• Title/Summary/Keyword: Vulnerability Assessment System

Search Result 189, Processing Time 0.024 seconds

Effects of curvature radius on vulnerability of curved bridges subjected to near and far-field strong ground motions

  • Naseri, Ali;Roshan, Alireza MirzaGoltabar;Pahlavan, Hossein;Amiri, Gholamreza Ghodrati
    • Structural Monitoring and Maintenance
    • /
    • v.7 no.4
    • /
    • pp.367-392
    • /
    • 2020
  • The specific characteristics of near-field earthquake records can lead to different dynamic responses of bridges compared to far-field records. However, the effect of near-field strong ground motion has often been neglected in the seismic performance assessment of the bridges. Furthermore, damage to horizontally curved multi-frame RC box-girder bridges in the past earthquakes has intensified the potential of seismic vulnerability of these structures due to their distinctive dynamic behavior. Based on the nonlinear time history analyses in OpenSEES, this article, assesses the effects of near-field versus far-field earthquakes on the seismic performance of horizontally curved multi-frame RC box-girder bridges by accounting the vertical component of the earthquake records. Analytical seismic fragility curves have been derived thru considering uncertainties in the earthquake records, material and geometric properties of bridges. The findings indicate that near-field effects reasonably increase the seismic vulnerability in this bridge sub-class. The results pave the way for future regional risk assessments regarding the importance of either including or excluding near-field effects on the seismic performance of horizontally curved bridges.

Seismic resonance vulnerability assessment on shear walls and framed structures with different typologies: The case of Guadalajara, Mexico

  • Ramirez-Gaytan, Alejandro;Preciado, Adolfo;Flores-Estrella, Hortencia;Santos, Juan Carlos;Alcantara, Leonardo
    • Earthquakes and Structures
    • /
    • v.22 no.3
    • /
    • pp.263-275
    • /
    • 2022
  • Structural collapses can occur as a result of a dynamic amplification of either, the building's seismic response or the ground shaking by local site effects; one of the reasons is a resonance effect due to the proximity of the structural elastic fundamental period TE and the soil fundamental period TS. We evaluate the vulnerability to resonance effects in Guadalajara, México, in a three-step schema: 1) we define structural systems in the building environment of western Guadalajara, in terms of their construction materials and structural components; 2) we estimate TE with different equations, to obtain a representative value in elastic conditions for each structural system; and, 3) we evaluate the resonance vulnerability by the analysis of the ratio between TE and TS. We observe that the larger the soil fundamental period, the higher the resonance vulnerability for buildings with height between 17 and 39 m. For the sites with a low TS, the most vulnerable buildings will be those with a height between 2 and 9 m. These results can be a helpful tool for disaster prevention, by avoiding the construction of buildings with certain heights and structural characteristics that would result in a dangerous proximity between TE and TS.

Vulnerability Assessment of Human Health Sector due to Climate Change: Focus on Ozone (기후변화에 따른 보건 분야의 취약성 평가: O3을 중심으로)

  • Lee, Jae-Bum;Lee, Hyun-Ju;Moon, Kyung-Jung;Hong, Sung-Chul;Kim, Deok-Rae;Song, Chang-Keun;Hong, You-Deog
    • Journal of Korean Society for Atmospheric Environment
    • /
    • v.28 no.1
    • /
    • pp.22-38
    • /
    • 2012
  • Adaptation of climate change is necessary to avoid unexpected impacts of climate change caused by human activities. Vulnerability refers to the degree to which system cannot cope with impacts of climate change, encompassing physical, social and economic aspects. Therefore the quantification of climate change impacts and its vulnerability is needed to identify vulnerable regions and to setup the proper strategies for adaptation. In this study, climate change vulnerability is defined as a function of climate exposure, sensitivity, and adaptive capacity. Also, we identified regions vulnerable to ozone due to climate change in Korea using developed proxy variables of vulnerability of regional level. 18 proxy variables are selected through delphi survey to assess vulnerability over human health sector for ozone concentration change due to climate change. Also, we estimate the weighting score of proxy variables from delphi survey. The results showed that the local regions with higher vulnerability index in the sector of human health are Seoul and Daegu, whereas regions with lower one are Jeollanam-do, Gyeonggi-do, Gwangju, Busan, Daejeon, and Gangwon-do. The regions of high level vulnerability are mainly caused by their high ozone exposure. We also assessed future vulnerability according to the Intergovernmental Panel on Climate Change (IPCC) Special Report on Emissions Scenarios (SRES) A2, A1FI, A1T, A1B, B2, and B1 scenarios in 2020s, 2050s and 2100s. The results showed that vulnerability increased in all scenarios due to increased ozone concentrations. Especially vulnerability index is increased by approximately 2 times in A1FI scenarios in the 2020s. This study could support regionally adjusted adaptation polices and the quantitative background of policy priority as providing the information on the regional vulnerability of ozone due to climate change in Korea.

Proposed RASS Security Assessment Model to Improve Enterprise Security (기업 보안 향상을 위한 RASS 보안 평가 모델 제안)

  • Kim, Ju-won;Kim, Jong-min
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.635-637
    • /
    • 2021
  • Cybersecurity assessment is the process of assessing the risk level of a system through threat and vulnerability analysis to take appropriate security measures. Accurate security evaluation models are needed to prepare for the recent increase in cyberattacks and the ever-developing intelligent security threats. Therefore, we present a risk assessment model through a matrix-based security assessment model analysis that scores by assigning weights across security equipment, intervals, and vulnerabilities. The factors necessary for cybersecurity evaluation can be simplified and evaluated according to the corporate environment. It is expected that the evaluation will be more appropriate for the enterprise environment through evaluation by security equipment, which will help the cyber security evaluation research in the future.

  • PDF

A study of 'Re-consultation' on Marine Environment Impact Assessment (해역이용협의 제도 상 '재협의'의 개선방안에 대한 고찰)

  • KIM, Hyejin;OH, Hyuntaik
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.28 no.4
    • /
    • pp.913-924
    • /
    • 2016
  • Re-consultation on Marine Environment Impact Assessment (MEIA) says that business operators are then licensed back from the disposition authorities undergoing a consultation process to change business plans. Marine Environment Management Act has provisions(Article 94) with respect to a case where the scale of business, the period of business, reflects the basic plan, including a plan to change a variety of reasons. But increasingly diverse types of businesses and projects which are the subject of MEIA, As it appears that the vulnerability issues and the problem of the re-consultation. In this study conducted an analysis of the literature review and comment on the re-consultation report four years. In addition, it presents a check to the problem through concrete examples related to the re-consultation and proposes improvement measures.

A Measurement and Analysis of Low Level Radiated-Noise Using Vertical Line Array (수직선배열을 이용한 저소음 함정음향 측정 및 분석기법)

  • Choi, Jae-Yong;Son, Kweon;Dho, Kyeong-Cheol
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.6 no.2
    • /
    • pp.55-64
    • /
    • 2003
  • Underwater acoustic noise measurement is an essential element for vulnerability assessment of modern naval platforms. But during the last few decades environmental conditions have drastically changed due to the gradually increasing sea ambient noise level and decreasing submarine radiated noise level. A real-time underwater acoustic measurement system with vertical line array is designed for the quiet submarine radiated noise assessment in challenging environment. This system has a constant directivity index in measurement frequency range and accurate tracking capability for the transmission loss compensation and navigation aids inside the submarine. This system has been validated at sea and used several times for the submarine noise measurement.

Analysis of the IMO's Role for Safe Maritime Transport System

  • Kim, Inchul;An, Kwang
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.21 no.3
    • /
    • pp.266-273
    • /
    • 2015
  • Keeping in mind that there are only limited social, economic and administrative resources for reducing marine casualties, the result of statistical survey showed the loopholes of safe maritime transport system, and rendered that most casualties occurred in coastal waters by human errors. When the IMO Marine Casualty Investigation Code was utilized to reveal any structural vulnerability of the international measures, IMO was required to expand its roles to enhance the interface between Liveware and Environment of SHEL model. So, several risk assessment models were studied and found that Maritime Safety Audit System of the Republic of Korea could be a good example of enhancing safe interface between navigators (Liveware) and the navigational circumstances (Environment). It could be dealt with at IMO level as a tool for applying at human error enforcing waters. International cooperative research for upgrading risk assessment modes should also be future terms of reference.

A Study on Quantitative Security Assessment after Privacy Vulnerability Analysis of PC (PC의 개인정보보호 취약점 분석과 정량화된 보안진단 연구)

  • Seo, Mi-Sook;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.456-460
    • /
    • 2012
  • Privacy Protection Act of 30 March 2012 was performed. In general, personal information management to enhance security in the DB server has a security system but, PC for the protection of the privacy and security vulnerability analysis is needed to research on self-diagnosis. In this paper, from a PC to search information relating to privacy and enhance security by encrypting and for delete file delete recovery impossible. In pc found vulnerability analysis is Check user accounts, Checking shared folders ,Services firewall check, Screen savers, Automatic patch update Is checked. After the analysis and quantification of the vulnerability checks through the expression, enhanced security by creating a checklist for the show, PC security management, server management by semi-hwahayeo activates. In this paper the PC privacy and PC security enhancements a economic damage and of the and Will contribute to reduce complaints.

  • PDF

Development of a Windows Program for Stochastic Assessment of Voltage Sag (순간전압강하 확률적 평가를 위한 윈도우즈 프로그램 개발)

  • Park, Chang-Hyun;Jang, Gil-Soo;Kim, Chul-Hwan;Kim, Jae-Chul
    • Proceedings of the KIEE Conference
    • /
    • 2006.07a
    • /
    • pp.64-65
    • /
    • 2006
  • This paper presents a user-friendly application for stochastic assessment of voltage sag and effective visualization for analysis data. This developed tool provides basic functions for voltage sag assessment such as load flow analysis, short circuit analysis and vulnerability analysis. Particularly it has the ability to edit one-line diagram of power system and to visualize analysis results effectively using computer graphic and animation. In order to give the real sense, analysis results are displayed with geographical information in an intuitive and rapid manner.

  • PDF

Quantitative Risk Assessment in Major Smartphone Operating Systems in Asian Countries

  • Joh, HyunChul
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.12
    • /
    • pp.1494-1502
    • /
    • 2014
  • Since smartphones are utilized in the ranges from personal usages to governmental data exchanges, known but not patched vulnerabilities in smartphone operating systems are considered as major threats to the public. To minimize potential security breaches on smartphones, it is necessary to estimate possible security threats. So far, there have been numerous studies conducted to evaluate the security risks caused by mobile devices qualitatively, but there are few quantitative manners. For a large scale risk evaluation, a qualitative assessment is a never ending task. In this paper, we try to calculate relative risk levels triggered by software vulnerabilities from unsecured smartphone operating systems (Android and iOS) among 51 Asian countries. The proposed method combines widely accepted risk representation in both theory and industrial fields. When policy makers need to make a strategic decision on mobile security related agendas, they might find the presented approach useful.