• Title/Summary/Keyword: Threat Assessment

Search Result 186, Processing Time 0.032 seconds

Erogonomic assessment of "Noraebang" noise and potential hearing-loss and hearing protection strategies (노래방 소음 및 난청가능성의 인간공학적 평가와 청각보호방안)

  • 박민용
    • Journal of the Ergonomics Society of Korea
    • /
    • v.15 no.1
    • /
    • pp.79-90
    • /
    • 1996
  • A research project was conducted to assess the levels of noise exposed to "Noraebang" users and potential hazards to noise-induced hearing loss due to commercial Noraebang noise. A two-way, mixed-factors factorial design was employed for the experiment using independent variables of "noise source" (no- singer, 1-singer, and 2-singer conditions) and "music type" (Trot, Ballad, and Rock music) with 18 normal hearing subjects. Each singer group sang 5 popular songs of each music type in each signing condition, whereas background music was just played for the no-singer condition. For each music played/sung, equivalent continuous sound pressure levels and maximum sound pressure levels were measured for data analysis purposes. Pure-tone audiometry was applied for measuring subjects' hearing threshold levels before and after exposure to Noraebgang noise. The statistical analyses indicate that average continuous noise levels due to Noraebang leisure environment were very serious, especially when two people were singing (higher than 95 dBA). Furthermore, maximum noise levels often exceeded the OSHA's non-premissible 115 dBA level. Worse yet, hearing loss assessment implies that Noraebang facilities may pose a serious threat to noise-induced hearing loss, based on 6-8 dB loss at 125 Hz and 8 dB loss at 4000 Hz after about 1-hour Noraebang noise exposure.

  • PDF

Probabilistic Assessment of Voltage Stability Margin in Presence of Wind Speed Correlation

  • Li, Hongxin;Cai, DeFu;Li, Yinhong
    • Journal of Electrical Engineering and Technology
    • /
    • v.8 no.4
    • /
    • pp.719-728
    • /
    • 2013
  • Probabilistic assessment of voltage stability margin (VSM) with existence of correlated wind speeds is investigated. Nataf transformation is adopted to establish wind speed correlation (WSC) model. Based on the saddle-node bifurcation transversality condition equations and Monte Carlo simulation technique, probability distribution of VSM is determined. With correlation coefficients range low to high value, the effect of WSC on VSM is studied. In addition, two risk indexes are proposed and the possible threat caused by WSC is evaluated from the viewpoint of risk analysis. Experimental results show that the presence of correlated wind speeds is harmful to safe and stable operation of a power system as far as voltage stability is concerned. The achievement of this paper gives a detailed elaboration about the influence of WSC on voltage stability and provides a potentially effective analytical tool for modern power system with large-scale wind power sources integration.

Social Engineering Attack Graph for Security Risk Assessment: Social Engineering Attack Graph framework(SEAG)

  • Kim, Jun Seok;Kang, Hyunjae;Kim, Jinsoo;Kim, Huy Kang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.75-84
    • /
    • 2018
  • Social engineering attack means to get information of Social engineering attack means to get information of opponent without technical attack or to induce opponent to provide information directly. In particular, social engineering does not approach opponents through technical attacks, so it is difficult to prevent all attacks with high-tech security equipment. Each company plans employee education and social training as a countermeasure to prevent social engineering. However, it is difficult for a security officer to obtain a practical education(training) effect, and it is also difficult to measure it visually. Therefore, to measure the social engineering threat, we use the results of social engineering training result to calculate the risk by system asset and propose a attack graph based probability. The security officer uses the results of social engineering training to analyze the security threats by asset and suggests a framework for quick security response. Through the framework presented in this paper, we measure the qualitative social engineering threats, collect system asset information, and calculate the asset risk to generate probability based attack graphs. As a result, the security officer can graphically monitor the degree of vulnerability of the asset's authority system, asset information and preferences along with social engineering training results. It aims to make it practical for companies to utilize as a key indicator for establishing a systematic security strategy in the enterprise.

A Model to Identify Expeditiously During Storm to Enable Effective Responses to Flood Threat

  • Husain, Mohammad;Ali, Arshad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.23-30
    • /
    • 2021
  • In recent years, hazardous flash flooding has caused deaths and damage to infrastructure in Saudi Arabia. In this paper, our aim is to assess patterns and trends in climate means and extremes affecting flash flood hazards and water resources in Saudi Arabia for the purpose to improve risk assessment for forecast capacity. We would like to examine temperature, precipitation climatology and trend magnitudes at surface stations in Saudi Arabia. Based on the assessment climate patterns maps and trends are accurately used to identify synoptic situations and tele-connections associated with flash flood risk. We also study local and regional changes in hydro-meteorological extremes over recent decades through new applications of statistical methods to weather station data and remote sensing based precipitation products; and develop remote sensing based high-resolution precipitation products that can aid to develop flash flood guidance system for the flood-prone areas. A dataset of extreme events has been developed using the multi-decadal station data, the statistical analysis has been performed to identify tele-connection indices, pressure and sea surface temperature patterns most predictive to heavy rainfall. It has been combined with time trends in extreme value occurrence to improve the potential for predicting and rapidly detecting storms. A methodology and algorithms has been developed for providing a well-calibrated precipitation product that can be used in the early warning systems for elevated risk of floods.

Urban Flood Vulnerability Assessment Based on FCDM and PSR Framework

  • Quan Feng;Seong Cheol Shin;Wonjoon Wang;Junhyeong Lee;Kyunghun Kim;Hung Soo Kim
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.181-181
    • /
    • 2023
  • Flood is a major threat to human society, and scientific assessment of flood risk in human living areas is an important task. In this study, two different methods were used to evaluate the flood in Ulsan City, and the results were comprehensively compared and analyzed. Based on the fuzzy mathematics and VIKOR method of the multi-objective decision system, similar evaluation results were obtained in the study area. The results show that due to the large number of rivers in Ulsan City and the relatively high exposure index, the whole city faces a high risk of flooding. However, fuzzy mathematics theory pays more attention to the negative impact of floods on people, and the adaptability in the Nam-gu District is lower. In contrast, the VIKOR method pays more attention to the positive role of the economy and population in flood protection, and thus obtains a higher score. Both approaches demonstrate that the city of Ulsan faces a high risk of flooding and that its citizens and policymakers need to invest in preventing flood damage.

  • PDF

International Case Study and Strategy Proposal for IUCN Red List of Ecosystem(RLE) Assessment in South Korea (국내 IUCN Red List of Ecosystem(생태계 적색목록) 평가를 위한 국제 사례 연구와 전략 제시)

  • Sang-Hak Han;Sung-Ryong Kang
    • Journal of Wetlands Research
    • /
    • v.25 no.4
    • /
    • pp.408-416
    • /
    • 2023
  • The IUCN Red List of Ecosystems serves as a global standard for assessing and identifying ecosystems at high risk of biodiversity loss, providing scientific evidence necessary for effective ecosystem management and conservation policy formulation. The IUCN Red List of Ecosystems has been designated as a key indicator (A.1) for Goal A of the Kunming-Montreal Global Biodiversity Framework. The assessment of the Red List of Ecosystems discerns signs of ecosystem collapse through specific criteria: reduction in distribution (Criterion A), restricted distribution (Criterion B), environmental degradation (Criterion C), changes in biological interaction (Criterion D), and quantitative estimation of the risk of ecosystem collapse (Criterion E). Since 2014, the IUCN Red List of Ecosystems has been evaluated in over 110 countries, with more than 80% of the assessments conducted in terrestrial and inland water ecosystems, among which tropical and subtropical forests are distributed ecosystems under threat. The assessment criteria are concentrated on spatial signs (Criteria A and B), accounting for 68.8%. There are three main considerations for applying the Red List of Ecosystems assessment domestically: First, it is necessary to compile applicable terrestrial ecosystem types within the country. Second, it must be determined whether the spatial sign assessment among the Red List of Ecosystems categories can be applied to the various small-scale ecosystems found domestically. Lastly, the collection of usable time series data (50 years) for assessment must be considered. Based on these considerations, applying the IUCN Red List of Ecosystems assessment domestically would enable an accurate understanding of the current state of the country's unique ecosystem types, contributing to global efforts in ecosystem conservation and restoration.

Methodology of Cyber Security Assessment in the Smart Grid

  • Woo, Pil Sung;Kim, Balho H.
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.2
    • /
    • pp.495-501
    • /
    • 2017
  • The introduction of smart grid, which is an innovative application of digital processing and communications to the power grid, might lead to more and more cyber threats originated from IT systems. In other words, The Energy Management System (EMS) and other communication networks interact with the power system on a real time basis, so it is important to understand the interaction between two layers to protect the power system from potential cyber threats. This paper aims to identify and clarify the cyber security risks and their interaction with the power system in Smart Grid. In this study, the optimal power flow (OPF) and Power Flow Tracing are used to assess the interaction between the EMS and the power system. Through OPF and Power Flow Tracing based analysis, the physical and economic impacts from potential cyber threats are assessed, and thereby the quantitative risks are measured in a monetary unit.

The International Legal Actions against Maritime Terrorism and its National Countermeasures in Korea (해상테러의 국제법적 규제 및 국내적 대응방안)

  • Lee Yun-Cheol
    • Proceedings of KOSOMES biannual meeting
    • /
    • 2005.11a
    • /
    • pp.91-110
    • /
    • 2005
  • Maritime terrorism at sea is the form of violent interference with shipping. Its global reach and negative impact on sea transportation, safety of navigation and marine environment, as well as the threat it poses to human lives and property, call for effective countermeasures at the international and national level at the same time. First, this paper gives a factual assessment of the phenomenon of maritime terrorism as well as a legal analysis of the international provisions to suppress such forms of violence at sea which is different from piracy. And also this paper attempts to address and identify issues relevant to the existing international regulations such as SUA Convention as the main source of international regulations applicable to acts of terrorism at sea, ISPS Code, PSI, etc. Finally this paper suggests the national countermeasures against maritime terrorism in light of above mentioned the definition, causes, types of maritime terrorism and concerning international regulations.

  • PDF

The Post-Miesian Office Tower and the Global Issue of Its Interpretation

  • Marfella, Giorgio
    • International Journal of High-Rise Buildings
    • /
    • v.7 no.2
    • /
    • pp.127-140
    • /
    • 2018
  • The skylines of many cities worldwide are still defined by the dominant and ubiquitous office blocks of the twentieth century. While there is consensus stating that future tall building typologies should depart substantially from these past models, the inheritance of large and obsolete tall office building stocks presents a problem of global significance. Too old for present corporate models, but too new for gaining public historical importance, the twentieth-century office tower is a typology under threat of extinction. However, the need for a culturally informed strategy of preservation for that generation of tall buildings is seldom advocated. Drawing evidence from the case of Melbourne, Australia, this article presents a methodological pathway to overcome pitfalls of memory and interpretation, which commonly prevent an unbiased assessment of the value and urban contribution of late-twentieth-century skyscrapers.

Assessment of the effect of sulfate attack on cement stabilized montmorillonite

  • Kalipcilar, Irem;Mardani-Aghabaglou, Ali;Sezer, Gozde Inan;Altun, Selim;Sezer, Alper
    • Geomechanics and Engineering
    • /
    • v.10 no.6
    • /
    • pp.807-826
    • /
    • 2016
  • In this study, aiming to investigate the effects of sulfate attack on cement stabilized highly plastic clay; an experimental study was carried out considering the effects of cement type, sulfate type and its concentration, cement content and curing period. Unconfined compressive strength and chloride-ion penetration tests were performed to obtain strength and permeability characteristics of specimens cured under different conditions. Test results were evaluated along with microstructural investigations including SEM and EDS analyses. Results revealed that use of sulfate resistance cement instead of normal portland cement is more plausible for soils under the threat of sulfate attack. Besides, it was verified that sulfate concentration is responsible for strength loss and permeability increase in cement stabilized montmorillonite. Finally, empirical equations were proposed to estimate the unconfined compressive strength of cement stabilized montmorillonite, which was exposed to sulfate attack for 28 days.