Perovskite Photovoltaic Tracking Systems for Efficient Irrigation in the Agricultural Field: Morocco Case Study

Author(s):  
Yousra Bensouda ◽  
Yasmine Boudihaj ◽  
Nada Sebti ◽  
Hajar Hassina ◽  
Yassine Salih-Alj
2020 ◽  
Vol 42 ◽  
pp. 101088 ◽  
Author(s):  
Maha Chalhoub ◽  
Benoit Gabrielle ◽  
Julien Tournebize ◽  
Cédric Chaumont ◽  
Pascal Maugis ◽  
...  

2011 ◽  
Vol 83 (2) ◽  
pp. 719-730 ◽  
Author(s):  
Roberta L Rodrigues ◽  
Celso L. S Lage ◽  
Alexandre G Vasconcellos

The present work analyzes the different modalities of protection of the intellectual creations in the biotechnology agricultural field. Regarding the Brazilian legislations related to the theme (the Industrial Property Law - no. 9. 279/96 and the Plant Variety Protection Law - no. 9. 456/97), and based in the international treaties signed by Brazil, the present work points to the inclusions of each of them, as well as to their interfaces using as reference the case study of glyphosate tolerant genetically modified soybean. For this case study, Monsanto's pipelines patents were searched and used to analyze the limits of patent protection in respect to others related to the Intellectual Property (IP) laws. Thus, it was possible to elucidate the complex scenario of the Intellectual Property of the glyphosate tolerant soybeans, since for the farmer it is hard to correlate the royalties payment with the IP enterprise's rights


2019 ◽  
Vol 46 (1) ◽  
pp. 57-78 ◽  
Author(s):  
Grzegorz Poręba ◽  
Zbigniew Śnieszko ◽  
Piotr Moska ◽  
Przemysław Mroczek ◽  
Ireneusz Malik

Abstract Loess areas used for agriculture are susceptible to soil erosion. The intensive process of soil erosion in Polish loess areas began with the onset of the Neolithic and has continued intermittently until today. This work presents the results of soil erosion from simultaneous use of the 137Cs and 210Pbex methods on an agricultural field located on loess slope. Moreover, to establish the age of accumulated sediment connected with water slope erosion, OSL dating, selected physicochemical and micromorphological analyses were applied. The reference values of the 137Cs and 210Pbex fallout for the studied site (Biedrzykowice, the Proszowice Plateau, Małopolska Upland) equal 2627 (45% connected with Chernobyl) and 4835 Bq·m–2, respectively. The results of the 137Cs and 210Pbex inventories measured for the agricultural field range from 730 to 7911 and from 1615 to 11136 Bq·m–2, respectively. The mean soil erosion is about 2.1 kg·m–2·a–1 (about 1.4 mm·a–1). The accumulation of the colluvial sediments started in the Neolithic and drastically increased in the Middle Ages. The examined gully catchment in Biedrzykowice has probably developed quite rapidly as a result of increased erosion. This resulted in the abandonment of this area as farmland and, consequently, in the minimization of water erosion on the slope due to the entrance of woody vegetation in this area. Erosion processes were highly intensified during the last 70 years as a result of deforestation after World War II and intensive agricultural reuse of this area after a break, as indicated by isotope measurements and dendrochronology.


2020 ◽  
Vol 2020 ◽  
pp. 1-15
Author(s):  
Muhammad Asghar Khan ◽  
Insaf Ullah ◽  
Shibli Nisar ◽  
Fazal Noor ◽  
Ijaz Mansoor Qureshi ◽  
...  

A group of small UAVs can synergize to form a flying ad hoc network (FANET). The small UAVs are, typically, prone to security lapses because of limited onboard power, restricted computing ability, insufficient bandwidth, etc. Such limitations hinder the applicability of standard cryptographic techniques. Thus, assuring confidentiality and authentication on part of small UAV remains a far-fetched goal. We aim to address such an issue by proposing an identity-based generalized signcryption scheme. The lightweight security scheme employs multiaccess edge computing (MEC) whereby the primary UAV, as a MEC node, provides offloading to the computationally fragile member UAVs. The scheme is based on the concept of the hyperelliptic curve (HEC), which is characterized by a smaller key size and is, therefore, suitable for small UAVs. The scheme is robust since it offers confidentiality and authentication simultaneously as well as singly. Formal as well as informal security analyses and the validation results, using the Automated Validation for Internet Security Validation and Application (AVISPA) tool, second such notion. Comparative analysis with the existing schemes further authenticates the sturdiness of the proposed scheme. As a case study, the scheme is applied for monitoring crops in an agricultural field. It has been found out that the scheme promises higher security and incurs lower computational and communication costs.


2012 ◽  
pp. 357-382 ◽  
Author(s):  
Andrea Manuello Bertetto

In general, service robots are described with different characteristics for different tasks. In this chapter service robots are analyzed as machines in the agricultural field. The mechanisation in agriculture is discussed and service robots are described for particular tasks. In particular, the harvesting and treatment of high commercial value products is discussed for robotized applications. A significant case study is described and discussed for a robotized system with the aim to harvest and separate the Saffron flower spice.


2022 ◽  
Vol 31 (2) ◽  
pp. 1-43
Author(s):  
Katherine Hough ◽  
Jonathan Bell

Dynamic taint tracking, a technique that traces relationships between values as a program executes, has been used to support a variety of software engineering tasks. Some taint tracking systems only consider data flows and ignore control flows. As a result, relationships between some values are not reflected by the analysis. Many applications of taint tracking either benefit from or rely on these relationships being traced, but past works have found that tracking control flows resulted in over-tainting, dramatically reducing the precision of the taint tracking system. In this article, we introduce Conflux , alternative semantics for propagating taint tags along control flows. Conflux aims to reduce over-tainting by decreasing the scope of control flows and providing a heuristic for reducing loop-related over-tainting. We created a Java implementation of Conflux and performed a case study exploring the effect of Conflux on a concrete application of taint tracking, automated debugging. In addition to this case study, we evaluated Conflux ’s accuracy using a novel benchmark consisting of popular, real-world programs. We compared Conflux against existing taint propagation policies, including a state-of-the-art approach for reducing control-flow-related over-tainting, finding that Conflux had the highest F1 score on 43 out of the 48 total tests.


2004 ◽  
Vol 26 (2) ◽  
pp. 255-265 ◽  
Author(s):  
Douglas L. Young ◽  
Tae-Jin Kwon ◽  
Frank L. Young

Sign in / Sign up

Export Citation Format

Share Document