Susceptibility models Sample Clauses

Susceptibility models. To evaluate the influence of land use change on landslide spatial occurrence we prepared three single models and one combined susceptibility zonation through different multivariate statistical analysis following the procedure proposed by Xxxxx et al. (2010) and further implemented during the project (Fig. 3.2). The prototype SW for regional landslide susceptibility modelling and zonations has been delivered and will be discussed in detail in the D6.2 “Prototype SW for regional landslide susceptibility modelling”. The model exploits different methods of multivariate statistical classification: (i) linear discriminant analysis model (LDA); (ii) quadratic linear discriminant analysis model (QDA); (iii) logistic regression model (LRM); and (iv) self-optimizing neural network model (NNM). Moreover, the model considers the combination (CFM) of the single modeling susceptibility results (LDA, QDA, LRM, NNM) or some of them exploiting a logistic regression approach. The model can be applied at different scales and can use polygon or regular pixel-based mapping units. The analysis requires two input variables for each cartographic unit: a binary grouping variable (i.e. dependent) showing the absence or presence (respectively 0 and 1) of a landslide, and a set of explanatory variables (i.e., independent). The explanatory variables describe the environmental characteristics for each cartographic unit.
AutoNDA by SimpleDocs

Related to Susceptibility models

  • Geological and archaeological finds It is expressly agreed that mining, geological or archaeological rights do not form part of this Agreement with the Contractor for the Works, and the Contractor hereby acknowledges that it shall not have any mining rights or interest in the underlying minerals, fossils, antiquities, structures or other remnants or things either of particular geological or archaeological interest and that such rights, interest and property on or under the Site shall vest in and belong to the Authority or the concerned Government Instrumentality. The Contractor shall take all reasonable precautions to prevent its workmen or any other person from removing or damaging such interest or property and shall inform the Authority forthwith of the discovery thereof and comply with such instructions as the concerned Government Instrumentality may reasonably give for the removal of such property. For the avoidance of doubt, it is agreed that any reasonable expenses incurred by the Contractor hereunder shall be reimbursed by the Authority. It is also agreed that the Authority shall procure that the instructions hereunder are issued by the concerned Government Instrumentality within a reasonable period.

  • Geological and Archeological Specimens If, during the execution of the Work, the Contractor, any Subcontractor, or any servant, employee, or agent of either should uncover any valuable material or materials, such as, but not limited to, treasure trove, geological specimens, archival material, archeological specimens, or ore, the Contractor acknowledges that title to the foregoing is vested in the Owner. The Contractor shall notify the Owner upon the discovery of any of the foregoing, shall take reasonable steps to safeguard it, and seek further instruction from the Design Professional. Any additional cost incurred by the Contractor shall be addressed under the provision for changed conditions. The Contractor agrees that the Geological and Water Resources Division and the Historic Preservation Division of the Georgia Department of Natural Resources may inspect the Work at reasonable times.

  • Corrective Measures If the Participating Generator fails to meet or maintain the requirements set forth in this Agreement and/or the CAISO Tariff, the CAISO shall be permitted to take any of the measures, contained or referenced in the CAISO Tariff, which the CAISO deems to be necessary to correct the situation.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • ARCHAEOLOGY Lessee shall not destroy, disturb, mar, collect, remove or alter any prehistoric or historic resources of any kind on Weld County lands as provided by law. These resources include, but are not limited to, all artifacts of stone, wood or metal, pictographs, structures, and bones. A discovery of anything of prehistoric or historic nature shall be reported to Lessor or the State of Colorado Archaeologist immediately.

  • CORRECTIVE MEASURE The contractor shall repair any deficiencies in excess of the performance guideline.

  • Diagnosis For a condition to be considered a covered illness or disorder, copies of laboratory tests results, X-rays, or any other report or result of clinical examinations on which the diagnosis was based, are required as part of the positive diagnosis by a physician.

  • Abuse, Neglect, Exploitation Grantee will;

  • Non-Grievability No dispute over a claim for any benefits extended by this Health and Welfare Fund shall be subject to the grievance procedure.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

Time is Money Join Law Insider Premium to draft better contracts faster.