwater system. The important parameters of any vulnerability model are geological formations in the region, depth to water levels, soil, rainfall, topography, vadose zone, the drainage network and hydraulic conductivity, land use, hydrochemical data, water discharge, etc. All these parameters have greater control and helps determining response of groundwater system to a possible contaminant threat. A widely used DRASTIC model helps integrate these data layers to estimate vulnerability indices using GIS environment. DRASTIC parameters were assigned appropriate ratings depending upon existing data range and a constant weight factor. Further, land-use pattern map of study area was integrated with vulnerability map to produce pollution risk map. A comparison of DRASTIC model was done with GOD and AVI vulnerability models. Model validation was done with $NO_3$, $SO_4$ and Cl concentrations. These maps help to assess the zones of potential risk of contamination to the groundwater resources.

Vulnerability Analysis in the Nakdong River Basin for the Utilization of Flood Risk Mapping (홍수위험지도 활용을 위한 낙동강 유역에서의 홍수취약도 분석)

  • Kim, Tae-Hyung;Han, Kun-Yeun;Cho, Wan-Hee
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.14 no.3
    • /
    • pp.203-222
    • /
    • 2011
  • The characteristics of flood damages have been increasingly strengthened and take the form of unpredictable and unusual weather phenomena caused by climate change and climate anomalies. To prevent inundation damage caused by breach of hydraulic structure such as dam or levee, and trouble of drainage of inner basin, the prediction necessity of flood inundation area, flood risk analysis, and drawing flood risk maps have been on the rise, and the national flood risk maps have been produced. In this study, the quantitative flood vulnerability analysis was performed, which represents population living within flood-affected areas, types of economic activities, facilities affected by flood, in order to extend flood risk mapping from simple hazard concept into risk based idea. By applying it to Nakdong River basin, the flood vulnerability indices were estimated to draw flood risk maps subdivided into administrative districts. The result of this study can be applied to establish the disaster prevention measures and priority decision of disaster prevention project.

Vulnerability AssessmentunderClimateChange and National Water Management Strategy

  • Koontanakulvong, Sucharit;Suthinon, Pongsak
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2016.05a
    • /
    • pp.204-204
    • /
    • 2016
  • Thailand had set the National Water Management Strategy which covered main six areas in the next 12 years, i.e., by priority: (1) water for household, (2) water for agricultural and industrial production, (3) water for flood and drought management, (4) water for quality issue, (5) water from forest conservation and soil erosion protection, (6) water resources management. However due to the climate change impact, there is a question for all strategies is whether to complete this mission under future climate change. If the impact affects our target, we have to clarify how to mitigate or to adapt with it. Vulnerability assessment was conducted under the framework of ADB's (with the parameters of exposure, sensitivity and adaptive capacity) and the assessments were classified into groups due to their different characteristic and the framework of the National Water Management Strategy, i.e., water supply (rural and urban), water for development (agriculture and others), water disasters (floods (flash, overflow), drought, water quality). The assessments identified the parameters concerned and weight factors used for each groups via expert group discussions and by using GIS mapping technology, the vulnerability maps were produced. The maps were verified with present water situation data (floods, drought, water quality). From the analysis result of this water resources management strategy, we found that 30% of all projects face the big impacts, 40% with low impact, and 30% for no impact. It is clear that water-related agencies have to carefully take care approximately 70% of future projects to meet water resources management strategy. It is recommended that additional issues should be addressed to mitigate the impact from climate risk on water resource management of the country, i.e., water resources management under new risk based on development scenarios, relationship with area-based problems, priority definition by viewpoints of risk, vulnerability (impact and occurrence probability in past and future), water management system in emergency case and water reserve system, use of information, knowledge and technology in management, network cooperation and exchange of experiences, knowledge, technique for sustainable development with mitigation and adaptation, education and communication systems in risk, new impact, and emergency-reserve system. These issues will be described and discussed.

  • PDF

Developing a Classification of Vulnerabilities for Smart Factory in SMEs: Focused on Industrial Control Systems (중소기업용 스마트팩토리 보안 취약점 분류체계 개발: 산업제어시스템 중심으로)

  • Jeong, Jae-Hoon;Kim, Tae-Sung
    • Journal of Information Technology Services
    • /
    • v.21 no.5
    • /
    • pp.65-79
    • /
    • 2022
  • The smart factory has spread to small and mid-size enterprises (SMEs) under the leadership of the government. Smart factory consists of a work area, an operation management area, and an industrial control system (ICS) area. However, each site is combined with the IT system for reasons such as the convenience of work. As a result, various breaches could occur due to the weakness of the IT system. This study seeks to discover the items and vulnerabilities that SMEs who have difficulties in information security due to technology limitations, human resources, and budget should first diagnose and check. First, to compare the existing domestic and foreign smart factory vulnerability classification systems and improve the current classification system, the latest smart factory vulnerability information is collected from NVD, CISA, and OWASP. Then, significant keywords are extracted from pre-processing, co-occurrence network analysis is performed, and the relationship between each keyword and vulnerability is discovered. Finally, the improvement points of the classification system are derived by mapping it to the existing classification system. Therefore, configuration and maintenance, communication and network, and software development were the items to be diagnosed and checked first, and vulnerabilities were denial of service (DoS), lack of integrity checking for communications, inadequate authentication, privileges, and access control in software in descending order of importance.

A GIS-Based Seismic Vulnerability Mapping and Assessment Using AHP: A Case Study of Gyeongju, Korea (GIS 기반 AHP를 이용한 지진 취약성 지도제작 및 평가: 경주시를 중심으로)

  • Han, Jihye;Kim, Jinsoo
    • Korean Journal of Remote Sensing
    • /
    • v.35 no.2
    • /
    • pp.217-228
    • /
    • 2019
  • In this study, a seismic vulnerability map of Gyeongju city, where the 9.12 Gyeongju earthquake occurred, was produced and evaluated using analytic hierarchy process(AHP) and geographic information system (GIS). Geotechnical, physical, social, structural, and capacity factors were selected as the main indicators and 18 sub-indicators to construct a spatial database. Weights derived using the AHP were applied to the 18 sub-indicators, which generated a vulnerability map of the five main indicators. After weighting the five generated maps, we created seismic vulnerability maps by overlaying each of the five maps. The seismic vulnerability map was classified into five zones, i.e., very high, high, moderate, low, and safe. For seismic vulnerability, the results indicated that 3% of Gyeongju area is characterized as having very high vulnerability, while 19% was characterized as safe. Based on district standards, Jungbu-dong, Hwangoh-dong, Hwangseong-dong, Seonggeon-dong, and Dongcheon-dong were high-risk areas, and Bodeok-dong, Gangdong-myeon, Yangbuk-myeon, Yangnam-myeon, and Oedong-eup were characterized as safe areas. The seismic vulnerability map produced in this study could possibly be used to minimize damage caused by earthquakes and could be used as a reference when establishing policies.

Vulnerability Analysis on Fire Service Zone using Map Overlay Method in GIS (GIS 기반 중첩기법을 이용한 소방서비스 취약지역 분석)

  • Lee, Seul-Ji;Lee, Ji-Yeong
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.29 no.1
    • /
    • pp.91-100
    • /
    • 2011
  • Fire stations should be located in optimal location to act quickly in case of emergency and minimize damages as a public facility that protects life and property of local residents. Siting fire stations without regard for the accessibility and occurrence factors of an accident may provide fire service unequally. Therefore service analysis is necessary to reduce the blind spot of disaster and safety and to offer equal fire-service at this time. Especially fire stations can service more efficiently than before by reducing a more likely vulnerable area. This study suggests methods of mapping index of value that represents vulnerability of the occurrence of an accident and extracting service zone map of fire stations, as an initial research for offering efficient fire service. Geographical distribution mismatch between service zone map and vulnerability map is figured out and vulnerable area for fire service is defined by using map overlay method.

Protection Motivation Theory and Environmental Health Behaviors: A Systematic Mapping

  • Kim, Hyun Kyoung
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.164-173
    • /
    • 2022
  • This study aimed to explore the themes and parameters of environmental health behaviors based on Rogers' protection motivation theory through a systematic mapping review. Using a systematic approach, a literature review was conducted of articles that adopted Rogers' protection motivation theory. A total of 11 articles on protection motivation theory using participants and environmental health as outcomes were identified in a search of CINAHL, Cochrane Library, EMBASE, Eric, PsycARTICLES, PubMed, and RISS between September 1 and September 8, 2021. Themes related to the environment and personal behaviors between 2002 and 2021 were extracted. The parameters based on protection motivation theory were identified through systematic mapping as fear appraisal, rewards of maladaptive response, severity, vulnerability, costs of adaptive response, response efficacy, self-efficacy, and intention. Self-efficacy and response efficacy considerably affected environmental health behaviors. Emotional fear appeal related to environmental hazards motivates an internal process that alters the threat appraisal and their coping appraisal. Environmental behavior perception and intention influenced on environmental health behaviors with small effect sizes. Therefore, a deeper understanding of the severity of environmental health issues could lead to the development of helpful, effective, and intensive interventions to promote healthcare among the vulnerable population.

Assessment of Flood Vulnerability to Climate Change Using Fuzzy Model and GIS in Seoul (퍼지모형과 GIS를 활용한 기후변화 홍수취약성 평가 - 서울시 사례를 중심으로 -)

  • Kang, Jung-Eun;Lee, Moung-Jin
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.15 no.3
    • /
    • pp.119-136
    • /
    • 2012
  • The goal of this study is to apply the IPCC(Intergovernmental Panel on Climate Change) concept of vulnerability to climate change and verify the use of a combination of vulnerability index and fuzzy logic to flood vulnerability analysis and mapping in Seoul using GIS. In order to achieve this goal, this study identified indicators influencing floods based on literature review. We include indicators of exposure to climate(daily max rainfall, days of 80mm over), sensitivity(slope, geological, average DEM, impermeability layer, topography and drainage), and adaptive capacity(retarding basin and green-infra). Also, this research used fuzzy model for aggregating indicators, and utilized frequency ratio to decide fuzzy membership values. Results show that the number of days of precipitation above 80mm, the distance from river and impervious surface have comparatively strong influence on flood damage. Furthermore, when precipitation is over 269mm, areas with scare flood mitigation capacities, industrial land use, elevation of 16~20m, within 50m distance from rivers are quite vulnerable to floods. Yeongdeungpo-gu, Yongsan-gu, Mapo-gu include comparatively large vulnerable areas. This study improved previous flood vulnerability assessment methodology by adopting fuzzy model. Also, vulnerability map provides meaningful information for decision makers regarding priority areas for implementing flood mitigation policies.

Seismic Vulnerability Assessment and Mapping for 9.12 Gyeongju Earthquake Based on Machine Learning (기계학습을 이용한 지진 취약성 평가 및 매핑: 9.12 경주지진을 대상으로)

  • Han, Jihye;Kim, Jinsoo
    • Korean Journal of Remote Sensing
    • /
    • v.36 no.6_1
    • /
    • pp.1367-1377
    • /
    • 2020
  • The purpose of this study is to assess the seismic vulnerability of buildings in Gyeongju city starting with the earthquake that occurred in the city on September 12, 2016, and produce a seismic vulnerability map. 11 influence factors related to geotechnical, physical, and structural indicators were selected to assess the seismic vulnerability, and these were applied as independent variables. For a dependent variable, location data of the buildings that were actually damaged in the 9.12 Gyeongju Earthquake was used. The assessment model was constructed based on random forest (RF) as a mechanic study method and support vector machine (SVM), and the training and test dataset were randomly selected with a ratio of 70:30. For accuracy verification, the receiver operating characteristic (ROC) curve was used to select an optimum model, and the accuracy of each model appeared to be 1.000 for RF and 0.998 for SVM, respectively. In addition, the prediction accuracy was shown as 0.947 and 0.926 for RF and SVM, respectively. The prediction values of the entire buildings in Gyeongju were derived on the basis of the RF model, and these were graded and used to produce the seismic vulnerability map. As a result of reviewing the distribution of building classes as an administrative unit, Hwangnam, Wolseong, Seondo, and Naenam turned out to be highly vulnerable regions, and Yangbuk, Gangdong, Yangnam, and Gampo turned out to be relatively safer regions.

Reversible Sub-Feature Retrieval: Toward Robust Coverless Image Steganography for Geometric Attacks Resistance

  • Liu, Qiang;Xiang, Xuyu;Qin, Jiaohua;Tan, Yun;Zhang, Qin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.3
    • /
    • pp.1078-1099
    • /
    • 2021
  • Traditional image steganography hides secret information by embedding, which inevitably leaves modification traces and is easy to be detected by steganography analysis tools. Since coverless steganography can effectively resist steganalysis, it has become a hotspot in information hiding research recently. Most coverless image steganography (CIS) methods are based on mapping rules, which not only exposes the vulnerability to geometric attacks, but also are less secure due to the revelation of mapping rules. To address the above issues, we introduced camouflage images for steganography instead of directly sending stego-image, which further improves the security performance and information hiding ability of steganography scheme. In particular, based on the different sub-features of stego-image and potential camouflage images, we try to find a larger similarity between them so as to achieve the reversible steganography. Specifically, based on the existing CIS mapping algorithm, we first can establish the correlation between stego-image and secret information and then transmit the camouflage images, which are obtained by reversible sub-feature retrieval algorithm. The received camouflage image can be used to reverse retrieve the stego-image in a public image database. Finally, we can use the same mapping rules to restore secret information. Extensive experimental results demonstrate the better robustness and security of the proposed approach in comparison to state-of-art CIS methods, especially in the robustness of geometric attacks.