• Title/Summary/Keyword: Electronic state

Search Result 3,100, Processing Time 0.031 seconds

Numerical Simulation of the Oscillating Flow Effect in the Channel of Polymer Electrolyte Membrane Fuel Cell (왕복 유동을 통한 확산증대 효과가 연료전지 성능에 미치는 영향에 대한 수치해석)

  • Kim, Jongmin;Kang, Kyung-Sik
    • Journal of the Korea Safety Management & Science
    • /
    • v.20 no.4
    • /
    • pp.7-13
    • /
    • 2018
  • This study investigates the enhancement of the oxygen diffusion rate in the cathode channel of a proton exchange membrane fuel cell (PEMFC) by pure oscillating flow, which is the same as the mechanism of human breathe. Three-dimensional numerical simulation, which has the full model of the fuel cell including electrochemical reaction, ion and electronic conduction, mass transfer and thermal variation and so on, is performed to show the phenomena in the channel at the case of a steady state. This model could analysis the oscillating flow as a moving mesh calculation coupled with electrochemical reaction on the catalyst layer, however, it needs a lot of calculation time for each case. The two dimensional numerical simulation has carried on for the study of oscillating flow effect in the cathode channel of PEMFC in order to reduce the calculation time. This study shows the diffusion rate of the oxygen increased and the emission rate of the water vapor increased in the channel by oscillating flow without any forced flow.

Cascade Network Based Bolt Inspection In High-Speed Train

  • Gu, Xiaodong;Ding, Ji
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.10
    • /
    • pp.3608-3626
    • /
    • 2021
  • The detection of bolts is an important task in high-speed train inspection systems, and it is frequently performed to ensure the safety of trains. The difficulty of the vision-based bolt inspection system lies in small sample defect detection, which makes the end-to-end network ineffective. In this paper, the problem is resolved in two stages, which includes the detection network and cascaded classification networks. For small bolt detection, all bolts including defective bolts and normal bolts are put together for conducting annotation training, a new loss function and a new boundingbox selection based on the smallest axis-aligned convex set are proposed. These allow YOLOv3 network to obtain the accurate position and bounding box of the various bolts. The average precision has been greatly improved on PASCAL VOC, MS COCO and actual data set. After that, the Siamese network is employed for estimating the status of the bolts. Using the convolutional Siamese network, we are able to get strong results on few-shot classification. Extensive experiments and comparisons on actual data set show that the system outperforms state-of-the-art algorithms in bolt inspection.

The Sequence Labeling Approach for Text Alignment of Plagiarism Detection

  • Kong, Leilei;Han, Zhongyuan;Qi, Haoliang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.9
    • /
    • pp.4814-4832
    • /
    • 2019
  • Plagiarism detection is increasingly exploiting text alignment. Text alignment involves extracting the plagiarism passages in a pair of the suspicious document and its source document. The heuristics have achieved excellent performance in text alignment. However, the further improvements of the heuristic methods mainly depends more on the experiences of experts, which makes the heuristics lack of the abilities for continuous improvements. To address this problem, machine learning maybe a proper way. Considering the position relations and the context of text segments pairs, we formalize the text alignment task as a problem of sequence labeling, improving the current methods at the model level. Especially, this paper proposes to use the probabilistic graphical model to tag the observed sequence of pairs of text segments. Hence we present the sequence labeling approach for text alignment in plagiarism detection based on Conditional Random Fields. The proposed approach is evaluated on the PAN@CLEF 2012 artificial high obfuscation plagiarism corpus and the simulated paraphrase plagiarism corpus, and compared with the methods achieved the best performance in PAN@CLEF 2012, 2013 and 2014. Experimental results demonstrate that the proposed approach significantly outperforms the state of the art methods.

Factors Determining Intention to Continue Using E-HRM

  • NOERMAN, Teuku;ERLANDO, Angga;RIYANTO, Feri Dwi
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.2
    • /
    • pp.1079-1089
    • /
    • 2021
  • The development of information technology has promoted organizational transformation through the utilization of an electronic information system. This research aimed to identify factors that influence continuous intention to use E-HRM. This empirical research applies the Technology Acceptance Model and Cognitive Model for identifying significantly impacted areas of continuous intention to use E-HRM in a highly dynamic environment. The data were collected using questionnaires delivered directly to respondents. The sample was 100 employees of ESQ Group selected through random sampling. The variables used were subjective norms (X1), perceived behavioral control (X2), perceived innovativeness (Y1), cognitive absorption (Y2), satisfaction (Y3), and continuous intention to use E-HRM (Y4). Statistical analysis using Structural Equation Modelling (SEM) with Smart PLS was applied. The results revealed that behavioral control (X2) did not influence the continuous intention to use E-HRM (Y4) and that cognitive absorption (Y2) and satisfaction (Y3) did not significantly influence continuous intention to use E-HRM (Y4). Subjective norms (X1) significantly influenced both perceived innovativeness (Y1) and continuous intention to use E-HRM (Y4), perceived behavioral control (X2) significantly influenced both perceived innovativeness (Y1) and cognitive absorption (Y2), and perceived innovativeness (Y1) significantly influenced both satisfaction (Y3) and continuous intention to use E-HRM (Y4).

Competitive Photochlorination Reactions of Silane, di-Chloro and tri-Chlorosilanes at 337.1 nm

  • Jung, Kyung-Hoon;Jung, Kwang-Woo
    • Bulletin of the Korean Chemical Society
    • /
    • v.8 no.4
    • /
    • pp.242-246
    • /
    • 1987
  • The hydrogen abstraction reactions of $SiH_4, SiH_2Cl_2 \;and\; SiHCl_3$ by ground state chlorine atoms generated photochemically from chlorine molecules have been studied at temperatures between 15 and $100^{\circ}C.$ The absolute rates for the reactions have been obtained by a competition technique using ethane as a competitor. The rate expressions ($in cm^3/mol/s$) are found to conform to an Arrhenius rate law: $k_{SiH_4} = (7.98 {\pm} 0.42) {\times} 10^{13}$ exp $[-(1250 {\pm}20)/T].$ $k_{SiH_2Cl_2} = (2.25 {\pm} 0.12) {\times} 10^{15}$ exp[-(1010 ${\pm}$ 10)/T]. $k_{SiHCl_3} = (9.04 {\pm} 0.28) {\times} 10^{14}\; exp[-(1200 {\pm} 10)/T].$ The activation energies obtained from this study represent the same trend as with the carbon analogues, while this trend was not found with respect to the bond dissociation energies among silicon compound homologues. These anomalous behaviors were interpreted in terms of electronic effects and of the structural differences between these compounds.

Sharing and Privacy in PHRs: Efficient Policy Hiding and Update Attribute-based Encryption

  • Liu, Zhenhua;Ji, Jiaqi;Yin, Fangfang;Wang, Baocang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.323-342
    • /
    • 2021
  • Personal health records (PHRs) is an electronic medical system that enables patients to acquire, manage and share their health data. Nevertheless, data confidentiality and user privacy in PHRs have not been handled completely. As a fine-grained access control over health data, ciphertext-policy attribute-based encryption (CP-ABE) has an ability to guarantee data confidentiality. However, existing CP-ABE solutions for PHRs are facing some new challenges in access control, such as policy privacy disclosure and dynamic policy update. In terms of addressing these problems, we propose a privacy protection and dynamic share system (PPADS) based on CP-ABE for PHRs, which supports full policy hiding and flexible access control. In the system, attribute information of access policy is fully hidden by attribute bloom filter. Moreover, data user produces a transforming key for the PHRs Cloud to change access policy dynamically. Furthermore, relied on security analysis, PPADS is selectively secure under standard model. Finally, the performance comparisons and simulation results demonstrate that PPADS is suitable for PHRs.

Fast and Accurate Single Image Super-Resolution via Enhanced U-Net

  • Chang, Le;Zhang, Fan;Li, Biao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.4
    • /
    • pp.1246-1262
    • /
    • 2021
  • Recent studies have demonstrated the strong ability of deep convolutional neural networks (CNNs) to significantly boost the performance in single image super-resolution (SISR). The key concern is how to efficiently recover and utilize diverse information frequencies across multiple network layers, which is crucial to satisfying super-resolution image reconstructions. Hence, previous work made great efforts to potently incorporate hierarchical frequencies through various sophisticated architectures. Nevertheless, economical SISR also requires a capable structure design to balance between restoration accuracy and computational complexity, which is still a challenge for existing techniques. In this paper, we tackle this problem by proposing a competent architecture called Enhanced U-Net Network (EUN), which can yield ready-to-use features in miscellaneous frequencies and combine them comprehensively. In particular, the proposed building block for EUN is enhanced from U-Net, which can extract abundant information via multiple skip concatenations. The network configuration allows the pipeline to propagate information from lower layers to higher ones. Meanwhile, the block itself is committed to growing quite deep in layers, which empowers different types of information to spring from a single block. Furthermore, due to its strong advantage in distilling effective information, promising results are guaranteed with comparatively fewer filters. Comprehensive experiments manifest our model can achieve favorable performance over that of state-of-the-art methods, especially in terms of computational efficiency.

An Analysis of the Operation Status of Single Accreditation System on Engineering Education Accreditation (공학교육인증에서 단일인증제 운영 현황 분석)

  • Kim, Jung-gyu;Yang, Sung-chae;Doh, Yang-hoi
    • Journal of Engineering Education Research
    • /
    • v.23 no.6
    • /
    • pp.33-39
    • /
    • 2020
  • This paper analyzes the current state of operation and the effect of introduction of the single accreditation system, which was fully introduced in 2016 by the Accreditation Board of Engineering Education Korea(ABEEK). Because Engineering Education Accreditation are program-based certification, and department operates accreditation programs and non-accreditation programs, if a student under the accreditation program fails to graduate from the accreditation program, he or she must complete the transfer to a non-accreditation program at least one year before graduation. Since 2016, when the single accreditation system was introduced, freshmen of department have allowed non-accreditation graduation only for reasons prescribed separately by the program's regulations or guidelines. In order to identify and reflect the operational status and effectiveness of the single accreditation system in the 2020 accreditation review, ABEEK conducted a complete survey on the current status of graduates in February 2020 among 157 programs at 26 universities receiving the 2020 accreditation review. The results of this study are expected to be used as basic data for the improvement of the single accreditation system in the future by examining the effects of the single accreditation system implemented after 2016 and considering the problems at the site due to the introduction of the single accreditation system of programs that ABEEK had not previously expected.

Safe clinical photography: best practice guidelines for risk management and mitigation

  • Chandawarkar, Rajiv;Nadkarni, Prakash
    • Archives of Plastic Surgery
    • /
    • v.48 no.3
    • /
    • pp.295-304
    • /
    • 2021
  • Clinical photography is an essential component of patient care in plastic surgery. The use of unsecured smartphone cameras, digital cameras, social media, instant messaging, and commercially available cloud-based storage devices threatens patients' data safety. This paper Identifies potential risks of clinical photography and heightens awareness of safe clinical photography. Specifically, we evaluated existing risk-mitigation strategies globally, comparing them to industry standards in similar settings, and formulated a framework for developing a risk-mitigation plan for avoiding data breaches by identifying the safest methods of picture taking, transfer to storage, retrieval, and use, both within and outside the organization. Since threats evolve constantly, the framework must evolve too. Based on a literature search of both PubMed and the web (via Google) with key phrases and child terms (for PubMed), the risks and consequences of data breaches in individual processes in clinical photography are identified. Current clinical-photography practices are described. Lastly, we evaluate current risk mitigation strategies for clinical photography by examining guidelines from professional organizations, governmental agencies, and non-healthcare industries. Combining lessons learned from the steps above into a comprehensive framework that could contribute to national/international guidelines on safe clinical photography, we provide recommendations for best practice guidelines. It is imperative that best practice guidelines for the simple, safe, and secure capture, transfer, storage, and retrieval of clinical photographs be co-developed through cooperative efforts between providers, hospital administrators, clinical informaticians, IT governance structures, and national professional organizations. This would significantly safeguard patient data security and provide the privacy that patients deserve and expect.

High-Efficiency DC-DC Converter using the Multi-Resonant-Circuit (다중공진회로를 이용한 고효율 DC-DC 컨버터)

  • Jeong, Gang-Youl
    • Journal of IKEEE
    • /
    • v.25 no.1
    • /
    • pp.218-228
    • /
    • 2021
  • This paper presents the high-efficiency DC-DC converter using the multi-resonant-circuit. The proposed converter has the power topology of half-bridge and utilizes the multi-resonant-circuit that is composed of 2 inductors (LL) and 1 capacitor (C) to achieve high-efficiency. The multi-resonant-circuit forms each resonant circuit of series circuit type with each resonant frequency, according to the operation modes. This paper first describes the operation pirinciples of proposed converter by the operation modes and steady-state fundamental approximation modelling. Then it shows a design example of the proposed converter based on the principles. And it is validated that the proposed converter has the operation characteristics of high-efficiency DC-DC power conversion through the experimental results of prototype converter implemented by the designed circuit parameters.