• Title/Summary/Keyword: Vulnerability Database

Search Result 83, Processing Time 0.023 seconds

Assessment of water use vulnerability in the unit watersheds using TOPSIS approach with subjective and objective weights (주관적·객관적 가중치를 활용한 TOPSIS 기반 단위유역별 물이용 취약성 평가)

  • Park, Hye Sun;Kim, Jeong Bin;Um, Myoung-Jin;Kim, Yeonjoo
    • Journal of Korea Water Resources Association
    • /
    • v.49 no.8
    • /
    • pp.685-692
    • /
    • 2016
  • This study aimed to develop the indicator-based approach to assess water use vulnerability in watersheds and applied to the unit watershed within the Han River watershed. Vulnerability indices were comprised of three sub-components (exposure, sensitivity, adaptive capacity) with respect to water use. The indicators were made up of 16 water use indicators. Then we estimated vulnerability indices using the Technique for Order of Preference by Similarity to Ideal Solution approach (TOPSIS). We collected environmental and socio-economic data from national statistics database, and used them for simulated results by the Soil and Water Assessment Tool (SWAT) model. For estimating the weighted values for each indicator, expert surveys for subjective weight and data-based Shannon's entropy method for objective weight were utilized. With comparing the vulnerability ranks and analyzing rank correlation between two methods, we evaluated the vulnerabilities for the Han River watershed. For water use, vulnerable watersheds showed high water use and the water leakage ratio. The indices from both weighting methods showed similar spatial distribution in general. Such results suggests that the approach to consider different weighting methods would be important for reliably assessing the water use vulnerability in watersheds.

An Approach to Drought Vulnerability Assessment using TOPSIS Method (TOPSIS을 적용한 가뭄취약성 평가 방법에 관한 연구)

  • LEE, Chang-Woo;SHIN, Hyung-Jin;KWON, Min-Sung;LEE, Gyu-Min;NAM, Sang-Hyeok;KANG, Mun-Sung
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.22 no.4
    • /
    • pp.102-115
    • /
    • 2019
  • This study aims to establish and apply a drought vulnerability assessment plan including various factors related to drought. The evaluation technique consisted of three stages: evaluation factor and weight selection, evaluation data database construction, evaluation data and weight combination, and Delphi investigation method was applied to evaluation factor and weight selection. As the evaluation method, the TOPSIS method, which is a widely used MCDM method, was used. The results of the drought vulnerability assessment were applied to the administrative districts of Sigun-gu, Korea from March 2016 to September 2019. As a result of the evaluation, drought vulnerable areas were identified in Chungcheongbuk-do, Gyeongsangnam-do, and Jeollanam-do, and it was analyzed that it is necessary to establish drought response plans for these areas.

OHDSI OMOP-CDM Database Security Weakness and Countermeasures (OHDSI OMOP-CDM 데이터베이스 보안 취약점 및 대응방안)

  • Lee, Kyung-Hwan;Jang, Seong-Yong
    • Journal of Information Technology Services
    • /
    • v.21 no.4
    • /
    • pp.63-74
    • /
    • 2022
  • Globally researchers at medical institutions are actively sharing COHORT data of patients to develop vaccines and treatments to overcome the COVID-19 crisis. OMOP-CDM, a common data model that efficiently shares medical data research independently operated by individual medical institutions has patient personal information (e.g. PII, PHI). Although PII and PHI are managed and shared indistinguishably through de-identification or anonymization in medical institutions they could not be guaranteed at 100% by complete de-identification and anonymization. For this reason the security of the OMOP-CDM database is important but there is no detailed and specific OMOP-CDM security inspection tool so risk mitigation measures are being taken with a general security inspection tool. This study intends to study and present a model for implementing a tool to check the security vulnerability of OMOP-CDM by analyzing the security guidelines for the US database and security controls of the personal information protection of the NIST. Additionally it intends to verify the implementation feasibility by real field demonstration in an actual 3 hospitals environment. As a result of checking the security status of the test server and the CDM database of the three hospitals in operation, most of the database audit and encryption functions were found to be insufficient. Based on these inspection results it was applied to the optimization study of the complex and time-consuming CDM CSF developed in the "Development of Security Framework Required for CDM-based Distributed Research" task of the Korea Health Industry Promotion Agency. According to several recent newspaper articles, Ramsomware attacks on financially large hospitals are intensifying. Organizations that are currently operating or will operate CDM databases need to install database audits(proofing) and encryption (data protection) that are not provided by the OMOP-CDM database template to prevent attackers from compromising.

Construction of Road Information Database for Urban Disaster Management : Focused on Evacuation Vulnerability (방재관점의 도로 데이터베이스 구축 : 대피위험도를 중심으로)

  • Kim, Ji-Young;Kim, Jung-Ok;Kim, Yong-Il;Yu, Ki-Yun
    • 한국공간정보시스템학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.212-216
    • /
    • 2007
  • 본 연구의 목적은 도시 지역에서 지진 발생시 중요한 대피로 역할을 하는 도로의 위험평가요소를 분석하고 데이터베이스(Database, DB)를 구축하는데 있다. 현재 우리나라는 도로의 체계적인 유지관리를 위해 도로관리통합시스템이 개발되어 있으나, 이는 도로대장전산화, 포장관리시스템, 교랑관리시스템, 도로절개면유지관리시스템 등에 한정되어 있다. 다시 말해서 재난 시 사람들이 신변의 안전을 확보할 수 있는 대피나 구급을 위한 통로로써의 도로에 대한 이해가 부족한 실정이다. 따라서 본 연구에서는 선행연구의 분석을 토대로 방재관점의 도로관리를 위한 항목들을 자연환경, 시회환경, 도로 및 시설물, 유발요인 등으로 제안하고, 서울대학교 부근을 대상지역으로 하여 이들 요인을 DB화하였다. 이는 도로와 주변 환경 등을 동시에 고려하여 재난 발생 시 대피와 구조 활동을 위한 방재계획은 물론, 지역별 위험도평가 및 재해위험도작성에 기초 자료로 이용될 것으로 기대된다. 그러나 본 연구에서는 기구축된 GIS 자료가 아닌 현장 조사를 바탕으로 구축된 DB로, 방재관점의 통합된 DB의 필요성을 제시하는데 그 의미가 있을 것이다.

  • PDF

Concept Design for Measurement against Large Fire Spreading based on BuildingDatabaseofaFolkCultureVillage

  • Umegane, Takuji;Uchida, Daisuke;Mishima, Nobuo;Wakuya, Hiroshi;Okazaki, Yasuhisa;Hayashida, Yukuo;Kitagawa, Keiko;Park, Sun-gyu;Oh, Yong-sun
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2015.05a
    • /
    • pp.21-22
    • /
    • 2015
  • This study aims to develop a current building condition database of an important folk culture village of South Korea considering their fire spread risk. We have selected a folk cultral village, and conducted field survey to reveal structure of buildings, materials of building wall, and roof style which make us understand current vulnerability of the village to fire spread. As a result, we made a current building condition database with map, which showed that the village had mixture of reinforced concrete and wood. Besides, we proposed a conceptual idea to prevent from large fire accident in the village.

  • PDF

Particle Filters using Gaussian Mixture Models for Vision-Based Navigation (영상 기반 항법을 위한 가우시안 혼합 모델 기반 파티클 필터)

  • Hong, Kyungwoo;Kim, Sungjoong;Bang, Hyochoong;Kim, Jin-Won;Seo, Ilwon;Pak, Chang-Ho
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.47 no.4
    • /
    • pp.274-282
    • /
    • 2019
  • Vision-based navigation of unmaned aerial vehicle is a significant technology that can reinforce the vulnerability of the widely used GPS/INS integrated navigation system. However, the existing image matching algorithms are not suitable for matching the aerial image with the database. For the reason, this paper proposes particle filters using Gaussian mixture models to deal with matching between aerial image and database for vision-based navigation. The particle filters estimate the position of the aircraft by comparing the correspondences of aerial image and database under the assumption of Gaussian mixture model. Finally, Monte Carlo simulation is presented to demonstrate performance of the proposed method.

A Study on the Secure Coding for Security Improvement of Delphi XE2 DataSnap Server (델파이 XE2 DataSnap 서버의 보안성 개선을 위한 시큐어 코딩에 관한 연구)

  • Jung, Myoung-Gyu;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.6
    • /
    • pp.706-715
    • /
    • 2014
  • It is used to lead to serious structural vulnerability of the system security of security-critical system when we have quickly developed software system according to urgent release schedule without appropriate security planning, management, and assurance processes. The Data Set and Provider of DataSnap, which is a middleware of Delphi XE2 of the Embarcadero Technologies Co., certainly help to develop an easy and fast-paced procedure, but it is difficult to apply security program and vulnerable to control software system security when the connection structure Database-DataSnap server-SQL Connection-SQL Data set-Provider is applied. This is due to that all kinds of information of Provider are exposed on the moment when DataSnap Server Port is sure to malicious attackers. This exposure becomes a window capable of running SQL Command. Thus, it should not be used Data Set and Provider in the DataSnap Server in consideration of all aspects of security management. In this paper, we study on the verification of the security vulnerabilities for Client and Server DataSnap in Dlephi XE2, and we propose a secure coding method to improve security vulnerability in the DataSnap server system.

Bayesian demand model based seismic vulnerability assessment of a concrete girder bridge

  • Bayat, M.;Kia, M.;Soltangharaei, V.;Ahmadi, H.R.;Ziehl, P.
    • Advances in concrete construction
    • /
    • v.9 no.4
    • /
    • pp.337-343
    • /
    • 2020
  • In the present study, by employing fragility analysis, the seismic vulnerability of a concrete girder bridge, one of the most common existing structural bridge systems, has been performed. To this end, drift demand model as a fundamental ingredient of any probabilistic decision-making analyses is initially developed in terms of the two most common intensity measures, i.e., PGA and Sa (T1). Developing a probabilistic demand model requires a reliable database that is established in this paper by performing incremental dynamic analysis (IDA) under a set of 20 ground motion records. Next, by employing Bayesian statistical inference drift demand models are developed based on pre-collapse data obtained from IDA. Then, the accuracy and reasonability of the developed models are investigated by plotting diagnosis graphs. This graphical analysis demonstrates probabilistic demand model developed in terms of PGA is more reliable. Afterward, fragility curves according to PGA based-demand model are developed.

Simplified analytical Moment-Curvature relationship for hollow circular RC cross-sections

  • Gentile, Roberto;Raffaele, Domenico
    • Earthquakes and Structures
    • /
    • v.15 no.4
    • /
    • pp.419-429
    • /
    • 2018
  • The seismic vulnerability analysis of multi-span bridges can be based on the response of the piers, provided that deck, bearings and foundations remain elastic. The lateral response of an RC bridge pier can be affected by different mechanisms (i.e., flexure, shear, lap-splice or buckling of the longitudinal reinforcement bars, second order effects). In the literature, simplified formulations are available for mechanisms different from the flexure. On the other hand, the flexural response is usually calculated with a numerically-based Moment-Curvature diagram of the base section and equivalent plastic hinge length. The goal of this paper is to propose a simplified analytical solution to obtain the Moment-Curvature relationship for hollow circular RC sections. This based on calibrated polynomials, fitted against a database comprising 720 numerical Moment-Curvature analyses. The section capacity curve is defined through the position of 6 characteristic points and they are based on four input parameters: void ratio of the hollow section, axial force ratio, longitudinal reinforcement ratio, transversal reinforcement ratio. A case study RC bridge pier is assessed with the proposed solution and the results are compared to a refined numerical FEM analysis, showing good match.

Policies for Improving Thermal Environment Using Vulnerability Assessment - A Case Study of Daegu, Korea - (열취약성 평가를 통한 열환경 개선 정책 제시 - 대구광역시를 사례로 -)

  • KIM, Kwon;EUM, Jeong-Hee
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.21 no.2
    • /
    • pp.1-23
    • /
    • 2018
  • This study aims to propose a way for evaluating thermal environment vulnerability associated with policy to improve thermal environment. For this purpose, a variety of indices concerning thermal vulnerability assessment and adaptation policies for climate change applied to 17 Korean cities were reviewed and examined. Finally, 15 indices associated with policies for improving thermal environment were selected. The selected indices for thermal vulnerability assessment were applied to Daegu Metropolitan City of South Korea as a case study. As results, 15 vulnerability maps based on the standardized indices were established, and a comprehensive map with four grades of thermal vulnerability were established for Daegu Metropolitan City. As results, the area with the highest rated area in the first-grade(most vulnerable to heat) was Dong-gu, followed by Dalseo-gu and Buk-gu, and the highest area ratio of the first-grade regions was Ansim-1-dong in Dong-gu. Based on the standardized indices, the causes of the thermal environment vulnerability of Ansim-1-dong were accounted for the number of basic livelihood security recipients, the number of cardiovascular disease deaths, heat index, and Earth's surface temperature. To improve the thermal environment vulnerability of Ansim-1-dong, active policy implementation is required in expansion and maintenance of heat wave shelters, establishment of database for the population with diseases susceptible to high temperature environments, expansion of shade areas and so on. This study shows the applicability of the vulnerability assessment method linked with the policies and is expected to contribute to the strategic and effective establishment of thermal environment policies in urban master district plans.