scholarly journals Prototype Material for New Strategy of Photon Energy Storage

Inorganics ◽  
2020 ◽  
Vol 8 (10) ◽  
pp. 53
Author(s):  
Toshio Naito

The smart utilization of photons is paid global attention from the viewpoint of renewable energy and information technology. However, it is still impossible to store photons as batteries and condensers do for electrons. All the present technologies utilize (the energy of) photons in situ, such as solar panels, or in spontaneous relaxation processes, such as photoluminescence. If we can store the energy of photons over an arbitrary period and utilize them on demand, not only we will make an innovative progress in energy management, but we will also be able to replace a part of electrons by photons in the information technology for more efficient performance. In this article, we review a prototype of such a material including the current status of related research as well as where we are heading for.

2020 ◽  
Vol 7 (1) ◽  
pp. 17-22
Author(s):  
Shariat Ullah ◽  
Lal Badshah ◽  
Asghar Ali ◽  
Noor Muhammad

This study was conducted from March 2017 to August 2018, to enumerate the quantitative attributes and current status of medicinal plants of Sheen Ghar Valley, District Dir Lower, Pakistan. A total of 51 species were documented for their medicinal uses. These plants belonged to 31 families. Results of this study revealed that leaves were the frequently used part (50%), followed by whole plants (only 30%) in curing different ailments. Many plants were found to be having multiple uses. Based on family importance value (FIV), Lamiaceae was the leading plant family (126.30) followed by Violaceae (55.81), while highest relative frequency of citation (RFC) was noted for Viola canescens (0.558) followed by Olea europaea (0.523). Conservation study revealed that 24 species (47%) were vulnerable, 22 species (43%) were rare and 4 species (8%) were noted as infrequent. Following IUCN standards for conservation, one species i.e. Hypericum perforatum was declared dominant. This study recommends immediate ex-situ and in-situ conservation programme for protecting the plant wealth of the locality.


Science ◽  
2018 ◽  
Vol 361 (6403) ◽  
pp. 690-693 ◽  
Author(s):  
Rebeca Ribeiro-Palau ◽  
Changjian Zhang ◽  
Kenji Watanabe ◽  
Takashi Taniguchi ◽  
James Hone ◽  
...  

In heterostructures of two-dimensional materials, electronic properties can vary dramatically with relative interlayer angle. This effect makes it theoretically possible to realize a new class of twistable electronics in which properties can be manipulated on demand by means of rotation. We demonstrate a device architecture in which a layered heterostructure can be dynamically twisted in situ. We study graphene encapsulated by boron nitride, where, at small rotation angles, the device characteristics are dominated by coupling to a long-wavelength moiré superlattice. The ability to investigate arbitrary rotation angle in a single device reveals features of the optical, mechanical, and electronic response in this system not captured in static rotation studies. Our results establish the capability to fabricate twistable electronic devices with dynamically tunable properties.


Author(s):  
Theodosios Tsiakis ◽  
Theodoros Kargidis ◽  
Aristeidis Chatzipoulidis

Most industries have been influenced in different ways by e-commerce, and the banking industry is no exception. Particularly, banks are embracing electronic banking (e-banking) as a service to reach a wider market share, increase customer satisfaction and lower operational costs. This increased supply and demand in e-banking services has caused not only opportunities but also risks. The need to manage and regulate those risks calls for a sound Information Technology Security Governance (ITSG) program as means to deliver value business and mitigate Information Technology (IT) risks. In this regard, the chapter’s objectives are to explore, evaluate, and compare the current status and characteristics of Information Security Governance (ISG) approaches for e-banking. Therefore, the authors focus on an analysis of reputed best standards, guidelines on governance, risk management methods, and internal controls currently used for e-banking as means to research which satisfies best ISG objectives. Results show that banks should not be restricted to currently used approaches to ISG for e-banking but should take into consideration benefits and shortcomings other approaches possess. In this regard, the authors propose an ITSG framework for e-banking as a continuous process for assuring ISG objectives. They also highlight the importance of consistent measurement of metrics of ITSG performance with the aid of security content automation protocol.


Author(s):  
Hamid R. Nemati ◽  
Christopher D. Barko

An increasing number of organizations are struggling to overcome “information paralysis” — there is so much data available that it is difficult to understand what is and is not relevant. In addition, managerial intuition and instinct are more prevalent than hard facts in driving organizational decisions. Organizational Data Mining (ODM) is defined as leveraging data mining tools and technologies to enhance the decision-making process by transforming data into valuable and actionable knowledge to gain a competitive advantage (Nemati & Barko, 2001). The fundamentals of ODM can be categorized into three fields: Artificial Intelligence (AI), Information Technology (IT), and Organizational Theory (OT), with OT being the core differentiator between ODM and data mining. We take a brief look at the current status of ODM research and how a sample of organizations is benefiting. Next we examine the evolution of ODM and conclude our chapter by contemplating its challenging yet opportunistic future.


Author(s):  
Erkki Harjula ◽  
Jani Hautakorpi ◽  
Nicklas Beijar ◽  
Mika Ylianttila

Due to the increasing popularity of Peer-to-Peer (P2P) computing, the information technology industry and standardization organizations have started to direct their efforts on standardizing P2P algorithms and protocols. The Internet Engineering Task Force (IETF) has recently formed the Peer-to-Peer SIP (P2PSIP) working group for enabling serverless operation of Session Initiation Protocol (SIP). This chapter introduces the P2PSIP by presenting its background and purpose, operational principles, current status, and application areas. The focus is on the challenges and problem areas from the viewpoint of standardization and related research. The mobile- and heterogeneous environments are considered with special care. The authors provide a glance to the existing and emerging solutions that may be used in tackling the mentioned challenges and thus paving the way for successful deployment of P2PSIP in mobile environments.


2015 ◽  
pp. 1370-1414
Author(s):  
Jaydip Sen

Cloud computing transforms the way Information Technology (IT) is consumed and managed, promising improved cost efficiencies, accelerated innovation, faster time-to-market, and the ability to scale applications on demand (Leighton, 2009). According to Gartner, while the hype grew exponentially during 2008 and continued since, it is clear that there is a major shift towards the cloud computing model and that the benefits may be substantial (Gartner Hype-Cycle, 2012). However, as the shape of cloud computing is emerging and developing rapidly both conceptually and in reality, the legal/contractual, economic, service quality, interoperability, security, and privacy issues still pose significant challenges. In this chapter, the authors describe various service and deployment models of cloud computing and identify major challenges. In particular, they discuss three critical challenges: regulatory, security, and privacy issues in cloud computing. Some solutions to mitigate these challenges are also proposed along with a brief presentation on the future trends in cloud computing deployment.


Sign in / Sign up

Export Citation Format

Share Document