• Title/Summary/Keyword: Logging System

Search Result 279, Processing Time 0.023 seconds

Electrical Resistivity Imaging for Upper Layer of Shield TBM Tunnel Ceiling (쉴드 TBM터널 상부 지반 연약대 전기탐사)

  • Jung, Hyun-Key;Park, Chul-Hwan
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2005.03a
    • /
    • pp.401-408
    • /
    • 2005
  • Recently shield TBM tunnellings are being applied to subway construction in Korean cities. Generally these kinds of tunnellings have the problems in the stability of ground such as subsidence because urban subway is constructed in the shallow depth. A sinkhole occurred on the road just above the tunnel during tunneling in Kwangju, so a survey for upper layer of the tunnel was needed. But conventional Ground Probing Radar can't be applicable due to the presence of steel-mesh screen in the shield segment, so no existent geophysical method is applicable in this site. Because the outer surface of each shield segment is electrically insulated, dipole-dipole resistivity method which is popular in engineering site investigation, was tried to this survey for the first time. Specially manufactured flexible ring-type electrodes were installed into the grouting holes at an interval of 2.4 m on the ceiling. The K-Ohm II system which has been developed by KIGAM and tested successfully in many sites, was used in this site. The system consists of 1000Volt-1Ampere constant-current transmitter, optically isolated 24 bit sigma-delta A/D conversion receiver - maximum 12 channel simultaneous measurements, and graphical automatic acquisition software for easy data quality check in real time. Borehole camera logging with circular white LED lighting was also done to investigate the state of the layer. Measured resistivity data lack of some stations due to failing opening lids of holes, shows general high-low trend well. The dipole-dipole resistivity inversion results discriminate (1) one approximately 4 meter diameter cavity (grouted but incompletely hardened, so low resistivity - less than $30{\Omega}m$), (2) weak zone (100-200${\Omega}m$), and (3) hard zone (high resistivity - more than 1000${\Omega}m$) very well for the distance of 320 meters. The 2-D inversion neglects slight absolute 3-D effect, but we can get satisfactory and useful information. Acquired resistivity section and video tapes by borehole camera logging will be reserved and reused if some problem occurs in this site in the future.

  • PDF

Relationship between Dynamic Elastic Modulus and Lithology using Borehole Prospecting (시추공 물리탐사를 이용한 동탄성계수와 암상과의 상관성 분석)

  • Park, Chung-Hwa;Song, Moo-Young;Park, Jong-Oh
    • Journal of the Korean earth science society
    • /
    • v.23 no.6
    • /
    • pp.507-513
    • /
    • 2002
  • To delineate the relationship between dynamic elastic modulus and lithologies, suspension PS logging was applied to Yuseong granite, Paldang banded gneiss, and Sabuk sedimentary rock. P and S wave velocities were also measured for these lithologies. In addition, uniaxial strength and Poisson’s ratio were measured in a laboratory for Yuseong granite and Paldang banded gneiss. In laboratory measurements, P and S wave velocities in Paldang banded gneiss were higher than those in Yuseong granite whereas Poisson’s ratio in Paldang banded gneiss was lower than that in Yuseong granite. This implies that P and S wave velocities correlate reversely with Poisson’s ratio. The dynamic Young modulus obtained from suspension PS logging was high compared to the dynamic bulk modulus and the dynamic shear modulus.

Software Engineering Meets Network Engineering: Conceptual Model for Events Monitoring and Logging

  • Al-Fedaghi, Sabah;Behbehani, Bader
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.9-20
    • /
    • 2021
  • Abstraction applied in computer networking hides network details behind a well-defined representation by building a model that captures an essential aspect of the network system. Two current methods of representation are available, one based on graph theory, where a network node is reduced to a point in a graph, and the other the use of non-methodological iconic depictions such as human heads, walls, towers or computer racks. In this paper, we adopt an abstract representation methodology, the thinging machine (TM), proposed in software engineering to model computer networks. TM defines a single coherent network architecture and topology that is constituted from only five generic actions with two types of arrows. Without loss of generality, this paper applies TM to model the area of network monitoring in packet-mode transmission. Complex network documents are difficult to maintain and are not guaranteed to mirror actual situations. Network monitoring is constant monitoring for and alerting of malfunctions, failures, stoppages or suspicious activities in a network system. Current monitoring systems are built on ad hoc descriptions that lack systemization. The TM model of monitoring presents a theoretical foundation integrated with events and behavior descriptions. To investigate TM modeling's feasibility, we apply it to an existing computer network in a Kuwaiti enterprise to create an integrated network system that includes hardware, software and communication facilities. The final specifications point to TM modeling's viability in the computer networking field.

A Study on Daemon Process Protection System Using Linux Based Resource Access Control Module(LPM) (리눅스 기반 자원 접근제어 모듈(LPM)을 이용한 데몬 프로세스 보호 시스템에 관한 연구)

  • 나형준;이병호
    • Proceedings of the IEEK Conference
    • /
    • 2003.07d
    • /
    • pp.1593-1596
    • /
    • 2003
  • In this paper, we propose mechanism of system call control, monitor, and manage by user level, and for this purpose we propose the mechanism using system call intercept and a logging system. Proposed mechanism is more convenient in that there is no necessity for modification of linux source code, so general users can actively apply and modify. As an application model for the mechanism, we can explain for the Daemon Process Protection System which can have a complete control on system daemon processes.

  • PDF

The Evaluations of Fish Survival Rate and Fish Movements using the Tagging Monitoring Approach of Passive Integrated Transponders (PIT) (수동형 전자발신장치(Passive Integrated Transponder, PIT) 모니터링 기법 적용에 따른 어종별 생존율 평가 및 어도에서 어류이동성 평가)

  • Choi, Ji-Woong;An, Kwang-Guk
    • Journal of Environmental Science International
    • /
    • v.23 no.8
    • /
    • pp.1495-1505
    • /
    • 2014
  • The objective of this study was to evaluate survival rate and fish movement (migration) using a tagging approach of passive integrated transponder (PIT) in Juksan Weir, which was constructed as a four major river restoration projects. For this study, survival rates of each fish species and the mobility of fish individuals were analyzed during 2 weeks by the insertion of PIT tags to various fish species in the laboratory. According to tagging tests in the laboratory, the survival rate 37.5% (30 survivals of 80 individuals) after the insertion of PIT tags. The survival rate of Carassius auratus and Hemibarbus labeo was 100% and 80% after the insertion of the tags, respectively, whereas it was only 13.3% for Zacco platypus. In the field experiments of Juksan Weir, 6 species and 157 individuals from 8 species (563 individuals) were detected in the fixed automatic data-logging system, indicating a detection rate of 27.9% in the fishway of Juksan Weir. In the meantime, some species with no or low detection rates in the fixed automatic data-logging system were turn out to be stagnant-type species, which prefer stagnant or standing water to live.

Televiewer에서 관찰되는 단열특성과 수리전도도와의 상관관계 분석

  • Park Gyeong-U;Bae Dae-Seok;Kim Gyeong-Su;Go Yong-Gwon
    • Proceedings of the Korean Society of Soil and Groundwater Environment Conference
    • /
    • 2005.04a
    • /
    • pp.284-287
    • /
    • 2005
  • The flow of groundwater in fractured medium is related to the geometric characteristics of the fracture system. And a fracture aperture and a fracture density are considered as important factor concerning the permeability. Data acquisition of the properties of fracture such as aperture and density is so difficult and has uncertainty. We also cannot know the fracture characteristics through the in-situ tests. We usually obtain the fracture information from a ultrasonic scan logging or borehole television indirectly. Using the deduced results, we can make the fracture system and simulate the groundwater flow and solute transport in the crystalline rock. This study aimed to analyze the correlation between the properties of fracture and hydraulic conductivities obtained at the same interval. The properties of fracture are examined by acoustic televiwer and hydraulic conductivities are obtained by constant Pressure injection test. The distributioin of fracture width and fracture frequency shows the log-normal probability plot. And, Results of correlation analysis explain that opened type fractures have proper relation with hydraulic conductivity. But, as though there are semi-opened type fractures or closed type fractures, those have the permeable structure.

  • PDF

DDoS Attack Application Detection Method with Android Logging System (안드로이드 로깅 시스템을 이용한 DDoS 공격 애플리케이션 탐지 기법)

  • Choi, Seul-Ki;Hong, Min;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1215-1224
    • /
    • 2014
  • Various research was done to protect user's private data from malicious application which expose user's private data and abuse exposed data. However, a new type of malicious application were appeared. And these malicious applications use a smart phone as a new tools to perform secondary attack. Therefore, in this paper, we propose a method to detect the DDoS attack application installed inside the mobile device using the Android logging system.

A Study on System Tracing User Activities in the Windows Operating System (윈도우 운영체제 상의 사용자 행위 추적에 관한 연구)

  • Jung, Chang-Sung;Kim, Young-Chan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.101-114
    • /
    • 2011
  • As it seems like critical information leakages have been increasing due to industrial espionage and malicious internal users, the importance of introducing audit and log security technology is growing every now and then. In this paper, we suggest the session logging system for the company's internal control to meet the SOX legislation level, by monitoring and analyzing users behaviors connecting to the business-critical Operating System. The system proposed in this paper aims to monitor the user's illegal activities in the Operating System, and to present the clear evidence of purpose of those activities by detailed logs. For this purpose, we modified Operating System by adding multiple services suggested in this paper. These services utilize interfaces provided by the existing Operating System and add functions to control access and get logs. The system saves and manages session logs of users or administrators connected to the server with centralized log storage. And the system supports session log searching and lookup features required by SOX legislation for the company's internal controls with the level of computer forensics and logging technology.

Storm Water Logging Analysis and Pre-warning System Construction in Beijing City

  • Yuan, Ximin
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2009.05a
    • /
    • pp.2200-2204
    • /
    • 2009
  • In this paper the analysis of natural cause of Beijing Storm inundation and the effect of the human activities has been taken. Flood risk can hardly be eliminated solely by projects. Pre-warning system established is an efficient measure to minimize the influence of flood. Several main functions of this system and their examples are described in the paper, such as: monitoring, forecast, scheme, warning, dynamic decision-making and information publication.

  • PDF

Development of Realtime Temperature & Humidity Logging and Monitoring System using Ubiquitous Sensor Network (유비쿼터스 센서 네트워크를 이용한 실시간 온.습도 기록 및 모니터링 시스템 개발)

  • Cheon, Seong-Sim;Kim, Jung-Ja;Won, Yong-Gwan;Pham, Hai Trieu
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.2
    • /
    • pp.96-105
    • /
    • 2011
  • Ubiquitos sensor network(USN) is a technology which is widely used in our life. This paper introduces an example of design and implementation for a system which is based on the USN technology and can provide an efficient management tool for a space that should be precisely controlled for a certain range of uniformity in temperature and humidity. This introduced system builds a wireless sensor network using a number of sensor modules that are equipped with temperature and humidity sensors, and collects temperature and humidity information in real-time while simultaneously providing a method for monitoring the status of temperature and humidity by the graphical user interface. Also, the system will give a warning signal if the monitored values are differ from the pre-specified values of temperature and humidity for each sensor module more than a certain amount of tolerance. This temperature and humidity logging and monitoring system can perform better management for the space easily and efficiently by automating the existing manual method for data collection and management. Furthermore, using the stored data, it can make possible to perform post-analysis on the problems caused by temperature and humidity and to obtain information for environmental enhancement for the space.