• Title/Summary/Keyword: threat degree

Search Result 90, Processing Time 0.022 seconds

Heavy Metal Contamination in Surface Water Used for Irrigation: Functional Assessment of the Turag River in Bangladesh

  • Arefin, M. Taufique;Rahman, M. Mokhlesur;Wahid-U-Zzaman, M.;Kim, Jang-Eok
    • Journal of Applied Biological Chemistry
    • /
    • v.59 no.1
    • /
    • pp.83-90
    • /
    • 2016
  • The aim of the present study was to evaluate the degree of metal contamination of the Turag River water and its suitability for irrigation. Twenty water samples were analyzed for physicochemical parameters and metals viz., calcium, magnesium, potassium (K), sodium, copper (Cu), zinc (Zn), iron (Fe), manganese (Mn), lead (Pb), cadmium (Cd), chromium (Cr), and nickel (Ni). All water samples were slightly alkaline to alkaline. Regarding electrical conductivity (EC), all samples were suitable for crop in soils with moderate permeability and leaching. Water samples were medium salinity and low alkalinity hazard classes. In terms of total dissolved solids (TDS), all samples were classified as freshwater. As per sodium adsorption ratio (SAR) and soluble sodium percentage (SSP), all samples were classified as excellent. No residual sodium carbonate (RSC) was detected in any of the samples, indicating suitability for irrigation; and all samples were considered very hard. Cr and Mn contents in all samples were above FAO guideline values and, therefore, these metals were considered toxic. Zn, Cu, Pb, Cd, and Ni concentrations were below acceptable limit for irrigation and do not pose a threat to soil environment. Significant relationships were found between EC and TDS, SAR and SSP, SAR and RSC, and SSP and RSC. The combinations of ions such as K-Zn, K-Fe, K-Cu, K-Mn, K-Pb, Zn-Fe, Zn-Cu, Zn-Mn, Fe-Mn, Cu-Mn, Cu-Pb and Mn-Pb exhibited significant correlation. This study revealed that Turag River water samples are contaminated with Cr and Mn. This fact should not be ignored because water contamination by metals may pose a threat to human health through food chain.

AHP Analysis Study on Hazard Factors of Low-Altitude Airspace Drones for Each Aviation Worker (항공종사자별 저고도 공역 드론의 위협요인 AHP 분석 연구)

  • Sung-Yeob Kim;Myeong-sik, Lee;Hyeon-Deok Kim
    • Journal of Advanced Navigation Technology
    • /
    • v.28 no.4
    • /
    • pp.518-523
    • /
    • 2024
  • The explosive increase in demand for drones poses a major threat to the safety of existing aircraft operations and important national facilities operating in low-altitude airspace. In order to determine the type and degree of safety threats for low-altitude airspace drones, the types and types of threats from drones are evaluated through analysis of AHP(analysis hierarchy process) for aviation workers in each field. The composition of the threat factor hierarchy from drones was designed using a specific operation risk assessment (SORA) technique previously studied by the European Aviation Safety Agency (EASA), an advanced aviation country. Based on this, it will be possible to secure the low-altitude safety operation of existing aircraft by identifying and removing prior hazards between each aircraft operation and mission performance.

A method for quantitative measuring the degree of damage by personal information leakage (개인 정보 노출에 대한 정량적 위험도 분석 방안)

  • Kim, Pyong;Lee, Younho;Khudaybergenov, Timur
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.395-410
    • /
    • 2015
  • This research defines the degree of the threat caused by the leakage of personal information in a quantitative way. The proposed definition classifies the individual items in a personal data, then assigns a risk value to each item. The proposed method considers the increase of the risk by the composition of the multiple items. We also deals with various attack scenarios, where the attackers seek different types of personal information. The concept of entropy applies to associate the degree of the personal information exposed with the total risk value. In our experiment, we measured the risk value of the Facebook users with their public profiles. The result of the experiment demonstrates that they are most vulnerable against stalker attacks among four possible attacks with the personal information.

A Study on the Change of Security Level of Military Organizations Applying Grounded Theory (근거이론을 적용한 군 조직의 보안수준 변화요인 연구)

  • Park, Jae-Gon
    • Korean Security Journal
    • /
    • no.53
    • /
    • pp.283-303
    • /
    • 2017
  • This study which was started to identify the factors that change the security level of military organizations, analyzed the data collected from articles written by the active officers in the Defense Daily Journal hoping to improve the military security level by the qualitative research method called Grounded Theory, and establish causal relationship how organizational members respond to insider security threats. As a result of the analysis, the causal condition is 'the security threat of the insider', the contextual condition is 'the specificity of the military organization', the central phenomenon is 'the conflict of values as a soldier', the arbitrary condition is 'the security consciousness', Strategy is 'the responds to security threats', and the result was 'security level change'. The core categories can be presented as 'the degree of conflict of values on insider security threats' and two hypotheses have been derived. First, the members of the military organization strongly felt the conflict of values about security threat as the tendency to emphasize security was strong, and they helped to develop the security level of organization by responding strongly. Second, the stronger the tendency to focus on colleagues, respond weakly to security threats. And it undermines the security level of the organization. Finally, in order to improve the security level of the organization, it is necessary to establish a solid security consciousness and to make institutional development to support it.

  • PDF

Design of Network Attack Detection and Response Scheme based on Artificial Immune System in WDM Networks (WDM 망에서 인공면역체계 기반의 네트워크 공격 탐지 제어 모델 및 대응 기법 설계)

  • Yoo, Kyung-Min;Yang, Won-Hyuk;Kim, Young-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.4B
    • /
    • pp.566-575
    • /
    • 2010
  • In recent, artificial immune system has become an important research direction in the anomaly detection of networks. The conventional artificial immune systems are usually based on the negative selection that is one of the computational models of self/nonself discrimination. A main problem with self and non-self discrimination is the determination of the frontier between self and non-self. It causes false positive and false negative which are wrong detections. Therefore, additional functions are needed in order to detect potential anomaly while identifying abnormal behavior from analogous symptoms. In this paper, we design novel network attack detection and response schemes based on artificial immune system, and evaluate the performance of the proposed schemes. We firstly generate detector set and design detection and response modules through adopting the interaction between dendritic cells and T-cells. With the sequence of buffer occupancy, a set of detectors is generated by negative selection. The detection module detects the network anomaly with a set of detectors and generates alarm signal to the response module. In order to reduce wrong detections, we also utilize the fuzzy number theory that infers the degree of threat. The degree of threat is calculated by monitoring the number of alarm signals and the intensity of alarm occurrence. The response module sends the control signal to attackers to limit the attack traffic.

Impact Assessment Model of Bird Species for Land Developments (개발사업에 따른 조류종 영향평가모형 개발 및 적용)

  • Lee, Dong-Kun;Kim, Eun-Young;Lee, Eun-Jae;Song, Won-Kyong
    • Journal of Environmental Impact Assessment
    • /
    • v.19 no.3
    • /
    • pp.347-356
    • /
    • 2010
  • Forests are being seriously fragmented as a result of land development. Land development with disregard to its subsequent environmental impacts is a primary threat to biodiversity by incurring massive habitat losses and changes in structure and composition of forests. The purpose of this study was to develop the impact assessment model for quantitative distance or degree of disturbance by land developments. This study conducted a survey about structure and composition of forest species to determine degree of impact from land development. The edge effect of forest fragmentation on the number of bird species, population size, and bird diversity was obvious. In particular, the bird diversity sharply declines around the forest edge where intensive land development projects take place. To assess the disturbance of forest species, the factors selected were the bird diversity and the rate of edge species. The impact assessment model about bird diversity was explained by type of forest fragmentation and type of vegetation ($R^2$=0.23, p<0.005). The other model about edge species explained by a distance, type of forest fragmentation, type of vegetation, and width of road ($R^2$=0.34, p<0.001). In order to test the applicability of the model developed in this study, the models was applied to the Samsong housing development in Goyang-si, Gyunggi-do. The impacts of land development on the bird species were reasonably quantified to suggest effective mitigation measure. The impact assessment model developed in this study is useful to assess the magnitude of disturbance of bird species. Particularly, the model could be applied to the current Environmental Impact Assessment practices to predict and quantify the impacts of land developments projects on forest bird species.

Dynamic vulnerability assessment and damage prediction of RC columns subjected to severe impulsive loading

  • Abedini, Masoud;Zhang, Chunwei
    • Structural Engineering and Mechanics
    • /
    • v.77 no.4
    • /
    • pp.441-461
    • /
    • 2021
  • Reinforced concrete (RC) columns are crucial in building structures and they are of higher vulnerability to terrorist threat than any other structural elements. Thus it is of great interest and necessity to achieve a comprehensive understanding of the possible responses of RC columns when exposed to high intensive blast loads. The primary objective of this study is to derive analytical formulas to assess vulnerability of RC columns using an advanced numerical modelling approach. This investigation is necessary as the effect of blast loads would be minimal to the RC structure if the explosive charge is located at the safe standoff distance from the main columns in the building and therefore minimizes the chance of disastrous collapse of the RC columns. In the current research, finite element model is developed for RC columns using LS-DYNA program that includes a comprehensive discussion of the material models, element formulation, boundary condition and loading methods. Numerical model is validated to aid in the study of RC column testing against the explosion field test results. Residual capacity of RC column is selected as damage criteria. Intensive investigations using Arbitrary Lagrangian Eulerian (ALE) methodology are then implemented to evaluate the influence of scaled distance, column dimension, concrete and steel reinforcement properties and axial load index on the vulnerability of RC columns. The generated empirical formulae can be used by the designers to predict a damage degree of new column design when consider explosive loads. With an extensive knowledge on the vulnerability assessment of RC structures under blast explosion, advancement to the convention design of structural elements can be achieved to improve the column survivability, while reducing the lethality of explosive attack and in turn providing a safer environment for the public.

A Method for Access Control on Uncertain Context (불확정 상황정보 상에서의 접근제어 방식)

  • Kang, Woo-Jun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.6
    • /
    • pp.215-223
    • /
    • 2010
  • New information technologies make it easy to access and acquire information in various ways. However, It also enable powerful and various threat to system security. The prominent database technology challenging these threats is access control. Currently, to keep pace with the new paradigms, new extended access control methods are challenged. We study access control with uncertain context. With respect to access control, it is possible that there is a discrepancy between the syntactic phrase in security policies and that in queries, called semantic gap problem. In our semantic access control, we extract semantic implications from context tree and introduce the measure factor to calculate the degree of the discrepancy, which is used to control the exceed privileges.

Forest Structure and Composition in the Vicinity of Srinagar Hydroelectric Power Project in Alaknanda Valley, Garhwal Himalaya, India

  • Ballabha, Radha;Kuniyal, Archana;Tiwari, Prabhawati;Tiwari, Jay Krishan
    • Journal of Forest and Environmental Science
    • /
    • v.36 no.2
    • /
    • pp.78-90
    • /
    • 2020
  • We studied forest structure and composition in the vicinity of Srinagar Hydroelectric Power Project in Alaknanda Valley, Garhwal Himalaya, India to provide baseline data for the management of forests. Eight sites were selected in the vicinity of power project based on elevation and species composition. Density varied from 650 to 340 ind ha-1 for trees and from 4,360 to 6,480 ind ha-1 for shrubs. TBC ranged from 35.02 to 54.02 ㎡ ha-1 for trees and from 0.875 to 2.628 ㎡ ha-1 for shrubs. On the basis of density and IVI, Pinus roxburghii was found dominant tree species in most of the sites, whereas among the shrubs, Carissa opaca was dominant. Dominance of Pinus roxburghii in most of the sites is an indication towards possible threat to associated species in the area. The dominance-diversity curve of trees showed a geometric distribution, whereas the shrubs displayed log-normal curves. The forest has rich and diverse species composition however; habitat degradation caused by the construction of Power Project might lead to reduction of plant species from the area. The information obtained from this study will be helpful in predicting possible changes in the forest ecosystem properties in near future after completion of the power project.

An Access Control Method considering Semantic Context for Privacy-preserving (개인정보 보호를 위한 의미적 상황을 반영하는 접근제어 방식)

  • Kang, Woo-Jun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.1-14
    • /
    • 2015
  • To conform to new emerging computing paradigm, various researches and challenges are being done. New information technologies make easy to access and acquire information in various ways. In other side, however, it also makes illegal access more powerful and various threat to system security. In this paper, we suggest a new extended access control method that make it possible to conform to security policies enforcement even with discrepancy between policy based constraints rules and query based constraints rules, based on their semantic information. New method is to derive security policy rules using context tree structure and to control the exceed granting of privileges through the degree of the semantic discrepancy. In addition, we illustrate prototype system architecture and make performance comparison with existing access control methods.