• Title/Summary/Keyword: Integrated risk analysis

Search Result 326, Processing Time 0.029 seconds

Case Study of Design and Implementation for Hadoop-Based Integrated Facility Monitoring System (하둡 기반의 통합설비 모니터링시스템 설계 및 구현 사례 연구)

  • Kim, Sangrak;Jang, Gilsang;Cho, Chiwoon
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.40 no.1
    • /
    • pp.34-42
    • /
    • 2014
  • SCADA and DCS that have performed automatic control and monitoring activities increase the productivity of enterprise in industries. In such systems, although their performance had been improved, there are still many deficiencies in predictive maintenance which can foresee the risk of any kinds of accidents. Because the data acquisition systems of main facilities are being distributed throughout the whole plant and therefore, integration of data obtained from the systems is very difficult. Accordingly, techniques that acquire meaningful information from the gathered data through realtime analysis still need to be improved. This paper introduces a developed facility monitoring system which can predict equipment failure and diagnose facility status through big data analysis to improve equipment efficiency and prevent safety accidents.

Developing Improvement Plans for National Defense Safety Directive to Align with the Serious Accident Punishment Act

  • Jeong-Woo Han;Cho-Young Jung
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.30 no.3
    • /
    • pp.275-282
    • /
    • 2024
  • To ensure a systematic and integrated approach to defense safety management, individual safety management regulations have been consolidated into the National Defense Safety Directive. However, despite being enacted after the enforcement of the Severe Accident Punishment Act, the National Defense Safety Directive does not incorporate the contents of the Serious Accident Punishment Act. This omission is likely to cause confusion in safety management. In this paper, a PDCA analysis of the Severe Accident Punishment Act and the National Defense Safety Directive was conducted to identify area for improvement and supplementation in the Directive. Chapter 3 proposes amendments to clearly define the scope and responsibilities of safety management, implement serious accident prevention measures and inspections, and establish the penalties for those involved. These amendments aim to ensure faithful compliance with the Severe Accident Punishment Act. Chapter 4 emphasizes the implementation and inspection of risk assessments to enhance the effectiveness of safety accident prevention and preparation, thereby ensuring the completeness of the PDCA cycle.

Safety Risk Management Policy of United States small unmanned aerial system (미 소형 무인비행체계의 안전성 위험관리 정책)

  • Hong, Jin-Keun
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.9
    • /
    • pp.35-42
    • /
    • 2021
  • The purpose of this paper is to review the small unmanned aerial system (sUAS) safety policy promoted by the United States(US) government. Therefore, in this paper, along with sUAS risk factors, the risk factors of sUAS that the US government is interested in are described. In addition, the risk factors were classified into physical and non-physical factors, and provisions mentioned in the Federal Aviation Administration(FAA) Relicensing Act were reviewed. Other risk scenarios were analyzed focusing on target scenario items that the FAA is interested in, such as flight operation disruption, infrastructure damage, and facility trespassing. Of course, we looked at the risk management principles promoted by the US FAA. In this paper, as a research method, the direction and contents of the FAA's sUAS policy were studied and reviewed from the analysis of major foreign journals and policy. In the research result of this paper, by analyzing the FAA sUAS safety risk management policy, the integrated operation and safety policy, physical risk management policy, operation and safety regulation, and sUAS policy and technology direction necessary for establishing the sUAS safety risk management guide in Korea are presented. The contribution of this study is to identify the leading US sUAS safety policy direction, and it can be used as basic data for deriving future domestic policy directions from this. Based on the research results presented in the future, policy studies are needed to derive detailed implementation plans.

A Review of the Progress with Statistical Models of Passive Component Reliability

  • Lydell, Bengt O.Y.
    • Nuclear Engineering and Technology
    • /
    • v.49 no.2
    • /
    • pp.349-359
    • /
    • 2017
  • During the past 25 years, in the context of probabilistic safety assessment, efforts have been directed towards establishment of comprehensive pipe failure event databases as a foundation for exploratory research to better understand how to effectively organize a piping reliability analysis task. The focused pipe failure database development efforts have progressed well with the development of piping reliability analysis frameworks that utilize the full body of service experience data, fracture mechanics analysis insights, expert elicitation results that are rolled into an integrated and risk-informed approach to the estimation of piping reliability parameters with full recognition of the embedded uncertainties. The discussion in this paper builds on a major collection of operating experience data (more than 11,000 pipe failure records) and the associated lessons learned from data analysis and data applications spanning three decades. The piping reliability analysis lessons learned have been obtained from the derivation of pipe leak and rupture frequencies for corrosion resistant piping in a raw water environment, loss-of-coolant-accident frequencies given degradation mitigation, high-energy pipe break analysis, moderate-energy pipe break analysis, and numerous plant-specific applications of a statistical piping reliability model framework. Conclusions are presented regarding the feasibility of determining and incorporating aging effects into probabilistic safety assessment models.

Urban Inundation Modeling and Its Damage Evaluation Based on Loose-coupling GIS (Loose-coupling GIS기반의 도시홍수 모의 및 피해액산정)

  • Kang, Sang-Hyeok
    • Spatial Information Research
    • /
    • v.18 no.1
    • /
    • pp.49-56
    • /
    • 2010
  • Considering the flood problem in urban areas, it is important to estimate disaster risk using accurate numerical analysis for inundation. In this study, it is carried out to calculate inundation depth in Samcheok city which suffered from serious flood damage in 2002. The urban flood model was developed by cording Manning n, elevation, and building's rare on ArcGIS for reducing error on data exchange, and applied for estimating flood damage by grid. This paper describes the extraction of sewer lines and buildings area, estimates its influence on flood inundation extent, and integrated 1D/2D flow to simulate inundation depth in high-density building area. This paper shows an integrated urban flood modeling including rainfall-runoff, inundation simulation, and mathematical flood damage estimation, and will serve drainage design for reducing its damage.

A study on the Effective Selection of the Personal Information Audit Subject Using Digital Forensic (디지털 포렌식 기법을 활용한 효율적인 개인정보 감사 대상 선정 방안 연구)

  • Cheon, Jun-Young;Lee, Sang-Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.5
    • /
    • pp.494-500
    • /
    • 2014
  • Recently the leak of personal information from in-house and contract-managed companies has been continually increasing, which leads a regular observation on outsourcing companies that perform the personal information management system to prevent dangers from the leakage, stolen and loss of personal information. However, analyzing many numbers of computers in limited time has found few difficulties in some circumstances-such as outsourcing companies that own computers that have personal information system or task continuities that being related to company's profits. For the reason, it is necessary to select an object of examination through identifying a high-risk of personal data leak. In this paper, this study will formulate a proposal for the selection of high-risk subjects, which is based on the user interface, by digital forensic. The study designs the integrated analysis tool and demonstrates the effects of the tool through the test results.

Lake Vulnerability Assessment (호소의 취약성 평가)

  • Kim, Eung-Seok;Yoon, Ki-Yong;Lee, Seung-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.11
    • /
    • pp.6877-6883
    • /
    • 2014
  • The continuous social development has led to increasing pollution in lakes. This study proposed the LVRI (Lake Vulnerability Resilience Indicator) based on the vulnerability assessment of climate change for an environmental risk assessment in lakes sufferign water pollution in an integrated aspect of the characteristics in lake watersheds. A total of 11 representative assessment factors were selected and constructed for 6 lake basins in the Geum River Watershed to calculate the exposure, sensitivity and adaptation indicators in a vulnerability assessment classification system. The weight coefficients for assessment factors of the LVRI were also calculated using the Entropy method. This study also compared the rank results of the lake environmental risk with/without the weight coefficients of assessment factors for the practical application of the proposed lake environmental risk assessment method. The lake environmental risk results estimated in this study can be used for long-term water quality analysis and management in lakes.

Evaluation of Risk Factors to Detect Anomaly in Water Supply Networks Based on the PROMETHEE and ANP (상수도관망의 이상징후 판정을 위한 위험요소 평가 - PROMETHEE와 ANP 기법 중심으로)

  • Hong, Sung-Jun;Lee, Yong-Dae;Kim, Sheung-Kown;Kim, Joong-Hoon
    • Journal of Korea Water Resources Association
    • /
    • v.39 no.1 s.162
    • /
    • pp.35-46
    • /
    • 2006
  • In this study, we proposed a layout of the integrated decision support system in order to prevent the contamination and to manage risk in water supply networks for safe and smooth water supply. We evaluated the priority of risk factors to detect anomaly in water supply networks using PROMETHEE and ANP techniques, which are applied to various Multi-Criteria Decision Making area in Europe and America. To develop the model, we selected pH, residual chlorine concentration, discharge, hydraulic pressure, electrical conductivity, turbidity, block leakage and water temperature as the key data item. We also chose pipe corrosion, pipe burst and water pollution in pipe as the criteria and then we present the results of PROMETHEE and ANP analysis. The evaluation results of the priority of risk factors in water supply networks will provide basic data to establish a contingency plan for accidents so that we can establish the specific emergency response procedures.

A Framework for Guaranteed Maximum Price and Contingency Development for Integrated Delivery of Transportation Projects

  • Gransberg, Douglas D.;Shane, Jennifer S.;Ahn, Jun-Yong
    • Journal of Construction Engineering and Project Management
    • /
    • v.1 no.1
    • /
    • pp.1-10
    • /
    • 2011
  • This paper discusses the components of a guaranteed maximum price (GMP) and proposes a framework for the development of GMPs as contract payment provisions for construction manager-at-risk (CMR) and design-build (DB) contracts for transportation projects. The framework is the synthesis of a comprehensive literature review, a content analysis of CMR and DB solicitation documents and contracts, and case study project output from twelve projects in nine states worth $3.1 billion. The research also discusses the development of three common types of contingencies that are often utilized in projects with GMPs. The study concludes that owners should specify the structure of the GMP and its components to enhance clarity and understanding of the GMP's composition. It recommends that this structure be included in the CMR and DB solicitation documents so that pricing proposals can be formulated in a manner that is consistent with the contract payment provisions that will be useful to practitioners that need to implement GMP-based contracts.

Factors Affecting Information Breach Intention: Based on General Deterrence Theory and Rational Choice Theory (정보유출의도에 대한 영향요인: 일반 억제 이론 및 합리적 선택 이론을 기반으로)

  • Kim, June-Young;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1507-1517
    • /
    • 2017
  • Generally, information breach incidents are thought to be caused by external hackers. However, both direct and indirect information breach incidents by insiders are more frequent than by external hackers. It also accounts for more than half of the total information breach, so it should be prepared against insider breach. In this study, based on General Deterrence Theory(GDT) and Rational Choice Theory(RCT), we integrated the risk sensitivity and situational anxiety, which were studied in the field of traffic psychology to construct research model. Result of analysis shows that the impact of risk perceptions on the severity and certainty of perceived punishment was not statistically significant, but perceived benefits, situational anxiety, and severity and certainty of perceived punishment were found to influence the information breach intention.