• Title/Summary/Keyword: Vulnerability Assessment System

Search Result 189, Processing Time 0.023 seconds

Calculation of the Area of Vulnerability to Voltage Sags by using Impedance Building Algorithm (임피던스 행렬 구성법을 이용한 순간전압강하 취약지역의 계산)

  • Park, Jong-Il;Park, Chang-Hyun
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.26 no.1
    • /
    • pp.44-53
    • /
    • 2012
  • This paper presents a method to calculate the area of vulnerability by using the impedance building algorithm. The installation of DG (Distributed Generation) is one of the countermeasures against voltage sags in power systems. In order to estimate the effect of the DG, the voltage sag assessment should be performed based on the area of vulnerability and system fault statistics. To determine the area of vulnerability, system impedance matrix should be calculated. The calculation of the impedance matrix of large systems is time-consuming task. This paper addresses an effective scheme to calculate the area of vulnerability and system impedance matrix.

DEVELOPMENT OF A VULNERABILITY ASSESSMENT CODE FOR A PHYSICAL PROTECTION SYSTEM: SYSTEMATIC ANALYSIS OF PHYSICAL PROTECTION EFFECTIVENESS (SAPE)

  • Jang, Sung-Soon;Kwan, Sung-Woo;Yoo, Ho-Sik;Kim, Jung-Soo;Yoon, Wan-Ki
    • Nuclear Engineering and Technology
    • /
    • v.41 no.5
    • /
    • pp.747-752
    • /
    • 2009
  • A vulnerability assessment is essential for the efficient operation of a physical protection system (PPS). Previous assessment codes have used a simple model called an adversary sequence diagram. In this study, the use of a two-dimensional (2D) map of a facility as a model for a PPS is suggested as an alternative approach. The analysis of a 2D model, however, consumes a lot of time. Accordingly, a generalized heuristic algorithm has been applied to address this issue. The proposed assessment method was implemented to a computer code; Systematic Analysis of physical Protection Effectiveness (SAPE). This code was applied to a variety of facilities and evaluated for feasibility by applying it to various facilities. To help upgrade a PPS, a sensitivity analysis of all protection elements along a chosen path is proposed. SAPE will help to accurately and intuitively assess a PPS.

Physical protection system vulnerability assessment of a small nuclear research reactor due to TNT-shaped charge impact on its reinforced concrete wall

  • Moo, Jee Hoon;Chirayath, Sunil S.;Cho, Sung Gook
    • Nuclear Engineering and Technology
    • /
    • v.54 no.6
    • /
    • pp.2135-2146
    • /
    • 2022
  • A nuclear energy facility is one of the most critical facilities to be safely protected during and after operation because the physical destruction of its barriers by an external attack could release radioactivity into the environment and can cause harmful effects. The barrier walls of nuclear energy facilities should be sufficiently robust to protect essential facilities from external attack or sabotage. Physical protection system (PPS) vulnerability assessment of a typical small nuclear research reactor was carried out by simulating an external attack with a tri-nitro toluene (TNT) shaped charge and results are presented. The reinforced concrete (RC) barrier wall of the research reactor located at a distance of 50 m from a TNT-shaped charge was the target of external attack. For the purpose of the impact assessment of the RC barrier wall, a finite element method (FEM) is utilized to simulate the destruction condition. The study results showed that a hole-size of diameter 342 mm at the front side and 364 mm at the back side was created on the RC barrier wall as a result of a 143.35 kg TNT-shaped charge. This aperture would be large enough to let at least one person can pass through at a time. For the purpose of the PPS vulnerability assessment, an Estimate of Adversary Sequence Interruption (EASI) model was used, which enabled the determination of most vulnerable path to the target with a probability of interruption equal to 0.43. The study showed that the RC barrier wall is vulnerable to a TNT-shaped charge impact, which could in turn reduce the effectiveness of the PPS.

Priority Assessment for Groundwater Contamination Management Using Analytic Hierarchy Process (AHP) and GIS Approach (계층분석법(AHP)과 GIS를 이용한 고양시 일대의 지하수오염 관리우선순위 평가)

  • Lee, Moung-Jin;Hyun, Yunjung;Kim, Youngju;Hwang, Sang-Il
    • Journal of Soil and Groundwater Environment
    • /
    • v.18 no.5
    • /
    • pp.26-38
    • /
    • 2013
  • In this study, priority for groundwater contamination management was assessed based on regional vulnerability in Goyang-si area, Gyonggi-do, Korea using analytic hierarchy process (AHP) and geographic information system (GIS). We proposed a concept for regional vulnerability to groundwater contamination with using socio-environmental vulnerability factors, which can be classified into three properties including regional hydrogeological property, contamination property, and groundwater use property. This concept is applied to Goyang-si area. For AHP analysis, an expertise-targeted survey was conducted. Based on the survey, a total of 10 factors (criteria) and corresponding weights for regional vulnerability assessment were determined. The result shows that regional contamination property is the most weighted factor among the three property groups (hydrogeological property: contamination property: groundwater use property = 0.3: 0.4: 0.3). Then, database layers for those factors were constructed, and regional vulnerability to groundwater contamination was assessed by weighted superposition using GIS. Results show that estimated regional vulnerability score is ranged from 22.7 to 94.5. Central and western areas of Goyang-si which have groundwater tables at shallow depths and are mainly occupied by industrial and residential areas are estimated to be relatively highly vulnerable to groundwater contamination. Based on assessed regional vulnerability, we classified areas into 4 categories. Category 1 areas, which are ranked at the top 25% of vulnerability score, take about 2.8% area in Goyang-si and give a high priority for groundwater contamination management. The results can provide useful information when the groundwater management authority decide which areas should be inspected with a high priority for efficient contamination management.

Vulnerability Assessment of Sub-Alpine Vegetations by Climate Change in Korea (한반도 지역의 기후변화에 의한 고산·아고산 식생 취약성 평가)

  • Lee, Dong-Kun;Kim, Jae-Uk
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.10 no.6
    • /
    • pp.110-119
    • /
    • 2007
  • This study's objects are to predict distribution and to assess vulnerability of sub-alpine vegetations in the Korean peninsula for climate change using various climate models. This study validates relationship between sub-alpine vegetations and environmental factors using Pearson correlation analysis. Then, the future distribution of sub-alpine vegetations are predicted by a logistic regression. The major findings in this study are; First, spring mean temperature (March-May), total precipitation, elevation and warmth index are highly influencing factors to the distribution of sub-alpine vegetations. Second, the sub-alpine vegetations will be disappeared in South Korea and concentrated around Baekdu Mountain in North Korea. North Korea is predicted to have serious impact of climate change because temperature will be increased higher than in South Korea. The study findings concluded that the assessment of the future vulnerability of sub-alpine vegetations to climate change are significant.

Vulnerability Evaluation of Groundwater Well Efficiency and Capacity in Drought Vulnerable Areas (가뭄 취약지역의 관정 효율 및 능력에 대한 취약성평가)

  • Shin, Hyung-jin;Lee, Jae-young;Jo, Sung-mun;Jeon, Sang-min;Kim, Mi-sol;Cha, Sang-sun;Park, Chan-gi
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.61 no.6
    • /
    • pp.41-53
    • /
    • 2019
  • Recently, the damage caused by climate change has been distinguished in the world. The Korean Peninsula is also suffering from drought, so it is necessary to study the vulnerability assessment to identify and predict the state of the irrigation facility, which is a irrigation facility. As the damage caused by drought is occurring in the Korean peninsula, it is necessary to study the vulnerability assessment to know the condition of the irrigation facility, and to predict it. The target areas were Yeongdong-gun, Cheonan-si, Mungyeong-si, Geochang-gun, Muju-gun, and Yeonggwang-gun. The survey items were selected as positive impacts survey items, including precipitation, groundwater level, and pumping capacity per groundwater well. The negative impacts were selected as the cultivation acreage, Number of days without rain, and the ratio of private underground wells. The survey method was investigated by various methods such as "weather data portal", "groundwater level status information", "agricultural drought management system", "groundwater survey yearbook". The results of vulnerability assessment were expressed by the score by conducting survey and standardization. As a result, Yeonggwang-gun showed normal vulnerability, and other areas showed "vulnerable" or "very vulnerable".

Development of a Vulnerability Assessment Model for Naval Ships on a Theater Engagement Analysis (전구급 교전분석을 위한 함정 취약성 평가모델 개발)

  • Lee, Sungkyun;Go, Jinyong;Kim, Changhwan;You, Seungki
    • Journal of the Korea Society for Simulation
    • /
    • v.30 no.1
    • /
    • pp.1-9
    • /
    • 2021
  • In actual battlefield environment, the naval ships which have specific missions have to respond to the attack of hostile forces. Especially, in modern warfare, the importance of the survivability of naval ships are increasing due to the high lethality of armaments. Naval ship survivability is generally considered to encompass three constituents, susceptibility, vulnerability and recoverability. Recently, among these three constituents, many researches on vulnerability have been conducted. However, for the vulnerability of naval ships, most of researches are aimed towards the detailed design stages where implementing changes is heavily constrained or even impractical. In this paper, vulnerability assessment model for naval ships on a theater engagement is developed by using M&S technique. By using this model, the characteristics of platform and armaments are reflected on the damage of naval ship. The basic logic of damage assessment is also considered in detail. The damage status of the naval ship is quantified by defining a representative state index of onboard equipment for each system.

Lake Vulnerability Assessment (호소의 취약성 평가)

  • Kim, Eung-Seok;Yoon, Ki-Yong;Lee, Seung-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.11
    • /
    • pp.6877-6883
    • /
    • 2014
  • The continuous social development has led to increasing pollution in lakes. This study proposed the LVRI (Lake Vulnerability Resilience Indicator) based on the vulnerability assessment of climate change for an environmental risk assessment in lakes sufferign water pollution in an integrated aspect of the characteristics in lake watersheds. A total of 11 representative assessment factors were selected and constructed for 6 lake basins in the Geum River Watershed to calculate the exposure, sensitivity and adaptation indicators in a vulnerability assessment classification system. The weight coefficients for assessment factors of the LVRI were also calculated using the Entropy method. This study also compared the rank results of the lake environmental risk with/without the weight coefficients of assessment factors for the practical application of the proposed lake environmental risk assessment method. The lake environmental risk results estimated in this study can be used for long-term water quality analysis and management in lakes.

Seismic vulnerability of Algerian reinforced concrete houses

  • Lazzali, Farah
    • Earthquakes and Structures
    • /
    • v.5 no.5
    • /
    • pp.571-588
    • /
    • 2013
  • Many of the current buildings in Algeria were built in the past without any consideration to the requirements of the seismic code. Among these buildings, there are a large number of individual houses built in the 1980's by their owners. They are Reinforced Concrete (RC) frame structures with unreinforced hollow masonry infill walls. This buildings type experienced major damage in the 2003 (Algeria) earthquake, generated by deficiencies in the structural system. In the present study, special attention is placed upon examining the vulnerability of RC frame houses. Their situation and their general features are investigated. Observing their seismic behavior, structural deficiencies are identified. The seismic vulnerability of this type of buildings depends on several factors, such as; structural system, plan and vertical configuration, materials and workmanship. The results of the vulnerability assessment of a group of RC frame houses are presented. Using a method based on the European Macroseismic Scale EMS-98 definitions, presented in previous studies, distribution of damage is obtained.

An Automatic Network Vulnerability Analysis System using Multiple Vulnerability Scanners (다양한 취약점 점검 도구를 이용한 자동화된 네트워크 취약점 통합 분석 시스템 설계)

  • Yoon, Jun;Sim, Won-Tae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.2
    • /
    • pp.246-250
    • /
    • 2008
  • This paper presents the design of network vulnerability analysis system which can integrate various vulnerability assessment tools to improve the preciseness of the vulnerability scan result. Manual checking method performed by a security expert is the most precise and safe way. But this is not appropriate for the large-scale network which has a lot of systems and network devices. Therefore automatic scanning tool is recommended for fast and convenient use. The scanning targets may be different according to the kind of vulnerability scanners, or otherwise even for the same scanning target, the scanning items and the scanning results may be different by each vulnerability scanner, Accordingly, there are the cases in which various scanners, instead of a single scanner, are simultaneously utilized with the purpose of complementing each other. However, in the case of simultaneously utilizing various scanners on the large-scale network, the integrative analysis and relevance analysis on vulnerability information by a security manager becomes time-consumable or impossible. The network vulnerability analysis system suggested in this paper provides interface which allows various vulnerability assessment tools to easily be integrated, common policy which can be applied for various tools at the same time, and automated integrative process.