• Title/Summary/Keyword: diffusion vulnerability

Search Result 13, Processing Time 0.019 seconds

A Study on the Evaluation Consulting Methodology of Important Information Communication Base Facility (주요 정보통신기반시설의 평가컨설팅 방법론에 대한 연구)

  • Lee, Young-Ro;Cho, Jae-Wan
    • Journal of Digital Convergence
    • /
    • v.5 no.1
    • /
    • pp.55-68
    • /
    • 2007
  • It soaks but 2001 July information communication base step law enforcement and the Enforcement Ordinance are published to follow, in order to support the establishment of evaluation and protective measure in order the vulnerability analysis against the facility of the agency which manages an important information communication base hour opinion to designate information protection specialty enterprise. As information protection specialty enterprise being revealed evacuation laboratory back 12 enterprises from information communication department become designation as the consulting enterprise and they do an enterprise activity actively. It follows in diffusion of the IT and information reconciliation level the other side where our country belongs in the world-wide first group, the research against the disfunction plan of preparation comparison the fact that law it is come negligently all actuality. The network as it will give management coat fatal effect even at obstacle occurrence hour of instant for of case and IT facility of the cyber transactions which leads, in the future there to be to corporate management, there is a possibility the stable civil official of information Facilities for communications very seeing in the portion which is important. Present condition and important propulsion contents of information communication base step law enforcement after, against a vulnerability analysis of information protection relation field and evaluation consulting methodological application situation to sleep it researches from the dissertation which it sees consequently and it does.

  • PDF

Study on NFC Security Technology and Vulnerability (NFC 보안 기술 및 보안 취약점에 관한 연구)

  • Kim, Mi-Sun;Kim, Hyun-Gon;Lee, Bum-Ki;Seo, Jae-Hyun
    • Smart Media Journal
    • /
    • v.2 no.3
    • /
    • pp.54-61
    • /
    • 2013
  • NFC is a Near Field wireless Communication technology, comes to the fore as an important technology of Mobile Payment System with supply of devices and diffusion of services. Because of the fact that the NFC retail payment services, ticketing, smart cards are able to operate in one device, it(NFC Technology) can make disclosure of personal information and security risks. Thus, the problem of security in NFC technology is essential, and the need for research on security threats are increasing. In this paper, we wil analyze for NFC's vulnerabilities and security technology.

  • PDF

A Practical Security Risk Analysis Process and Tool for Information System

  • Chung, Yoon-Jung;Kim, In-Jung;Lee, Do-Hoon
    • Journal of Information Processing Systems
    • /
    • v.2 no.2
    • /
    • pp.95-100
    • /
    • 2006
  • While conventional business administration-based information technology management methods are applied to the risk analysis of information systems, no security risk analysis techniques have been used in relation to information protection. In particular, given the rapid diffusion of information systems and the demand for information protection, it is vital to develop security risk analysis techniques. Therefore, this paper will suggest an ideal risk analysis process for information systems. To prove the usefulness of this security risk analysis process, this paper will show the results of managed, physical and technical security risk analysis that are derived from investigating and analyzing the conventional information protection items of an information system.

Difference in Injury of the Corticospinal Tract and Spinothalamic Tract in Patients with Putaminal Hemorrhage

  • Jang, Sung Ho;Seo, Jeong Pyo
    • The Journal of Korean Physical Therapy
    • /
    • v.31 no.6
    • /
    • pp.358-362
    • /
    • 2019
  • Purpose: We investigated the difference in injury of the corticospinal tract (CST) and the spinothalamic tract (STT) in patients with putaminal hemorrhage, using diffusion tensor tractography (DTT). Methods: Thirty one consecutive patients with PH and 34 control subjects were recruited for this study. DTT scanning was performed at early stage of PH (7-63 days), and the CST and STT were reconstructed using the Functional Magnetic Resonance Imaging of Brain (FMRIB) Software Library program. Injury of the CST and STT was defined in terms of the configuration or abnormal DTT parameters was more than 2 standard deviations lower than that of normal control subjects. Results: Among 31 patients, all 31 patients (100%) had injury of the CTS, whereas 25 patients (80.6%) had injury of the STT: the incidence of CST injury was significantly higher than that of STT (p<0.05). In detail, 20 (64.5%) of 31 patients showed a discontinuation of the CST in the affected hemisphere; in contrast, 14 patients (45.2%) of 31 patients showed a discontinuation of the STT in the affected hemisphere. Regarding the FA value, 6 (19.4%) of 31 patients and 2 (6.4%) of 31 patients were found to have injury in the CST and STT, respectively. In terms of the fiber number, the same injury incidence was observed in 11 patients (35.5%) in both the CST and STT. Conclusion: The greater vulnerability of the CST appears to be ascribed to the anatomical characteristics; the CST is located anteriorly to the center of the putamen compared with the STT.

A Study on Influencing Factors on User's Adoption Resistance to Personal Cloud Computing Service (개인용 클라우드 컴퓨팅 서비스 수용저항에 영향을 미치는 요인에 관한 연구)

  • Jo, In-Jea;Kim, Sun-Kyu;Yang, Sung-Byung
    • Knowledge Management Research
    • /
    • v.16 no.1
    • /
    • pp.117-142
    • /
    • 2015
  • Recently, the personal cloud computing service has been being spotlighted as an individual tool of productivity enhancement. However, compared to the rosy forecast, its diffusion rate in the domestic (Korean) market is much slower than expected. In order to find the reason for the slow growth of personal cloud computing service, we attempt to identify influencing factors on user's adoption resistance, while most prior research has focused on the factors affecting its adoption. Based on both the person-technology fit model and the privacy calculus model, we propose technostress and perceived value as key antecedents of adoption resistance. In addition, we identify (1) technical (pace of change and complexity) and personal (self-efficacy) influencing factors on technostress, and (2) beneficial (perceived mobility and perceived availability) and harmful (perceived vulnerability) influencing factors on perceived value. To validate our research model, 133 individual samples were gathered from undergraduate and graduate students who had actual experience of using at least one of personal cloud computing services. The results of the structural equation modeling confirm that both technostress and perceived value have significant effects on adoption resistance, but they have different influencing mechanisms to different types of adoption resistance (indifference, postponement, and rejection). Theoretical and practical contributions are discussed in the conclusion.

Cyclic shear test on a dowel beam-to-column connection of precast buildings

  • Magliulo, Gennaro;Ercolino, Marianna;Cimmino, Maddalena;Capozzi, Vittorio;Manfredi, Gaetano
    • Earthquakes and Structures
    • /
    • v.9 no.3
    • /
    • pp.541-562
    • /
    • 2015
  • This paper aims at developing the knowledge on the seismic behavior of dowel beam-to-column connections, typically employed in precast buildings in Europe. Despite the large diffusion of the industrial buildings, a high seismic vulnerability was exhibited by these structures, mostly due to the connection systems deficiencies, during some recent earthquakes (Emilia 2012, Turkey 2011). An experimental campaign was conducted on a typical dowel connection between an external column and a roof beam. In this paper, the performed cyclic shear test is described. According to the experimental results, the seismic response of the system is evaluated in terms of strength, stiffness and failure mechanism. Moreover, the complete damage pattern of the test is described by means of the instrumentations records. The connection failure occurred due to the concrete cover failure in the column (splitting failure). Such a mechanism corresponds to a negligible energy dissipation capacity of the connection, compared to the overall seismic response of the structure. The experimental results are also compared with the results of a similar monotonic shear test, as well as with some literature relationships for predicting the strength of dowel connections under horizontal (seismic) loads.

Analysis of the Effect of Urban Characteristics on the Number of COVID-19 Confirmed Patients (도시특성이 코로나19 확진자 수에 미치는 영향 분석)

  • Oh, Hoo;Bae, Min Ki
    • Journal of the Korean Society of Safety
    • /
    • v.37 no.4
    • /
    • pp.80-91
    • /
    • 2022
  • The purpose of this study is to contribute to strengthening the response of local governments to the emergence of new infectious diseases by identifying the urban characteristics affecting their spread. To this end, the urban characteristics influencing the spread of infectious diseases were identified from previous studies. Moreover, the variations in the impact of urban characteristics that affected the number of confirmed COVID-19 patients was spatially analyzed using geographically weighted regression (GWR). The analysis indicated that the explanatory power of the GWR was approximately 12.4% higher than that of the ordinary least squares method. Moreover, the explanatory power of the model in the northern regions, such as Seoul, Gyeonggi, and Gangwon, was particularly high, indicating that the urban characteristics affecting the spread of COVID-19 vary by region. The results of this study can be used as a basis for suggesting the formulation of customized policies reflecting the characteristics of each local government rather than a uniform spread reduction policy.

Chemical Disaster of Methyl Isocyanate Leakage (화학물질 누출에 의한 대량재해 - Methyl Isocyanate 누출을 중심으로 -)

  • Yang, Hyuk-Jun;Choi, Jung-Myung;Yoo, Dong-Jun
    • The Korean Journal of Emergency Medical Services
    • /
    • v.3 no.1
    • /
    • pp.7-19
    • /
    • 1999
  • Background : We are in the edge of some human made disasters such as hazardous materials and air pollution, for example, the world news reported that the city of Bhopal, India had serious victims related with a leaking out of the chemical materials, Methyl Isocyanate and many people in India were killed by. These situations many people who live in this world are world are worrying about are not others, but just ours and people consider about that kind of the disasters are the possible situation to happen to all the people. Therefore, we performed this basic study to recognize the risk of Methyl Isocyanate leak accident and to prepare local disaster plan with EMS system. Method : Trace 8.0, a simulation software made by the U.S. company Safer System was used as a tool to estimate the diffusion distance, area and its victims at the concentrations of 0.02ppm, 0.2ppm 5ppm respectively for an assumed B-city of 2 hundred thousands population count in which was presumed 500kg Methyl Isocyanate gas to leak out. Results : 1. During 1 hour, maximum diffusion distances of 0.02ppm 0.2ppm and 5ppm were 5.41km, 1.61km and 0.29km respectively on the plume impact. 2. Maximum population counts influenced by Methyl Isocyanate gas at the concentrations of 0.02ppm 0.2ppm and 5ppm were 40838, 4346 and 222 on the plume impact, while those were 138238, 17261 and 1588 on the vulnerability impact, respectively. 3. Therefore, 17261 persons must put on respiratory device and 138283 persons must be evacuated to safety place within 1 hour. Conclusions : Only small amount leak of Methyl Isocyanate may cause tremendous chemical disaster in urban area, so its disaster plan must be prepared with an accident simulation program and Material Safety Data Sheets(MSDS). Especially, nearby emergency center of an industrial complex must have a strong position about preparation of chemical disaster plan and perform a disaster dill of hazardous material accident annually.

  • PDF

A Study on Analysis of Landslide Disaster Area using Cellular Automata: An Application to Umyeonsan, Seocho-Gu, Seoul, Korea (셀룰러 오토마타를 이용한 산사태 재난지역 분석에 관한 연구 - 서울특별시 서초구 우면산을 대상으로-)

  • Yoon, Dong-Hyeon;Koh, Jun-Hwan
    • Spatial Information Research
    • /
    • v.20 no.1
    • /
    • pp.9-18
    • /
    • 2012
  • South Korea has many landslides caused by heavy rains during summer time recently and the landslides continue to cause damages in many places. These landslides occur repeatedly each year, and the frequency of landslides is expected to increase in the coming future due to dramatic global climate change. In Korea, 81.5% of the population is living in urban areas and about 1,055 million people are living in Seoul. In 2011, the landslide that occurred in Seocho-dong killed 18 people and about 9% of Seoul's area is under the same land conditions as Seocho-dong. Even the size of landslide occurred in a city is small, but it is more likely to cause a big disaster because of a greater population density in the city. So far, the effort has been made to identify landslide vulnerability and causes, but now, the new dem and arises for the prediction study about the areal extent of disaster area in case of landslides. In this study, the diffusion model of the landslide disaster area was established based on Cellular Automata(CA) to analyze the physical diffusion forms of landslide. This study compared the accuracy with the Seocho-dong landslide case, which occurred in July 2011, applying the SCIDDICA model and the CAESAR model. The SCIDDICA model involves the following variables, such as the movement rules and the topographical obstacles, and the CAESAR model is also applied to this process to simulate the changes of deposition and erosion.

Effect of Micro-Cracks on Chloride Ions Penetration of Concrete II: Examination of Critical Crack Width (미세균열이 콘크리트의 염소이온 침투에 미치는영향 II: 임계 균열폭의 고찰)

  • Yoon, In-Seok
    • Journal of the Korea Concrete Institute
    • /
    • v.19 no.6
    • /
    • pp.707-715
    • /
    • 2007
  • The vulnerability of concrete to its environment is significantly dependent on the fact that concrete is a porous material. For well-consolidated and well-cured concrete, its service life is a very long and an entrance of aggressive substance might be only pores. However, for cracked concrete, cracks should be preferential channel for the penetration of aggressive substance such as chloride ions. The effect of crack on chloride penetration depends on its size for example, crack width and crack depth. The purpose of this study is examining the effect of crack width and crack depth on chloride penetration. In order to visualize chloride penetration via cracks, RCM (rapid chloride migration) testing is accomplished. Crack width is examined using an optical microscope and CMOD value is used to estimate average crack width. From the examination on the trend of chloride diffusion coefficients of concrete specimens with various crack widths, a critical crack width and a critical crack depth are found out.