abstracts

Upload: kks

Post on 08-Mar-2016

214 views

Category:

Documents


0 download

DESCRIPTION

h

TRANSCRIPT

Solid waste managementTechnological advances continued during the first half of the 20th century, including the development of garbage grinders, compaction trucks, and pneumatic collection systems. By mid-century, however, it had become evident that open dumping and improper incineration of solid waste were causing problems of pollution and jeopardizing public health. Solid waste management is one among the basic essential services provided by municipal authorities in the Country to keep urban centers clean. However, it is among the most poorly rendered services in the basketthe systems applied are unscientific, outdated and inefficient; population coverage is low; and the poor are marginalized. Waste is littered all over leading to insanitary living conditions. Municipal laws governing the urban local bodies do not have adequate provisions to deal effectively with the ever-growing problem of solid waste management. With rapid Urbanization, the situation is becoming critical. The urban population has grown fivefold in the last six decades with 285.35 million people living in urban areas as per the2001 Census. Solid Waste Management. The waste generation rates in India are lower than the low-income countries in other parts of the world and much lower compared to developed countries (Annexe Tables A8.1 and A8.2). However, lifestyle changes, especially in the larger cities, are leading to the use of more packaging material and per capita waste generation is increasing by about 1.3 per

cent per year. With the urban population growing at 2.7 per cent to 3.5 per cent per annum, the yearly increase in the overall quantity of solid waste in the cities will be more than 5 per cent. The Energy and Resources Institute (TERI) has estimated that waste generation will exceed 260 million tons per year by 2047.Malware Clearance for Secure Commitment of OS-Level Virtual Machines

A virtual machine (VM) can be simply created upon use and disposed upon the completion of the tasks or the detection of error. The disadvantage of this approach is that if there is no malicious activity, the user has to redo all of the work in her actual workspace since there is no easy way to commit (i.e., merge) only the benign updates within the VM back to the host environment. In this work, we develop a VM commitment system called Secom to automatically eliminate malicious state changes when merging the contents of an OS-level VM to the host. Secom consists of three steps: grouping state changes into clusters, distinguishing between benign and malicious clusters, and committing benign clusters. Secom has three novel features. First, instead of relying on a huge volume of log data, it leverages OS-level information flow and malware behavior information to recognize malicious changes. As a result, the approach imposes a smaller performance overhead. Second, different from existing intrusion detection and recovery systems that detect compromised OS objects one by one, Secom classifies objects into clusters and then identifies malicious objects on a cluster by cluster basis. Third, to reduce the false-positive rate when identifying malicious clusters, it simultaneously considers two malware behaviors that are of different types and the origin of the processes that exhibit these behaviors, rather than considers a single behavior alone as done by existing malware detection methods. We have successfully implemented Secom on the feather-weight virtual machine system, a Windows-based OS-level virtualization system. Experiments show that the prototype can effectively eliminate malicious state changes while committing a VM with small performance degradation. Moreover, compared with the commercial antimalware tools, the Secom prototype has a smaller number of false negatives and thus can more thoroughly clean up malware side effects. In addition, the number of false positives of the Secom prototype is also lower than that achieved by the online behavior-based approach of the commercial tools.

Fertilizer and Pesticide Management

Based on a field study in the semi-arid Loess plateau of China, the strategies of limited irrigation on farmland in dry-period and pre-sowing of normal-precipitation years are studied comparatively, and the difference effects on water use and grain yield of spring wheat with dry-period irrigation, pre-sowing irrigation and fertilizer application are examined. The results indicate that both dry-period irrigation and pre-sowing irrigation conduce to larger and deeper root systems, compared with the non-irrigated treatments. However, the promoting effect of dry-period irrigation is more significant under the same amount of supplemental irrigation and dry-period irrigation is more beneficial for the increase of grain yield. Furthermore, dry-period irrigation is more beneficial for improving WUE and grain yield of spring wheat than pre-sowing irrigation, and fertilizer application is more favorable for improving yield than without fertilizer application. The combination of dry-period irrigation and fertilizer application is the most efficient way for improving WUE and grain yield of spring wheat.Web Traffic

The advent and continued growth of large data centers has led to much interest in switch architectures that can economically meet the high capacities needed for interconnecting the thousands of servers in these data centers. Various multilayer architectures employing thousands of switches have been proposed in the literature. We make use of the observation that the traffic in a data center is a mixture of relatively static and rapidly fluctuating components, and develop a combined scheduler for both these components using a generalization of the load-balanced scheduler. The presence of the known static component introduces asymmetries in the ingress-egress capacities, which preclude the use of a load-balanced scheduler as is. We generalize the load-balanced scheduler and also incorporate an opportunistic scheduler that sends traffic on a direct path when feasible to enhance the overall switch throughput. Our evaluations show that this scheduler works very well despite avoiding the use of a central scheduler for making packet-by-packet scheduling decisions.Bug Navigator

Bug Navigator is the system which enables to detect the Defects. It not merely detects the Defects but provides the complete information regarding Defects detected. Bug Tracking System ensures the user of it who needs to know about a provide information regarding the identified Defect. Using this no Defect will be unfixed in the developed application. The developer develops the project as per customer requirements. In the testing phase the tester will identify the Defects. Whenever the tester encounter n number of Defects he adds the Defect id and information in the database. The tester reports to both project manager and developer. The Defect details in the database table are accessible to both project manager and developer.

Virtual Lab

Distributed and concurrent development of virtual labs across multiple institutes and teams presents several challenges, both organizational and technical in nature. We present models for managing the process of virtual lab development, deployment and distribution. Close to twenty labs in computer science and chemical sciences are currently following our model. T In this day and age medical search engines have become a necessity. External influences and user trends contribute to the popularity of medical search engines. Unlike their predecessors (horizontal search engines) extensive search strategies have yet to be implemented on vertical search engines like medical search engines. The composition and structure of medical search engines draw many users to utilize them regularly. This makes a medical search engine an ideal domain to implement and asses the feasibility of existing search engine strategies. By doing so, users will be provided with relevant search results. In this research study, we review current search strategies and analyze the applicability of these techniques on medical search environments. We also suggest a direction for the future of search engine strategies on medical search engines.

Search Engine

With the rapid development of World Wide Web, search engines have become the main tool for people to get network information. However, the search results are widely criticized due to the poor accuracy and redundancy disadvantages. After the advent of semantic Web, new search engine with the ability of understanding queries and documents has attracted more and more attentions. This paper starts from the traditional search engine, and firstly introduces its classification, popular technology, advantages and disadvantages, thus leads to the semantic search engine model. Then we research the semantic search technology in depth, which can be divided into enhanced semantic search based on traditional search, knowledge semantic search based on ontology inference and other semantic search types. In addition, key techniques in semantic search engine development, such as automated inference technique, ontology knowledge system and expert system are presented in this paper. Lastly, we conclude the current research and forecast the prospect of future research.The architecture is designed to ultimately encourage and support a community ecosystem where teachers or students from any college could contribute to lab development, and a college could choose to subscribe to a set of virtual labs. Our deployment model, yet to be fully implemented, has as its back end a flexible virtualization architecture for running experiments and and a package based distribution model that encourages community participation in the use of virtual labs.