• Title/Summary/Keyword: risk assessment model

Search Result 1,066, Processing Time 0.031 seconds

A Study on the Operational Risk Assessment of cargo transport Korean Urban Air Mobility(K-UAM) trial operation corridor applying SORA Model (SORA 모델을 적용한 화물운송 한국형 도심항공교통(K-UAM) 시범운용 회랑의 운용위험도 평가 연구)

  • Namgung, Pyeong;Eom, Jeongho;Lee, Seungkeun;Kwon, Thawha
    • Journal of Advanced Navigation Technology
    • /
    • v.26 no.3
    • /
    • pp.125-135
    • /
    • 2022
  • UAM is emerging as the biggest issue in the aviation industry and which is attracting a lot of attention not only domestically but also internationally. In Korea, active research is being conducted centered on the government and industry-university research institutes, such as the establishment of a future K-UAM concept of operation. Therefore, in this study applies the SORA (Specific Operation Risk Assessment) model established by the European JARUS (Joint Authorities for Rulemaking on Unmanned Systems) to apply the K-UAM operation environment and specific corridor for the purpose of cargo transportation that will be operated in the future that the government is promoting. We intend to suggest policy and technical measures for risk mitigation in the initial operating environment by evaluating the level of risk and analyzing the results.

Comparative Study of Soil Risk Assessment Models used in Developed Countries (선진국의 토양위해성평가 모델 비교분석 연구)

  • An, Youn-Joo;Baek, Yong-Wook;Lee, Woo-Mi;Jeong, Seung-Woo;Kim, Tae-Seung
    • Journal of Soil and Groundwater Environment
    • /
    • v.12 no.1
    • /
    • pp.53-63
    • /
    • 2007
  • Soil risk assessment models were used to determine the goals of soil remediation and to establish the soil quality standards in developed countries. Recently, Korean Ministry of Environment prepared the guideline for soil risk assessment. Soil risk assessment model applicable to Korean situation will be needed in the near future. In this study, three models for soil risk assessment were extensively compared to suggest the fundamental components that required for the soil risk assessment in Korea. The models considered in this study were CalTOX in the United States, CLEA (Contaminated Land Exposure Assessment) in the United Kingdom, and CSOIL in the Netherlands. The major exposure routes and the intake estimation equations suitable for Korean situation were suggested. The exposure routes suggested were intake of the crops, underground water, indoor outdoor soil ingestion, dust inhalation and a volatile matter inhalation. The equations for intake estimation used in CalTOX and CSOIL seem to be applicable for the calculation of the human intake in Korea.

Utilization of deep learning-based metamodel for probabilistic seismic damage analysis of railway bridges considering the geometric variation

  • Xi Song;Chunhee Cho;Joonam Park
    • Earthquakes and Structures
    • /
    • v.25 no.6
    • /
    • pp.469-479
    • /
    • 2023
  • A probabilistic seismic damage analysis is an essential procedure to identify seismically vulnerable structures, prioritize the seismic retrofit, and ultimately minimize the overall seismic risk. To assess the seismic risk of multiple structures within a region, a large number of nonlinear time-history structural analyses must be conducted and studied. As a result, each assessment requires high computing resources. To overcome this limitation, we explore a deep learning-based metamodel to enable the prediction of the mean and the standard deviation of the seismic damage distribution of track-on steel-plate girder railway bridges in Korea considering the geometric variation. For machine learning training, nonlinear dynamic time-history analyses are performed to generate 800 high-fidelity datasets on the seismic response. Through intensive trial and error, the study is concentrated on developing an optimal machine learning architecture with the pre-identified variables of the physical configuration of the bridge. Additionally, the prediction performance of the proposed method is compared with a previous, well-defined, response surface model. Finally, the statistical testing results indicate that the overall performance of the deep-learning model is improved compared to the response surface model, as its errors are reduced by as much as 61%. In conclusion, the model proposed in this study can be effectively deployed for the seismic fragility and risk assessment of a region with a large number of structures.

Mitigating Threats and Security Metrics in Cloud Computing

  • Kar, Jayaprakash;Mishra, Manoj Ranjan
    • Journal of Information Processing Systems
    • /
    • v.12 no.2
    • /
    • pp.226-233
    • /
    • 2016
  • Cloud computing is a distributed computing model that has lot of drawbacks and faces difficulties. Many new innovative and emerging techniques take advantage of its features. In this paper, we explore the security threats to and Risk Assessments for cloud computing, attack mitigation frameworks, and the risk-based dynamic access control for cloud computing. Common security threats to cloud computing have been explored and these threats are addressed through acceptable measures via governance and effective risk management using a tailored Security Risk Approach. Most existing Threat and Risk Assessment (TRA) schemes for cloud services use a converse thinking approach to develop theoretical solutions for minimizing the risk of security breaches at a minimal cost. In our study, we propose an improved Attack-Defense Tree mechanism designated as iADTree, for solving the TRA problem in cloud computing environments.

Development of a Failure Mode and Effects Analysis Based Risk Assessment Tool for Information Security

  • Lai, Lotto Kim Hung;Chin, Kwai Sang
    • Industrial Engineering and Management Systems
    • /
    • v.13 no.1
    • /
    • pp.87-100
    • /
    • 2014
  • Risk management is recognized as a significant element in Information Security Management while the failure mode and effects analysis (FMEA) is widely used in risk analysis in manufacturing industry. This paper aims to present the development work of the Information Security FMEA Circle (InfoSec FMEA Circle) which is used to support the risk management framework by modifying traditional FMEA methodologies. In order to demonstrate the "appropriateness" of the InfoSec FMEA Circle for the purposes of assessing information security, a case study at Hong Kong Science and Technology Parks Corporation (HKSTP) is employed. The "InfoSec FMEA Circle" is found to be an effective risk assessment methodology that has a significant contribution to providing a stepwise risk management implementation model for information security management.

Development of a Risk Analysis Assessment Models for the Construction Projects (건설공사의 위험도 분석평가 및 모델개발)

  • Lee, Jeong-Sik
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.3 no.2
    • /
    • pp.233-240
    • /
    • 1999
  • Even though the recent construction safety disasters not only result in the loss inside construction sites but also become to a large public disasters, safety activities are managed in an irrational way and safety rules are ignored in the construction sites which leads to occur same type of disasters repeatedly. In this paper, a fuzzy set theoretic approach to risk analysis is proposed as an alternative to the techniques currently used in the general construction projects safety. Then the concept of risk evaluation using linguistic representation of the likelihood, exposure and consequences is introduced. A risk assessment model using approximate reasoning technique base on fuzzy logic is presented to drive fuzzy values of risk and numerical example for risk analysis is also presented to illustrate the results.

  • PDF

Compatibility for the Typhoon Damages Predicted by Korea Risk Assessment Model Input Data (한국형 재해평가모형(RAM)의 초기입력자료 적합성 평가)

  • Park, Jong-Kil;Lee, Bo-Ram;Jung, Woo-Sik
    • Journal of Environmental Science International
    • /
    • v.24 no.7
    • /
    • pp.865-874
    • /
    • 2015
  • This study was conducted to investigate the correlation between the distribution chart and input data of the predicted 3-second gust and damage cost, by using the forecast field and analysis field of Regional Data Assimilation Prediction System (RDAPS) as initial input data of Korea risk assessment model (RAM) developed in the preceding study. In this study the cases of typhoon Rusa which caused occurred great damage to the Korean peninsula was analyzed to assess the suitability of initial input data. As a result, this study has found out that the distribution chart from the forecast field and analysis field predicted from the point where the effect due to the typhoon began had similarity in both 3-second gust and damage cost with the course of time. As a result of examining the correlation, the 3-second gust had over 0.8, and it means that the forecast field and analysis field show similar results. This study has shown that utilizing the forecast field as initial input data of Korea RAM could suit the purpose of pre-disaster prevention.

Assessing the Effect of Voltage Sag in Distribution System Using a Fuzzy Risk Assessment Model (퍼지 위험도 평가 모델을 이용한 배전계통의 순간전압강하 영향 평가)

  • Yun, Sang-Yun;Oh, Jung-Hwan;Han, Byung-Duk;Kim, Jae-Chul;Park, Joong-Shin;Lim, Dong-Gyun
    • Proceedings of the KIEE Conference
    • /
    • 1999.07c
    • /
    • pp.1085-1087
    • /
    • 1999
  • In this paper, we propose the method for assessing the effect of voltage sag in power distribution system using fuzzy risk assessment model. The proposed method is based on SCBEMA curve that expresses the representative susceptibility curve by voltage sag for each customer type. These corves are made using the CBEMA curves obtained from the experiment for the customers'sensitive equipment. In order to transform SCBEMA curves to the probability damage by voltage sag, the fuzzy risk assessment model is used in this paper. Case studies were performed to analyze the effect of voltage sag by varying parameters. The Monte Carlo simulation method and the historical reliability data in KEPCO are used for case studies.

  • PDF

Development of Accident Scenario Models for the Risk Assessment of Railway Casualty Accidents (철도 사상사고 위험도 평가를 위한 사고 시나리오 모델 개발에 관한 연구)

  • Park, Chan-Woo;Wang, Jong-Bae;Cho, Yun-ok
    • Journal of the Korean Society of Safety
    • /
    • v.24 no.3
    • /
    • pp.79-87
    • /
    • 2009
  • The objective of this study is to develop accident scenario models for the risk assessment of railway casualty accidents. To develop these scenario models, hazardous events and hazardous factors were identified by gathering various accident reports and information. Then, the accident scenario models were built up. Each accident scenario model consists of an occurrence scenario model and a progress scenario model. The occurrence scenario refers to the occurrence process of the event before the hazardous event. The progress scenario means the progress process of the event after the hazardous event. To manage a large amount of accident/incident data and scenarios, a railway accident analysis information system was developed using railway accident scenario models. To test the feasibility of the developed scenario models, more than 800 domestic railway casualty accidents that occurred in 2004 and 2005 were investigated and quantitative and qualitative analyses were performed using the developed information system.

Developing Information Security Management Model for SMEs: An Empirical Study (중소기업 정보보호관리 모델의 개발: 실증 연구)

  • Lee, Jung-Woo;Park, Jun-Gi;Lee, Zoon-Ky
    • Asia pacific journal of information systems
    • /
    • v.15 no.1
    • /
    • pp.115-133
    • /
    • 2005
  • This study is to develop an information security management model(ISMM) for small and medium sized enterprises(SMEs). Based on extensive literature review, a five-pillar twelve-component reference ISMM is developed. The five pillars of SME's information security are: centralized decision making, ease of management, flexibility, agility and expandability. Twelve components are: scope & organization, security policy, resource assessment, risk assessment, implementation planning, control development, awareness training, monitoring, change management, auditing, maintenance and accident management. Subsequent survey designed and administered to expose experts' perception on the importance of these twelve components revealed that five out of tweleve components require relatively immediate attention than others, especially in SME's context. These five components are: scope and organization, resource assessment, auditing, change management, and incident management. Other seven components are policy, risk assessment, implementation planning, control development, awareness training, monitoring, and maintenance. It seems that resource limitation of SMEs directs their attention to ISMM activities that may not require a lot of resources. On the basis of these findings, a three-phase approach is developed and proposed here as an SME ISMM. Three phases are (1) foundation and promotion, (2) management and expansion, and (3) maturity. Implications of the model are discussed and suggestions are made for further research.