• Title/Summary/Keyword: Prompting

Search Result 134, Processing Time 0.026 seconds

Agile Software Development Methodologies Evaluation Research Analysis: A review

  • Sadaf Niaz;Babar Hayat
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.103-110
    • /
    • 2024
  • In the quickly developing world, the idea of the conventional advancement needs to advance[1]. When applied to the advanced work environment, the conventional strategies give as much damage as they do great. Tragically, an absence of versatility in the customary techniques has prompted an inflexible work structure that is truly not viable with the present business. The Agile technique is, subsequently, a more adequate practice, in view of creating programming at a faster speed, while as yet looking after proficiency. The coordinated programming improvement strategies are concentrated in this paper. As per study results, Agile software development group needs solid client association; great light-footed task the executives' measures; item proprietor expands business esteem conveyed by group and need and draw in partners; great deft designing procedures or practices; and great advancements and advancement apparatuses[2]. This examination has suggestions for positive social change since associations that comprehend the basic components might have the option to improve project the executives' systems and money saving advantages prompting higher effectiveness, productivity, and efficiency hence profiting the board, representatives, and client. This survey paper incorporates various methodologies of Agile and their analysis.

A review on gold nanowire based SERS sensors for chemicals and biological molecules

  • Rashida Akter;Hyuck Jin Lee;Toeun Kim;Jin Woo Choi;Hongki Kim
    • Analytical Science and Technology
    • /
    • v.37 no.4
    • /
    • pp.201-210
    • /
    • 2024
  • Surface-enhanced Raman scattering (SERS) has emerged as a powerful technique for detecting and analyzing chemical and biological molecules at ultra-low concentrations. The effectiveness of SERS largely depends on structures with sub-10 nm gaps, prompting the proposal of various nanostructures as efficient SERS-active platforms. Among these, single-crystalline gold nanowires (AuNWs) are particularly promising due to their large dielectric constants, well-defined geometries, atomically smooth surfaces, and surface plasmon resonance across the visible spectrum, which produce strong SERS enhancements. This review comprehensively explores the synthesis, functionalization, and application of Au NWs in SERS. We discuss various methods for synthesizing AuNWs, including the vapor transport method, which influences their morphological and optical properties. We also review practical applications in chemical and biosensing, showcasing the adaptability of Au NWs-based SERS platforms in detecting a range of analytes, from environmental pollutants to biological markers. The review concludes with a discussion on future perspectives that aim to enhance sensor performance and broaden application domains, highlighting the potential of these sensors to revolutionize diagnostics and environmental monitoring. This review underscores the transformative impact of AuNW-based SERS sensors in analytical chemistry, environmental science, and biomedical diagnostics, paving the way for next-generation sensing technologies.

Network Traffic-Based Access Control Using Software-Defined Perimeter (소프트웨어 정의 경계를 이용한 네트워크 트래픽 기반 동적 접근 제어)

  • Seo-Yi Kim;Il-Gu Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.735-746
    • /
    • 2024
  • The rapid advancement of computer technology has necessitated a safer user environment, prompting the adoption of the zero trust model, which verifies all internal and external network activities. This paper proposes an efficient network traffic data-based dynamic access control method leveraging Software-Defined Perimeter (SDP) capabilities to implement zero trust and address latency issues. According to the performance evaluation results, the detection performance of the proposed scheme is similar to that of conventional schemes, but the dataset size was reduced by 62.47%. Additionally, by proposing an adaptive zero trust verification approach, the dataset size and verification time were reduced by 83.9% and 9.1%, respectively, while maintaining similar detection performance to conventional methods.

Ultrasound Imaging in Active Surveillance of Small, Low-Risk Papillary Thyroid Cancer

  • Sangeet Ghai;David P Goldstein;Anna M Sawka
    • Korean Journal of Radiology
    • /
    • v.25 no.8
    • /
    • pp.749-755
    • /
    • 2024
  • The recent surge in the incidence of small papillary thyroid cancers (PTCs) has been linked to the widespread use of ultrasonography, thereby prompting concerns regarding overdiagnosis. Active surveillance (AS) has emerged as a less invasive alternative management strategy for low-risk PTCs, especially for PTCs measuring ≤1 cm in maximal diameter. Recent studies report low disease progression rates of low-risk PTCs ≤1 cm under AS. Ongoing research is currently exploring the feasibility of AS for larger PTCs (<20 mm). AS protocols include meticulous ultrasound assessment, emphasis on standardized techniques, and a multidisciplinary approach; they involve monitoring the nodules for size, growth, potential extrathyroidal extension, proximity to the trachea and recurrent laryngeal nerve, and potential cervical nodal metastases. The criteria for progression, often defined as an increase in the maximum diameter of the PTC, warrant a review of precision and ongoing examinations. Challenges exist regarding the reliability of volume measurements for defining PTC disease progression. Although ultrasonography plays a pivotal role, challenges in assessing progression and minor extrathyroidal extension underscore the importance of a multidisciplinary approach in disease management. This comprehensive overview highlights the evolving landscape of AS for PTCs, emphasizing the need for standardized protocols, meticulous assessments, and ongoing research to inform decision-making.

Metabolic Flux Distribution for $\gamma$-Linolenic Acid Synthetic Pathways in Spirulina platensis

  • Meechai Asawin;Pongakarakun Siriluk;Deshnium Patcharaporn;Cheevadhanarak Supapon;Bhumiratana Sakarindr
    • Biotechnology and Bioprocess Engineering:BBE
    • /
    • v.9 no.6
    • /
    • pp.506-513
    • /
    • 2004
  • Spirulina produces $\gamma$-linolenic acid (GLA), an important pharmaceutical substance, in a relatively low level compared with fungi and plants, prompting more research to improve its GLA yield. In this study, metabolic flux analysis was applied to determine the cellular metabolic flux distributions in the GLA synthetic pathways of two Spiru/ina strains, wild type BP and a high­GLA producing mutant Z19/2. Simplified pathways involving the GLA synthesis of S. platensis formulated comprise of photosynthesis, gluconeogenesis, the pentose phosphate pathway, the anaplerotic pathway, the tricarboxylic cycle, the GLA synthesis pathway, and the biomass syn­thesis pathway. A stoichiometric model reflecting these pathways contains 17 intermediates and 22 reactions. Three fluxes - the bicarbonate (C-source) uptake rate, the specific growth rate, and the GLA synthesis rate - were measured and the remaining fluxes were calculated using lin­ear optimization. The calculation showed that the flux through the reaction converting acetyl­CoA into malonyl-CoA in the mutant strain was nearly three times higher than that in the wild­type strain. This finding implies that this reaction is rate controlling. This suggestion was sup­ported by experiments, in which the stimulating factors for this reaction $(NADPH\;and\;MgCl_{2})$ were added into the culture medium, resulting in an increased GLA-synthesis rate in the wild type strain.

Criminal liability of Internet Service Provider who leave illegal positing to take its own course (인터넷불법게시물을 방임하는 인터넷서비스제공자의 형사책임)

  • Yoo, In-Chang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.8
    • /
    • pp.163-170
    • /
    • 2012
  • Nowadays Internet is the greatest and most participating media of prompting expression with 37 million users in Korea. Internet enables collective communications between social members and contributes to form sound public opinions and to develop democracy while it has negative aspect to distribute massively crime by illegal posting which is forbidden by the Criminal Act. Criminal actors who involve to diffuse information on Internet consist of three categories of information provider, user and internet service provider. Illegal posting generated on Internet is originated from IP and the criminal regulation on it is useless and meaningless because of its countless of users and ambiguous boundary with liberty for expression. Accordingly, the only criminal policy means to prevent danger by illegal posting on Internet is to regulate ISP which saves illegal posting and mediates contacts among users. In spite of it, legislation to regulate ISP is unprepared. The prudent legislative review should be done. And it should be accordance with the doctrines of propriety and vagueness of the principle of "nulla poena sine lege".

Growth Effect and Nutrient Uptake by Application Interval of Developed Slurry Composting and Biofiltration (DSCB) Liquid Fertilizer on Kentucky Bluegrass (개량 가축분뇨발효액비의 시비주기에 따른 켄터키블루그래스의 생육효과 및 양분흡수)

  • Ham, Suon-Kyu;Kim, Young-Sun
    • Weed & Turfgrass Science
    • /
    • v.3 no.4
    • /
    • pp.362-369
    • /
    • 2014
  • A developed slurry composting and biofiltration (DSCB) liquid fertilizer could be used for eco-friendly turfgrass management in golf course. This study was conducted to evaluate the growth effect of application intervals of DSCB in Kentucky bluegrass based on turf color index, chlorophyll index, clipping yield and uptake and availability of nutrient. Treatments were designed as follows; non-fertilizer (NF), control (CF) and DSCB treatments which were applied a every 15 days (DSCB), every 30 days (2DSCB) and 60 days (4DSCB-1: April, June, August; 4DSCB-2: May, July, September). Turf color indexes of DSCB and 2DSCB were higher than CF, but these chlorophyll indexes similar to CF. The clipping yield and uptake and availability rate of nitrogen and potassium in turfgrass were increased in 2DSCB. These results suggested that application of DSCB improved turf quality and growth by prompting an uptake and availability of nutrients in Kentucky bluegrass and its application interval was 1time per month.

2020 Taal Volcano Eruption (필리핀 따알 화산의 2020년 분화 해설)

  • Yun, Sung-Hyo;Chang, Cheolwoo
    • Korean Journal of Mineralogy and Petrology
    • /
    • v.33 no.3
    • /
    • pp.293-305
    • /
    • 2020
  • An eruption of Taal Volcano in the Philippines began on January 12, 2020. The Philippine Institute of Volcanology and Seismology (PHIVOLCS) subsequently issued an Alert Level 4, indicating that "a hazardous explosive eruption is possible within hours to days." It was a phreatic eruption and phreatomagmatic eruption from the main crater that spewed ashes to Calabarzon, Metro Manila, some parts of Central Luzon, and Pangasinan in Ilocos Region, resulting in the suspension of classes, work schedules, and flights. By January 26, 2020, PHIVOLCS observed inconsistent, but decreasing volcanic activity in Taal, prompting the agency to downgrade its warning to Alert Level 3. After February 14, Alert status was set to Level 2 because of overall decreasing trend of volcanic activities, but it does not mean that the threat of an eruption has disappeared. In addition, the Alert Level can be raised to Alert Level 3 if there is a symptom of increasing unrest at any time.

Semantic characteristics of men's cosmetics brand names (남성화장품 브랜드명의 의미론적 특성)

  • Rha, Soo-Im
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.20 no.1
    • /
    • pp.49-59
    • /
    • 2018
  • The purpose of this research is to study the semantic characteristics of men's cosmetics brand names by analyzing 51 brand names in the domestic market, so as to find ways to develop strategic brand names. In order to investigate this area, the study looked at the Interbrand Company's Name Spectrum, and the results are as follows. The men's cosmetics brand names turned out to be freestanding brand names, descriptive brand names, and associative brand names, in that order. The freestanding brand names were found to be the initial combinations of the words that have the desired benefits in the concepts of the pertinent brands; in other words, coined brand names that were made by synthesizing words such as nice men, naturalism, eco-friendly plant-derived materials and ideal skin. Associative brand names are generally used to express the effect of enhancing brand awareness by considering the phonetic image of the word or prompting a masculine and favorable image. Descriptive brand names use language symbols such as men, homme, man, monsieur and gentle to represent specific business and product categories for men, and also use stem, plant, flower, skin, beauty, moisturizing, tosowoong and so on to provide the properties and beneficial information related to the products. In conclusion, the men's cosmetics brand names embody an important factor that symbolizes the concepts, functions or features of the brand, and there is a need for men's cosmetic brands to develop more unique and distinctive brand names to promote their brand names as constitutional factors that can build brand power and strengthen brand image.

A study on the detection of DDoS attack using the IP Spoofing (IP 스푸핑을 통한 DDoS 공격 탐지 방안에 대한 연구)

  • Seo, Jung-Woo;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.147-153
    • /
    • 2015
  • Since the DoS(Denial of Service) attack is still an important vulnerable element in many web service sites, sites including public institution should try their best in constructing defensive systems. Recently, DDoS(Distributed Denial of Service) has been raised by prompting mass network traffic that uses NTP's monlist function or DoS attack has been made related to the DNS infrastructure which is impossible for direct defense. For instance, in June 2013, there has been an outbreak of an infringement accident where Computing and Information Agency was the target. There was a DNS application DoS attack which made the public institution's Information System impossible to run its normal services. Like this, since there is a high possibility in having an extensive damage due to the characteristics of DDoS in attacking unspecific information service and not being limited to a particular information system, efforts have to be made in order to minimize cyber threats. This thesis proposes a method for using TTL (Time To Live) value in IP header to detect DDoS attack with IP spoofing, which occurs when data is transmitted under the agreed regulation between the international and domestic information system.