• Title/Summary/Keyword: damage information

Search Result 3,051, Processing Time 0.028 seconds

Mobile Application Design for Farmland Flooding Prevention and Realtime Data Collection (농경지 침수 피해 감소와 실시간 자료 수집을 위한 모바일 기반 정보 시스템 설계)

  • Eun, Sang-Kyu;Kim, Tae-Gon;Lee, Ji-Min;Suh, Kyo;Jang, Min-Won
    • Journal of Korean Society of Rural Planning
    • /
    • v.19 no.3
    • /
    • pp.1-12
    • /
    • 2013
  • Climate change has increased the number of floods and inundation on farmland. Recently various mobile applications through inundation mapping, flood forecasts and evacuation routes have been developed for the prevention and reduction of flood damages. However, most of current prevention systems for farmland flooding are still web-based systems relying on the field survey which needs a lot of human and time resources although mobile devices has been rapidly improved and widely used. The purpose of this study is to design a mobile application for preventing and reducing farmland flood and inundation damages and collecting damage information in real time. We put advanced mobile device functions such as GPS, network communications, cameras into our system design. This system implement 2way communication and intuitive application that will increase information efficiency and decrease flood damage. Our design has been tested through previous flooding data of Jinju city in 2010.

A Study on The Controllability Function and Sevice Design for Disaster Damage Reduction in the IoT Environment

  • Yang, Jung-Mo;Kim, Jeong-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.2
    • /
    • pp.43-49
    • /
    • 2016
  • In this paper, we propose the controllability function and service design to efficiently implement the control of the disaster communication network, using Internet of Things(IoT) Technology. In accordance with the spread of Information Communication Technology(ICT), the era for building a disaster communications system without exclusion over the entire areas has emerged. National wireless mesh networks for public safety and disaster relief have been evolving to strengthen the pre-disaster response system using the latest technologies through the convergence of various technologies and services from the viewpoint of the command and control between disaster response agencies. In line with such a technological paradigm shift, the controllability of the objects in the IoT has been emerging as a key quality requirement of a disaster communications system. In this study, the objects are classified by the subject of control according to the IoT component, such as data, network resources and services in order to effectively implement their controllability. In addition, based on the destination of this controllability, technologies and services have been designed that can reduce the damage caused by disasters. Technologies and services that were derived from this study must be implemented in the current disaster safety network systems together with the establishment of an infrastructure for the networks in order that all persons are able to effectively utilize the disaster communications system for their safety.

A Study of Optimizing Cathodic Protection in Comparison of Design Methodologies

  • Choi, Young-Kwan;Choi, Sang-Yule;Shin, Myong-Chul
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.24 no.11
    • /
    • pp.23-29
    • /
    • 2010
  • The principal factor determining an optimum design method for cathodic protection is finding the protection current for preventing the corrosion of existing, already laid pipe. Some factors currently used to test designs include the sizes and lengths of pipes, soil resistivity, and the coating damage rate. We believe this method and current formulae are not optimum due to the uncertainty of determining the coating damage rate and the corrosion protection current's density. This paper analyzes the amount of protection current obtained by performing a temporary current test using data describing existing laid pipe. We then propose determining the corrosion protection current by using the temporary current test after modifying the formula. In addition, we suggest a way to choose optimized cathodic protection and the process of design by executing the design and taking account of such factors as a site condition of 34km-long non-protected water supply pipe lines (stages I and II) in ${\bigcirc}{\bigcirc}$ region, climate, interferences, and durability.

A Prototype of the Map Viewer based Spatial DB for the Integrated Urban Flooded Area Management System (도시침수 통합관리 시스템 구축을 위한 공간DB기반 Map Viewer 프로토타입 설계)

  • Kim, Ki-Uk;Seo, Tae-Woong;Kim, Chang-Soo
    • 한국방재학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.339-342
    • /
    • 2008
  • Recently the life and property damage caused by urban inundation have increased. In order to prevent the damage by inundation the researches for displaying the flooded areas through integrating SWMM and GIS have been progressed. However most of flood analysis systems only have used the GIS to display the flooded areas, and don't provide the integration disaster information to prevent the inundation. In this paper, we design a prototype for the Map Viewer based Spatial DB for the integrated urban floooded area management system. And we implement the spatial DB conversion module.

  • PDF

A Study on the Building Plan of Disaster Area Network for Establishment of Crisis Management System (위기관리체계 확립을 위한 재난통신망 구축방안에 관한 연구)

  • Park, Namkwun;Lee, JuLak
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.2
    • /
    • pp.192-198
    • /
    • 2014
  • In the current times, large-scale disasters, such as the recent sinking of Se-Wol ferry, are occurring continuously and unexpectedly. In order to minimize damage in the disaster scene, quick delivery and sharing of information between crisis management agencies is one of crucial factors that determine the scale of the damage. However, ineffective communication persists between the agencies in disaster scenes where disaster management action has to be carried out urgently. For that, this research focused on the actual condition of the inter-agency communication method and wireless operations, and also suggested the building plan of effective and efficient networking through understanding of each agency's present state and duties.

A Study on the Revitalization Ubiquitous Information Technology for the Disaster Management (재난관리를 위한 유비쿼터스 정보기술 활성화 방안)

  • Chae, Jin;Song, Yong-Sun
    • Fire Science and Engineering
    • /
    • v.23 no.6
    • /
    • pp.24-31
    • /
    • 2009
  • The Environment of disaster has more complicated, diversified and unpredicted sides, which causes extensive damage to humankind. Above all, presently the climatic change causes worldwide disaster of nature like cataclysm, intense heat, drought, earthquake and hard winter. After 9.11, most of countries continuously try to protect their own compatriots' life and property which forms the social safety net as well. This research investigates the current system used by the firerenation which is the national disaster response agency.ict also suggests the unation whiih is the nasystem unationdisaster mthe nasys accundihg to tionld el of disaster like the constructe naof DB, disaster cycld repunt, analysis of danger, facilities ih is ation system, disaster media system, location search system, disaster damage collection system.

Sensor fault diagnosis for bridge monitoring system using similarity of symmetric responses

  • Xu, Xiang;Huang, Qiao;Ren, Yuan;Zhao, Dan-Yang;Yang, Juan
    • Smart Structures and Systems
    • /
    • v.23 no.3
    • /
    • pp.279-293
    • /
    • 2019
  • To ensure high quality data being used for data mining or feature extraction in the bridge structural health monitoring (SHM) system, a practical sensor fault diagnosis methodology has been developed based on the similarity of symmetric structure responses. First, the similarity of symmetric response is discussed using field monitoring data from different sensor types. All the sensors are initially paired and sensor faults are then detected pair by pair to achieve the multi-fault diagnosis of sensor systems. To resolve the coupling response issue between structural damage and sensor fault, the similarity for the target zone (where the studied sensor pair is located) is assessed to determine whether the localized structural damage or sensor fault results in the dissimilarity of the studied sensor pair. If the suspected sensor pair is detected with at least one sensor being faulty, field test could be implemented to support the regression analysis based on the monitoring and field test data for sensor fault isolation and reconstruction. Finally, a case study is adopted to demonstrate the effectiveness of the proposed methodology. As a result, Dasarathy's information fusion model is adopted for multi-sensor information fusion. Euclidean distance is selected as the index to assess the similarity. In conclusion, the proposed method is practical for actual engineering which ensures the reliability of further analysis based on monitoring data.

A Study on the Efficiency of Auditing for Security Vulnerabilities in the Public Sector (공공부문 보안취약점 감사 효율화 방안에 관한 연구)

  • Kim, Hyun-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.1
    • /
    • pp.109-122
    • /
    • 2022
  • The purpose of information security activities is to reduce large-scale material and human accidents that are concerned about hacking damage to important systems, such as control systems, through periodic preventive activities in addition to finding the cause and taking follow-up measures after damage caused by hacking. For this reason, although each institution is using a security work audit model in accordance with the relevant regulations, it is not easy to conduct company-wide inspection activities due to the constraints of manpower and time. Therefore, in this paper, we will analyze the major vulnerabilities of public institutions over the past 10 years and present a security audit model that can perform efficient security activities compared to the models for domestic and foreign security audits.

Analysis of Information Security Issues and Classification through Metaverse Infringement Cases

  • Mi-Na, Shim
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.13-22
    • /
    • 2023
  • In the age of Web 3.0, the metaverse is emerging as a new innovative element to replace the Internet. Leading major ICT companies, it is striving to become a metaverse platform or infrastructure-oriented company. Along with the expansion of the VR and AR market, governments of each country are investing large budgets in this field. However, security concerns about metaverse are also growing. In addition to potential damage to infrastructure, platform and services, personal information leakage and privacy damage are expected to increase further. In this study, we investigated and closely analyzed cases of infringement on the infrastructure, platform, and service of Metaverse. We have clearly identified the current state of metaverse security and the characteristics of the risks of greatest concern. The research procedure is composed of a method of determining the metaverse security area for case analysis first and deriving the type of threat by area through the type of infringement. In particular, the results were mapped into Domain, Case, and Threat, and the implications of the results were analyzed. Through these results, researchers want to contribute to finding the right direction of research by clearly understanding the latest metaverse security status.

Evaluation of the relationship between maximum tsunami heights and fault parameters in Korea

  • Song, Min-Jong;Kim, Chang Hee;Cho, Yong-Sik
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2022.05a
    • /
    • pp.275-275
    • /
    • 2022
  • Tsunamis triggered by undersea earthquakes have the characteristic of longer wavelengths and can propagate a very long distance. Although the occurrence frequency of tsunami is low, it can cause casualties and properties. Historically, tsunamis that occurred on the western coast of Japan attacked the eastern coast of the Korean Peninsula and damaged the property and the loss of human life in 1983 and 1993. By tsunami in 1983 especially, 2 people were killed, and more than 200 casualties occurred. In addition, it caused 2 million dollars in property damage at Imwon Port. In 2011, The eastern cities of Japan: Iwate, Miyagi, Ibaraki, and Fukushima were damaged by a tsunami that occurred near onshore along the Pacific ocean and caused more than 300 billion dollars in property damage, and 20,000 casualties occurred. Moreover, those provoked nuclear power plant meltdown at Fukushima. In this study, it was carried out a relationship between maximum tsunami heights and fault parameters of earthquake: strike angle, dip angle, and slip angle at Imwon port. Those fault parameters are known that it does not relate to the magnitude of earthquake directly. Virtual tsunamis, which could be triggered by probable undersea earthquakes in the future, were investigated and mutual information based on probability and information theory was introduced to figure out the relationship between maximum tsunami height and fault parameters. Fault parameters were evaluated according to the strong relationship with maximum tsunami heights finally.

  • PDF