• Title/Summary/Keyword: Direct use

Search Result 3,106, Processing Time 0.031 seconds

[ $CO_2$ ] Sequestration in Geological Structures in the Maritime Area: A Preliminary Review (이산화탄소 해저 지질 구조 격리: 기술 현황과 제도 예비검토)

  • Hong, Gi-Hoon;Park, Chan-Ho;Kim, Han-Joon
    • Journal of the Korean Society for Marine Environment & Energy
    • /
    • v.8 no.4
    • /
    • pp.203-212
    • /
    • 2005
  • Anthropogenic emissions of greenhouse gases, particularly carbon dioxide($CO_2$) which arises mainly as wastes from the fossil fuel burning processes, are causing global warming. The effects of global warming become increasingly felt all over the world including sea level rise and extreme weather. The more direct consequences of the elevated atmospheric $CO_2$ on the ocean is the acidification of the surface ocean which brings a far reaching adverse impact on the life at sea and probably on the whole ecosystem of the planet. Improvement in energy efficiency and use of alternative energy sources are being made to reduce $CO_2$ emissions. However, a rapid transition to alternatives seems unachievable within a few decades due to the constraints on the associated technology and socio-economic factors in the world, since fossil fuels make up approximately 85% of the world's commercial energy demands. It has now been recognized that capture and geological sequestration of $CO_2$ could significantly reduce its emissions from fossil fuel utilization and therefore provides the means to rapidly achieve large reductions in $CO_2$ emissions(excerpts from London Convention, LC/SG 28, 2005). In Korea, well-developed sedimentary basins are spread over the vast continental shelf and slope regions, whereas, the land is densely populated and limited in area. Consequently, the offshore area is preferred to the land for the sites for geological sequestration. The utilization of the offshore area, however, may be subject to international agreements including London Convention. In this paper, the recent trends in technologies and regulations for $CO_2$ capture and geological sequestration are described to encourage its applications in Korea.

  • PDF

A Study on customer satisfaction with self technological - based product (정보화시대의 무인자동화 제품디자인이 고객만족에 미치는 영향에 관한 연구 - 중요사건기법(critical incident technique)을 중심으로 -)

  • 박종찬
    • Archives of design research
    • /
    • v.17 no.3
    • /
    • pp.283-292
    • /
    • 2004
  • Today's fast-paced world is becoming increasingly characterized by technology-facilitated transactions. Growing numbers of customers interact with technology to create service outcomes instead of interacting with a service firm employee. Self-service technologies provide technological interfaces that enable customers to produce a service independent of direct service employee involvement. To investigate on the customer satisfaction with self-technological based product design in Subway. I used the critical incident technique developed by Flanagan(1954) with quantitative measures of attributions. In this research, it results that customers are considered more important the value of technological-function and easy to use than the aspect of automated machine. It is likely that the technological aspect of many self-service options has a unique influence on customer perceptions of self-service encounters. Also, Research has shown that customer's needs are defined as situations in which external environmental factors add a sense of urgency to the transaction and saved time. On the other hand, customers realize that their favorable image of self-technological based product follows as ; first, customers prefer to the simple & modern image on the aspect of product design, secondly, customers prefer to the hitech-functional image to do its job fast in a short time by automated technology on the aspect of functional service, thirdly, customers prefer to the comfortable and sanitary image to be suitable for the underground circumstance.

  • PDF

A Study on the Actual Condition of Gas Equipment and Gas Safety Consciousness Survey to Improve Gas Safety of Gas Consumers (가스 소비자들의 가스안전성 제고를 위한 가스기기 사용 실태 및 가스안전의식 조사에 관한 연구)

  • Ko, Jaesun
    • Journal of the Society of Disaster Information
    • /
    • v.13 no.4
    • /
    • pp.465-475
    • /
    • 2017
  • As a result of a survey on households using gas, gas safety accidents have been declining linearly in 2006. However, when analyzing the causes of gas accidents, accidents detail caused by carelessness have increased to 62%It is analyzed that urgent measures are needed. In addition, 7 households per 10 households perceive city gas as safe, but 30% of them recognize that gas safety accidents are likely to occur in their homes in the future. Even though city gas use is relatively safe,It is recognized that there is a risk. Although the perception of the gas safety of the city gas consumers is not related to the age and gender income level, it is analyzed that it is highly educated and experienced direct or indirect gas safety accident, the perception of safety was relatively low. In order to reduce gas safety accidents, the installation of gas safety equipment for elderly households should be continuously supplied. As a result of investigating the disposal costs in case of various disasters, 66% of the insurance costs were found to be highly dependent on insurance. In addition, to reduce gas safety accidents, the installation of gas safety devices for elderly households should be continuously implemented.

Design and Implementation of a Physical Network Separation System using Virtual Desktop Service based on I/O Virtualization (입출력 가상화 기반 가상 데스크탑 서비스를 이용한 물리적 네트워크 망분리 시스템 설계 및 구현)

  • Kim, Sunwook;Kim, Seongwoon;Kim, Hakyoung;Chung, Seongkwon;Lee, Sookyoung
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.7
    • /
    • pp.506-511
    • /
    • 2015
  • IOV is a technology that supports one or more virtual desktops, and can share a single physical device. In general, the virtual desktop uses the virtual IO devices which are provided by virtualization SW, using SW emulation technology. Virtual desktops that use the IO devices based on SW emulation have a problem in which service quality and performance are declining. Also, they cannot support the high-end application operations such as 3D-based CAD and game applications. In this paper, we propose a physical network separation system using Virtual Desktop Service based on HW direct assignments to overcome these problems. The proposed system provides independent desktops that are used to access the intranet or internet using server virtualization technology in a physical desktop computer for the user. In addition, this system can also support a network separation without network performance degradation caused by inspection of the network packet for logical network separations and additional installations of the desktop for physical network separations.

An Efficient Technique for Processing Frequent Updates in the R-tree (R-트리에서 빈번한 변경 질의 처리를 위한 효율적인 기법)

  • 권동섭;이상준;이석호
    • Journal of KIISE:Databases
    • /
    • v.31 no.3
    • /
    • pp.261-273
    • /
    • 2004
  • Advances in information and communication technologies have been creating new classes of applications in the area of databases. For example, in moving object databases, which track positions of a lot of objects, or stream databases, which process data streams from a lot of sensors, data Processed in such database systems are usually changed very rapidly and continuously. However, traditional database systems have a problem in processing these rapidly and continuously changing data because they suppose that a data item stored in the database remains constant until It is explicitly modified. The problem becomes more serious in the R-tree, which is a typical index structure for multidimensional data, because modifying data in the R-tree can generate cascading node splits or merges. To process frequent updates more efficiently, we propose a novel update technique for the R-tree, which we call the leaf-update technique. If a new value of a data item lies within the leaf MBR that the data item belongs, the leaf-update technique changes the leaf node only, not whole of the tree. Using this leaf-update manner and the leaf-access hash table for direct access to leaf nodes, the proposed technique can reduce update cost greatly. In addition, the leaf-update technique can be adopted in diverse variants of the R-tree and various applications that use the R-tree since it is based on the R-tree and it guarantees the correctness of the R-tree. In this paper, we prove the effectiveness of the leaf-update techniques theoretically and present experimental results that show that our technique outperforms traditional one.

Runoff Characteristics of Non-Point Source Pollutants in Storm Event -Case Study on the Upstream and Downstream of Kokseong River, Korea- (강우시 비점오염물질의 유출특성에 관한 연구 -곡성천 상.하류를 대상으로-)

  • Yang Hea-Kun
    • Journal of the Korean Geographical Society
    • /
    • v.41 no.4 s.115
    • /
    • pp.418-434
    • /
    • 2006
  • The study was investigated to runoff characteristics of non-point pollutants according to rainfall in Kokseong river watershed. The result of which is as follows : First of all, major reason which affect the formation of water quality of Kokseong River is judged to be caused by non-point pollution source which flows out from farmland and residential area. Flow of rainfall effluent in the downstream in which direct flow components of urban district and combined sewer overflows of farmland was intervened faster than that in the upstream reacted more promptly. Generation of pollutants by non-point source shows increasing trend in general in accordance with the increase in the intensity of rainfall but it was affected by SS, BOD, COD and T-P in the upstream part whereas BOD, COD and T-N were significantly affected by beginning period of rainfall in the downstream. EMC in the downstream increased approximately 3-315 times as compared to upstream, particularly the discharge of SS5 and T-P were extremely increased. While surface flow out of rainfall effluent in the upstream was only 4.7%, the surface flow in the downstream took up as much as 29%, which was major reason for the increase of EMC. From the above contents, we can see that the change in water quality according to the increase and decrease of effluent at the time of rainfall showed very complex pattern depending on the type of land use, and it is judged that the most important thing for the administration of non-point pollution source is to come up with the solution for the reduction of effluent at the beginning.

Analysis of Village Safety Index using Accessibility to Public Facilities (공공시설 접근성을 통한 마을단위 안전지수 분석)

  • Jeon, Jeongbae;Kim, Solhee;Suh, Kyo;Yoon, Seongsoo
    • Journal of Korean Society of Rural Planning
    • /
    • v.22 no.2
    • /
    • pp.121-129
    • /
    • 2016
  • A disaster can be defined in many ways based on perspectives, in addition, its types are able to classify differently by various standards. Considering the different perspectives, the disaster can be occurred by natural phenomenon that is like typhoon, earthquake, flood, and drought, and by the accident that is like collapse of facilities, traffic accidents, and environmental pollution, etc. Into the modern society, moreover, the disaster includes the damages by diffusion of epidemic and infectious disease in domestic animals. The disaster was defined by natural and man-made hazards in the past. As societies grew with changes of paradigm, social factors have been included in the concept of the disaster according to new types unexpected by new disease and scientific technology. Change the concept of social disasters, Ministry of Public Safety and Security (MPSS) has provided the regional safety index, which measures the safety level of a local government. However, this regional safety index has some limitation to use because this index provides the information for city unit which is a unit of administrative districts of urban. Since these administrative districts units are on a different level with urban and rural areas, the regional safety index provided by MPSS is not be able to direct apply to the rural areas. The purpose of this study is to determine the regional safety index targeting rural areas. To estimate the safety index, we was used for 3 indicators of the MPSS, a fire, a crime, and an infectious disease which are evaluable the regional safety index using an accessibility analysis. For determining the regional safety index using accessibility from community centers to public facilities, the safety index of fire, crime, and infectious disease used access time to fire station, police office, and medical facility, respectively. An integrated Cheongju, targeting areas in this study, is mixed region with urban and rural areas. The results of regional safety index about urban and rural areas, the safety index in rural area is relatively higher than in the urban. Neverthless the investment would be needed to improve the safety in the rural areas.

Relationship between Organizational Culture, Organizational Trust and Organizational Performance of Special Guard Organization (특수경비조직의 조직문화와 조직신뢰 및 조직성과의 관계)

  • Kim, Hyo-Joon
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.59-86
    • /
    • 2011
  • The purpose of this study is to investigate the relationship between organizational culture, organizational trust and organizational performance of special guard organization. This study had selected special guards from 4 different private guard companies which are in Seoul area on March 2011. Using Judgement Sampling, 161 samples were drawn for the use of final analysis. Questionnaire used in this study was consisted of the total 42 question, and executed frequency analysis, factor analysis, reliability analysis, correlation analysis, multiple regression analysis, path analysis by SPSSWIN 18.0. The Cronbach's ${\alpha}$ value which represents the reliability of the survey came out to be over .592. The results are following: First, the organizational culture of special guard organization affects organizational trust. That is, when a developmental, reasonable, consensual and hierarchical culture is activated, cognitive emotional and behavioral trust is increased. Second, organizational culture of special guard organization affects organizational performance. That is, when a reasonable and consensual culture is activated, job-satisfaction becomes higher. On the other hand, when a developmental, reasonable and hierarchical culture is activated, organizational flow becomes higher. Third, organizational trust of special guard organization affects organizational performance. That is, when a cognitive emotional and behavioral trust works highly, job-satisfaction and organizational flow is increased. Fourth, Special security organization's organizational culture affects as a result in organization result. As well as organizational culture exerts direct influence on organization outcome, I exert effect that is indirect in organization outcome through action trust which is low rank factor of organization trust.

  • PDF

Usefulness of External Monitoring Flap in the Buried Jejunal Free Flap (유리 공장 피판술 후 외부 감시 피판의 유용성)

  • Kim, Baek Kyu;Chang, Hak;Minn, Kyung Won;Hong, Joon Pio;Koh, Kyung Suck
    • Archives of Plastic Surgery
    • /
    • v.34 no.4
    • /
    • pp.432-435
    • /
    • 2007
  • Purpose: The jejunal free flap has the shorter ischemic time than other flap and requires a laparotomy to harvest it. As the evaluation of the perfusion the buried flap is very important, the perfusion of the buried jejunal free flap requires monitoring for its salvage. We tried to improve the monitoring flap method in the jejunal free flap and examined its usefulness. Methods: From March 2002 to March 2006, the monitoring flap method was applied to 4 cases in 8 jejunal free flaps for the pharyngeal and cervical esophageal reconstructions. The distal part of the jejunal flap was exposed without suture fixation through cervical wound for monitoring its perfusion. The status of perfusion was judged by the color change of jejunal mucosa and mesentery. If necessary, pin prick test was performed. Doppler sonography was applied to mesenteric pedicle of the monitoring flap in case of suspicious abnormal circulation. Results: The monitoring flap shows no change in 3 cases, but the congestion happened in one case at the 12 hours after the operation. This congestion was caused by the twisting or kinking of the mesenteric pedicle of the monitoring flap. So, we fixed up the monitoring flap close to adjacent cervical skin for prevention of rotation. Finally, the main part of transferred jejunal flap was intact. Conclusion: The success of a jejunal free flap depends on close postoperative monitoring and early detection of vascular compromise. So, various monitoring methods have been tried, for instance, direct visualization using a fiberoptic pharyngoscope, through a Silastic window placed in the neck flap, or external surface monitoring with an Doppler sonography, use of a buried monitoring probe. But, all of the above have their own shortcomings of simplicity, non-invasiveness, reliability and etc. In our experience, monitoring flap can be a accurate and reliable method.

The Effect of IT Service Outsourcing Project Risks on the Intention of Purchasing Real Options based on Transaction Cost Theory (IT서비스 아웃소싱 프로젝트 위험과 실물옵션 유형간 적합성에 관한 연구)

  • Nam, SeungHyeon;Ahn, JoongHo;Yang, Hee-Dong
    • Asia pacific journal of information systems
    • /
    • v.23 no.2
    • /
    • pp.41-66
    • /
    • 2013
  • IS outsourcing has an important meaning to the Korean SME's (Small and Medium Enterprises) which want to use the IS Services. The objective of this research is to manage IT risks occurred during IS outsourcing project process. This study tries to identify these risks using real option methodology. In order to perform this objective, this study set up the research model which is composed of two main concepts. The first one is the risk factors occurred during IS outsourcing project process: User's Risks, Supplier's Risks and Transaction's Risks. All of these risks are based on Transaction Cost Theory. The second one is the intention to get (or buy) Real Options to manage the risks. In the research model, two types of real option are included: option to abandon (put option) and option to defer (call option). This study uses questionnaires and statistics methodology (PLS) to analyze the hypotheses proposed in the research model. Compared with prior studies, this study is different in two ways. First, this study restricts the range of IT risks. Prior researches of IT Risk management in MIS area cover various range of IT risks, but this study focuses on the Korean SME's IT outsourcing risks on the basis of Transaction Cost Theory. This study tests the relationship between the risks and real option types. Second, this study tries to test the moderating effect of user's risks and supplier's risks on the relationship between transaction's risks and real option types. In IT outsourcing research area, almost studies focus on the direct relationships between IT risks and outsourcing success. But in reality, the co-relationship among IT risks may occur. There are some findings according to the research analysis. First, risks related with user's risks have strong causal relationships with the intention to get option to abandon (put) and option to defer. But risks related with supplier's risks have causal relationships only with option to abandon (put). Second, user's risks and supplier's risks have no moderating effect on the relationship between transaction's risks and real option types. According to the research results, this research have some important and interesting implications on the IS outsourcing business area. First, this study identifies the effective types of real option to minimize the risks occurred during the IT outsourcing projects. So IS outsourcing service users can manage (or minimize) effectively the risks, which occurred during outsourcing projects, using real options. Second, real option gives benefits to suppliers and users at the same time (i.e., win-win strategies between IS outsourcing service providers and users). Vendors (:IS outsourcing service providers) can offer users the real options which can minimize the occurrence of risks in time. "IN TIME" means that before the IS outsourcing project starts, vendors can offer users the opportunity to buy real options in appropriate prices to manage the possibility of the risks of IS outsourcing project. And users also have chance to minimize the IT outsourcing risks occurred during the project process using real options.

  • PDF