Search results for: user requirement
1970 Effect of Crude Flowers Extract of Citrus reticulata Blanco Flowers on Physicochemical and Nutritional Properties of Cheddar Cheese
Authors: Usman Mir Khan, Ishtiaque Ahmad, Saima Inayat, H. M. Arslan Amin, Muhammad Ayaz, Nisar Ahmad
Abstract:
Citrus reticulata Blanco crude flowers extract (CFE) at four different concentration (1, 2, 3 and 4%, v/v) were used as natural milk coagulant instead of rennet to apply for Cheddar cheese making from buffalo milk. The physicochemical properties and nutrition composition of Cheddar cheeses were compared with cheese made with 0.002% (v/v) rennet (control cheese). Physico-chemical of Cheddar cheese showed that cheese made with 1% and 2% of CFE had a crumbly and slightly softer texture of cheese. While, cheeses containing 3 and 4% CFE had semi-hard textural properties of curd similar to rennet added cheese. The CFE made cheese had moisture 37 %, fat 45 % on dry basis similar to rennet made Cheddar cheese. Protein analysis shows that CFE made cheese had significant higher protein content than control. The Cheddar cheese with 3% and 1% CFE were preferred by consumers instead of 2% and 4% CFE for their taste, texture/appearance and overall acceptability. Conclusively, CFE coagulated Cheddar cheese fulfills the nutritional requirement with acceptable organoleptic characteristics and at the same time provides nutritional health benefits.Keywords: cheddar cheese, Citrus reticulata Blanco, buffalo milk, milk coagulant
Procedia PDF Downloads 3071969 The Application of Data Mining Technology in Building Energy Consumption Data Analysis
Authors: Liang Zhao, Jili Zhang, Chongquan Zhong
Abstract:
Energy consumption data, in particular those involving public buildings, are impacted by many factors: the building structure, climate/environmental parameters, construction, system operating condition, and user behavior patterns. Traditional methods for data analysis are insufficient. This paper delves into the data mining technology to determine its application in the analysis of building energy consumption data including energy consumption prediction, fault diagnosis, and optimal operation. Recent literature are reviewed and summarized, the problems faced by data mining technology in the area of energy consumption data analysis are enumerated, and research points for future studies are given.Keywords: data mining, data analysis, prediction, optimization, building operational performance
Procedia PDF Downloads 8521968 Performance of Heifer Camels (Camelus dromedarius) on Native Range Supplemented with Different Energy Levels
Authors: Shehu, B., Muhammad, B. F., Madigawa, I. L., H. A. Alkali
Abstract:
The study was conducted to assess heifer camel behavior and live weight changes on native range supplemented with different energy levels. A total of nine camels aged between 2 and 3 years were randomly allotted into three groups and supplemented with 3400, 3600 and 3800 Kcal and designated A, B and C, respectively. The data obtained was analyzed for variance in a Completely Randomized Design. The heifers utilized average of 371.70 min/day (64% of daylight time) browsing on native pasture and 2.30 min/day (6%) sand bathing. A significantly higher mean time was spent by heifers on browsing Leptadenia hastata (P<0.001), Dichrostachys cinerea (P<0.01), Acacia nilotica (P<0.001) and Ziziphus spina-christi (P<0.05) in early dry season (January). No significant difference was recorded on browsing time on Tamarindus indica, Adansonia digitata, Piliostigma reticulatum, Parkia biglobosaand Azadirachta indica. No significant (P<0.05) liveweight change was recorded on she-camels due to the three energy levels. It was concluded that nutritive browse species in the study area could meet camel nutrient requirements including energy. Further research on effect of period on camel nutrients requirement in different physiological conditions is recommended.Keywords: heifer, camel, grazing, pasture
Procedia PDF Downloads 5431967 A Study on Multidimensional Locus of Control and the Procrastinating Behavior in Employees
Authors: Richa Mishra, Sonia Munjal
Abstract:
In this increasingly hectic and competitive climate, employees are expected to manage the resources available to them to perform their work. However, many are wasting the most precious and scarce resource at their disposal, time, by procrastinating on tasks and thereby costing themselves and their organizations. As timely performance is a requirement of most jobs, procrastination is particularly problematic in the workplace. Evidence suggests that procrastination and poor performance go hand-in-hand, as procrastinators miss more deadlines than non-procrastinators and make more errors and work at a slower speed than non-procrastinators when performing timed tasks. This research is hence an effort to add a little in the sparse knowledge base. It is an effort to throw light on the relationship of Levenson’s multi dimensions of locus of control and also an effort to identify if it is one of the causes and of employees procrastination which have not been explored earlier. The study also explores the effect and relationship of multidimensional locus of control and various levels of stress on procrastination. The results of the research have ascertained that there is significant impact of LOC dimensions on the procrastinating behavior of the employees. One of the major findings to emerge from the current research that managers with powerful others as their LOC dimensions were least procrastinating, contradicts the previous research results that external procrastinate more than internals.Keywords: Multidimensional Locus of Control, workplace procrastination, employee behaviour, manufacturing industry
Procedia PDF Downloads 2461966 Zonal and Sequential Extraction Design for Large Flat Space to Achieve Perpetual Tenability
Authors: Mingjun Xu, Man Pun Wan
Abstract:
This study proposed an effective smoke control strategy for the large flat space with a low ceiling to achieve the requirement of perpetual tenability. For the large flat space with a low ceiling, the depth of the smoke reservoir is very shallow, and it is difficult to perpetually constrain the smoke within a limited space. A series of numerical tests were conducted to determine the smoke strategy. A zonal design i.e., the fire zone and two adjacent zones was proposed and validated to be effective in controlling smoke. Once a fire happens in a compartment space, the Engineered Smoke Control (ESC) system will be activated in three zones i.e., the fire zone, in which the fire happened, and two adjacent zones. The smoke can be perpetually constrained within the three smoke zones. To further improve the extraction efficiency, sequential activation of the ESC system within the 3 zones turned out to be more efficient than simultaneous activation. Additionally, the proposed zonal and sequential extraction design can reduce the mechanical extraction flow rate by up to 40.7 % as compared to the conventional method, which is much more economical than that of the conventional method.Keywords: performance-based design, perpetual tenability, smoke control, fire plume
Procedia PDF Downloads 741965 Interpreting Privacy Harms from a Non-Economic Perspective
Authors: Christopher Muhawe, Masooda Bashir
Abstract:
With increased Internet Communication Technology(ICT), the virtual world has become the new normal. At the same time, there is an unprecedented collection of massive amounts of data by both private and public entities. Unfortunately, this increase in data collection has been in tandem with an increase in data misuse and data breach. Regrettably, the majority of data breach and data misuse claims have been unsuccessful in the United States courts for the failure of proof of direct injury to physical or economic interests. The requirement to express data privacy harms from an economic or physical stance negates the fact that not all data harms are physical or economic in nature. The challenge is compounded by the fact that data breach harms and risks do not attach immediately. This research will use a descriptive and normative approach to show that not all data harms can be expressed in economic or physical terms. Expressing privacy harms purely from an economic or physical harm perspective negates the fact that data insecurity may result into harms which run counter the functions of privacy in our lives. The promotion of liberty, selfhood, autonomy, promotion of human social relations and the furtherance of the existence of a free society. There is no economic value that can be placed on these functions of privacy. The proposed approach addresses data harms from a psychological and social perspective.Keywords: data breach and misuse, economic harms, privacy harms, psychological harms
Procedia PDF Downloads 1951964 Audio-Visual Entrainment and Acupressure Therapy for Insomnia
Authors: Mariya Yeldhos, G. Hema, Sowmya Narayanan, L. Dhiviyalakshmi
Abstract:
Insomnia is one of the most prevalent psychological disorders worldwide. Some of the deficiencies of the current treatments of insomnia are: side effects in the case of sleeping pills and high costs in the case of psychotherapeutic treatment. In this paper, we propose a device which provides a combination of audio visual entrainment and acupressure based compression therapy for insomnia. This device provides drug-free treatment of insomnia through a user friendly and portable device that enables relaxation of brain and muscles, with certain advantages such as low cost, and wide accessibility to a large number of people. Tools adapted towards the treatment of insomnia: -Audio -Continuous exposure to binaural beats of a particular frequency of audible range -Visual -Flash of LED light -Acupressure points -GB-20 -GV-16 -B-10Keywords: insomnia, acupressure, entrainment, audio-visual entrainment
Procedia PDF Downloads 4291963 Experimental Investigation to Find Transition Temperature of VG 30 Binder
Authors: D. Latha, V. Sunitha, Samson Mathew
Abstract:
In India, most of the pavement is laid by bituminous road and the consumption of binder is high for pavement construction and also modified binders are used to satisfy any specific pavement requirement. Since the binders are visco-elastic material which is having the mechanical properties of binder transition from visco-elastic solid to visco-elastic fluid. In this paper, two different protocols were used to measure the viscosity property of binder using a Brookfield Viscometer and there is a need to find the appropriate mixing and compaction temperatures of various types of binders which can result in complete aggregate coating and adequate field density of HMA mixtures. The aim of this work is to find the transition temperature from Non-Newtonian behavior to Newtonian behavior of the binder by adopting a steady shear protocol and the shear rate ramp protocol. The transition from non-Newtonian to Newtonian can occur through an increase of temperature and shear of the material. The test has been conducted for unmodified binder VG 30. The transition temperature was found in the unmodified binder VG is 120oC. So the application of both modified binder and unmodified binder in the pavement construction needs to be studied properly by considering temperature and traffic loading factors of the respective project site.Keywords: unmodified and modified binders, Brookfield viscometer, transition temperature, steady shear and shear rate protocol
Procedia PDF Downloads 2151962 Low Probability of Intercept (LPI) Signal Detection and Analysis Using Choi-Williams Distribution
Authors: V. S. S. Kumar, V. Ramya
Abstract:
In the modern electronic warfare, the signal scenario is changing at a rapid pace with the introduction of Low Probability of Intercept (LPI) radars. In the modern battlefield, radar system faces serious threats from passive intercept receivers such as Electronic Attack (EA) and Anti-Radiation Missiles (ARMs). To perform necessary target detection and tracking and simultaneously hide themselves from enemy attack, radar systems should be LPI. These LPI radars use a variety of complex signal modulation schemes together with pulse compression with the aid of advancement in signal processing capabilities of the radar such that the radar performs target detection and tracking while simultaneously hiding enemy from attack such as EA etc., thus posing a major challenge to the ES/ELINT receivers. Today an increasing number of LPI radars are being introduced into the modern platforms and weapon systems so these LPI radars created a requirement for the armed forces to develop new techniques, strategies and equipment to counter them. This paper presents various modulation techniques used in generation of LPI signals and development of Time Frequency Algorithms to analyse those signals.Keywords: anti-radiation missiles, cross terms, electronic attack, electronic intelligence, electronic warfare, intercept receiver, low probability of intercept
Procedia PDF Downloads 4721961 Survivable IP over WDM Network Design Based on 1 ⊕ 1 Network Coding
Authors: Nihed Bahria El Asghar, Imen Jouili, Mounir Frikha
Abstract:
Inter-datacenter transport network is very bandwidth and delay demanding. The data transferred over such a network is also highly QoS-exigent mostly because a huge volume of data should be transported transparently with regard to the application user. To avoid the data transfer failure, a backup path should be reserved. No re-routing delay should be observed. A dedicated 1+1 protection is however not applicable in inter-datacenter transport network because of the huge spare capacity. In this context, we propose a survivable virtual network with minimal backup based on network coding (1 ⊕ 1) and solve it using a modified Dijkstra-based heuristic.Keywords: network coding, dedicated protection, spare capacity, inter-datacenters transport network
Procedia PDF Downloads 4471960 Insider Theft Detection in Organizations Using Keylogger and Machine Learning
Authors: Shamatha Shetty, Sakshi Dhabadi, Prerana M., Indushree B.
Abstract:
About 66% of firms claim that insider attacks are more likely to happen. The frequency of insider incidents has increased by 47% in the last two years. The goal of this work is to prevent dangerous employee behavior by using keyloggers and the Machine Learning (ML) model. Every keystroke that the user enters is recorded by the keylogging program, also known as keystroke logging. Keyloggers are used to stop improper use of the system. This enables us to collect all textual data, save it in a CSV file, and analyze it using an ML algorithm and the VirusTotal API. Many large companies use it to methodically monitor how their employees use computers, the internet, and email. We are utilizing the SVM algorithm and the VirusTotal API to improve overall efficiency and accuracy in identifying specific patterns and words to automate and offer the report for improved monitoring.Keywords: cyber security, machine learning, cyclic process, email notification
Procedia PDF Downloads 571959 A Method for False Alarm Recognition Based on Multi-Classification Support Vector Machine
Authors: Weiwei Cui, Dejian Lin, Leigang Zhang, Yao Wang, Zheng Sun, Lianfeng Li
Abstract:
Built-in test (BIT) is an important technology in testability field, and it is widely used in state monitoring and fault diagnosis. With the improvement of modern equipment performance and complexity, the scope of BIT becomes larger, and it leads to the emergence of false alarm problem. The false alarm makes the health assessment unstable, and it reduces the effectiveness of BIT. The conventional false alarm suppression methods such as repeated test and majority voting cannot meet the requirement for a complicated system, and the intelligence algorithms such as artificial neural networks (ANN) are widely studied and used. However, false alarm has a very low frequency and small sample, yet a method based on ANN requires a large size of training sample. To recognize the false alarm, we propose a method based on multi-classification support vector machine (SVM) in this paper. Firstly, we divide the state of a system into three states: healthy, false-alarm, and faulty. Then we use multi-classification with '1 vs 1' policy to train and recognize the state of a system. Finally, an example of fault injection system is taken to verify the effectiveness of the proposed method by comparing ANN. The result shows that the method is reasonable and effective.Keywords: false alarm, fault diagnosis, SVM, k-means, BIT
Procedia PDF Downloads 1551958 The Research of the Game Interface Improvement Due to the Game Operation Dilemma of Player in the Side-Scrolling Shooting Game
Authors: Shih-Chieh Liao, Cheng-Yan Shuai
Abstract:
The feature of a side-scrolling shooting game is facing the surrounding enemy and barraging in entire screen. The player will be in trouble when they are trying to do complicated operations because of the physical and system limitations of the joystick in the games. This study designed the prototype of a new type of arcade stick by focus group and assessed by the expert. By filtering the most representative, and build up the control system for the arcade stick, and testing time and bullets consumed in two experiments, try to prove it works in the game. Finally, the prototype of L-1 solves the dilemma of scroll shooting games when the player uses the arcade stick and improves the function of the arcade stick.Keywords: arcade stick, joystick, user interface, 2D STG
Procedia PDF Downloads 801957 Quantification of Leachate Potential of the Quezon City Controlled Dumping Facility Using Help Model
Authors: Paul Kenneth D. Luzon, Maria Antonia N. Tanchuling
Abstract:
The Quezon City Controlled Dumping facility also known as Payatas produces leachate which can contaminate soil and water environment in the area. The goal of this study is to quantify the leachate produced by the QCCDF using the Hydrologic Evaluation of Landfill Performance (HELP) model. Results could be used as input for groundwater contaminant transport studies. The HELP model is based on a simple water budget and is an essential “model requirement” used by the US Environmental Protection Agency (EPA). Annual waste profile of the QCCDF was calculated. Based on topographical maps and estimation of settlement due to overburden pressure and degradation, a total of 10M m^3 of waste is contained in the landfill. The input necessary for the HELP model are weather data, soil properties, and landfill design. Results showed that from 1988 to 2011, an average of 50% of the total precipitation percolates through the bottom layer. Validation of the results is still needed due to the assumptions made in the study. The decrease in porosity of the top soil cover showed the best mitigation for minimizing percolation rate. This study concludes that there is a need for better leachate management system in the QCCDF.Keywords: help model, landfill, payatas trash slide, quezon city controlled dumping facility
Procedia PDF Downloads 2911956 A Contribution to Blockchain Privacy
Authors: Malika Yaici, Feriel Lalaoui, Lydia Belhoul
Abstract:
As a new distributed point-to-point (P2P) technology, blockchain has become a very broad field of research, addressing various challenges including privacy preserving as is the case in all other technologies. In this work, a study of the existing solutions to the problems related to private life in general and in blockchains in particular is performed. User anonymity and transaction confidentiality are the two main challenges for the protection of privacy in blockchains. Mixing mechanisms and cryptographic solutions respond to this problem but remain subject to attacks and suffer from shortcomings. Taking into account these imperfections and the synthesis of our study, we present a mixing model without trusted third parties, based on group signatures allowing reinforcing the anonymity of the users, the confidentiality of the transactions, with minimal turnaround time and without mixing costs.Keywords: anonymity, blockchain, mixing coins, privacy
Procedia PDF Downloads 101955 Applying Different Stenography Techniques in Cloud Computing Technology to Improve Cloud Data Privacy and Security Issues
Authors: Muhammad Muhammad Suleiman
Abstract:
Cloud Computing is a versatile concept that refers to a service that allows users to outsource their data without having to worry about local storage issues. However, the most pressing issues to be addressed are maintaining a secure and reliable data repository rather than relying on untrustworthy service providers. In this study, we look at how stenography approaches and collaboration with Digital Watermarking can greatly improve the system's effectiveness and data security when used for Cloud Computing. The main requirement of such frameworks, where data is transferred or exchanged between servers and users, is safe data management in cloud environments. Steganography is the cloud is among the most effective methods for safe communication. Steganography is a method of writing coded messages in such a way that only the sender and recipient can safely interpret and display the information hidden in the communication channel. This study presents a new text steganography method for hiding a loaded hidden English text file in a cover English text file to ensure data protection in cloud computing. Data protection, data hiding capability, and time were all improved using the proposed technique.Keywords: cloud computing, steganography, information hiding, cloud storage, security
Procedia PDF Downloads 1911954 Designing a Tool for Software Maintenance
Authors: Amir Ngah, Masita Abdul Jalil, Zailani Abdullah
Abstract:
The aim of software maintenance is to maintain the software system in accordance with advancement in software and hardware technology. One of the early works on software maintenance is to extract information at higher level of abstraction. In this paper, we present the process of how to design an information extraction tool for software maintenance. The tool can extract the basic information from old program such as about variables, based classes, derived classes, objects of classes, and functions. The tool have two main part; the lexical analyzer module that can read the input file character by character, and the searching module which is user can get the basic information from existing program. We implemented this tool for a patterned sub-C++ language as an input file.Keywords: extraction tool, software maintenance, reverse engineering, C++
Procedia PDF Downloads 4921953 E-Resource Management: Digital Environment for a Library System
Authors: Vikram Munjal, Harpreet Munjal
Abstract:
A few years ago we could hardly think of Libraries' strategic plan that includes the bold and amazing prediction of a mostly digital environment for a library system. However, sheer hard work by the engineers, academicians, and librarians made it feasible. However, it requires huge expenditure and now a day‘s spending for electronic resources (e-resources) have been growing much more rapidly than have the materials budgets of which such resources are usually a part. And many libraries are spending a huge amount on e-resources. Libraries today are in the midst of a profound shift toward reliance on e-resources, and this reliance seems to have deepened in recent years as libraries have shed paper journal subscriptions to help pay for online access. This has been exercised only to cater user behavior and attitudes that seem to be changing even more quickly in this dynamic scenario.Keywords: radio frequency identification, management, scanning, barcodes, checkout and tags
Procedia PDF Downloads 4041952 Vitamin A Status and Its Correlation with the Dietary Intake of Young Females of Lahore, Pakistan
Authors: Sarah Fatima, Ahmad A. Malik, Saima Sadaf
Abstract:
This study was conducted in order to assess the dietary record and vitamin A status of young females of Lahore. A total sample of 376 consisted of 16 – 20 years of unmarried college going females. Three main tools were adopted: questionnaire, 3-day food diary and serum retinol test. The anthropometric measurements showed that a total of 32.6% of the sample was underweight (BMI < 18.5) and 54.5% had a healthy weight (BMI 18.5 – 22.9). The average Vitamin A intake of the sample was 257.95 µg/day while the RDA for the selected age group was 700 µg/day. The mean energy intake of the adolescents was 1153.64 kcal/ day, whereas the Estimated Energy Requirement (EER) for this age group was 2368 kcal/day. The mean serum Vitamin A level was 24.81µg/dL. 69.6% of the sample was deficient in serum Vitamin A i.e. serum retinol < 24 µg/dL. 30.4% had serum retinol in normal limit (24 – 84 µg/dL) from which 25.3% lied in lower limit (24 – 44 µg/dL) and only 5.1% had serum retinol in 44 – 64 µg/dL range. A slightly negative correlation (r = - 0.21, 95% confidence interval) was found between dietary intake of Vitamin A and serum Vitamin A It was concluded that the dietary intake of major nutrients and vitamin A is not adequate in the selected group. This is also confirmed by the lower serum retinol levels. Hence, vitamin An intake and status are generally inadequate, and vitamin deficiency is prevalent in the unmarried young females of Lahore.Keywords: vitamin A, young Females, vitamin deficiency, Lahore
Procedia PDF Downloads 3141951 Reclaiming Properties of Bituminous Concrete Using Cold Mix Design Technology
Authors: Pradeep Kumar, Shalinee Shukla
Abstract:
Pavement plays a vital role in the socio-economic development of a country. Bituminous roads construction with conventional paving grade bitumen obtained from hot mix plant creates pollution and involves emission of greenhouse gases, also the construction of pavements at very high temperature is not feasible or desirable for high rainfall and snowfall areas. This problem of overheating can be eliminated by the construction of pavements with the usage of emulsified cold mixes which will eliminate emissions and help in the reduction of fuel requirement at mixing plant, which leads to energy conservation. Cold mix is a mixture of unheated aggregate and emulsion or cutback and filler. The primary objective of this research is to assess the volumetric mix design parameters of recycled aggregates with cold mixing technology and also to assess the impact of additives on volumetric mix characteristics. In this present study, bituminous pavement materials are reclaimed using cold mix technology, and Marshall specimens are prepared with the help of slow setting type 2 (SS-2) cationic bitumen emulsion as a binder for recycled aggregates. This technique of road construction is more environmentally friendly and can be done in adverse weather conditions.Keywords: cold mixes, bitumen emulsion, recycled aggregates, volumetric properties
Procedia PDF Downloads 1371950 Review for Identifying Online Opinion Leaders
Authors: Yu Wang
Abstract:
Nowadays, Internet enables its users to share the information online and to interact with others. Facing with numerous information, these Internet users are confused and begin to rely on the opinion leaders’ recommendations. The online opinion leaders are the individuals who have professional knowledge, who utilize the online channels to spread word-of-mouth information and who can affect the attitudes or even the behavior of their followers to some degree. Because utilizing the online opinion leaders is seen as an important approach to affect the potential consumers, how to identify them has become one of the hottest topics in the related field. Hence, in this article, the concepts and characteristics are introduced, and the researches related to identifying opinion leaders are collected and divided into three categories. Finally, the implications for future studies are provided.Keywords: online opinion leaders, user attributes analysis, text mining analysis, network structure analysis
Procedia PDF Downloads 2231949 Real-Time Classification of Marbles with Decision-Tree Method
Authors: K. S. Parlak, E. Turan
Abstract:
The separation of marbles according to the pattern quality is a process made according to expert decision. The classification phase is the most critical part in terms of economic value. In this study, a self-learning system is proposed which performs the classification of marbles quickly and with high success. This system performs ten feature extraction by taking ten marble images from the camera. The marbles are classified by decision tree method using the obtained properties. The user forms the training set by training the system at the marble classification stage. The system evolves itself in every marble image that is classified. The aim of the proposed system is to minimize the error caused by the person performing the classification and achieve it quickly.Keywords: decision tree, feature extraction, k-means clustering, marble classification
Procedia PDF Downloads 3821948 Design of Permanent Sensor Fault Tolerance Algorithms by Sliding Mode Observer for Smart Hybrid Powerpack
Authors: Sungsik Jo, Hyeonwoo Kim, Iksu Choi, Hunmo Kim
Abstract:
In the SHP, LVDT sensor is for detecting the length changes of the EHA output, and the thrust of the EHA is controlled by the pressure sensor. Sensor is possible to cause hardware fault by internal problem or external disturbance. The EHA of SHP is able to be uncontrollable due to control by feedback from uncertain information, on this paper; the sliding mode observer algorithm estimates the original sensor output information in permanent sensor fault. The proposed algorithm shows performance to recovery fault of disconnection and short circuit basically, also the algorithm detect various of sensor fault mode.Keywords: smart hybrid powerpack (SHP), electro hydraulic actuator (EHA), permanent sensor fault tolerance, sliding mode observer (SMO), graphic user interface (GUI)
Procedia PDF Downloads 5481947 The Effects of Sewage Sludge Usage and Manure on Some Heavy Metals Uptake in Savory (Satureja Hortensis L.)
Authors: Abbas Hani
Abstract:
In recent decades with the development of technology and lack of food sources, sewage sludge in production of human foods is inevitable. Various sources of municipal and industrial sewage sludge that is produced can provide the requirement of plant nutrients. Soils in arid, semi-arid climate of central Iran that most affected by water drainage, iron and zinc deficiencies, using of sewage sludge is helpful. Therefore, the aim of this study is investigation of sewage sludge and manure application on Ni and Zn uptake by Savory. An experiment in a randomized complete block design with three replications was performed. Sewage sludge treatments consisted of four levels, control, 15, 30, 80 tons per hectares, the manure was used in four levels of control, 20, 40 and 80 tons per hectare. Results showed that the wet and dry weights was not affected by sewage sludge using, while, manure has significant effect on them. The effect of sewage sludge on the cadmium and lead concentrations were significant. Interactions of sewage sludge and manure on dry weight values were not significant. Compare mean analysis showed that increasing the amount of sewage sludge had no significant effect on cadmium concentration and it reduced when sewage sludge usage increased. This is probably due to increased plant growth and reduced concentrations of these elements in the plant.Keywords: savory, lead, cadmium, sewage sludge, manure
Procedia PDF Downloads 4201946 Detailed Feasibility and Design of a Grid-Tied PV and Building Integrated Photovoltaic System for a Commercial Healthcare Building
Authors: Muhammad Ali Tariq
Abstract:
Grid-connected PV systems have drawn tremendous attention of researchers in the past recent years. The report elucidates the development of efficient and stable solar PV energy conversion systems after thorough analysis at various facets like PV module characteristics, its arrangement, power electronics and MPPT topologies, the stability of the grid, and economic viability over its lifetime. This report and feasibility study will try to bring all optimizing approaches and design calculations which are required for generating energy from BIPV and roof-mounted solar PV in a convenient, sustainable, and user-friendly way.Keywords: building integrated photovoltaic system, grid integration, solar resource assessment, return on investment, multi MPPT-inverter, levelised cost of electricity
Procedia PDF Downloads 1381945 Automated Server Configuration Management using Ansible
Authors: Kartik Mahajan
Abstract:
DevOps methodologies streamline software development and operations, promoting collaboration and automation. Traditional server management often relies on manual, repetitive tasks, leading to inefficiencies, potential errors, and increased operational costs. Ansible, as a configuration management tool, presents a compelling solution for automating infrastructure management processes. This review paper explores the implementation and testing of Ansible for server management, specifically focusing on automated user account configuration. By replacing manual procedures with Ansible playbooks, we aim to optimize server management, reduce human error, and potentially mitigate operational expenses. This study offers insights into Ansible’s efficacy within a DevOps context, highlighting its potential to transform server administration practices.Keywords: cloud, Devops, automation, ansible
Procedia PDF Downloads 441944 GRCNN: Graph Recognition Convolutional Neural Network for Synthesizing Programs from Flow Charts
Authors: Lin Cheng, Zijiang Yang
Abstract:
Program synthesis is the task to automatically generate programs based on user specification. In this paper, we present a framework that synthesizes programs from flow charts that serve as accurate and intuitive specification. In order doing so, we propose a deep neural network called GRCNN that recognizes graph structure from its image. GRCNN is trained end-to-end, which can predict edge and node information of the flow chart simultaneously. Experiments show that the accuracy rate to synthesize a program is 66.4%, and the accuracy rates to recognize edge and node are 94.1% and 67.9%, respectively. On average, it takes about 60 milliseconds to synthesize a program.Keywords: program synthesis, flow chart, specification, graph recognition, CNN
Procedia PDF Downloads 1191943 Left to Right-Right Most Parsing Algorithm with Lookahead
Authors: Jamil Ahmed
Abstract:
Left to Right-Right Most (LR) parsing algorithm is a widely used algorithm of syntax analysis. It is contingent on a parsing table, whereas the parsing tables are extracted from the grammar. The parsing table specifies the actions to be taken during parsing. It requires that the parsing table should have no action conflicts for the same input symbol. This requirement imposes a condition on the class of grammars over which the LR algorithms work. However, there are grammars for which the parsing tables hold action conflicts. In such cases, the algorithm needs a capability of scanning (looking-ahead) next input symbols ahead of the current input symbol. In this paper, a ‘Left to Right’-‘Right Most’ parsing algorithm with lookahead capability is introduced. The 'look-ahead' capability in the LR parsing algorithm is the major contribution of this paper. The practicality of the proposed algorithm is substantiated by the parser implementation of the Context Free Grammar (CFG) of an already proposed programming language 'State Controlled Object Oriented Programming' (SCOOP). SCOOP’s Context Free Grammar has 125 productions and 192 item sets. This algorithm parses SCOOP while the grammar requires to ‘look ahead’ the input symbols due to action conflicts in its parsing table. Proposed LR parsing algorithm with lookahead capability can be viewed as an optimization of ‘Simple Left to Right’-‘Right Most’ (SLR) parsing algorithm.Keywords: left to right-right most parsing, syntax analysis, bottom-up parsing algorithm
Procedia PDF Downloads 1261942 A Security Study for Smart Metering Systems
Authors: Musaab Hasan, Farkhund Iqbal, Patrick C. K. Hung, Benjamin C. M. Fung, Laura Rafferty
Abstract:
In modern societies, the smart cities concept raised simultaneously with the projection towards adopting smart devices. A smart grid is an essential part of any smart city as both consumers and power utility companies benefit from the features provided by the power grid. In addition to advanced features presented by smart grids, there may also be a risk when the grids are exposed to malicious acts such as security attacks performed by terrorists. Considering advanced security measures in the design of smart meters could reduce these risks. This paper presents a security study for smart metering systems with a prototype implementation of the user interfaces for future works.Keywords: security design, smart city, smart meter, smart grid, smart metering system
Procedia PDF Downloads 3361941 The Old Traditional Structures in Iran: A Suitable Model for Today's Greenhouse
Authors: Behbood Maashkar
Abstract:
One of the principles for societies’ development is the requirement to consider past experiences. Man should always take advantage of the predecessor’s experiences and analyze their works and methods. The predecessors have had a more friendly relationship with nature and their lives less damaged the nature, and it is one of the elements of green building. One of the things the ancients have observed in regard to green building in their houses, stores, sacred places, etc. was using wind-catchers as an air conditioning and cooling system which can be considered as the first foundations of green building. In designing houses Iranian architects have paid a great attention to the factor of making use of more shaded area in hot season and insulation of wall and ceiling against influence of hot weather and also air circulation inside the building. In order to circulate the air inside closed spaces and decrease the temperature, they have considered different winds which blow in Iran and its effective power, and in order to make use of it they invented wind catcher. Direction of wind blow and its height from the earth as well as the time and duration of wind blow and other factors have been effective in making different types of wind catchers. Using wind catchers has been and is prevalent mainly in central and south regions of Iran, coastal areas of Persian Gulf, and Khorasan, especially in cities like Yazd, Kashan, Bam, Abarghoo, Jahrom, and Tabas.Keywords: environment pollution, green building, Iran, wind catchers
Procedia PDF Downloads 249