• Title/Summary/Keyword: deployment cost

Search Result 264, Processing Time 0.022 seconds

The Latest Progress on the Development of Technologies for $CO_2$ Storage in Marine Geological Structure and its Application in Republic of Korea (해저 지질구조내 $CO_2$ 저장기술의 연구개발 동향 및 향후 국내 실용화 방안)

  • Kang, Seong-Gil;Huh, Cheol
    • Journal of the Korean Society for Marine Environment & Energy
    • /
    • v.11 no.1
    • /
    • pp.24-34
    • /
    • 2008
  • To mitigate the climate change and global warming, various technologies have been internationally proposed for reducing greenhouse gas emissions. Especially, in recent, carbon dioxide capture and storage (CCS) technology is regarded as one of the most promising emission reduction options that $CO_2$ be captured from major point sources (eg., power plant) and transported for storage into the marine geological structure such as deep sea saline aquifer. The purpose of this paper is to review the latest progress on the development of technologies for $CO_2$ storage in marine geological structure and its perspective in republic of Korea. To develop the technologies for $CO_2$ storage in marine geological structure, we carried out relevant R&D project, which cover the initial survey of potentially suitable marine geological structure fur $CO_2$ storage site and monitoring of the stored $CO_2$ behavior, basic design for $CO_2$ transport and storage process including onshore/offshore plant and assessment of potential environmental risk related to $CO_2$ storage in geological structure in republic of Korea. By using the results of the present researches, we can contribute to understanding not only how commercial scale (about 1 $MtCO_2$) deployment of $CO_2$ storage in the marine geological structure of East Sea, Korea, is realized but also how more reliable and safe CCS is achieved. The present study also suggests that it is possible to reduce environmental cost (about 2 trillion Won per year) with developed technology for $CO_2$ storage in marine geological structure until 2050.

  • PDF

Examination of the Current Situations of Security Dogs and it's Development Plans (경호탐지견의 운용실태 및 발전방안)

  • Park, Hyung-Kyu;Kim, Doo-Hyun
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.215-234
    • /
    • 2007
  • Our country security industry 1960's service expense of the beginning U.S. army unit it accomplishes the growth which is quick with start, currently about 2,500 triumph the security enterprises which it goes over are being active. But the majority in these enterprise about lower cotton can a forever characteristic with pressure and the manpower civil official ability insufficient back of faithlessness management and capital power. To sleep with afterwords it presents the security dogs deployment plan for an efficient security together from the research which it sees hereupon and it does. First, it cultivates the domestic mountain progress dog which is a breed which is suitable with the security dogs and the shovel flesh dog back with the security dogs. Specially the Jindo of the breed which is excellent training which is suitable in task of the security dogs it leads and if it uses appropriately, it industrializes our specific the Jindo and protection there is a possibility of getting the effect which falls to also the gist which it rears rightly. It cultivate the second, security dogs and it magnifies training. The security dogs consequently is it will be able to accomplish the task above 2 branches to training method. Namely, after finishing obedience training, it is to be in security activity it will execute guard or detection back special training which is suitable in task and it will be able to commit. Third, it uses the security dogs which is trained rightly in task. The security dogs the adult escorts, facility expense, the explosive and narcotic drug detection, it will be able to use with the other blind man guidance dogs back. The narcotic drug detection dogs which currently is used specially technique intelligence anger, when considering the tendency of the narcotic drug smuggling offense field which becomes diversification that the role very it is important is a possibility of saying at day. It cultivate a fourth, escort relation specialty manpower and it improves the breed of the security dogs. The hazard which cultivate the security dogs use necessary personnel the breed of security dogs, the security dogs training center it opens the security crane relation subject of the college which stands and (university) it improves it establishes and training which is suitable in task it is to do to execute letting in the training map company. Specially, the hazard which improves the breed of security dogs in the progress mind quality which stands against the portion where the breed improvement is demanded as the portion where the internal organs research and investment are necessary sees. The security dogs compares in labor cost and the expense holds few, if it uses the our specific domestic dogs it will be able to use efficiently in the task which is various it solves the multi branch plans for wisly with the security dogs industrial development security of course contemporary history sliced raw fish sees demands compared to being immediacy and the life which is happy business the place where it does it sees it will be able to contribute a lot as.

  • PDF

Investigation and Processing of Seismic Reflection Data Collected from a Water-Land Area Using a Land Nodal Airgun System (수륙 경계지역에서 얻어진 육상 노달 에어건 탄성파탐사 자료의 고찰 및 자료처리)

  • Lee, Donghoon;Jang, Seonghyung;Kang, Nyeonkeon;Kim, Hyun-do;Kim, Kwansoo;Kim, Ji-Soo
    • The Journal of Engineering Geology
    • /
    • v.31 no.4
    • /
    • pp.603-620
    • /
    • 2021
  • A land nodal seismic system was employed to acquire seismic reflection data using stand-alone cable-free receivers in a land-river area. Acquiring reliable data using this technology is very cost effective, as it avoids topographic problems in the deployment and collection of receivers. The land nodal airgun system deployed on the mouth of the Hyungsan River (in Pohang, Gyeongsangbuk Province) used airgun sources in the river and receivers on the riverbank, with subparallel source and receiver lines, approximately 120 m-spaced. Seismic data collected on the riverbank are characterized by a low signal-to-noise (S/N) and inconsistent reflection events. Most of the events are represented by hyperbola in the field records, including direct waves, guided waves, air waves, and Scholte surface waves, in contrast to the straight lines in the data collected conventionally where source and receiver lines are coincident. The processing strategy included enhancing the signal behind the low-frequency large-amplitude noise with a cascaded application of bandpass and f-k filters for the attenuation of air waves. Static time delays caused by the cross-offset distance between sources and receivers are corrected, with a focus on mapping the shallow reflections obscured by guided wave and air wave noise. A new time-distance equation and curve for direct and air waves are suggested for the correction of the static time delay caused by the cross-offset between source and receiver. Investigation of the minimum cross-offset gathers shows well-aligned shallow reflections around 200 ms after time-shift correction. This time-delay static correction based on the direct wave is found essential to improving the data from parallel source and receiver lines. Data acquisition and processing strategies developed in this study for land nodal airgun seismic systems will be readily applicable to seismic data from land-sea areas when high-resolution signal data becomes available in the future for investigation of shallow gas reservoirs, faults, and engineering designs for the development of coastal areas.

Design and Implementation of a Web Application Firewall with Multi-layered Web Filter (다중 계층 웹 필터를 사용하는 웹 애플리케이션 방화벽의 설계 및 구현)

  • Jang, Sung-Min;Won, Yoo-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.157-167
    • /
    • 2009
  • Recently, the leakage of confidential information and personal information is taking place on the Internet more frequently than ever before. Most of such online security incidents are caused by attacks on vulnerabilities in web applications developed carelessly. It is impossible to detect an attack on a web application with existing firewalls and intrusion detection systems. Besides, the signature-based detection has a limited capability in detecting new threats. Therefore, many researches concerning the method to detect attacks on web applications are employing anomaly-based detection methods that use the web traffic analysis. Much research about anomaly-based detection through the normal web traffic analysis focus on three problems - the method to accurately analyze given web traffic, system performance needed for inspecting application payload of the packet required to detect attack on application layer and the maintenance and costs of lots of network security devices newly installed. The UTM(Unified Threat Management) system, a suggested solution for the problem, had a goal of resolving all of security problems at a time, but is not being widely used due to its low efficiency and high costs. Besides, the web filter that performs one of the functions of the UTM system, can not adequately detect a variety of recent sophisticated attacks on web applications. In order to resolve such problems, studies are being carried out on the web application firewall to introduce a new network security system. As such studies focus on speeding up packet processing by depending on high-priced hardware, the costs to deploy a web application firewall are rising. In addition, the current anomaly-based detection technologies that do not take into account the characteristics of the web application is causing lots of false positives and false negatives. In order to reduce false positives and false negatives, this study suggested a realtime anomaly detection method based on the analysis of the length of parameter value contained in the web client's request. In addition, it designed and suggested a WAF(Web Application Firewall) that can be applied to a low-priced system or legacy system to process application data without the help of an exclusive hardware. Furthermore, it suggested a method to resolve sluggish performance attributed to copying packets into application area for application data processing, Consequently, this study provide to deploy an effective web application firewall at a low cost at the moment when the deployment of an additional security system was considered burdened due to lots of network security systems currently used.