• 제목/요약/키워드: 취약성 요소

Search Result 648, Processing Time 0.027 seconds

A Study on the Deduction of performance Point of Nonseismically Designed Reinforced Concrete Apartment (비내진 설계된 철근콘크리트 아파트의 성능점 도출에 관한 연구)

  • Kwon, Ki-Hyuk
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.5 no.4 s.19
    • /
    • pp.85-93
    • /
    • 2005
  • It has been commonly assumed that during the 21st century, the korean peninsula may suffer huge earthquake damage to people, society, and economic system. The recent report of "Seoul Earthquake Response model development" conducted by the city of Seoul indicated that a magnitude 6.3 earthquake possibly hit Seoul, the capital of Korea. However, due to the insufficient amount of study on seismic performance of structures reflecting the various types of element peculiar to Korea application of the currently available earthquake damage evaluation methods has limitations. In order to conduct various studies on seismic hazards that are suitable for the actual conditions in Korea, therefore, fundamental studies first have to be properly conducted. The purpose of this study is to serve as the basis of establishing a reliable earthquake damage estimation system, and to provide essential data for the seismic damage evaluation of nonseismically reinforced concrete apartment structures. In this study, a standard type of nonseismically reinforced concrete apartments has been determined based on an extensive survey and careful review of such structures in Korea, and their performance level on seismic loading has been estimated.

A Study on Application Methods of Drone Technology (드론기술 적용 방안 연구)

  • Kim, Hee-Wan
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.6
    • /
    • pp.601-608
    • /
    • 2017
  • In the fourth industrial revolution, drones are an important element to lead the industry by converging with information technology. Drones are developing various technologies by combining with communication / navigation / traffic management technology, control and detection / avoidance technology, sensor technology, SW and application technology. However, there are various problems in order to settle the drone technology. In this paper, it will be examined the problems of application of drones through application fields of drones, domestic and foreign cases, and core technologies of drones. The growth of the drone market requires improvement of laws and institutions. This paper proposed security vulnerability, privacy and safety problem in wireless communication, and present technical and management problems for drone service in the Korean environment in particular.

Performance Factor Analysis of Sensing-Data Estimation Algorithm for Walking Robots (보행 로봇을 위한 센서 추정 알고리즘의 성능인자 분석)

  • Shon, Woong-Hee;Yu, Seung-Nam;Lee, Sang-Ho;Han, Chang-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.11
    • /
    • pp.4087-4094
    • /
    • 2010
  • The sensor data which is measured by Quadruped robot is utilized to recognize the physical environment or other information and to control the posture and walking of robot system. In order to control the robot precisely, high accuracy of sensor data is required, most of these sensors however, belongs to expensive and low-durable products. Moreover, these are exposed excessive load operation in a field condition if it is applied to field robot system. This issue becomes more serious one when the robot system is manufactured as a mass product. As in this context, this study suggests a virtual sensor technology to alternate or assist the main sensor system. This scheme is realized by using back-propagation algorithm of neural network theory, and the quality of estimated sensor data could be improved through the algorithmic and hardware based treatments. This study performs the various trial to identify the effective parameters which effect to the quality and reliability of estimated sensor data and tries to show the possibility of proposed methodology.

The Role and Collaboration Model of Human and Artificial Intelligence Considering Human Factor in Financial Security (금융 보안에서 휴먼팩터를 고려한 인간과 인공지능의 역할 및 협업 모델)

  • Lee, Bo-Ra;Kim, In-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1563-1583
    • /
    • 2018
  • With the deregulation of electronic finance, FinTech has been revitalized. The discussion on artificial intelligence is active in the financial industry. However, there is a problem of increasing security threats behind new technologies. Security vulnerabilities have increased because we are more connected than before, and the channels and entities of the financial industry have diversified. Although there are technical and policy discussions on security, the essence of all discussions is human. Fundamentals of finance are trust and security, and attention to human factors is important. This study presents the role of human and artificial intelligence for financial security, respectively. Furthermore, this derives a collaborative model in which human and artificial intelligence complement each other's limitations. To support this, it first discusses the development of finance and IT, AI, human factors, and financial security threats. This study suggests that the security threats will intensify in the era of new technology, but it can overcome them by using machinery and technology.

A Verification Strategy for the Origin of Electronic Records (전자기록의 출처확인 지원전략)

  • Song, Byoungho
    • The Korean Journal of Archival Studies
    • /
    • no.25
    • /
    • pp.47-89
    • /
    • 2010
  • The target of managing electronic records should be the trusted record services to the end-users. The natural characteristics of electronic records yields the drawback in the authenticity aspect and in the integrity aspect, and current standards and methodologies have beed developed to treat this drawback. However the authenticity and the integrity concepts is hardly separated each other and too completed, so alternative "source" concept is introduced and a verification strategy for the origin of electronic records is discussed in this paper. According to this concept, current standards and methodologies may be criticized for the negligence of necessary information organizing/verification, the doubtful long-term verification, and the missing counter-strategy for the verification-failed records. To solve this, needed facters for origin verification is described, new preservation format divided into temporally-fluctuating (variable) part and immutable (fixed) part is proposed, and a strategy to prevent, avoidance, and detection/recovery important records is suggested.

Assessment of Climate Change Impact on Groundwater Level Behavior in Geum River Basin using SWAT (SWAT을 이용한 기후변화에 따른 금강유역의 지하수위 거동 평가)

  • Lee, Ji Wan;Jung, Chung Gil;Kim, Da Rae;Kim, Seong Joon
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2017.05a
    • /
    • pp.84-84
    • /
    • 2017
  • IPCC 4차 보고서(2007)에 따르면, 미래 기후변화로 인한 가장 취약한 부분으로 강수패턴의 시 공간 변화로 인한 가용 수자원의 변화를 선정하였으며 IPCC 5차 보고서(2014)는 특히 아시아지역은 지역별 대처전략수립, 물 재활용 등 수자원 다양화, 통합형 수자원 관리를 권고하였다. 지하수의 변화와 같이 흐름속도가 느리고 지속적인 요소의 경우에는 지표 기후변화의 영향을 쉽게 인식할 수 없으나 지표변화에 따른 변동이 지하수 환경에서 관측되기 시작하면 그 영향은 지표보다 훨씬 장기적으로 나타남에 따라 미래 기후변화에 따른 수자원의 효율적 관리를 위해서 지하수 거동에 대한 분석이 요구된다. 따라서 본 연구에서는 금강유역($9,865km^2$)을 대상으로 SWAT(Soil and Water Assessment Tool)을 이용하여 지표수와 지하수의 상호작용에 의한 물수지 분석을 수행하고, 기후변화에 따른 지하수 거동을 평가하였다. 유역의 물수지 분석을 위해 금강유역을 표준유역 단위로 구분하고, 기상자료, 다목적댐(대청댐, 용담댐)과 다기능보(공주보, 백제보, 세종보) 운영자료와, 국가지하수정보센터에서 관측 및 관리하고 있는 지하수위 관측 자료를 수집하였다. SWAT 모형의 신뢰성 있는 유출량 보정을 위해 금강유역 내 위치하는 다목적댐 및 다기능보의 실측 방류량을 이용하여 댐 운영모의를 고려하였고, 실측 지하수위, 토양수분 자료를 이용하여 모형의 보정(2005~2009)과 검증(2010~2015)을 실시하였다. 기후변화에 따른 지하수 거동 분석을 위해 기후변화 시나리오는 기상청의 HadGEM3-RA RCP 4.5와 8.5 시나리오를 적용하였으며, 기준년(1975-2005)년에 대해 2020s(2010-2039), 2050s(2040-2069), 2080s(2070-2099)의 지하수위 거동을 분석하였다.

  • PDF

Intrusion Detection System Based on Sequential Model in SOME/IP (SOME/IP 에서의 시퀀셜 모델 기반 침입탐지 시스템)

  • Kang, Yeonjae;Pi, Daekwon;Kim, Haerin;Lee, Sangho;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1171-1181
    • /
    • 2022
  • Front Collision-Avoidance Assist (FCA) or Smart Cruise Control (SCC) is installed in a modern vehicle, and the amount of data exchange between ECUs increases rapidly. Therefore, Automotive Ethernet, especially SOME/IP, which supports wide bandwidth and two-way communication, is widely adopted to overcome the bandwidth limitation of traditional CAN communication. SOME/IP is a standard protocol compatible with various automobile operating systems, and improves connectivity between components in the vehicle. However, no encryption or authentication process is defined in the SOME/IP protocol itself. Therefore, there is a need for a security study on the SOME/IP protocol. This paper proposes a deep learning-based intrusion detection system in SOME/IP and performs six attacks to confirm the performance of the intrusion detection system.

A study on the application of mission-based weapon system cybersecurity test and evaluation (임무 기반의 무기체계 사이버보안 시험평가 적용 연구)

  • Kim, Ik-jae;Kang, Ji-won;Shin, Dong-kyoo
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.71-81
    • /
    • 2021
  • This paper examines the ongoing research on ways to improve cybersecurity during the entire life cycle of weapons systems applied in advanced countries such as the United States, analyzes restrictions on obtaining domestic weapons systems, and presents effective security evaluation measures. By consistently performing mission-based risk assessment in the cybersecurity test and evaluation plan suitable for domestic circumstances at all stages of acquisition, important information is provided to major decision-making organizations in a timely manner to support decision-making, and to respond to identified vulnerabilities in cybersecurity. It is proposed to set the rules of engagement so that the protection measures can be verified, and a simulated invasion is proposed. In addition, the proposed cybersecurity test and evaluation system was compared with the domestic weapon system test and evaluation. Through this, the mission-based risk assessment element was grafted into the cybersecurity test and evaluation system research conducted so far to identify risks in a timely manner between acquisition projects, thereby supplementing the capability to support major decision-making.

Characteristic and Analysis of Fatigue Crack for Curved Girder Bridge based on the Stress Range Histerisis (실동이력에 기초한 곡선거더교의 피로균열 특성 및 분석)

  • Kwon, Soon Cheol;Kyung, Kab Soo;Kim, Da Young;Lee, Ha Sung
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.28 no.1A
    • /
    • pp.1-13
    • /
    • 2008
  • The web of a horizontally curved plate girder bridge is, in general, subject to not only longitudinal flexural in-plane stress but also out-of-plane bending stress. Therefore, the induced stresses in the fillet welded joints at the intersection of the web and flange plates in the curved plate girder bridge can be considerably high, and the welded joints of gusset plates connecting the main girder to the floor beams or sway bracings can be subject to much more severe situation than those in the ordinary straight plate girder bridge. In order to investigate the cause of fatigue crack occurred in a curved girder bridge that has been served in about 23 years, in this study, field load tests have been performed to obtain the stress characteristics at the welded joint under the real traffic flow. Using the test results, we have investigated the causes of the occurrence of various fatigue cracks and have estimated the fatigue lives for the cracks. In addition, the characteristics of structural behavior at welded joint of the curved girder bridge have been examined by comparing the FE analysis and the field test result.

Autoencoder-Based Defense Technique against One-Pixel Adversarial Attacks in Image Classification (이미지 분류를 위한 오토인코더 기반 One-Pixel 적대적 공격 방어기법)

  • Jeong-hyun Sim;Hyun-min Song
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.1087-1098
    • /
    • 2023
  • The rapid advancement of artificial intelligence (AI) technology has led to its proactive utilization across various fields. However, this widespread adoption of AI-based systems has raised concerns about the increasing threat of attacks on these systems. In particular, deep neural networks, commonly used in deep learning, have been found vulnerable to adversarial attacks that intentionally manipulate input data to induce model errors. In this study, we propose a method to protect image classification models from visually imperceptible One-Pixel attacks, where only a single pixel is altered in an image. The proposed defense technique utilizes an autoencoder model to remove potential threat elements from input images before forwarding them to the classification model. Experimental results, using the CIFAR-10 dataset, demonstrate that the autoencoder-based defense approach significantly improves the robustness of pretrained image classification models against One-Pixel attacks, with an average defense rate enhancement of 81.2%, all without the need for modifications to the existing models.