• Title/Summary/Keyword: Scarcity

Search Result 537, Processing Time 0.023 seconds

Application of Cu-loaded One-dimensional TiO2 Nanorods for Elevated Photocatalytic Environmental Friendly Hydrogen Production

  • Kim, Dong Jin;Tonda, Surendar;Jo, Wan-Kuen
    • Journal of Environmental Science International
    • /
    • v.30 no.1
    • /
    • pp.57-67
    • /
    • 2021
  • Photocatalytic green energy H2 production utilizing inexhaustible solar energy has been considered as a potential solution to problems of energy scarcity and environmental contamination. However, the design of a cost-effective photocatalyst using simple synthesis methodology is still a grand challenge. Herein, a low-cost transition metal, Cu-loaded one-dimensional TiO2 nanorods (Cu/TNR) were fabricated using an easy-to-use synthesis methodology for significant H2 production under simulated solar light. X-ray photoelectron spectral studies and electron microscopy measurements provide evidence to support the successful formation of the Cu/TNR catalyst under our experimental conditions. UV-vis DRS studies further demonstrate that introducing Cu on the surface of TNR substantially increases light absorption in the visible range. Notably, the Cu/TNR catalyst with optimum Cu content, achieved a remarkable H2 production with a yield of 39,239 µmol/g after 3 h of solar light illumination, representing 7.4- and 27.7-fold enhancements against TNR and commercial P25, respectively. The notably improved H2 evolution activity of the target Cu/TNR catalyst was primarily attributed to its excellent separation and efficiently hampered recombination of photoexcited electron-hole pairs. The Cu/TNR catalyst is, therefore, a potential candidate for photocatalytic green energy applications.

Theoretical Interdisciplinarity between Psychological Marketing Practice and Woman's Narcissism in Distribution Channels

  • HAN, Soomin
    • Journal of Distribution Science
    • /
    • v.18 no.12
    • /
    • pp.101-109
    • /
    • 2020
  • Purpose: This study points out that psychological marketing practice can align to narcissism among women through showing urgency and scarcity. While women are competitive, jealous, and attention seeking, marketers can offer limited-time offers to increase the urge of customers to purchase. Research design, data, and methodology: To conduct a content analysis, the present author obtained data from various databases such as ABI/INFORM, EBSCO/ EBSCO, ProQuest, and EBSCO. Ultimately, this study investigated both latent and manifest themes of narcissism and psychological marketing concepts to find solutions that leaders can use to initiate change in organizations. Results: The current study suggests that narcissistic women insist on having the best things but still have the inability to acknowledge other people's feelings. Therefore, psychological marketing can utilize such traits to ensure that the quality of their commodities matches their promises during marketing and that their customer's needs are not infringed at the expense of another customer's needs Conclusions: One of the implications of narcissism in marketing provides is that brands can easily gravitate towards litigations especially amidst unhealthy competitions. In the process of getting customers to acknowledge another brand as a better option, the competition may stir corporate conflict.

Breast Tumor Cell Nuclei Segmentation in Histopathology Images using EfficientUnet++ and Multi-organ Transfer Learning

  • Dinh, Tuan Le;Kwon, Seong-Geun;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.8
    • /
    • pp.1000-1011
    • /
    • 2021
  • In recent years, using Deep Learning methods to apply for medical and biomedical image analysis has seen many advancements. In clinical, using Deep Learning-based approaches for cancer image analysis is one of the key applications for cancer detection and treatment. However, the scarcity and shortage of labeling images make the task of cancer detection and analysis difficult to reach high accuracy. In 2015, the Unet model was introduced and gained much attention from researchers in the field. The success of Unet model is the ability to produce high accuracy with very few input images. Since the development of Unet, there are many variants and modifications of Unet related architecture. This paper proposes a new approach of using Unet++ with pretrained EfficientNet as backbone architecture for breast tumor cell nuclei segmentation and uses the multi-organ transfer learning approach to segment nuclei of breast tumor cells. We attempt to experiment and evaluate the performance of the network on the MonuSeg training dataset and Triple Negative Breast Cancer (TNBC) testing dataset, both are Hematoxylin and Eosin (H & E)-stained images. The results have shown that EfficientUnet++ architecture and the multi-organ transfer learning approach had outperformed other techniques and produced notable accuracy for breast tumor cell nuclei segmentation.

Analysis of Unwanted Fire Alarm Signal Pattern of Smoke / Temperature Detector in the IoT-Based Fire Detection System (IoT 기반 화재탐지시스템의 연기 및 온도감지기 비화재보 신호 패턴 분석)

  • Park, Seunghwan;Kim, Doo-Hyun;Kim, Sung-Chul
    • Journal of the Korean Society of Safety
    • /
    • v.37 no.2
    • /
    • pp.69-75
    • /
    • 2022
  • Fire-alarm systems are safety equipment that facilitate rapid evacuation and early suppression in case of fire. It is highly desirable that fire-alarm systems have low false-alarm rates and are thus reliable. Until now, researchers have attempted to improve detector performance by applying new technologies such as IoT. To this end, IoT-based fire-detection systems have been developed. However, due to scarcity of large-scale operational data, researchers have barely studied malfunctioning in fire-alarm systems or attempted to reduce false-alarm rates in these systems. In this study, we analyzed false-alarm rates of smoke/temperature detectors and unwanted fire-alarm signal patterns at K institution, where Korea's largest IoT-based fire-detection system operates. After analyzing the fire alarm occurrences at the institution for five years, we inferred that the IoT-based fire-detection system showed lower false-alarm rates compared to the automatic fire-detection equipment. We analyzed the detection pattern by dividing it into two parts: normal operation and unwanted fire alarms. When a specific signal pattern was filtered out, the false-alarm rate was reduced to 66.9% in the smoke detector and to 46.9% in the temperature detector.

Availability Analysis on the Multi-Effect Distillation and Adsorptive Desalination Process (다중효용-흡착 방식 담수화 시스템의 가용도 분석)

  • Noh, Hyon-Jeong;Lee, Ho-Saeng;Ji, Ho;Kang, Kwan-Gu
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.24 no.6_2
    • /
    • pp.827-839
    • /
    • 2021
  • Due to climate change and population growth, water scarcity is getting worse all over the world. Among various methods for desalination of seawater, the Multi-Effect Adsorptive Desalination method, which combines the existing Multi-Effect Desalination method and the Adsorptive Desalination method and can produce high-concentration-high-concentration freshwater, is emerging. Because the Multi-Effect Adsorptive Desalination method combines the two different methods, the system becomes complicated and the possibility of failure increases. Therefore, in this study, availability analysis was performed on the Multi-Effect Adsorptive Desalination process. A total of four types of reliability block diagrams were presented, and availability analysis was conducted based on them. The first form of a reliability block diagram is configured in series without any redundancy. The availability of the reliability block diagram composed of the serial system was found to be lower than the required availability. In order to increase availability, the redundancy to pumps and boiler are added to system. As a result of availability analysis, it was confirmed that designing desalination systems with redundancy to pump meets the 93% availability, which is typically required availability for various plants.

An Efficient Machine Learning-based Text Summarization in the Malayalam Language

  • P Haroon, Rosna;Gafur M, Abdul;Nisha U, Barakkath
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.6
    • /
    • pp.1778-1799
    • /
    • 2022
  • Automatic text summarization is a procedure that packs enormous content into a more limited book that incorporates significant data. Malayalam is one of the toughest languages utilized in certain areas of India, most normally in Kerala and in Lakshadweep. Natural language processing in the Malayalam language is relatively low due to the complexity of the language as well as the scarcity of available resources. In this paper, a way is proposed to deal with the text summarization process in Malayalam documents by training a model based on the Support Vector Machine classification algorithm. Different features of the text are taken into account for training the machine so that the system can output the most important data from the input text. The classifier can classify the most important, important, average, and least significant sentences into separate classes and based on this, the machine will be able to create a summary of the input document. The user can select a compression ratio so that the system will output that much fraction of the summary. The model performance is measured by using different genres of Malayalam documents as well as documents from the same domain. The model is evaluated by considering content evaluation measures precision, recall, F score, and relative utility. Obtained precision and recall value shows that the model is trustable and found to be more relevant compared to the other summarizers.

Throughput and Interference for Cooperative Spectrum Sensing: A Malicious Perspective

  • Gan, Jipeng;Wu, Jun;Zhang, Jia;Chen, Zehao;Chen, Ze
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.11
    • /
    • pp.4224-4243
    • /
    • 2021
  • Cognitive radio (CR) is a feasible intelligent technology and can be used as an effective solution to spectrum scarcity and underutilization. As the key function of CR, cooperative spectrum sensing (CSS) is able to effectively prevent the harmful interference with primary users (PUs) and identify the available spectrum resources by exploiting the spatial diversity of multiple secondary users (SUs). However, the open nature of the cognitive radio networks (CRNs) framework makes CSS face many security threats, such as, the malicious user (MU) launches Byzantine attack to undermine CRNs. For this aim, we make an in-depth analysis of the motive and purpose from the MU's perspective in the interweave CR system, aiming to provide the future guideline for defense strategies. First, we formulate a dynamic Byzantine attack model by analyzing Byzantine behaviors in the process of CSS. On the basis of this, we further make an investigation on the condition of making the fusion center (FC) blind when the fusion rule is unknown for the MU. Moreover, the throughput and interference to the primary network are taken into consideration to evaluate the impact of Byzantine attack on the interweave CR system, and then analyze the optimal strategy of Byzantine attack when the fusion rule is known. Finally, theoretical proofs and simulation results verify the correctness and effectiveness of analyses about the impact of Byzantine attack strategy on the throughput and interference.

Identification and Categorization of Jul Designs and Patterns in the Sāsānian Period

  • Davood, SHADLOU;Amir, SHADLOU
    • Acta Via Serica
    • /
    • v.7 no.2
    • /
    • pp.39-64
    • /
    • 2022
  • Ancient Iranians highly esteemed the horse and horse tacks, one of which is the jul (saddlecloth). It is a felt, sheepskin, or woven pad placed between the horse's back and saddle. The aim of this paper is to identify and categorize jul designs in the Sāsānian period. The research questions are about the variety of jul designs and how to categorize them. This is fundamental research and the method is descriptive and analytical. Neither a jul nor a saddle-cover remains from the Sāsānian period, therefore the statistical population includes all available items, such as metal and stone items and parget and plasterworks, in which juls are recognizable. Due to the scarcity of such items, all the available samples were studied; so the sampling method is a total enumeration. This is documentary research by means of note-taking and using reliable websites; the data has been analyzed qualitatively. The results show that jul designs were not diverse in the Sāsānian period. All-over designs were dominant. In terms of pattern types, these designs are classified into five groups, each of which has its own formal and aesthetic characteristics: all-over design with a four-petal flower pattern, allover design with a checkered pattern, all-over design with a spotted pattern, allover design with a tiger stripe pattern, and all-over design with a zigzag pattern.

Evaluation of time-dependent deflections on balanced cantilever bridges

  • Rincon, Luis F.;Viviescas, Alvaro;Osorio, Edison;Riveros-Jerez, Carlos A.;Lozano-Galant, Jose Antonio
    • Computers and Concrete
    • /
    • v.28 no.5
    • /
    • pp.487-495
    • /
    • 2021
  • The use of prestressed concrete box girder bridges built by segmentally balanced cantilevers has bloomed in the last decades due to its significant structural and construction advantages in complex topographies. In Colombia, this typology is the most common solution for structures with spans ranging of 80-200 m. Despite its popularity, excessive deflections in bridges worldwide evidenced that time-dependent effects were underestimated. This problem has led to the constant updating of the creep and shrinkage models in international code standards. Differences observed between design processes of box girder bridges of the Colombian code and Eurocode, led to the need for a validation of in-service status of these structures. This study analyzes the long-term behavior of the Tablazo bridge with data scarcity. The measured leveling of this structure is compared with a finite-element model that consider the most widely used creep and shrinkage models in the literature. Finally, an adjusted model evidence excessive deflection on the bridge after six years. Monitoring of this bridge typology in Colombia and updating of the current design code is recommended.

Food Purchasing Platform using Metabus-based Multinational Student Community (메타버스 기반 다국가 유학생 커뮤니티를 이용한 음식 구매 플랫폼)

  • Kim, Sea Woo
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.5
    • /
    • pp.259-264
    • /
    • 2022
  • The food purchase platform using the metaverse-based multinational student community is a metaverse purchase platform using the multinational food preference community. Through the use of this platform, it is expected to establish a community of multinational international students, a community of international student sellers, and foster a new industry of metaverse purchase platforms. The metaverse platform guarantees anonymity, is space-time-free, and can freely communicate with avatars to create a second business communication. In addition, by selling many kinds of favorite foods in small quantities, it customizes scarcity while reducing the burden of providing services and making it easier for international students to participate.This platform can enhance to more business opportunities using community manpower.