دورية أكاديمية

Application of GIS and IOT Technology-Based MCDM for Disaster Risk Management: Methods and Case Study.

التفاصيل البيبلوغرافية
العنوان: Application of GIS and IOT Technology-Based MCDM for Disaster Risk Management: Methods and Case Study.
المؤلفون: AbdelAziz, Nabil M., Eldrandaly, Khalid A., Al-Saeed, Safa, Gamal, Abduallah
المصدر: Decision Making: Applications in Management & Engineering (DMAME); Apr2024, Vol. 7 Issue 1, p1-36, 36p
مصطلحات موضوعية: EMERGENCY management, FLOODS, NATURAL disasters, INTERNET of things, GEOGRAPHIC information systems
مستخلص: This study proposes a two-phase framework to enhance disaster management strategies for flooding using Geographic Information System (GIS) and Internet of Things (IoT) real-time data obtained using drones. The first phase aims to predict the governorate most prone to flooding using GIS and four forecasting models. The second phase involves selecting optimal locations for drone takeoff and landing using GIS with multi-criteria decision making. The neutrosophic ordinal priority approach is used to weight the criteria for selecting the best locations. A case study from the Egyptian Mediterranean Coast is used to measure the effectiveness and applicability of the framework. Results indicate that the Port Said governorate is the most vulnerable to flooding, and the top 10 suitable sites for drone takeoff and landing are suggested for this governorate. The limitations of the case study are discussed, such as data availability and reliability, as well as potential biases in the methodology. This study suggests future research directions to address these limitations and enhance the effectiveness of the proposed framework. Overall, this study contributes to the field of disaster risk management by providing a practical and innovative approach to enhance disaster preparedness and response using GIS and IoT technologies. [ABSTRACT FROM AUTHOR]
Copyright of Decision Making: Applications in Management & Engineering (DMAME) is the property of Regional Association for Security & Crisis Management and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
قاعدة البيانات: Complementary Index
الوصف
تدمد:25606018
DOI:10.31181/dmame712024929