• Title/Summary/Keyword: risk mapping

Search Result 166, Processing Time 0.022 seconds

Evaluation of an Applicability of HEC-RAS 5.0 for 2-D Flood Inundation Analysis (2차원 홍수범람해석을 위한 HEC-RAS 5.0 적용성 평가)

  • Lee, Choon-Ho;Lee, Tae-Geun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.4
    • /
    • pp.726-733
    • /
    • 2016
  • Recently, the flood frequency and magnitude have increased due to heavy rainfall. Considering the present condition, a flood risk map has been published in many countries to raise awareness about flood damage to people. A flood inundation analysis model, which is used to publish the flood risk map, can be classified as river and inland inundation models according to the inundation cause. Although a variety of flood inundation analysis models are utilized both domestically and overseas, their usability is limited by the expensive price, except for the HEC-RAS model developed by U.S. Army Corps of Engineers (USACE). In the situation, the USACE has developed a 2-D HEC-RAS model that can be linked to the existing 1-D model. This model has been released as a beta version under the name, HEC-RAS 5.0. In this study, the HEC-RAS 5.0 model's features, usability, applicability, and accuracy were evaluated by comparing the performances on Gokgyo-cheon with the FLUMEN model, which is used for domestic flood risk mapping. The results of this study will contribute to river inundation analysis in many different ways after the HEC-RAS 5.0 model is stabilized.

The Production of Riskscapes in the Korean Developmental State: A Perspective from East Asia (동아시아 맥락에서 바라본 한국에서의 위험경관의 생산)

  • Hwang, Jin-Tae
    • Journal of the Korean Geographical Society
    • /
    • v.51 no.2
    • /
    • pp.283-303
    • /
    • 2016
  • The concept of a risk society, which was originally suggested by German sociologist Ulrich Beck, is insufficient to reveal how a certain risk materially and discursively unfolds on the ground and how its various dynamics are recognised by diverse actors because of the concept's spatial insensitivity. As an alternative approach, this paper introduces the concept of the riskscape, which was suggested by German geographer Detlef $M{\ddot{u}}ller$-Mahn, and analyses this concept in the context of the East Asian developmental state. It is meaningful that the East Asian developmental state thesis has strongly promoted the role of the state in stimulating national economic development in underdeveloped countries. However, it should also be noted that an active state role in encouraging modernisation and economic growth within a very short time produces consequences of what Beck calls 'manufactured risks', such as nuclear power plants. Therefore, it is essential to analyse the state in comprehending modernisation and the risk society in East Asia. More specifically, using the case of the location policy for nuclear power facilities, this article reveals how dominant social forces acting in and through the state constructed a national riskscape that minimises the gravity of local risks while prioritising the economic value of the national economy over local risks to produce rapid modernisation. Additionally, it is argued that a dominant national riskscape may become weak from competing with different riskscapes that are constructed based on contingency factors (e.g., political democratisation or a natural disaster). Based on these analyses, the article emphasises that interdisciplinary research using the concept of the riskscape is required to better explain the risks in East Asia.

  • PDF

Evaluation of Visiting Nursing Care Using Geographical Information System(GIS) Technology (Geographical Information System 기법을 이용한 방문간호 중재 평가)

  • Lee, Suk-Jeong;Park, Jeong-Mo
    • Journal of Korean Academy of Nursing
    • /
    • v.36 no.6
    • /
    • pp.1042-1054
    • /
    • 2006
  • Purpose: Previous evaluation studies of the visiting nursing program explained an average change of the participants' health status, without considering socio-ecological characteristics and their impacts. However, these factors must affect individual health problems and lifestyles. For effective and appropriate community based programs, the Geographical Information System(GIS) can be utilized. GIS is a computer-based tool for mapping and analyzing things that happen on earth, and integrates statistical analysis with unique visualization. The purpose of this study was to evaluate visiting nursing care and to advocate the usefulness of planning and evaluating visiting nursing programs using Exploratory Spatial Data Analysis(ESDA) with GIS technology. Methods: One hundred eighty-four elderly participants with cerebrovascular risk factors who lived in 13 areas of one community received visiting nursing care. The data analyzed characteristics of pre-post change and autocorrelation by ESDA using GIS technology. Results: Visiting nursing care showed an improvement in the participants' lifestyle habits, and family management ability and stress level, while the improvements were different depending on the regions. The change of family management ability and stress level correlated with neighborhoods (Morgan's I=0.1841, 0.1675). Conclusions: Community health providers need to consider the individual participant's health status as well as socio-ecological factors. Analysis using GIS technology will contribute to the effective monitoring, evaluation and design of a visiting nursing program.

STEREO VISION-BASED FORWARD OBSTACLE DETECTION

  • Jung, H.G.;Lee, Y.H.;Kim, B.J.;Yoon, P.J.;Kim, J.H.
    • International Journal of Automotive Technology
    • /
    • v.8 no.4
    • /
    • pp.493-504
    • /
    • 2007
  • This paper proposes a stereo vision-based forward obstacle detection and distance measurement method. In general, stereo vision-based obstacle detection methods in automotive applications can be classified into two categories: IPM (Inverse Perspective Mapping)-based and disparity histogram-based. The existing disparity histogram-based method was developed for stop-and-go applications. The proposed method extends the scope of the disparity histogram-based method to highway applications by 1) replacing the fixed rectangular ROI (Region Of Interest) with the traveling lane-based ROI, and 2) replacing the peak detection with a constant threshold with peak detection using the threshold-line and peakness evaluation. In order to increase the true positive rate while decreasing the false positive rate, multiple candidate peaks were generated and then verified by the edge feature correlation method. By testing the proposed method with images captured on the highway, it was shown that the proposed method was able to overcome problems in previous implementations while being applied successfully to highway collision warning/avoidance conditions, In addition, comparisons with laser radar showed that vision sensors with a wider FOV (Field Of View) provided faster responses to cutting-in vehicles. Finally, we integrated the proposed method into a longitudinal collision avoidance system. Experimental results showed that activated braking by risk assessment using the state of the ego-vehicle and measuring the distance to upcoming obstacles could successfully prevent collisions.

ShareSafe: An Improved Version of SecGraph

  • Tang, Kaiyu;Han, Meng;Gu, Qinchen;Zhou, Anni;Beyah, Raheem;Ji, Shouling
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5731-5754
    • /
    • 2019
  • In this paper, we redesign, implement, and evaluate ShareSafe (Based on SecGraph), an open-source secure graph data sharing/publishing platform. Within ShareSafe, we propose De-anonymization Quantification Module and Recommendation Module. Besides, we model the attackers' background knowledge and evaluate the relation between graph data privacy and the structure of the graph. To the best of our knowledge, ShareSafe is the first platform that enables users to perform data perturbation, utility evaluation, De-A evaluation, and Privacy Quantification. Leveraging ShareSafe, we conduct a more comprehensive and advanced utility and privacy evaluation. The results demonstrate that (1) The risk of privacy leakage of anonymized graph increases with the attackers' background knowledge. (2) For a successful de-anonymization attack, the seed mapping, even relatively small, plays a much more important role than the auxiliary graph. (3) The structure of graph has a fundamental and significant effect on the utility and privacy of the graph. (4) There is no optimal anonymization/de-anonymization algorithm. For different environment, the performance of each algorithm varies from each other.

A Production Method of Landslide Hazard Map by Combining Logistic Regression Analysis and AHP(Analytical Hierarchy Process) Approach Selecting Target Sites for Non-point Source Pollution Management Using Analytic Hierarchy Process

  • Lee, Yong-Joon;Park, Geun-Ae;Kim, Seong-Joon
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.49 no.3
    • /
    • pp.63-68
    • /
    • 2007
  • The LRA(Logistic Regression Analysis) conducts a quantitative analysis by collecting a lot of samples and the AHP(Analytic Hierarchy Program) makes use of expert decision influenced by subjective judgment to a certain degree. This study is to suggest a combination method in mapping landslide hazard by giving equal weight for the result of LRA and AHP. Topographic factors(slope, aspect, elevation), soil dram, soil depth and land use were adopted to classify landslide hazard areas. The three methods(LRA, AHP, the combined approach) was applied to a $520km^2$ region located in the middle of South Korea which have occurred 39 landslides during 1999 and 2003. The suggested method showed 58.9% matching rate for the real landslide sites comparing with the classified areas of high-risk landslide While LRA and AHP Showed 46.1% and 48.7% matching rates respectively. Further studies are recommended to find the optimal combining weight of LRA and AHP with more landslide data.

A Study on the Inundation Analysis of the Nam River Lowland Using GIS and FLUMAN (GIS와 FLUMAN을 이용한 남강 저지대 침수분석에 관한 연구)

  • Choi, Hyun
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.25 no.2
    • /
    • pp.49-56
    • /
    • 2017
  • In this study, flood analysis was conducted to prepare for damage caused by typhoons and heavy rain due to abnormal climate and climate change. Two - dimensional flooding analysis using the FLUMEN model, which is widely used for national and international flood risk mapping, was conducted for the Nam River Basin, which is the tributary of the Nakdong River. This study divides the topography into $5m{\times}5m$ DEM by ArcView, so that the accuracy of river repair and hydrological characterization and flood area identification can be maximized. As a result of simulation of water flooding, 163.3ha in section 1, 227.7ha in section 2 and 59.9ha in section 3 were simulated.

Using an Evaluative Criteria Software of Optimal Solutions for Enterprise Products' Sale

  • Liao, Shih Chung;Lin, Bing Yi
    • Journal of Distribution Science
    • /
    • v.13 no.4
    • /
    • pp.9-19
    • /
    • 2015
  • Purpose - This study focuses on the use of evaluative criteria software for imprecise market information, and product mapping relationships between design parameters and customer requirements. Research design, data, and methodology - This study involved using the product predicted value method, synthesizing design alternatives through a morphological analysis and plan, realizing the synthesis in multi-criteria decision-making (MCDM), and using its searching software capacity to obtain optimal solutions. Results - The establishment of product designs conforms to the customer demand, and promotes the optimization of several designs. In this study, the construction level analytic method and the simple multi attribute comment, or the quantity analytic method are used. Conclusions - This study provides a solution for enterprise products' multi-goals decision-making, because the product design lacks determinism, complexity, risk, conflict, and so on. In addition, the changeable factor renders the entire decision-making process more difficult. It uses Fuzzy deduction and the correlation technology for appraising the feasible method and multi-goals decision-making, to solve situations of the products' multi-goals and limited resources, and assigns resources for the best product design.

Estimation of Design Rainfall Based on Climate Change Scenario in Jeju Island (기후변화 시나리오를 고려한 제주도 확률강우량 산정)

  • Lee, Jun-Ho;Yang, Sung-Kee;Jung, Woo-Yul;Yang, Won-Seok
    • Journal of Environmental Science International
    • /
    • v.24 no.4
    • /
    • pp.383-391
    • /
    • 2015
  • As occurrence of gradually increasing extreme temperature events in Jeju Island, a hybrid downscaling technique that simultaneously applies by dynamical method and statistical method has implemented on design rainfall in order to reduce flood damages from severe storms and typhoons.As a result of computation, Case 1 shows a strong tendency to excessively compute rainfall, which is continuously increasing. While Case 2 showed similar trend as Case 1, low design rainfall has computed by rainfall in A1B scenario. Based on the design rainfall computation method mainly used in Preventive Disaster System through Pre-disaster Effect Examination System and Basic Plan for River of Jeju Island which are considering climatic change for selecting 50-year and 100-year frequencies. Case 3 selecting for Jeju rain gage station and Case 1 for Seogwipo rain gage station. The results were different for each rain gage station because of difference in rainfall characteristics according to recent climatic change, and the risk of currently known design rainfall can be increased in near future.

Vulnerability and Security Management System from the Perspective of the Cloud Service Users (클라우드 서비스 사용자 관점에서의 취약점과 보안관리체계)

  • Choi, Young-Jin;Ra, Jong-Hei;Ky, Hong Pil;Lee, Sang-Hak
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.4
    • /
    • pp.401-411
    • /
    • 2012
  • There has been increased interest for cloud computing services that can promote cost savings while increasing investment in information resources. Cloud computing, however, has a disadvantage physically located in the external information resources to take advantage of the economic benefits, the advantages and increase the vulnerability of information protection and control of information assets. In this study, due to the unique properties of the new services, including vulnerability, the vulnerability of cloud computing derive the vulnerability of cloud computing and control items were derived through the mapping between vulnerability and control items, that are not being managed to identify vulnerabilities Cloud computing risk factors are presented.