• 제목/요약/키워드: realistic threat

검색결과 36건 처리시간 0.025초

돌발홍수 모니터링 및 예측 모형을 이용한 예측(F2MAP)태풍 루사에 의한 양양남대천 유역의 돌발홍수 모니터링

  • 김병식;홍준범;최규현;윤석영
    • 한국수자원학회:학술대회논문집
    • /
    • 한국수자원학회 2006년도 학술발표회 논문집
    • /
    • pp.1145-1149
    • /
    • 2006
  • The typhoon Rusa passed through the Korean peninsula from the west-southern part to the east-northern part in the summer season of 2002. The flash flood due to the Rusa was occurred over the Korean peninsula and especially the damage was concentrated in Kangnung, Yangyang, Kosung, and Jeongsun areas of Kangwon-Do. Since the latter half of the 1990s the flash flood has became one of the frequently occurred natural disasters in Korea. Flash floods are a significant threat to lives and properties. The government has prepared against the flood disaster with the structural and nonstructural measures such as dams, levees, and flood forecasting systems. However, since the flood forecasting system requires the rainfall observations as the input data of a rainfall-runoff model, it is not a realistic system for the flash flood which is occurred in the small basins with the short travel time of flood flow. Therefore, the flash flood forecasting system should be constructed for providing the realistic alternative plan for the flash flood. To do so, firstly, Flash Flood Monitoring and Prediction (FFMP) Model must be developed suitable to Korea terrain. In this paper, We develop the FFMP model which is based on GIS, Radar techniques and hydro-geomorphologic approaches. We call it the F2MAP model. F2MAP model has three main components (1) radar rainfall estimation module for the Quantitative Precipitation Forecasts (QPF), (2) GIS Module for the Digital terrain analysis, called TOPAZ(Topographic PArametiZation), (3) hydrological module for the estimation of threshold runoff and Flash Flood Guidance(FFG). For the performance test of the model developed in this paper, F2MAP model applied to the Kangwon-Do, Korea, where had a severe damage by the Typhoon Rusa in August, 2002. The result shown that F2MAP model is suitable for the monitoring and the prediction of flash flood.

  • PDF

북한의 핵테러와 대응방안 (The Countermeasures of North Korea's Nuclear Weapon Terror)

  • 김성우
    • 융합보안논문지
    • /
    • 제14권6_1호
    • /
    • pp.129-138
    • /
    • 2014
  • 한국은 북한의 핵무기 위협에 우선적으로 대응하여야 하는 상황에 직면해 있다. 전략적으로 대응방향은 한국 자체 및 미국의 억제전력을 강화함과 동시에 현재 상태에서 그에 대한 현실적인 해결책은 선제타격을 통한 사전 제거라는 점도 인정할 필요가 있다. 현재 북한의 미사일 위협은 상존하고 있으며 미사일에 탑재시킬 정도의 핵무기를 소형화하는데 성공하였을 가능성도 매우 높다. 한국은 적의 미사일 방어에 관심을 가져야 하며 대공방어는 하층방어와 상층방어를 중심으로 한 전반적인 미사일 방어 체제의 구축방향을 토의 연구하는 한편 인구밀집 도시와 국가 전략시설을 방호할 수 있는 체계를 구축해야한다. 지금까지 북한의 핵무기 위협과 관련된 쟁점은 6자 회담과 같은 국제적이고 외교적인 접근에 의해 문제를 해결하려고 주 노력을 경주하였는데 이 방법이 과연 효율적인지, 북한의 핵무기 위협에 대한 정보의 신뢰도는 과연 어느 정도 인지와 이것을 기초로 우리 군의 방어태세의 하나인 킬체인(Kill Chain)이 효과적인 방어수단이 될 수 있는가 등이다. 지금까지 우리가 얻은 교훈은 북한이 스스로 핵무기 개발을 포기하지 않는 한 외교적 노력으로만 북한의 핵무기를 개발을 억제하는 것은 불가능하다는 것을 알았다. 외교적인 노력과 더불어 군사적인 방법으로 다양한 억제 대책도 실제로 시행할 수 있도록 준비해야 한다.

국내 보호지역의 관리여건 파악 및 개선방향 고찰 - 생태·경관보전지역, 습지보호지역을 중심으로 - (Understanding the Managing Conditions and Improvement Strategies of Domestic Protected Areas in Korea - Focus on Ecological and Landscape Conservation Areas and Wetland Protected Areas -)

  • 최지은;채희명;조동길;김수련;송유진;문상균;김종철;박용수
    • 한국환경복원기술학회지
    • /
    • 제19권1호
    • /
    • pp.111-120
    • /
    • 2016
  • This study is aimed at using the grasped problems of protected areas in Korea as the basic data for management planning and system improvement of protected areas by grasping realistic problems through the interview with the persons in charge on the basis of general problems of domestic protected areas. To this end, this study deducted major problems in urgent need of improvement, and improvement direction through the survey of the persons in charge of protected areas. This study result is as follows: The major problems, which should be preferentially improved, were found to be shortages of management infrastructure, cooperation between interested parties, and threat factors in protected areas, etc. Such problems are interconnected with each other, thus coming up complexly; therefore, it's necessary to make a comprehensive approach to the problems after confirming the causal relationship of the identified problems. In addition, for the purpose of effective management of a protected area, it's necessary to implement priority management of major problems through different management intensity from the planning phase. Also, it's important to enhance the effectiveness of planning by considering a possible potential threat factor in the outside of protected areas, and referring to the contents of the development plan for the relevant area in time of management planning. Lastly, there is the need for systematic improvement of an institution through thorough status review of the actual state of management planning fulfillment in order to increase the effectiveness of planning in a follow-up study hereafter.

현대사회의 환경변화에 따른 Bio-Terror의 위협요인 연구 (A Study on the Threat of Biological Terrorism in modern society)

  • 강영숙;김태환
    • 한국재난정보학회 논문집
    • /
    • 제1권1호
    • /
    • pp.3-26
    • /
    • 2005
  • In recent years, there is growing concern about the potential use of biological agents in war or acts of terrorism accompanied an increased realization that rapid preparedness and response are needed to prevent or treat the human damage that can be caused by these agents. The threat is indeed serious, and the potential for devastating numbers of casualties is high. The use of agents as weapons, even on a small scale, has the potential for huge social and economic disruption and massive diversion of regional and national resources to combat the threat, to treat primary disease, and to clean up environmental contamination. Biological weapons are one of weapons of mass destruction (or mass casualty weapons, to be precise. since they do not damage non-living entities) that are based on bacteria, viruses, rickettsia, fungi or toxins produced by these organisms. Biological weapons are known to be easy and cheap to produce and can be used to selectively target humans, animals, or plants. Theses agents can cause large numbers of casualties with minimal logistical requirements (in wide area). The spread of disease cannot be controlled until there is awareness of the signs of infection followed by identification of agents; and if the organism is easily spread from person to person, as in the case of smallpox, the number of casualties could run into the tens of thousands. Biological weapons could be used covertly, there can be a lot of different deployment scenarios. A lot of different agents could be used in biological weapons. And, there are a lot of different techniques to manufacture biological weapons. Terrorist acts that make use of Biological Agents differ in a number of ways from those involving chemicals. The distinction between terrorist and military use of Biological Weapon is increasingly problematic. The stealthy qualities of biological weapons further complicate the distinction between terrorism and war. In reality, all biological attacks are likely to require an integrated response involving both military and civilian communities. The basic considerations when public health agencies establish national defence plan against bioterrorism must be 1) arraying various laws and regulations to meet the realistic needs, 2)education for public health personnels and support of concerned academic society, 3)information collection and cooperative project with other countries, 4)Detection and surveillance(Early detection is essential for ensuring a prompt response to biological or chemical attack, including the provision of prophylactic medicines, chemical antidotes, or vaccines) and 5) Response(A comprehensive public health response to a biological or chemical terrorist event involves epidemiologic investigation, medical treatment and prophylaxis for affacted persons, and the initiation of disease prevention or environmental decontamination measures). The purpose of this paper is providing basic material of preparedness and response for biological terrorism in modern society.

  • PDF

병원균 및 생물독소 탐지시스템을 위한 원자외선 LED 기술동향 (Trends of Deep UV-LED Technology for the Pathogen and Biotoxin Aerosol Detection System)

  • 정유진;정영수;최기봉
    • 한국전기전자재료학회논문지
    • /
    • 제28권5호
    • /
    • pp.277-284
    • /
    • 2015
  • The humans are under attack involving the hazardous environment and pathogen/biotoxin aerosol that is realistic concerned. A portable, fast, reliable, and cheap Pathogen and Biotoxin Aerosol threat Detection(PBAD) trigger is an important technology for detect-to-protect and detect-to-treat system because the man-made biological terror is a fast and lethal infection. The ultraviolet C(UVC) wavelengths light source is key issue for PBAD that is sensitive because of strong fluorescence cross section from fluorescent amino acids in proteins such as tryptophan and tyrosine. The UVC-light emitting diode(LED) is emerging light source technology as alternative to laser or lamps as they offer several advantages. This paper discussed about the design consideration of UVC-LED for the PBAD system. The UVC-LED and PBAD technology, currently available or in development, are also discussed.

ESM 시스템을 이용한 안정된 학내망 구축 (A School Network Construction using the ESM System)

  • 이대식;윤동식;안희학
    • 융합보안논문지
    • /
    • 제5권3호
    • /
    • pp.1-7
    • /
    • 2005
  • 오늘날의 네트워크는 여러 위협적인 공격에 취약한 상태에 있다. 특히 인터넷 서비스나 전자상거래와 같은 서비스를 제공하는 기업은 위험에 노출이 되어 있고 공격자의 타겟이 된다. 그리하여 기업들은 각종 보안솔루션을 사용하는 것이 현실적이다. 이것은 우리가 이용하고 있는 학내망에서도 예외일 수는 없음으로 학내망에도 FireWall, IDS, VirusWall VPN 등 여러가지 보안 솔루션들이 존재한다. 관리자들은 이 여러 가지의 보안솔루션들을 관리해야 하는데 그러기에는 효율성이 떨어져 모든 솔루션을 관제 및 통제 할 수 있는 어떠한 관리 시스템이 필요하게 되었다. 본 논문에서 ESM이 관리하는 보안솔루션에 대한 기본적인 내용과 ESM을 사용했을 때의 장단점을 다룬다. 또한 그렇게 구현된 학내망에 ESM을 이용하여 관리자가 학내망을 더욱 효율적이고 체계적으로 관리할 수 있는 방안을 제시한다.

  • PDF

지역특화산업을 고려한 군산항 발전 방안 (A Study on Strategies of Gunsan Port by Considering Regional Characteristics)

  • 나정호;조성우
    • 무역학회지
    • /
    • 제46권6호
    • /
    • pp.39-54
    • /
    • 2021
  • This study comprehensively reviews the research conducted until recently in order to derive realistic alternatives in consideration of local industries. The case analysis was performed on a competitive port of similar size, and strategies and revitalization measures were suggested in consideration of the conditions of Gunsan Port. Literature review focused on papers and major reports. The case of similar size were analyzed for Daesan port, Boryeong port, and Mokpo port. In order to find strategies to revitalize the regional port logistics industry behind Gunsan Port, the recent opportunities and threat factors of Gunsan Port were derived. In order to foster the regional port logistics industry with Gunsan Port as its main base, this study proposes a three-step development strategy. It is necessary to increase the effectiveness of the public-private joint port sales and maintain the incentive system, but use it as a means to strengthen the competitiveness of Gunsan Port. Since the possibility of opening various routes is not high due to the conditions of Gunsan Port, various business models can be devised to link the currently opened routes. Start-up in the logistics field can stand out if they provide predictive data or provide consulting services by securing and analyzing logistics data, not directly providing logistics services.

Full-scale simulation of wind-driven rain and a case study to determine the rain mitigation effect of shutters

  • Krishna Sai Vutukuru;James Erwin;Arindam Gan Chowdhury
    • Wind and Structures
    • /
    • 제38권3호
    • /
    • pp.171-191
    • /
    • 2024
  • Wind Driven Rain (WDR) poses a significant threat to the building environment, especially in hurricane prone regions by causing interior and content damage during tropical storms and hurricanes. The damage due to rain intrusion depends on the total amount of water that enters the building; however, owing to the use of inadequate empirical methods, the amount of water intrusion is difficult to estimate accurately. Hence, the need to achieve full-scale testing capable of realistically simulating rain intrusion is widely recognized. This paper presents results of a full-scale experimental simulation at the NHERI Wall of Wind Experimental Facility (WOW EF) aimed at obtaining realistic rain characteristics as experienced by structures during tropical storms and hurricanes. A full-scale simulation of rain in strong winds would allow testing WDR intrusion through typical building components. A study of rain intrusion through a sliding glass door is presented, which accounted for the effects of multiple wind directions, test durations and wind speeds; configurations with and without shuttering systems were also considered. The study showed that significant levels of water intrusion can occur during conditions well below current design levels. The knowledge gained through this work may enhance risk modeling pertaining to loss estimates due to WDR intrusion in buildings, and it may help quantify the potential reduction of losses due to the additional protection from shuttering systems on sliding glass doors during winds.

불법어업에 대한 해상집행기관의 역할 및 방향 - 중국어선의 불법어업을 중심으로 - (A Study on the Role of Maritime Enforcement Organization As Response of Illegal Fishing)

  • 정봉규;최정호;임석원
    • 수산해양교육연구
    • /
    • 제26권4호
    • /
    • pp.769-788
    • /
    • 2014
  • Today, all the countries of the world newly recognize importance of sea on 70% area of the earth, which are focused on efforts for security of marine territory and fishes resources. On the security concerns of the ocean & fishes resources, Sea are very important on the ground of the importance of the ocean, thus international community has been trying to combat a maritime security threat and illegal fisheries. Coastal states need to have proper state's jurisdiction and exercise it's jurisdiction to response effectively to a maritime security threat and illegal fisheries. Here, many of the coastal states strengthened the rights in Exclusive Economic Zone(;EEZ) naturally, there are made cooperation activities and keen competition in the sea because deepening of complex understanding of the relationship between the surrounding countries with marine surveys & continental shelf development, island territorial sovereignty & marine jurisdiction in overlap of sea area on EEZ. In these circumstances, foreign fishing boats invaded to our territorial waters and EEZ many times. in addition, Chinese fishing boats are going to illegal fisheries naturally. On this point, a powerful crackdown of maritime enforcement organization had no effect on them. Also more and more their resistance gathered strength and tendency of a illegal activities became systematization, group action and atrocity little by little. So this thesis includes a study on the regal regulation, the system and formalities on the control of illegal fishing. And the author analyzed the details of the activities of illegal fishing and boats controlled by Korea Coast Guard(KCG), fishing patrol vessels of Ministry of Maritime Affaires and Fisheries(MOMAF) and Navy etc. from in adjacent sea area of Korea. In relation to this, the policy and activity plan were devised to crackdown to illegal fisheries of foreign fishing boats and then it was enforced every year. According to this, analyze the present conditions of illegal fisheries of a foreign fishing boats on this study, also analyze the present conditions of maritime enforcement organization & found out problems to compared it. protect the territorial waters, at the same time protection of marine mineral resources & fishes resources of EEZ including continental shelf, which has want to study for the role & response of maritime enforcement organization for the protection of fisheries resources and a proper, a realistic confrontation plan of maritime enforcement organization against illegal fisheries of foreign fishing boats.

제어시설 사이버공격 대응을 위한 사이버보안 프레임워크 (Framework) 연구 (Study on security framework for cyber-hacking control facilities)

  • 이상도;신용태
    • 예술인문사회 융합 멀티미디어 논문지
    • /
    • 제8권4호
    • /
    • pp.285-296
    • /
    • 2018
  • 지난 몇년간 발생된 수많은 정보시스템 해킹중 국가적 위험을 불러일으킬만한 사이버공격은 핵시설과 원전에 대한 사이버공격일것이다. 그중 대표적인 것이 이란 핵시설 스턱스넷 공격과 한국의 한수원 사이버위협이라고 할 수 있다. 전자는 직접적인 사이버공격으로 인해 원전이 멈출 수 있다는 것을 보여주었고, 후자는 사이버해킹 위협만으로도 국민을 공포에 떨게 할 수 있다는 것을 보여주었다. 이 사건들 이후 산업 제어시설에 대한 사이버공격 위험성이 알려져서 보안이 강화되기 시작하였다. 원전 발전소도 이전의 소극적인 인터넷과 분리된 네트워크로 안전하게 운영된다는 개념에서 벗어나서 악성코드 등 사이버테러로 인해 공격을 받을 수 있다는 개념으로 변했다. 두 가지 개념의 차이점은 제어시설도 사이버공격으로 침해될 수 있다는 가능성에 기초하여 대응하기 위한 전략으로 세워졌다는 것이다. 그 점에서 미국은 이미 제어시설에 대한 보안프레임워크를 설정하여 대비하고 있다. 본 논문에서는 제어시설에 대한 사이버보안 공격사례 및 공격 시나리오를 식별하고, 각 시나리오별로 위험요소에 대한 대처방안을 분석한다. 이를 통해 국내 보안프레임워크 설계시 참조해야할 사항을 식별하여 보안성을 강화하고 설계시 안정성을 확보하고자 한다.