• Title/Summary/Keyword: site application

Search Result 2,597, Processing Time 0.03 seconds

The Study on Test for Control of Weeds Invasion in Constructed on Upper Embankment in the Shoulder of a Expressway (고속도로 갓길 외측 성토상단의 잡초침입 억제를 위한 시험 연구)

  • Jeon, Gi-seong
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.18 no.6
    • /
    • pp.227-237
    • /
    • 2015
  • From January 2013 to October 2015, weed invasion control techniques was tested in the test road of Jungbunaeryuk expressway so as to collect preliminary data for the management methods of the upper exterior banking of expressway shoulders. Then, monitoring was conducted and its results are as follows. Mat (sheet), solidifying agent, and mulching (wood chips) were applied for the test and their initial effects of preventing weed invasion were all excellent. It was found that the homogeneity of the wood chip mulching method needs to improve. In the mat method and the mulching method were found to have the most excellent economic feasibility and aesthetics, respectively. The covering degree was found to be the highest at 80% in the control site, followed by the wood chip site at 20% and the solidifying agent site and the non-woven fabric site at 5% each. As for species diversity, the control had the largest variety of species. Two years after the construction, many different species of plants invaded and were growing. Plants including weed didn't tend to invade the slopes applied with non-woven fabric. In addition, weed didn't invade the solidifying agent site and the aesthetics of the upper exterior banking of expressway shoulders was found to be excellent. The wood chip site was found to require consistent management for preventing weed invasion. The mat (sheet) site, the solidifying agent site, and the wood chip mulching site were found to have excellent weed prevention effects. As time passed, the mat (sheet) site and the solidifying agent site showed better weed prevention effects. However, they need consistent monitoring for further application.

Introduction to the Strategic Sampling Approaches to Construct Optimal Conceptual Model of a Contaminated Site (오염부지 최적 개념모델 수립을 위한 전략적 샘플링 기법 소개)

  • Park, Hyun Ji;Kim, Han-Suk;Yun, Seong-Taek;Jo, Ho Young;Kwon, Man Jae
    • Journal of Soil and Groundwater Environment
    • /
    • v.25 no.2_spc
    • /
    • pp.28-54
    • /
    • 2020
  • Even though a systematic sampling approach is very crucial in both the general and detailed investigation phases to produce the best conceptual site model for contaminated sites, the concept is not yet established in South Korea. The U.S. Environmental Protection Agency (EPA) issued the 'Strategic Sampling Approaches Technical guide' in 2018 to help environmental professionals choose which sampling approaches may be needed and most effective for given site conditions. The EPA guide broadly defines strategic sampling as the application of focused data collection across targeted areas of the conceptual site model (CSM) to provide the appropriate amount and type of information needed for decision-making. These strategic sampling approaches can prevent the essential data from missing, minimize the uncertainty of projects and secure the data which are necessary for the important site-decisions. Furthermore, these provide collaborative data sets through the life cycle phases of projects, which can generate more positive proofs on the site-decisions. The strategic sampling approaches can be divided by site conditions. This technical guide categorized it into eight conditions; High-resolution site characterization in unconsolidated environments, High-resolution site characterization in fractured sedimentary rock environments, Incremental sampling, Contaminant source definition, Passive groundwater sampling, Passive sampling for surface water and sediment, Groundwater to surface water interaction, and Vapor intrusion. This commentary paper introduces specific sampling methods based on site conditions when the strategic sampling approaches are applied.

A Study of Developing Guides for the Construction Site Quality Control of Porous Concrete (투수콘크리트 현장품질관리 지침서 개발에 관한 연구)

  • Ko, Eun-Jung;Goh, Eun-Joo;Seok, Ho-Joong;Lee, Seung-Hyeok
    • Journal of the Korea Institute of Building Construction
    • /
    • v.9 no.3
    • /
    • pp.65-71
    • /
    • 2009
  • General criteria for the quality of porous concrete have not been established yet in Korea. And yet, pavement and construction have been performed. In this paper, guidelines on the construction site quality control of porous concrete were developed in order to establish criteria for resolving the issues and problems of porous concrete, to establish methods for improving poor performance, and to manage porous concrete more systematically. In addition, a guide for the construction site quality control of porous concrete, which was appropriate for reality, was developed by researching several quality control guides and maintenance at construction sites. The guide consists of a total of nine chapters such as Application Range, Overview, the Structure of Porous Concrete, the Design of Package Thickness, Package Materials for Porous Concrete, Construction Methods, Quality Assurance and Inspections, Construction Site Quality Control, and Maintenance. It describes quality control guidelines in all steps such as methods for transporting porous concrete from the factory to the construction site, cautions for construction work at construction sites, maintenance, and management. The Guide for the Construction Site Quality Control of Porous Concrete is expected to ensure the quality of porous concrete, to reduce national costs for quality assurance, and to help ensure the health and safety of Korean people.

Development of a String Injection Vulnerability Analyzer for Web Application Programs (웹 응용 프로그램의 문자열 삽입 보안 취약성 분석기 개발)

  • Ahn, Joon-Seon;Kim, Yeong-Min;Jo, Jang-Wu
    • The KIPS Transactions:PartA
    • /
    • v.15A no.3
    • /
    • pp.181-188
    • /
    • 2008
  • Nowadays, most web sites are developed using dynamic web pages where web pages are generated and transmitted by web application programs. Therefore, the ratio of attacks injecting malevolent strings to vulnerable web applications is increasing. In this paper, we present a static program analyzer which analyzes whether a web application program has vulnerabilities to the SQL injection attack and the cross site scripting(XSS) attack. To analyze programs using abstract interpretation framework, we designed an abstract domain which models potential string set along with excluded strings and developed an abstract interpreter for the PHP language. Also, based on them, we implemented a static analyzer. According to our experiments, our analyzer has competitive analysis speed and accuracy compared with related research results.

Design and Implementation of an Application Level Mobile Server for On-the-site Oriented Services (현장 중심 서비스를 위한 응용레벨 모바일 서버의 설계 및 구현)

  • Kim, Seonil;Jung, Jinman;Yoon, Young-Sun;Eun, Seongbae;So, Sun Sup;Cha, Shin
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.3
    • /
    • pp.358-368
    • /
    • 2018
  • The mobile characteristics of the smart phone are well suited to on-the-site oriented services and are being utilized in a variety of ways. However, since most applications operate on a central server basis, Internet access is inevitable, and there are various problems such as an increase in server maintenance cost and security deterioration. Although researches have been proposed to utilize the smart phone itself as a server to improve it, these methods are based on downsizing the PC-based web server or modifying the smart phone kernel. These methods have the problems that a end user has to use the rooting, and they are not able to effectively utilize various communication means of a smart phone. In this paper, we propose a design and implementation of an application level smart phone web server. The server receives the document request from the remote via the Internet and in the local area using the WPAN. At this time, the web document is stored as an internal file structure of the smart phone application. We proposed the phttp protocol which uses server's phone number as ID for document request. Through the implementation, we analyzed the capacity and latency of stored data and its effectiveness is evaluated.