• Title/Summary/Keyword: 취약시간

Search Result 878, Processing Time 0.03 seconds

Fragility Curve Evaluation of Reinforced Concrete Shear Wall Structures according to Various Nonlinear Seismic Analysis Methods (다양한 비선형지진해석방법에 따른 철근콘크리트 전단벽 구조물의 취약도곡선 평가)

  • Jang, Dong-Hui;Song, Jong-Keol;Kang, Sung-Lib;Park, Chang-Ho
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.15 no.4
    • /
    • pp.1-12
    • /
    • 2011
  • Seismic fragility analysis has been developed to evaluate the seismic performance of existing nuclear power plants, but now its applicability has been extended to buildings and bridges. In general, the seismic fragility curves are evaluated from the nonlinear time-history analysis (THA) using many earthquake ground motions. Seismic fragility analysis using the nonlinear THA requires a time consuming process of structural modeling and analysis. To overcome this shortcoming of the nonlinear THA, simplified methods such as the displacement coefficient method (DCM) and the capacity spectrum method (CSM) are used for the seismic fragility analysis. In order to evaluate the accuracy of the seismic fragility curve calculated by the DCM and the CSM, the seismic fragility curves of a reinforced concrete shear wall structure calculated by the DCM and CSM are compared with those calculated by the nonlinear THA. In order to construct a numerical fragility curve, 190 artificially generated ground motions corresponding to the design spectrum and the methodology proposed by Shinozuka et al. are used.

A Framework for Preventing and Counter-measuring Computer incidents (침해사고 대응 및 예방 프레임워크)

  • 이은영;김도환;박응기
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.730-732
    • /
    • 2003
  • 최근의 웜이나 바이러스로 인한 침해 사고는 다수의 불특정 시스템을 대상으로 하고 있으며 짧은 시간동안 다수의 시스템을 감염시킨다. 현재의 침해 사고의 처리는 시스템이 감염된 후 이를 처리하는 방식이나 이러한 방식으로는 짧은 시간 안에 급속도로 확산되는 침해사고를 막기가 힘들다. 본 논문에서는 칭해 사고의 효과적인 처리를 위한 새로운 프레임 워크를 제안하고자 한다. 평소에 관리하고자 하는 서버들의 정보를 수집하고 관리함으로써 새로운 취약점이 발견되었을 때 또는 침해 사고가 발생하였을 때 취약할 가능성이 있는 서버들을 신속히 파악하여, 취약점을 점검하는 도구를 생성하는데 필요한 공통 프레임 워크를 개발하여 보다 빠르게 취약점을 점검하는 도구를 생성, 이론 이용해 취약할 가능성이 있는 서버들을 점검한다. 점검결과 감염된 시스템은 치료하고 취약하나 감염이 되지 않은 시스템은 취약점을 제거한다. 제안된 프레임 워크는 명소에 서버들의 정보를 수집함으로써 침해사고가 발생하였을 감염 가능성이 있는 서버들을 빠르게 확인 할 수 있다. 또한 취약점 점검 도구 생성 프로그램을 사용함으로써 점검 코드의 삽입만으로 쉽게 취약점 점검 도구를 생성, 확산되기 전에 타 시스템에서 동종의 침입을 예방할 수 있다.

  • PDF

SOA Vulnerability Evaluation using Run-Time Dependency Measurement (실행시간 의존성 측정을 통한 SOA 취약성 평가)

  • Kim, Yu-Kyong;Doh, Kyung-Goo
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.2
    • /
    • pp.129-142
    • /
    • 2011
  • Traditionally research in Service Oriented Architecture(SOA) security has focused primarily on exploiting standards and solutions separately. There exists no unified methodology for SOA security to manage risks at the enterprise level. It needs to analyze preliminarily security threats and to manage enterprise risks by identifying vulnerabilities of SOA. In this paper, we propose a metric-based vulnerability assessment method using dynamic properties of services in SOA. The method is to assess vulnerability at the architecture level as well as the service level by measuring run-time dependency between services. The run-time dependency between services is an important characteristic to understand which services are affected by a vulnerable service. All services which directly or indirectly depend on the vulnerable service are exposed to the risk. Thus run-time dependency is a good indicator of vulnerability of SOA.

Vulnerability Index for Workplace Spot Inspection (취약지수를 이용한 사업장 근로감독과 지방노동관서 평가)

  • Kim, Sung Tai;Park, Wonju;Jeon, Yongil
    • Journal of Labour Economics
    • /
    • v.34 no.3
    • /
    • pp.29-58
    • /
    • 2011
  • Using careful background research and methodology, we proposed a revised sectoral index of vulnerability that is directly applied to two central labor examples: working hours and minimum wages. The valued calculated by each specific index represent the degree of weakness in corresponding conditions at the level of workplace units. Our proposed vulnerability index promises to be applicable to all business units under labor spot inspection. Also, it can be easily updated as the business environment evolves. The index is useful in selecting certain groups of business units and in evaluating the effectiveness of each regional government office.

  • PDF

Seismic Fragility Analysis by Key Components of a Two-pylon Concrete Cable-stayed Bridge (2주탑 콘크리트 사장교의 주요 부재 지진 취약도 분석)

  • Shin, Yeon-Woo;Hong, Ki-Nam;Kwon, Yong-Min;Yeon, Yeong-Mo
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.24 no.4
    • /
    • pp.26-37
    • /
    • 2020
  • This study intends to present a fragility analysis method suitable for concrete cable-stayed bridges by performing an analysis reflecting design criteria and material characteristics from the results of inelastic time-history analysis. In order to obtain the fragility curve of the cable-stayed bridge, the limit state of the main component of the cable-stayed bridge is determined, and the damage state is classified by comparing it with the response value based on inelastic time history analysis. The seismic fragility curve of the cable-stayed bridge was made by obtaining the probability of damage to PGA that the dynamic response of the vulnerable parts to input ground motion would exceed the limit state of each structural member. According to the pylon's fragility curve, the probability of moderate damage at 0.5g is 32% for the longitudinal direction, while 7% for the transversal direction, indicating that the probability of damage in the longitudinal direction is higher in the same PGA than in the transversal direction. The seismic fragility curve of the connections showed a very high probability of damage, meaning that damage to the connections caused by earthquakes is very sensitive compared to damage to the pylon and cables. The cable's seismic fragility curve also showed that the probability of complete damage state after moderate damage state gradually decreased, resulting in less than 30% probability of complete damage at 2.0g.

Earthquake Fragility Analysis of a Buried Gas Pipeline (매설가스배관의 지진 취약도 해석)

  • Lee, Do-Hyung;Jeon, Jeong-Moon;Oh, Jang-Kyun;Lee, Du-Ho
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.14 no.5
    • /
    • pp.65-76
    • /
    • 2010
  • In this paper, earthquake fragility analysis has been comparatively performed with regard to a buried gas pipeline of API X65 which has been widely used in Korea. For this purpose, a nonlinear time-history analyses has been carried out for 15 different analytical models of a buried gas pipeline in terms of the selected 12 sets of earthquake ground motions with 0.1g of scaling interval. Following that, earthquake fragility analyses have been conducted using the maximum axial strain of the pipeline obtained from the nonlinear time-history analyses. Parameters under consideration for subsequent earthquake fragility analyses are soil conditions, end-restraint conditions, burial depth and the type of pipeline. Comparative analyses reveal that whereas the first three parameters influence the fragility curves, particularly soil conditions amongst the three parameters, the last parameter has a little effect on the curves. In all, the present study can be considered as a benchmark fragility analysis of a buried gas pipeline in the absence of an earthquake fragility analysis of the pipeline and thus is expected to be a useful source regarding earthquake fragility analyses of a buried gas pipelines.

A Study of Origin and Destination Decision for a Direct Bus Line in a City with Transit Mobility and Potential Demand (대중교통 이동성과 잠재수요를 이용한 도시 내 지역 간 직결노선버스 기종점 선정에 관한 연구)

  • Chang, Kyung Uk;Kim, Hwang Bae;Park, Hong Sik;Park, Seon Bok
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.31 no.4D
    • /
    • pp.547-553
    • /
    • 2011
  • This study has redefined the concepts of mobility indexes and potential demand, standards to evaluate areas with the worst public transportation system and applied the relevant indexes to select the areas with the worst public transportation mobility and present a method to set direct public transportation lines between these regions. The mobility indexes and indexes to evaluate potential demand were applied to select the regions with the worst public transportation systems in four metropolitan cities and case studies were carried out on direct lines provided between these regions. The analysis results showed that in public transportation mobility blind spots, public transportation takes much longer than driving an automobile or public transportation services are not provided. In addition, the analysis showed that a direct lines system to solve such worst off regions should be built to have public transportation take as much time as driving an automobile by establishing lines for automobiles only, minimize time lost from hopping up and down a bus and maximize connections.

A Study on the Safety Management of Vulnerable Time in the Construction Site by AHP Analysis (AHP 분석기법을 이용한 건설현장 취약시간대 안전관리에 관한 연구)

  • Lee, Munho;Yoon, Younggeun;Oh, Taekeun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.5
    • /
    • pp.597-602
    • /
    • 2022
  • In construction sites, many accidents occur without supervisors during night work, early work, and lunchtime work outside of regular working hours. The purpose of this study is to measure the safety level of workers and to provide basic data for preventing accidents during vulnerable times by analyzing the opinions of expert groups on working conditions. Working conditions were divided into four areas: basic conditions, physical environment, social environment, and physiological factors. After examining the correlation between the priority considerations determined by Analytic Hierarchy Process (AHP) and the safety level of workers investigated in advance, management plans for each factor was derived.

Fuzzing Tool for Android Application Vulnerability (안드로이드 앱 취약점 점검 도구 개발)

  • Kim, Sangwho;Jo, Jegyeong;Ryou, Jaechul
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.04a
    • /
    • pp.424-425
    • /
    • 2014
  • 2014년 가트너에서 조사된 통계 자료에 의하면 스마트폰 사용자 4명중 3명은 안드로이드인 것으로 나타났다. 즉, 안드로이드에서 취약점이 발생할 경우 다른 스마트폰 OS에서 취약점이 발생할 때보다 3배 이상의 피해가 예상된다고 할 수 있다. 따라서 안드로이드 환경에서 앱에 대한 취약점을 찾고 조치를 취해야하는 작업이 지속되어야 한다. 그러나 취약점을 찾고 조치를 취하기 위해 분석가는 많은 시간을 소모하는데 비해 앱의 증가 속도는 매우 빨라 취약점 점검을 위한 자동화 도구는 필수적일 수밖에 없다. 이에 본 연구는 안드로이드 환경에서 작동하는 앱을 대상으로 취약점 점검을 수행하는 도구를 개발하고 연구하였다.

Evaluation of Capacity Spectrum Methods for Seismic Fragility Analysis of Bridges (교량의 지진 취약도 해석 시 사용되는 성능 스펙트럼 기법의 평가)

  • Kim, Sang-Hoon;Yi, Jin-Hak;Kim, Ho-Kyung
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.8 no.1
    • /
    • pp.67-76
    • /
    • 2004
  • This study presents the evaluation of CSM(Capacity Spectrum Method, ATC-40) in developing fragility curves for a sample concrete bridge. The CSM is originally developed as one of the simplified procedures for building structures, while this study adopts the CSM to develop fragility curves of bridge structures. Four(4) different approaches are demonstrated and the fragility curves developed are compared those by the nonlinear time history analysis. Fragility curves in this study are represented by lognormal distribution functions with two parameters and developed as a function of PGA. The sixty(60) ground acceleration time histories for the Los Angeles area developed for the Federal Emergency Management Agency (FEMA) SAC(SEAOC-ATC-CUREe) steel project are used for the bridge analysis. The comparison of fragility curves by the CSM with those by the time history analysis indicates that the agreement is excellent for one of the methods investigated in this study. In this respect. it is recommended that the demand spectrum might be improved according to the guidelines suggested in this study. However, this observation might not always apply, depending on the details of specific bridge characteristic