2014
DOI: 10.1016/j.ress.2013.09.005
|View full text |Cite
|
Sign up to set email alerts
|

Overtopping hazards to port activities: Application of a new methodology to risk management (POrt Risk MAnagement Tool)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 23 publications
(17 citation statements)
references
References 17 publications
0
15
0
Order By: Relevance
“…The methodology is based on the previous implementation of a risk analysis. Although, in the past few years, several examples dealing with risk assessment and vulnerability have been addressed in the Spanish ports (see Abanades et al, 2012;Alises et al, 2014, the method used in the present case includes 4 key terms combined to define risk levels: failure probability, failure intensity, vulnerability of the structure and related activities and exposure of the latter to the former. For each scenario, the risk analysis is repeated over all the mitigation/adaptation alternatives under study including the unaltered one so that a comparison can be done in terms of their risk levels and costs.…”
Section: Methodsmentioning
confidence: 99%
“…The methodology is based on the previous implementation of a risk analysis. Although, in the past few years, several examples dealing with risk assessment and vulnerability have been addressed in the Spanish ports (see Abanades et al, 2012;Alises et al, 2014, the method used in the present case includes 4 key terms combined to define risk levels: failure probability, failure intensity, vulnerability of the structure and related activities and exposure of the latter to the former. For each scenario, the risk analysis is repeated over all the mitigation/adaptation alternatives under study including the unaltered one so that a comparison can be done in terms of their risk levels and costs.…”
Section: Methodsmentioning
confidence: 99%
“…The hidden layer makes nonlinear transform between the input spaces and the hidden spaces generally expressed by formula (1).…”
Section: Rbf Artificial Neural Networkmentioning
confidence: 99%
“…During the past years, researches on the risk analysis of water hazard can be summarized as methods based on statistics, RS and GIS, the index system and the scenario simulation [1,9,19,[23][24][25]. Specially, in the study of statistics, Nott pointed out that historical flood data should be regarded as an important basis to assess the risk of regional floods [22]; Liu and Shi calculated the flood risk of the Yangtze River from 1911 to 1915 according to the index based on the historical data of Yangtze River from 1736 to 1911 [14]; Easterling et al gave a review on observed variability and trends in extreme climate events [6].…”
Section: Introductionmentioning
confidence: 99%
“…(b) Majority of the methods obtainable on risk practices are either industry-specialized or project-specific; it is hard to validate them in other disciplines. For example, the methodology presented by Alises is decidedly specific to port infrastructures and overtopping risk assessments [17]. Likewise, all the risk management methods reviewed by Stern [18] are software development or IT centric.…”
Section: Introductionmentioning
confidence: 99%