• Title/Summary/Keyword: Damage point processes

Search Result 25, Processing Time 0.02 seconds

Analysis of Flood Inundation Using LiDAR and LISFLOOD Model (LiDAR 고도자료와 LISFLOOD 모형을 이용한 홍수범람해석)

  • Choi, Cheon-Kyu;Choi, Yun-Seok;Kim, Kyung-Tak
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.16 no.4
    • /
    • pp.1-15
    • /
    • 2013
  • Great loss of life and property has been occurred by the severe flood globally. In Korea, a flood inundation map is used as one of the non-structural measures for reducing flood damage, and various inundation models have been studied for flood inundation analysis. This study applies LiDAR data and LISFLOOD model for flood inundation analysis and discusses the the modeling results from levee breaching scenarios for evaluating the applicability of the model to stream inundation modeling. In the results of LISFLOOD modeling, maximum inundation area was similar to the inundation map by HEC-RAS model just less than 4%. The inundation area by each levee breaching scenario showed the difference from 0.2% to 6.5%. Inundation processes were different each other according to the position of levee breach point, and maximum inundation area and depth were changed by the flow direction of stream and flood plain. This study shows that LISFLOOD model can be applied properly to stream inundation analysis using various inundation scenarios.

Analysis of Security Requirements on DCU and Development Protection Profile based on Common Criteria Version 3.1 (DCU 보안요구사항 분석 및 CC v3.1 기반의 보호프로파일 개발)

  • Cho, Youngjun;Kim, Sinkyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.1001-1011
    • /
    • 2014
  • Smart Grid Devices could have security vulnerabilities that have legacy communication networks because of the fact that Smart Grid employs bi-directional communications and adopted a variety of communication interface. Consequently, it is required to build concrete response processes and to minimize the damage of the cyber attacks including security evaluation and certification methods. DCU is designed to collect meter data from numerous smart meter and send to utility's server so DCU installed between smart meter and utility's server. For this reason, If DCU compromised by attacker then attacker could use DCU to launching point for and attack on other devices. However, DCU's security evaluation and certification techniques do not suffice to be deployed in smart grid infrastructure. This work development DCU protection profile based on CC, it is expected that provide some assistance to DCU manufacturer for development of DCU security target and to DCU operator for help safety management of DCU.

A Scheme Reconfiguration of Whitelisting and Hyperledger Fabric for Cryptocurrency Integrity Transactions (암호화폐 무결성 거래를 위한 Whitelisting과 Hyperledger Fabric 재구성 기법)

  • Su-An Jang;Keun-Ho Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.1
    • /
    • pp.7-12
    • /
    • 2024
  • To trade cryptocurrency, traders require a personal cryptocurrency wallet. Cryptocurrency itself using blockchain technology is guaranteed excellent security and reliability, so the threat of blockchain hacking is almost impossible, but the exchange environment used by traders for transactions is most subject to hacking threats. Even if transactions are made safely through blockchain during the transaction process, if the trader's wallet information itself is hacked, security cannot be secured in these processes. Exchange hacking is mainly done by stealing a trader's wallet information, giving the hacker access to the victim's wallet assets. In this paper, to prevent this, we would like to reconstruct the existing Hyperledger Fabric structure and propose a system that verifies the identity integrity of traders during the transaction process using whitelisting. The advantage is that through this process, damage to cryptocurrency assets caused by hackers can be prevented and recognized. In addition, we aim to point out and correct problems in the transaction process that may occur if the victim's wallet information is stolen from the existing Hyperledger Fabric.

A Study on the Advancement of Quantitative Risk Assessment for the PBL Process - The Center of FTA and Consequence Analysis- (PBL 반응공정의 정량적 위험성 평가에 관한 연구 - 결함수분석(FTA) 및 사고결과영향분석(CA)을 중심으로-)

  • Lee Young-Soon;Kang Sun-Jung;Choi Bong-Sun;Kim Hyong-Shuk
    • Journal of the Korean Institute of Gas
    • /
    • v.2 no.2
    • /
    • pp.1-11
    • /
    • 1998
  • A quantitative risk assessment and consequence analysis for PBL(Poly Butadiene Latex) reaction processes were performed. As a result of the Quantitative risk assessment, for the accident probability of PBL reactors causing a reaction runaway, was calculated as $9.197{\times}10^{-5}/yr$ The most important factor that affected the accident probability of PBL reactor was the relief device. When the reactor exploded, peak overpressure at the target point was $5.066{\times}10^5(Pa)$ and the range of effects windows to be broken occurred in almost all of the factory areas. The maximum radius of effect was 27m, in which workers could be die by the direct for eardrum damage was calculated at 77m. When the PBL reactor exploded, the extent of structural damage to buildings was calculated from the center of the explosion to a range of 52m. The results of the study's assessment have provided a direction for facility's improvement as well as effective safety investment.

  • PDF

A Study on the Establishment of Visual Landscape Impact Factors for Natural Landscape Management (자연경관관리를 위한 시각적 경관영향 요소 설정에 관한 연구)

  • Shin, Min-Ji;Shin, Ji-Hoo
    • Journal of Korean Society of Rural Planning
    • /
    • v.24 no.4
    • /
    • pp.135-146
    • /
    • 2018
  • A Visual landscape planning and management system has been introduced and implemented by each ministry so as to solve the problems of visual landscape destruction due to recognition on the value of natural landscape of beautiful territory and various development projects. At present, this system emphasizes the importance of the visual and perceptual aspect of the landscape however, there is a lack of techniques required for comprehensively predicting, evaluating, and managing it. Furthermore, sustainable landscape management after the completion of development projects has been inadequately carried out, as the focus has been only on consultation in the planning process of the development project in institutional performance. To this end, we presented objective and standardized criteria to predict and judge the effects of development projects on landscapes before project implementation. During the implementation of the development project, the influence of the visual landscape becomes accumulated in the construction progress stage. There is a need to identify the main viewpoints and to examine the continuous changes in the landscape-influencing factors, owing to the remarkable influences on the landscape, such as the change in the topography and the change caused by the artificial structure. During the stage of managing the influence on the visual landscape after the completion of the project, the influence on landscape should be monitored by measuring the change in the continuous landscape-influencing factors and determining the extent to which the actual reduction plan has been implemented. These processes should be performed continuously to maintain the quality of the visual landscape. The change in the landscape caused by the development project is shown to cause relatively greater visual damage than other factors composing the landscape owing to the influence of the artificial factors including the structure or the building. This shows that not only detailed examination of the visual impact before the development project but also continuous management is required during and after the development project. For this purpose, we derived eight landscape-influencing factors including form/shape, line, color, texture, scale/volume, height, skyline, and landscape control point. The proposed considering to be of high utilization in that it has a clear target of the landscape influencing factors.