• 제목/요약/키워드: vulnerability functions

Search Result 108, Processing Time 0.03 seconds

The role of dry land forests for climate change adaptation: the case of Liben Woreda, Southern Oromia, Ethiopia

  • Amanuel, Wondimagegn;Tesfaye, Musse;Worku, Adefires;Seyoum, Gezahegne;Mekonnen, Zenebe
    • Journal of Ecology and Environment
    • /
    • v.43 no.2
    • /
    • pp.85-97
    • /
    • 2019
  • Background: Despite the increasing role of dry forests in climate change adaptation and mitigation, these versatile resources has got less attention in the national and regional planning, their potential to enhance the local and national economy has been overlooked, and their contribution to sustainable environmental management has not been recognized. Hence, the objective of this study was to assess the socioeconomic contribution of dry forests and forest products to climate change adaptation in the Liben Woreda, Southern Oromia region of Ethiopia. Methods: For this study, an integrated qualitative and quantitative approach was used. A total of 74 households from villages in the Bulbul, Boba, and Melka-Guba kebeles were randomly selected for the household survey. Results: Results showed that 75% of the respondents in the area indicated that climate change has become their major sources of vulnerability, where drought has been manifested in the form of crops failure and massive death of livestock particularly cattle species. The main income strategies of the study households include livestock, crop, forests such as gum and resins, firewood and charcoal and non-farm activities such as in the form of petty trade, wage and aid. The average total household income was ETB 11,209.7. Out of this, dry forest income constituted 15% of the total income. In addition to using dry forests as rangeland for livestock, the communities collect wood for construction, fodder, traditional medicine, and forest food both for subsistence and for sale. On the other hand, dry forest products could be considered as less vulnerable, rather resilient livelihood strategies to climate- and environment-related risks compared to livestock and crop production such as in the face of drought periods. More than 48.6% of the households argued that the income generated from dry forests increased substantially due to increment in the level of engagement of family members in forest based income activities. On the other hand, 35.8% of the households responded that livestock production, particularly camels and goats, have been making the livelihood strategies of the respondents more resilient indicating the shift made from grazers browsers to livestock. In general trends show that, the trends of livelihood dependency on dry forest were highly increasing indicating the importance of dry forest income in responsse to frequent droughts. Conclusions: Dry forest income has been becoming crucial livelihood staretgy in response to frequent droughts in the study area and hence, it is important to improve the management of dry forests for livelihood enhancement, while also securing their long-term ecological functions.

Derivation of Flood Hazard Curves for SOC Facilities under Local Intensive Precipitation (LIP(극한강우) 조건하에서 중요 SOC 시설물에 대한 재해도 곡선 작성)

  • Kim, Beom Jin;Han, Kun Yeun*
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.39 no.1
    • /
    • pp.183-194
    • /
    • 2019
  • In recent years, the risk of external flooding of major national facilities has increased significantly since 2000 due to the increase in local heavy rainfall events. For important domestic national facilities, it is necessary to analyze the risk of external flooding as flooding in major sites due to heavy rain can cause functional paralysis in major facilities and ultimately lead to massive trouble events. In order to manage the safety of main facilities and its related facilities at a high level, it is necessary to analyze the degree of disaster such as flood depth, flood flow rate, flood time and flood intensity when extreme floods (LIP) are introduced. In addition, the degree of vulnerability of these related facilities should be assessed and risk assessments should be reassessed through linkage analysis that combines the degree of disaster and vulnerability. By calculating a new flood hazard curve for the flood depth and flood intensity in major national facilities under the heavy rainfall conditions through this study, it is expected to be a basis for the waterproof design of important SOC facilities, flood prevention function design, advancement of flood prevention measures and procedures and evaluation of flood mitigation functions.

Threat Analysis based Software Security Testing for preventing the Attacks to Incapacitate Security Features of Information Security Systems (보안기능의 무력화 공격을 예방하기 위한 위협분석 기반 소프트웨어 보안 테스팅)

  • Kim, Dongjin;Jeong, Youn-Sik;Yun, Gwangyeul;Yoo, Haeyoung;Cho, Seong-Je;Kim, Giyoun;Lee, Jinyoung;Kim, Hong-Geun;Lee, Taeseung;Lim, Jae-Myung;Won, Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1191-1204
    • /
    • 2012
  • As attackers try to paralyze information security systems, many researchers have investigated security testing to analyze vulnerabilities of information security products. Penetration testing, a critical step in the development of any secure product, is the practice of testing a computer systems to find vulnerabilities that an attacker could exploit. Security testing like penetration testing includes gathering information about the target before the test, identifying possible entry points, attempting to break in and reporting back the findings. Therefore, to obtain maximum generality, re-usability and efficiency is very useful for efficient security testing and vulnerability hunting activities. In this paper, we propose a threat analysis based software security testing technique for evaluating that the security functionality of target products provides the properties of self-protection and non-bypassability in order to respond to attacks to incapacitate or bypass the security features of the target products. We conduct a security threat analysis to identify vulnerabilities and establish a testing strategy according to software modules and security features/functions of the target products after threat analysis to improve re-usability and efficiency of software security testing. The proposed technique consists of threat analysis and classification, selection of right strategy for security testing, and security testing. We demonstrate our technique can systematically evaluate the strength of security systems by analyzing case studies and performing security tests.

Implementation of Security Information and Event Management for Realtime Anomaly Detection and Visualization (실시간 이상 행위 탐지 및 시각화 작업을 위한 보안 정보 관리 시스템 구현)

  • Kim, Nam Gyun;Park, Sang Seon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.5
    • /
    • pp.303-314
    • /
    • 2018
  • In the past few years, government agencies and corporations have succumbed to stealthy, tailored cyberattacks designed to exploit vulnerabilities, disrupt operations and steal valuable information. Security Information and Event Management (SIEM) is useful tool for cyberattacks. SIEM solutions are available in the market but they are too expensive and difficult to use. Then we implemented basic SIEM functions to research and development for future security solutions. We focus on collection, aggregation and analysis of real-time logs from host. This tool allows parsing and search of log data for forensics. Beyond just log management it uses intrusion detection and prioritize of security events inform and support alerting to user. We select Elastic Stack to process and visualization of these security informations. Elastic Stack is a very useful tool for finding information from large data, identifying correlations and creating rich visualizations for monitoring. We suggested using vulnerability check results on our SIEM. We have attacked to the host and got real time user activity for monitoring, alerting and security auditing based this security information management.

A Study on Protection Profile for Multi-function Devices (다기능 주변기기에 대한 보호프로파일에 관한 연구)

  • Lee, Dongubm
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1257-1268
    • /
    • 2015
  • Multi-functional devices was originally an equipment performing image processing, but function transmitting image data digitized by combining fax function and function of network are added and it was rapidly developed. Also, functions of internet application, application expansion, remote sharing and image treatment were added to multi-functional devices. But, multi-functional devices can cause security vulnerability such as data exposure, eavesdropping, etc. because of the threatening by network connection. Therefore, common criteria of multi-functional devices are necessary, but there is no protection profile for multi-functional devices now. Therefore, concrete standards of evaluation are not applied to evaluate secure for products, so it was difficult to maintain uniformity of evaluation quality. Therefore, this paper developed protection profile for multi-functional devices based on common criteria of evaluation so as to analyze threats of multi-functional devices and use secure multi-functional devices.

A Simplified Assessment Method and Application for Consideration of Survivability in Spatial Layout Design at the Early Design Stage of Naval Vessels (함정 초기 설계 단계에서 레이아웃 설계 시 생존성을 고려하기 위한 간이 평가 방법과 애플리케이션)

  • Jung, Jin-Uk;Jeong, Yong-Kuk;Ju, SuHeon;Shin, Jong Gye;Kim, JongChul
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.55 no.1
    • /
    • pp.9-21
    • /
    • 2018
  • Survivability of naval vessels is defined as the ability to perform functions and missions in a combat environment. Survivability has close relationship with the spatial layout of naval vessels. In order to maximize survivability, it must be considered from the early stage of design. However the existing concept of survivability was intended to be applied to unit vessels. So it was not suitable for assessment of spatial layout results at the early stage of design. In this paper, a simplified assessment method which can evaluate the spatial layout considering the survivability in the early stage of design has been proposed. For this, assessment layers were defined on survivability components such as susceptibility, vulnerability, and recoverability. Assessment layers of each component were overlapped to deduce a survivability layer of spatial layout alternatives. In addition, the proposed method and optimization algorithm were used to derive optimal spatial layout alternatives considering survivability.

Asymmetrical Volume Loss in Hippocampal Subfield During the Early Stages of Alzheimer Disease: A Cross Sectional Study

  • Kannappan, Balaji
    • Journal of Integrative Natural Science
    • /
    • v.11 no.3
    • /
    • pp.139-147
    • /
    • 2018
  • Hippocampal atrophy is a well-established imaging biomarker of Alzheimer disease (AD). However, hippocampus is a non-homogenous structure with cytoarchitecturally and functionally distinct sub-regions or subfield, with each region performing distinct functions. Certain regions of the subfield have shown selective vulnerability to AD. Here, we are interested in studying the effects of normal aging and mild cognitive impairment on these sub-regional volumes. With a reliable automated segmentation technique, we segmented these subregions of the hippocampus in 101 cognitively normal (CN), 135 early mild cognitive impairment (EMCI), 67 late mild cognitive impairment (LMCI) and 48 AD subjects. Thereby, dividing the hippocampus into hippocampal tail (tail), subiculum (SUB), cornu ammonis 1 (CA1), hippocampal fissure (fissure), presubiculum (PSUB), parasubiculum (ParaSUB), molecular layer (ML), granule cells/molecular layer/dentate gyrus (GCMLDG), cornu ammonis 3(CA3), cornu ammonis 4(CA4), fimbria and hippocampal-amygdala transition area (HATA). In this cross sectional study of 351 ADNI subjects, no differences in terms of age, gender, and years of education were observed among the groups. Though, the groups had statistically significant differences (p < 0.05 after the multiple comparison correction) in the Mini-Mental State Examination (MMSE) scores. There was asymmetrical volume loss in the early stages of AD with the left hemisphere showing volume loss in regions that were unaffected in the right hemisphere. Bilateral parasubiculum, right cornu ammonis 1, 3 and 4, right fimbria and right HATA regions did not show any volume loss till the late MCI stages. Our findings suggest that the hippocampal subfield regions are selectively vulnerable to AD and also that these vulnerabilities are asymmetrical especially during the early stages of AD.

Security Improvements on the Remote User Authentication Scheme Using Smart Cards (스마트카드를 사용한 원격 사용자 인증 스킴의 시큐리티 개선에 관한 연구)

  • Seo, Jeong-Man;An, Young-Hwa
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.3
    • /
    • pp.91-97
    • /
    • 2010
  • Recently Hu-Niu-Yang proposed the user authentication scheme to improve Liu et al's scheme. But the Hu-Niu-Yang's scheme has not been satisfied security requirements considering in the user authentication scheme using the password based smart card. In this paper, we proved that Hu-Niu-Yang's scheme is vulnerable to the off-line password guessing attack in case that the attacker steals the user's smart card and extracts the information in the smart card. Also, the improved user authentication scheme solving the security vulnerability was introduced, thus preventing the attacks, such as password guessing attack, forgery attack impersonation attack, and replay attack. For preventing those attacks, the our proposed scheme need more hash functions and exclusive-OR operations than Hu-Niu-Yang's scheme.

Return Period Estimation of Droughts Using Drought Variables from Standardized Precipitation Index (표준강수지수 시계열의 가뭄특성치를 이용한 가뭄 재현기간 산정)

  • Kwak, Jae Won;Lee, Sung Dae;Kim, Yon Soo;Kim, Hung Soo
    • Journal of Korea Water Resources Association
    • /
    • v.46 no.8
    • /
    • pp.795-805
    • /
    • 2013
  • Drought is one of the severe natural disasters and it can profoundly affect our society and ecosystem. Also, it is a very important variable for water resources planning and management. Therefore, the drought is analyzed in this study to understand the drought distribution and trend. The Standard Precipitation Index (SPI) is estimated using precipitation data obtained from 55 rain gauge stations in South Korea and the SPI based drought variables such as drought duration and drought severity were defined. Drought occurrence and joint probabilistic analysis for SPI based drought variables were performed with run theory and copula functions. And then the return period and spatial distribution of droughts on the South Korea was estimated. As the results, we have shown that Gongju and Chungju in Chungcheong-do and Wonju, Inje, Jeongseon, Taebeak in Gangwon-do have vulnerability to droughts.

Seismic Fragilities of Bridges and Transmission Towers Considering Recorded Ground Motions in South Korea (한국의 지반거동을 고려한 교량과 송전철탑의 지진취약도 분석)

  • Park, Hyo Sang;Nguyen, Duy-Duan;Lee, Tae-Hyung
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.20 no.7_spc
    • /
    • pp.435-441
    • /
    • 2016
  • The Korean peninsula has known as a minor-to-moderate seismic region. However, some recent studies had shown that the maximum possible earthquake magnitude in the region is approximately 6.3-6.5. Therefore, a seismic vulnerability assessment of the existing infrastructures considering ground motions in Korea is necessary. In this study, we developed seismic fragility curves for a continuous steel box girder bridge and two typical transmission towers, in which a set of seven artificial and natural ground motions recorded in South Korea is used. A finite element simulation framework, OpenSees, is utilized to perform nonlinear time history analyses of the bridge and a commercial software, SAP2000, is used to perform time history analyses of the transmission towers. The fragility curves based on Korean ground motions were then compared with the fragility curves generated using worldwide ground motions to evaluate the effect of the two ground motion groups on the seismic fragility curves of the structures. The results show that both non-isolated and base-isolated bridges are less vulnerable to the Korean ground motions than to worldwide earthquakes. Similarly to the bridge case, the transmission towers are safer during Korean motions than that under worldwide earthquakes in terms of fragility functions.