3,011,862 research outputs found
Bio-Fertilizers via Co-Digestion: a Review
In diversifying the economies of most oil producing countries especially in regions with arable lands, Agriculture becomes the next choice aside mineral deposits. This has led to a search for an alternative to inorganic fertilizers, the alternatives are the biofertilizers. The paper discussed the classification of the anaerobic co-digestion process based on the application of inoculants to the biodigester feedstock to speed up the digestion process and the absence of inoculants. Biodigester feedstock also looked at the various mechanisms in the digestion process which includes hydrolysis, acidogenesis, acetogenesis, and methanogenesis, the pathways were illustrated with chemical equations and various microorganisms that take part in the anaerobic process were mentioned and tabulated. The types of biofertilizers, merits, and demerits, the difference between biofertilizers and organic fertilizers were comprehensively discussed. Current trends on the application of the co-digestion technique to improve the yield, nutrient, and safety of biofertilizers and also the recent progression on the technique were mentioned
PuLSE-I: Deriving instances from a product line infrastructure
Reusing assets during application engineering promises to improve the efficiency of systems development. However, in order to benefit from reusable assets, application engineering processes must incorporate when and how to use the reusable assets during single system development. However, when and how to use a reusable asset depends on what types of reusable assets have been created.Product line engineering approaches produce a reusable infrastructure for a set of products. In this paper, we present the application engineering process associated with the PuLSE product line software engineering method - PuLSE-I. PuLSE-I details how single systems can be built efficiently from the reusable product line infrastructure built during the other PuLSE activities
CRAFT: A library for easier application-level Checkpoint/Restart and Automatic Fault Tolerance
In order to efficiently use the future generations of supercomputers, fault
tolerance and power consumption are two of the prime challenges anticipated by
the High Performance Computing (HPC) community. Checkpoint/Restart (CR) has
been and still is the most widely used technique to deal with hard failures.
Application-level CR is the most effective CR technique in terms of overhead
efficiency but it takes a lot of implementation effort. This work presents the
implementation of our C++ based library CRAFT (Checkpoint-Restart and Automatic
Fault Tolerance), which serves two purposes. First, it provides an extendable
library that significantly eases the implementation of application-level
checkpointing. The most basic and frequently used checkpoint data types are
already part of CRAFT and can be directly used out of the box. The library can
be easily extended to add more data types. As means of overhead reduction, the
library offers a build-in asynchronous checkpointing mechanism and also
supports the Scalable Checkpoint/Restart (SCR) library for node level
checkpointing. Second, CRAFT provides an easier interface for User-Level
Failure Mitigation (ULFM) based dynamic process recovery, which significantly
reduces the complexity and effort of failure detection and communication
recovery mechanism. By utilizing both functionalities together, applications
can write application-level checkpoints and recover dynamically from process
failures with very limited programming effort. This work presents the design
and use of our library in detail. The associated overheads are thoroughly
analyzed using several benchmarks
Homophily and Long-Run Integration in Social Networks
We model network formation when heterogeneous nodes enter sequentially and
form connections through both random meetings and network-based search, but
with type-dependent biases. We show that there is "long-run integration,"
whereby the composition of types in sufficiently old nodes' neighborhoods
approaches the global type distribution, provided that the network-based search
is unbiased. However, younger nodes' connections still reflect the biased
meetings process. We derive the type-based degree distributions and group-level
homophily patterns when there are two types and location-based biases. Finally,
we illustrate aspects of the model with an empirical application to data on
citations in physics journals.Comment: 39 pages, 2 figure
Supporting Dynamic Service Composition at Runtime based on End-user Requirements
Network-based software application services are receiving a lot of attention in recent years, as observed in developments as Internet of Services, Software as a Service and Cloud Computing. A service-oriented computing ecosystem is being created where the end-user is having an increasingly more active role in the service creation process. However, supporting end-users in the creation process, at runtime, is a difficult undertaking. Users have different requirements and preferences towards application services, use services in different situations and expect highly abstract mechanisms in the creation process. Furthermore, there are different types of end-users: some can deliver more detailed requirements or can be provided with more advanced request interface, while others can not. To tackle these issues and provide end-users with personalised service delivery, we claim that runtime automated service composition mechanisms are required. In this paper we present the DynamiCoS framework, which aims at supporting the different phases required to provide end-users with automatic service discovery, selection and composition process. In this paper we also present the developed prototype and its evaluation
A Windows Phone 7 Oriented Secure Architecture for Business Intelligence Mobile Applications
This paper present and implement a Windows Phone 7 Oriented Secure Architecture for Business Intelligence Mobile Application. In the developing process is used a Windows Phone 7 application that interact with a WCF Web Service and a database. The types of Business Intelligence Mobile Applications are presented. The Windows mobile devices security and restrictions are presented. The namespaces and security algorithms used in .NET Compact Framework for assuring the application security are presented. The proposed architecture is showed underlying the flows between the application and the web service.Security, Secure Architecture, Mobile Applications, Business Intelligence, Web Service
- âŠ