3,011,862 research outputs found

    Bio-Fertilizers via Co-Digestion: a Review

    Get PDF
    In diversifying the economies of most oil producing countries especially in regions with arable lands, Agriculture becomes the next choice aside mineral deposits. This has led to a search for an alternative to inorganic fertilizers, the alternatives are the biofertilizers. The paper discussed the classification of the anaerobic co-digestion process based on the application of inoculants to the biodigester feedstock to speed up the digestion process and the absence of inoculants. Biodigester feedstock also looked at the various mechanisms in the digestion process which includes hydrolysis, acidogenesis, acetogenesis, and methanogenesis, the pathways were illustrated with chemical equations and various microorganisms that take part in the anaerobic process were mentioned and tabulated. The types of biofertilizers, merits, and demerits, the difference between biofertilizers and organic fertilizers were comprehensively discussed. Current trends on the application of the co-digestion technique to improve the yield, nutrient, and safety of biofertilizers and also the recent progression on the technique were mentioned

    PuLSE-I: Deriving instances from a product line infrastructure

    Get PDF
    Reusing assets during application engineering promises to improve the efficiency of systems development. However, in order to benefit from reusable assets, application engineering processes must incorporate when and how to use the reusable assets during single system development. However, when and how to use a reusable asset depends on what types of reusable assets have been created.Product line engineering approaches produce a reusable infrastructure for a set of products. In this paper, we present the application engineering process associated with the PuLSE product line software engineering method - PuLSE-I. PuLSE-I details how single systems can be built efficiently from the reusable product line infrastructure built during the other PuLSE activities

    CRAFT: A library for easier application-level Checkpoint/Restart and Automatic Fault Tolerance

    Get PDF
    In order to efficiently use the future generations of supercomputers, fault tolerance and power consumption are two of the prime challenges anticipated by the High Performance Computing (HPC) community. Checkpoint/Restart (CR) has been and still is the most widely used technique to deal with hard failures. Application-level CR is the most effective CR technique in terms of overhead efficiency but it takes a lot of implementation effort. This work presents the implementation of our C++ based library CRAFT (Checkpoint-Restart and Automatic Fault Tolerance), which serves two purposes. First, it provides an extendable library that significantly eases the implementation of application-level checkpointing. The most basic and frequently used checkpoint data types are already part of CRAFT and can be directly used out of the box. The library can be easily extended to add more data types. As means of overhead reduction, the library offers a build-in asynchronous checkpointing mechanism and also supports the Scalable Checkpoint/Restart (SCR) library for node level checkpointing. Second, CRAFT provides an easier interface for User-Level Failure Mitigation (ULFM) based dynamic process recovery, which significantly reduces the complexity and effort of failure detection and communication recovery mechanism. By utilizing both functionalities together, applications can write application-level checkpoints and recover dynamically from process failures with very limited programming effort. This work presents the design and use of our library in detail. The associated overheads are thoroughly analyzed using several benchmarks

    Homophily and Long-Run Integration in Social Networks

    Full text link
    We model network formation when heterogeneous nodes enter sequentially and form connections through both random meetings and network-based search, but with type-dependent biases. We show that there is "long-run integration," whereby the composition of types in sufficiently old nodes' neighborhoods approaches the global type distribution, provided that the network-based search is unbiased. However, younger nodes' connections still reflect the biased meetings process. We derive the type-based degree distributions and group-level homophily patterns when there are two types and location-based biases. Finally, we illustrate aspects of the model with an empirical application to data on citations in physics journals.Comment: 39 pages, 2 figure

    Supporting Dynamic Service Composition at Runtime based on End-user Requirements

    Get PDF
    Network-based software application services are receiving a lot of attention in recent years, as observed in developments as Internet of Services, Software as a Service and Cloud Computing. A service-oriented computing ecosystem is being created where the end-user is having an increasingly more active role in the service creation process. However, supporting end-users in the creation process, at runtime, is a difficult undertaking. Users have different requirements and preferences towards application services, use services in different situations and expect highly abstract mechanisms in the creation process. Furthermore, there are different types of end-users: some can deliver more detailed requirements or can be provided with more advanced request interface, while others can not. To tackle these issues and provide end-users with personalised service delivery, we claim that runtime automated service composition mechanisms are required. In this paper we present the DynamiCoS framework, which aims at supporting the different phases required to provide end-users with automatic service discovery, selection and composition process. In this paper we also present the developed prototype and its evaluation

    A Windows Phone 7 Oriented Secure Architecture for Business Intelligence Mobile Applications

    Get PDF
    This paper present and implement a Windows Phone 7 Oriented Secure Architecture for Business Intelligence Mobile Application. In the developing process is used a Windows Phone 7 application that interact with a WCF Web Service and a database. The types of Business Intelligence Mobile Applications are presented. The Windows mobile devices security and restrictions are presented. The namespaces and security algorithms used in .NET Compact Framework for assuring the application security are presented. The proposed architecture is showed underlying the flows between the application and the web service.Security, Secure Architecture, Mobile Applications, Business Intelligence, Web Service
    • 

    corecore