• Title/Summary/Keyword: Assessment Vulnerability

Search Result 574, Processing Time 0.131 seconds

Seismic risk estimation of the Kirikkale province through street survey based rapid assessment method (SSRA)

  • Sonmezer, Yetis Bulent;Bas, Selcuk;Akbas, Sami Oguzhan
    • Earthquakes and Structures
    • /
    • v.14 no.6
    • /
    • pp.615-626
    • /
    • 2018
  • The seismic vulnerability of Turkey is relatively high due to its active fault systems with potential to create destructive earthquakes. Thus, reducing the loss of life and property, the number of the earthquake-prone buildings and their retrofit requirements are considerably significant key issues under the scenario earthquakes. The street survey based rapid assessment (SSRA) method can be considered as a powerful tool to determine the seismic vulnerability of building stock of an earthquake-prone city/state. In this study, the seismic vulnerability of the building stock of the Kirikkale province in Turkey is aimed to be estimated adopting the street survey based rapid assessment method (SSRA). For this purpose, central 2074 existing reinforced concrete (R/C) buildings were structurally surveyed with rapid visual site screening and disadvantages such as, the existence of short-column, soft-story, heavy overhangs, pounding effect and local soil conditions were determined for obtaining the structural performance score of each. The results obtained from the study demonstrate that 11-25% of the surveyed buildings in the study region needs to be investigated through more advanced assessment methods. Besides, higher correlation between increasing story number and unsafe/safe building ratio is obtained for the buildings with soft-story parameter than that for those with heavy overhangs and short-column parameters. The conformity of the results of the current study with the previous documented cases of rapid assessment efforts in the recent earthquakes in Turkey shows that the SSRA method for the Kirikkale province performed well, and thus this methodology can be reliably used for similar settlement areas.

DEVELOPMENT OF A VULNERABILITY ASSESSMENT CODE FOR A PHYSICAL PROTECTION SYSTEM: SYSTEMATIC ANALYSIS OF PHYSICAL PROTECTION EFFECTIVENESS (SAPE)

  • Jang, Sung-Soon;Kwan, Sung-Woo;Yoo, Ho-Sik;Kim, Jung-Soo;Yoon, Wan-Ki
    • Nuclear Engineering and Technology
    • /
    • v.41 no.5
    • /
    • pp.747-752
    • /
    • 2009
  • A vulnerability assessment is essential for the efficient operation of a physical protection system (PPS). Previous assessment codes have used a simple model called an adversary sequence diagram. In this study, the use of a two-dimensional (2D) map of a facility as a model for a PPS is suggested as an alternative approach. The analysis of a 2D model, however, consumes a lot of time. Accordingly, a generalized heuristic algorithm has been applied to address this issue. The proposed assessment method was implemented to a computer code; Systematic Analysis of physical Protection Effectiveness (SAPE). This code was applied to a variety of facilities and evaluated for feasibility by applying it to various facilities. To help upgrade a PPS, a sensitivity analysis of all protection elements along a chosen path is proposed. SAPE will help to accurately and intuitively assess a PPS.

Group Decision Making Approach to Flood Vulnerability Assessment (홍수 취약성 평가를 위한 그룹 의사결정 접근법)

  • Kim, Yeong Kyu;Chung, Eun-Sung;Lee, Kil Seong;Kim, Yeonjoo
    • Journal of Korea Water Resources Association
    • /
    • v.46 no.2
    • /
    • pp.99-109
    • /
    • 2013
  • Increasing complexity of the basin environments makes it difficult for single decision maker to consider all relevant aspects of problem, and thus the uncertainty of decision making grows. This study attempts to develop an approach to quantify the spatial flood vulnerability of South Korea. Fuzzy TOPSIS is used to calculate individual preference by each group and then three GDM techniques (Borda count method, Condorcet method, and Copeland method) are used to integrate the individual preference. Finally, rankings from Fuzzy TOPSIS, TOPSIS, and GDM are compared with Spearman rank correlation, Kendall rank correlation, and Emond & Mason rank correlation. As a result, the rankings of some areas are dramatically changed by the use of GDM techniques. Because GDM technique in regional vulnerability assessment may cause a significant change in priorities, the model presented in this study should be considered for objective flood vulnerability assessment.

The Vulnerability Assessment of Hydro-pneumatic Suspension of Ground Combat Vehicles Using Vulnerable Area Method and DMEA (취약면적법과 DMEA를 활용한 지상전투차량 유공압 현가장치의 취약성 평가)

  • Nam, Myung Hoon;Park, Kang;Park, Woo Sung;Yoo, Chul
    • Korean Journal of Computational Design and Engineering
    • /
    • v.22 no.2
    • /
    • pp.141-149
    • /
    • 2017
  • Vulnerability assesses the loss of major performance functions of GCV (Ground Combat Vehicles) when it is hit by enemy's shell. To decide the loss of major functions, it is determined what effects are on the performance of GCV when some components of GCV are failed. M&S (Modeling and Simulation) technology is used to vulnerability assessment. The hydro-pneumatic suspension is used as a sample part. The procedures of vulnerability assessment of the hydro-pneumatic suspension are shown as follows: 1) The components of the suspension are defined, and shot lines are generated evenly around the part. 2) The penetrated components are checked by using the penetration equation. 3) The function model of the suspension is designed by using IDEF0. 4) When the failure of the critical components of the suspension happens, its effect on the function of the suspension can be estimated using DMEA (Damage Mode and Effects Analysis). 5) The diagram of FTA (Fault Tree Analysis) is designed by exploiting DMEA. 6) The damage probability of the suspension is calculated by using FTA and vulnerable area method. In this paper, SLAP (Shot Line Analysis Program) which was developed based on COVART methodology. SLAP calculates the damage probability and visualizes the vulnerable areas of the suspension.

Earthquake risk assessment methods of unreinforced masonry structures: Hazard and vulnerability

  • Preciado, Adolfo;Ramirez-Gaytan, Alejandro;Salido-Ruiz, Ricardo A.;Caro-Becerra, Juan L.;Lujan-Godinez, Ramiro
    • Earthquakes and Structures
    • /
    • v.9 no.4
    • /
    • pp.719-733
    • /
    • 2015
  • Seismic risk management of the built environment is integrated by two main stages, the assessment and the remedial measures to attain its reduction, representing both stages a complex task. The seismic risk of a certain structure located in a seismic zone is determined by the conjunct of the seismic hazard and its structural vulnerability. The hazard level mainly depends on the proximity of the site to a seismic source. On the other hand, the ground shaking depends on the seismic source, geology and topography of the site, but definitely on the inherent earthquake characteristics. Seismic hazard characterization of a site under study is suggested to be estimated by a combination of studies with the history of earthquakes. In this Paper, the most important methods of seismic vulnerability evaluation of buildings and their application are described. The selection of the most suitable method depends on different factors such as number of buildings, importance, available data and aim of the study. These approaches are classified in empirical, analytical, experimental and hybrid. For obtaining more reliable results, it is recommends applying a hybrid approach, which consists of a combination between methods depending on the case. Finally, a recommended approach depending on the building importance and aim of the study is described.

Extended Linear Vulnerability Discovery Process

  • Joh, HyunChul
    • Journal of Multimedia Information System
    • /
    • v.4 no.2
    • /
    • pp.57-64
    • /
    • 2017
  • Numerous software vulnerabilities have been found in the popular operating systems. And recently, robust linear behaviors in software vulnerability discovery process have been noticeably observed among the many popular systems having multi-versions released. Software users need to estimate how much their software systems are risk enough so that they need to take an action before it is too late. Security vulnerabilities are discovered throughout the life of a software system by both the developers, and normal end-users. So far there have been several vulnerability discovery models are proposed to describe the vulnerability discovery pattern for determining readiness for patch release, optimal resource allocations or evaluating the risk of vulnerability exploitation. Here, we apply a linear vulnerability discovery model into Windows operating systems to see the linear discovery trends currently observed often. The applicability of the observation form the paper show that linear discovery model fits very well with aggregate version rather than each version.

Vulnerability Assessment of Water Quality and Aquatic Ecosystem to Climate Change in Korea using Proxy Variables (대리변수를 이용한 한반도 수질 및 수생태계 부문의 기후변화 취약성 평가)

  • Lee, Keon Haeng;Chung, Eu Gene;Kim, Kyunghyun;Yu, Jeong Ah;Lee, Eun Jeong
    • Journal of Korean Society on Water Environment
    • /
    • v.28 no.3
    • /
    • pp.444-452
    • /
    • 2012
  • This study aims at assessing vulnerability of water quality and aquatic ecosystem to climate change by using proxy variables. Vulnerability to climate change is defined as a function of exposure to climate, sensitivity, and adaptive capacity. Detailed proxy variables were selected considering availability and then standardized by re-scaling concept. After adequate weights were assigned to standardized proxy variables by Delphi technique, vulnerability index was calculated. As results, vulnerability of adjacent regions to coastal areas include water quality and aquatic ecosystem is relatively higher than that of inland areas, and especially adjacent region to the western and southeast seas, and Jeju show high vulnerabilities. Vulnerability in the future was performed based on A1B scenario (IPCC, 2000). Temporally, the increase of vulnerability from 2050s to 2100s may be larger than the increase from 2000s to 2050s. Because vulnerability index was estimated through the relationship among various proxy variables, it is important to consider characteristics of local region with measurements and policies for reduction of sensitivity and enhancement of adaptive capacity on climate change. This study is expected to be useful in planning adaptation measures and selecting priority to the policy on climate change.

Priority Assessment for Groundwater Contamination Management Using Analytic Hierarchy Process (AHP) and GIS Approach (계층분석법(AHP)과 GIS를 이용한 고양시 일대의 지하수오염 관리우선순위 평가)

  • Lee, Moung-Jin;Hyun, Yunjung;Kim, Youngju;Hwang, Sang-Il
    • Journal of Soil and Groundwater Environment
    • /
    • v.18 no.5
    • /
    • pp.26-38
    • /
    • 2013
  • In this study, priority for groundwater contamination management was assessed based on regional vulnerability in Goyang-si area, Gyonggi-do, Korea using analytic hierarchy process (AHP) and geographic information system (GIS). We proposed a concept for regional vulnerability to groundwater contamination with using socio-environmental vulnerability factors, which can be classified into three properties including regional hydrogeological property, contamination property, and groundwater use property. This concept is applied to Goyang-si area. For AHP analysis, an expertise-targeted survey was conducted. Based on the survey, a total of 10 factors (criteria) and corresponding weights for regional vulnerability assessment were determined. The result shows that regional contamination property is the most weighted factor among the three property groups (hydrogeological property: contamination property: groundwater use property = 0.3: 0.4: 0.3). Then, database layers for those factors were constructed, and regional vulnerability to groundwater contamination was assessed by weighted superposition using GIS. Results show that estimated regional vulnerability score is ranged from 22.7 to 94.5. Central and western areas of Goyang-si which have groundwater tables at shallow depths and are mainly occupied by industrial and residential areas are estimated to be relatively highly vulnerable to groundwater contamination. Based on assessed regional vulnerability, we classified areas into 4 categories. Category 1 areas, which are ranked at the top 25% of vulnerability score, take about 2.8% area in Goyang-si and give a high priority for groundwater contamination management. The results can provide useful information when the groundwater management authority decide which areas should be inspected with a high priority for efficient contamination management.

A Study on Web Vulnerability Risk Assessment Model Based on Attack Results: Focused on Cyber Kill Chain (공격 결과 기반의 웹 취약점 위험도 평가 모델 연구: 사이버 킬체인 중심으로)

  • Jin, Hui Hun;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.779-791
    • /
    • 2021
  • Common web services have been continuously targeted by hackers due to an access control policy that must be allowed to an unspecified number of people. In order to cope with this situation, companies regularly check web vulnerabilities and take measures according to the risk of discovered vulnerabilities. The risk of these web vulnerabilities is calculated through preliminary statistics and self-evaluation of domestic and foreign related organizations. However, unlike static diagnosis such as security setting and source code, web vulnerability check is performed through dynamic diagnosis. Even with the same vulnerability item, various attack results can be derived, and the degree of risk may vary depending on the subject of diagnosis and the environment. In this respect, the predefined risk level may be different from that of the actual vulnerability. In this paper, to improve this point, we present a web vulnerability risk assessment model based on the attack result centering on the cyber kill chain.

Dynamic vulnerability assessment and damage prediction of RC columns subjected to severe impulsive loading

  • Abedini, Masoud;Zhang, Chunwei
    • Structural Engineering and Mechanics
    • /
    • v.77 no.4
    • /
    • pp.441-461
    • /
    • 2021
  • Reinforced concrete (RC) columns are crucial in building structures and they are of higher vulnerability to terrorist threat than any other structural elements. Thus it is of great interest and necessity to achieve a comprehensive understanding of the possible responses of RC columns when exposed to high intensive blast loads. The primary objective of this study is to derive analytical formulas to assess vulnerability of RC columns using an advanced numerical modelling approach. This investigation is necessary as the effect of blast loads would be minimal to the RC structure if the explosive charge is located at the safe standoff distance from the main columns in the building and therefore minimizes the chance of disastrous collapse of the RC columns. In the current research, finite element model is developed for RC columns using LS-DYNA program that includes a comprehensive discussion of the material models, element formulation, boundary condition and loading methods. Numerical model is validated to aid in the study of RC column testing against the explosion field test results. Residual capacity of RC column is selected as damage criteria. Intensive investigations using Arbitrary Lagrangian Eulerian (ALE) methodology are then implemented to evaluate the influence of scaled distance, column dimension, concrete and steel reinforcement properties and axial load index on the vulnerability of RC columns. The generated empirical formulae can be used by the designers to predict a damage degree of new column design when consider explosive loads. With an extensive knowledge on the vulnerability assessment of RC structures under blast explosion, advancement to the convention design of structural elements can be achieved to improve the column survivability, while reducing the lethality of explosive attack and in turn providing a safer environment for the public.