• Title/Summary/Keyword: vulnerability of mapping

Search Result 40, Processing Time 0.028 seconds

Research on Disaster and Fire Response Capability and Hazard Analysis Using Basic Mapping Method (Mapping을 이용한 소방방재력 및 재해취약성의 연구)

  • Wang, Soon-Joo;Baek, Min-Ho
    • Journal of the Society of Disaster Information
    • /
    • v.3 no.1
    • /
    • pp.69-86
    • /
    • 2007
  • The fire department has one of the most important role as public resources of response to disasters in the aspect of supply and the adequate distribution of resources of response is essential, but the distribution of the response capability to disaster of fire department does not reflect the regional hazard vulnerability and hazard risks. Researchers performed database process with simple mapping based on the regional fire disaster response capability and the regional hazard vulnerability and hazard risks. The cities and towns are divided to four types each, total eight types and relative threat ratios are extracted from every type. The fire disaster response capability was extracted from number of firemen and fire vehicles in defined region. The distribution of the fire disaster response capability was inadequate and not matching to relative threat especially in small cities and some types of towns. The regional relative threat and resources should be analyzed by more delicate mapping and software development in the future.

  • PDF

Modeling approach in mapping groundwater vulnerability

  • Im Jeong-Won;Bae Gwang-Ok;Lee Gang-Geun;Seok Hui-Jun
    • Proceedings of the Korean Society of Soil and Groundwater Environment Conference
    • /
    • 2005.04a
    • /
    • pp.304-307
    • /
    • 2005
  • A numerical modelling method using a backward-in-time advection dispersion equation is introduced in assessing the vulnerability of groundwater to contaminants as an alternative to classical vulnerability mapping methods. The flux and resident concentration measurements are normalized by the total contaminants mass released to the system to provide the travel time probability density function and the location probability function. With the results one can predict the expected travel time of a contaminant from up stream location to a well and also the relative concentration of the contaminant at a well. More specific groundwater vulnerability can be mapped by these predicted measurements.

  • PDF

Evacuation and Sheltering Assistance for Persons with Special Needs at Times of Disaster: Lessons Learned from Typhoon 23, Heavy Rainfall and Earthquake Disasters in the Year 2004

  • Tatsuki, Sshigeo
    • 한국방재학회:학술대회논문집
    • /
    • 2009.02b
    • /
    • pp.36-42
    • /
    • 2009
  • A series of heavy rainfall, typhoon and earthquake disasters caused a proportionately large number of deaths among the elderly in the year 2004 in Japan. In response to these tragedies, the national government set up committees to reduce damage within the disaster vulnerable population for the next three years. The discussions in the committee led to a new conceptualization that disaster vulnerability was caused by a lack of interaction between a person's special needs and the environment's capacity and resources to meet them. This person-in-environment model of hazard vulnerability was applied to those who resided in the Nankai-Tonankai tsunami hazard-prone area. 123 home care service users were interviewed in terms of their self-evacuation ability, degree of social isolation, and building weakness as well as tsunami exposure risks. Results were quantified and scores of person-in-environmentmodel hazard vulnerability were obtained. These scores were then used to visualize socially created vulnerability by means of weighted kernel density mapping of both persons with special needs (PSN's) and persons with special needs at times of disaster (PSND's).

  • PDF

Development of integrated disaster mapping method (II) : disaster mapping with risk analysis (통합 재해지도 작성 기법 개발(II) : 리스크 분석을 적용한 재해지도 작성)

  • Park, Jun Hyung;Kim, Byunghyun
    • Journal of Korea Water Resources Association
    • /
    • v.55 no.1
    • /
    • pp.85-97
    • /
    • 2022
  • In this study, a method for an integrated flood risk mapping was proposed that simultaneously considers the flood inundation map indicating the degree of risk and the disaster vulnerability index. This method creates a new disaster map that can be used in actual situations by providing various and specific information on a single map. In order to consider the human, social and economic factors in the disaster map, the study area was divided into exposure, vulnerability, responsiveness, and recovery factors. Then, 7 indicators for each factor were extracted using the GIS tool. The data extracted by each indicator was classified into grades 1 to 5, and the data was selected as a disaster vulnerability index and used for integrated risk mapping by factor. The risk map for each factor, which overlaps the flood inundatoin map and the disaster vulnerability index factor, was used to establish an evacuation plan by considering regional conditions including population, assets, and buildings. In addition, an integrated risk analysis method that considers risks while converting to a single vulnerability through standardization of the disaster vulnerability index was proposed. This is expected to contribute to the establishment of preparedness, response and recovery plans for providing detailed and diverse information that simultaneously considers the flood risk including social, humanistic, and economic factors.

Mapping of Inundation Vulnerability Using Geomorphic Characteristics of Flood-damaged Farmlands - A Case Study of Jinju City - (침수피해 정보를 이용한 농경지의 지형학적 침수취약지도 작성 - 진주시를 사례로 -)

  • Kim, Soo-Jin;Suh, Kyo;Kim, Sang-Min;Lee, Kyung-Do;Jang, Min-Won
    • Journal of Korean Society of Rural Planning
    • /
    • v.19 no.3
    • /
    • pp.51-59
    • /
    • 2013
  • The objective of this study was to make a map of farmland vulnerability to flood inundation based on morphologic characteristics from the flood-damaged areas. Vulnerability mapping based on the records of flood damages has been conducted in four successive steps; data preparation and preprocessing, identification of morphologic criteria, calculation of inundation vulnerability index using a fuzzy membership function, and evaluation of inundation vulnerability. At the first step, three primary digital data at 30-m resolution were produced as follows: digital elevation model, hill slopes map, and distance from water body map. Secondly zonal statistics were conducted from such three raster data to identify geomorphic features in common. Thirdly inundation vulnerability index was defined as the value of 0 to 1 by applying a fuzzy linear membership function to the accumulation of raster data reclassified as 1 for cells satisfying each geomorphic condition. Lastly inundation vulnerability was suggested to be divided into five stages by 0.25 interval i.e. extremely vulnerable, highly vulnerable, normally vulnerable, less vulnerable, and resilient. For a case study of the Jinju, farmlands of $138.6km^2$, about 18% of the whole area of Jinju, were classified as vulnerable to inundation, and about $6.6km^2$ of farmlands with elevation of below 19 m at sea water level, slope of below 3.5 degrees, and within 115 m distance from water body were exposed to extremely vulnerable to inundation. Comparatively Geumsan-myeon and Sabong-myeon were revealed as the most vulnerable to farmland inundation in the Jinju.

Case Study on the Analysis of Disaster Vulnerabilities (Focused on the Fire & Explosion in the N-Industrial Complex) (재난 취약성 분석에 관한 사례연구(N공단의 화재·폭발을 중심으로))

  • Ha, Kag Cheon
    • Journal of the Korean Society of Safety
    • /
    • v.36 no.2
    • /
    • pp.94-100
    • /
    • 2021
  • In general, the industrial complex is a place where factories of various industries are concentrated. It is only as efficient as it is designed. However, the risks vary as there are various industries. These features are also associated with various types of disasters. The dangers of natural disasters such as a typhoon, flood, and earthquake, as well as fire and explosions, are also latent. Many of these risks can make stable production and business activities difficult, resulting in massive direct and indirect damage. In particular, decades after its establishment, the vulnerabilities increase even more as aging and small businesses are considered. In this sense, it is significant to assess the vulnerability of the industrial complex. Thus analysing fire and explosion hazards as stage 1 of the vulnerability evaluation for the major potential disasters for the industrial complex. First, fire vulnerabilities were analyzed quantitatively. It is displayed in blocks for each company. The assessment block status and the fire vulnerability rating status were conducted by applying the five-step criteria. Level A is the highest potential risk step and E is the lowest step. Level A was 11.8% in 20 blocks, level B was 22.5% in 38 blocks, level C was 25.4% in 43 blocks, level D was 26.0% in 44 blocks, and level E was 14.2% in 24 blocks. Levels A and B with high fire vulnerabilities were analyzed at 34.3%. Secondly, the vulnerability for an explosion was quantitatively analyzed. Explosive vulnerabilities were analyzed at 4.7% for level A with 8 blocks, 3.0% for level B with 5, 1.8% for level C with 3, 4.7% for level D with 8, and 85.8% for level E with 145. Levels A and B, which are highly vulnerable to explosions, were 7.7 %. Thirdly, the overall vulnerability can be assessed by adding disaster vulnerabilities to make future assessments. Moreover, it can also assist in efficient safety and disaster management by visually mapping quantified data. This will also be used for the integrated control center of the N-Industrial Complex, which is currently being installed.

Seismic vulnerability assessment of masonry facade walls: development, application and validation of a new scoring method

  • Ferreira, Tiago M.;Vicentea, Romeu;Varum, Humberto
    • Structural Engineering and Mechanics
    • /
    • v.50 no.4
    • /
    • pp.541-561
    • /
    • 2014
  • This paper approaches the issue of seismic vulnerability assessment strategies for facade walls of traditional masonry buildings through the development of a methodology and its subsequent application to over 600 building facades from the old building stock of the historic city centre of Coimbra. Using the post-earthquake damage assessment of masonry buildings in L'Aquila, Italy, an analytical function was developed and calibrated to estimate the mean damage grade for masonry facade walls. Having defined the vulnerability function for facade walls, damage scenarios were calculated and subsequently used in the development of an emergency planning tool and in the elaboration of an access route proposal for the case study of the historic city centre of Coimbra. Finally, the methodology was pre-validated through the comparison of a set of results obtained from its application and also resourcing to a widely accepted mechanical method on the description of the out-of-plane behaviour of facade walls.

Vulnerability and Security Management System from the Perspective of the Cloud Service Users (클라우드 서비스 사용자 관점에서의 취약점과 보안관리체계)

  • Choi, Young-Jin;Ra, Jong-Hei;Ky, Hong Pil;Lee, Sang-Hak
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.4
    • /
    • pp.401-411
    • /
    • 2012
  • There has been increased interest for cloud computing services that can promote cost savings while increasing investment in information resources. Cloud computing, however, has a disadvantage physically located in the external information resources to take advantage of the economic benefits, the advantages and increase the vulnerability of information protection and control of information assets. In this study, due to the unique properties of the new services, including vulnerability, the vulnerability of cloud computing derive the vulnerability of cloud computing and control items were derived through the mapping between vulnerability and control items, that are not being managed to identify vulnerabilities Cloud computing risk factors are presented.

Mapping Inundation of Vulnerable Agricultural Land by Considering the Characteristics of Drainage and Terrain Types - Case study in Chungcheongnam-do - (지리 및 배수특성을 고려한 농경지 침수 취약성 지도 작성 연구 - 충청남도를 대상으로 -)

  • Lee, Gyeongjin;Cha, Jungwoo
    • Journal of Korean Society of Rural Planning
    • /
    • v.21 no.2
    • /
    • pp.127-135
    • /
    • 2015
  • In recent years, meteorological disasters have frequently occurred in rural areas. As a result, there have been growing concerns over the protective measures needed. In order to avoid natural risks and damage, and to strengthen countermeasure to meteorological disasters, local governments needs to be prepared. Therefore, this paper seeks to prevent meteorological disasters through mapping of inundation vulnerability in agricultural land, Chungcheongnam-do. In doing so, this study were considered 5 variables (i.e. precipitation, region of altitude below 50m, region of slope gradient is below 10 degree, distance from river within less 50m) for creating vulnerability map. The precipitation was excluded in five variables. Since, the precipitation which include Daily maximum precipitation, 2-Daily maximum precipitation, summer precipitation was not any correlation among them. The results of analysing four variables, exclusive of precipitation, were showed that the agricultural lands where located in Dangjin, Buyeo, Hongseong and Asan were low correlation of inundation vulnerability by overlapping analysis. Moreover, The correlation analysis was showed low correlation between each factors and the annual average area of agricultural lands' inundation, whereas, the correlation analysis which was overlapping each factor showed high correlation. In conclusion, in order to create reliable vulnerability map in agricultural lands, Chungcheongnam-do, it must be considered to overlap analysis of the four main factors such region of altitude below 50m, region of slope gradient is below 10 degree, distance from river within less 50m. We suppose that this study's analysis can help to set the preparedness site of agricultural lands inundation.

A Study for Rule Integration in Vulnerability Assessment and Intrusion Detection using Meaning Based Vulnerability Identification Method (의미기반 취약점 식별자 부여 기법을 사용한 취약점 점검 및 공격 탐지 규칙 통합 방법 연구)

  • Kim, Hyung-Jong;Jung, Tae-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.3
    • /
    • pp.121-129
    • /
    • 2008
  • This paper presents vulnerability identification method based on meaning which is making use of the concept of atomic vulnerability. Also, we are making use of decomposition and specialization processes which were used in DEVS/SES to get identifiers. This vulnerability representation method is useful for managing and removing vulnerability in organized way. It is helpful to make a relation between vulnerability assessing and intrusion detection rules in lower level. The relation enables security manager to response more quickly and conveniently. Especially, this paper shows a mapping between Nessus plugins and Snort rules using meaning based vulnerability identification method and lists usages based on three goals that security officer keeps in mind about vulnerability. The contribution of this work is in suggestion of meaning based vulnerability identification method and showing the cases of its usage for the rule integration of vulnerability assessment and intrusion detection.