Increasing groundwater contamination across the globe triggered the concept of “aquifer vulnerability”, which has been extensively used worldwide during past three to four decades by researchers and ...policy makers for protecting groundwater from pollution. However, only a few recent studies have focused on the performance evaluation of two or more vulnerability assessment methods. Some of these studies have resulted in contrasting findings. Given this fact and considering growing threat of groundwater contamination due to increasing human activities across the globe, it is necessary to critically review existing methods, understand current research trends, and identify major challenges associated with the assessment of aquifer vulnerability. Hence, the aim of this study is to present a comprehensive review of the methods and approaches used for the evaluation of aquifer vulnerability for ‘resource’ and ‘source’ protection. First, the concept and types of aquifer vulnerability along with the definitions evolved over the years are presented, and then the methods for assessing aquifer vulnerability are suitably classified and briefly discussed. Second, the concept of vulnerability assessment for ‘source’ protection is highlighted, and the evolution of groundwater vulnerability evaluation methods is presented with an enlightening block diagram. Third, current research trends and critiques on past studies are discussed. Fourth, the major challenges of vulnerability assessment are highlighted and a way forward is suggested. It is concluded that the progress of vulnerability evaluation methods has not kept pace with the advancement of knowledge and tools/techniques. There is an urgent need for developing a scientifically robust and somewhat versatile methodology for the evaluation of ‘intrinsic’ and ‘specific’ groundwater vulnerability for ‘resource’ and ‘source’ protection under varying hydrogeologic and hydro-climatic conditions. It is emphasized that more studies should be devoted to vulnerability assessment for ‘source’ protection using ‘Source-Pathway-Receptor/Target’ approach. Also, spatial decision support systems should be developed using modern tools/techniques including artificial intelligence to improve decision-making process for protecting vital groundwater resources.
•This study presents a review of methods used for mapping of groundwater vulnerability to pollution.•Methods widely used for assessing aquifer vulnerability are classified into suitable groups and their overview is provided.•We illustrated evolution of groundwater vulnerability methods by an enlightening block diagram, and methods are critiqued.•Future challenges are identified and a way forward is suggested.•This study emphasizes need of a robust and versatile method using modern tools for groundwater vulnerability evaluation.
Full text
Available for:
GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK, ZRSKP
Istilah keterancaman bertujuan untuk menjelaskan perhubungan yang wujud di antara keterdedahan ancaman fizikal dengan kesejahteraan manusia dan keupayaan mereka untuk menghadapi ancaman. Penilaian ...keterancaman menggabungkan tiga komponen utama iaitu ancaman, sistem yang mengalami risiko dan daya tahan diri sedia ada. Keterancaman bagi kajian ini merujuk kepada komuniti orang asli yang tinggal di zon tanah tinggi Cameron Highlands. Tujuan kajian ini dijalankan untuk mengenal pasti jenis ancaman perubahan alam sekitar tempatan di tiga lembangan utama Cameron Highlands iaitu Telom, Bertam dan Lemoi. Ancaman ini dilihat daripada hasil proses pembangunan guna tanah di kawasan tanah tinggi yang mendatangkan kesan keterancaman ke atas komuniti orang asli sebagai golongan yang memiliki daya tahan yang rendah. Hasil soal selidik iaitu ciri-ciri yang dinilai dan penghasilan peta indeks keterancaman ini akan menggambarkan keadaan sebenar komuniti orang asli Semai Cameron Highlands yang telah lama menjadikan sistem alam sekitar tanah tinggi sebagai satu bentuk perhubungan. Jumlah ketua isi rumah yang terlibat dalam sesi soal selidik ialah 153 orang iaitu 30% daripada jumlah keseluruhan ketua isi rumah bagi kampung terpilih. Hasil daripada penilaian indeks secara keseluruhan menunjukkan tahap keterancaman komuniti orang asli adalah terancam dan mereka memerlukan peningkatan daya tahan diri sedia ada. Kesimpulannya, penilaian indeks keterancaman komuniti orang asli di zon tanah tinggi bukan sahaja menggambarkan tahap keterancaman komuniti tersebut, malah boleh dijadikan petunjuk dan panduan kepada mereka dan pihak yang terlibat dalam aspek pengurusan komuniti orang asli di zon tanah tinggi.
Automated detection of software vulnerabilities is a fundamental problem in software security. Existing program analysis techniques either suffer from high false positives or false negatives. Recent ...progress in Deep Learning (DL) has resulted in a surge of interest in applying DL for automated vulnerability detection. Several recent studies have demonstrated promising results achieving an accuracy of up to 95 percent at detecting vulnerabilities. In this paper, we ask, "how well do the state-of-the-art DL-based techniques perform in a real-world vulnerability prediction scenario?" To our surprise, we find that their performance drops by more than 50 percent. A systematic investigation of what causes such precipitous performance drop reveals that existing DL-based vulnerability prediction approaches suffer from challenges with the training data (e.g., data duplication, unrealistic distribution of vulnerable classes, etc.) and with the model choices (e.g., simple token-based models). As a result, these approaches often do not learn features related to the actual cause of the vulnerabilities. Instead, they learn unrelated artifacts from the dataset (e.g., specific variable/function names, etc.). Leveraging these empirical findings, we demonstrate how a more principled approach to data collection and model design, based on realistic settings of vulnerability prediction, can lead to better solutions. The resulting tools perform significantly better than the studied baseline-up to 33.57 percent boost in precision and 128.38 percent boost in recall compared to the best performing model in the literature. Overall, this paper elucidates existing DL-based vulnerability prediction systems' potential issues and draws a roadmap for future DL-based vulnerability prediction research.
Full text
Available for:
NUK, OILJ, SAZU, UKNU, UL, UM, UPUK
6.
E-Filing System for Government Offices Khan, H U; Javed, A
Technical journal (University of Engineering and Technology (Taxila (Extinct city)),
01/2017, Volume:
22, Issue:
1
Journal Article
Peer reviewed
E-Governance is widely thought as ideal approach to establish productive relationship between government and citizens. It is extensively used to bring transparency, accountability and efficiency at ...all levels of government procedures and operations. EGovernance is divided into three major categories i-e e- Government-to-Citizen (eG2C), e-Government-to- Employees (eG2E) and e-Government-to-Government (eG2G). There are various limitations discussed by researchers regarding implementation of e-services in developing countries including Pakistan. Lower literacy, financial constraints, poor ranking in ICT development index, and resistance to change, are assumed as barriers in implementing such services in developing countries like Pakistan. All these barriers results into poor usability and lower acceptability for such services. Our focus is on one core part of e-G2E, which is to provide e-coverage to manual file system of government offices. The current manual' file system incorporates delayed processing, invisibility, low productivity, poor check & balance, lack of timed accountability, inefficiency, prolonged review, entailed corruption and vulnerability to undue interference. Our proposed file system is intended to add transparency, efficiency, time framing and accountability to manual file system and will have also better acceptability and usability.
As a consequence of climate change, coastal communities worldwide are subject to increased risk from sea-level rise and more intense storms. Therefore, it is important for coastal managers to have ...focused site specific data on present and predicted climate change impacts in order to determine shoreline vulnerability. There are few UK studies that characterise coastal vulnerability, while nearly all global work has concentrated on geomorphological and to a lesser extent, socio-economic aspects. In response, the present study developed a new Physical Coastal Vulnerability Index (PCVI) and applied it to eleven UK sites, seven in England, three in Wales and one in Scotland. PCVI results were then compared and contrasted with a new Fiscal Coastal Vulnerability Index (FCVI), which enabled coastal areas to be visually classified in one of four categories to inform relative risk. Both indices were subsequently integrated into a Combined Coastal Vulnerability Index (CCVI). Results showed that Great Yarmouth and Aberystwyth were highly vulnerable, while Llanelli and Lynmouth were least vulnerable, and the importance of integrating both indices is demonstrated by modified overall vulnerability assessments. Therefore, CCVI provides a simple to use shoreline monitoring tool which is particularly suitable for assessment of risk. The indices support coastal planning, including intervention or no active intervention policies, and thereby benefitting a range of stakeholders. CCVI works at local, regional and international scales, and identifies vulnerable locations. Consequently, these indices will inform management strategies to improve coastal resilience under various sea level rise and climate change scenarios.
•A modified Physical Coastal Vulnerability Index (PCVI) was developed and applied to eleven UK sites.•A new Fiscal Coastal Vulnerability Index (FCVI) was used to compare and contrast PCVI results.•PCVI and FCVI results were subsequently integrated into a new Combined Coastal Vulnerability Index (CCVI).•Indices were used to construct GIS based coastal vulnerability maps.
Full text
Available for:
GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK, ZRSKP
The multiple-probability decision-making method for earthquake hazards considers multiple performance indicators and can be used to effectively estimate the seismic risk of structures. The seismic ...vulnerability model directly affects the development of the earthquake risk distribution in regional structures. This paper innovatively developed a bivariate intensity measurement method based on macroscopic and instrumental seismic intensities. An optimized instrument intensity calculation model was established considering the actual monitoring data of historical earthquakes in China. A hybrid seismic vulnerability quantification method based on empirical, expert judgement and analysis has been proposed and applied to evaluate the vulnerability levels of three types of building clusters in two typical earthquakes in Qinghai Province, China (the 2008 Dachaidan (DCD) earthquake and the 2009 Haixi (HX) earthquake). A structural hybrid vulnerability matrix and surface for nine zones based on bivariate intensity measures were developed. A synthetic vulnerability membership index considering fuzzy failure criteria and decision theory was proposed, and vulnerability membership curves for different vulnerability levels were established. An improved earthquake economic loss prediction function is proposed, and synthetic economic vulnerability index prediction models for three typical buildings in different regions are established. The estimated and calculated results of the developed multiscale variable parameter synthetic vulnerability model are highly consistent with the actual earthquake loss observations.
•This paper proposes a bivariate intensity measure to estimate the seismic fragility of buildings.•An optimized hybrid vulnerability matrix and surface of typical buildings were established.•The 2008 and 2009 Dachaidan and Haixi earthquakes in Qinghai Province, China, were reported.
Full text
Available for:
GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
Abstract / Das Wichtigste in Kürze Unter dem Begriff der ‚vulnerablen Familie‘ werden Familien zusammengefasst, deren Lebenslagen bzw. Lebensweisen als problematisch betrachtet werden. Mit der ...Verwendung dieser Bezeichnung wird unterstellt, dass manche Familien besondere Unterstützung benötigen, insofern verweist der Begriff auf die gesellschaftliche Verantwortung für den Schutz der Familie. Zugleich birgt er die Gefahr in sich, dass er Familienbilder befördert, durch die Familien nur unter dem als relevant erachteten Problemaspekt betrachtet und beurteilt werden. Der Beitrag verdeutlicht mit Hilfe eines Fallbeispiels, wie über eine solche problembezogene Reduktion der Perspektive auf Familie wiederum die Vulnerabilität der Familie erhöht wird. Insofern werden exemplarisch Fallstricke der diskursiven Kategorisierung von Familien als vulnerable Familie für die Soziale Arbeit diskutiert.
Full text
Available for:
EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
Vulnerability analysis has long been used to evaluate the security posture of a system. Different approaches, including vulnerability graphs and various vulnerability metrics, have been used to study ...the vulnerability landscape and provide security analysts with cyber situational awareness. However, most current solutions still lack a principled approach to quantifying various dimensions of known vulnerabilities in a way that can easily adapt to different applicative domains and operating conditions. To address this limitation, we introduce a vulnerability metrics framework that extends and generalizes our previous metrics for evaluating the exploitation likelihood of a vulnerability and the exposure factor of system components to vulnerability exploits. We argue that the factors influencing these metrics and their relative weights depend on the specific applicative domain, defender’s priorities, and attacker’s knowledge. Thus, instead of providing a static set of equations, we establish a framework for instantiating the equations that best model the scenario being considered. We combine likelihood and exposure factor metrics into a severity score that allows us to rank vulnerabilities. In our evaluation, we demonstrate that ranking vulnerabilities solely based on their CVSS scores is not sufficient for effective prioritization, due to the limited number of possible distinct severity values compared to the sheer number of existing vulnerabilities. We define a ranking quality score and show that considering additional information about vulnerabilities helps refine their ranking, providing more actionable intelligence to security analysts.
Full text
Available for:
GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP