Home| Contact Us| New Journals| Browse Journals| Journal Prices| For Authors|

Print ISSN:
Online ISSN:


  About JDP
  DLINE Portal Home
Home
Aims & Scope
Editorial Board
Current Issue
Next Issue
Previous Issue
Sample Issue
Upcoming Conferences
Self-archiving policy
Alert Services
Be a Reviewer
Publisher
Paper Submission
Subscription
Contact us
 
  How To Order
  Order Online
Price Information
Request for Complimentary
Print Copy
 
  For Authors
  Guidelines for Contributors
Online Submission
Call for Papers
Author Rights
 
 
RELATED JOURNALS
Journal of Digital Information Management (JDIM)
Journal of Multimedia Processing and Technologies (JMPT)
International Journal of Web Application (IJWA)

 

 
Journal of Data Processing
 

Vulnerability Assessment Data Processing in Different Weather Conditions
Cezar Ionescu and Patrik Jansson
Potsdam Institute for Climate Impact Research Telegrafenberg A31, 14473 Potsdam, Germany., 1Potsdam Institute for Climate Impact Research Telegrafenberg A31, 14473 Potsdam, Germany
Abstract: Higher-order property comes into play in some aspects of climatological impact research. For instance, vulnerability measures, which are essential in determining the vulnerability to climate change of different regions and places, must satisfy certain conditions best expressed by quantifying the overall increasing functions of the appropriate type. This type of property is often considered to be “cognitive”, but for the measures used in practice, it is relatively easy to code the property as a dependent type and prove it correct. In scientific programming, it is common to care about the “correctness” of the program up to the “implicit”: for example, the program would perform as expected, for example, if real numbers were used instead of floating point values. These “counterfactuals” are impossible to test, but they are easy to code and prove as types. We show examples (encoded in AGDA) encountered in actual vulnerability assessment.
Keywords: Vulnerability Data Assessment, Climate Change, Weather Condition Measurement Vulnerability Assessment Data Processing in Different Weather Conditions
DOI:https://doi.org/10.6025/jdp/2024/14/1/21-33
Full_Text   PDF 1.21 MB   Download:   19  times
References:

[1] Ammann, P., Offutt, J. (2008). Introduction to Software Testing. Cambridge University Press.
[2] Bernardy, J.-P., Jansson, P., Claessen, K. (2010). Testing polymorphic properties. In A. Gordon (Ed.), European Symposium on Programming (Vol. 6012, pp. 125–144). Springer.
[3] Bishop, E., Bridges, D. (1985). Constructive Analysis. Springer, New York.
[4] Boldo, S., Melquiond, G. (2011). Flocq: A unified library for proving floating-point algorithms in Coq. In Proceedings of the 20th IEEE Symposium on Computer Arithmetic (pp. 243–252). IEEE CS Press.
[5] Brady, E. C. (2011). Idris — systems programming meets full dependent types. In Proc. 5th ACM workshop on Programming languages meets program verification, PLPV ’11 (pp. 43–54). ACM.
[6] Cannon, T., Twigg, J., Rowell, J. (2002). Social vulnerability, sustainable livelihoods and disasters (Technical Report). AON Benfield UCL Hazard Research Center. Retrieved from http:/ /www.abuhrc.org/Documents/Social vulnerability_sust_live.pdf
[7] Chakraborty, J., Tobin, G. A.., Montz, B. E. (2005). Population evacuation: Assessing spatial variability in geophysical risk and social vulnerability to natural hazards. Natural Hazards Review, 22–33.
[8] Claessen, K., Hughes, J. (2003). Specification based testing with QuickCheck. In The Fun of Programming (pp. 17–40). Palgrave.
[9] Feldbrügge, T., von Braun, J. (2002). Is the world becoming a more risky place? Trends in disasters and vulnerability to them (Technical Report No. 46). Center for Development Research, Bonn.
[10] Harrison, J. (1997). Floating point verification in HOL Light: The exponential function (Technical Report No. 428). University of Cambridge Computer Laboratory. Retrieved from http:// www.cl.cam.ac.uk/~jrh13/papers/tang.html
[11] Ionescu, C. (2009). Vulnerability Modeling and Monadic Dynamical Systems (PhD thesis). Department of Mathematics and Informatics, Free University Berlin.
[12] Krebbers, R., Spitters, B. (2011). Computer certified efficient exact reals in Coq. In J. H. Davenport et al. (Eds.), Calculemus/MKM (Vol. 6824, pp. 90–106). Springer.
[13] Lemmen, D., Warren, F. (Eds.). (2004). Climate Change Impacts and Adaptation: A Canadian Perspective. Natural Resources Canada.
[14] Lincke, D., Jansson, P., Zalewski, M.., Ionescu, C. (2009). Generic libraries in C++ with concepts from high-level domain descriptions in Haskell: A DSL for computational vulnerability assessment. In W. Taha (Ed.), IFIP Working Conf. on Domain Specific Languages (Vol. 5658, pp. 236–261). Springer.
[15] Lindblad, F.., Benke, M. (2006). A tool for automated theorem proving in Agda. In J.-C. Filliâtre et al. (Eds.), Types for Proofs and Programs, International Workshop, TYPES 2004 (pp. 154–169). Springer.
[16] McCarthy, J. J., Canziani, O., Leary, N. A., Dokken, D. J.., White, K. S. (Eds.). (2001). Climate Change 2001: Impacts, Adaptation and Vulnerability. Cambridge University Press.
[17] Metzger, M. J.., Schröter, D. (2006). Towards a spatially explicit and quantitative vulnerability assessment of environmental change in Europe. Regional Environmental Change, 6(4), 201– 216.
[18] Miner, P. S. (1995). Defining the IEEE-854 floating-point standard in PVS (Technical Memorandum No. 110167). NASA, Langley Research. Retrieved from http:// nasa1995.tpub.com/NASA-95-tm110167/
[19] Morgenstern, J.., Licata, D. R. (2010). Security-typed programming within dependently typed programming. In: Proceedings 15th ACM SIGPLAN international conference on Functional programming, ICFP ’10 (pp. 169–180). ACM.
[20] Myers, G. J. (2004). The Art of Software Testing (2nd ed., revised and updated by T. Badgett, T. M. Thomas., C. Sandler). John Wiley & Sons, Inc.
[21] Norell, U. (2007). Towards a Practical Programming Language Based on Dependent Type Theory (PhD thesis). Chalmers University of Technology.
[22] O’Connor, R. (2007). A monadic, functional implementation of real numbers. Mathematical Structures in Computer Science, 1, 129–159.
[23] O’Connor, R. (2008). Certified exact transcendental real number computation in Coq. In O. Ait Mohamed et al. (Eds.), Theorem Proving in Higher Order Logics (Vol. 5170, pp. 246–261). Springer.
[24] Oury, N.., Swierstra, W. (2008). The power of Pi. In: International Conference on Functional Programming (pp. 39–50). ACM.
[25] Pascal, B. (1909–14). Minor Works, translated by O. W. Wright (Vol. XLVIII, Part 2 of The Harvard classics). P.F. Collier & Son.
[26] The Agda Team. (2011). The Agda Wiki. Retrieved from http://wiki.portal.chalmers.se/ agda/pmwiki.php. Includes documentation, links to the Agda implementation and to the standard library.
[27] Thywissen, K. (2006). Components of risk, a comparative glossary. SOURCE - Studies Of the University: Research, Counsel, Education, 2.
[28] UN/ISDR (United Nations International Strategy for Disaster Reduction). (2004). Living with Risk. A Global Review of Disaster Reduction Initiatives. United Nations, Geneva.


Home | Aim & Scope | Editorial Board | Author Guidelines | Publisher | Subscription | Previous Issue | Contact Us |Upcoming Conferences|Sample Issues|Library Recommendation Form|

 

Copyright 2011 dline.info