• 제목/요약/키워드: vulnerability functions

검색결과 108건 처리시간 0.028초

Deformation-based vulnerability functions for RC bridges

  • Elnashai, A.S.;Borzi, B.;Vlachos, S.
    • Structural Engineering and Mechanics
    • /
    • 제17권2호
    • /
    • pp.215-244
    • /
    • 2004
  • There is an ever-increasing demand for assessment of earthquake effects on transportation structures, emphasised by the crippling consequences of recent earthquakes hitting developed countries reliant on road transportation. In this work, vulnerability functions for RC bridges are derived analytically using advanced material characterisation, high quality earthquake records and adaptive inelastic dynamic analysis techniques. Four limit states are employed, all based on deformational quantities, in line with recent development of deformation-based seismic assessment. The analytically-derived vulnerability functions are then compared to a data set comprising observational damage data from the Northridge (California 1994) and Hyogo-ken Nanbu (Kobe 1995) earthquakes. The good agreement gives some confidence in the derived formulation that is recommended for use in seismic risk assessment. Furthermore, by varying the dimensions of the prototype bridge used in the study, and the span lengths supported by piers, three more bridges are obtained with different overstrength ratios (ratio of design-to-available base shear). The process of derivation of vulnerability functions is repeated and the ensuing relationships compared. The results point towards the feasibility of deriving scaling factors that may be used to obtain the set of vulnerability functions for a bridge with the knowledge of a 'generic' function and the overstrength ratio. It is demonstrated that this simple procedure gives satisfactory results for the case considered and may be used in the future to facilitate the process of deriving analytical vulnerability functions for classes of bridges once a generic relationship is established.

태풍 매미의 피해 데이터 기반 국내 태풍 취약성 분석에 관한 연구 (Analysis of Typhoon Vulnerability According to Quantitative Loss Data of Typhoon Maemi)

  • 안성진;김태희;김지명
    • 한국건축시공학회:학술대회논문집
    • /
    • 한국건축시공학회 2019년도 춘계 학술논문 발표대회
    • /
    • pp.125-126
    • /
    • 2019
  • This study aims to recognize damage indicators of typhoon and to develop damage function's indicators, using information derived from the actual loss of typhoon Maemi. As typhoons engender significant financial damage all over the world, governments and insurance companies, local or global, develop hurricane risk assessment models and use it in quantifying, avoiding, mitigating, or transferring the risks. For the reason, it is crucial to understand the importance of the risk assessment model for typhoons, and the importance of reflecting local vulnerabilities for more advanced evaluation. Although much previous research on the economic losses associated with natural disasters has identified the risk indicators that are indispensable, more comprehensive research addressing the relationship between vulnerability and economic loss are still called for. Hence this study utilizes and analyzes the actual loss record of the typhoon Maemi provided by insurance companies to fill such gaps. In this study, natural disaster indicators and basic building information indicators are used in order to generate the vulnerability functions; and the results and indicators suggest a practical approach to create the vulnerability functions for insurance companies and administrative tasks, while reflecting the financial loss and local vulnerability of the actual buildings.

  • PDF

가용자료가 제한된 경우 화산재 피해 예측을 위한 손상함수 구축 (Building Damage Functions Using Limited Available Data for Volcanic Ash Loss Estimation)

  • 유순영;윤성민;강주화;최미란
    • 한국지구과학회지
    • /
    • 제34권6호
    • /
    • pp.524-535
    • /
    • 2013
  • 재난 리스크 모델을 활용하여 화산재 손실을 평가하기 위해서는 목적물별 손상함수가 정의되어야 한다. 손상함수란 목적물의 재해취약도를 정량화한 함수로, 공학 및 자연재해 연구 분야에서 널리 사용되고 있다. 특히 손상도, 취약성 곡선 등으로 연구되고 있는데, 학제간 연구를 수행하는 과정에서 혼란을 주기도 한다. 이에 본 연구는 손상함수의 유형을 정리하고, 손상함수를 구축한 사례를 소개하고자 한다. 손상함수는 일반적으로 과거 피해사례를 기반으로 구축된다. 국내에 화산재 피해사례가 없음을 고려할 때, 남한지역의 화산재 손상함수를 구축하기 위해서는 해외사례를 참고하여야 할 것이다. 한편 국외에서도 화산재에 대한 손상함수 연구는 다른 재난에 비해 적은데, 화산 피해사례도 적은편이다. 이에 본 연구는 극소수 피해자료를 활용하여 손상함수를 구축할 수 있는 방안을 제시하고, 뉴질랜드와 일본에서 보고된 실제 피해사례를 바탕으로 와이블함수 혹은 선형함수의 취약성 곡선을 구축하였다. 본 연구가 해외사례를 기반으로 손상함수를 구축하였음을 고려할 때, 본 연구에서 제시하는 손상함수를 이용하여 남한지역의 화산재 손실을 평가하기 위해서는 국내 목적물 특성 및 환경 조건에 맞게 손상함수를 보정할 필요가 있다.

FMECA 기반 위험도를 활용한 전차의 구성 부품별 취약성 분석 프로그램의 개발 (A Development of Component Vulnerability Analysis Program for Armored Fighting Vehicle using Criticality based on FMECA)

  • 황훈규;강지원;이장세
    • 한국정보통신학회논문지
    • /
    • 제19권8호
    • /
    • pp.1973-1980
    • /
    • 2015
  • 전투 시스템은 목적에 따라 각기 다른 특성을 가지는데, 주요 목적과 관련된 기능을 하는 부품이 다른 기능과 관련된 부품보다 중요하다. 또한 이러한 부품의 피격 확률은 면적에 비례한다고 볼 수 있다. 따라서 부품의 중요도 및 피격 확률을 모두 고려하여 취약성 분석이 이루어져야 하며, 전투 시스템의 설계 단계에서부터 분석된 결과를 반영하여야 신뢰성을 향상시킬 수 있다. 이를 위해 본 논문에서는 관련 연구를 바탕으로 FMECA 기반의 위험도를 적용하고, 전차의 구성 부품별 위험도를 도출하기 위한 방법과 계산 기준을 정의하며, 통합 위험도를 이용한 부품별 취약성 분석 방법을 제안한다. 추가적으로, 제안한 기법을 자동화해주는 위험도 기반의 취약성 분석 프로그램을 개발하고, 그것을 활용하여 제안한 기법의 유용성을 실험한다.

재해 취약성 평가를 위한 기상자료 처리 프로그램 MetSystem 개발 (Development of Meteorologic Data Retrieval Program for Vulnerability Assessment to Natural Hazards)

  • 장민원;김상민
    • 농촌계획
    • /
    • 제19권4호
    • /
    • pp.47-54
    • /
    • 2013
  • Climate change is the most direct threatening factors in sustaining agricultural productivity. It is necessary to reduce the damages from the natural hazards such as flood, drought, typhoons, and snowstorms caused by climate change. Through the vulnerability assessment to adapt the climate change, it is possible to analyze the priority, feasibility, effect of the reduction policy. For the vulnerability assessment, broad amount of weather data for each meterological station are required. Making the database management system for the meteorologic data could troubleshoot of the difficulties lie in handling and processing the weather data. In this study, we generated the meteorologic data retrieval system (MetSystem) for climate change vulnerability assessment. The user interface of MetSystem was implemented in the web-browser so as to access to a database server at any time and place, and it provides different query executions according to the criteria of meteorologic stations, temporal range, meteorologic items, statistics, and range of values, as well as the function of exporting to Excel format (*.xls). The developed system is expected that it will make it easier to try different analyses of vulnerability to natural hazards by the simple access to meteorologic database and the extensive search functions.

취약면적법과 DMEA를 활용한 지상전투차량 유공압 현가장치의 취약성 평가 (The Vulnerability Assessment of Hydro-pneumatic Suspension of Ground Combat Vehicles Using Vulnerable Area Method and DMEA)

  • 남명훈;박강;박우성;유철
    • 한국CDE학회논문집
    • /
    • 제22권2호
    • /
    • pp.141-149
    • /
    • 2017
  • Vulnerability assesses the loss of major performance functions of GCV (Ground Combat Vehicles) when it is hit by enemy's shell. To decide the loss of major functions, it is determined what effects are on the performance of GCV when some components of GCV are failed. M&S (Modeling and Simulation) technology is used to vulnerability assessment. The hydro-pneumatic suspension is used as a sample part. The procedures of vulnerability assessment of the hydro-pneumatic suspension are shown as follows: 1) The components of the suspension are defined, and shot lines are generated evenly around the part. 2) The penetrated components are checked by using the penetration equation. 3) The function model of the suspension is designed by using IDEF0. 4) When the failure of the critical components of the suspension happens, its effect on the function of the suspension can be estimated using DMEA (Damage Mode and Effects Analysis). 5) The diagram of FTA (Fault Tree Analysis) is designed by exploiting DMEA. 6) The damage probability of the suspension is calculated by using FTA and vulnerable area method. In this paper, SLAP (Shot Line Analysis Program) which was developed based on COVART methodology. SLAP calculates the damage probability and visualizes the vulnerable areas of the suspension.

지상전투차량 취약성 평가를 위한 표적 모델링과 피격선 분석 시스템 (The Target Modeling and The Shot Line Analysis System to Assess Vulnerability of the Ground Combat Vehicle)

  • 유철;장은수;박강;최상영
    • 한국CDE학회논문집
    • /
    • 제20권3호
    • /
    • pp.238-245
    • /
    • 2015
  • Vulnerability assessment is a process to calculate the damage degree of a combat vehicle when the combat vehicle is attacked by an enemy. When the vehicle is hit, it is necessary to analyze the shot line to calculate which components are damaged and judge whether the armor of the vehicle is penetrated by enemy's warhead. To analyze the shot line efficiently, this paper presents the target modeling and the shot line analysis system to assess vulnerability of the ground combat vehicle. This system is easily able to do several functions: 1) the program reads STL files converted from CAD model which is designed by commercial CAD software. 2) It calculates the intersection between triangle of STL mesh and the shot line, and check if the components of the model are penetrated. 3) This program can visualize the results using OpenGL. The vulnerability assessment using the shot line analysis can be used to model the armor of the combat vehicle and arrange the inner components effectively in the early stage of development of the combat vehicle.

함정 피격 시나리오들에 대한 취약성 감소를 위한 폭발강화격벽 최적 설계 방법 연구 (A Study on Optimal Design of Blast Hardened Bulkheads to Reduce Vulnerability against Various Hit Scenarios)

  • 곽묘정;권승민;노유정
    • 대한조선학회논문집
    • /
    • 제59권6호
    • /
    • pp.413-422
    • /
    • 2022
  • Blast Hardened Bulkheads (BHB) are used to suppress damage propagation by internal explosions to reduce ships'vulnerability. However, for this reason, the weight of the ship inevitably increased, and other functions such as the ships'mobility were bound to deteriorate. Therefore, it is essential in the initial design of the ship to optimize the dimensions of the bulkhead to minimize the weight while decreasing the vulnerability of the ship. Research on design optimization of BHB has been conducted, but it has not considered explosive load in various hit scenarios. This study proposed an optimal design method for the curtain plate type blast hardened bulkhead, which is currently frequently applied by the Korean Navy in consideration of various hit scenarios. Using genetic algorithms, multiobjective design optimizations that minimize weight increase as well as minimize damage to ships were obtained. By optimizing the dimensions of the BHB considering various hit scenarios, the ship's vulnerability was improved while maintaining its mobility due to weight reduction.

A Source Code Cross-site Scripting Vulnerability Detection Method

  • Mu Chen;Lu Chen;Zhipeng Shao;Zaojian Dai;Nige Li;Xingjie Huang;Qian Dang;Xinjian Zhao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권6호
    • /
    • pp.1689-1705
    • /
    • 2023
  • To deal with the potential XSS vulnerabilities in the source code of the power communication network, an XSS vulnerability detection method combining the static analysis method with the dynamic testing method is proposed. The static analysis method aims to analyze the structure and content of the source code. We construct a set of feature expressions to match malignant content and set a "variable conversion" method to analyze the data flow of the code that implements interactive functions. The static analysis method explores the vulnerabilities existing in the source code structure and code content. Dynamic testing aims to simulate network attacks to reflect whether there are vulnerabilities in web pages. We construct many attack vectors and implemented the test in the Selenium tool. Due to the combination of the two analysis methods, XSS vulnerability discovery research could be conducted from two aspects: "white-box testing" and "black-box testing". Tests show that this method can effectively detect XSS vulnerabilities in the source code of the power communication network.

폴더블 스크린 기반 기기 사용자 인증기법 연구 (A Study on User Authentication Method for Foldable Screen-Based Devices)

  • 최동민
    • 한국멀티미디어학회논문지
    • /
    • 제24권3호
    • /
    • pp.440-447
    • /
    • 2021
  • Smartphones are currently being produced with similar functions, shapes, and software. The foldable smartphone is a product that dramatically changed the shape of the existing smartphone. Therefore, it affects the functions and software. In this paper, we analyze the potential security vulnerability of current mobile authentication methods by dividing them into two parts, security vulnerabilities of non-foldable smartphones, and security vulnerability that appears with the changed smartphone structure. According to the analysis result, the classic and current mobile user authentication methods appears to be easily affected by the smartphone display structure. Finally, we propose an appropriate authentication method as well as the concept of security measures for smartphones with foldable screen. Our method shows that it is more secure than the conventional authentication methods in foldable display smartphone.