117,451 research outputs found

    Seismic and solar performance of historical city. Urban form-based multicriteria analysis

    Get PDF
    The understanding of the global performance of a historical city is a complex balance of several specific issues and requires a multi-disciplinary approach to face with actual urban phenomena and challenges, such as the seismic risk and energy efficiency, that are strongly influenced by urban form. This paper focuses on the potential of urban metrics and typological indicators for describing the seismic vulnerability and the solar radiation availability of distinct urban textures, and the correlation between the two aspects. Comparative analysis at fabric scale was conducted on the historical centre of Rieti (Latium, Italy), to underline the main seismic and solar indicators. In the last decade, we witnessed the spreading of urban scale assessment and analysis tools, but seldom using an integrated approach to face the complexity of the historical city. Relying on morpho-typological indicators, the proposed method characterizes the fabrics in terms of seismic vulnerability and solar availability through a multicriteria analysis. The analysis reveals substantial differences between fabrics using three groups of indicators: Plan, Space and Analysis-oriented. Each group describes different features of the urban fabrics that affect seismic and solar performance and suggests improvement strategies. The purpose is to support policymaker and designer in the urban renovation process

    Vulnerability assessment using remote sensing: The earthquake prone megacity Istanbul, Turkey

    Get PDF
    Hazards like earthquakes are natural, disasters are not. Disasters result from the impact of a hazard on a vulnerable system or society at a specific location. The framework of vulnerability aims at a holistic concept taking physical, environmental, socio-economic and political components into account. This paper focuses on the capabilities of remote sensing to contribute up-to-date spatial information to the physical dimension of vulnerability for the complex urban system of the megacity Istanbul, Turkey. An urban land cover classification based on high resolution satellite data establishes the basis to analyse the spatial distribution of different types of buildings, the carrying capacity of the street network or the identification of open spaces. In addition, a DEM (Digital Elevation Model) enables a localization of potential landslide areas. A methodology to combine these attributes related to the physical dimension of vulnerability is presented. In this process an n-dimensional coordinate system plots the variables describing vulnerability against each other. This enables identification of the degree of vulnerability and the vulnerability-determining factors for a specific location. This assessment of vulnerability provides a broad spatial information basis for decision-makers to develop mitigation strategies

    ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the Evolution of Cyberattacks

    Full text link
    Despite the fact that cyberattacks are constantly growing in complexity, the research community still lacks effective tools to easily monitor and understand them. In particular, there is a need for techniques that are able to not only track how prominently certain malicious actions, such as the exploitation of specific vulnerabilities, are exploited in the wild, but also (and more importantly) how these malicious actions factor in as attack steps in more complex cyberattacks. In this paper we present ATTACK2VEC, a system that uses temporal word embeddings to model how attack steps are exploited in the wild, and track how they evolve. We test ATTACK2VEC on a dataset of billions of security events collected from the customers of a commercial Intrusion Prevention System over a period of two years, and show that our approach is effective in monitoring the emergence of new attack strategies in the wild and in flagging which attack steps are often used together by attackers (e.g., vulnerabilities that are frequently exploited together). ATTACK2VEC provides a useful tool for researchers and practitioners to better understand cyberattacks and their evolution, and use this knowledge to improve situational awareness and develop proactive defenses

    Efficient Database Generation for Data-driven Security Assessment of Power Systems

    Full text link
    Power system security assessment methods require large datasets of operating points to train or test their performance. As historical data often contain limited number of abnormal situations, simulation data are necessary to accurately determine the security boundary. Generating such a database is an extremely demanding task, which becomes intractable even for small system sizes. This paper proposes a modular and highly scalable algorithm for computationally efficient database generation. Using convex relaxation techniques and complex network theory, we discard large infeasible regions and drastically reduce the search space. We explore the remaining space by a highly parallelizable algorithm and substantially decrease computation time. Our method accommodates numerous definitions of power system security. Here we focus on the combination of N-k security and small-signal stability. Demonstrating our algorithm on IEEE 14-bus and NESTA 162-bus systems, we show how it outperforms existing approaches requiring less than 10% of the time other methods require.Comment: Database publicly available at: https://github.com/johnnyDEDK/OPs_Nesta162Bus - Paper accepted for publication at IEEE Transactions on Power System
    • …
    corecore