• Non ci sono risultati.

A novel approach to flood risk assessment: the Exposure-Vulnerability matrices

N/A
N/A
Protected

Academic year: 2021

Condividi "A novel approach to flood risk assessment: the Exposure-Vulnerability matrices"

Copied!
8
0
0

Testo completo

(1)E3S Web of Conferences 7, 08007 (2016) FLOODrisk 2016 - 3rd European Conference on Flood Risk Management. DOI: 10.1051/ e3sconf/2016 0708007. A novel approach to flood risk assessment: the Exposure-Vulnerability matrices 1,a. 2. 1. Susanna Naso , Albert S. Chen , Giuseppe T. Aronica and  

(2)  . 2. 1. Dipartimento di Ingegneria, University of Messina, Contrada Di Dio, 98166 Villaggio S. Agata  Messina, Italy Centre for Water Systems, University of Exeter, Harrison Building, Streatham Campus, University of Exeter, North Park Road, Exeter EX4 4QF, UK 2. Abstract. The classical approach to flood defence, focused on reducing the probability of flooding through hard defences, has been gradually substituted by flood risk management approach, which accepts the idea of coping with floods, and aims at reducing both probability and the consequences of flooding. In this view, the concept of vulnerability becomes central, such as the (non-structural) measures for its increment. However, the evaluations for the effectiveness and methods of non-structural measure and the vulnerability are less studied, compared to the structural solutions. In this paper, we adopted the Longano catchment in Sicily, Italy, as the case study. The methodology developed in the work enabled a qualitative evaluation of the consequences of floods, based on a crisscross analysis of vulnerability curves and classes of exposure for assets at risk. A GIS-based tool was used to evaluate each element at risk inside an Exposure-Vulnerability matrix. The construction of an E-V matrix allowed a better understanding of the actual situation within a catchment and the effectiveness of non-structural measures for a site. Referring directly to vulnerability can also estimate the possible consequences of an event even in those catchments where the damage data are absent. The instrument proposed can be useful for authorities responsible for development and periodical review of adaptive flood risk management plans.. 1 Introduction The concept of risk implies a transition from the classical approach of defending a territory from flood hazard, through structural measures that modify the characteristics of the flood event, to the approach of reducing flood risk, through structural and non-structural measures that act on both flood hazard and its consequences. The EU Directive underlines the importance of prevention-oriented approaches, adopting early-warning systems, flood forecasting techniques, and land use regulation. The use of prevention measures that do not interfere    

(3)      

(4)    

(5)   methodologies and strategies to verify their effectiveness. All over the world, public governmental bodies and academics published some studies on the effectiveness of non-structural measures [13], but the lack of data on it (or their coarseness) makes their reliability hard to know. The variable in risk equation [4] that describes the attitude of a territory in suffering impact of an hazardous event is vulnerability,    

(6)    

(7) 

(8)    circumstances of a community, system or asset that make a. 

(9)   

(10)  

(11) 

(12)       

(13)       [5].  

(14)     

(15)    

(16)    

(17)  interpretations, as existing epistemological traditions in various research areas with different objectives [68]. Fuchs et al. [9] summarised these definitions of vulnerability with respect to natural hazards research. From a natural science perspective, studies on vulnerability focus on the susceptibility of physical systems in areas at risk to natural processes. Vulnerability is therefore considered as loss degree or percentage of damage that assets in areas at risk may suffer, which depends not only on hazard attributes, but also on the intrinsic characteristics of the affected element. The definition of vulnerability is often confused with the one of exposure, which is defined as the number of assets being present in endangered areas distinguished per typologies [5]. Studies related to flood vulnerability assessment are few because the uncertainty involved is difficult to quantify. In fact, although different damage assessment methods have been developed [1014], the lack of high-quality essential data remains as the main obstacle to the derivation of uncertainties in ex-ante analysis.. Corresponding author: snaso@unime.it. © The Authors, published by EDP Sciences. This is an open access article distributed under the terms of the Creative Commons Attribution License 4.0 (http://creativecommons.org/licenses/by/4.0/)..

(18) E3S Web of Conferences 7, 08007 (2016) FLOODrisk 2016 - 3rd European Conference on Flood Risk Management. DOI: 10.1051/ e3sconf/2016 0708007. 2 Methodology. 2.1 Hydraulic modelling. In this paper, we have developed a new methodology to assess flood risk for buildings based on their exposure classes and the relationship between flood depth and vulnerability. The goal is to describe flood consequences or flood risk in watersheds where vulnerability data do not exist or their quality makes them unreliable. We considered the relation of vulnerability as the impact of natural hazards, generally measured in terms of damages or losses, and assessed the vulnerability as the expected loss degree of an element (or set element) at risk as a consequence of a hazardous event [15,16]. Meanwhile, we further normalised the vulnerability to a value between 0 and 1, as the expected degree of loss varying from no damage to complete disruption. On the contrast, we regarded exposure as the pure identification of assets at risk and attributed the nominal value of each element based on the function of its strategic, economic and functional role. No monetary value was associated to buildings. Our methodology includes four steps. At first, a hydraulic modelling is applied to derive the hydrodynamic characteristic of the flood event studied. The second step is determining the Exposure based on the building categories provided in the Flood Risk Plan for Sicily [17]. The third step is deriving vulnerability curves for different buildings in Sicilian territory through a synthetic approach. Finally, the vulnerability assessment for different Exposure categories, referring to a flood event occurred in Barcellona Pozzo di Gotto (North-East Sicily, Italy): the results have been reported in an Exposure-Vulnerability matrix, allowing an immediate understanding of flood consequences.. To simulate flood propagation, a 2D model (Aronica et al., 1998) based on De Saint Venant equations has been used.. wH w uh

(19) w vh

(20)   wt wx wy w uh

(21) wH  gh  ghJ x wt wx. 0;. 0. w vh

(22) wH  gh  ghJ y wt wy. 0. where H(t,x,y) is the free surface elevation, u and v are the flow velocity components in x and y directions, respectively, h is the depth of flow, Jx and Jy are the friction terms in the x and y directions. The friction terms are represented through the classical Manning-Strickler formulation as:. Jx. n 2u u 2  u 2 h4 / 3. ; Jy. n 2v u 2  u 2 h4 / 3. The equations are solved by using a finite element technique with triangular elements to reproduce the complex topography of the built-up areas. More details on the model can be found in Aronica et al. [18].     

(23)   We adopt Exposure as a global estimation of    -economic situation to flood risk, which depends on the property value, the social function, the indirect involvement in economic losses and the population density of the neighbourhood area. Table 1 shows the building categories based on the above mentioned variables. The main category refers to the membership class considered in the Sicilian Flood Risk Plan. The classification is further refined for residential and public buildings according to their economic or strategic value, which are denoted as second index in the table. The third index describes the detailed type under sub-categories, which are classified depending on their economic or strategic value. This level of detail enables to perform a vulnerability analysis at building scale. CLASS E1.5.1 E1 E1.5.2 E1.5.3 E2 E2.2 E3.1.1 E3.1.2 E3.1.3 E3.1.4 E3 E3.2.1 E3.2.2 E3.2.3 E3.2.4 E3.2.5. Figure 1. Algorithm for exposure-vulnerability analysis.. 2. ELEMENTS AT RISK Single houses Flats Villas Secondary roads Detached houses Villas Small inhabited Farmhouses Single houses Flats Box/Garage Industrial and craft settlements Sheds Single houses Supermarkets Sparse houses.

(24) E3S Web of Conferences 7, 08007 (2016) FLOODrisk 2016 - 3rd European Conference on Flood Risk Management. After defining these conditions, we analysed the damage of finishes components that included floors, walls, doors and French windows, windows, wiring, water plant, gas plant and services. Their substitution prices were taken from the official price lists and depend on their quality and materials, which in turn were derived 

(25)       ! " #       houses were hypothesized to be hollow wooden, while in rich ones were supposed to be in solid wood: these led to different substitution costs that weighed differently in respect to the total costs. These components could also suffer different damages for the same water depths due to the duration of flooding. Once that all these conditions are defined, a team of experts was asked to describe, according to   experience, how each component suffer damages in all the illustrated structures: the results were used to build a.     

(26)      

(27)          building element in a particular combination of finishes class and event duration. The sums of the partial curves that were related to the elements of a building type, each one multiplied for its weight, produced two total vulnerability curves for each building type: one for short and one for long duration hypothesis. A separate effort needs to be done regarding the vulnerability curves for commercial activities: the majority of them are located in structures with the same materials and building characteristic of residential constructions: the same vulnerability curves can be so used, because in the general analysis their exposure class will play the role to distinguish them from each other. While considering supermarkets and stores, the stock contents have higher weights in the damage estimation. For these typologies, a double distinction has been made: on one side, they have their own exposure class; on the other side, a vulnerability range varying linearly from 0 to 1, while the water depths vary from 0 to 60 cm has been considered. The reason for this last choice was due to the fact that it seemed plausible that when the water depth reach the height of 60 cm, the goods and the machineries (like fridges) contained in supermarkets and stores would be so damaged that a vulnerability value equal to 1 can be associated to them.. Primary roads and escapes Detached houses Villas Flats Residential buildings Box/Garage Farmhouses Single houses E4 Civil Protection Areas CP and Police offices E4.2 and offices Churches E4.3.1 Town hall and municipal E4.3.2 Significant public offices buildings Schools E4.3.3 Hospitals E4.3.4 Table 1. Proposed Exposure classification. E3.4 E4.1.1 E4.1.2 E4.1.3 E4.1.4 E4.1.5 E4.1.6. 2.3 Definition buildings. of. vulnerability. curves. DOI: 10.1051/ e3sconf/2016 0708007. for. The basic idea of this study was the derivation of relative vulnerability functions for those sites where both damage data and on-site building inspections are lacking. Final aim in the derivation of vulnerability curves was to describe possible damages occurring after fluvial floods in urbanized area and to make the curves as generic as possible. While referring to fluvial floods, often characterized by low velocities, another initial condition was to neglect structural damages to the buildings and to consider what happens to non-structural building components. The first step in synthetic approach is to introduce the building typologies for which derive the curves: buildings are usually distinguished at first in function of their use, than in function of their structural features (e.g. materials, numbers of floors, extension, geometry, age, etc.). This  

(28) 

(29)   

(30)    

(31)  

(32)    the incorporation of each building presented in the study areas inside these standard pre-defined models. We considered the damage of non-structural building elements and hypothesized the substitution cost of each element to derive its weight respect to the total substitution costs. To describe the proportional damage relative to each element, a questionnaire was distributed to a team of experts, in particular a team of civil engineers working in Sicily area. The first step of the analysis consists of deciding    

(33) be included: this distinction is just referred

(34) 

(35)    

(36)    

(37)   

(38) n has been already considered through their exposure. The same curves can be used for buildings with the same constructive features, even if they have different functions, such as residential or commercial. On the other side, different curves should be used for buildings with the same functions but with different constructive features. We associated concrete buildings without basement to three finishes types: rich finishes for the building types such as villas and cottages; medium finishes for flats and single houses inside towns; and poor finishes for detached houses and single houses in villages.. 2.4 Vulnerability assessment As previously introduced, the input data used for direct impact assessment are the flood inundation depths $  

(39)    %

(40)     #     the vulnerability curves. Flood inundation depths under various scenarios can be obtained using 2D hydraulic modelling. Exposure classes can be mapped at microscale (i.e., individual buildings) or at larger scales as land cover classes but, given the detail in exposure classification, the relationship between land cover class            ! To analyse the flood impact for individual buildings efficiently, we adopted the tool developed by Chen et al. [19] that can assess the vulnerability of each element for multiple flood conditions.. 3.

(41) E3S Web of Conferences 7, 08007 (2016) FLOODrisk 2016 - 3rd European Conference on Flood Risk Management. DOI: 10.1051/ e3sconf/2016 0708007. The results for each flood condition is further summarised to highlight the severity in different exposure category and help decision making. Considering the uncertainties associated with the vulnerability within a catchment, a banded severity in an ExposureVulnerability matrix, as shown in Table 2, was used instead of simple one-to-one relationship curves. The severity in each exposure type is banded up to five classes (low, moderate, medium, high, extreme), according to the function and importance of the type. For example, hospital would have less tolerance to hazard such that the severity was banded as high even the vulnerability was low. On the contrast, sparse houses could cope with more extreme conditions such that the severity was classified as high for the highest vulnerability class.. .  .  .  

(42)

(43)  

(44)

(45)  

(46) 

(47)  

(48) 

(49)  

(50) 

(51)  

(52) 

(53)  

(54)

(55) 

(56) 

(57) 

(58)  

(59) 

(60)  

(61) 

(62)  

(63) 

(64)  

(65)  

(66)

(67)  

(68)

(69) .               .               .               .                .                .                . Figure 2. Survey map (1:10000) and DEM (2m resolutions) of Barcellona Pozzo di Gotto urban area. .  , "" - # "$%% 

(70)  

(71)   #

(72)   (.$ %"      

(73) 

(74) & 

(75) # 

(76)         

(77)  *   

(78)  

(79)  

(80) 

(81)  

(82)    #  

(83) #

(84)  

(85)  /

(86)    

(87)    & 0 

(88)  +$$ #          %$$         

(89) 

(90)  & 1 

(91)  

(92)  

(93) 

(94)  

(95)   

(96)      1

(97)  

(98)     

(99)     

(100)   

(101) 

(102)  

(103)     & 2 

(104) 

(105) 

(106)  

(107)    

(108) 

(109)   

(110)   

(111) 

(112)  

(113)        3$$    &  

(114)        

(115)   

(116) 

(117)  

(118) *   

(119) 

(120)  

(121)      

(122)    

(123)   

(124)   

(125)  

(126) 

(127)       

(128)  

(129)    . 

(130)            

(131)  && 

(132)   

(133) 

(134)  

(135)   

(136) #  

(137)   #  

(138) 

(139)    &  

(140) 

(141) 

(142)  

(143) 

(144)     

(145)   

(146)     

(147)    

(148)  . 

(149)   

(150) #    

(151)     

(152)    

(153) 

(154)     &  

(155) . #   

(156)     

(157)   

(158)  .     

(159)       

(160)  #    

(161)  1

(162) 

(163)    

(164)   &  . Table 2. Exposure-Vulnerability banded classification. 3 Case study     

(165)        

(166) 

(167)   

(168) 

(169)    

(170)            

(171)

(172) 

(173)     !"   

(174) 

(175) # 

(176) 

(177) "$%%& 

(178)       #

(179)  '     # #

(180) %(&)*  

(181)  

(182)  $&%+      #

(183)   

(184)  

(185)  

(186) 

(187)  

(188)      &    #    

(189)     

(190)    

(191) 

(192)  

(193) &. 4.

(194) E3S Web of Conferences 7, 08007 (2016) FLOODrisk 2016 - 3rd European Conference on Flood Risk Management. DOI: 10.1051/ e3sconf/2016 0708007. 3.1 Flood maps. 3.3 Vulnerability curves.  #   

(195)  

(196)   #       

(197)  

(198)  

(199)     

(200)    

(201)        # 

(202)        

(203)   # 

(204)  &    #    #   

(205)    

(206) 

(207)   

(208)      &  # * 

(209) #    

(210)   

(211)  #   

(212) #   

(213)  # &

(214) 

(215)  .      #

(216)  %&4) * "    

(217)    .($+%

(218)    

(219) & 

(220) 

(221)    

(222)  (%+%)  #   

(223)  5

(224)  6 

(225) 2562

(226) "   

(227) & ,7 

(228)  

(229)  

(230)  

(231)    

(232)  #  #   

(233)   

(234)  

(235)    

(236) 

(237)  &. 

(238)  

(239)   

(240)    8

(241) .  # 

(242)  

(243)    

(244)  #    

(245)            !            

(246)   

(247)  

(248)   #

(249)   8

(250)  

(251)  

(252)  

(253)  &  

(254)       

(255) 

(256)       

(257)  8

(258) 

(259)   #  

(260)       8 &    * 

(261)  

(262)     

(263)  #  #/

(264)  

(265)    

(266) 

(267)  

(268) 

(269)        

(270) &  

(271)   

(272)   

(273)  

(274) 

(275)       

(276)   #  

(277)    # 

(278) 

(279)    

(280) 

(281)   

(282)  #  

(283)  #     

(284)  

(285) & 2  

(286)  

(287)      

(288) 

(289)   

(290)         

(291)    

(292) 

(293)   

(294)   

(295) 

(296) 

(297)    

(298)    

(299)   

(300) 

(301) 

(302)  

(303)  

(304)   

(305) 9  9  9 9 #  :9 

(306) 

(307) 9  9 #9  

(308)   #

(309)   &    

(310)    

(311)  

(312)           

(313)     

(314)    

(315)  &&  #

(316)  #     

(317)    #

(318)             #

(319)        

(320)   

(321)   

(322) & 

(323)    

(324)    &

(325)    

(326)   

(327)  88  

(328)     

(329)   

(330)  (3   

(331)   

(332)        

(333)   

(334)     

(335)  

(336) &  

(337) 

(338) 

(339)    # 

(340)     

(341)        

(342)   

(343)   

(344)  #

(345) 

(346) 

(347)  

(348)   

(349) 

(350) 

(351) 

(352) 

(353)   #

(354) 

(355) 

(356)  

(357) & ; 

(358)     

(359) 7  

(360)   

(361)   # 

(362) 

(363)    "$  

(364)  

(365) <      !    .  

(366)   

(367) 

(368)  

(369)  

(370)  ($   " 

(371)   

(372) ( 

(373)  

(374) 

(375) 

(376) %%$ & 7

(377)    

(378)   $&%    

(379) 

(380)     

(381)  

(382)  

(383)   # 

(384)   #

(385)   

(386)  

(387)    

(388)        

(389)        

(390) 1     

(391)    

(392) 

(393) .    # &  

(394)       

(395)   

(396) 

(397)  

(398)  

(399) &     8     

(400)  #   

(401)  

(402)    

(403)  

(404) 

(405)  

(406)   

(407) 

(408)  #

(409) 

(410) 

(411) 

(412)  

(413)  

(414)  #    

(415)       #

(416) 

(417) 

(418)     

(419) 

(420)  

(421) && ,

(422)  

(423)  

(424)   

(425)  

(426)   

(427)  

(428) .$ #

(429) .$ %$$ #

(430)  %$$ %.$ 

(431) 

(432) %.$      

(433) 

(434)  

(435) 

(436)  

(437)    

(438)   #

(439)  

(440)      

(441) &        . 3.2 Exposure classification * 

(442)          7

(443) 

(444) 

(445)  68   

(446)   

(447) 

(448) 

(449)  1    #   

(450) 

(451)       

(452)   # 

(453)  !(&     8 1    

(454)        #  

(455)    

(456)   

(457) 

(458)    

(459) 

(460)      

(461)  

(462)  

(463)      

(464)     

(465)   

(466)    

(467)  #  

(468)  

(469)       &. Figure 3. Exposure classification map. . 5.

(470) E3S Web of Conferences 7, 08007 (2016) FLOODrisk 2016 - 3rd European Conference on Flood Risk Management. DOI: 10.1051/ e3sconf/2016 0708007. h = 150 cm. Floors. Walls. Doors. Windows. Wiring. Gas system. Water system. h = 100 cm. h = 50 cm. Interior finish materials. 1884. 674. 1669. 0. 282. -. -. Weights. 0,33. 0,12. 0,30. 0,00. Substitution Costs &'(. 1884. 1025. 1669. 0. Substitution Costs &'( TOTAL. 4510. TOTAL. 0,05 0,1 282. -. -. Figure 4. *   

(471)         

(472)  

(473)   

(474) 

(475)      

(476)  contributions.. 4861. Weights. 0,31. 0,17. 0,27. 0,00. 0,05 0,1. Substitution Costs &'(. 1884. 1375. 1669. 594. 367. 0,26. 0,19. 0,23. 0,08. 0,05 0,1. TOTAL Weights. 0,1. -. 0,1 -. 5890 0,1. Table 3 ) 

(477)      

(478) weights.. 3.4 Vulnerability analysis =

(479)  # 

(480)   

(481)   

(482)  8      # 

(483)   

(484)  

(485)  

(486)   # 

(487)    #   

(488)       

(489)  &   

(490)   

(491)    

(492)  #   

(493)     

(494) &  

(495)     # 

(496)    

(497)    #    

(498)     7  

(499)   

(500)  #      #  

(501)    

(502) . 

(503) 

(504) 

(505) 

(506)  # 

(507) &    

(508)   #  

(509)  

(510) 

(511)  8         

(512) 

(513)   # 

(514)   

(515) 

(516)  # 

(517)   

(518) 

(519) 

(520)   # 

(521) # #  

(522)  # 

(523)  

(524)  

(525)  

(526) 

(527)    

(528) 

(529) 

(530)   & 

(531)        

(532) 

(533)    # 

(534)    

(535)  

(536)      

(537)   

(538)       &0 *

(539)  &"$%"  # 

(540)  

(541)    $&"  #  

(542)   #

(543)       &. Figure 5. *   

(544)         

(545)   

(546) 

(547)      

(548)  contributions..  

(549)    

(550) 

(551) 

(552)    # 

(553)      # 

(554)    

(555)  

(556) $&4&

(557)   

(558)     

(559)  

(560)     

(561) &0  

(562)    

(563)  

(564)      

(565)    

(566)  # 

(567)   %

(568) 8

(569)  8    

(570)  

(571)     

(572)   

(573)   

(574)   #

(575) 

(576) 

(577)   

(578) &   # 

(579) 

(580)  

(581) 

(582) 

(583)    * 

(584)  

(585) 

(586)  .   < 

(587)     

(588)   

(589) 

(590)      

(591)   

(592) 

(593) 

(594)    

(595) #     

(596)   1

(597) 

(598)    

(599) & 0 #  

(600)   #  #

(601) 

(602)    #   

(603)     

(604)  

(605)  

(606)  

(607) 9 

(608) 9 

(609)  :9   

(610) 9  9 9

(611)  9    

(612)    #

(613)  

(614)    . 

(615) & !  3   4 

(616)    

(617)     9 9 

(618)  :9  

(619) ?9  9 9 

(620) 9  9 9  

(621)  

(622) &      

(623)   

(624)     8

(625)     

(626)       

(627)       #

(628)

(629)  

(630)        .   

(631) 

(632)  &    

(633)      

(634)  

(635)  

(636)  #  

(637)      

(638)  

(639) . 

(640)   

(641)  

(642) 

(643)      

(644)   

(645)         1 

(646) 

(647)  

(648)     & 

(649)   . 4 Discussion and conclusions 4.1 Vulnerability curves !  )   . 

(650)   # 

(651)      

(652)     

(653)     

(654)  & ; 

(655)    

(656)      #   

(657)  

(658)  

(659) 

(660) #

(661)   

(662) 

(663) 

(664) 

(665) 

(666)   # 

(667) & 0  8

(668)         

(669)      

(670) #

(671)     

(672)  

(673)  

(674)       

(675) #

(676) 

(677) 

(678) 

(679)  

(680)  

(681)  >$ &. 6.

(682) E3S Web of Conferences 7, 08007 (2016) FLOODrisk 2016 - 3rd European Conference on Flood Risk Management. DOI: 10.1051/ e3sconf/2016 0708007.  & 

(683)  

(684) 8 

(685) #  

(686)  

(687) 

(688) 

(689)    #  #   4(>    

(690)  

(691)    # 

(692)     

(693)    

(694)  

(695) 8    &  # 

(696) #. 

(697)     

(698)   # 

(699)        

(700)   

(701) 

(702)     

(703) &    

(704)  *  

(705) 61B  

(706)  <

(707)   

(708) C D98 E9 # 

(709) 9    ?99 9CD98 E 999  # 

(710) 9  &. 

(711)      

(712)  

(713)  #    

(714) 

(715)     

(716)     8  .      

(717)    

(718) 

(719)   

(720)   #

(721) 

(722) 

(723) 

(724)     

(725)      

(726)   

(727) 

(728) 

(729) & . Figure 6. Comparison among curves for poorly finished, intermediate and richly finished buildings (short duration event).. Figure 8. Vulnerability map.. Figure 7. Comparison among curves for poorly finished, intermediate and richly finished buildings (long duration event).. . 0

(730) 

(731)     

(732)  

(733)  

(734)  

(735)        

(736)   

(737)    8  #/

(738)  

(739) 

(740)       

(741) 

(742)  #  

(743)    @#9 

(744)  9

(745)  99  

(746) :9  A?9

(747)  9

(748)  9  

(749) &. .  . 4.2 Exposure-Vulnerability analysis 0

(750) 

(751) 8   

(752)   

(753)     

(754) 

(755) 

(756)  

(757)  

(758)       *  

(759)    

(760) 

(761)   

(762)   

(763)  &      8     # 

(764)      

(765)    

(766)  

(767)  #     

(768)   

(769) 

(770)    

(771)  

(772)    # 

(773)      & 2     # 

(774)   

(775)  

(776)    

(777)   #  

(778)    

(779)  * 

(780)   

(781)     

(782) 

(783) 8   &   

(784)    # 

(785)       # 

(786)   #

(787)         68 1B # 

(788)  

(789) 8      

(790)    

(791) 

(792)    

(793)  

(794) 

(795) 

(796)   #    #

(797)  

(798) .  . . . .  .  .  .  . . 

(799)

(800) . . . . 

(801)

(802) .  .      . . 

(803) 

(804) .  .      . . 

(805) 

(806) .  . 

(807)      . 

(808) 

(809) . .       . 

(810) 

(811) . .         . 

(812)

(813) 

(814) . . 

(815) 

(816) .  . 

(817)  

(818)     . 

(819) 

(820) .  .   

(821)     

(822) . 

(823) 

(824) . . 

(825) 

(826) . . 

(827) . . . 

(828)

(829) . .        . 

(830)

(831) .  .         . . .    . . . . . .       . . . Table 4 Exposure-Vulnerability matrix with banded vulnerability assessment (2011 flooding event). 7. . .

(832) E3S Web of Conferences 7, 08007 (2016) FLOODrisk 2016 - 3rd European Conference on Flood Risk Management. DOI: 10.1051/ e3sconf/2016 0708007. 13 Kok, M., Huizinga, H. J., Vrouwenfelder, A. C. W. M. and Berendregt, A. (2004) Damage and casualties caused by flooding, Highways and Hydraulics Engineering Department. 14 Meyer, V. and Messner, F. (2005) National Flood Damage Evaluation - Methods A Review of Applied Methods in England, the Netherlands, the Czech Republic and Germany. UFZ-Diskuss. 212005. 15 Varnes, D. J. (1984) Landslide hazard zonation: a review of principles and practice. 16 Fell, R. (1994) Landslide risk assessment and acceptable risk. Can. Geotech. J. 31, 261272. 17 Regione Sicilia. (2004) Piano Stralcio di bacino per ,

(833)

(834)  -     .   /   Relazione Generale. 18 Aronica, G., Tucciarelli, T. and Nasello, C. (1998) 2D multilevel model for flood wave propagation in flood-affected areas. J. Water Resour. Plan. Manag. 124, 210217. 19 0 ,!/!1 8!9!):: ;/!<

(835)   D., Khan, D. M. and Veerbeek, W. (2016) From hazard to impact: the flood damage assessment tools for mega cities. Nat. Hazards in press.. 5 Conclusion 

(836) 

(837)      

(838)      

(839)   

(840) 

(841)  #   # 

(842)       

(843)  

(844)  

(845)     

(846)    #

(847)       # 

(848) # 

(849) &  

(850) 

(851)   61B 

(852) 8       #

(853)

(854)   

(855)    

(856) 

(857)    

(858)  

(859)   

(860)   #          

(861) 

(862)  

(863)  

(864)     

(865) 

(866) 

(867)  

(868) 

(869) 

(870) 

(871)   

(872) 

(873) 

(874)  

(875)   # 

(876)   #  & 

(877)         

(878) 

(879)  

(880)    1

(881) 

(882)     # 

(883)

(884) 

(885)    

(886) 

(887) 

(888) 

Riferimenti

Documenti correlati

Chella et al.(Eds.): Biologically Inspired Cognitive Architectures 2012, Springer Advances in Intelligent Systems and Computing, 239-246, 2013.. A biomimetic upper body for

(Examples are «I wish you wouldn't work so often in the evenings» or «I wish you'd visit your grandparents more often».) Guilt easily turns into anger at the person who makes

To improve the relevance of the AIGA method, this paper shows the benefits of the combination of hydrological warnings with an exposure index, to be able to assess the risk

To produce the larger area flood maps, the surface water as calculated by the relatively coarse WFLOW hydrologic model was scaled down to the target 12m resolution by using a

This case study has shown that even though the local political composition of the problem would not directly prevent the development of a sense of risk, it would still not be

This case study has shown that even though the local political composition of the problem would not directly prevent the development of a sense of risk, it would still not be enough

Centre for Floods, Communities and Resilience, University of the West of England, Bristol,UK Centre for Cultural Policy Studies, University of Warwick, Coventry,UK... Transactions

Consequence = Vulnerability x Intensity The definition of risk can therefore be expressed through the evaluation of three components RiskVIP model: Risk = Vulnerability x Intensity