• Title/Summary/Keyword: deployment cost

Search Result 268, Processing Time 0.023 seconds

A Blockchain Network Construction Tool and its Electronic Voting Application Case (블록체인 자동화도구 개발과 전자투표 적용사례)

  • AING TECKCHUN;KONG VUNGSOVANREACH;Okki Kim;Kyung-Hee Lee;Wan-Sup Cho
    • The Journal of Bigdata
    • /
    • v.6 no.2
    • /
    • pp.151-159
    • /
    • 2021
  • Construction of a blockchain network needs a cumbersome and time consuming activity. To overcome these limitations, global IT companies such as Microsoft are providing cloud-based blockchain services. In this paper, we propose a blockchain-based construction and management tool that enables blockchain developers, blockchain operators, and enterprises to deploy blockchain more comfortably in their infrastructure. This tool is implemented using Hyperledger Fabric, one of the famous private blockchain platforms, and Ansible, an open-source IT automation engine that supports network-wide deployment. Instead of complex and repetitive text commands, the tool provides a user-friendly web dashboard interface that allows users to seamlessly set up, deploy and interact with a blockchain network. With this proposed solution, blockchain developers, operators, and blockchain researchers can more easily build blockchain infrastructure, saving time and cost. To verify the usefulness and convenience of the proposed tool, a blockchain network that conducts electronic voting was built and tested. The construction of a blockchain network, which consists of writing more than 10 setting files and executing commands over hundreds of lines, can be replaced with simple input and click operations in the graphical user interface, saving user convenience and time. The proposed blockchain tool will be used to build trust data infrastructure in various fields such as food safety supply chain construction in the future.

NUWARD SMR safety approach and licensing objectives for international deployment

  • D. Francis;S. Beils
    • Nuclear Engineering and Technology
    • /
    • v.56 no.3
    • /
    • pp.1029-1036
    • /
    • 2024
  • Drawing on the deep experience and understanding of the principles of nuclear safety, as well as many years of nuclear power plant design and operation, the EDF led NUWARD SMR Project is developing a design for a Small Modular Reactor (SMR) of 340 MWe composed of two 170 MWe independent units, that will supplement the offering of high-output nuclear reactors, especially in response to specific needs such as replacement of fossil-fuelled power plants. NUWARD SMR is a mix of proven and innovative design features that will make it more commercially competitive, while integrating safety features that comply with the highest international standards. Following the principles of redundancy and diversity and rigorous application of Defence in Depth (DID), with an international view on nuclear safety licensing, the Project also incorporates new safety approaches into its design development. The NUWARD SMR Project has been in development for a number of years, it entered conceptual design formally in mid-2019 and entered Basic Design in 2023. The objective of the concept design phase was to confirm the project technological choices and to define the first design configuration of the NUWARD SMR product, to document it, in order to launch pre-licensing with the French Safety Authority (ASN) and to define its estimated cost and its subsequent development and construction schedules. As a delivery milestone the Safety Options file (called the Dossier d'Options de Sûreté (DOS)) has been submitted to ASN in July 2023 for their opinion. An integral part of the NUWARD SMR Project, is not only to deliver a design suitable for France and to satisfy French regulation, but to develop a product suitable and indeed desirable, for the international market, with a first focus in Europe. In order to achieve its objectives and realise its market potential, the NUWARD SMR Project needs to define and realise its safety approach within an international environment and that is the key subject of this paper. The following paper: • Summarises the foundation principles and technological background which underpin the design; • Contextualises the key design features with regard to the international safety regulatory framework with particular emphasis on innovative passive safety aspects; • Illustrates the Project activities in preparation for first licensing in France, and also a wider international view via the ASN led Joint Early Review of the NUWARD SMR design, including Finnish and Czech Republic regulators, recently joined by the Swedish, Polish and Dutch regulators; • Articulates the collaborative approach to design development from involvement with the Project partners (the Commissariat à l'énergie atomique et aux énergies alternatives (CEA), Naval Group, TechnicAtome, Framatome and Tractebel) to the establishment of the International NUWARD Advisory Board (INAB), to gain greater international insight and advice; • Concludes with the focus on next steps into detailed design development, standardisation of the design and its simplification to enhance its commercial competitiveness in a context of further harmonisation of the nuclear safety and licensing requirements and aspirations.

Performance of Drip Irrigation System in Banana Cultuivation - Data Envelopment Analysis Approach

  • Kumar, K. Nirmal Ravi;Kumar, M. Suresh
    • Agribusiness and Information Management
    • /
    • v.8 no.1
    • /
    • pp.17-26
    • /
    • 2016
  • India is largest producer of banana in the world producing 29.72 million tonnes from an area of 0.803 million ha with a productivity of 35.7 MT ha-1 and accounted for 15.48 and 27.01 per cent of the world's area and production respectively (www.nhb.gov.in). In India, Tamil Nadu leads other states both in terms of area and production followed by Maharashtra, Gujarat and Andhra Pradesh. In Rayalaseema region of Andhra Pradesh, Kurnool district had special reputation in the cultivation of banana in an area of 5765 hectares with an annual production of 2.01 lakh tonnes in the year 2012-13 and hence, it was purposively chosen for the study. On $23^{rd}$ November 2003, the Government of Andhra Pradesh has commenced a comprehensive project called 'Andhra Pradesh Micro Irrigation Project (APMIP)', first of its kind in the world so as to promote water use efficiency. APMIP is offering 100 per cent of subsidy in case of SC, ST and 90 per cent in case of other categories of farmers up to 5.0 acres of land. In case of acreage between 5-10 acres, 70 per cent subsidy and acreage above 10, 50 per cent of subsidy is given to the farmer beneficiaries. The sampling frame consists of Kurnool district, two mandals, four villages and 180 sample farmers comprising of 60 farmers each from Marginal (<1ha), Small (1-2ha) and Other (>2ha) categories. A well structured pre-tested schedule was employed to collect the requisite information pertaining to the performance of drip irrigation among the sample farmers and Data Envelopment Analysis (DEA) model was employed to analyze the performance of drip irrigation in banana farms. The performance of drip irrigation was assessed based on the parameters like: Land Development Works (LDW), Fertigation costs (FC), Volume of water supplied (VWS), Annual maintenance costs of drip irrigation (AMC), Economic Status of the farmer (ES), Crop Productivity (CP) etc. The first four parameters are considered as inputs and last two as outputs for DEA modelling purposes. The findings revealed that, the number of farms operating at CRS are more in number in other farms (46.66%) followed by marginal (45%) and small farms (28.33%). Similarly, regarding the number of farmers operating at VRS, the other farms are again more in number with 61.66 per cent followed by marginal (53.33%) and small farms (35%). With reference to scale efficiency, marginal farms dominate the scenario with 57 per cent followed by others (55%) and small farms (50%). At pooled level, 26.11 per cent of the farms are being operated at CRS with an average technical efficiency score of 0.6138 i.e., 47 out of 180 farms. Nearly 40 per cent of the farmers at pooled level are being operated at VRS with an average technical efficiency score of 0.7241. As regards to scale efficiency, nearly 52 per cent of the farmers (94 out of 180 farmers) at pooled level, either performed at the optimum scale or were close to the optimum scale (farms having scale efficiency values equal to or more than 0.90). Majority of the farms (39.44%) are operating at IRS and only 29 per cent of the farmers are operating at DRS. This signifies that, more resources should be provided to these farms operating at IRS and the same should be decreased towards the farms operating at DRS. Nearly 32 per cent of the farms are operating at CRS indicating efficient utilization of resources. Log linear regression model was used to analyze the major determinants of input use efficiency in banana farms. The input variables considered under DEA model were again considered as influential factors for the CRS obtained for the three categories of farmers. Volume of water supplied ($X_1$) and fertigation cost ($X_2$) are the major determinants of banana farms across all the farmer categories and even at pooled level. In view of their positive influence on the CRS, it is essential to strengthen modern irrigation infrastructure like drip irrigation and offer more fertilizer subsidies to the farmer to enhance the crop production on cost-effective basis in Kurnool district of Andhra Pradesh, India. This study further suggests that, the present era of Information Technology will help the irrigation management in the context of generating new techniques, extension, adoption and information. It will also guide the farmers in irrigation scheduling and quantifying the irrigation water requirements in accordance with the water availability in a particular season. So, it is high time for the Government of India to pay adequate attention towards the applications of 'Information and Communication Technology (ICT) and its applications in irrigation water management' for facilitating the deployment of Decision Supports Systems (DSSs) at various levels of planning and management of water resources in the country.

PRC Maritime Operational Capability and the Task for the ROK Military (중국군의 해양작전능력과 한국군의 과제)

  • Kim, Min-Seok
    • Strategy21
    • /
    • s.33
    • /
    • pp.65-112
    • /
    • 2014
  • Recent trends show that the PRC has stepped aside its "army-centered approach" and placed greater emphasis on its Navy and Air Force for a wider range of operations, thereby reducing its ground force and harnessing its economic power and military technology into naval development. A quantitative growth of the PLA Navy itself is no surprise as this is not a recent phenomenon. Now is the time to pay closer attention to the level of PRC naval force's performance and the extent of its warfighting capacity in the maritime domain. It is also worth asking what China can do with its widening naval power foundation. In short, it is time to delve into several possible scenarios I which the PRC poses a real threat. With this in mind, in Section Two the paper seeks to observe the construction progress of PRC's naval power and its future prospects up to the year 2020, and categorize time frame according to its major force improvement trends. By analyzing qualitative improvements made over time, such as the scale of investment and the number of ships compared to increase in displacement (tonnage), this paper attempts to identify salient features in the construction of naval power. Chapter Three sets out performance evaluation on each type of PRC naval ships as well as capabilities of the Navy, Air Force, the Second Artillery (i.e., strategic missile forces) and satellites that could support maritime warfare. Finall, the concluding chapter estimates the PRC's maritime warfighting capability as anticipated in respective conflict scenarios, and considers its impact on the Korean Peninsula and proposes the directions ROK should steer in response. First of all, since the 1980s the PRC navy has undergone transitions as the focus of its military strategic outlook shifted from ground warfare to maritime warfare, and within 30 years of its effort to construct naval power while greatly reducing the size of its ground forces, the PRC has succeeded in building its naval power next to the U.S.'s in the world in terms of number, with acquisition of an aircraft carrier, Chinese-version of the Aegis, submarines and so on. The PRC also enjoys great potentials to qualitatively develop its forces such as indigenous aircraft carriers, next-generation strategic submarines, next-generation destroyers and so forth, which is possible because the PRC has accumulated its independent production capabilities in the process of its 30-year-long efforts. Secondly, one could argue that ROK still has its chances of coping with the PRC in naval power since, despite its continuous efforts, many estimate that the PRC naval force is roughly ten or more years behind that of superpowers such as the U.S., on areas including radar detection capability, EW capability, C4I and data-link systems, doctrines on force employment as well as tactics, and such gap cannot be easily overcome. The most probable scenarios involving the PRC in sea areas surrounding the Korean Peninsula are: first, upon the outbreak of war in the peninsula, the PRC may pursue military intervention through sea, thereby undermining efforts of the ROK-U.S. combined operations; second, ROK-PRC or PRC-Japan conflicts over maritime jurisdiction or ownership over the Senkaku/Diaoyu islands could inflict damage to ROK territorial sovereignty or economic gains. The PRC would likely attempt to resolve the conflict employing blitzkrieg tactics before U.S. forces arrive on the scene, while at the same time delaying and denying access of the incoming U.S. forces. If this proves unattainable, the PRC could take a course of action adopting "long-term attrition warfare," thus weakening its enemy's sustainability. All in all, thiss paper makes three proposals on how the ROK should respond. First, modern warfare as well as the emergent future warfare demonstrates that the center stage of battle is no longer the domestic territory, but rather further away into the sea and space. In this respect, the ROKN should take advantage of the distinct feature of battle space on the peninsula, which is surrounded by the seas, and obtain capabilities to intercept more than 50 percent of the enemy's ballistic missiles, including those of North Korea. In tandem with this capacity, employment of a large scale of UAV/F Carrier for Kill Chain operations should enhance effectiveness. This is because conditions are more favorable to defend from sea, on matters concerning accuracy rates against enemy targets, minimized threat of friendly damage, and cost effectiveness. Second, to maintain readiness for a North Korean crisis where timely deployment of US forces is not possible, the ROKN ought to obtain capabilities to hold the enemy attack at bay while deterring PRC naval intervention. It is also argued that ROKN should strengthen its power so as to protect national interests in the seas surrounding the peninsula without support from the USN, should ROK-PRC or ROK-Japan conflict arise concerning maritime jurisprudence. Third, the ROK should fortify infrastructures for independent construction of naval power and expand its R&D efforts, and for this purpose, the ROK should make the most of the advantages stemming from the ROK-U.S. alliance inducing active support from the United States. The rationale behind this argument is that while it is strategically effective to rely on alliance or jump on the bandwagon, the ultimate goal is always to acquire an independent response capability as much as possible.

The Latest Progress on the Development of Technologies for $CO_2$ Storage in Marine Geological Structure and its Application in Republic of Korea (해저 지질구조내 $CO_2$ 저장기술의 연구개발 동향 및 향후 국내 실용화 방안)

  • Kang, Seong-Gil;Huh, Cheol
    • Journal of the Korean Society for Marine Environment & Energy
    • /
    • v.11 no.1
    • /
    • pp.24-34
    • /
    • 2008
  • To mitigate the climate change and global warming, various technologies have been internationally proposed for reducing greenhouse gas emissions. Especially, in recent, carbon dioxide capture and storage (CCS) technology is regarded as one of the most promising emission reduction options that $CO_2$ be captured from major point sources (eg., power plant) and transported for storage into the marine geological structure such as deep sea saline aquifer. The purpose of this paper is to review the latest progress on the development of technologies for $CO_2$ storage in marine geological structure and its perspective in republic of Korea. To develop the technologies for $CO_2$ storage in marine geological structure, we carried out relevant R&D project, which cover the initial survey of potentially suitable marine geological structure fur $CO_2$ storage site and monitoring of the stored $CO_2$ behavior, basic design for $CO_2$ transport and storage process including onshore/offshore plant and assessment of potential environmental risk related to $CO_2$ storage in geological structure in republic of Korea. By using the results of the present researches, we can contribute to understanding not only how commercial scale (about 1 $MtCO_2$) deployment of $CO_2$ storage in the marine geological structure of East Sea, Korea, is realized but also how more reliable and safe CCS is achieved. The present study also suggests that it is possible to reduce environmental cost (about 2 trillion Won per year) with developed technology for $CO_2$ storage in marine geological structure until 2050.

  • PDF

Examination of the Current Situations of Security Dogs and it's Development Plans (경호탐지견의 운용실태 및 발전방안)

  • Park, Hyung-Kyu;Kim, Doo-Hyun
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.215-234
    • /
    • 2007
  • Our country security industry 1960's service expense of the beginning U.S. army unit it accomplishes the growth which is quick with start, currently about 2,500 triumph the security enterprises which it goes over are being active. But the majority in these enterprise about lower cotton can a forever characteristic with pressure and the manpower civil official ability insufficient back of faithlessness management and capital power. To sleep with afterwords it presents the security dogs deployment plan for an efficient security together from the research which it sees hereupon and it does. First, it cultivates the domestic mountain progress dog which is a breed which is suitable with the security dogs and the shovel flesh dog back with the security dogs. Specially the Jindo of the breed which is excellent training which is suitable in task of the security dogs it leads and if it uses appropriately, it industrializes our specific the Jindo and protection there is a possibility of getting the effect which falls to also the gist which it rears rightly. It cultivate the second, security dogs and it magnifies training. The security dogs consequently is it will be able to accomplish the task above 2 branches to training method. Namely, after finishing obedience training, it is to be in security activity it will execute guard or detection back special training which is suitable in task and it will be able to commit. Third, it uses the security dogs which is trained rightly in task. The security dogs the adult escorts, facility expense, the explosive and narcotic drug detection, it will be able to use with the other blind man guidance dogs back. The narcotic drug detection dogs which currently is used specially technique intelligence anger, when considering the tendency of the narcotic drug smuggling offense field which becomes diversification that the role very it is important is a possibility of saying at day. It cultivate a fourth, escort relation specialty manpower and it improves the breed of the security dogs. The hazard which cultivate the security dogs use necessary personnel the breed of security dogs, the security dogs training center it opens the security crane relation subject of the college which stands and (university) it improves it establishes and training which is suitable in task it is to do to execute letting in the training map company. Specially, the hazard which improves the breed of security dogs in the progress mind quality which stands against the portion where the breed improvement is demanded as the portion where the internal organs research and investment are necessary sees. The security dogs compares in labor cost and the expense holds few, if it uses the our specific domestic dogs it will be able to use efficiently in the task which is various it solves the multi branch plans for wisly with the security dogs industrial development security of course contemporary history sliced raw fish sees demands compared to being immediacy and the life which is happy business the place where it does it sees it will be able to contribute a lot as.

  • PDF

Investigation and Processing of Seismic Reflection Data Collected from a Water-Land Area Using a Land Nodal Airgun System (수륙 경계지역에서 얻어진 육상 노달 에어건 탄성파탐사 자료의 고찰 및 자료처리)

  • Lee, Donghoon;Jang, Seonghyung;Kang, Nyeonkeon;Kim, Hyun-do;Kim, Kwansoo;Kim, Ji-Soo
    • The Journal of Engineering Geology
    • /
    • v.31 no.4
    • /
    • pp.603-620
    • /
    • 2021
  • A land nodal seismic system was employed to acquire seismic reflection data using stand-alone cable-free receivers in a land-river area. Acquiring reliable data using this technology is very cost effective, as it avoids topographic problems in the deployment and collection of receivers. The land nodal airgun system deployed on the mouth of the Hyungsan River (in Pohang, Gyeongsangbuk Province) used airgun sources in the river and receivers on the riverbank, with subparallel source and receiver lines, approximately 120 m-spaced. Seismic data collected on the riverbank are characterized by a low signal-to-noise (S/N) and inconsistent reflection events. Most of the events are represented by hyperbola in the field records, including direct waves, guided waves, air waves, and Scholte surface waves, in contrast to the straight lines in the data collected conventionally where source and receiver lines are coincident. The processing strategy included enhancing the signal behind the low-frequency large-amplitude noise with a cascaded application of bandpass and f-k filters for the attenuation of air waves. Static time delays caused by the cross-offset distance between sources and receivers are corrected, with a focus on mapping the shallow reflections obscured by guided wave and air wave noise. A new time-distance equation and curve for direct and air waves are suggested for the correction of the static time delay caused by the cross-offset between source and receiver. Investigation of the minimum cross-offset gathers shows well-aligned shallow reflections around 200 ms after time-shift correction. This time-delay static correction based on the direct wave is found essential to improving the data from parallel source and receiver lines. Data acquisition and processing strategies developed in this study for land nodal airgun seismic systems will be readily applicable to seismic data from land-sea areas when high-resolution signal data becomes available in the future for investigation of shallow gas reservoirs, faults, and engineering designs for the development of coastal areas.

Design and Implementation of a Web Application Firewall with Multi-layered Web Filter (다중 계층 웹 필터를 사용하는 웹 애플리케이션 방화벽의 설계 및 구현)

  • Jang, Sung-Min;Won, Yoo-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.157-167
    • /
    • 2009
  • Recently, the leakage of confidential information and personal information is taking place on the Internet more frequently than ever before. Most of such online security incidents are caused by attacks on vulnerabilities in web applications developed carelessly. It is impossible to detect an attack on a web application with existing firewalls and intrusion detection systems. Besides, the signature-based detection has a limited capability in detecting new threats. Therefore, many researches concerning the method to detect attacks on web applications are employing anomaly-based detection methods that use the web traffic analysis. Much research about anomaly-based detection through the normal web traffic analysis focus on three problems - the method to accurately analyze given web traffic, system performance needed for inspecting application payload of the packet required to detect attack on application layer and the maintenance and costs of lots of network security devices newly installed. The UTM(Unified Threat Management) system, a suggested solution for the problem, had a goal of resolving all of security problems at a time, but is not being widely used due to its low efficiency and high costs. Besides, the web filter that performs one of the functions of the UTM system, can not adequately detect a variety of recent sophisticated attacks on web applications. In order to resolve such problems, studies are being carried out on the web application firewall to introduce a new network security system. As such studies focus on speeding up packet processing by depending on high-priced hardware, the costs to deploy a web application firewall are rising. In addition, the current anomaly-based detection technologies that do not take into account the characteristics of the web application is causing lots of false positives and false negatives. In order to reduce false positives and false negatives, this study suggested a realtime anomaly detection method based on the analysis of the length of parameter value contained in the web client's request. In addition, it designed and suggested a WAF(Web Application Firewall) that can be applied to a low-priced system or legacy system to process application data without the help of an exclusive hardware. Furthermore, it suggested a method to resolve sluggish performance attributed to copying packets into application area for application data processing, Consequently, this study provide to deploy an effective web application firewall at a low cost at the moment when the deployment of an additional security system was considered burdened due to lots of network security systems currently used.