• Title/Summary/Keyword: Threat mitigation

Search Result 46, Processing Time 0.034 seconds

Assessment of the Extreme 2014~2015 Drought Events in North Korea Using Weekly Standardized Precipitation Evapotranspiration Index (SPEI) (주단위 표준강수증발산지수를 활용한 2014~2015년 북한의 극한 가뭄 평가)

  • Nam, Won-Ho;Hong, Eun-Mi;Choi, Jin-Yong;Kim, Taegon;Hayes, Michael J.;Svoboda, Mark D.
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.59 no.4
    • /
    • pp.65-74
    • /
    • 2017
  • North Korea is one of the high vulnerable countries facing the threat of natural disaster and has experienced more frequent disasters in recent years. These disasters have significantly led to food shortages and large reductions in crop yields. In 2015, both North Korean officials and international agencies had identified the extreme drought event, the worst in one hundred years according to the North Korean government. The objective of this study was an assessment of the extreme drought events in 2014~2015, and to apply climatic drought indices for drought monitoring in North Korea. Characteristics of the extreme drought in North Korea are examined by using the weekly-based Standardized Precipitation Evapotranspiration Index (SPEI). The drought characteristics illustrated by the SPEI results are compared with a Standardized Precipitation Index (SPI) results and drought impact information to understand how these indices can explain the drought conditions within the country. These results demonstrated that the SPEI could be an effective tool to provide improved spatial and temporal drought conditions to inform management decisions for drought policy.

A Study on the Cooling Center Manual of Facility and Maintenance for Extreme Heat Disaster (폭염재난에 대응하는 Cooling Center 시설 및 운영기준에 관한 연구)

  • Kim, Jin-Wook
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.8 no.4
    • /
    • pp.17-22
    • /
    • 2008
  • Including heat wave, Climate change caused 150,000 casualty in 2000 and heat waves are meteorological events that pose a serious threat to human health. A heat wave is defined as "a period of abnormally and uncomfortably hot and usually humid weather". There is a need for the prevention of health effects due to weather and climate extremes. This study intends to propose the necessity of Response System to correspond to extreme heat. And this research focused on Cooling Center manual of facility and maintenance for extreme heat disaster. It would be useful to be planned based on community and to be taken a role as an E.O.C.(Emergency Operating Center). As a conclusion elderly watching system and the requirements regional cooling center facility was proposed.

A Warning and Forecasting System for Storm Surge in Masan Bay (마산만 국지해일 예경보 모의 시스템 구축)

  • Han, Sung-Dae;Lee, Jung-Lyul
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.9 no.5
    • /
    • pp.131-138
    • /
    • 2009
  • In this paper, a dynamic warning system to forecast inland flooding associated with typhoons and storms is described. The system is used operationally during the typhoon season to anticipate the potential impact such as inland flooding on the coastal zone of interest. The system has been developed for the use of the public and emergency management officials. Simple typhoon models for quick prediction of wind fields are implemented in a user-friendly way by using a Graphical User Interface (GUI) of MATLAB. The main program for simulating tides, depth-averaged tidal currents, wind-driven surges and currents was also vectorized for the fast performance by MATLAB. By pushing buttons and clicking the typhoon paths, the user is able to obtain real-time water level fluctuation of specific points and the flooding zone. This system would guide local officials to make systematic use of threat information possible. However, the model results are sensitive to typhoon path, and it is yet difficult to provide accurate information to local emergency managers.

Application of Remote Sensing and GIS to the evaluation of riparian buffer zones

  • Ha, Sung-Ryong;Lee, Seung-Chul;Ko, Chang-Hwan;Seo, Se-Deok;Jo, Yun-Won
    • Proceedings of the KSRS Conference
    • /
    • v.1
    • /
    • pp.436-440
    • /
    • 2006
  • Diffuse pollution has been considering as a major source of the quality deterioration of water resources. The establishment of riparian vegetation strips of buffers along those areas of water bodies is used to reduce the threat of diffuse pollution. Remote sensing offers a means by which critical areas could be identified, so that subsequent action toward the establishment of riparian zones can be taken. Even though the principal purpose of this research comes from the feasibility of the imagery of KOMPSAT-2 satellite, Landsat TM satellite data, which has 7 bands, are used to characterize the land cover for the study area on the behalf of KOMPSAT-2. This investigation focuses on the assessment of the existing riparian buffer zones for a portion of the upper Geum river watershed from the viewpoint of pollution mitigation by riparian vegetation strip establishment. Through comparing the delineation of riparian buffer zones developed with the existing zones established by the government, we can find the critical distortion points of the existing riparian buffer zone.

  • PDF

Investigation of a Hydrogen Mitigation System During Large Break Loss-Of-Coolant Accident for a Two-Loop Pressurized Water Reactor

  • Dehjourian, Mehdi;Sayareh, Reza;Rahgoshay, Mohammad;Jahanfarnia, Gholamreza;Shirani, Amir Saied
    • Nuclear Engineering and Technology
    • /
    • v.48 no.5
    • /
    • pp.1174-1183
    • /
    • 2016
  • Hydrogen release during severe accidents poses a serious threat to containment integrity. Mitigating procedures are necessary to prevent global or local explosions, especially in large steel shell containments. The management of hydrogen safety and prevention of over-pressurization could be implemented through a hydrogen reduction system and spray system. During the course of the hypothetical large break loss-of-coolant accident in a nuclear power plant, hydrogen is generated by a reaction between steam and the fuel-cladding inside the reactor pressure vessel and also core concrete interaction after ejection of melt into the cavity. The MELCOR 1.8.6 was used to assess core degradation and containment behavior during the large break loss-of-coolant accident without the actuation of the safety injection system except for accumulators in Beznau nuclear power plant. Also, hydrogen distribution in containment and performance of hydrogen reduction system were investigated.

Advanced In-Vessel Retention Design for Next Generation Risk Management

  • Kune Y. Suh;Hwang, Il-Soon
    • Proceedings of the Korean Nuclear Society Conference
    • /
    • 1997.10a
    • /
    • pp.713-718
    • /
    • 1997
  • In the TMI-2 accident, approximately twenty(20) tons of molten core material drained into the lower plenum. Early advanced light water reactor (LWR) designs assumed a lower head failure and incorporated various measures for ex-vessel accident mitigation. However, one of the major findings from the TMI-2 Vessel Investigation Project was that one part of the reactor lower head wall estimated to have attained a temperature of 1100$^{\circ}C$ for about 30 minutes has seemingly experienced a comparatively rapid cooldown with no major threat to the vessel integrity. In this regard, recent empirical and analytical studies have shifted interests to such in-vessel retention designs or strategies as reactor cavity flooding, in-vessel flooding and engineered gap cooling of the vessel Accurate thermohydrodynamic and creep deformation modeling and rupture prediction are the key to the success in developing practically useful in-vessel accident/risk management strategies. As an advanced in-vessel design concept, this work presents the COrium Attack Syndrome Immunization Structures (COASIS) that are being developed as prospective in-vessel retention devices for a next-generation LWR in concert with existing ex-vessel management measures. Both the engineered gap structures in-vessel (COASISI) and ex-vessel (COASISO) are demonstrated to maintain effective heat transfer geometry during molten core debris attack when applied to the Korean Standard Nuclear Power Plant(KSNPP) reactor. The likelihood of lower head creep rupture during a severe accident is found to be significantly suppressed by the COASIS options.

  • PDF

Monitoring Technology for Flood Forecasting in Urban Area (도시하천방재를 위한 지능형 모니터링에 관한 연구)

  • Kim, Hyung-Woo;Lee, Bum-Gyo
    • 한국방재학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.405-408
    • /
    • 2008
  • Up to now, a lot of houses, roads and other urban facilities have been damaged by natural disasters such as flash floods and landslides. It is reported that the size and frequency of disasters are growing greatly due to global warming. In order to mitigate such disaster, flood forecasting and alerting systems have been developed for the Han river, Geum river, Nak-dong river and Young-san river. These systems, however, do not help small municipal departments cope with the threat of flood. In this study, a real-time urban flood forecasting service (U-FFS) is developed for ubiquitous computing city which includes small river basins. A test bed is deployed at Tan-cheon in Gyeonggido to verify U-FFS. It is found that U-FFS can forecast the water level of outlet of river basin and provide real-time data through internet during heavy rain. Furthermore, it is expected that U-FFS presented in this study can be applied to ubiquitous computing city (u-City) and/or other cities which have suffered from flood damage for a long time.

  • PDF

Assessing the capability of HEC-RAS coupled 1D-2D model through comparison with 2-dimensional flood models

  • Dasallas, Lea;An, Hyunuk
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2019.05a
    • /
    • pp.158-158
    • /
    • 2019
  • Recent studies show the possibility of more frequent extreme events as a result of the changing climate. These weather extremes, such as excessive rainfall, result to debris flow, river overflow and urban flooding, which post a substantial threat to the community. Therefore, an effective flood model is a crucial tool in flood disaster mitigation. In recent years, a number of flood models has been established; however, the major challenge in developing effective and accurate inundation models is the inconvenience of running multiple models for separate conditions. Among the solutions in recent researches is the development of the combined 1D-2D flood modeling. The coupled 1D-2D river flood modeling allows channel flows to be represented in 1D and the overbank flow to be modeled over two-dimension. To test the efficiency of this approach, this research aims to assess the capability of HEC-RAS model's implementation of the combined 1D-2D hydraulic simulation of river overflow inundation, and compare with the results of GERIS and FLUMENS 2D flood model. Results show similar output to the flood models that had used different methods. This proves the applicability of the HEC-RAS 1D-2D coupling method as a powerful tool in simulating accurate inundation for flood events.

  • PDF

Design and Analysis of Fabrication Threat Management in Peer-to-Peer Collaborative Location Privacy

  • Jagdale, Balaso;Sugave, Shounak;Kolhe, Kishor
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.399-408
    • /
    • 2021
  • Information security reports four types of basic attacks on information. One of the attacks is named as fabrication. Even though mobile devices and applications are showing its maturity in terms of performance, security and ubiquity, location-based applications still faces challenges of quality of service, privacy, integrity, authentication among mobile devices and hence mobile users associated with the devices. There is always a continued fear as how location information of users or IoT appliances is used by third party LB Service providers. Even adversary or malicious attackers get hold of location information in transit or fraudulently hold this information. In this paper, location information fabrication scenarios are presented after knowing basic model of information attacks. Peer-to-Peer broadcast model of location privacy is proposed. This document contains introduction to fabrication, solutions to such threats, management of fabrication mitigation in collaborative or peer to peer location privacy and its cost analysis. There are various infrastructure components in Location Based Services such as Governance Server, Point of interest POI repository, POI service, End users, Intruders etc. Various algorithms are presented and analyzed for fabrication management, integrity, and authentication. Moreover, anti-fabrication mechanism is devised in the presence of trust. Over cost analysis is done for anti-fabrication management due to nature of various cryptographic combinations.

Mitigation of Phishing URL Attack in IoT using H-ANN with H-FFGWO Algorithm

  • Gopal S. B;Poongodi C
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.7
    • /
    • pp.1916-1934
    • /
    • 2023
  • The phishing attack is a malicious emerging threat on the internet where the hackers try to access the user credentials such as login information or Internet banking details through pirated websites. Using that information, they get into the original website and try to modify or steal the information. The problem with traditional defense systems like firewalls is that they can only stop certain types of attacks because they rely on a fixed set of principles to do so. As a result, the model needs a client-side defense mechanism that can learn potential attack vectors to detect and prevent not only the known but also unknown types of assault. Feature selection plays a key role in machine learning by selecting only the required features by eliminating the irrelevant ones from the real-time dataset. The proposed model uses Hyperparameter Optimized Artificial Neural Networks (H-ANN) combined with a Hybrid Firefly and Grey Wolf Optimization algorithm (H-FFGWO) to detect and block phishing websites in Internet of Things(IoT) Applications. In this paper, the H-FFGWO is used for the feature selection from phishing datasets ISCX-URL, Open Phish, UCI machine-learning repository, Mendeley website dataset and Phish tank. The results showed that the proposed model had an accuracy of 98.07%, a recall of 98.04%, a precision of 98.43%, and an F1-Score of 98.24%.