• Title/Summary/Keyword: 취약성 지도

Search Result 1,860, Processing Time 0.026 seconds

Suggestion of an Evaluation Chart for Landslide Susceptibility using a Quantification Analysis based on Canonical Correlation (정준상관 기반의 수량화분석에 의한 산사태 취약성 평가기법 제안)

  • Chae, Byung-Gon;Seo, Yong-Seok
    • Economic and Environmental Geology
    • /
    • v.43 no.4
    • /
    • pp.381-391
    • /
    • 2010
  • Probabilistic prediction methods of landslides which have been developed in recent can be reliable with premise of detailed survey and analysis based on deep and special knowledge. However, landslide susceptibility should also be analyzed with some reliable and simple methods by various people such as government officials and engineering geologists who do not have deep statistical knowledge at the moment of hazards. Therefore, this study suggests an evaluation chart of landslide susceptibility with high reliability drawn by accurate statistical approaches, which the chart can be understood easily and utilized for both specialists and non-specialists. The evaluation chart was developed by a quantification method based on canonical correlation analysis using the data of geology, topography, and soil property of landslides in Korea. This study analyzed field data and laboratory test results and determined influential factors and rating values of each factor. The quantification analysis result shows that slope angle has the highest significance among the factors and elevation, permeability coefficient, porosity, lithology, and dry density are important in descending order. Based on the score assigned to each evaluation factor, an evaluation chart of landslide susceptibility was developed with rating values in each class of a factor. It is possible for an analyst to identify susceptibility degree of a landslide by checking each property of an evaluation factor and calculating sum of the rating values. This result can also be used to draw landslide susceptibility maps based on GIS techniques.

Development of Internet Vulnerability Index for Youth through Internet Overdependency Analysis (인터넷 과의존 요인분석을 통한 청소년의 인터넷 취약성 지수 개발)

  • Jung, Nam-Su;Choi, Myeong-Ok;Lee, Young-Sun;Ahn, Hu-Nam
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.4
    • /
    • pp.345-358
    • /
    • 2019
  • The purpose of this study is to develop the Internet vulnerability index of adolescents. To do this, we used the original data of long - term follow - up survey for the internet overdependency cause analysis conducted by NIA in 2018, and analyzed the correlation between alternatives of internet vulnerability index and personal psychology by using linear regression analysis. Factor analysis showed that the relationship with the surroundings was indexed by adding 9 items to positive factors such as family acceptance, peer attachment, and teacher favorability. The relationship between the surroundings and self - stigmatization is confirmed, and the relationship between the surroundings and the Internet fragility is predicted to be negatively related, and the digital capacity is also assumed to be negatively correlated with the Internet vulnerability. In order to develop the specific form of the Internet vulnerability index, personal psychology and linear regression analysis were conducted. As a result, positive factors and R value of personal psychology were increased when considering the relationship with the environment and the digital capacity rather than the Internet overdependency model. Based on these implications, we discussed the implications and limitations of this study.

A Development of Component Vulnerability Analysis Program for Armored Fighting Vehicle using Criticality based on FMECA (FMECA 기반 위험도를 활용한 전차의 구성 부품별 취약성 분석 프로그램의 개발)

  • Hwang, Hun-Gyu;Kang, Ji-Won;Lee, Jang-Se
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.8
    • /
    • pp.1973-1980
    • /
    • 2015
  • The combat system has a different purpose depending on its mission. All functions of combat system are important, but, the components that related main functions for the purpose, are important than other components. Also, the hit probability of component is proportional to area of the component. Therefore, when we analyze vulnerability of combat system, to consider the importance and hit probability of component. Thus to improve reliability of combat system, we apply the analyzed result to design combat system. In this paper, we develop a vulnerability analysis program based on criticality which calculated from importance and hit probability of components by related researches. To do this, we propose a methodology to apply criticality of components, and define classification rates for calculating criticality based on FMECA. Additionally, we propose a technique of vulnerability analysis using criticality of components, and apply the proposed technique to develop and test the vulnerability analysis program for automation of analysis.

Water Management Vulnerability Assessment Considering Climate Change in Korea (기후변화에 따른 우리나라 물 관리의 취약성 평가)

  • Kim, Yeon-Kyu;Yoo, Jeong-A;Chung, Eun-Sung
    • Journal of Climate Change Research
    • /
    • v.3 no.1
    • /
    • pp.1-12
    • /
    • 2012
  • In order to use as basic data of adaptation, this study focused on a 'Water management vulnerability estimation' in Korea. Vulnerability is estimated dividing into flood mitigation and water resource management. Temporal resolution is 2000 year and the future 2020 year, 2050 year, 2100 year via A1B scenario. Time series data was normalized. Then weight that is gotten through delphi investigation was multiplied. Vulnerability is calculated through this process. In flood mitigation vulnerability, it was estimated to adaptation ability affect relatively biggest influence. In future, some area of Gangwon-do was analyzed that the flood mitigation vulnerability increases. In water resource management, it was estimated to climate exposure affect relatively biggest influence. At 2020 yr, there is a trend toward increased in the Chungcheongbuk-do and DaeJeon, Daegu, some area of Gyeongsangnamdo. Because this study evaluate relative vulnerability of whole country and analyzed spatial distribution, when local government establishes climate change adaptation details enforcement countermeasure, this study can give help to grasp whether should invest more in some field.

A Study on Web Vulnerability Assessment and Prioritization of Measures by Vulnerabilities (웹 취약점 점검 및 취약점별 조치 우선 순위 산정에 관한 연구)

  • Seong, JongHyuk;Lee, HooKi;Ko, InJe;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.37-44
    • /
    • 2018
  • Today we live in a flood of web sites and access numerous websites through the Internet to obtain various information. However, unless the security of the Web site is secured, Web site security can not be secured from various malicious attacks. Hacking attacks, which exploit Web site security vulnerabilities for various reasons, such as financial and political purposes, are increasing. Various attack techniques such as SQL-injection, Cross-Site Scripting(XSS), and Drive-By-Download are being used, and the technology is also evolving. In order to defend against these various hacking attacks, it is necessary to remove the vulnerabilities from the development stage of the website, but it is not possible due to various problems such as time and cost. In order to compensate for this, it is important to identify vulnerabilities in Web sites through web vulnerability checking and take action. In this paper, we investigate web vulnerabilities and diagnostic techniques and try to understand the priorities of vulnerabilities in the development stage according to the actual status of each case through cases of actual web vulnerability diagnosis.

  • PDF

Analysis of Power Efficiency in according to S-MAC attack in the Sensor Network (센서네트워크에서 S-MAC 공격에 따른 전력 효율성 분석)

  • Hong, Jin-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.2
    • /
    • pp.345-350
    • /
    • 2009
  • In this paper, it is reviewed vulnerability of security in S-MAC communication protocol of sensor network, and analyzed in the respect of power efficiency, which is consumed at each stage of communication procedure in according to vulnerability of denial of service. Therefore, from research results, it can be induced the need of authentication scheme, which is considered reliability, efficiency and security of normal S-MAC communication.

Vulnerability Assessment for Forest Ecosystem to Climate Change Based on Spatio-temporal Information (시공간 정보기반 산림 생태계의 기후변화 취약성 평가)

  • Byun, Jung-Yeon;Lee, Woo-Kyun;Choi, Sung-Ho;Oh, Su-Hyun;Yoo, Seong-Jin;Kwon, Tae-Sung;Sung, Joo-Han;Woo, Jae-Wook
    • Korean Journal of Remote Sensing
    • /
    • v.28 no.1
    • /
    • pp.159-169
    • /
    • 2012
  • The purpose of this study was to assess the vulnerability of forest ecosystem to climate change in South Korea using socio-environmental indicators and the results of two vegetation models named as Hydrological and Thermal Analogy Group(HyTAG), and MAPSS-Century 1(MC1). The changing frequency and direction of biome types estimated by HyTAG model was used for quantifying sensitivity and adaptive capacity of forest distribution. Similarly, the variation and changing tendency of net primary production and soil carbon storage estimated by MC1 model was used for quantifying sensitivity and adaptive capacity of forest function. As socio-environmental indicators, many statistical data such as financial autonomy rate and the number of forestry officer was prepared. All indicators were standardized, and then calculated using the vulnerability assessment equation. The period of vulnerability assessment was divided into the past(1971-2000) and the future(2021-2050). To understand what policy has a priority to climate change, distribution maps of each indicators was depicted and the vulnerability results were compared among administrative districts. Evident differences could be found in entire study area. These differences were mostly derived from regionalspecific adaptive capacity. The result and methodology of this study would be helpful for the development of decision-making supporting system and policy making in forest management with respect to climate change.

Climate Change Vulnerability Assessment Based on Spatio-Temporal Information (시.공간정보기반 기후변화 취약성 평가)

  • Choi, Hyun-Ah;Lee, Woo-Kyun;Kwak, Han-Bin;Choi, Sung-Ho;Byun, Jae-Gyun;Yoo, Sung-Jin;Cui, Guishan
    • Journal of Korea Spatial Information System Society
    • /
    • v.11 no.3
    • /
    • pp.63-69
    • /
    • 2009
  • Climate change has influenced on various sectors including ecosystem, water resource, natural hazards and health and so on. Thus, it is essential to more accurately assess climate change impact and prepare adaptation strategy. However, it is difficult to assess for climate change impact on various sectors with integrated form due to various data format by sectors. In this study, we prepared criteria and indicators for assessing climate change impact and integrated GIS based data which in correspond to indicators based on spatio-temporal information using GIS. Finally we suggest a guideline to assess vulnerability of each sectors to climate change based on integrated spatio-temporal information.

  • PDF

A Study on Development of Flood Vulnerability Evaluation Indicators for Sewage Treatment Plant (환경시설물 대상 홍수취약성 평가지표 개발에 관한 연구 - 하수처리장을 중심으로 -)

  • Roh, Jae-Deok;Han, Ji-Hee;Lee, Chang-Hee
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.12
    • /
    • pp.110-118
    • /
    • 2020
  • This study developed a evaluation indicators on environmental facilities highly vulnerable to flood damage from quantitative and qualitative perspectives in order to reinforce the ability or preemptive disaster prevention. At first, this study classified the facilities into structural factor and non-structural factor. The structural factor consists of 11 indicators, the non-structural factor consists of 8 internal indicators and 6 external indicators. This study is expected to be prepared for flood damage by evaluating flood vulnerability of environmental facilities.

Efficient RFID Secure Protocol with Forward Secrecy (전 방향 안전성을 제공하는 효율적인 RFID 보안 프로토콜)

  • Kim, Seong-Yun;Kim, Ho-Won
    • Journal of Internet Computing and Services
    • /
    • v.12 no.6
    • /
    • pp.139-147
    • /
    • 2011
  • We proposed the secure and efficient passive RFID protocol which is based on one-way hash based low-cost authentication protocol (OHLCAP). The paper introduces OHLCAP and the vulnerabilities of OHLCAP and suggests security solutions by analyzing them. Afterwards, The paper presents the proposed protocol and demonstrates computational performance and security of the protocol. This protocol not only has the resistances against eavesdropping attack, impersonation attack, desynchronization attack, and replay attack but also provides untraceability and forward secrecy.