wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

GIS in Mapping and landslide alert in Bangladesh

profile
Aditi Bavaliya
Jan 27, 2023
0 Likes
0 Discussions
132 Reads

Around 700.000 Rohingya refugees have crossed the border between Mynamar and Bangladesh and live in refugee camps in the landslide exposed areas in eastern part of Bangladesh. With support from the Ministry of The Norwegian Foreign Affairs, NGI did mapping and installed many avalanche warning systems between 2009-12. These systems can predict rainfall induced landslides, and have thereby saved many lives in landslide prone areas. The United Nations Office in Bangladesh is now looking to expand these systems for enhanced landslide management. All of this wouldn’t have been possible without GIS services, which has made such advancements a reality.


Comments ()


Sign in

Read Next

The Importance of Financial Literacy for College Students

Blog banner

OS ASSIGNMENT

Blog banner

gis substation

Blog banner

Buffer Overflow

Blog banner

Introduction to Data Science: Life Cycle & Applications

Blog banner

?Why Social and Emotional Skills Matter More Than ABCs in Early Years?

Blog banner

MOVEMBER

Blog banner

IoT Evolution

Blog banner

Networking 101: How to Build Meaningful Connections in College

Blog banner

Short note on expert system

Blog banner

Man VS Nature

Blog banner

The Golden Temple , Amritsar

Blog banner

Mail merge

Blog banner

Digital Balance: Keeping Children Mindful in the Screen Age

Blog banner

Cyber Bullying - Neeta Vonkamuti

Blog banner

Key to success in Sports

Blog banner

Stop Racism

Blog banner

ProofHub

Blog banner

Cyber Forensics in a Ransomware Attack Recovery

Blog banner

How College Events Build Real-world Skills You Can’t Learn From Textbooks

Blog banner

Protect yourself from System Hacking with these Simple Steps

Blog banner

Why we fail after giving 100% ?

Blog banner

Monday. com App

Blog banner

File management

Blog banner

Why is it hard to design an Operating Systems ?

Blog banner

What are Virtual Machines

Blog banner

SECURITY TOOLS

Blog banner

Why we should do reading

Blog banner

Data Lake

Blog banner

Security issues

Blog banner

Internet of Things and cyber security

Blog banner

Mariana Trench: The deepest depths

Blog banner

Types of Malware in Cyber Security

Blog banner

OS Assignment 3

Blog banner

I/O Buffering

Blog banner

Building a Simple Doctor Appointment System in Common Lisp

Blog banner

What is a Dumpster Diving Attack?

Blog banner

 " Healing of Yoga "

Blog banner

Multithreading in Operating System

Blog banner

Topic: Sessions in Operating system

Blog banner

IS CONVERTING AMBITION INTO PROFESSION?

Blog banner

Deadlock and Starvation

Blog banner