• Title/Summary/Keyword: Vulnerability analysis

Search Result 1,280, Processing Time 0.03 seconds

Vibration Fatigue Analysis of Automotive Fuel Tank Using Transfer Function Method (Transfer Function Method를 이용한 자동차 연료탱크의 진동 피로 해석에 대한 연구)

  • Ahn, Sang Ho
    • Journal of Auto-vehicle Safety Association
    • /
    • v.12 no.3
    • /
    • pp.27-33
    • /
    • 2020
  • In this paper, the process of predicting efficient durability performance for vibration durability test of automobile parts using vibration test load on automobile fuel tank is presented. First of all, the common standard load that can be applied to the initial development process of the automobile was used for the fuel tank and the vulnerability of the fuel tank to the vibration fatigue load was identified through frequency response analysis. In addition, the vulnerability of the fuel tank was re-enacted through vibration durability test results, and the scale factor was applied to the standard load. In order to predict the vibration durability performance required for detailed design, vibration fatigue analysis was performed on the developed vehicle with the frequency of vibration severity equivalent to the durability test, and the vulnerability and life span of the fuel tank were identified through the process of applying weights to these selected standard loads, thereby reducing the test time of the development vehicle.

Windborne debris risk analysis - Part II. Application to structural vulnerability modeling

  • Lin, Ning;Vanmarcke, Erik;Yau, Siu-Chung
    • Wind and Structures
    • /
    • v.13 no.2
    • /
    • pp.207-220
    • /
    • 2010
  • The 'chain reaction' effect of the interaction between wind pressure and windborne debris is likely to be a major cause of damage to residential buildings during severe wind events. The current paper (Part II) concerns the quantification of such pressure-debris interaction in an advanced vulnerability model that integrates the debris risk model developed in Part I and a component-based wind-pressure damage model. This vulnerability model may be applied to predict the cumulative wind damage during the passage of particular hurricanes, to estimate annual hurricane losses, or to conduct system reliability analysis for residential developments, with the effect of windborne debris fully considered.

An Analysis of the Damage Factor Vulnerability Using a Natural Disaster DB (자연재해 DB를 이용한 피해항목별 취약성 분석)

  • Park, Jong-Kil;Jung, Woo-Sik;Choi, Hyo-Jin
    • 한국방재학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.505-508
    • /
    • 2008
  • When it grasps a total property losses and relationship of damage factors, there is possibility of reducing the natural disaster damage which is a yearly repeated. Also, checking and supply to vulnerability should be presupposed. This study aims to find out a damage factor vulnerability using a natural disaster database by Park et al(2007). And added 2005 year data to database. Total 10 damage factors are deaths(person, including missing person) injury(person), victims(person), building(thousand), vessel(thousand), cultivated land(thousand), public facilities(thousand), others(thousand), total property losses(thousand). We analyzed of correlation analysis, ratio, population, area, regional character etc for damage factors.

  • PDF

Estimating Real-time Inundation Vulnerability Index at Point-unit Farmland Scale using Fuzzy set (Fuzzy set을 이용한 실시간 지점단위 농경지 침수위험 지수 산정)

  • Eun, Sangkyu;Kim, Taegon;Lee, Jimin;Jang, Min-Won;Suh, Kyo
    • Journal of Korean Society of Rural Planning
    • /
    • v.20 no.2
    • /
    • pp.1-10
    • /
    • 2014
  • Smartphones change the picture of data and information sharing and make it possible to share various real-time flooding data and information. The vulnerability indicators of farmland inundation is needed to calculate the risk of farmland flood based on changeable hydro-meteorological data over time with morphologic characteristics of flood-damaged areas. To find related variables show the vulnerability of farmland inundation using the binary-logit model and correlation analysis and to provide vulnerability indicators were estimated by fuzzy set method. The outputs of vulnerability indicators were compared with the results of Monte Carlo simulation (MCS) for verification. From the result vulnerability indicators are applicable to mobile_based information system of farmland inundation.

Deformation-based vulnerability functions for RC bridges

  • Elnashai, A.S.;Borzi, B.;Vlachos, S.
    • Structural Engineering and Mechanics
    • /
    • v.17 no.2
    • /
    • pp.215-244
    • /
    • 2004
  • There is an ever-increasing demand for assessment of earthquake effects on transportation structures, emphasised by the crippling consequences of recent earthquakes hitting developed countries reliant on road transportation. In this work, vulnerability functions for RC bridges are derived analytically using advanced material characterisation, high quality earthquake records and adaptive inelastic dynamic analysis techniques. Four limit states are employed, all based on deformational quantities, in line with recent development of deformation-based seismic assessment. The analytically-derived vulnerability functions are then compared to a data set comprising observational damage data from the Northridge (California 1994) and Hyogo-ken Nanbu (Kobe 1995) earthquakes. The good agreement gives some confidence in the derived formulation that is recommended for use in seismic risk assessment. Furthermore, by varying the dimensions of the prototype bridge used in the study, and the span lengths supported by piers, three more bridges are obtained with different overstrength ratios (ratio of design-to-available base shear). The process of derivation of vulnerability functions is repeated and the ensuing relationships compared. The results point towards the feasibility of deriving scaling factors that may be used to obtain the set of vulnerability functions for a bridge with the knowledge of a 'generic' function and the overstrength ratio. It is demonstrated that this simple procedure gives satisfactory results for the case considered and may be used in the future to facilitate the process of deriving analytical vulnerability functions for classes of bridges once a generic relationship is established.

Comparative Analysis for Security Technology to WiBro Terminals's Vulnerability (WiBro 단말 취약에 대한 보안기술적용 비교분석)

  • Chun, Woo-Sung;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.128-131
    • /
    • 2012
  • WiBro the world is the communication technique which it standardizes from our country. The radio internet service use which uses WiBro is extending. Becomes accomplished from WiBro, terminals the internet service which is having a vulnerability in vulnerability and the Internet which come from the radio and the security technique is necessary in about vulnerability. It researched the vulnerability of WiBro terminals from the research which it sees and it researched a security technique in about vulnerability. To secure the vulnerability of WiBro, in order terminals it applies a security technique and around security technical applying comparison it analyzes.

  • PDF

Analysis of Typhoon Vulnerability According to Quantitative Loss Data of Typhoon Maemi (태풍 매미의 피해 데이터 기반 국내 태풍 취약성 분석에 관한 연구)

  • Ahn, Sung-Jin;Kim, Tae-Hui;Kim, Ji-Myong
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2019.05a
    • /
    • pp.125-126
    • /
    • 2019
  • This study aims to recognize damage indicators of typhoon and to develop damage function's indicators, using information derived from the actual loss of typhoon Maemi. As typhoons engender significant financial damage all over the world, governments and insurance companies, local or global, develop hurricane risk assessment models and use it in quantifying, avoiding, mitigating, or transferring the risks. For the reason, it is crucial to understand the importance of the risk assessment model for typhoons, and the importance of reflecting local vulnerabilities for more advanced evaluation. Although much previous research on the economic losses associated with natural disasters has identified the risk indicators that are indispensable, more comprehensive research addressing the relationship between vulnerability and economic loss are still called for. Hence this study utilizes and analyzes the actual loss record of the typhoon Maemi provided by insurance companies to fill such gaps. In this study, natural disaster indicators and basic building information indicators are used in order to generate the vulnerability functions; and the results and indicators suggest a practical approach to create the vulnerability functions for insurance companies and administrative tasks, while reflecting the financial loss and local vulnerability of the actual buildings.

  • PDF

A study on Dirty Pipe Linux vulnerability

  • Tanwar, Saurav;Kim, Hee Wan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.3
    • /
    • pp.17-21
    • /
    • 2022
  • In this study, we wanted to examine the new vulnerability 'Dirty Pipe' that is founded in Linux kernel. how it's exploited and what is the limitation, where it's existed, and overcome techniques and analysis of the Linux kernel package. The study of the method used the hmark[1] program to check the vulnerabilities. Hmark is a whitebox testing tool that helps to analyze the vulnerability based on static whitebox testing and automated verification. For this purpose of our study, we analyzed Linux kernel code that is downloaded from an open-source website. Then by analyzing the hmark tool results, we identified in which file of the kernel it exists, cvss level, statistically depicted vulnerabilities on graph which is easy to understand. Furthermore, we will talk about some software we can use to analyze a vulnerability and how hmark software works. In the case of the Dirty Pipe vulnerability in Linux allows non-privileged users to execute malicious code capable of a host of destructive actions including installing backdoors into the system, injecting code into scripts, altering binaries used by elevated programs, and creating unauthorized user profiles. This bug is being tracked as CVE-2022-0847 and has been termed "Dirty Pipe"[2] since it bears a close resemblance to Dirty Cow[3], and easily exploitable Linux vulnerability from 2016 which granted a bad actor an identical level of privileges and powers.

The Impact of Environmental Health Factors on Extreme-heat Vulnerability Assessment in a Metropolitan City (환경보건적 요소가 도시 내 폭염 취약성 평가 결과에 미치는 영향 분석)

  • Lee, Won-Jung;Kang, Jae-Eun;Kim, Yoo-Keun
    • Journal of Environmental Health Sciences
    • /
    • v.39 no.6
    • /
    • pp.492-504
    • /
    • 2013
  • Objectives: This analysis seeks to evaluate the impact of environmental health factors (EHF; e.g. hospital beds per capita, employees of medical institutions) on extreme-heat vulnerability assessment in Busan Metropolitan City during 2006-2010. Methods: According to the vulnerability concept suggested by the Intergovernmental Panel on Climate Change (IPCC), extreme-heat vulnerability is comprised of the categories of Exposure, Sensitivity, and Adaptive Capacity (including EHF). The indexes of the Exposure and Sensitivity categories indicate positive effects, while the Adaptive capacity index indicates a negative effect on extreme-heat vulnerability. Variables of each category were standardized by the re-scaling method, and then each regional relative vulnerability was computed with the vulnerability index calculation formula. Results: The extreme-heat vulnerability index (EVI) excepting EHF was much higher in urban areas than in suburban areas within the metropolitan area. When EHF was considered, the difference in the EVI between the two areas was reduced due to the increase of the Adaptive capacity index in urban areas. The low EVI in suburban areas was induced by a dominant effect of natural environmental factors (e.g. green area) within the Adaptive capacity category. Conclusions: To reduce the vulnerability to extreme heat in urban areas, which were more frequently exposed to extreme heat than others areas, public health and natural environments need to be improved in sensitive areas.

Comparative Analysis of Network-based Vulnerability Scanner for application in Nuclear Power Plants (원전 적용을 위한 네트워크 기반 취약점 스캐너의 비교 분석)

  • Lim, Su-chang;Kim, Do-yeon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.10
    • /
    • pp.1392-1397
    • /
    • 2018
  • Nuclear power plants(NPPs) are protected as core facilities managed by major countries. Applying general IT technology to facilities of NPPs, the proportion of utilizing the digitized resources for the rest of the assets except for the existing installed analog type operating resources is increasing. Using the network to control the IT assets of NPPs can provide significant benefits, but the potential vulnerability of existing IT resources can lead to significant cyber security breaches that threaten the entire NPPs. In this paper, we analyze the nuclear cyber security vulnerability regulatory requirements, characteristics of existing vulnerability scanners and their requirements and investigate commercial and free vulnerability scanners. Based on the proposed application method, we can improve the efficiency of checking the network security vulnerability of NPPs when applying vulnerability scanner to NPPs.