• Title/Summary/Keyword: risk mapping

Search Result 170, Processing Time 0.033 seconds

A Study on the Inundation Analysis of the Nam River Lowland Using GIS and FLUMAN (GIS와 FLUMAN을 이용한 남강 저지대 침수분석에 관한 연구)

  • Choi, Hyun
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.25 no.2
    • /
    • pp.49-56
    • /
    • 2017
  • In this study, flood analysis was conducted to prepare for damage caused by typhoons and heavy rain due to abnormal climate and climate change. Two - dimensional flooding analysis using the FLUMEN model, which is widely used for national and international flood risk mapping, was conducted for the Nam River Basin, which is the tributary of the Nakdong River. This study divides the topography into $5m{\times}5m$ DEM by ArcView, so that the accuracy of river repair and hydrological characterization and flood area identification can be maximized. As a result of simulation of water flooding, 163.3ha in section 1, 227.7ha in section 2 and 59.9ha in section 3 were simulated.

Using an Evaluative Criteria Software of Optimal Solutions for Enterprise Products' Sale

  • Liao, Shih Chung;Lin, Bing Yi
    • Journal of Distribution Science
    • /
    • v.13 no.4
    • /
    • pp.9-19
    • /
    • 2015
  • Purpose - This study focuses on the use of evaluative criteria software for imprecise market information, and product mapping relationships between design parameters and customer requirements. Research design, data, and methodology - This study involved using the product predicted value method, synthesizing design alternatives through a morphological analysis and plan, realizing the synthesis in multi-criteria decision-making (MCDM), and using its searching software capacity to obtain optimal solutions. Results - The establishment of product designs conforms to the customer demand, and promotes the optimization of several designs. In this study, the construction level analytic method and the simple multi attribute comment, or the quantity analytic method are used. Conclusions - This study provides a solution for enterprise products' multi-goals decision-making, because the product design lacks determinism, complexity, risk, conflict, and so on. In addition, the changeable factor renders the entire decision-making process more difficult. It uses Fuzzy deduction and the correlation technology for appraising the feasible method and multi-goals decision-making, to solve situations of the products' multi-goals and limited resources, and assigns resources for the best product design.

Estimation of Design Rainfall Based on Climate Change Scenario in Jeju Island (기후변화 시나리오를 고려한 제주도 확률강우량 산정)

  • Lee, Jun-Ho;Yang, Sung-Kee;Jung, Woo-Yul;Yang, Won-Seok
    • Journal of Environmental Science International
    • /
    • v.24 no.4
    • /
    • pp.383-391
    • /
    • 2015
  • As occurrence of gradually increasing extreme temperature events in Jeju Island, a hybrid downscaling technique that simultaneously applies by dynamical method and statistical method has implemented on design rainfall in order to reduce flood damages from severe storms and typhoons.As a result of computation, Case 1 shows a strong tendency to excessively compute rainfall, which is continuously increasing. While Case 2 showed similar trend as Case 1, low design rainfall has computed by rainfall in A1B scenario. Based on the design rainfall computation method mainly used in Preventive Disaster System through Pre-disaster Effect Examination System and Basic Plan for River of Jeju Island which are considering climatic change for selecting 50-year and 100-year frequencies. Case 3 selecting for Jeju rain gage station and Case 1 for Seogwipo rain gage station. The results were different for each rain gage station because of difference in rainfall characteristics according to recent climatic change, and the risk of currently known design rainfall can be increased in near future.

Vulnerability and Security Management System from the Perspective of the Cloud Service Users (클라우드 서비스 사용자 관점에서의 취약점과 보안관리체계)

  • Choi, Young-Jin;Ra, Jong-Hei;Ky, Hong Pil;Lee, Sang-Hak
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.4
    • /
    • pp.401-411
    • /
    • 2012
  • There has been increased interest for cloud computing services that can promote cost savings while increasing investment in information resources. Cloud computing, however, has a disadvantage physically located in the external information resources to take advantage of the economic benefits, the advantages and increase the vulnerability of information protection and control of information assets. In this study, due to the unique properties of the new services, including vulnerability, the vulnerability of cloud computing derive the vulnerability of cloud computing and control items were derived through the mapping between vulnerability and control items, that are not being managed to identify vulnerabilities Cloud computing risk factors are presented.

Assessment of Ecosystem services under changing climate in the Bagmati Basin of Nepal

  • Bastola, Shiksha;Seong, Yeon-Jeong;Lee, Sanghyup;Jung, Younghun
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2019.05a
    • /
    • pp.148-148
    • /
    • 2019
  • The 2006 Millennium Ecosystem Assessment (MA) defines ecosystem services (ES) as "the benefits people obtain from ecosystems". Identifying where ES originates, whom it benefits and how it is changing over a period of time is critical in rapidly developing country like Nepal, where the risk of ES loss is high. In the context of various ecosystem services provided by watershed, this study, particularly deals with water yield, Soil loss and Carbon sequestration computation and evaluation in Bagmati Basin of Nepal. As Bagmati Basin incorporates capital city Kathmandu of nepal, land use change is significant over decades and mapping of ES is crucial for sustainable development of Basin in future. In this regard, the objectives of this study are 1) To compute the total and sub-watershed scale water yield of the basin, 2) Computation of soil loss and sediment retention in the basin, and 3) Computation of carbon sequestration in the basin. Integrated Valuation of Environmental Services and Tradeoffs (InVEST), a popular model for ecosystem service assessment based on Budyko hydrological method is used to compute Ecosystem services. The scenario of ES in two periods of time can be referenced for various approaches of prioritization and incorporation of their value into local and regional decision making for management of basin.

  • PDF

A New Methodology for Flood Prediction Mapping Using Levee Risk Map (제방 리스크 지도를 활용한 새로운 침수예상도 작성)

  • Lee, Jae Yeong;Park, Jun Hyung;Han, Kun Yeun
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2016.05a
    • /
    • pp.116-116
    • /
    • 2016
  • 최근 이상기후로 인해 다양한 원인으로 홍수가 발생하고 있으며, 이에 대한 대책으로 가상의 강우 시나리오에 대한 침수예상도가 작성되어 해당지역의 주민들에게 정보를 제공하고 있다. 하지만 이러한 침수예상도가 나타내는 모든 지역에 대해 예산을 투자하여 대비를 할 수 없는 실정이다. 이를 보완하기 위해 본 연구에서는 제방에 대한 수리학적, 지반공학적 위험도, 제방 자체의 성질과 특성을 반영한 취약도를 포함하는 제방 리스크 지도를 작성하여 외수범람에 대한 안전도를 등급화 하였다. 그 결과 침수예상도를 작성하는데 있어 제방 리스크 지도에서 등급이 높은, 즉 리스크가 높은 제방에 대한 재해대책을 수립하는 것이 효율적이다. 본 연구에서는 안성천 유역을 대상으로 제방 리스크 평가를 실시하고, 작성된 제방 리스크 지도를 바탕으로 제방의 붕괴 및 월류시나리오에 대해 1차원 외수범람 해석 및 2차원 침수해석을 실시하여 침수예상도를 작성하였다. 또한 기존의 침수예상도는 침수심에 대한 위험도만을 구분하여 나타내고 있지만, 본 연구에서는 다양한 요소에 대한 침수예상도를 제시함으로써 연구결과물이 재해예방 및 재해경감대책 수립을 위한 기초자료로 활용할 수 있을 것으로 기대된다.

  • PDF

Dictionary Based Software Watermarking Technique (사전 소프트웨어 워터마크 기술 기반)

  • Pervez, Zeeshan;Lee, Sungyoung;Lee, Young-Koo
    • Annual Conference of KIPS
    • /
    • 2009.11a
    • /
    • pp.241-242
    • /
    • 2009
  • As software is becoming increasing important to the human society, so does the effort to produce them is also increasing.. All of these efforts can be at risk when source code of the application is reverse engineered by the software pirate. Many attempts have been made to protect Intellectual Property Rights (IPR); one of the newest attempts to protect IPR is software watermarking. It is used to prove ownership right when IPR are violated, and also prevents the bandit from altering the code for his own use. In this paper we are presenting a new technique for software watermarking know as Dictionary Based Software Watermarking (DBSW). DBSW works by embedding dummy instructions in source code with the help of predefined mapping already available in the dictionary. These instructions are identical to the normal instructions of the program and are hard to identify or to extract from the watermarked program. With the help of DBSW we not only can stop source code alteration but can also identify the buyer how has distributed the pirated copy.

Utilization of SAR Data for Baseline Environmental Studies of Central Cebu Island, Philippines ? Phase 1

  • Lituanas, Michael B.;Salvador, Jerry Hervacio G.
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.981-983
    • /
    • 2003
  • The Remote Sensing Group of the Mines and Geosciences Bureau (MGB) has acquired SAR data of the Central Cebu Island for its research study area. The MGB is one of the proponent of DOST-NASA PACRIM II Project, which is composed of eleven (11) agencies and institutions in the Philippines, that focuses on the scientific application of radar data with the theme on hazard and natural resources management. The PACRIM II Project, being done on three-year term, is slated for completion in the year 2004. The main thrust of the project study of the MGB is the baseline environmental monitoring studies, on which the data are to be fused with some other available data from LandSAT and photogrammetry. The generated data is part of the information for the update of thematic mapping being done. The 12 ${\times}$ 60 km swath AirSAR data covers the Central Cebu Island. The highlights of conducting this research project are: Extent of Watershed Basin boundaries - identification of the tributaries that drain water supply to the metropolitan area; Monitoring of the mountain highways - identification of landslide risk prone sites as part of natural hazard monitoring on a national highway that cuts along the mountainous areas; and Coastline change assessment - monitoring the coastline activities relative to the rapid urbanization and exposure as part of coastal management. The Phase 1 of this report discusses the fusion with the ArcView generated data as baseline studies on the monitoring activities.

  • PDF

Estimating the maximum pounding force for steel tall buildings in proximity subjected to wind

  • Tristen Brown;Ahmed Elshaer;Anas Issa
    • Wind and Structures
    • /
    • v.39 no.1
    • /
    • pp.47-69
    • /
    • 2024
  • Pounding of structures may result in considerable damages, to the extent of total failure during severe lateral loading events (e.g., earthquakes and wind). With the new generation of tall buildings in densely occupied locations, wind-induced pounding becomes of higher risk due to such structures' large deflections. This paper aims to develop mathematical formulations to determine the maximum pounding force when two adjacent structures come into contact. The study will first investigate wind-induced pounding forces of two equal-height structures with similar dynamic properties. The wind loads will be extracted from the Large Eddy Simulation models and applied to a Finite Element Method model to determine deflections and pounding forces. A Genetic Algorithm is lastly utilized to optimize fitting parameters used to correlate the maximum pounding force to the governing structural parameters. The results of the wind-induced pounding show that structures with a higher natural frequency will produce lower maximum pounding forces than those of the same structure with a lower natural frequency. In addition, taller structures are more susceptible to stronger pounding forces at closer separation distances. It was also found that the complexity of the mathematical formula from optimization depends on achieving a more accurate mapping for the trained database.

Awake craniotomy removal of a corticospinal tract developmental venous anomaly hemorrhage: A case report

  • Ignacio J. Barrenechea;Luis M. Marquez;Vanina A. Cortadi;Hector P. Rojas;Robin Ingledew
    • Journal of Cerebrovascular and Endovascular Neurosurgery
    • /
    • v.25 no.3
    • /
    • pp.316-321
    • /
    • 2023
  • Developmental venous anomalies (DVAs) are composed of mature venous vessels that lack malformed or neoplastic elements. Although the hemorrhage risk is considered negligible, some patients may have neurological symptoms attributable to acute infarction or intracranial hemorrhage secondary to thrombosis, in the absence of a coexisting cavernous malformation. We report the case of a 42-year-old patient who presented with acute left-hand paresis secondary to a subcortical hemorrhage. This bleeding originated from a DVA in the corticospinal tract area and was surgically drained through an awake craniotomy. To accomplish this, we used a trans-precentral sulcus approach. After the complete removal of the coagulum, small venous channels appeared, which were coagulated. No associated cavernoma was found. Although the main DVA trunk was left patent, no signs of ischemia or venous infarction were observed after coagulating the small venous channels found inside the hematoma cavity. Two weeks after the procedure, the patient's hand function improved, and he was able to resume desktop work. DVA-associated hemorrhage within the cortico-spinal tract could be safely removed with modern awake mapping techniques. This technique allowed the patient to rapidly improve his hand function.