• Title/Summary/Keyword: 피해파급

Search Result 107, Processing Time 0.026 seconds

The probabilistic estimation of inundation region using a multiple logistic regression analysis (다중 Logistic 회귀분석을 통한 침수지역의 확률적 도출)

  • Jung, Minkyu;Kim, Jin-Guk;Uranchimeg, Sumiya;Kwon, Hyun-Han
    • Journal of Korea Water Resources Association
    • /
    • v.53 no.2
    • /
    • pp.121-129
    • /
    • 2020
  • The increase of impervious surface and development along the river due to urbanization not only causes an increase in the number of associated flood risk factors but also exacerbates flood damage, leading to difficulties in flood management. Flood control measures should be prioritized based on various geographical information in urban areas. In this study, a probabilistic flood hazard assessment was applied to flood-prone areas near an urban river. Flood hazard maps were alternatively considered and used to describe the expected inundation areas for a given set of predictors such as elevation, slope, runoff curve number, and distance to river. This study proposes a Bayesian logistic regression-based flood risk model that aims to provide a probabilistic risk metric such as population-at-risk (PAR). Finally, the logistic regression model demonstrates the probabilistic flood hazard maps for the entire area.

Success Run Test for Reliability Demonstration of 1100℃ Gas Turbine Blades (1100℃급 가스터빈 동익의 무고장시험을 통한 HCF 신뢰성 평가)

  • Lee, Dooyoung;Goo, Jaeryang;Kim, Doosoo;Kim, Donghwan
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.3 no.2
    • /
    • pp.107-111
    • /
    • 2017
  • The reliability on high cycle fatigue damage mechanism for new blades manufactured by reverse-engineering is demonstrated by success-run test. Turbine blades always experience various dynamic loads in turbine operation, as well as being in resonance condition and forced by fluid-induced vibrations mostly during run-up/down, which may accumulate high cycle damage to the blades. The accidents caused by blade failure especially incur not only a lot of troubles to the machinery but also huge financial losses. Therefore it is necessary to verify the reliability of blades in advance for the safe use. The success run test for the reliability demonstration is designed and performed for the new blades using the technique known as resonant high cycle fatigue testing.

A Study on IT Based Risk Management System Development for Business Continuity Management : Centering on Cases at Automobile Manufacturing Industry (비즈니스 연속성 확보를 위한 IT 기반 위험관리체계 구축 연구 : 자동차 제조 산업 사례를 중심으로)

  • Lee, Joontaik;Kim, Yanghoon;Na, Youngsub;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.2
    • /
    • pp.69-79
    • /
    • 2013
  • Management activities of Business was globalization and had changed to a global management. Under these circumstances, business management factors and the environment has changed rapidly. Accordingly, the number of risk categories in business has increased. Especially in recent years, the convergence of industry with IT has a pivotal role in the industry's business processes. However, information systems in the Internet environment increased the efficiency of business management. Also, it increased the degree of risk and the occurrence ripple effects. In this study, we proposed risk management framework for ensuring business continuity management in information system based automobile manufacturing industry. In detail, we analysis business process in automotive manufacturing industry and identify information assets and we analysis and assess the risk.

Fragility Curve of Steel Box Bridge Using RFPB Bearing (RFPB 받침을 사용한 Steel Box 교량의 손상도 곡선)

  • Lee, Jongheon;Seo, Sangmok;Kim, Woonhak
    • Journal of the Society of Disaster Information
    • /
    • v.7 no.3
    • /
    • pp.171-180
    • /
    • 2011
  • As a great earthquake hit east Japan recently, the interests for the necessity of earthquake resistant design and earthquake resistance ability of existent structures are much increased. The damage or collapse of a bridge, as a social overhead capital structure affects socially and economically. Thus the evaluation of earthquake resistance ability of these structures is very important. The reviewing methods for earthquake resistance ability are mostly deterministic. Although the deterministic methods are fit for the evaluation of safety of each member, they are not practical for the whole structure. For the evaluation of structural safety for earthquake, the method for the evaluation of fragility or damage is needed for some stages of damage. In this paper, fragility curves of steel box bridge using RFPB bearing for PGA, PGV, SA, SV, SI are constructed, and these are compared with the cases of FPB.

A Study of Interception for a Spam Attack of VoIP Service (VoIP서비스의 스팸 공격에 대한 차단 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.241-250
    • /
    • 2006
  • Regarding a spam attack and the interception that a spinoff is largest among weakness of VoIP service at these papers study. Write scenario of a spam attack regarding VoIP service, and execute Call spam, Instant Messaging spam, Presence spam attack. A spam attack is succeeded in laboratories, and prove, and confirm damage fact of a user in proposals of a spam interception way of VoIP service, 1) INVITE Request Flood Attack 2) Black/White list, 3) Traceback, 4) Black Hole-Sink Hole, 5) Content Filtering, 6) Consent based Communication, 7) Call act pattern investigation, 8) Reputation System Propose, and prove. Test each interception plan proposed in VoIP networks, and confirm security level of a spam interception. Information protection of VoIP service is enlarged at WiBro, BcN, and to realize Ubiquitous Security through result of research of this paper contribute, and may make.

  • PDF

The Economic Impacts of Water Supply Constraints During a Drought Using input-output Analysis (가뭄시 용수공급지장으로 인한 경제적 파급효과 분석)

  • Choe, Jang-Hwan;Heo, Eun-Nyeong;Sim, Myeong-Pil
    • Journal of Korea Water Resources Association
    • /
    • v.33 no.5
    • /
    • pp.647-658
    • /
    • 2000
  • The purpose of this study is to estimate the forward impact of water supply bottleneck using a supply-side input-output model. The failure cost analysed in this study can be used to estimate the values of the water supply reliability and can provide the bases of policy decision for the effective reallocation when water supply constraint will occur. So the position of water supply in the national economy is identified, and direct and indirect impacts are estimated by means of the interindustry analysis. Also the failure cost index is suggested to determine the prior order of water supply important in drought. By the way, the occurrence of drought having regional properties, the failure cost of the regional level using a national input-output table may be overestimated or underestimated. For the preceding reason, the failure cost estimated by a national input-output table is compared with and analysed to a regional input-output table for Kyung- Nam.g- Nam.

  • PDF

Thermal Behavior of a Pipe-Rack Structure Subjected to Environmental Factors (외부 환경적 요인에 의한 파이프랙 구조물의 열적 거동)

  • Lee, Jong-Han;Lee, Jong-Jae;Kim, Sung-Yeon
    • Journal of the Korean Recycled Construction Resources Institute
    • /
    • v.3 no.2
    • /
    • pp.165-170
    • /
    • 2015
  • Pipe-rack structures supporting high temperature and pressure are of great importance to ensure the safety of the operation of the plants. If some damage occurred in the pipe-rack structure, the facilities not only bring damage to the commercial property, but also result in economic losses. Specially, since pipe-rack structures are exposed to various environmental conditions, it is essential to evaluate the thermal behavior of the structure caused by environmental conditions for the appropriate design and maintenance of the pipe-rack structure. Thus, based on a selected, typical pipe-rack structure, a thermal-stress coupled analysis was conducted to evaluate the temperature distributions and thermal stresses of the structure. For this, this study accounted for the operating condition of the pipe and the effect of environmental conditions, Yeosu in South Korea and Saudi Arabia in the Middle East. The results of the study showed the need for accounting for a variance in the environmental factors to evaluate the thermal behavior of the pipe-rack structure along with the working condition of pipe.

Design and Implementation of Real-Time Indirect Health Monitoring System for the Availability of Physical Systems and Minimizing Cyber Attack Damage (사이버 공격 대비 가동 물리장치에 대한 실시간 간접 상태감시시스템 설계 및 구현)

  • Kim, Hongjun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1403-1412
    • /
    • 2019
  • Effect of damage and loss cost for downtime is huge, if physical devices such as turbines, pipe, and storage tanks are in the abnormal state originated from not only aging, but also cyber attacks on the control and monitoring system like PLC (Programmable Logic Controller). To improve availability and dependability of the physical devices, we design and implement an indirect health monitoring system which sense temperature, acceleration, current, etc. indirectly, and put sensor data into Influx DB in real-time. Then, the actual performance of detecting abnormal state is shown using the indirect health monitoring system. Analyzing data are acquired using the real-time indirect health monitoring system, abnormal state and security threats can be double-monitored and lower maintenance cost utilizing prognostics and health management.

A Numerical Simulation of the 1993 East Sea Tsunami (1993年 동해 쓰나미의 산정)

  • 최병호;우승범;에핌페리높스키
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.6 no.4
    • /
    • pp.404-412
    • /
    • 1994
  • On July 12. 1993 at 22 : 17 local time (-9h. KST). an earthquake of surface magnitude (MS) 7.6 occurred on the west coast of the Hokkaido and small of offshore island of Okushiri in the East Sea. A major tsumani was generated and within 2 to 5 minutes, extremely large tsunami waves engulfed the Okushiri coastal area and the central west roast of the Hokkaido. This tsunami caused tremendous casualities and damage. A giant tsunami runup of more than 30 m in height was recorded. The tsunami crossed the East Sea and feeled at 27 sites of the eastern Korean coast during the survey on 17-19, July, 1993. The observed tsunami runup at southern part of the eastern Korean coast were generally weaker than the 1993 Japan Sea Central Earthquake tsunami and varied from 0.8 m to 2.6 m. The Present Paper intends to understand the propagation on this tsunami with the aid of numerical computation model andd computer graphic aided video animation.

  • PDF

Detecting Abnormalities in Fraud Detection System through the Analysis of Insider Security Threats (내부자 보안위협 분석을 통한 전자금융 이상거래 탐지 및 대응방안 연구)

  • Lee, Jae-Yong;Kim, In-Seok
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.4
    • /
    • pp.153-169
    • /
    • 2018
  • Previous e-financial anomalies analysis and detection technology collects large amounts of electronic financial transaction logs generated from electronic financial business systems into big-data-based storage space. And it detects abnormal transactions in real time using detection rules that analyze transaction pattern profiling of existing customers and various accident transactions. However, deep analysis such as attempts to access e-finance by insiders of financial institutions with large scale of damages and social ripple effects and stealing important information from e-financial users through bypass of internal control environments is not conducted. This paper analyzes the management status of e-financial security programs of financial companies and draws the possibility that they are allies in security control of insiders who exploit vulnerability in management. In order to efficiently respond to this problem, it will present a comprehensive e-financial security management environment linked to insider threat monitoring as well as the existing e-financial transaction detection system.