• Title/Summary/Keyword: sabotage

Search Result 29, Processing Time 0.029 seconds

Dynamic response of cable-stayed bridges subjected to sudden failure of stays - the 2D problem

  • Raftoyiannis, I.G.;Konstantakopoulos, T.G.;Michaltsos, G.T.
    • Coupled systems mechanics
    • /
    • 제3권4호
    • /
    • pp.345-365
    • /
    • 2014
  • A significant problem met in engineering practice when designing cable-stayed bridges is the failure of cables. Many different factors can lead to sudden failure of cables, such as corrosion, continuous friction or abrasion, progressive and extended crevice created by fatigue and finally an explosion caused by sabotage or accident, are some of the causes that can lead to the sudden failure of one or more cables. This paper deals with the sudden failure of cables in a special form of cable-stayed bridges with a single line of cables anchored at the central axis of the deck's cross-section. The analysis is carried out by the modal superposition technique where an analytical method developed by the authors in a previous work has been employed.

원자력발전소 정지저출력 운전 기간의 물리적방호를 위한 핵심구역파악 (Vital Area Identification for the Physical Protection of Nuclear Power Plants during Low Power and Shutdown Operation)

  • 곽명웅;정우식;이정호;백민
    • 한국안전학회지
    • /
    • 제35권1호
    • /
    • pp.107-115
    • /
    • 2020
  • This paper introduces the first vital area identification (VAI) process for the physical protection of nuclear power plants (NPPs) during low power and shutdown (LPSD) operation. This LPSD VAI is based on the 3rd generation VAI method which very efficiently utilizes probabilistic safety assessment (PSA) event trees (ETs). This LPSD VAI process was implemented to the virtual NPP during LPSD operation in this study. Korea Atomic Energy Research Institute (KAERI) had developed the 2nd generation full power VAI method that utilizes whole internal and external (fire and flooding) PSA results of NPPs during full power operation. In order to minimize the huge burden of the 2nd generation full power VAI method, the 3rd generation full power VAI method was developed, which utilizes ETs and minimal PSA fault trees instead of using the whole PSA fault tree. In the 3rd generation full power VAI method, (1) PSA ETs are analyzed, (2) minimal mitigation systems for avoiding core damage are selected from ETs by calculating system-level target sets and prevention sets, (3) relatively small sabotage fault tree that has the systems in the shortest system-level prevention set is composed, (4) room-level target sets and prevention sets are calculated from this small sabotage fault tree, and (5) the rooms in the shortest prevention set are defined as vital areas that should be protected. Currently, the 3rd generation full power VAI method is being employed for the VAI of Korean NPPs. This study is the first development and application of the 3rd generation VAI method to the LPSD VAI of NPP. For the LPSD VAI, (1) many LPSD ETs are classified into a few representative LPSD ETs based on the functional similarity of accident scenarios, (2) a few representative LPSD ETs are simplified with some VAI rules, and then (3) the 3rd generation VAI is performed as mentioned in the previous paragraph. It is well known that the shortest room-level prevention sets that are calculated by the 2nd and 3rd generation VAI methods are identical.

Regional Environmental Conflict and countermeasures

  • Kim, Taek
    • International Journal of Advanced Culture Technology
    • /
    • 제5권4호
    • /
    • pp.26-30
    • /
    • 2017
  • The Ministry of Patriots and Veterans Affairs decided to designate Goesan County as a comprehensive venue for determining the geography of the land, the efficient management of land, the public opinion of local residents, and the establishment of a group of civic complaints. In the meantime, Goesan focused on attracting high-ranking government officials, including high-ranking government officials and high-ranking tourist attractions, to attract high-ranking government officials, including high-ranking officials of the National Guard, to promote the nation's bid to attract high-ranking government officials. In this paper, we intend to conduct a study centered on the controversy over the survival of the Korean National Guard. conflict between local governments is a non-authoritative administrative administrative body, it can be regarded as a matter of difficulty by intervening in any autonomous matter, and ultimately, it can be changed to judicial judgment. This is not to say that the residents of Goesan county will protest this time. Even though Goesan promotes regional development and development for local residents, it can not guarantee that the judgment of Goesan County will be held in the same situation. Thus, it should develop a win-win strategy based on the threat of sabotage. To this end, I would like to suggest the following measures.

Trend of Fire Outbreaks in Ghana and Ways to Prevent These Incidents

  • Addai, Emmanuel K.;Tulashie, Samuel K.;Annan, Joe-Steve;Yeboah, Isaac
    • Safety and Health at Work
    • /
    • 제7권4호
    • /
    • pp.284-292
    • /
    • 2016
  • Background: In Ghana, fire incidents have become a regular occurrence, with thousands of lives and millions of dollars lost every year. Hardly a day passes without news of a fire outbreak in some part of Ghana, causing fear and panic among the people. This generates much discussion centering on rumors relating to politics, sabotage, misfortune, religious differences, etc. This article seeks to discuss the trend of fire incidents occurring in Ghana from 2000 to 2013 and the different ways to prevent these incidents. Methods: The pattern of fire incidence in Ghana as a whole as well as in each region is discussed. The study took into consideration the causes, mechanisms, as well as preventive measures against the fire menace. Data were obtained from the head office of Ghana's national fire service. Results: It was noticed that in general the rate of fire incidence increased each year. This increase was attributed to several factors: rate of population growth and industrialization, unstable electricity, urbanization, negligence, illegal electrical connection, etc. The cause of fire was categorized into domestic, industrial, vehicular, institutional, electrical, commercial, bush, and others. Among these causes, domestic fire accounted for 41% of the total number of fire incidents in the country. Conclusion: Finally, this study presents several recommendations to help prevent and mitigate fire incidents in Ghana.

국제형사재판소(國際刑事載判所)통한 항공기(航空機)테러범죄 규제에 관한 연구- ICC규정(規程)개정 위한 입법론적 고찰을 중심으로 - (A Study on the Legal Control of Aircraft Terrorism by International Criminal Court(A Suggestion for the Amendment of ICC Statute))

  • 김만호
    • 항공우주정책ㆍ법학회지
    • /
    • 제15권
    • /
    • pp.40-66
    • /
    • 2002
  • The purpose of this paper is to investigate the legal controㅣ, by using the International Criminal Court(ICC) that will enter into force to the most serious crimes of concern to the international community as a whole, and regulates the jurisdiction with respect to the following crimes: (a) The crime of genocide; (b) Crimes against humanity; (c) War crimes; Cd) The crime of aggression. However, the existing ICC Statute excludes (e) Crimes, established under or pursuant to the treaty, which was regulated by the ICC draft statute that the International Law Commission(ILC) examined and submitted to the UN General Assembly in 1994, and which contained aircraft terrorism such as hijacking in the Hague Convention of 1970 or sabotage in the Montreal Convention of 1971 in Annex of ILC draft. Therefore, this paper examines the legal character of aircraft terrorism as one of the most serious crimes of concern to the international community as a whole, and suggests two kinds of legislative comments for the amendment of the ICC Statute including aircraft terrorism as an object of the jurisdiction of the Court, for suppressing aircraft terrorism in advance and ensuring equitable penalty by ICC system.

  • PDF

반생산적인 업무행동에 대한 자기애적 성격특성의 이해 (Counterproductive Work Behaviors and Narcissism)

  • 주원식;차타순
    • 경영과정보연구
    • /
    • 제10권
    • /
    • pp.33-66
    • /
    • 2002
  • Counterproductive work behaviors are behaviors by employees intended to harm their organization or organization members. Human is the being has a desire and behaviors. To understand behaviors of an individual, it is important to understand the personality which determines a difference between individuals. Narcissists has psychological traits to be likely to experience negative emotions, such as frustration, hostility or anger, and this psychological traits of narcissists are more likely to induce an aggression. In this view, the purpose of this study was to examine the relationships between counterproductive work behaviors and narcissistic personality characteristics and to explore psychological dynamics about how narcissistic personality characteristics had an effect on counterproductive work behaviors. As a result, facts known were as follows. First, narcissists has strong desires to maintain a sense of superiority over others and defend their egos against unpleasant evaluation information, even if the information is factual and accurate. Second, narcissists are hyper-sensitive to negative information and are more likely to encounter information or situations that challenge their positive self-appraisals by this view. Third, in response to these challenges, or ego threats, these individuals are more likely to experience negative emotions, such as anger, frustration, or hostility. Forth, this negative emotions lead to aggression and as a result, this is more likely to induce counterproductive work behaviors such as theft, sabotage, interpersonal aggression, work slowdowns, wasting time and materials, and spreading rumors. Thus, narcissism is another individual difference variable that may be an important factor in determining counterproductive work behaviors, particularly under conditions perceived to be difficult or stressful.

  • PDF

VIPEX를 이용한 가상 원자력시설의 핵심구역 파악 분석 (Vital Area Identification Analysis of A Hypothetical Nuclear Facility Using VIPEX)

  • 이윤환;정우식;이진홍
    • 한국안전학회지
    • /
    • 제26권4호
    • /
    • pp.87-95
    • /
    • 2011
  • The urgent VAI(Vital Area Identification) method development is required since 'The Act of Physical Protection and Radiological Emergency' that is established in 2003 requires an evaluation of physical threats in nuclear facilities and an establishment of physical protection in Korea. The KAERI(Korea Atomic Energy Research Institute) has developed the VAI methodology and VAI software called as VIPEX(Vital area Identification Package EXpert) for identifying the vital areas. This study is to demonstrate the applicability of KAERI's VAI methodology to a hypothetical facility, and to identify the importance of information of cable and piping runs when identifying the vital areas. It is necessarily needed to consider cable and piping runs to determine the accurate and realistic TEPS(Top Event Prevention Set). If the information of cable and piping runs of a nuclear power plant is not considered when determining the TEPSs, it is absolutely impossible to acquire the complete TEPSs, and the results could be distorted by missing it. The VIPEX and FTREX(Fault Tree Reliability Evaluation eXpert) properly calculate MCSs and TEPSs using the fault tree model, and provide the most cost-effective method to save the VAI and physical protection costs.

Detecting Anomalies, Sabotage, and Malicious Acts in a Cyber-physical System Using Fractal Dimension Based on Higuchi's Algorithm

  • Marwan Albahar
    • International Journal of Computer Science & Network Security
    • /
    • 제23권4호
    • /
    • pp.69-78
    • /
    • 2023
  • With the global rise of digital data, the uncontrolled quantity of data is susceptible to cyber warfare or cyber attacks. Therefore, it is necessary to improve cyber security systems. This research studies the behavior of malicious acts and uses Higuchi Fractal Dimension (HFD), which is a non-linear mathematical method to examine the intricacy of the behavior of these malicious acts and anomalies within the cyber physical system. The HFD algorithm was tested successfully using synthetic time series network data and validated on real-time network data, producing accurate results. It was found that the highest fractal dimension value was computed from the DoS attack time series data. Furthermore, the difference in the HFD values between the DoS attack data and the normal traffic data was the highest. The malicious network data and the non-malicious network data were successfully classified using the Receiver Operating Characteristics (ROC) method in conjunction with a scaling stationary index that helps to boost the ROC technique in classifying normal and malicious traffic. Hence, the suggested methodology may be utilized to rapidly detect the existence of abnormalities in traffic with the aim of further using other methods of cyber-attack detection.

에너지 시스템의 사보타지 표적 인식 기법의 현황 및 전망 (Current Status and Prospect of Techniques for Identification of Sabotage Targets)

  • 김성호;최영;정우식;김길유;양준언
    • 한국에너지공학회:학술대회논문집
    • /
    • 한국에너지공학회 2007년도 추계학술 발표회
    • /
    • pp.288-293
    • /
    • 2007
  • 미국 911 테러 발생 이후로, 국가 기반시설(예: 송/배전 전력망, 석유/가스 파이프라인, 원자력 발전소, 정보통신 시설, 교통 시설, 금융 시설, 매스미디어 시설 등)에 대한 테러리스트의 사보타지 리스크를 관리하는 도전문제에 정부 차원이나, 기업 차원에서 국내외적으로 뜨거운 이목이 집중되고 있다. 그 가운데 에너지 시스템, 특히 원자력 발전소의 물리적 보안은 국가 안보 차원에서 매우 중대한 이슈가 되고 있다. 이는 사보타지로 인한 이러한 시스템의 파손이 국민, 작업자, 또는 외부 환경에 방사성물질 누출과 같은 중대한 결말을 초래할 수 있기 때문이다. 원전과 같은 복잡 시스템에서 설계 기준 위협이 초래할 수 있는 이러한 결말은 그 시스템의 특정 핵심 표적(예: 부품, 구역, 자산, 행위, 인원)의 방호를 통해 효과적으로 방어될 수 있다. 다시 말하면, 표적 인식에서는 어떻게 방어할 것인가에 앞서서 무엇을 방어할 것인가를 다루려는 것이다. 이 연구의 주요 목적은 여태까지 개발된 다양한 표적 인식 기법의 개발 추세를 소개하고 향후 전망을 제시하는 데에 있다. 이를 통해 표적 인식 기법의 수월성, 신뢰성, 및 경제성을 제고할 수 있으리라 본다. 표적 인식 기술의 활용성 측면에서 볼 때, 표적 인식은 하드웨어 적이거나 소프트웨어적인 방호 시스템의 설계에 필수적이므로, 신뢰성 높은 표적 인식은 다음과 같은 긍정적인 파급 효과를 줄일 수 있다: 1) 사보타지 리스크 감소에 직간접적으로 기여할 수 있다; 2) 제한적인 보안 재원을 효율적으로 할당할 수 있다; 3) 보안 대응군대의 훈련 시나리오를 개발할 수 있다; 4) 발전소 규제요건인 안전조치 계획을 비용이나 보안 측면에서 향상시켜 국민 안심(public easiness)을 도모할 수 있다. 향후에는 보다 더 광의적인 복잡 시스템 사이에서 상호 연계적인 사보타지에 대한 표적 인식의 기법들이 점검될 필요성이 있다고 본다.

  • PDF

화학적 테러에 대한 위험성 평가 프로그램 개발 (Development of a Risk Assessment Program for Chemical Terrorism)

  • 이영희;김은용;김진경;문일
    • 한국재난관리표준학회지
    • /
    • 제1권1호
    • /
    • pp.63-67
    • /
    • 2008
  • 본 연구는 위험성 분석 기법을 통해 화학 산업 시설에서 발생 가능한 화학 테러에 대한 원인 을 규명하고, 기존의 테러 대응 방법에 대한 분석 및 평가를 함으로써 효과적 대응 개선 방안을 마련하기 위 한 프로그램 개발이다 테러 위험성 평가 프로그램은 자산 분석(Asset Characterization), 위협 평가(Threat Assessment), 취약성 분석(Vulnerability Analysis), 위험성 평가(Risk Assessment), 대응책 제시(New Countermeasure)의 총 5단계의 순차적 알고리즘으로 구성되어 있다. 개발된 프로그램을 항만에 위치한 석유 저장 및 정제 공정에 적용하여 테러 위험성과 그 원인을 분석함으로써 위험성 평가 프로그램의 효용성과 신뢰성을 검증하였다. 화학 산업 시설에서의 보안 및 테러리즘에 대한 문제성 제기를 통해 그 해결책을 제시하고 테러의 취약점과 원인을 규명함으로써 테러나 재해(extreme event) 발생 시 효과적인 대응책 마련이나 대응 전략 수립에 기여하고자 개발된 프로그램이다.

  • PDF