• Title/Summary/Keyword: Countermeasures matrix

Search Result 17, Processing Time 0.02 seconds

Debris Flow Risk Evaluation and Ranking Method for Drainage Basin adjacent to Road (도로인근 유역의 토석류 위험평가 및 등급화 방안)

  • Kim, Kyung-Suk;Jang, Hyun-Ick
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2010.03a
    • /
    • pp.279-290
    • /
    • 2010
  • Technical countermeasures against debris flow should be established upon the risk level of the target location. Risk of debris flow should consider the hazard imposed by debris flow and vulnerability of the facilities to debris flow. In this research, we have defined the target location for risk evaluation and suggested scoring method of hazard of debris flow and vulnerability of road to debris flow. By defining risk rank into 6 categories in terms of possibility of damage during rainfall and using the risk scores of 46 debris flow cases, we have suggested risk ranking matrix. The method can be used in ranking the drainage basin adjacent to road by simply determining the hazard with vulnerability score and can be used for planning the debris flow countermeasures.

  • PDF

Multi-Level Fusion Processing Algorithm for Complex Radar Signals Based on Evidence Theory

  • Tian, Runlan;Zhao, Rupeng;Wang, Xiaofeng
    • Journal of Information Processing Systems
    • /
    • v.15 no.5
    • /
    • pp.1243-1257
    • /
    • 2019
  • As current algorithms unable to perform effective fusion processing of unknown complex radar signals lacking database, and the result is unstable, this paper presents a multi-level fusion processing algorithm for complex radar signals based on evidence theory as a solution to this problem. Specifically, the real-time database is initially established, accompanied by similarity model based on parameter type, and then similarity matrix is calculated. D-S evidence theory is subsequently applied to exercise fusion processing on the similarity of parameters concerning each signal and the trust value concerning target framework of each signal in order. The signals are ultimately combined and perfected. The results of simulation experiment reveal that the proposed algorithm can exert favorable effect on the fusion of unknown complex radar signals, with higher efficiency and less time, maintaining stable processing even of considerable samples.

Calculation of the Area of Vulnerability to Voltage Sags by using Impedance Building Algorithm (임피던스 행렬 구성법을 이용한 순간전압강하 취약지역의 계산)

  • Park, Jong-Il;Park, Chang-Hyun
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.26 no.1
    • /
    • pp.44-53
    • /
    • 2012
  • This paper presents a method to calculate the area of vulnerability by using the impedance building algorithm. The installation of DG (Distributed Generation) is one of the countermeasures against voltage sags in power systems. In order to estimate the effect of the DG, the voltage sag assessment should be performed based on the area of vulnerability and system fault statistics. To determine the area of vulnerability, system impedance matrix should be calculated. The calculation of the impedance matrix of large systems is time-consuming task. This paper addresses an effective scheme to calculate the area of vulnerability and system impedance matrix.

IMPROVEMENT OF WASTE ADMINISTRATION BY NEW PUBLIC MANAGEMENT

  • Kotomi Uemoto ;Seigo Nasu ;Shunji Kusayanagi
    • International conference on construction engineering and project management
    • /
    • 2005.10a
    • /
    • pp.424-428
    • /
    • 2005
  • As the application of NPM in waste administration branch this paper proposes a new waste management method in order to increase the efficiency of resources and reduce the quantity of waste. First the matrix method is suggested which comprehensively consider and integrate the proposals of different government departments. Moreover the inhabitant's attitude toward the new waste management measures was investigated. Based on the investigation the evaluation function was made, which include three elements: necessary budget, the effect of cost decrease and the environmental burden decrease. The optimal method of budget allocation to maximize social welfare is proposed under the condition of limited budget by the evaluation function. By applying this system further local governments will be able to determine their adequate service level and budget size.

  • PDF

Efforts against Cybersecurity Attack of Space Systems

  • Jin-Keun Hong
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.12 no.4
    • /
    • pp.437-445
    • /
    • 2023
  • A space system refers to a network of sensors, ground systems, and space-craft operating in space. The security of space systems relies on information systems and networks that support the design, launch, and operation of space missions. Characteristics of space operations, including command and control (C2) between space-craft (including satellites) and ground communication, also depend on wireless frequency and communication channels. Attackers can potentially engage in malicious activities such as destruction, disruption, and degradation of systems, networks, communication channels, and space operations. These malicious cyber activities include sensor spoofing, system damage, denial of service attacks, jamming of unauthorized commands, and injection of malicious code. Such activities ultimately lead to a decrease in the lifespan and functionality of space systems, and may result in damage to space-craft and, lead to loss of control. The Cybersecurity Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) matrix, proposed by Massachusetts Institute of Technology Research and Engineering (MITRE), consists of the following stages: Reconnaissance, Resource Development, Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command & Control, Exfiltration, and Impact. This paper identifies cybersecurity activities in space systems and satellite navigation systems through the National Institute of Standards and Technology (NIST)'s standard documents, former U.S. President Trump's executive orders, and presents risk management activities. This paper also explores cybersecurity's tactics attack techniques within the context of space systems (space-craft) by referencing the Sparta ATT&CK Matrix. In this paper, security threats in space systems analyzed, focusing on the cybersecurity attack tactics, techniques, and countermeasures of space-craft presented by Space Attack Research and Tactic Analysis (SPARTA). Through this study, cybersecurity attack tactics, techniques, and countermeasures existing in space-craft are identified, and an understanding of the direction of application in the design and implementation of safe small satellites is provided.

A Study on the Analysis Model for School Safety Accident (학교안전사고 분석모형에 관한 연구)

  • Park, Sang-Keun;Yoon, Yong-Gi
    • The Journal of Sustainable Design and Educational Environment Research
    • /
    • v.12 no.2
    • /
    • pp.19-30
    • /
    • 2013
  • Low birthrate is causing a reduction in the number of students at kindergartens, elementary schools, middle schools and high schools nationwide and yet, school safety accidents are on a constant rise, which was reported to be 237 accidents a day on average in 2011. Such phenomenon is proving how the school safety policy is not doing what it was supposed to do. In order to decrease the school safety accidents, first, causes of the accidents should be analyzed and then, prevention measures should be designed. For that reason, the study looked into the present condition of the school safety accidents and safety accident theories and based on the results, "School Safety Accident Analysis Matrix Model" was proposed. With a matrix method of the accident types (17 of them) and hazard factors (9 of them) applied, the concerned model analyzed a total of 153 accident causes. In consideration of the results from the analysis, the study suggested that the education authority should open a safety organization and design a school safety policy that would systematically deal with safety education, prevention measures practice, accident investigation and analysis, and countermeasures practice as well.

Developing an Intelligent System for the Analysis of Signs Of Disaster (인적재난사고사례기반의 새로운 재난전조정보 등급판정 연구)

  • Lee, Young Jai
    • Journal of Korean Society of societal Security
    • /
    • v.4 no.2
    • /
    • pp.29-40
    • /
    • 2011
  • The objective of this paper is to develop an intelligent decision support system that is able to advise disaster countermeasures and degree of incidents on the basis of the collected and analyzed signs of disasters. The concepts derived from ontology, text mining and case-based reasoning are adapted to design the system. The functions of this system include term-document matrix, frequency normalization, confidency, association rules, and criteria for judgment. The collected qualitative data from signs of new incidents are processed by those functions and are finally compared and reasoned to past similar disaster cases. The system provides the varying degrees of how dangerous the new signs of disasters are and the few countermeasures to the disaster for the manager of disaster management. The system will be helpful for the decision-maker to make a judgment about how much dangerous the signs of disaster are and to carry out specific kinds of countermeasures on the disaster in advance. As a result, the disaster will be prevented.

  • PDF

Risk assessment for inland flooding in a small urban catchment : Focusing on the temporal distribution of rainfall and dual drainage model (도시 소유역 내 내수침수 위험도 평가 : 강우 시간분포 및 이중배수체계 모형을 중심으로)

  • Lee, Jaehyun;Park, Kihong;Jun, Changhyun;Oh, Jeill
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.35 no.6
    • /
    • pp.389-403
    • /
    • 2021
  • In this study, dual drainage system based runoff model was established for W-drainage area in G-si, and considering the various rainfall characteristics determined using Huff and Mononobe methods, the degree of flooding in the target area was analyzed and the risk was compared and analyzed through the risk matrix method. As a result, the Monobe method compared to the Huff method was analyzed to be suitable analysis for flooding of recent heavy rain, and the validity of the dynamic risk assessment considering the weight of the occurrence probability as the return period was verified through the risk matrix-based analysis. However, since the definition and estimating criteria of the flood risk matrix proposed in this study are based on the return period for extreme rainfall and the depth of flooding according to the results of applying the dual drainage model, there is a limitation in that it is difficult to consider the main factors which are direct impact on inland flooding such as city maintenance and life protection functions. In the future, if various factors affecting inland flood damage are reflected in addition to the amount of flood damage, the flood risk matrix concept proposed in this study can be used as basic information for preparation and prevention of inland flooding, as well as it is judged that it can be considered as a major evaluation item in the selection of the priority management area for sewage maintenance for countermeasures against inland flooding.

The Alleviation Countermeasures of Line Overloads Due To a Contingency Occured in Power System (전력계통(電力系統)의 상정(想定)사고(事故)에 따른 선로(線路)의 과부하(過負荷) 해소(解消) 대책(對策))

  • Chung, Jai-Kil;Noh, Sin-Hong;Park, Kyu-Hong
    • Proceedings of the KIEE Conference
    • /
    • 1991.07a
    • /
    • pp.432-436
    • /
    • 1991
  • This paper presents a new algorithm for the countermeasure to alleviate without shedding system loads the line overloads due to contingency in power system. This method for relieving by line switching is based on obtaining the line outage distribution factors - the linear sensitivity factors, which give the amount of change in the power flow of each line due to the removal of same other line in the power system. These factors are made up of the elements of Bus Reactance Matrix and branch reactances. In this paper a fast algorithm and program is presented for obtaining only the required Bus Reactance elements which corresponds to a non - zero elements of Bus Admittance Matrix and elements of columns which correspond to two terminal Buses of the overloaded(monitored) line. The proposed algorithm has been validated in tests on the 6 busbar test system

  • PDF

On the Local Identifiability of Load Model Parameters in Measurement-based Approach

  • Choi, Byoung-Kon;Chiang, Hsiao-Dong
    • Journal of Electrical Engineering and Technology
    • /
    • v.4 no.2
    • /
    • pp.149-158
    • /
    • 2009
  • It is important to derive reliable parameter values in the measurement-based load model development of electric power systems. However parameter estimation tasks, in practice, often face the parameter identifiability issue; whether or not the model parameters can be estimated with a given input-output data set in reliable manner. This paper introduces concepts and practical definitions of the local identifiability of model parameters. A posteriori local identifiability is defined in the sense of nonlinear least squares. As numerical examples, local identifiability of third-order induction motor (IM) model and a Z-induction motor (Z-IM) model is studied. It is shown that parameter ill-conditioning can significantly affect on reliable parameter estimation task. Numerical studies show that local identifiability can be quite sensitive to input data and a given local solution. Finally, several countermeasures are proposed to overcome ill-conditioning problem in measurement-based load modeling.