• 제목, 요약, 키워드: vulnerability assessment

검색결과 437건 처리시간 0.04초

GIS 기반의 도시지역 침수 취약성 평가 - 창원시를 대상으로 - (Assessment of Flooding Vulnerability Based on GIS in Urban Area - Focused on Changwon City -)

  • 송봉근;이택순;박경훈
    • 한국지리정보학회지
    • /
    • v.17 no.4
    • /
    • pp.129-143
    • /
    • 2014
  • 본 연구는 경상남도 창원시를 대상으로 도시 침수문제를 개선하기 위해 GIS 분석을 활용하여 침수 취약성을 평가하였다. 평가 요인은 물순환 면적률과 표면 유출특성, 강우량 분포이며, GIS 프로그램을 활용하여 평가요인에 대한 정보 구축과 침수 취약성 평가를 분석하였다. 물순환 면적률과 표면 유출특성은 도시지역에서 취약하였다. 강우량 분포는 북쪽의 농촌지역에서 많았다. 침수 취약성 평가 결과 북쪽의 농업지역과 산림지역에서 낮았다. 반대로 도시지역은 불투수 재질로 포장되어 있어 취약성이 높았다. Hotspot 공간군집분석을 이용하여 침수 취약지역의 밀집도를 분석한 결과는 도시지역에서 매우 높은 밀집도를 보였다. 그리고 이들 지역은 대부분 하천의 하류에 위치해 있어 실제 침수가 빈번히 발생하는 것으로 확인되었다. 따라서 본 연구의 침수 취약성 평가는 도시 및 환경계획 차원에서 침수 피해를 예방하기 위해 투수성 포장재질의 조성과 빗물관리 시설의 설치위치를 선정하는데 효율적인 자료로 활용 가능할 것으로 판단된다.

SWAT 모형과 TOPSIS 기법을 이용한 우리나라 물이용 취약성 평가 (Parameteric Assessment of Water Use Vulnerability of South Korea using SWAT model and TOPSIS)

  • 원광재;성장현;정은성
    • 한국수자원학회논문집
    • /
    • v.48 no.8
    • /
    • pp.647-657
    • /
    • 2015
  • 본 연구는 국내 12개수계인 한강, 안성천, 금강, 삽교천, 영산강, 섬진강, 탐진강, 만경강, 동진강, 낙동강, 태화강, 형산강 유역에 대한 물이용 취약성 평가를 실시하였다. SWAT(Soil and Water Assessment Tool) 모형을 이용하여 국내 12개 수계의 연유출량을 도출하였고, 각 유역별 면적 및 인구당 유출량을 비교하였다. 취약성 평가를 위해 18개 지표로 구성하였고, 물이용의 수요, 손실 및 공급의 측면으로 구분하였다. 이때의 가중치는 객관적 가중치의 적용을 위해 엔트로피(Entropy)방법을 사용하였고 정량적인 물이용 취약성 평가를 위해 다기준 의사결정기법 중 하나인 TOPSIS(Technique for Order of Preference by Similarity to Ideal Solution) 기법을 적용하였다. 그 결과, 형산강의 물이용이 가장 취약하였고, 삽교천, 동진강, 섬진강, 안성천, 만경강, 낙동강, 탐진강, 영산강, 금강, 태화강, 한강 순이었다. 본 연구 결과는 향후 기후변화 취약성 평가를 위한 지표 개발에 이용할 수 있겠다.

우리나라 사회기반시설의 기후변화 취약성 평가 - 전문가 설문조사를 바탕으로 - (Assessing Vulnerability to Climate Change of the Physical Infrastructure in Korea Through a Survey of Professionals)

  • 명수정;이동규
    • 환경영향평가
    • /
    • v.18 no.6
    • /
    • pp.347-357
    • /
    • 2009
  • This study conducted a vulnerability assessment on Korea's physical infrastructure to provide base data for developing strategies to strengthen Korea's ability to adapt to climate change. The assessment was conducted by surveying professionals in the field of infrastructure and climate change science. A vulnerability assessment was carried out for seven climate change events: average temperature increases, sea level rise, typhoons and storm surges, floods and heavy rain, drought, severe cold, and heat waves. The survey asked respondents questions with respect to the consequences of each climate change event, the urgency of adaptation to climate change, and the scale of investment for adaptation to each climate change event. Thereafter, management priorities for infrastructure were devised and implications for policy development were suggested. The results showed that respondents expected the possibility of "typhoons and storm surges" and "floods and heavy rain" to be the most high. Respondents indicated that infrastructure related to water, transportation, and the built environment were more vulnerable to climate change. The most vulnerable facilities included river related facilities such as dams and riverbanks in the "water" category and seaports and roads in the "transport and communication" category. The results found were consistent with the history of natural disasters in Korea.

Fragility curves for the typical multi-span simply supported bridges in northern Pakistan

  • Waseem, Muhammad;Spacone, Enrico
    • Structural Engineering and Mechanics
    • /
    • v.64 no.2
    • /
    • pp.213-223
    • /
    • 2017
  • Bridges are lifeline and integral components of transportation system that are susceptible to seismic actions, their vulnerability assessment is essential for seismic risk assessment and mitigation. The vulnerability assessment of bridges common in Pakistan is very important as it is seismically very active region and the available code for the seismic design of bridges is obsolete. This research presents seismic vulnerability assessment of three real case simply supported multi-span reinforced concrete bridges commonly found in northern Pakistan, having one, two and three bents with circular piers. The vulnerability assessment is carried through the non-linear dynamic time history analyses for the derivation of fragility curves. Finite element based numerical models of the bridges were developed in MIDAS CIVIL (2015) and analyzed through with non-linear dynamic and incremental dynamic analyses, using a suite of bridge-specific natural spectrum compatible ground motion records. Seismic responses of shear key, bearing pad, expansion joint and pier components of each bridges were recorded during analysis and retrieved for performance based analysis. Fragility curves were developed for the bearing pads, shear key, expansion joint and pier of the bridges that first reach ultimate limit state. Dynamic analysis and the derived fragility curves show that ultimate limit state of bearing pads, shear keys and expansion joints of the bridges exceed first, followed by the piers ultimate limit state for all the three bridges. Mean collapse capacities computed for all the components indicated that bearing pads, expansion joints, and shear keys exceed the ultimate limit state at lowest seismic intensities.

Seismic vulnerability assessment criteria for RC ordinary highway bridges in Turkey

  • Avsar, O.;Yakut, A.
    • Structural Engineering and Mechanics
    • /
    • v.43 no.1
    • /
    • pp.127-145
    • /
    • 2012
  • One of the most important and challenging steps in seismic vulnerability and performance assessment of highway bridges is the determination of the bridge component damage parameters and their corresponding limit states. These parameters are very essential for defining bridge damage state as well as determining the performance of highway bridges under a seismic event. Therefore, realistic damage limit states are required in the development of reliable fragility curves, which are employed in the seismic risk assessment packages for mitigation purposes. In this article, qualitative damage assessment criteria for ordinary highway bridges are taken into account considering the critical bridge components in terms of proper engineering demand parameters (EDPs). Seismic damage of bridges is strongly related to the deformation of bridge components as well as member internal forces imposed due to seismic actions. A simple approach is proposed for determining the acceptance criteria and damage limit states for use in seismic performance and vulnerability assessment of ordinary highway bridges in Turkey constructed after the 1990s. Physical damage of bridge components is represented by three damage limit states: serviceability, damage control, and collapse prevention. Inelastic deformation and shear force demand of the bent components (column and cap beam), and superstructure displacement are the most common causes for the seismic damage of the highway bridges. Each damage limit state is quantified with respect to the EDPs: i.e. curvature and shear force demand of RC bent components and superstructure relative displacement.

분석적 방법을 적용한 원전디지털자산 취약점 평가 연구 (A Study on Vulnerability Assessment for the Digital Assets in NPP Based on Analytical Methods)

  • 김인경;권국희
    • 정보보호학회논문지
    • /
    • v.28 no.6
    • /
    • pp.1539-1552
    • /
    • 2018
  • 원자력 발전소의 디지털화로 인한 사이버위협 노출로 보다 확고한 사이버보안 체계 구축 필요성이 대두되고 있으며 주기적인 취약점 분석 및 평가를 통한 적합한 보안대책 정립이 필요하다. 그러나 원전시스템은 안전성을 최우선으로 둔 특성 및 취약점 분석을 위한 제반사항 구축에 많은 비용 및 시간 등이 필요하여 기존의 취약점 분석 환경 및 분석 도구를 적용하는데 어려움이 있다. 이에 본 연구에서는 원전디지털자산 취약점 분석 시 고려해야 할 사항 및 일반적인 취약점 분석 방법들을 비교하여 기존의 취약점 분석 방법의 한계점을 보완하는 원전디지털자산에 적합한 취약점 평가 방법에 대해 제시하고 시범 적용한 결과를 기술하고자 한다.

GIS를 이용한 정적 자연환경인자의 분석에 의한 산사태 취약성 평가 (An Estimation of Landslide's Vulnerability by Analysis of Static Natural Environmental Factors with GIS)

  • Yang, In-Tae
    • 한국지형공간정보학회:학술대회논문집
    • /
    • /
    • pp.61-72
    • /
    • 2005
  • The landslide risk assessment process consists of hazard risk assessment and vulnerability analysis. landslide hazard risk is location dependent. Therefore, maps and spatial technologies such as GIS are very important components of the risk assessment process. This paper discusses the advantages of using GIS technology in the risk assessment process and illustrates the benefits through case studies of live projects undertaken. The goal of this study is to generate a map of landslide vulnerability map by analysis of static natural factors with GIS. A simple and efficient algorithm is proposed to generate a landslide potentialities map from DEM and existing maps. The categories of controlling factors for landslides, aspect of slope, soil, vegetation are defined. The weight values for landslide potentialities are calculated from AHP method. Slope and slope-direction are extracted from DEM, and soil informations are extracted from digital soil map. Also, vegetation informations are extracted from digital vegetation map. Finally, as overlaying, landslide potentialities map is made out, and it is verified with landslide place.

  • PDF

The needs for advanced sensor technologies in risk assessment of civil infrastructures

  • Fujino, Yozo;Siringoringo, Dionysius M.;Abe, Masato
    • Smart Structures and Systems
    • /
    • v.5 no.2
    • /
    • pp.173-191
    • /
    • 2009
  • Civil infrastructures are always subjected to various types of hazard and deterioration. These conditions require systematic efforts to assess the exposure and vulnerability of infrastructure, as well as producing strategic countermeasures to reduce the risks. This paper describes the needs for and concept of advanced sensor technologies for risk assessment of civil infrastructure in Japan. Backgrounds of the infrastructure problems such as natural disasters, difficult environment, limited resource for maintenance, and increasing requirement for safety are discussed. The paper presents a concept of risk assessment, which is defined as a combination of hazard and structural vulnerability assessment. An overview of current practices and research activities toward implementing the concept is presented. This includes implementation of structural health monitoring (SHM) systems for environment and natural disaster prevention, improvement of stock management, and prevention of structural failure.

칼튼 손상함수를 이용한 주요장비의 취약 면적 산정과 함정 취약성 평가 방법 (Assessment of Vulnerable Area and Naval Ship's Vulnerability based on the Carleton Damage Function)

  • 이장현;최원준
    • 대한조선학회논문집
    • /
    • v.55 no.3
    • /
    • pp.274-280
    • /
    • 2018
  • This paper deals with the calculation of vulnerable areas of critical components required for the assessment of naval ship's vulnerability. Taking into account the effectiveness of threatening weapons, the probability density function of damage was used to assess vulnerable areas or vulnerabilities of critical components. It is shown that the vulnerable area of critical component can be simply computed from the damage function. Considering the weapon effectiveness of fragmentation and explosion on the target, both Carleton Damage Function and Rectangular Cookie Cutter Function representing the probability of damage are applied to the vulnerable area assessment. Carleton damage function is utilized to describe the weapon-target interaction in the vulnerability analyses. A problem of blast effect against an assumed naval ship is chosen as a case study. Vulnerability is evaluated by applying the suggested method to the equipments arranged in the engine room of the virtual ship.

지상전투차량 취약성 평가를 위한 표적 모델링과 피격선 분석 시스템 (The Target Modeling and The Shot Line Analysis System to Assess Vulnerability of the Ground Combat Vehicle)

  • 유철;장은수;박강;최상영
    • 한국CDE학회논문집
    • /
    • v.20 no.3
    • /
    • pp.238-245
    • /
    • 2015
  • Vulnerability assessment is a process to calculate the damage degree of a combat vehicle when the combat vehicle is attacked by an enemy. When the vehicle is hit, it is necessary to analyze the shot line to calculate which components are damaged and judge whether the armor of the vehicle is penetrated by enemy's warhead. To analyze the shot line efficiently, this paper presents the target modeling and the shot line analysis system to assess vulnerability of the ground combat vehicle. This system is easily able to do several functions: 1) the program reads STL files converted from CAD model which is designed by commercial CAD software. 2) It calculates the intersection between triangle of STL mesh and the shot line, and check if the components of the model are penetrated. 3) This program can visualize the results using OpenGL. The vulnerability assessment using the shot line analysis can be used to model the armor of the combat vehicle and arrange the inner components effectively in the early stage of development of the combat vehicle.