• Title/Summary/Keyword: vulnerability factor

Search Result 181, Processing Time 0.032 seconds

Moment-rotational analysis of soil during mining induced ground movements by hybrid machine learning assisted quantification models of ELM-SVM

  • Dai, Bibo;Xu, Zhijun;Zeng, Jie;Zandi, Yousef;Rahimi, Abouzar;Pourkhorshidi, Sara;Khadimallah, Mohamed Amine;Zhao, Xingdong;El-Arab, Islam Ezz
    • Steel and Composite Structures
    • /
    • v.41 no.6
    • /
    • pp.831-850
    • /
    • 2021
  • Surface subsidence caused by mining subsidence has an impact on neighboring structures and utilities. In other words, subsurface voids created by mining or tunneling activities induce soil movement, exposing buildings to physical and/or functional destruction. Soil-structure is evaluated employing probability distribution laws to account for their uncertainty and complexity to estimate structural vulnerability. In this study, to investigate the displacement field and surface settlement profile caused by mining subsidence, on the basis of a Winklersoil model, analytical equations for the moment-rotation response ofsoil during mining induced ground movements are developed. To define the full static moment-rotation response, an equation for the uplift-yield state is constructed and integrated with equations for the uplift- and yield-only conditions. The constructed model's findings reveal that the inverse of the factor of safety (x) has a considerable influence on the moment-rotation curve. The maximal moment-rotation response of the footing is defined by X = 0:6. Despite the use of Winkler model, the computed moment-rotation response results derived from the literature were analyzed through the ELM-SVM hybrid of Extreme Learning Machine (ELM) and Support Vector Machine (SVM). Also, Monte Carlo simulations are used to apply continuous random parameters to assess the transmission of ground motions to structures. Following the findings of RMSE and R2, the results show that the choice of probabilistic laws of input parameters has a substantial impact on the outcome of analysis performed.

Estimation of Road Sections Vulnerable to Black Ice Using Road Surface Temperatures Obtained by a Mobile Road Weather Observation Vehicle (도로기상차량으로 관측한 노면온도자료를 이용한 도로살얼음 취약 구간 산정)

  • Park, Moon-Soo;Kang, Minsoo;Kim, Sang-Heon;Jung, Hyun-Chae;Jang, Seong-Been;You, Dong-Gill;Ryu, Seong-Hyen
    • Atmosphere
    • /
    • v.31 no.5
    • /
    • pp.525-537
    • /
    • 2021
  • Black ices on road surfaces in winter tend to cause severe and terrible accidents. It is very difficult to detect black ice events in advance due to their localities as well as sensitivities to surface and upper meteorological variables. This study develops a methodology to detect the road sections vulnerable to black ice with the use of road surface temperature data obtained from a mobile road weather observation vehicle. The 7 experiments were conducted on the route from Nam-Wonju IC to Nam-Andong IC (132.5 km) on the Jungang Expressway during the period from December 2020 to February 2021. Firstly, temporal road surface temperature data were converted to the spatial data with a 50 m resolution. Then, the spatial road surface temperature was normalized with zero mean and one standard deviation using a simple normalization, a linear de-trend and normalization, and a low-pass filter and normalization. The resulting road thermal map was calculated in terms of road surface temperature differences. A road ice index was suggested using the normalized road temperatures and their horizontal differences. Road sections vulnerable to black ice were derived from road ice indices and verified with respect to road geometry and sky view, etc. It was found that black ice could occur not only over bridges, but also roads with a low sky view factor. These results are expected to be applicable to the alarm service for black ice to drivers.

A Study on the Architectural Planning of the Refuge Areas in Geriatric Hospitals Considering Horizontal Evacuation of the Elderly (노인요양병원에서 고령자의 수평 피난을 고려한 대피공간의 건축계획에 관한 연구)

  • Kim, Mijung;Kweon, Jihoon
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.29 no.3
    • /
    • pp.7-15
    • /
    • 2023
  • Purpose: This study was conducted with the aim of presenting spatial planning directions for evacuation spaces based on an analysis of the performance of horizontal evacuation during the early stages of fire incidents in a geriatric hospital. Methods: Based on a review of previous studies, the research model was designed by establishing occupancy conditions, evacuation, and fire scenarios. The analysis model was developed by considering vulnerable areas in terms of evacuation movement and analyzing the results of evacuation performance. Furthermore, the study analyzed the improvement in evacuation performance by arranging refuge areas. Results: The results of the study are as follows. Firstly, vulnerability spots were identified in terms of evacuation performance by schematizing Required Safe Egress Time, Available Safe Egress Time, and their differences. Secondly, the Required Safe Egress Time in the adjacent public spaces along the escape routes of occupants was found to be higher compared to the Available Safe Egress Time. Thirdly, the results of the correlation analysis between the difference in Available Safe Egress Time and Required Safe Egress Time during the early stages of a fire, as well as their constituent factors, demonstrated that user congestion is a more significant factor in compromising evacuation safety than the physical changes in the fire condition. Fourthly, the analysis of evacuation time was conducted by designating refuge areas where occupants can evacuate within a sufficient timeframe. This led to a decrease in the Required Safe Egress Time. Implications: This study is expected to be used as data on the direction of evacuation space planning to improve the evacuation performance of Geriatric Hospital.

An Analysis of Factors Affecting Medical Operating Income at Regional Public Hospital (지방의료원 의료이익에 대한 영향요인 분석)

  • Jin Won Noh;Jeong Hoe Kim;Hui Won Jeon;Jeong Ha Kim;Hyo Jung Bang;Hae Jong Lee
    • Health Policy and Management
    • /
    • v.33 no.1
    • /
    • pp.55-64
    • /
    • 2023
  • Background: Despite the various activities of the regional public hospitals, discussions are being made as to whether or not to continue due to the issue of financial deficit. Therefore, the main factors affecting the fiscal deficit were analyzed with 10-year data. Methods: This study is a panel analysis that analyzed the characteristics of 34 regional public hospitals and influencing factors on medical benefits for 10 years from 2010 to 2019. First, we analyze the determinants of medically vulnerable areas set by the government, analyze the trend of medical profit per 100 beds and medical profit rate from 2010 to 2019, and identify the factors that affect them. Results: Differences in medical profit per 100 beds and medical profit-to-medical profit rate were caused by market share representing regional characteristics, and both indicators improved as the number of outpatients increased. The important influencing variables are the number of doctors and nurses, and both indicators improve when there are specialists, but medical benefits decrease as the number of doctors increases when judged by the number of people per 100 beds. In addition, the number of nurses per 100 beds does not contribute to medical profit and has a negative effect on the medical profit ratio. Conclusion: As only regional characteristics were taken into account for medically vulnerable areas, operational characteristics need to be considered. The greatest impact on the finances of local medical centers is the proper staffing of doctors and nurses, and their efficient arrangement is the most important factor in financial stability.

The development of the seismic fragility curves of existing bridges in Indonesia (Case study: DKI Jakarta)

  • Veby Citra Simanjuntak;Iswandi Imran;Muslinang Moestopo;Herlien D. Setio
    • Structural Monitoring and Maintenance
    • /
    • v.10 no.1
    • /
    • pp.87-105
    • /
    • 2023
  • Seismic regulations have been updated from time to time to accommodate an increase in seismic hazards. Comparison of seismic fragility of the existing bridges in Indonesia from different historical periods since the era before 1990 will be the basis for seismic assessment of the bridge stock in Indonesia, most of which are located in earthquake-prone areas, especially those built many years ago with outdated regulations. In this study, seismic fragility curves were developed using incremental non-linear time history analysis and more holistically according to the actual strength of concrete and steel material in Indonesia to determine the uncertainty factor of structural capacity, βc. From the research that has been carried out, based on the current seismic load in SNI 2833:2016/Seismic Map 2017 (7% probability of exceedance in 75 years), the performance level of the bridge in the era before SNI 2833:2016 was Operational-Life Safety whereas the performance level of the bridge designed with SNI 2833:2016 was Elastic - Operational. The potential for more severe damage occurs in greater earthquake intensity. Collapse condition occurs at As = FPGA x PGA value of bridge Era I = 0.93 g; Era II = 1.03 g; Era III = 1.22 g; Era IV = 1.54 g. Furthermore, the fragility analysis was also developed with geometric variations in the same bridge class to see the effect of these variations on the fragility, which is the basis for making bridge risk maps in Indonesia.

Flexural Behaviors of GFRP Rebars Reinforced Concrete Beam under Accelerated Aging Environments (GFRP Rebar 보강 콘크리트 보의 급속노화환경에서의 휨 거동에 관한 연구)

  • Park, Yeon-Ho;Choi, Yeol
    • Journal of the Korea Concrete Institute
    • /
    • v.25 no.2
    • /
    • pp.137-144
    • /
    • 2013
  • The use of fiber-reinforced polymer (FRP) reinforcing bars in concrete structures has been increased as an alternative of steel reinforcement which has shown greater vulnerability to corrosion problem. However, the long-term performance of concrete members with FRP reinforcement is still questioned in comparison to the used of steel reinforcement. This study presents the results of an experimental study on the long-term behaviors of GFRP (glass fiber reinforced polymer) bar reinforced concrete beams after exposed to accelerated aging in an environmental chamber with temperature of $46^{\circ}C$ ($115^{\circ}F$) and 80% of relative humidity up to 300 days. The objectives of this research was to compare strength degradation and change of ductility between GFRP reinforced concrete beams and steel reinforcement beams after accelerated aging. Two types (wrapped and sand-coated surface) of GFRP bars and steel were reinforced. in concrete beams. Test results show that the failure modes of GFRP bar reinforced concrete beams are very similar with traditional RC beams, and the change of load-carrying capacity of steel reinforcing concrete beam is greater than that of GFRP bar reinforcing concrete beam under the accelerated aging. Test result also shows that the use of GFRP reinforcing in concrete could be introduced more brittle failure than that of steel reinforcing for practical application. The deformability factor up to compression failures indicates no significant variation before and after exposure of accelerated aging.

Dimensionality of emotion suppression and psychosocial adaptation: Based on the cognitive process model of emotion processing (정서 처리의 인지 평가모델을 기반으로 한 정서 억제의 차원성과 심리 사회적 적응)

  • Woo, Sungbum
    • Korean Journal of Culture and Social Issue
    • /
    • v.27 no.4
    • /
    • pp.475-503
    • /
    • 2021
  • The purpose of this study is to clarify the constructs of emotion suppression and help understanding on the multidimensional nature of emotion suppression by classifying constructs for suppression according to the KMW model. Also, this study examined the gender differences of emotion suppression. For this purpose, 657 adult male and female subjects were evaluated for attitude toward emotions, and difficulty in emotional regulation, as well as depression, state anger and daily stress scale. As a result of the exploratory factor analysis on the scales related to the emotion suppression factors, the emotion suppression factors corresponding to each stage of the KMW model were found to be 'distraction against emotional information, 'difficulty in understanding and interpretation of emotions', 'emotion control beliefs', 'vulnerability on emotional expression beliefs'. Next, the study participants were classified by performing a cluster analysis based on each emotion suppression factor. As a result, four clusters were extracted and named 'emotional control belief cluster', 'emotional expression cluster', 'emotional attention failure cluster', and 'general emotional suppression cluster'. As a result of examining the average difference of male depression, depression, state anger, and daily stress for each group, significant differences were found in all dependent variables. As a result of examining whether there is a difference in the frequency of emotional suppression clusters according to gender, the frequency of emotional suppression clusters was high in men, and the ratio of emotional expression clusters was high in women. Finally, it was analyzed whether there was a gender difference in the effect of the emotional suppression cluster on psychosocial adaptation, and the implications were discussed based on the results of this study.

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.

A Study on the Optimization Methods of Security Risk Analysis and Management (경비위험 분석 및 관리의 최적화 방안에 관한 연구)

  • Lee, Doo-Suck
    • Korean Security Journal
    • /
    • no.10
    • /
    • pp.189-213
    • /
    • 2005
  • Risk management should be controlled systematically by effectively evaluating and suggesting countermeasures against the various risks which are followed by the change of the society and environment. These days, enterprise risk management became a new trend in the field. The first step in risk analysis is to recognize the risk factors, that is to verify the vulnerabilities of loss in the security facilities. The second step is to consider the probability of loss in assessing the risk factors. And the third step is to evaluate the criticality of loss. The security manager will determine the assessment grades and then the risk levels of each risk factor, on the basis of the result of risk analysis which includes the assessment of vulnerability, the provability of loss and the criticality. It is of great importance to put the result of risk analysis in mathematical statement for a scientific approach to risk management. Using the risk levels gained from the risk analysis, the security manager can develop a comprehensive and supplementary security plan. In planning the risk management measures to prepare against and minimize the loss, insurance is one of the best loss-prevention programs. However, insurance in and of itself is no longer able to meet the security challenges faced by major corporations. The security manager have to consider the cost-effectiveness, to suggest the productive risk management alternatives by using the security files which contains every information about the security matters. Also he/she have to reinforce the company regulations on security and safety, and to execute education repeatedly on security and risk management. Risk management makes the most efficient before-the-loss arrangement for and after-the-loss continuation of a business. So it is very much important to suggest a best cost-effective and realistic alternatives for optimizing risk management above all, and this function should by maintained and developed continuously and repeatedly.

  • PDF

Research on the Leadership Types in Italian Restaurants (이태리 레스토랑 종사자들의 리더십 유형에 관한 연구)

  • Yim, Seoung-Bean;Kim, Pan-Jin
    • Journal of Distribution Science
    • /
    • v.10 no.12
    • /
    • pp.35-43
    • /
    • 2012
  • Purpose - This study analyzes the effects of types of leadership on the employees of Italian restaurants, its efficacy, and organizational citizenship behavior, utilizing a causal assessment model. In this study, independent variables such as the type of leadership perceived in the manager or chef by an Italian restaurant's employees, and its efficacy were parameters, and the organizational citizenship behavior and organizational effectiveness were the variables representing the results in the hypothesis. The study aimed to draw implications by verifying the leadership via efficacy and the impact on organizational citizenship behavior of Italian restaurants. Research design, data, methodology - For the purpose of this analysis, specific questionnaire items were configured according to the theory and efficacy of the study. From a questionnaire used in organizational citizenship behavior comprising 22 questions, six were modified to suit the research purpose of this study. The configured questionnaire comprised 5 parts and 40 items. A Likert (Likert) 5-point scale was utilized to measure responses to the questionnaire items from the employees of an Italian restaurant in Seoul who participated in the survey. For data collection, 400 questionnaires were distributed, and 344 collected. Factor analysis and reliability verification were conducted using SPSS18.0 and AMOS18.0. A covariance structure analysis was conducted to test the research hypotheses. Results - Based on the results of the analyses, the summary and suggested implications of the research are as follows: The covariance structure analysis used to analyze the kind of effect transformational and transactional leadership styles in Italian restaurant employees had on self-efficacy, group-efficacy, and organizational citizenship behavior, indicated that among the characteristics of transformational leadership (such as, idealized influence, inspirational motivation, individual consideration, and intellectual stimulation), idealized influence and individual consideration had a positive influence on self-efficacy. Idealized influence, individual consideration, conditional reward, and management by exception also positively influenced self-efficacy and altruistic and conscientious behavior (organizational citizenship behavior). Conclusions - Results suggest that with regard to self-efficacy and group efficacy, managers in different departments and chefs should provide team members with a vision for the future, increase their confidence in their abilities, and build their trust in the organization. By evaluating employee performance and experiences, management can demonstrate leadership and encourage organizational citizenship behavior through enjoyable, voluntary participation. Transformational and transactional leadership is effective in group processes that include social-exchange relationships, self-efficacy and group efficacy, and organizational citizenship behavior. However, as this research study utilizes only self-reported data, it has several limitations, such as a vulnerability of errors caused by the various experiment types. A significant limitation of this study is the lack of potential for the duplication of results. The covariance structure analysis, however, provides complementation to limit the impact of errors from self-reporting studies. A future study can extend this research by utilizing different data collection methods.

  • PDF