• Title/Summary/Keyword: Data Logging

Search Result 306, Processing Time 0.026 seconds

Assessment of CO2 Geological Storage Capacity for Basalt Flow Structure around PZ-1 Exploration Well in the Southern Continental Shelf of Korea (남해 대륙붕 PZ-1 시추공 주변 현무암 대지 구조의 CO2 지중저장용량 평가)

  • Shin, Seung Yong;Kang, Moohee;Shinn, Young Jae;Cheong, Snons
    • Economic and Environmental Geology
    • /
    • v.53 no.1
    • /
    • pp.33-43
    • /
    • 2020
  • CO2 geological storage is currently considered as the most stable and effective technology for greenhouse gas reduction. The saline formations for CO2 geological storage are generally located at a depth of more than 800 m where CO2 can be stored in a supercritical state, and an extensive impermeable cap rock that prevents CO2 leakage to the surface should be distributed above the saline formations. Trough analysis of seismic and well data, we identified the basalt flow structure for potential CO2 storage where saline formation is overlain by basalt cap rock around PZ-1 exploration well in the Southern Continental Shelf of Korea. To evaluate CO2 storage capacity of the saline formation, total porosity and CO2 density are calculated based on well logging data of PZ-1 well. We constructed a 3D geological grid model with a certain size in the x, y and z axis directions for volume estimates of the saline formation, and performed a property modeling to assign total porosity to the geological grid. The estimated average CO2 geological storage capacity evaluated by the U.S. DOE method for the saline formation covered by the basalt cap rock is 84.17 Mt of CO2(ranges from 42.07 to 143.79 Mt of CO2).

Study of Geological Log Database for Public Wells, Jeju Island (제주도 공공 관정 지질주상도 DB 구축 소개)

  • Pak, Song-Hyon;Koh, Giwon;Park, Junbeom;Moon, Dukchul;Yoon, Woo Seok
    • Economic and Environmental Geology
    • /
    • v.48 no.6
    • /
    • pp.509-523
    • /
    • 2015
  • This study introduces newly implemented geological well logs database for Jeju public water wells, built for a research project focusing on integrated hydrogeology database of Jeju Island. A detailed analysis of the existing 1,200 Jeju Island geological logs for the public wells developed since 1970 revealed six major indications to be improved for their use in Jeju geological logs DB construction: (1) lack of uniformity in rock name classification, (2) poor definitions of pyroclastic deposits and sand and gravel layers, (3) lack of well borehole aquifer information, (4) lack of information on well screen installation in many water wells, (5) differences by person in geological logging descriptions. A new Jeju geological logs DB enabling standardized input and output formats has been implemented to overcome the above indications by reestablishing the names of Jeju volcanic and sedimentary rocks and utilizing a commercial, database-based input structured, geological log program. The newly designed database structure in geological log program enables users to store a large number of geology, well drilling, and test data at the standardized DB input structure. Also, well borehole groundwater and aquifer test data can be easily added without modifying the existing database structure. Thus, the newly implemented geological logs DB could be a standardized DB for a large number of Jeju existing public wells and new wells to be developed in the future at Jeju Island. Also, the new geological logs DB will be a basis for ongoing project 'Developing GIS-based integrated interpretation system for Jeju Island hydrogeology'.

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.

Hand-Arm Vibration and Noise Levels of Double-Hammer Type and Oil-Pulse Type Impact Wrenches in Automobile Assembly Lines (자동차 조립라인에서 이중-헴머형(Double-hammer type) 임펙트 렌치와 오일-펄스형(Oil-pulse type)임펙트 렌치 에어공구의 국소진동가속도 및 소음수준)

  • Jeung, Jae-Yeal;Kim, Jung-Man
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.5 no.2
    • /
    • pp.147-159
    • /
    • 1995
  • This study was conducted to introduce fundamental data of hand-arm vibration and noise exposure levels with impact wrenches(double-hammer impact wrenches and oil-pulse impact wrenches) used in automobile assembly lines considering the process variables and tool variables. In studing, products per day, required time screwing the bolts or nuts per bolts or nut were considered as process variables, and capacity of bolts or nuts, air consumptions per minute, tool weights, RPM were considered as tool variables. Hand-arm vibration levels of 3 axis in each hand were measured using the instruments compling with ISO/DIS 5349 and noise levels were measured using a noise logging dosimeter. The results were as follows : 1. Required time to screwing the bolt or nut by oil-pulse impact wrenches is shorter than double-hammer impact wrenches but total daily exposure time of oil-pulse impact wrenches was higher than double-hammer impact wrenches because the number of bolts or nuts per cycle was many. 2. Oil-pulse impact wrenches have been used to screwing the large bolt or nut in comparing with double-hammer impact wrenches and required time to screwing the bolts or nuts were shorter than double-hammer impact wrenches because oil-pulse impact wrenches were using high RPM and large air consumption per minute. Noise level of oil-pulse impact wrenches was 8 dB(A) lower than double-hammer impact wrenches. 3. Dominant hand-arm vibration levels of double-hammer impact wrenches in each hand were $8.24m/sec^2$ of Zh axis in right hand and $9.60m/sec^2$ of Xh axis in left hand. Dominant hand-arm vibration level of oil-pulse impact wrenches in each hand was $2.59m/sec^2$ of Xh axis in right hand and $3.23m/sec^2$ of Yh axis in left hand. 4. In double-hammer impact wrenches, corresponding hand-arm vibration levels of Xh, Yh, Zh axis in left hand were higher than hand-arm vibration levels of right hand in 3 axis. In oil-pulse impact wrenches, Xh axis of right, Yh axis of left, Zh axis of left were higher than the corresponding hand-arm vibration levels of Xh, Yh, Zh axis in right and left hand. 5. Correlation coefficients among Xh, Yh. Zh axis of right and left hand hand-arm vibration levels in double-hammer impact wrenches and oil-pulse impact wrenches were commonly high in Yh axis and correlation coefficients of Yh axis in double-hammer impact wrenches and oil-pulse impact wrenches were 0.76 and 0.86,respectively. 6. As a measure repetitiveness, plotting total daily exposure time with the number of bolts or nut per cycle, direct correlation was shown between repetitiveness and hand-arn vibration exposure, and correlation coefficient between the number of bolts or nut per cycle and total daily exposure time in double-hammer impact wrenches, oil-pulse impact wrenches were 0.84 and 0.50, respectively. 7. Considering the total acceleration level and tool variables in double-hammer impact wrenches and oil-pulse impact wrenches, air consumption in right hand, and bolt or nut capacity in left hand were commonly the variable that explainability was high. Considering the noise and tool variables in double-hammer impact wrenches and oil-pulse impact wrenches, air consumption per minute was commonly the variable that explainability was high.

  • PDF

Stability Analysis of Open Pit Slopes in the Pasir Coal Field, Indonesia (인도네시아 Pasir 탄전에서의 노천채탄장 사면의 안전성해석)

  • 정소걸;선우춘;한공창;신희순;박연준
    • Proceedings of the Korean Society for Rock Mechanics Conference
    • /
    • 2000.09a
    • /
    • pp.183-193
    • /
    • 2000
  • A series of studies such as geological logging data analysis, detailed geological survey, rock mass evaluation, in-situ and laboratory tests, rock strength and mechanical properties of the rock were concerned. The stability of the slope were carried out inorder to design the pit slope and individual benches using the stereographic projection analysis and numerical methods in Roto Pit of Pasir coal fetid. The bedding plane was one of the major discontinuities in the Roto Pit and the dip of which is about $60^{\circ}$in the northern part and $83^{\circ}$in the southern part. The dip of bedding becomes steeper from north to south. The plane and toppling failures are presented in many slopes. In laboratory test the average uniaxial compressive strength of mudstone was 9 MPa and that of weak sandstone was 10 MPa. In-situ test showed that the rocks of Roto north mining area are mostly weak enough to be classified in grade from R2(weak) to R3(medium strong weak) and the coal is classified in grades from R1(Very weak) to R2(Weak). The detailed stability analysis were carried out on 4 areas of Roto north(east, west, south and north), and 2 areas of Roto south(east and west). In this paper, the minimum factor of safety was set to 1.2 which is a general criterion for open pit mines. Using the stereographic projection analysis and the limit equilibrium method, slope angles were calculated as 30~$36^{\circ}$for a factor of safety greater than 1.2. Then these results were re-evaluated by numerical analysis using FLAC. The final slope angles were determined by rational described abode. A final slope of 34 degrees can guarantee the stability for the eastern part of the Roto north area, 33 degrees for the western part, 35 degrees for the northern part and 35 degrees for the southern part. For the Roto south area, 36 degrees was suggested for both sides of the pit. Once the pit slope is designed based on the stability analysis and the safety measures. the stability of 니ope should be checked periodically during the mining operations. Because the slope face will be exposed long time to the rain fall, a study such aspreventive measures against weathering and erosion is highly recommended to be implemented.

  • PDF

Stability Analysis of Open Pit Slopes in the Pasir Coal Field, Indonesia (인도네시아 Pasir 탄전에서의 노천채탄장 사면의 안정성 해석)

  • 정소걸;선우춘;한공창;신희순;박연준
    • Tunnel and Underground Space
    • /
    • v.10 no.3
    • /
    • pp.430-440
    • /
    • 2000
  • A series of studies such as geological logging data analysis, detailed geological survey, rock mass evaluation, in-situ and laboratory tests, rock strength and mechanical properties of the rock were concerned. The stability of the slope were carried out inorder to design the pit slope and individual benches using the stereographic projection analysis and numerical methods in Roto Pit of Pasir coal field. The bedding plane was one of the major discontinuities in the Roto Pit and the dip of which is about 60$^{\circ}$ in the northern part and 83$^{\circ}$ in the southern part. The dip of bedding becomes steeper from north to south. The plane and toppling failures are presented in many slopes. In laboratory test the average uniaxial compressive strength of mudstone was 9MPa and that of weak sandstone was 10MPa. In-situ test showed that the rocks of Roto north mining area are mostly weak enough to be classified in grade from R2(weak) to R3(medium strong weak) and the coal is classified in grades from R1(Very weak) to R2(Weak). The detailed stability analysis were carried out on 4 areas of Roto north (east, west, south and north), and 2 areas of Roto south(east and west). In this paper, the minimum factor of safety was set to 1.2 which is a general criterion for open pit mines. Using the stereographic projection analysis and the limit equilibrium method, slope angles were calculated as 30∼36$^{\circ}$ for a factor of safety greater than 1.2. Then these results were re-evaluated by numerical analysis using FLAC. The final slope angles were determined by rational described above. A final slope of 34 degrees can guarantee the stability for the eastern part of the Roto north area, 33 degrees for the western part, 35 degrees for the northern part and 35 degrees for the southern part. For the Roto south area, 36 degrees was suggested for both sides of the pit. Once the pit slope is designed based on the stability analysis and the safety measures, the stability of slope should be checked periodically during the mining operations. Because the slope face will be exposed long time to the rain fall, a study such aspreventive measures against weathering and erosion is highly recommended to be implemented.

  • PDF