ciat threats aml tool tutorial leonardo sotomayor september, 2007

14
CIAT THREATS AML TOOL TUTORIAL Leonardo Sotomayor September, 2007

Upload: aubrie-fleming

Post on 19-Jan-2016

217 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CIAT THREATS AML TOOL TUTORIAL Leonardo Sotomayor September, 2007

CIAT THREATS AML TOOL TUTORIAL

Leonardo Sotomayor

September, 2007

Page 2: CIAT THREATS AML TOOL TUTORIAL Leonardo Sotomayor September, 2007

Before You Start You Will Need:

1. Analysis Area in GRID form named “mask” at same resolution & projection than other layers

2. Current status GRID or Shape File for the threat being analyzed at same resolution & projection than other layers

3. Distance of Impact for the threat in KM

4. Decay Curve Type to be used

Page 3: CIAT THREATS AML TOOL TUTORIAL Leonardo Sotomayor September, 2007

Before You Start You Will Need:

5. If Kernel file has not been defined, use Kernel Tool to create a new Kernel or use pre-defined Kernels for Distance and Curve Type

6. Relation GRID (between ecosystems and specific threat) named “rel_xxx”, in a folder named “relations” at same resolution & projection than other layers

7. Magnitude GRID (of threat by ecosystem) named “mag_xxx”, in a folder named “magnitudes” at same resolution & projection than other layers

Page 4: CIAT THREATS AML TOOL TUTORIAL Leonardo Sotomayor September, 2007

Distance and Decay Curves Used

• Based on references and discussions detailed in the report, we used the following parameters in the distance and decay curves used:

Distance of Impact Decay Curve Used

Accessibility

Conversion to Agriculture 5 3

Fire 5 1

Grazing Pressure 5 1

Infrastructure 5 (Airports), 1 (Dams) 3

Oil and Gas 5 3

Recent Conversion 5 3

Page 5: CIAT THREATS AML TOOL TUTORIAL Leonardo Sotomayor September, 2007

The Kernel

• Based on the distance and curve type, you can create a new dispersion model or kernel for each threat

• You can use the predefined kernels in the “kernels” folder, or you can create new ones with the kernel excel tool

• Just add Distance in KM and Curve Type

Page 6: CIAT THREATS AML TOOL TUTORIAL Leonardo Sotomayor September, 2007

Start ArcINFO Workstation

Page 7: CIAT THREATS AML TOOL TUTORIAL Leonardo Sotomayor September, 2007

How to Use this Tutorial

• To use this Tutorial, follow the following 3 major steps. Each step has a series of sections that need to be filled by the user, see below for details:Arc program and AML prompt (in black)

Sections filled by user (in blue)Descriptions of sections filled by user (in red)

• Arc: w c:/threat (CHANGE WORKSPACE TO WHERE ANALYSIS WILL START)

Page 8: CIAT THREATS AML TOOL TUTORIAL Leonardo Sotomayor September, 2007

Step 1: Workspace & Input Data• Arc: w c:/threat (CHANGE WORKSPACE TO WHERE ANALYSIS WILL START)• Arc: grid (CHANGE TOOL TO GRID)Copyright (C) 1982-2006 Environmental Systems Research Institute, Inc.All rights reserved.GRID 9.2 (Sun Sep 17 16:05:34 PDT 2006)

• Grid: &r tnc_threats_analysis.aml (START AML TOOL)--------------------------------------------------------------------TNC Threat Model for South America-------------------------------Produced by CIAT 2006------------------------------------------------------------------------------• Please provide the name of the threat you wish to analyse (no spaces): axx (NAME OR CODE OF THE

THREAT YOU ARE WORKING WITH, THIS WILL CREATE A WORKSPACE WHERE ALL RESULTS WILL BE WRITTEN)

WARNING: New location is not a workspace.

• Is your current status data in "GRID" or "SHAPEFILE" format?: grid (DEFINE IF THREAT LAYER IS GRID OR SHAPEFILE)

• Please type the name of the grid with full path info, e.g. c:\workspace\threatgrid: c:/threat/accror (ADD PATH AND NAME OF THE THREAT LAYER)

Running... 100% (PROCESS STARTS, USES MASK OF THE AREA OF ANALYSIS SET IN THE WORSKPACE TO SET ANALYSIS WINDOW OF THE THREAT AREA)

Page 9: CIAT THREATS AML TOOL TUTORIAL Leonardo Sotomayor September, 2007

Step 2: Option 1 if data is in Decimal Degrees

• If data is projected to decimal degrees and has projection information, the process will continue with the following information being displayed on screen (you don’t need to do anything):

• **************************************************• * The INPUT projection has been defined. *• **************************************************• Use OUTPUT to define the output projection and END• to finish.

• Inversibility is 100 per cent• Project...

Page 10: CIAT THREATS AML TOOL TUTORIAL Leonardo Sotomayor September, 2007

Step 2: Option 2 if data Does NOT Have Projection Definition

• If your data does not have a projection definition, you will need to define the projection using the arc tool projectdefine

• For best results, please use data that has a defined projection, preferably in decimal degrees

Page 11: CIAT THREATS AML TOOL TUTORIAL Leonardo Sotomayor September, 2007

Step 3: Distance, Curve, Magnitude, Relations & Kernel Definition

• What is the maximum distance that the threat might occur over (in km)?: 2 (ADD THE DISTANCE OF IMPACT OF THIS THREAT)

• What kind of curve over distance does the threat have? (1 = Fast Decay, 2 = Linear Decay, 3 = Slow Decay, 4 = No Decay?: 3 (SELECT THE DECAY CURVE THAT APPLIES TO THREAT)

• The kernel file does not exist. Please generate the file and provide the full path and filename: (e.g. c:\workspace\kernelfile.asc) : c:/threat/kernel_2km_type_3.asc (TYPE THE FILE NAME OF THE KERNEL AS IT FITS THE SPECIFIC THREAT, CHOOSE THE APPROPRIATE KERNEL FILE FROM THE “KERNELS” FOLDER, IF THIS “KERNELS” FOLDER EXISTS, THE AML WILL LOCATE THE APPROPRIATE FILE)

• The magnitudes grid does not exist. Please generate the grid and provide the full path and file name:: (TYPE THE PATH AND NAME OF THE MAGNITUDES GRID THAT IS APPROPRIATE TO THE THREAT, THIS APPEARS IF THE GRID HAS A DIFFERENT NAME OR PATH THAN THE ONE IN THE AML)

• The relations grid does not exist. Please generate the grid and provide the full path and file name:: (TYPE THE PATH AND NAME OF THE RELATIONS GRID THAT IS APPROPRIATE TO THE THREAT, THIS APPEARS IF THE GRID HAS A DIFFERENT NAME OR PATH THAN THE ONE IN THE AML)

Page 12: CIAT THREATS AML TOOL TUTORIAL Leonardo Sotomayor September, 2007

RESULTS

• The AML process will deliver 7 files:– "threat"_dd - grid of current status in decimal degrees, WGS84– "threat"_mt - grid of current status in equal area meters

projection (Lambert)– "threat"_foc_mt - grid of the threat surface taking into account

neighborhood cells using the kernel, meters projection– "threat"_foc_dd - grid of the threat surface taking into account

neighborhood cells using the kernel, decimal degrees projection– "threat"_ind_dd - indexed threat surface 0 - 1 of unadjusted focal

result– "threat"_rel_dd - threat surface having taken into account the

ecosystem relation to the threat– "threat"_mag_dd - threat surface having taken into account the

ecosystem relation and magnitude to the threat

Page 13: CIAT THREATS AML TOOL TUTORIAL Leonardo Sotomayor September, 2007

FINAL STEP

• Run the Vulnerability AML to create a grid with threat values from 0-3 adjusted to each ecosystem occurrence

• The AML outputs the threat score, based on aggregation of the threat surface to each occurrence

• You need a threat surface ("threat"_mag_dd ) and an ecosystem occurrence grid named “occurrence” in the same path as the AML

Page 14: CIAT THREATS AML TOOL TUTORIAL Leonardo Sotomayor September, 2007

THREAT VULNERABILITY

Final GRID is called “threat”_score