• 제목/요약/키워드: Threat Value

검색결과 170건 처리시간 0.026초

Integration of GIS-based RUSLE model and SPOT 5 Image to analyze the main source region of soil erosion

  • LEE Geun-Sang;PARK Jin-Hyeog;HWANG Eui-Ho;CHAE Hyo-Sok
    • 대한원격탐사학회:학술대회논문집
    • /
    • 대한원격탐사학회 2005년도 Proceedings of ISRS 2005
    • /
    • pp.357-360
    • /
    • 2005
  • Soil loss is widely recognized as a threat to farm livelihoods and ecosystem integrity worldwide. Soil loss prediction models can help address long-range land management planning under natural and agricultural conditions. Even though it is hard to find a model that considers all forms of erosion, some models were developed specifically to aid conservation planners in identifying areas where introducing soil conservation measures will have the most impact on reducing soil loss. Revised Universal Soil Loss Equation (RUSLE) computes the average annual erosion expected on hillslopes by multiplying several factors together: rainfall erosivity (R), soil erodibility (K), slope length and steepness (LS), cover management (C), and support practice (P). The value of these factors is determined from field and laboratory experiments. This study calculated soil erosion using GIS-based RUSLE model in Imha basin and examined soil erosion source area using SPOT 5 high-resolution satellite image and land cover map. As a result of analysis, dry field showed high-density soil erosion area and we could easily investigate source area using satellite image. Also we could examine the suitability of soil erosion area applying field survey method in common areas (dry field & orchard area) that are difficult to confirm soil erosion source area using satellite image.

  • PDF

Self-terminated carbonation model as an useful support for durable concrete structure designing

  • Woyciechowski, Piotr P.;Sokolowska, Joanna J.
    • Structural Engineering and Mechanics
    • /
    • 제63권1호
    • /
    • pp.55-64
    • /
    • 2017
  • The paper concerns concrete carbonation, the phenomena that occurs in every type of climate, especially in urban-industrial areas. In European Standards, including Eurocode (EC) for concrete structures the demanded durability of construction located in the conditions of the carbonation threat is mainly assured by the selection of suitable thickness of reinforcement cover. According to EC0 and EC2, the thickness of the cover in the particular class of exposure depends on the structural class/category and concrete compressive strength class which is determined by cement content and water-cement ratio (thus the quantitative composition) but it is not differentiated for various cements, nor additives (i.e., qualitative composition), nor technological types of concrete. As a consequence the selected thickness of concrete cover is in fact a far estimation - sometimes too exaggerated (too safe or too risky). The paper presents the elaborated "self-terminated carbonation model" that includes abovementioned factors and enables to indicate the maximal possible depth of carbonation. This is possible because presented model is a hyperbolic function of carbonation depth in time (the other models published in the literature use the parabolic function that theoretically assume the infinite increase of carbonation depth value). The paper discusses the presented model in comparison to other models published in the literature, moreover it contains the algorithm of concrete cover design with use of the model as well as an example of calculation of the cover thickness.

A Safety Evaluation of Genetically Modified Feedstuffs for Livestock Production; the Fate of Transgenic DNA and Proteins

  • Beever, D.E.;Glenn, K.;Phipps, R.H.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • 제16권5호
    • /
    • pp.764-772
    • /
    • 2003
  • Two genetic constructs used to confer improved agronomic characteristics, namely herbicide tolerance (HT) in maize and soyabean and insect resistance (Bt) in maize, are considered in respect of feeding to farm livestock, animal performance and the nutritional value and safety of animal products. A review of nucleic acid (DNA) and protein digestion in farm livestock concludes that the frequency of intact transgenic DNA and proteins of GM and non-GM crops being absorbed is minimal/non existent, although there is some evidence of the presence of short fragments of rubisco DNA of non-GM soya in animal tissues. It has been established that feed processing (especially heat) prior to feeding causes significant disruption of plant DNA. Studies with ruminant and non-ruminant farm livestock offered GM feeds demonstrated that animal performance and product composition are unaffected and that there is no evidence of transgenic DNA or proteins of current GM in the products of animals consuming such feeds. On this evidence, current HT and Bt constructs represent no threat to the health of animals, or humans consuming the products of such animals. However as new GM constructs become available it will be necessary to subject these to rigorous evaluation.

The Effect of Control-Ownership Disparity on Cost Stickiness

  • Chae, Soo-Joon;Ryu, Hae-Young
    • 유통과학연구
    • /
    • 제14권8호
    • /
    • pp.51-57
    • /
    • 2016
  • Purpose - If control-ownership disparity is large, managers will not actively reduce costs; rather, they will maintain unutilized resources or possess surplus resources even when sales decrease with the purpose of increasing personal utility from status, power, compensation, and prestige. These managers' utility maximizing tendencies cause cost stickiness. We examine whether asymmetric behavior related to costs becomes stronger when there is a large disparity between ownership and control rights. Research design, data, and methodology - We construct a regression model to examine the relationship between control-ownership disparity and cost stickiness. STICKY, a dependent variable representing cost stickiness is a value found using the method of Weiss (2010), and Disparity is an interest variable that shows control-ownership disparity. Results - This study is based from the unique situations in Korea, in which high control-ownership disparity is common in firms. Large control-ownership disparity was found to increase cost stickiness of corporations. Conclusions - The results of this study imply that controlling shareholders may be regarded as a threat to the interests of minority shareholders and corporate values especially when controlling shareholders have significant influence over managers or the power to make managerial decisions as owners of a corporation.

신경회로망과 고장전류의 변화를 이용한 고장판별 알고리즘에 관한 연구 (A Study on the Algorithm for Fault Discrimination in Transmission Lines Using Neural Network and the Variation of Fault Currents)

  • 여상민;김철환;최면송;송오영
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2000년도 하계학술대회 논문집 A
    • /
    • pp.366-368
    • /
    • 2000
  • When faults occur in transmission lines, the classification of faults is very important. If the fault is HIF(High Impedance Fault), it cannot be detected or removed by conventional overcurrent relays (OCRs), and results in fire hazards and causes damages in electrical equipment or personal threat. The fast discrimination of fault needs to effective protection and treatment and is important problem for power system protection. This paper proposes the fault detection and discrimination algorithm for LIFs(Low Impedance Faults) and HIFs(High Impedance Faults). This algorithm uses artificial neural networks and variation of 3-phase maximum currents per period while faults. A double lines-to-ground and line-to-line faults can be detected using Neural Network. Also, the other faults can be detected using the value of variation of maximum current. Test results show that the proposed algorithms discriminate LIFs and HIFs accurately within a half cycle.

  • PDF

Towards Cyber Security Risks Assessment in Electric Utility SCADA Systems

  • Woo, Pil Sung;Kim, Balho H.;Hur, Don
    • Journal of Electrical Engineering and Technology
    • /
    • 제10권3호
    • /
    • pp.888-894
    • /
    • 2015
  • This paper presents a unified model based assessment framework to quantify threats and vulnerabilities associated with control systems, especially in the SCADA (Supervisory Control and Data Acquisition) system. In the past, this system was primarily utilized as an isolated facility on a local basis, and then it started to be integrated with wide-area networks as the communication technology would make rapid progress. The introduction of smart grid, which is an innovative application of digital processing and communications to the power grid, might lead to more and more cyber threats originated from IT systems. However, an up-to-date power system often requires the real-time operations, which clearly implies that the cyber security would turn out to be a complicated but also crucial issue for the power system. In short, the purpose of this paper is to streamline a comprehensive approach to prioritizing cyber security risks which are expressed by the combination of threats, vulnerabilities, and values in the SCADA components.

수정 RVS와 IRVS시스템의 비교분석을 통한 국내 고층건물 테러위험도 평가 (Risk Assessment of Tall Buildings in Korea by comparative study of Modified RVS and IRVS system)

  • 유영수;윤성원;주영규
    • 한국공간구조학회논문집
    • /
    • 제12권4호
    • /
    • pp.91-98
    • /
    • 2012
  • As the occurrence rate of terror and hazard is increasing throughout the world, GSA, DoD, and FEMA are proceeding a study about mitigating the damage of terror. Korea is no more a safe place from the terrorist's threat, so we need to make measures against them. In this study we developed modified RVS System by revising some items to adjust the system to the domestic condition and conducted a risk assessment on several tall buildings in Korea. By using IRVS system which is developed by DHS, we also carried out the risk assessment. Comparing the results between RVS with IRVS, we performed terror risk evaluation of tall buildings. Through risk assessment of several tall buildings, we analyzed key factors of each scenarios and suggested the mean value of each items, so we would like to help the counter-terrorism in the design phase.

정성적 위험 분석을 위한 버디 시스템의 구조 분석 (The Architectural Analysis of the Buddy System for Qualitative Risk Analysis)

  • Jeongwon Yoon;Kim, Hong-Keun
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 1995년도 종합학술발표회논문집
    • /
    • pp.51-58
    • /
    • 1995
  • The importance of the risk analysis tool has been recognized and its use also has been emphasized by a number of researchers recently The methodology were examined but neither algorithms nor practical applications have been implemented or practiced in Korea. In this paper, the architecture of the Buddy System, one of the automated risk assessment tools. is analyzed in depth to provide the algorithmic understanding and to promote the development of the risk analysis methodology. The Buddy System mainly uses three main factors of vulnerability, threat and countermeasures as a nucleus of the qualatative analysis with the modified loss expectancy value. These factors are identified and assessed by the separation of duties between the end user and security analyst. The Buddy System uses five axioms as its bases of assessment algorithm and the assessed vulnerability level is strictly within these axioms. Since the In-place countermeasures reduce the vulnerability level up to a certain level. the security analyst may use "what if " model to examine the impact of additional countermeasures by proposing each to reduce the vulnerability level further to within the acceptable range. The emphasis on the qualitative approach on vulnerability leveling is very well balanced with the quantitative analysis that the system performance is prominent.prominent.

  • PDF

전자무역의 베이지안 네트워크 개선방안에 관한 연구 (A Study on the Improvement of Bayesian networks in e-Trade)

  • 정분도
    • 통상정보연구
    • /
    • 제9권3호
    • /
    • pp.305-320
    • /
    • 2007
  • With expanded use of B2B(between enterprises), B2G(between enterprises and government) and EDI(Electronic Data Interchange), and increased amount of available network information and information protection threat, as it was judged that security can not be perfectly assured only with security technology such as electronic signature/authorization and access control, Bayesian networks have been developed for protection of information. Therefore, this study speculates Bayesian networks system, centering on ERP(Enterprise Resource Planning). The Bayesian networks system is one of the methods to resolve uncertainty in electronic data interchange and is applied to overcome uncertainty of abnormal invasion detection in ERP. Bayesian networks are applied to construct profiling for system call and network data, and simulate against abnormal invasion detection. The host-based abnormal invasion detection system in electronic trade analyses system call, applies Bayesian probability values, and constructs normal behavior profile to detect abnormal behaviors. This study assumes before and after of delivery behavior of the electronic document through Bayesian probability value and expresses before and after of the delivery behavior or events based on Bayesian networks. Therefore, profiling process using Bayesian networks can be applied for abnormal invasion detection based on host and network. In respect to transmission and reception of electronic documents, we need further studies on standards that classify abnormal invasion of various patterns in ERP and evaluate them by Bayesian probability values, and on classification of B2B invasion pattern genealogy to effectively detect deformed abnormal invasion patterns.

  • PDF

A comparative study for adsorption of carbolic acid by synthetic resins

  • Uslu, Hasan;Bamufleh, Hisham S.
    • Membrane and Water Treatment
    • /
    • 제6권6호
    • /
    • pp.439-449
    • /
    • 2015
  • Carbolic Acid which is called phenol is one of the important starting and/or intermediate materials in various industrial processes. However, its excessive release into environment poses a threat to living organisms, as it is a highly carcinogens and hazardous pollutant even at the very low concentration. Thus removal of phenol from polluted environments is very crucial for sustainable remediation process. We developed a low cost adsorption method for separating phenol from a model aqueous solution. The phenol adsorption was studied using two adsorbents i.e., Amber lite XAD-16 and Amber lite XAD-7 HP with a constant amount of resin 0.1 g at varying aqueous phenol concentrations ($50-200mgL^{-1}$) at room temperature. We compared the efficacy of two phenol adsorbents for removing higher phenol concentrations from the media. We investigated equilibrium and kinetics studies of phenol adsorption employing Freundlich, Temkin and Langmuir isotherms. Amberlite XAD-16 performed better than Amberlite XAD-7 HP in terms of phenol removal efficiency that amounted to 95.52%. Pseudo second order model was highly fitted for both of the adsorption systems. The coefficient of determination ($R^2$) with Langmuir isotherm was found to be 0.98 for Amberlite XAD-7 HP. However, Freundlich isotherm showed $R^2$ value of 0.95 for Amberlite XAD-16, indicating that both isotherms could be described for the isotherms on XAD-7 HP and Amberlite XAD-16, respectively.