• Title/Summary/Keyword: Vulnerability Database

Search Result 83, Processing Time 0.028 seconds

Empirical seismic vulnerability probability prediction model of RC structures considering historical field observation

  • Si-Qi Li;Hong-Bo Liu;Ke Du;Jia-Cheng Han;Yi-Ru Li;Li-Hui Yin
    • Structural Engineering and Mechanics
    • /
    • v.86 no.4
    • /
    • pp.547-571
    • /
    • 2023
  • To deeply probe the actual earthquake level and fragility of typical reinforced concrete (RC) structures under multiple intensity grades, considering diachronic measurement building stock samples and actual observations of representative catastrophic earth shocks in China from 1990 to 2010, RC structures were divided into traditional RC structures (TRCs) and bottom reinforced concrete frame seismic wall masonry (BFM) structures, and the empirical damage characteristics and mechanisms were analysed. A great deal of statistics and induction were developed on the historical experience investigation data of 59 typical catastrophic earthquakes in 9 provinces of China. The database and fragility matrix prediction model were established with TRCs of 4,122.5284×104 m2 and 5,844 buildings and BFMs of 5,872 buildings as empirical seismic damage samples. By employing the methods of structural damage probability and statistics, nonlinear prediction of seismic vulnerability, and numerical and applied functional analysis, the comparison matrix of actual fragility probability prediction of TRC and BFM in multiple intensity regions under the latest version of China's macrointensity standard was established. A novel nonlinear regression prediction model of seismic vulnerability was proposed, and prediction models considering the seismic damage ratio and transcendental probability parameters were constructed. The time-varying vulnerability comparative model of the sample database was developed according to the different periods of multiple earthquakes. The new calculation method of the average fragility prediction index (AFPI) matrix parameter model has been proposed to predict the seismic fragility of an areal RC structure.

Development of Vulnerability Scanner using Search Engine (검색엔진을 이용한 취약점 분석 시스템 개발)

  • Joo, Bok-Gyu;Min, Beung-Woo;Chang, Moon-Suk;Ahn, Chang-Kyum;Yang, Dong-Hyuk
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.1
    • /
    • pp.19-24
    • /
    • 2009
  • In these days, security threat is ever increasing as computer systems and networking is everywhere. This paper is on the development of security scanner using search engine, with which site managers can easily check security vulnerability on their systems. Our security server automatically collects security-related information on the Internet, and indexes them in the database. To check the vulnerability of a customer server, the client system collects various system-specific information, and sends necessary queries to our security server for vulnerability checking. Up-to-date and site-specific vulnerability information is retrieved through the viewer, which allows the customer effectively to check and respond to security threat on client systems.

  • PDF

A Study on the Database of Disasters and Disaster Technologies in the Joseon Dynasty Era (조선시대의 재난 데이타베이스 구축 및 대응에 관한 연구)

  • Lee, Ji Hee;Fang, Rong
    • Journal of the Korean Society of Safety
    • /
    • v.28 no.1
    • /
    • pp.137-143
    • /
    • 2013
  • Cultural heritage passing down to posterity is a global concern. But there are many culture heritage that not remained to now disappeared by various disasters. It is told that disaster is learnt from disaster. The most fundamental task in disaster prevention is to collect and analyze cases of accidents so as not to repeat a disaster. In other words, an analysis of various disaster-related materials and their countermeasures in the Joseon period is an actual condition-based phenomenological methodology used to prevent disasters at cultural properties today. In this context, it is important to collect histories of disasters in the Joseon period, to extract disaster-related historical data and to categorize the data to build a disaster literature database. This study has produced [Database of Disasters in the Joseon Era], a collection of articles on fire outbreaks based on The Annals and The Daily Records belonging to the Memory of the World. On the basis of this chronology, human and property damages caused by fires in Joseon have been examined, identified by districts, as well as disaster technologies, have been analyzed. It has also built disaster vulnerability maps in the Joseon Dynasty Era.

Insights from existing earthquake loss assessment research in Croatia

  • Hadzima-Nyarko, Marijana;Sipos, Tanja Kalman
    • Earthquakes and Structures
    • /
    • v.13 no.4
    • /
    • pp.365-375
    • /
    • 2017
  • Seismic risk management has two main technical aspects: to recommend the construction of high-performance buildings and other structures using earthquake-resistant designs or evaluate existing ones, and to prepare emergency plans using realistic seismic scenarios. An overview of seismic risk assessment methodologies in Croatia is provided with details regarding the components of the assessment procedures: hazard, vulnerability and exposure. For Croatia, hazard is presented with two maps and it is expressed in terms of the peak horizontal ground acceleration during an earthquake, with the return period of 95 or 475 years. A standard building typology catalogue for Croatia has not been prepared yet, but a database for the fourth largest city in Croatia is currently in its initial stage. Two methods for earthquake vulnerability assessment are applied and compared. The first is a relatively simple and fast analysis of potential seismic vulnerability proposed by Croatian researchers using damage index (DI) as a numerical value indicating the level of structural damage, while the second is the Macroseismic method.

A Study on Database Access Control using Least-Privilege Account Separation Model (최소 권한 계정 분리 모델을 이용한 데이터베이스 엑세스 제어 연구)

  • Jang, Youngsu
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.3
    • /
    • pp.101-109
    • /
    • 2019
  • In addition to enabling access, database accounts play a protective role by defending the database from external attacks. However, because only a single account is used in the database, the account becomes the subject of vulnerability attacks. This common practice is due to the lack of database support, large numbers of users, and row-based database permissions. Therefore if the logic of the application is wrong or vulnerable, there is a risk of exposing the entire database. In this paper, we propose a Least-Privilege Account Separation Model (LPASM) that serves as an information guardian to protect the database from attacks. We separate database accounts depending on the role of application services. This model can protect the database from malicious attacks and prevent damage caused by privilege escalation by an attacker. We classify the account control policies into four categories and propose detailed roles and operating plans for each account.

The Proxy Variables Selection of Vulnerability Assessment for Agricultural Infrastructure According to Climate Change (논문 - 기후변화에 따른 농업생산기반 재해 취약성 평가를 위한 대리변수 선정)

  • Kim, Sung-Jae;Park, Tae-Yang;Kim, Sung-Min;Kim, Sang-Min
    • KCID journal
    • /
    • v.18 no.2
    • /
    • pp.33-42
    • /
    • 2011
  • Climate change has impacts on not only the average temperature rise but also the intensity and frequency of extreme events such as flood and drought. It is also expected that the damages on agricultural infrastructure will be increased resulting from increased rainfall intensity and frequency caused by climate change. To strengthen the climate change adaptation capacity, it is necessary to identify the vulnerability of a given society's physical infrastructures and to develop appropriate adaptation strategies with infrastructure management because generally facilities related to human settlements are vulnerable to climate changes and establishing an adaptive public infrastructure would reduce the damages and the repair cost. Therefore, development of mitigation strategies for agricultural infrastructure against climatic hazard is very important, but there are few studies on agricultural infrastructure vulnerability assessment and adaptation strategies. The concept of vulnerability, however, is difficult to functionally define due to the fact that vulnerability itself includes many aspects (biological, socioeconomic, etc.) in various sectors. As such, much research on vulnerability has used indicators which are useful for standardization and aggregation. In this study, for the vulnerability assessment for agricultural infrastructure, 3 categories of climate exposure, sensitivity, and adaptation capacity were defined which are composed of 16 sub-categories and 49 proxy variables. Database for each proxy variables was established based on local administrative province. Future studies are required to define the weighting factor and standardization method to calculate the vulnerability indicator for agricultural infrastructure against climate change.

  • PDF

Priority Assessment for Groundwater Contamination Management Using Analytic Hierarchy Process (AHP) and GIS Approach (계층분석법(AHP)과 GIS를 이용한 고양시 일대의 지하수오염 관리우선순위 평가)

  • Lee, Moung-Jin;Hyun, Yunjung;Kim, Youngju;Hwang, Sang-Il
    • Journal of Soil and Groundwater Environment
    • /
    • v.18 no.5
    • /
    • pp.26-38
    • /
    • 2013
  • In this study, priority for groundwater contamination management was assessed based on regional vulnerability in Goyang-si area, Gyonggi-do, Korea using analytic hierarchy process (AHP) and geographic information system (GIS). We proposed a concept for regional vulnerability to groundwater contamination with using socio-environmental vulnerability factors, which can be classified into three properties including regional hydrogeological property, contamination property, and groundwater use property. This concept is applied to Goyang-si area. For AHP analysis, an expertise-targeted survey was conducted. Based on the survey, a total of 10 factors (criteria) and corresponding weights for regional vulnerability assessment were determined. The result shows that regional contamination property is the most weighted factor among the three property groups (hydrogeological property: contamination property: groundwater use property = 0.3: 0.4: 0.3). Then, database layers for those factors were constructed, and regional vulnerability to groundwater contamination was assessed by weighted superposition using GIS. Results show that estimated regional vulnerability score is ranged from 22.7 to 94.5. Central and western areas of Goyang-si which have groundwater tables at shallow depths and are mainly occupied by industrial and residential areas are estimated to be relatively highly vulnerable to groundwater contamination. Based on assessed regional vulnerability, we classified areas into 4 categories. Category 1 areas, which are ranked at the top 25% of vulnerability score, take about 2.8% area in Goyang-si and give a high priority for groundwater contamination management. The results can provide useful information when the groundwater management authority decide which areas should be inspected with a high priority for efficient contamination management.

Military Vulnerability Management Plan based on Military IT Asset Management System for Cyber Threat Response (사이버 위협 대응을 위한 군(軍) 정보화자산관리시스템과 연계한 군(軍) 취약점 관리 방안)

  • Kim, Jong Hwa;Lim, Jae Sung
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.111-116
    • /
    • 2018
  • The Cyber space of the ROK Army is constantly threatened by enemy. In order to reponse to such cyber treats, vulnerabilities of information assets of the ROK Army should be identified and eliminated early. However, the ROK Army currently lacks systematic management of vulnerabilities. Therefore, this paper investigates trends of each country's vulnerability management and the actual situation of the management of the vulnerabilities in the ROK Army, and suggests ways of linking vulnerability database and the ROK Army information asset management system for effective vulnerability management of the ROK Army information assets.

  • PDF

Research on Disaster and Fire Response Capability and Hazard Analysis Using Basic Mapping Method (Mapping을 이용한 소방방재력 및 재해취약성의 연구)

  • Wang, Soon-Joo;Baek, Min-Ho
    • Journal of the Society of Disaster Information
    • /
    • v.3 no.1
    • /
    • pp.69-86
    • /
    • 2007
  • The fire department has one of the most important role as public resources of response to disasters in the aspect of supply and the adequate distribution of resources of response is essential, but the distribution of the response capability to disaster of fire department does not reflect the regional hazard vulnerability and hazard risks. Researchers performed database process with simple mapping based on the regional fire disaster response capability and the regional hazard vulnerability and hazard risks. The cities and towns are divided to four types each, total eight types and relative threat ratios are extracted from every type. The fire disaster response capability was extracted from number of firemen and fire vehicles in defined region. The distribution of the fire disaster response capability was inadequate and not matching to relative threat especially in small cities and some types of towns. The regional relative threat and resources should be analyzed by more delicate mapping and software development in the future.

  • PDF

Seismic vulnerability of old confined masonry buildings in Osijek, Croatia

  • Hadzima-Nyarko, Marijana;Pavica, Gordana;Lesic, Marija
    • Earthquakes and Structures
    • /
    • v.11 no.4
    • /
    • pp.629-648
    • /
    • 2016
  • This paper deals with 111 buildings built between 1962 and 1987, from various parts of the city of Osijek, for which, through the collection of documentation, a database is created. The aim of this paper is to provide the first steps in assessing seismic risk in Osijek applying method based on vulnerability index. This index uses collected information of parameters of the building: the structural system, the construction year, plan, the height, i.e., the number of stories, the type of foundation, the structural and non-structural elements, the type and the quality of main construction material, the position in the block and built-up area. According to this method defining five damage states, the action is expressed in terms of the macroseismic intensity and the seismic quality of the buildings by means of a vulnerability index. The value of the vulnerability index can be changed depending on the structural systems, quality of construction, etc., by introducing behavior and regional modifiers based on expert judgments. Since there is no available data of damaged buildings under earthquake loading in our country, we will propose behavior modifiers based on values suggested by earlier works and on judgment based on available project documentation of the considered buildings. Depending on the proposed modifiers, the seismic vulnerability of existing buildings in the city of Osijek will be assessed. The resulting vulnerability of the considered residential buildings provides necessary insight for emergency planning and for identification of critical objects vulnerable to seismic loading.