• 제목/요약/키워드: risk assessment model

검색결과 1,077건 처리시간 0.031초

SORA 모델을 적용한 화물운송 한국형 도심항공교통(K-UAM) 시범운용 회랑의 운용위험도 평가 연구 (A Study on the Operational Risk Assessment of cargo transport Korean Urban Air Mobility(K-UAM) trial operation corridor applying SORA Model)

  • 남궁평;엄정호;이승근;권태화
    • 한국항행학회논문지
    • /
    • 제26권3호
    • /
    • pp.125-135
    • /
    • 2022
  • 최근 항공산업 분야의 최대 이슈로 부각되고 있는 UAM(Urban Air Mobility)은 국내 뿐아니라 국제적으로 많은 관심이 집중되고 있다. 현재 우리나라는 미래 K-UAM 운용개념서 제정 등 정부 및 산학연을 중심으로 활발한 연구가 진행되고 있으나 아직까지 비행안전의 핵심 요소인 K-UAM 운용 환경에 대한 위험도 평가 방안은 마련되어 있지 않다. 따라서 본 논문에서는 유럽 JARUS(Joint Authorities for Rulemaking on Unmanned Systems)에서 제정한 SORA(Specific Operation Risk Assessment) 모델을 적용하여 정부가 추진하고 있는 화물 운송 목적의 K-UAM 운용 환경 및 특정 회랑을 대상으로 위험도를 평가하고 그에 따른 결과 분석을 통해 위험도 완화를 위한 정책 및 기술적 방안을 제시하고자 한다.

선진국의 토양위해성평가 모델 비교분석 연구 (Comparative Study of Soil Risk Assessment Models used in Developed Countries)

  • 안윤주;백용욱;이우미;정승우;김태승
    • 한국지하수토양환경학회지:지하수토양환경
    • /
    • 제12권1호
    • /
    • pp.53-63
    • /
    • 2007
  • 우리나라는 최근에 토양위해성평가 지침을 마련하였으며, 앞으로 토양위해성모델 개발에 대한 필요성이 대두되고 있다. 선진국에서는 자국 내 부지특성과 노출경로를 고려한 토양위해성평가 모델을 토양정책 전반에 활용하고 있다. 본 연구에서는 선진국에서 위해성평가에 이용되는 대표적인 오염토양 위해성평가 모델을 비교분석하였다. 연구대상이 된 모델은 미국, 영국, 네덜란드에서 사용하고 있는 CalTOX, CLEA, CSOIL로서, 노출경로, 토지이용도 그리고 노출량 산정식을 중심으로 비교분석하였다. 모델 검토시 우선적으로 비교 분석된 항목은 노출시나리오, 노출경로, 입력변수의 공통사항이며, 이러한 분석결과를 토대로 선진국의 토양위해성 모델들이 공통적으로 포함하고 있는 노출경로를 추출하여, 국내에 적용 가능한 토양 위해성평가 모델개발의 기초자료로 제안하였다. 인체노출량 산정식에서는 일반적으로 미국식 방법이 국내 상황에서 사용이 용이한 것으로 판단되며, 비산먼지나 휘발물질 흡입의 경우는 네덜란드식이 기본값이 제공되어 있으므로 사용하기가 편리할 것으로 판단된다.

Utilization of deep learning-based metamodel for probabilistic seismic damage analysis of railway bridges considering the geometric variation

  • Xi Song;Chunhee Cho;Joonam Park
    • Earthquakes and Structures
    • /
    • 제25권6호
    • /
    • pp.469-479
    • /
    • 2023
  • A probabilistic seismic damage analysis is an essential procedure to identify seismically vulnerable structures, prioritize the seismic retrofit, and ultimately minimize the overall seismic risk. To assess the seismic risk of multiple structures within a region, a large number of nonlinear time-history structural analyses must be conducted and studied. As a result, each assessment requires high computing resources. To overcome this limitation, we explore a deep learning-based metamodel to enable the prediction of the mean and the standard deviation of the seismic damage distribution of track-on steel-plate girder railway bridges in Korea considering the geometric variation. For machine learning training, nonlinear dynamic time-history analyses are performed to generate 800 high-fidelity datasets on the seismic response. Through intensive trial and error, the study is concentrated on developing an optimal machine learning architecture with the pre-identified variables of the physical configuration of the bridge. Additionally, the prediction performance of the proposed method is compared with a previous, well-defined, response surface model. Finally, the statistical testing results indicate that the overall performance of the deep-learning model is improved compared to the response surface model, as its errors are reduced by as much as 61%. In conclusion, the model proposed in this study can be effectively deployed for the seismic fragility and risk assessment of a region with a large number of structures.

Mitigating Threats and Security Metrics in Cloud Computing

  • Kar, Jayaprakash;Mishra, Manoj Ranjan
    • Journal of Information Processing Systems
    • /
    • 제12권2호
    • /
    • pp.226-233
    • /
    • 2016
  • Cloud computing is a distributed computing model that has lot of drawbacks and faces difficulties. Many new innovative and emerging techniques take advantage of its features. In this paper, we explore the security threats to and Risk Assessments for cloud computing, attack mitigation frameworks, and the risk-based dynamic access control for cloud computing. Common security threats to cloud computing have been explored and these threats are addressed through acceptable measures via governance and effective risk management using a tailored Security Risk Approach. Most existing Threat and Risk Assessment (TRA) schemes for cloud services use a converse thinking approach to develop theoretical solutions for minimizing the risk of security breaches at a minimal cost. In our study, we propose an improved Attack-Defense Tree mechanism designated as iADTree, for solving the TRA problem in cloud computing environments.

Development of a Failure Mode and Effects Analysis Based Risk Assessment Tool for Information Security

  • Lai, Lotto Kim Hung;Chin, Kwai Sang
    • Industrial Engineering and Management Systems
    • /
    • 제13권1호
    • /
    • pp.87-100
    • /
    • 2014
  • Risk management is recognized as a significant element in Information Security Management while the failure mode and effects analysis (FMEA) is widely used in risk analysis in manufacturing industry. This paper aims to present the development work of the Information Security FMEA Circle (InfoSec FMEA Circle) which is used to support the risk management framework by modifying traditional FMEA methodologies. In order to demonstrate the "appropriateness" of the InfoSec FMEA Circle for the purposes of assessing information security, a case study at Hong Kong Science and Technology Parks Corporation (HKSTP) is employed. The "InfoSec FMEA Circle" is found to be an effective risk assessment methodology that has a significant contribution to providing a stepwise risk management implementation model for information security management.

건설공사의 위험도 분석평가 및 모델개발 (Development of a Risk Analysis Assessment Models for the Construction Projects)

  • 이정식
    • 한국구조물진단유지관리공학회 논문집
    • /
    • 제3권2호
    • /
    • pp.233-240
    • /
    • 1999
  • Even though the recent construction safety disasters not only result in the loss inside construction sites but also become to a large public disasters, safety activities are managed in an irrational way and safety rules are ignored in the construction sites which leads to occur same type of disasters repeatedly. In this paper, a fuzzy set theoretic approach to risk analysis is proposed as an alternative to the techniques currently used in the general construction projects safety. Then the concept of risk evaluation using linguistic representation of the likelihood, exposure and consequences is introduced. A risk assessment model using approximate reasoning technique base on fuzzy logic is presented to drive fuzzy values of risk and numerical example for risk analysis is also presented to illustrate the results.

  • PDF

한국형 재해평가모형(RAM)의 초기입력자료 적합성 평가 (Compatibility for the Typhoon Damages Predicted by Korea Risk Assessment Model Input Data)

  • 박종길;이보람;정우식
    • 한국환경과학회지
    • /
    • 제24권7호
    • /
    • pp.865-874
    • /
    • 2015
  • This study was conducted to investigate the correlation between the distribution chart and input data of the predicted 3-second gust and damage cost, by using the forecast field and analysis field of Regional Data Assimilation Prediction System (RDAPS) as initial input data of Korea risk assessment model (RAM) developed in the preceding study. In this study the cases of typhoon Rusa which caused occurred great damage to the Korean peninsula was analyzed to assess the suitability of initial input data. As a result, this study has found out that the distribution chart from the forecast field and analysis field predicted from the point where the effect due to the typhoon began had similarity in both 3-second gust and damage cost with the course of time. As a result of examining the correlation, the 3-second gust had over 0.8, and it means that the forecast field and analysis field show similar results. This study has shown that utilizing the forecast field as initial input data of Korea RAM could suit the purpose of pre-disaster prevention.

퍼지 위험도 평가 모델을 이용한 배전계통의 순간전압강하 영향 평가 (Assessing the Effect of Voltage Sag in Distribution System Using a Fuzzy Risk Assessment Model)

  • 윤상윤;오정환;한병덕;김재철;박중신;임동균
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1999년도 하계학술대회 논문집 C
    • /
    • pp.1085-1087
    • /
    • 1999
  • In this paper, we propose the method for assessing the effect of voltage sag in power distribution system using fuzzy risk assessment model. The proposed method is based on SCBEMA curve that expresses the representative susceptibility curve by voltage sag for each customer type. These corves are made using the CBEMA curves obtained from the experiment for the customers'sensitive equipment. In order to transform SCBEMA curves to the probability damage by voltage sag, the fuzzy risk assessment model is used in this paper. Case studies were performed to analyze the effect of voltage sag by varying parameters. The Monte Carlo simulation method and the historical reliability data in KEPCO are used for case studies.

  • PDF

철도 사상사고 위험도 평가를 위한 사고 시나리오 모델 개발에 관한 연구 (Development of Accident Scenario Models for the Risk Assessment of Railway Casualty Accidents)

  • 박찬우;왕종배;조연옥
    • 한국안전학회지
    • /
    • 제24권3호
    • /
    • pp.79-87
    • /
    • 2009
  • The objective of this study is to develop accident scenario models for the risk assessment of railway casualty accidents. To develop these scenario models, hazardous events and hazardous factors were identified by gathering various accident reports and information. Then, the accident scenario models were built up. Each accident scenario model consists of an occurrence scenario model and a progress scenario model. The occurrence scenario refers to the occurrence process of the event before the hazardous event. The progress scenario means the progress process of the event after the hazardous event. To manage a large amount of accident/incident data and scenarios, a railway accident analysis information system was developed using railway accident scenario models. To test the feasibility of the developed scenario models, more than 800 domestic railway casualty accidents that occurred in 2004 and 2005 were investigated and quantitative and qualitative analyses were performed using the developed information system.

중소기업 정보보호관리 모델의 개발: 실증 연구 (Developing Information Security Management Model for SMEs: An Empirical Study)

  • 이정우;박준기;이준기
    • Asia pacific journal of information systems
    • /
    • 제15권1호
    • /
    • pp.115-133
    • /
    • 2005
  • This study is to develop an information security management model(ISMM) for small and medium sized enterprises(SMEs). Based on extensive literature review, a five-pillar twelve-component reference ISMM is developed. The five pillars of SME's information security are: centralized decision making, ease of management, flexibility, agility and expandability. Twelve components are: scope & organization, security policy, resource assessment, risk assessment, implementation planning, control development, awareness training, monitoring, change management, auditing, maintenance and accident management. Subsequent survey designed and administered to expose experts' perception on the importance of these twelve components revealed that five out of tweleve components require relatively immediate attention than others, especially in SME's context. These five components are: scope and organization, resource assessment, auditing, change management, and incident management. Other seven components are policy, risk assessment, implementation planning, control development, awareness training, monitoring, and maintenance. It seems that resource limitation of SMEs directs their attention to ISMM activities that may not require a lot of resources. On the basis of these findings, a three-phase approach is developed and proposed here as an SME ISMM. Three phases are (1) foundation and promotion, (2) management and expansion, and (3) maturity. Implications of the model are discussed and suggestions are made for further research.