Search results for: ecological vulnerability
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1943

Search results for: ecological vulnerability

1793 Analysis of Ecological Footprint of Residents for Urban Spatial Restructuring

Authors: Taehyun Kim, Hyunjoo Park, Taehyun Kim

Abstract:

Since the rapid economic development, Korea has recently entered a period of low growth due to population decline and aging. Due to the urbanization around the metropolitan area and the hollowing of local cities, the ecological capacity of a city is decreasing while ecological footprints are increasing, requiring a compact space plan for maintaining urban functions. The purpose of this study is to analyze the relationship between urban spatial structure and residents' ecological footprints for sustainable spatial planning. To do this, we try to analyze the relationship between intra-urban spatial structure, such as net/gross density and service accessibility, and resident ecological footprints of food, housing, transportation, goods and services through survey and structural equation modeling. The results of the study will be useful in establishing an implementation plan for sustainable development goals (SDGs), especially for sustainable cities and communities (SDG 11) and responsible consumption and production (SDG 12) in the future.

Keywords: ecological footprint, structural equation modeling, survey, sustainability, urban spatial structure

Procedia PDF Downloads 265
1792 Turkey Disaster Risk Management System Project (TAFRISK)

Authors: Ahmet Parlak, Celalettin Bilgen

Abstract:

In order to create an effective early warning system, Identification of the risks, preparation and carrying out risk modeling of risk scenarios, taking into account the shortcomings of the old disaster scenarios should be used to improve the system. In the light of this, the importance of risk modeling in creating an effective early warning system is understood. In the scope of TAFRISK project risk modeling trend analysis report on risk modeling developed and a demonstration was conducted for Risk Modeling for flood and mass movements. For risk modeling R&D, studies have been conducted to determine the information, and source of the information, to be gathered, to develop algorithms and to adapt the current algorithms to Turkey’s conditions for determining the risk score in the high disaster risk areas. For each type of the disaster; Disaster Deficit Index (DDI), Local Disaster Index (LDI), Prevalent Vulnerability Index (PVI), Risk Management Index (RMI) have been developed as disaster indices taking danger, sensitivity, fragility, and vulnerability, the physical and economic damage into account in the appropriate scale of the respective type.

Keywords: disaster, hazard, risk modeling, sensor

Procedia PDF Downloads 428
1791 An enhanced Framework for Regional Tourism Sustainable Adaptation to Climate Change

Authors: Joseph M. Njoroge

Abstract:

The need for urgent adaptation have triggered tourism stakeholders and research community to develop generic adaptation framework(s) for national, regional and or local tourism desti-nations. Such frameworks have been proposed to guide the tourism industry in the adaptation process with an aim of reducing tourism industry’s vulnerability and to enhance their ability to cope to climate associated externalities. However research show that current approaches are far from sustainability since the adaptation options sought are usually closely associated with development needs-‘business as usual’-where the implication of adaptation to social justice and environmental integrity are often neglected. Based on this view there is a need to look at adaptation beyond addressing vulnerability and resilience to include the need for adaptation to enhance social justice and environmental integrity. This paper reviews the existing adaptation frameworks/models and evaluates their suitability in enhancing sustainable adaptation for regional tourist destinations. It is noted that existing frameworks contradicts the basic ‘principles of sustainable adaptation’. Further attempts are made to propose a Sustainable Regional Tourism Adaptation Framework (SRTAF) to assist regional tourism stakeholders in the achieving sustainable adaptation.

Keywords: sustainable adaptation, sustainability principles, sustainability portfolio, Regional Tourism

Procedia PDF Downloads 396
1790 The Vulnerability of Farmers in Valencia Negros Oriental to Climate Change: El Niño Phenomenon and Malnutrition

Authors: J. K. Pis-An

Abstract:

Objective: The purpose of the study was to examine the vulnerability of farmers to the effects of climate change, specifically the El Niño phenomenon was felt in the Philippines in 2009-2010. Methods: KAP Survey determines behavioral response to vulnerability to the effects of El Niño. Body Mass Index: Dietary Assessment using 24-hour food recall. Results: 75% of the respondents claimed that crop significantly decreased during drought. Indications that households of farmers are large where 51.6% are composed of 6-10 family members with 68% annual incomes below Php 100,00. Anthropometric assessment showed that the prevalence of Chronic Energy Deficiency Grade 1 among females 17% and 28.57% for low normal. While male body mass index result for chronic energy deficiency grade 1 10%, low normal 18.33% and and obese grade 1, 31.67%. Dietary assessment of macronutrient intake of carbohydrates, protein, and fat 31.6 % among respondents are below recommended amounts. Micronutrient deficiency of calcium, iron, vit. A, thiamine, riboflavin, niacin, and Vit. C. Conclusion: Majority of the rural populations are engaged into farming livelihood that makes up the backbone of their economic growth. Placing the current nutritional status of the farmers in the context of food security, there are reasons to believe that the status will go for worse if the extreme climatic conditions will once again prevail in the region. Farmers rely primarily on home grown crops for their food supply, a reduction in farm production during drought is expected to adversely affect dietary intake. The local government therefore institute programs to increase food resiliency and to prioritize health of the population as the moving force for productivity and development.

Keywords: world health organization, united nation framework convention on climate change, anthropometric, macronutrient, micronutrient

Procedia PDF Downloads 444
1789 A Study on Vulnerability of Alahsa Governorate to Generate Urban Heat Islands

Authors: Ilham S. M. Elsayed

Abstract:

The purpose of this study is to investigate Alahsa Governorate status and its vulnerability to generate urban heat islands. Alahsa Governorate is a famous oasis in the Arabic Peninsula including several oil centers. Extensive literature review was done to collect previous relative data on the urban heat island of Alahsa Governorate. Data used for the purpose of this research were collected from authorized bodies who control weather station networks over Alahsa Governorate, Eastern Province, Saudi Arabia. Although, the number of weather station networks within the region is very limited and the analysis using GIS software and its techniques is difficult and limited, the data analyzed confirm an increase in temperature for more than 2 °C from 2004 to 2014. Such increase is considerable whenever human health and comfort are the concern. The increase of temperature within one decade confirms the availability of urban heat islands. The study concludes that, Alahsa Governorate is vulnerable to create urban heat islands and more attention should be drawn to strategic planning of the governorate that is developing with a high pace and considerable increasing levels of urbanization.

Keywords: Alahsa Governorate, population density, Urban Heat Island, weather station

Procedia PDF Downloads 250
1788 The Development of a Cyber Violence Measurement Tool for Youths: A Multi-Reporting of Ecological Factors

Authors: Jong-Hyo Park, Eunyoung Choi, Jae-Yeon Lim, Seon-Suk Lee, Yeong-Rong Koo, Ji-Ung Kwon, Kyung-Sung Kim, Jong-Ik Lee, Juhan Park, Hyun-Kyu Lee, Won-Kyoung Oh, Jisang Lee, Jiwon Choe

Abstract:

Due to COVID-19, cyber violence among youths has soared as they spend more time online than before. In contrast to the deepening concerns, measurement tools that can assess the vulnerability of cyber violence in individual youths still need to be supplemented. The measurement tools lack consideration of various factors related to cyber violence among youths. Most of the tools are self-report questionnaires, and these adolescents' self-report questionnaire forms can underestimate the harmful behavior and overestimate the damage experience. Therefore, this study aims to develop a multi-report measurement tool for youths that can reliably measure individuals' ecological factors related to cyber violence. The literature review explored factors related to cyber violence, and the questions were constructed. The face validity of the questions was confirmed by conducting focus group interviews. Exploratory and confirmatory factor analyses (N=671) were also conducted for statistical validation. This study developed a multi-report measurement tool for cyber violence with 161 questions, consisting of six domains: online behavior, cyber violence awareness, victimization-perpetration-witness experience, coping efficacy (individuals, peers, teachers, and parents), psychological characteristics, and pro-social capabilities. In addition to self-report from a youth respondent, this measurement tool includes peers, teachers, and parents reporting for the respondent. It is possible to reliably measure the ecological factors of individual youths who are vulnerable or highly resistant to cyber violence. In schools, teachers could refer to the measurement results for guiding students, better understanding their cyber violence conditions, and assessing their pro-social capabilities. With the measurement results, teachers and police officers could detect perpetrators or victims and intervene immediately. In addition, this measurement tool could analyze the effects of the prevention and intervention programs for cyber violence and draw appropriate suggestions.

Keywords: adolescents, cyber violence, cyber violence measurement tool, measurement tool, multi-report measurement tool, youths

Procedia PDF Downloads 101
1787 Exploiting SLMail Server with a Developed Buffer Overflow with Kali Linux

Authors: Senesh Wijayarathne

Abstract:

This study focuses on how someone could develop a Buffer Overflow and could use that to exploit the SLMail Server. This study uses a Kali Linux V2018.4 Virtual Machine and Windows 7 - Internet Explorer V8 Virtual Machine (IPv4 Address - 192.168.56.107). This study starts by sending continued bytes to the SLMail Server to find the crashing point range and creating a unique pattern of the length of the crashing point range to control the Extended Instruction Pointer (EIP). Then by sending all characters to SLMail Server, we could observe and find which characters are not rendered properly by the software, also known as Bad Characters. By finding the ‘Jump to the ESP register (JMP ESP) and with the help of ‘Mona Modules’, we could use msfvenom to create a non-stage windows reverse shell payload. By including all the details gathered previously on one script, we could get a system-level reverse shell of the Windows 7 PC. The end of this paper will discuss how to mitigate this vulnerability.

Keywords: slmail server, extended instruction pointer, jump to the esp register, bad characters, virtual machine, windows 7, kali Linux, buffer overflow, Seattle lab, vulnerability

Procedia PDF Downloads 166
1786 A Comparative Study between Japan and the European Union on Software Vulnerability Public Policies

Authors: Stefano Fantin

Abstract:

The present analysis outcomes from the research undertaken in the course of the European-funded project EUNITY, which targets the gaps in research and development on cybersecurity and privacy between Europe and Japan. Under these auspices, the research presents a study on the policy approach of Japan, the EU and a number of Member States of the Union with regard to the handling and discovery of software vulnerabilities, with the aim of identifying methodological differences and similarities. This research builds upon a functional comparative analysis of both public policies and legal instruments from the identified jurisdictions. The result of this analysis is based on semi-structured interviews with EUNITY partners, as well as by the participation of the researcher to a recent report from the Center for EU Policy Study on software vulnerability. The European Union presents a rather fragmented legal framework on software vulnerabilities. The presence of a number of different legislations at the EU level (including Network and Information Security Directive, Critical Infrastructure Directive, Directive on the Attacks at Information Systems and the Proposal for a Cybersecurity Act) with no clear focus on such a subject makes it difficult for both national governments and end-users (software owners, researchers and private citizens) to gain a clear understanding of the Union’s approach. Additionally, the current data protection reform package (general data protection regulation), seems to create legal uncertainty around security research. To date, at the member states level, a few efforts towards transparent practices have been made, namely by the Netherlands, France, and Latvia. This research will explain what policy approach such countries have taken. Japan has started implementing a coordinated vulnerability disclosure policy in 2004. To date, two amendments can be registered on the framework (2014 and 2017). The framework is furthermore complemented by a series of instruments allowing researchers to disclose responsibly any new discovery. However, the policy has started to lose its efficiency due to a significant increase in reports made to the authority in charge. To conclude, the research conducted reveals two asymmetric policy approaches, time-wise and content-wise. The analysis therein will, therefore, conclude with a series of policy recommendations based on the lessons learned from both regions, towards a common approach to the security of European and Japanese markets, industries and citizens.

Keywords: cybersecurity, vulnerability, European Union, Japan

Procedia PDF Downloads 156
1785 Participatory Cartography for Disaster Reduction in Pogreso, Yucatan Mexico

Authors: Gustavo Cruz-Bello

Abstract:

Progreso is a coastal community in Yucatan, Mexico, highly exposed to floods produced by severe storms and tropical cyclones. A participatory cartography approach was conducted to help to reduce floods disasters and assess social vulnerability within the community. The first step was to engage local authorities in risk management to facilitate the process. Two workshop were conducted, in the first, a poster size printed high spatial resolution satellite image of the town was used to gather information from the participants: eight women and seven men, among them construction workers, students, government employees and fishermen, their ages ranged between 23 and 58 years old. For the first task, participants were asked to locate emblematic places and place them in the image to familiarize with it. Then, they were asked to locate areas that get flooded, the buildings that they use as refuges, and to list actions that they usually take to reduce vulnerability, as well as to collectively come up with others that might reduce disasters. The spatial information generated at the workshops was digitized and integrated into a GIS environment. A printed version of the map was reviewed by local risk management experts, who validated feasibility of proposed actions. For the second workshop, we retrieved the information back to the community for feedback. Additionally a survey was applied in one household per block in the community to obtain socioeconomic, prevention and adaptation data. The information generated from the workshops was contrasted, through T and Chi Squared tests, with the survey data in order to probe the hypothesis that poorer or less educated people, are less prepared to face floods (more vulnerable) and live near or among higher presence of floods. Results showed that a great majority of people in the community are aware of the hazard and are prepared to face it. However, there was not a consistent relationship between regularly flooded areas with people’s average years of education, house services, or house modifications against heavy rains to be prepared to hazards. We could say that the participatory cartography intervention made participants aware of their vulnerability and made them collectively reflect about actions that can reduce disasters produced by floods. They also considered that the final map could be used as a communication and negotiation instrument with NGO and government authorities. It was not found that poorer and less educated people are located in areas with higher presence of floods.

Keywords: climate change, floods, Mexico, participatory mapping, social vulnerability

Procedia PDF Downloads 113
1784 Enhancing Seismic Resilience in Urban Environments

Authors: Beatriz González-rodrigo, Diego Hidalgo-leiva, Omar Flores, Claudia Germoso, Maribel Jiménez-martínez, Laura Navas-sánchez, Belén Orta, Nicola Tarque, Orlando Hernández- Rubio, Miguel Marchamalo, Juan Gregorio Rejas, Belén Benito-oterino

Abstract:

Cities facing seismic hazard necessitate detailed risk assessments for effective urban planning and vulnerability identification, ensuring the safety and sustainability of urban infrastructure. Comprehensive studies involving seismic hazard, vulnerability, and exposure evaluations are pivotal for estimating potential losses and guiding proactive measures against seismic events. However, broad-scale traditional risk studies limit consideration of specific local threats and identify vulnerable housing within a structural typology. Achieving precise results at neighbourhood levels demands higher resolution seismic hazard exposure, and vulnerability studies. This research aims to bolster sustainability and safety against seismic disasters in three Central American and Caribbean capitals. It integrates geospatial techniques and artificial intelligence into seismic risk studies, proposing cost-effective methods for exposure data collection and damage prediction. The methodology relies on prior seismic threat studies in pilot zones, utilizing existing exposure and vulnerability data in the region. Emphasizing detailed building attributes enables the consideration of behaviour modifiers affecting seismic response. The approach aims to generate detailed risk scenarios, facilitating prioritization of preventive actions pre-, during, and post-seismic events, enhancing decision-making certainty. Detailed risk scenarios necessitate substantial investment in fieldwork, training, research, and methodology development. Regional cooperation becomes crucial given similar seismic threats, urban planning, and construction systems among involved countries. The outcomes hold significance for emergency planning and national and regional construction regulations. The success of this methodology depends on cooperation, investment, and innovative approaches, offering insights and lessons applicable to regions facing moderate seismic threats with vulnerable constructions. Thus, this framework aims to fortify resilience in seismic-prone areas and serves as a reference for global urban planning and disaster management strategies. In conclusion, this research proposes a comprehensive framework for seismic risk assessment in high-risk urban areas, emphasizing detailed studies at finer resolutions for precise vulnerability evaluations. The approach integrates regional cooperation, geospatial technologies, and adaptive fragility curve adjustments to enhance risk assessment accuracy, guiding effective mitigation strategies and emergency management plans.

Keywords: assessment, behaviour modifiers, emergency management, mitigation strategies, resilience, vulnerability

Procedia PDF Downloads 68
1783 Measurement of Susceptibility Users Using Email Phishing Attack

Authors: Cindy Sahera, Sarwono Sutikno

Abstract:

Rapid technological developments also have negative impacts, namely the increasing criminal cases based on technology or cybercrime. One technique that can be used to conduct cybercrime attacks are phishing email. The issue is whether the user is aware that email can be misused by others so that it can harm the user's own? This research was conducted to measure the susceptibility of selected targets against email abuse. The objectives of this research are measurement of targets’ susceptibility and find vulnerability in email recipient. There are three steps being taken in this research, (1) the information gathering phase, (2) the design phase, and (3) the execution phase. The first step includes the collection of the information necessary to carry out an attack on a target. The next step is to make the design of an attack against a target. The last step is to send phishing emails to the target. The levels of susceptibility are three: level 1, level 2 and level 3. Level 1 indicates a low level of targets’ susceptibility, level 2 indicates the intermediate level of targets’ susceptibility, and level 3 indicates a high level of targets’ susceptibility. The results showed that users who are on level 1 and level 2 more that level 3, which means the user is not too careless. However, it does not mean the user to be safe. There are still vulnerabilities that may occur, such as automatic location detection when opening emails and automatic downloaded malware as user clicks a link in the email.

Keywords: cybercrime, email phishing, susceptibility, vulnerability

Procedia PDF Downloads 289
1782 The Value of Traditional Ecological Knowledge in a Globalised World: A Case Study from the Peruvian Amazon

Authors: Anna Juliet Stephens

Abstract:

This research emphasises the importance of incorporating traditional ecological knowledge into Peru’s development plans, as a way to manage some of the more adverse impacts of globalisation which continue to impinge on one of the world’s most biodiverse regions. In doing so, it argues for a development strategy to be implemented in the Peruvian Amazon which prioritises local and indigenous rights, needs and perspectives.

Keywords: traditional ecological knowledge, peruvian amazon, globalisation, indigenous, development

Procedia PDF Downloads 143
1781 A GIS Based Approach in District Peshawar, Pakistan for Groundwater Vulnerability Assessment Using DRASTIC Model

Authors: Syed Adnan, Javed Iqbal

Abstract:

In urban and rural areas groundwater is the most economic natural source of drinking. Groundwater resources of Pakistan are degraded due to high population growth and increased industrial development. A study was conducted in district Peshawar to assess groundwater vulnerable zones using GIS based DRASTIC model. Six input parameters (groundwater depth, groundwater recharge, aquifer material, soil type, slope and hydraulic conductivity) were used in the DRASTIC model to generate the groundwater vulnerable zones. Each parameter was divided into different ranges or media types and a subjective rating from 1-10 was assigned to each factor where 1 represented very low impact on pollution potential and 10 represented very high impact. Weight multiplier from 1-5 was used to balance and enhance the importance of each factor. The DRASTIC model scores obtained varied from 47 to 147. Using quantile classification scheme these values were reclassified into three zones i.e. low, moderate and high vulnerable zones. The areas of these zones were calculated. The final result indicated that about 400 km2, 506 km2, and 375 km2 were classified as low, moderate, and high vulnerable areas, respectively. It is recommended that the most vulnerable zones should be treated on first priority to facilitate the inhabitants for drinking purposes.

Keywords: DRASTIC model, groundwater vulnerability, GIS in groundwater, drinking sources

Procedia PDF Downloads 451
1780 Environmental Efficacy on Heracleum persicum Essential Oils

Authors: Rahele Hasani, Iraj Mehregan, Kambiz Larijani, Taher Nejadsattari, Romain Scalone

Abstract:

Essential oils of Heracleum persicum (Apiaceae) have been widely used from many years ago, but the difference of its properties among different populations have not been identified up to now. Hydrodistilation Clevenger type was used to obtaining the fruit essential oils of four populations of H. persicum from different localities in Iran, then they were characterized by GC-FID and GC-MS analyses. Some ecological factors were also measured. The oils of four populations were compared to determine the similarities and differences and the relationships between these factors and ecological factors. Based on the result, 18-32 different components were identified in four populations, while the percentage of the main components was higher in population with lower number of components. According to the statistical analyses of chemical components and ecological factors, it can be concluded that some ecological factors such as altitude, less humidity, high difference between day and night temperature and salty soil would lead to lower number of components in essential oil, whereas they consist the higher percentage.

Keywords: Chemotaxonomy, Persian hogweed, Ecological factors, Apiaceae.

Procedia PDF Downloads 430
1779 Critical Evaluation of Groundwater Monitoring Networks for Machine Learning Applications

Authors: Pedro Martinez-Santos, Víctor Gómez-Escalonilla, Silvia Díaz-Alcaide, Esperanza Montero, Miguel Martín-Loeches

Abstract:

Groundwater monitoring networks are critical in evaluating the vulnerability of groundwater resources to depletion and contamination, both in space and time. Groundwater monitoring networks typically grow over decades, often in organic fashion, with relatively little overall planning. The groundwater monitoring networks in the Madrid area, Spain, were reviewed for the purpose of identifying gaps and opportunities for improvement. Spatial analysis reveals the presence of various monitoring networks belonging to different institutions, with several hundred observation wells in an area of approximately 4000 km2. This represents several thousand individual data entries, some going back to the early 1970s. Major issues included overlap between the networks, unknown screen depth/vertical distribution for many observation boreholes, uneven time series, uneven monitored species, and potentially suboptimal locations. Results also reveal there is sufficient information to carry out a spatial and temporal analysis of groundwater vulnerability based on machine learning applications. These can contribute to improve the overall planning of monitoring networks’ expansion into the future.

Keywords: groundwater monitoring, observation networks, machine learning, madrid

Procedia PDF Downloads 78
1778 Potential Ecological Risk Index of the Northern Egyptian Lagoons, South of Mediterranean Sea, Egypt

Authors: Mohamed El-Bady

Abstract:

The Northern Egyptian Lagoons are (from east to west) Bardawil Lagoon, Manzala Lagoon, Burullus Lagoon, Edku Lagoons and Mariute Lagoon. These lagoons have been received the bulk of drainage water from the lands of Delta and from the other coastal areas. Where, the heavy metals can occur in Lagoons environments through a variety of sources, including industries, wastewaters and domestic effluents. The potential ecological risk index (RI) calculation of the bottom sediments of the northern lagoons depends on contamination factor (CF), potential ecological risk factor and proposed toxic response factor (Tr). Each lagoon with special indices according to its conditions.

Keywords: Northern Lagoons, Nile Delta, ecological risk index, contamination factor

Procedia PDF Downloads 342
1777 Malaria and Environmental Sanitation

Authors: Soorya Vennila

Abstract:

A comprehensive study of malaria in 165 villages (hamlets) in Harur block, Dharmapuri district, has revealed the fact that there are distinct episodes of malaria due to An. culicifacies, the vector, causes persistent transmission in the revenue village called Vedakatamaduvu. A total of 300 household adult samples are randomly selected to study both quantitatively and qualitatively the vulnerability of malaria. On the basis of the response, the problem uncommon with groups was identified as the outdoor routine, particularly open defecation, with which the samples needed to be stratified into two major groups; users of toilets 21 and those who practice open defecation 279. Open defecation, as the habit-based vulnerability, is measured with the Pearson correlation coefficient to estimate the relationship between malaria and open defecation. It is also verified from the literature that plant fluids provide mosquitoes not only with energy but also with nutrition, to the extent that they can develop fertile eggs. In the endemic areas, the bushy Presopis Juliflora, which naturally serves as a feeding and resting spot for mosquitoes, serves as a cover to practice open defecation as well. Eventually, those who get resort to Presopis for open defecation have a higher chance of getting exposed to mosquito bites and being infected with malaria. The study concludes that the combination of bushy Prosopis Juliflora and open defecation leaves the place perpetually vulnerable to malaria.

Keywords: Malaria, open defecation, endemic, presopis juliflora

Procedia PDF Downloads 100
1776 Adaptive Architecture: Reformulation of Socio-Ecological Systems

Authors: Pegah Zamani

Abstract:

This multidisciplinary study interrogates the reformulation of socio-ecological systems by bringing different disciplines together and incorporating ecological, social, and technological components to the sustainable design. The study seeks for a holistic sustainable system to understand the multidimensional impact of the evolving innovative technologies on responding to the variable socio-environmental conditions. Through a range of cases, from the vernacular built spaces to the sophisticated optimized systems, the research unfolds how far the environmental elements would impact the performance of a sustainable building, its micro-climatic ecological requirements, and its human inhabitation. As a product of the advancing technologies, an optimized and environmentally responsive building offers new identification, and realization of the built space through reformulating the connection to its internal and external environments (such as solar, thermal, and airflow), as well as its dwellers. The study inquires properties of optimized buildings, by bringing into the equation not only the environmental but also the socio-cultural, morphological, and phenomenal factors. Thus, the research underlines optimized built space as a product and practice which would not be meaningful without addressing and dynamically adjusting to the diversity and complexity of socio-ecological systems.

Keywords: ecology, morphology, socio-ecological systems, sustainability

Procedia PDF Downloads 204
1775 A Model of Human Security: A Comparison of Vulnerabilities and Timespace

Authors: Anders Troedsson

Abstract:

For us humans, risks are intimately linked to human vulnerabilities - where there is vulnerability, there is potentially insecurity, and risk. Reducing vulnerability through compensatory measures means increasing security and decreasing risk. The paper suggests that a meaningful way to approach the study of risks (including threats, assaults, crisis etc.), is to understand the vulnerabilities these external phenomena evoke in humans. As is argued, the basis of risk evaluation, as well as responses, is the more or less subjective perception by the individual person, or a group of persons, exposed to the external event or phenomena in question. This will be determined primarily by the vulnerability or vulnerabilities that the external factor are perceived to evoke. In this way, risk perception is primarily an inward dynamic, rather than an outward one. Therefore, a route towards an understanding of the perception of risks, is a closer scrutiny of the vulnerabilities which they can evoke, thereby approaching an understanding of what in the paper is called the essence of risk (including threat, assault etc.), or that which a certain perceived risk means to an individual or group of individuals. As a necessary basis for gauging the wide spectrum of potential risks and their meaning, the paper proposes a model of human vulnerabilities, drawing from i.a. a long tradition of needs theory. In order to account for the subjectivity factor, which mediates between the innate vulnerabilities on the one hand, and the event or phenomenon out there on the other hand, an ensuing ontological discussion about the timespace characteristics of risk/threat/assault as perceived by humans leads to the positing of two dimensions. These two dimensions are applied on the vulnerabilities, resulting in a modelling effort featuring four realms of vulnerabilities which are related to each other and together represent a dynamic whole. In approaching the problem of risk perception, the paper thus defines the relevant realms of vulnerabilities, depicting them as a dynamic whole. With reference to a substantial body of literature and a growing international policy trend since the 1990s, this model is put in the language of human security - a concept relevant not only for international security studies and policy, but also for other academic disciplines and spheres of human endeavor.

Keywords: human security, timespace, vulnerabilities, risk perception

Procedia PDF Downloads 336
1774 Heat Vulnerability Index (HVI) Mapping in Extreme Heat Days Coupled with Air Pollution Using Principal Component Analysis (PCA) Technique: A Case Study of Amiens, France

Authors: Aiman Mazhar Qureshi, Ahmed Rachid

Abstract:

Extreme heat events are emerging human environmental health concerns in dense urban areas due to anthropogenic activities. High spatial and temporal resolution heat maps are important for urban heat adaptation and mitigation, helping to indicate hotspots that are required for the attention of city planners. The Heat Vulnerability Index (HVI) is the important approach used by decision-makers and urban planners to identify heat-vulnerable communities and areas that require heat stress mitigation strategies. Amiens is a medium-sized French city, where the average temperature has been increasing since the year 2000 by +1°C. Extreme heat events are recorded in the month of July for the last three consecutive years, 2018, 2019 and 2020. Poor air quality, especially ground-level ozone, has been observed mainly during the same hot period. In this study, we evaluated the HVI in Amiens during extreme heat days recorded last three years (2018,2019,2020). The Principal Component Analysis (PCA) technique is used for fine-scale vulnerability mapping. The main data we considered for this study to develop the HVI model are (a) socio-economic and demographic data; (b) Air pollution; (c) Land use and cover; (d) Elderly heat-illness; (e) socially vulnerable; (f) Remote sensing data (Land surface temperature (LST), mean elevation, NDVI and NDWI). The output maps identified the hot zones through comprehensive GIS analysis. The resultant map shows that high HVI exists in three typical areas: (1) where the population density is quite high and the vegetation cover is small (2) the artificial surfaces (built-in areas) (3) industrial zones that release thermal energy and ground-level ozone while those with low HVI are located in natural landscapes such as rivers and grasslands. The study also illustrates the system theory with a causal diagram after data analysis where anthropogenic activities and air pollution appear in correspondence with extreme heat events in the city. Our suggested index can be a useful tool to guide urban planners and municipalities, decision-makers and public health professionals in targeting areas at high risk of extreme heat and air pollution for future interventions adaptation and mitigation measures.

Keywords: heat vulnerability index, heat mapping, heat health-illness, remote sensing, urban heat mitigation

Procedia PDF Downloads 148
1773 Exploring the Determinants of Personal Finance Difficulties by Machine Learning: Focus on Socio-Economic and Behavioural Changes Brought by COVID-19

Authors: Brian Tung, Yam Wing Siu, Tsun Se Cheong

Abstract:

Purpose: This research aims to explore how personal and environmental factors, especially the socio-economic changes and behavioral changes fostered by the COVID-19 outbreak pandemic, affect the financial vulnerability of a specific segment of people in financial distress. Innovative research methodology of machine learning will be applied to data collected from over 300 local individuals in Hong Kong seeking counseling or similar services in recent years. Results: First, machine learning has found that too much exposure to digital services and information on digitized services may lead to adverse effects on respondents’ financial vulnerability. Second, the improvement in financial literacy level provides benefits to the financially vulnerable group, especially those respondents who have started with a lower level. Third, serious addiction to digital technology can lead to worsened debt servicing ability. Machine learning also has found a strong correlation between debt servicing situations and income-seeking behavior as well as spending behavior. In addition, if the vulnerable groups are able to make appropriate investments, they can reduce the probability of incurring financial distress. Finally, being too active in borrowing and repayment can result in a higher likelihood of over-indebtedness. Conclusion: Findings can be employed in formulating a better counseling strategy for professionals. Debt counseling services can be more preventive in nature. For example, according to the findings, with a low level of financial literacy, the respondents are prone to overspending and unable to react properly to the e-marketing promotion messages pop-up from digital services or even falling into financial/investment scams. In addition, people with low levels of financial knowledge will benefit from financial education. Therefore, financial education programs could include tech-savvy matters as special features.

Keywords: personal finance, digitization of the economy, COVID-19 pandemic, addiction to digital technology, financial vulnerability

Procedia PDF Downloads 58
1772 Coping with Climate Change in Agriculture: Perception of Farmers in Oman

Authors: B. S. Choudri

Abstract:

Introduction: Climate change is a major threat to rural livelihoods and to food security in the developing world, including Oman. The aim of this study is to provide a basis for policymakers and researchers in order to understand the impacts of climate change on agriculture and developing adaptation strategies in Oman. Methodology: The data was collected from different agricultural areas across the country with the help of a questionnaire survey among farmers, discussion with community, and observations at the field level. Results: The analysis of data collected from different areas within the country shows a shift in the sowing period of major crops and increased temperatures over recent years. Farmer community is adopting through diversification of crops, use of heat-tolerant species, and improved measures of soil and water conservation. Agriculture has been the main livelihood for most of the farmer communities in rural areas in the country. Conclusions: In order to reduce the effects of climate change at the local and farmer communities, risk reduction would be important along with an in-depth analysis of the vulnerability. Therefore, capacity building of local farmers and providing them with scientific knowledge, mainstreaming adaptation into development activities would be essential with additional funding and subsidies.

Keywords: agriculture, climate change, vulnerability, adaptation

Procedia PDF Downloads 123
1771 Predicting the Lack of GDP Growth: A Logit Model for 40 Advanced and Developing Countries

Authors: Hamidou Diallo, Marianne Guille

Abstract:

This paper identifies leading triggers of deficient episodes in terms of GDP growth based on a sample of countries at different stages of development over 1994-2017. Using logit models, we build early warning systems (EWS), and our results show important differences between developing countries (DCs) and advanced economies (AEs). For AEs, the main predictors of the probability of entering in a GDP growth deficient episode are the deterioration of external imbalances and the vulnerability of fiscal position while DCs face different challenges that need to be considered. The key indicators for them are first, the low ability to pay their debts, and second, their belonging or not to a common currency area. We also build homogeneous pools of countries inside AEs and DCs. The evolution of the proportion of AE countries in the riskiest pool is marked first, by three distinct peaks just after the high-tech bubble burst, the global financial crisis, and the European sovereign debt crisis, and second by a very low minimum level in 2006 and 2007. In contrast, the situation of DCs is characterized first by the relative stability of this proportion and then by an upward trend from 2006, that can be explained by a more unfavorable socio-political environment leading to shortcomings in the fiscal consolidation.

Keywords: currency area, early warning system, external imbalances, fiscal vulnerability, GDP growth, public debt

Procedia PDF Downloads 126
1770 Identifying the Structural Components of Old Buildings from Floor Plans

Authors: Shi-Yu Xu

Abstract:

The top three risk factors that have contributed to building collapses during past earthquake events in Taiwan are: "irregular floor plans or elevations," "insufficient columns in single-bay buildings," and the "weak-story problem." Fortunately, these unsound structural characteristics can be directly identified from the floor plans. However, due to the vast number of old buildings, conducting manual inspections to identify these compromised structural features in all existing structures would be time-consuming and prone to human errors. This study aims to develop an algorithm that utilizes artificial intelligence techniques to automatically pinpoint the structural components within a building's floor plans. The obtained spatial information will be utilized to construct a digital structural model of the building. This information, particularly regarding the distribution of columns in the floor plan, can then be used to conduct preliminary seismic assessments of the building. The study employs various image processing and pattern recognition techniques to enhance detection efficiency and accuracy. The study enables a large-scale evaluation of structural vulnerability for numerous old buildings, providing ample time to arrange for structural retrofitting in those buildings that are at risk of significant damage or collapse during earthquakes.

Keywords: structural vulnerability detection, object recognition, seismic capacity assessment, old buildings, artificial intelligence

Procedia PDF Downloads 89
1769 Lessons from Seven Years of Teaching Mindfulness to Children Living in a Context of Vulnerability

Authors: Annie Devault

Abstract:

Mindfulness-based interventions (MBI) can be beneficial for the well-being of children. MBIs offered for children in contexts of vulnerability (poverty, neglect) report positive results in terms of emotion regulation and cognitive flexibility. Anxiety is a common issue for children living in a vulnerable context. It has a negative impact on children’s attention span, emotional regulation and self-esteem. The MBI (12 weeks) associated with this research has been developed for a total of 30 children suffering from anxiety (7 to 9 years old) and receiving services from a community center over the last seven years. The first objective is to describe in details the content of the mindfulness-based intervention. The second purpose is to document what helps and what hinders the practice of mindfulness for children living in a context of vulnerability. A special attention will be given to the importance of the way that the intervention is offered and the principles that are followed by the practitioners. Perceived effects of the intervention on children were collected through an individual semi-structured interview with each child at the end of the program. Parents were also interviewed to have their point of view on the effect of their children’s participation in the group. Anxiety was measure with the Beck youth pre-post and at follow up (2 months). Qualitative analysis of the interviews with children showed that most of them mentioned that the program helped them become calmer, more confident, less scared and more able to deal with difficult emotions. Almost all of them reported having used the material provided to them to practice at home. This result has been confirmed by parents. They reported that their child had gained confidence and were better at verbalizing emotions. Children also grew calmer, even though all anxiety was not gone. They would have liked more material to practice at home. The quantitative instrument used to measure anxiety did not corroborate the qualitative interviews about anxiety. Discussion will question the use of this questionnaire for children who have important cognitive limitations. Discussion will also report the importance of the personalized contact with children, along with other consideration, to enhance the adherence of children and parents. The MBI seems to have benefited children in different ways, which is corroborated by most parents. Since the sample was limited, we will need to continue documenting its effects with more children and parents. The major strength of this research is to have reported the subjective perspectives of children on their experience of mindfulness.

Keywords: anxiety, mindfulness, children, best practices

Procedia PDF Downloads 113
1768 The Evolution Characteristics of Urban Ecological Patterns in Parallel Range-Valley Areas, China

Authors: Wen Feiming

Abstract:

As the ecological barrier of the Yangtze River, the ecological security of the Parallel Range-Valley area is very important. However, the unique geomorphic features aggravate the contradiction between man and land, resulting in the encroachment of ecological space. In recent years , relevant researches has focused on the single field of land science, ecology and landscape ecology, and it is difficult to systematically reflect the regularities of distribution and evolution trends of ecological patterns in the process of urban development. Therefore, from the perspective of "Production-Living-Ecological space", using spatial analysis methods such as Remote Sensing (RS) and Geographic Information Systems (GIS), this paper analyzes the evolution characteristics and driving factors of the ecological pattern of mountain towns in the parallel range-valley region from the aspects of land use structure, change rate, transformation relationship, and spatial correlation. It is concluded that the ecological pattern of mountain towns presents a trend from expansion and diffusion to agglomeration, and the dynamic spatial transfer is a trend from artificial transformation to the natural origin, while the driving effect analysis shows the significant characteristics of terrain attraction and construction barrier. Finally, combined with the evolution characteristics and driving mechanism, the evolution modes of "mountain area - concentrated growth", "trough area - diffusion attenuation" and "flat area - concentrated attenuation" are summarized, and the differentiated zoning and stratification ecological planning strategies are proposed here, in order to provide the theoretical basis for the sustainable development of mountain towns in parallel range-valley areas.

Keywords: parallel range-valley, ecological pattern, evolution characteristics, driving factors

Procedia PDF Downloads 104
1767 Stack Overflow Detection and Prevention on Operating Systems Using Machine Learning and Control-Flow Enforcement Technology

Authors: Cao Jiayu, Lan Ximing, Huang Jingjia, Burra Venkata Durga Kumar

Abstract:

The first virus to attack personal computers was born in early 1986, called C-Brain, written by a pair of Pakistani brothers. In those days, people still used dos systems, manipulating computers with the most basic command lines. In the 21st century today, computer performance has grown geometrically. But computer viruses are also evolving and escalating. We never stop fighting against security problems. Stack overflow is one of the most common security vulnerabilities in operating systems. It may result in serious security issues for an operating system if a program in it has a vulnerability with administrator privileges. Certain viruses change the value of specific memory through a stack overflow, allowing computers to run harmful programs. This study developed a mechanism to detect and respond to time whenever a stack overflow occurs. We demonstrate the effectiveness of standard machine learning algorithms and control flow enforcement techniques in predicting computer OS security using generating suspicious vulnerability functions (SVFS) and associated suspect areas (SAS). The method can minimize the possibility of stack overflow attacks occurring.

Keywords: operating system, security, stack overflow, buffer overflow, machine learning, control-flow enforcement technology

Procedia PDF Downloads 115
1766 Predicting Long-Term Meat Productivity for the Kingdom of Saudi Arabia

Authors: Ahsan Abdullah, Ahmed A. S. Bakshwain

Abstract:

Livestock is one of the fastest-growing sectors in agriculture. If carefully managed, have potential opportunities for economic growth, food sovereignty and food security. In this study we mainly analyse and compare long-term i.e. for year 2030 climate variability impact on predicted productivity of meat i.e. beef, mutton and poultry for the Kingdom of Saudi Arabia w.r.t three factors i.e. i) climatic-change vulnerability ii) CO2 fertilization and iii) water scarcity and compare the results with two countries of the region i.e. Iraq and Yemen. We do the analysis using data from diverse sources, which was extracted, transformed and integrated before usage. The collective impact of the three factors had an overall negative effect on the production of meat for all the three countries, with adverse impact on Iraq. High similarity was found between CO2 fertilization (effecting animal fodder) and water scarcity i.e. higher than that between production of beef and mutton for the three countries considered. Overall, the three factors do not seem to be favorable for the three Middle-East countries considered. This points to possibility of a vegetarian year 2030 based on dependency on indigenous live-stock population.

Keywords: prediction, animal-source foods, pastures, CO2 fertilization, climatic-change vulnerability, water scarcity

Procedia PDF Downloads 321
1765 Pollution Assessment and Potential Ecological Risk of Some Traces Metals in the Surface Sediments of the Gulf of Tunis, North Tunisia

Authors: Haïfa Ben Mna, Ayed Added

Abstract:

To evaluate the trace metals contamination status in the Gulf of Tunis, forty one sediment samples were analyzed using different approaches. According to certain contamination and ecological risk indices (Contamination Factor, Geoaccumulation index and Ecological risk index), Hg has the highest contamination level while pollution by Ni, Pb, Cd and Cr was absent. The highest concentrations of trace metals were found in sediments collected from the offshore and coastal areas located opposite the main exchange points with the gulf particularly, the Mejerda and Meliane Rivers, the Khalij Channel, Ghar El Melh and El Malah lagoons, Tunis Lake and Sebkhat Ariana. However, further ecological indices (Potential ecological risk index, Toxic unit and Mean effect-range median quotient) and comparison with sediment quality guidelines suggest that in addition to Mercury, Cr, Pb and Ni concentrations are detrimental to biota in both the offshore and areas near to the exchange points with the gulf. Moreover, in these areas the results from sequential extraction and individual contamination factor calculation pointed to the mobility and bioavailability of Cr, Pb and Ni.

Keywords: sediment, trace metals, contamination assessment, ecological risk, Tunis gulf

Procedia PDF Downloads 84
1764 Compensation Mechanism Applied to Eco-Tourism Development in China

Authors: Min Wei

Abstract:

With the rapid development eco-tourism resources exploitation, the conflict between economy development and ecological environment is increasingly prominent. The environmental protection laws, however, are lack of necessary legal support to use market mechanism and economic means to carry out ecological compensation and promote the environmental protection. In order to protect the sustainable utilization of eco-tourism resources and the benign development of the interests of various stakeholders, protection of ecological compensation balance should be put on schedule. The main role of institutional guarantee in eco-tourism resources' value compensation mechanism is to solve the question 'how to guarantee compensation'. The evaluation of the game model in this paper reveals that interest balance of stakeholders is an important cornerstone to obtain the sustainable development. The findings result in constructing a sustainable development pattern of eco- tourism industry based on tripartite game equilibrium among government, tourism enterprises and tourists. It is important that the social, economic and ecological environment should be harmonious development during the pursuit of eco-tourism growth.

Keywords: environmental protection, ecological compensation, eco-tourism, market mechanism

Procedia PDF Downloads 385