13,802 research outputs found
Development of bambangan (Mangifera pajang) carbonated drink
Mangifera pajang Kostermans or bambangan is a popular fruit among Sabahan due
to its health and economic values. However, the fruit is not fully commercialized since it is
usually been used as traditional cuisine by local people. Thus, development of bambangan fruit
into carbonated drink was conducted to produce new product concept. The objectives of this
study were to conceptualize, formulate, evaluate consumer acceptance, and determine
physicochemical properties and nutritional composition of the accepted product. Method used
in conceptualising the product was based on questionnaire. The consumer acceptance was
evaluated based on descriptive and affective tests with four product formulations tested. The
physicochemical properties on carbon dioxide volume, colour, pH, total acidity, total soluble
solid (TSS) and viscosity were highlighted, meanwhile nutritional composition on fat, protein,
carbohydrates and energy content were determined. About 77% respondents gave positive
feedback, and 69% respondents decided this product is within their budget. The formulation of
5% bambangan pulp, 70% water, 25% sugar and 0.2% citric acid was highly accepted in
descriptive and affective tests with 4.4 and 6.39 mean scores, respectively. The
physicochemical properties and nutritional composition of the acceptance product were in
optimum value except for colour, total acidity and TSS. Overall, this study showed that the
product has high potential to be commercialized as new product concept, and heritage of
indigenous people can be preserved when this fruit is known regionally
Interactive digital signal processor
The Interactive Digital Signal Processor (IDSP) is examined. It consists of a set of time series analysis Operators each of which operates on an input file to produce an output file. The operators can be executed in any order that makes sense and recursively, if desired. The operators are the various algorithms used in digital time series analysis work. User written operators can be easily interfaced to the sysatem. The system can be operated both interactively and in batch mode. In IDSP a file can consist of up to n (currently n=8) simultaneous time series. IDSP currently includes over thirty standard operators that range from Fourier transform operations, design and application of digital filters, eigenvalue analysis, to operators that provide graphical output, allow batch operation, editing and display information
Desktop Sharing Portal
Desktop sharing technologies have existed since the late 80s. It is often used in scenarios where collaborative computing is beneficial to participants in the shared environment by the control of the more knowledgeable party. But the steps required in establishing a session is often cumbersome to many. Selection of a sharing method, obtaining sharing target’s network address, sharing tool’s desired ports, and firewall issues are major hurdles for a typical non-IT user. In this project, I have constructed a web-portal that helps collaborators to easily locate each other and initialize sharing sessions. The portal that I developed enables collaborated sessions to start as easily as browsing to a URL of the sharing service provider, with no need to download or follow installation instructions on either party’s end. In addition, I have added video conferencing and audio streaming capability to bring better collaborative and multimedia experience
Survey of LAN infrastructure and ICT equipment in schools 2005: main report
Nationally representative technical audit of school infrastructure - full repor
System Security in an Open Lab Environment
This thesis presents a system security process for computer workstations in a university open lab environment, which was developed and implemented for the Lumpkin Hall Computer Labs at Eastern Illinois University (EIU). The system security includes the use of policies and NTFS permissions, registry hacks and script files. These techniques were applied to a mixture of Windows NT 4.0 service pack 6a and Windows 2000 Professional workstations in the Lumpkin Hall Computer Labs. They were then tested for appropriate security setup using a Network Security Checksheet and a survey. The Network Security Checksheet ensured that all of the workstations were configured properly and that the security settings where working properly to protect against known Windows exploits. A survey was used to validate the accessibility to the workstations for students in the School of Business at EIU. This new system security setup has decreased the maintenance workload by approximately 25%
Recommended from our members
Quantitative principles of cis-translational control by general mRNA sequence features in eukaryotes.
BackgroundGeneral translational cis-elements are present in the mRNAs of all genes and affect the recruitment, assembly, and progress of preinitiation complexes and the ribosome under many physiological states. These elements include mRNA folding, upstream open reading frames, specific nucleotides flanking the initiating AUG codon, protein coding sequence length, and codon usage. The quantitative contributions of these sequence features and how and why they coordinate to control translation rates are not well understood.ResultsHere, we show that these sequence features specify 42-81% of the variance in translation rates in Saccharomyces cerevisiae, Schizosaccharomyces pombe, Arabidopsis thaliana, Mus musculus, and Homo sapiens. We establish that control by RNA secondary structure is chiefly mediated by highly folded 25-60 nucleotide segments within mRNA 5' regions, that changes in tri-nucleotide frequencies between highly and poorly translated 5' regions are correlated between all species, and that control by distinct biochemical processes is extensively correlated as is regulation by a single process acting in different parts of the same mRNA.ConclusionsOur work shows that general features control a much larger fraction of the variance in translation rates than previously realized. We provide a more detailed and accurate understanding of the aspects of RNA structure that directs translation in diverse eukaryotes. In addition, we note that the strongly correlated regulation between and within cis-control features will cause more even densities of translational complexes along each mRNA and therefore more efficient use of the translation machinery by the cell
FMA: A Dataset For Music Analysis
We introduce the Free Music Archive (FMA), an open and easily accessible
dataset suitable for evaluating several tasks in MIR, a field concerned with
browsing, searching, and organizing large music collections. The community's
growing interest in feature and end-to-end learning is however restrained by
the limited availability of large audio datasets. The FMA aims to overcome this
hurdle by providing 917 GiB and 343 days of Creative Commons-licensed audio
from 106,574 tracks from 16,341 artists and 14,854 albums, arranged in a
hierarchical taxonomy of 161 genres. It provides full-length and high-quality
audio, pre-computed features, together with track- and user-level metadata,
tags, and free-form text such as biographies. We here describe the dataset and
how it was created, propose a train/validation/test split and three subsets,
discuss some suitable MIR tasks, and evaluate some baselines for genre
recognition. Code, data, and usage examples are available at
https://github.com/mdeff/fmaComment: ISMIR 2017 camera-read
Recommended from our members
Analysis of operating system diversity for intrusion tolerance
One of the key benefits of using intrusion-tolerant systems is the possibility of ensuring correct behavior in the presence of attacks and intrusions. These security gains are directly dependent on the components exhibiting failure diversity. To what extent failure diversity is observed in practical deployment depends on how diverse are the components that constitute the system. In this paper, we present a study with operating system's (OS's) vulnerability data from the NIST National Vulnerability Database (NVD). We have analyzed the vulnerabilities of 11 different OSs over a period of 18 years, to check how many of these vulnerabilities occur in more than one OS. We found this number to be low for several combinations of OSs. Hence, although there are a few caveats on the use of NVD data to support definitive conclusions, our analysis shows that by selecting appropriate OSs, one can preclude (or reduce substantially) common vulnerabilities from occurring in the replicas of the intrusion-tolerant system
- …