4 resultados para KEYS

em AMS Tesi di Laurea - Alm@DL - Università di Bologna


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Although Recovery is often defined as the less studied and documented phase of the Emergency Management Cycle, a wide literature is available for describing characteristics and sub-phases of this process. Previous works do not allow to gain an overall perspective because of a lack of systematic consistent monitoring of recovery utilizing advanced technologies such as remote sensing and GIS technologies. Taking into consideration the key role of Remote Sensing in Response and Damage Assessment, this thesis is aimed to verify the appropriateness of such advanced monitoring techniques to detect recovery advancements over time, with close attention to the main characteristics of the study event: Hurricane Katrina storm surge. Based on multi-source, multi-sensor and multi-temporal data, the post-Katrina recovery was analysed using both a qualitative and a quantitative approach. The first phase was dedicated to the investigation of the relation between urban types, damage and recovery state, referring to geographical and technological parameters. Damage and recovery scales were proposed to review critical observations on remarkable surge- induced effects on various typologies of structures, analyzed at a per-building level. This wide-ranging investigation allowed a new understanding of the distinctive features of the recovery process. A quantitative analysis was employed to develop methodological procedures suited to recognize and monitor distribution, timing and characteristics of recovery activities in the study area. Promising results, gained by applying supervised classification algorithms to detect localization and distribution of blue tarp, have proved that this methodology may help the analyst in the detection and monitoring of recovery activities in areas that have been affected by medium damage. The study found that Mahalanobis Distance was the classifier which provided the most accurate results, in localising blue roofs with 93.7% of blue roof classified correctly and a producer accuracy of 70%. It was seen to be the classifier least sensitive to spectral signature alteration. The application of the dissimilarity textural classification to satellite imagery has demonstrated the suitability of this technique for the detection of debris distribution and for the monitoring of demolition and reconstruction activities in the study area. Linking these geographically extensive techniques with expert per-building interpretation of advanced-technology ground surveys provides a multi-faceted view of the physical recovery process. Remote sensing and GIS technologies combined to advanced ground survey approach provides extremely valuable capability in Recovery activities monitoring and may constitute a technical basis to lead aid organization and local government in the Recovery management.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A total of 352 specimens were analyzed to achieve the different aims of this thesis. 255 central-northern Adriatic specimens of S. solea and S. aegyptiaca were molecularly analysed using microsatellite locus Sos(AC)40 and 205 also morphologically due to evaluate the abundance and the distribution of the cryptic species S. aegyptiaca and to confirm morphologic analyses. Morphological and molecular analyses comparated show a correspondence of 96%. A combined morphologic approach could be proposed to apply multiple criteria on the analyzed external morphological keys. The Adriatic Egyptian soles may lives in shallow waters (up 30 m) and in brackish lagoon. 127 samples of Adriatic common sole added to 326 samples of previous studies showed, using mitochondrial marker (CytB), that the Adriatic Sea as contact zone between Tyrrhenian and Aegean Sea, the divergence within the Adriatic Sea is low but significant between central-north and south, with a longitudinal strong gene flow in central-northern side. It’s also showed as in the Adriatic Sea two near-panmictic populations of common sole exist.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Abstract (English) Cities nowadays face complex challenges to meet objectives regarding socio-economic development and quality of life. The concept of "smart city" is a response to these challenges. Although common practices are being developed all over the world, different priorities are defined and different architectures are followed. In this master thesis I focuses on the applied architecture of Riverside's case study, through a progression model that underline the main steps that moves the city from a situation of crisis, to be appointed "Intelligent Community" of the 2012 by Intelligent Community Forum. I discuss the problem of integration among the physical, institutional and digital dimension of smart cities and the "bridges" that connect these three spatialities. Riverside's progression model takes as a reference a comprehensive framework made unifying the keys component of the three most quoted framework in this field: a technology-oriented vision (strongly promoted by IBM [Dirks et al. 2009]), an approach-oriented one [Schaffers et al. 2011] that is sponsored by many initiatives within the European Commission, and a purely service-oriented one [Giffinger et al. 2007][Toppeta, 2010].

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The cybernetics revolution of the last years improved a lot our lives, having an immediate access to services and a huge amount of information over the Internet. Nowadays the user is increasingly asked to insert his sensitive information on the Internet, leaving its traces everywhere. But there are some categories of people that cannot risk to reveal their identities on the Internet. Even if born to protect U.S. intelligence communications online, nowadays Tor is the most famous low-latency network, that guarantees both anonymity and privacy of its users. The aim of this thesis project is to well understand how the Tor protocol works, not only studying its theory, but also implementing those concepts in practice, having a particular attention for security topics. In order to run a Tor private network, that emulates the real one, a virtual testing environment has been configured. This behavior allows to conduct experiments without putting at risk anonymity and privacy of real users. We used a Tor patch, that stores TLS and circuit keys, to be given as inputs to a Tor dissector for Wireshark, in order to obtain decrypted and decoded traffic. Observing clear traffic allowed us to well check the protocol outline and to have a proof of the format of each cell. Besides, these tools allowed to identify a traffic pattern, used to conduct a traffic correlation attack to passively deanonymize hidden service clients. The attacker, controlling two nodes of the Tor network, is able to link a request for a given hidden server to the client who did it, deanonymizing him. The robustness of the traffic pattern and the statistics, such as the true positive rate, and the false positive rate, of the attack are object of a potential future work.