• Title/Summary/Keyword: Sabotage

Search Result 29, Processing Time 0.028 seconds

Dynamic response of cable-stayed bridges subjected to sudden failure of stays - the 2D problem

  • Raftoyiannis, I.G.;Konstantakopoulos, T.G.;Michaltsos, G.T.
    • Coupled systems mechanics
    • /
    • v.3 no.4
    • /
    • pp.345-365
    • /
    • 2014
  • A significant problem met in engineering practice when designing cable-stayed bridges is the failure of cables. Many different factors can lead to sudden failure of cables, such as corrosion, continuous friction or abrasion, progressive and extended crevice created by fatigue and finally an explosion caused by sabotage or accident, are some of the causes that can lead to the sudden failure of one or more cables. This paper deals with the sudden failure of cables in a special form of cable-stayed bridges with a single line of cables anchored at the central axis of the deck's cross-section. The analysis is carried out by the modal superposition technique where an analytical method developed by the authors in a previous work has been employed.

Vital Area Identification for the Physical Protection of Nuclear Power Plants during Low Power and Shutdown Operation (원자력발전소 정지저출력 운전 기간의 물리적방호를 위한 핵심구역파악)

  • Kwak, Myung Woong;Jung, Woo Sik;Lee, Jeong-ho;Baek, Min
    • Journal of the Korean Society of Safety
    • /
    • v.35 no.1
    • /
    • pp.107-115
    • /
    • 2020
  • This paper introduces the first vital area identification (VAI) process for the physical protection of nuclear power plants (NPPs) during low power and shutdown (LPSD) operation. This LPSD VAI is based on the 3rd generation VAI method which very efficiently utilizes probabilistic safety assessment (PSA) event trees (ETs). This LPSD VAI process was implemented to the virtual NPP during LPSD operation in this study. Korea Atomic Energy Research Institute (KAERI) had developed the 2nd generation full power VAI method that utilizes whole internal and external (fire and flooding) PSA results of NPPs during full power operation. In order to minimize the huge burden of the 2nd generation full power VAI method, the 3rd generation full power VAI method was developed, which utilizes ETs and minimal PSA fault trees instead of using the whole PSA fault tree. In the 3rd generation full power VAI method, (1) PSA ETs are analyzed, (2) minimal mitigation systems for avoiding core damage are selected from ETs by calculating system-level target sets and prevention sets, (3) relatively small sabotage fault tree that has the systems in the shortest system-level prevention set is composed, (4) room-level target sets and prevention sets are calculated from this small sabotage fault tree, and (5) the rooms in the shortest prevention set are defined as vital areas that should be protected. Currently, the 3rd generation full power VAI method is being employed for the VAI of Korean NPPs. This study is the first development and application of the 3rd generation VAI method to the LPSD VAI of NPP. For the LPSD VAI, (1) many LPSD ETs are classified into a few representative LPSD ETs based on the functional similarity of accident scenarios, (2) a few representative LPSD ETs are simplified with some VAI rules, and then (3) the 3rd generation VAI is performed as mentioned in the previous paragraph. It is well known that the shortest room-level prevention sets that are calculated by the 2nd and 3rd generation VAI methods are identical.

Regional Environmental Conflict and countermeasures

  • Kim, Taek
    • International Journal of Advanced Culture Technology
    • /
    • v.5 no.4
    • /
    • pp.26-30
    • /
    • 2017
  • The Ministry of Patriots and Veterans Affairs decided to designate Goesan County as a comprehensive venue for determining the geography of the land, the efficient management of land, the public opinion of local residents, and the establishment of a group of civic complaints. In the meantime, Goesan focused on attracting high-ranking government officials, including high-ranking government officials and high-ranking tourist attractions, to attract high-ranking government officials, including high-ranking officials of the National Guard, to promote the nation's bid to attract high-ranking government officials. In this paper, we intend to conduct a study centered on the controversy over the survival of the Korean National Guard. conflict between local governments is a non-authoritative administrative administrative body, it can be regarded as a matter of difficulty by intervening in any autonomous matter, and ultimately, it can be changed to judicial judgment. This is not to say that the residents of Goesan county will protest this time. Even though Goesan promotes regional development and development for local residents, it can not guarantee that the judgment of Goesan County will be held in the same situation. Thus, it should develop a win-win strategy based on the threat of sabotage. To this end, I would like to suggest the following measures.

Trend of Fire Outbreaks in Ghana and Ways to Prevent These Incidents

  • Addai, Emmanuel K.;Tulashie, Samuel K.;Annan, Joe-Steve;Yeboah, Isaac
    • Safety and Health at Work
    • /
    • v.7 no.4
    • /
    • pp.284-292
    • /
    • 2016
  • Background: In Ghana, fire incidents have become a regular occurrence, with thousands of lives and millions of dollars lost every year. Hardly a day passes without news of a fire outbreak in some part of Ghana, causing fear and panic among the people. This generates much discussion centering on rumors relating to politics, sabotage, misfortune, religious differences, etc. This article seeks to discuss the trend of fire incidents occurring in Ghana from 2000 to 2013 and the different ways to prevent these incidents. Methods: The pattern of fire incidence in Ghana as a whole as well as in each region is discussed. The study took into consideration the causes, mechanisms, as well as preventive measures against the fire menace. Data were obtained from the head office of Ghana's national fire service. Results: It was noticed that in general the rate of fire incidence increased each year. This increase was attributed to several factors: rate of population growth and industrialization, unstable electricity, urbanization, negligence, illegal electrical connection, etc. The cause of fire was categorized into domestic, industrial, vehicular, institutional, electrical, commercial, bush, and others. Among these causes, domestic fire accounted for 41% of the total number of fire incidents in the country. Conclusion: Finally, this study presents several recommendations to help prevent and mitigate fire incidents in Ghana.

A Study on the Legal Control of Aircraft Terrorism by International Criminal Court(A Suggestion for the Amendment of ICC Statute) (국제형사재판소(國際刑事載判所)통한 항공기(航空機)테러범죄 규제에 관한 연구- ICC규정(規程)개정 위한 입법론적 고찰을 중심으로 -)

  • Kim, Man-Ho
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.15
    • /
    • pp.40-66
    • /
    • 2002
  • The purpose of this paper is to investigate the legal controㅣ, by using the International Criminal Court(ICC) that will enter into force to the most serious crimes of concern to the international community as a whole, and regulates the jurisdiction with respect to the following crimes: (a) The crime of genocide; (b) Crimes against humanity; (c) War crimes; Cd) The crime of aggression. However, the existing ICC Statute excludes (e) Crimes, established under or pursuant to the treaty, which was regulated by the ICC draft statute that the International Law Commission(ILC) examined and submitted to the UN General Assembly in 1994, and which contained aircraft terrorism such as hijacking in the Hague Convention of 1970 or sabotage in the Montreal Convention of 1971 in Annex of ILC draft. Therefore, this paper examines the legal character of aircraft terrorism as one of the most serious crimes of concern to the international community as a whole, and suggests two kinds of legislative comments for the amendment of the ICC Statute including aircraft terrorism as an object of the jurisdiction of the Court, for suppressing aircraft terrorism in advance and ensuring equitable penalty by ICC system.

  • PDF

Counterproductive Work Behaviors and Narcissism (반생산적인 업무행동에 대한 자기애적 성격특성의 이해)

  • Joo Weon-Sig;Cha Ta-Soon
    • Management & Information Systems Review
    • /
    • v.10
    • /
    • pp.33-66
    • /
    • 2002
  • Counterproductive work behaviors are behaviors by employees intended to harm their organization or organization members. Human is the being has a desire and behaviors. To understand behaviors of an individual, it is important to understand the personality which determines a difference between individuals. Narcissists has psychological traits to be likely to experience negative emotions, such as frustration, hostility or anger, and this psychological traits of narcissists are more likely to induce an aggression. In this view, the purpose of this study was to examine the relationships between counterproductive work behaviors and narcissistic personality characteristics and to explore psychological dynamics about how narcissistic personality characteristics had an effect on counterproductive work behaviors. As a result, facts known were as follows. First, narcissists has strong desires to maintain a sense of superiority over others and defend their egos against unpleasant evaluation information, even if the information is factual and accurate. Second, narcissists are hyper-sensitive to negative information and are more likely to encounter information or situations that challenge their positive self-appraisals by this view. Third, in response to these challenges, or ego threats, these individuals are more likely to experience negative emotions, such as anger, frustration, or hostility. Forth, this negative emotions lead to aggression and as a result, this is more likely to induce counterproductive work behaviors such as theft, sabotage, interpersonal aggression, work slowdowns, wasting time and materials, and spreading rumors. Thus, narcissism is another individual difference variable that may be an important factor in determining counterproductive work behaviors, particularly under conditions perceived to be difficult or stressful.

  • PDF

Vital Area Identification Analysis of A Hypothetical Nuclear Facility Using VIPEX (VIPEX를 이용한 가상 원자력시설의 핵심구역 파악 분석)

  • Lee, Yoon-Hwan;Jung, Woo-Sik;Lee, Jin-Hong
    • Journal of the Korean Society of Safety
    • /
    • v.26 no.4
    • /
    • pp.87-95
    • /
    • 2011
  • The urgent VAI(Vital Area Identification) method development is required since 'The Act of Physical Protection and Radiological Emergency' that is established in 2003 requires an evaluation of physical threats in nuclear facilities and an establishment of physical protection in Korea. The KAERI(Korea Atomic Energy Research Institute) has developed the VAI methodology and VAI software called as VIPEX(Vital area Identification Package EXpert) for identifying the vital areas. This study is to demonstrate the applicability of KAERI's VAI methodology to a hypothetical facility, and to identify the importance of information of cable and piping runs when identifying the vital areas. It is necessarily needed to consider cable and piping runs to determine the accurate and realistic TEPS(Top Event Prevention Set). If the information of cable and piping runs of a nuclear power plant is not considered when determining the TEPSs, it is absolutely impossible to acquire the complete TEPSs, and the results could be distorted by missing it. The VIPEX and FTREX(Fault Tree Reliability Evaluation eXpert) properly calculate MCSs and TEPSs using the fault tree model, and provide the most cost-effective method to save the VAI and physical protection costs.

Detecting Anomalies, Sabotage, and Malicious Acts in a Cyber-physical System Using Fractal Dimension Based on Higuchi's Algorithm

  • Marwan Albahar
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.69-78
    • /
    • 2023
  • With the global rise of digital data, the uncontrolled quantity of data is susceptible to cyber warfare or cyber attacks. Therefore, it is necessary to improve cyber security systems. This research studies the behavior of malicious acts and uses Higuchi Fractal Dimension (HFD), which is a non-linear mathematical method to examine the intricacy of the behavior of these malicious acts and anomalies within the cyber physical system. The HFD algorithm was tested successfully using synthetic time series network data and validated on real-time network data, producing accurate results. It was found that the highest fractal dimension value was computed from the DoS attack time series data. Furthermore, the difference in the HFD values between the DoS attack data and the normal traffic data was the highest. The malicious network data and the non-malicious network data were successfully classified using the Receiver Operating Characteristics (ROC) method in conjunction with a scaling stationary index that helps to boost the ROC technique in classifying normal and malicious traffic. Hence, the suggested methodology may be utilized to rapidly detect the existence of abnormalities in traffic with the aim of further using other methods of cyber-attack detection.

Current Status and Prospect of Techniques for Identification of Sabotage Targets (에너지 시스템의 사보타지 표적 인식 기법의 현황 및 전망)

  • Kim, Seong-Ho;Choi, Y.;Jung, W.S.;Kim, K.Y.;Yang, J.E.
    • Proceedings of the Korea Society for Energy Engineering kosee Conference
    • /
    • 2007.11a
    • /
    • pp.288-293
    • /
    • 2007
  • 미국 911 테러 발생 이후로, 국가 기반시설(예: 송/배전 전력망, 석유/가스 파이프라인, 원자력 발전소, 정보통신 시설, 교통 시설, 금융 시설, 매스미디어 시설 등)에 대한 테러리스트의 사보타지 리스크를 관리하는 도전문제에 정부 차원이나, 기업 차원에서 국내외적으로 뜨거운 이목이 집중되고 있다. 그 가운데 에너지 시스템, 특히 원자력 발전소의 물리적 보안은 국가 안보 차원에서 매우 중대한 이슈가 되고 있다. 이는 사보타지로 인한 이러한 시스템의 파손이 국민, 작업자, 또는 외부 환경에 방사성물질 누출과 같은 중대한 결말을 초래할 수 있기 때문이다. 원전과 같은 복잡 시스템에서 설계 기준 위협이 초래할 수 있는 이러한 결말은 그 시스템의 특정 핵심 표적(예: 부품, 구역, 자산, 행위, 인원)의 방호를 통해 효과적으로 방어될 수 있다. 다시 말하면, 표적 인식에서는 어떻게 방어할 것인가에 앞서서 무엇을 방어할 것인가를 다루려는 것이다. 이 연구의 주요 목적은 여태까지 개발된 다양한 표적 인식 기법의 개발 추세를 소개하고 향후 전망을 제시하는 데에 있다. 이를 통해 표적 인식 기법의 수월성, 신뢰성, 및 경제성을 제고할 수 있으리라 본다. 표적 인식 기술의 활용성 측면에서 볼 때, 표적 인식은 하드웨어 적이거나 소프트웨어적인 방호 시스템의 설계에 필수적이므로, 신뢰성 높은 표적 인식은 다음과 같은 긍정적인 파급 효과를 줄일 수 있다: 1) 사보타지 리스크 감소에 직간접적으로 기여할 수 있다; 2) 제한적인 보안 재원을 효율적으로 할당할 수 있다; 3) 보안 대응군대의 훈련 시나리오를 개발할 수 있다; 4) 발전소 규제요건인 안전조치 계획을 비용이나 보안 측면에서 향상시켜 국민 안심(public easiness)을 도모할 수 있다. 향후에는 보다 더 광의적인 복잡 시스템 사이에서 상호 연계적인 사보타지에 대한 표적 인식의 기법들이 점검될 필요성이 있다고 본다.

  • PDF

Development of a Risk Assessment Program for Chemical Terrorism (화학적 테러에 대한 위험성 평가 프로그램 개발)

  • Lee, Younghee;Kim, Eunyong;Kim, Jinkyung;Moon, Il
    • Journal of Korean Society of societal Security
    • /
    • v.1 no.1
    • /
    • pp.63-67
    • /
    • 2008
  • This study focuses on assessing the security ri sk or the terrorism in chemical process industries. This research modifies conventional method for assessing the terrorism risk. The risk assessment method is developed and it is implemented as software to analyze the possibility of terrorism and sabotage. This program includes five steps; asset characterization, threat assessment, vulnerability analysis, risk assessment and new countermeasures. It is a systematic, risk based approach in which risk is a function of the severity of consequences of an undesired event, the likelihood of adversary attack, and the likelihood of adversary success in causing the undesired event. The reliability of the program is verified using a dock zone case. The case dock zone includes a storage farm, a manufacturing plant, an electrical supply utility, a hydrotreater unit, many containers, and administration buildings. This study represents chemical terrorism response technology, the prevention plan, and new countermeasure to mitigate by using risk assessment methods in the chemical industry and public sector. This study suggests an effective approach to the chemical terrorism response management.

  • PDF