scholarly journals Evaluation of harvesting technology of vineyard pruning based on a Mátra wine region case study

2014 ◽  
pp. 91-100
Author(s):  
Cecília Gonda

Wineyard pruning utilization for energy purpose is not only a theoretical possibility, the machine background has also been developed. Economic- and environmental experimentations has made by specialists and they seek to developed the best practice in logistics suitable for local conditions and they propagate the results for the potential users. Nevertheless, the utilization does not seem to be typical in Hungary and some other wine-grower countries. For example, in Hungary the additional energy from vineyard pruning eventuates – tillage, nutrient supply; – phy+tosanitary, environmental pollution; – energy management and economic questions. In Hungary the most important problem is practice of the vineyard pruning utilization were mentioned by the users is the establishment of collection system and the high logistic costs as Marczinkó (2007) experiences confirm this. As I experienced in practice, the winegrowers are uninterested in utilization. Most of them burn it at the end of the vineyard in many cases without considering of the relevant statutory prohibition. As my own several years expriment shows at Mátra wine region it is not the technical background which causes the failure. We can use effectively balers or chippers for collection. The cost of chipping is 14 535–27 000 Ft per hectars with the introduced technologies on Mátra wine region. The cost of 1 GJ of heat production is 606–1125 Ft. We can substitute the fuel with vineyard pruning and it means approximately 115 000 Ft saving for a family household per year.

2017 ◽  
Vol 2 (1) ◽  
pp. 41 ◽  
Author(s):  
Patrick Dunn ◽  
Scott Conard ◽  
Lauren Kirschner

<p><em>While there have been multiple efforts to improve the health of the population, and simultaneously reducing the cost of healthcare and improving the quality of care, there is no single model for improving population health. Worksite health is a microcosm of the health of the nation and the results of been mixed. This paper considers the best practices associated with key worksite health. These best practices include the type of worksite intervention, attention to health literacy, engagement, onsite clinics, coaching and care plans, a digital platform, social support, population health, performance excellence, performance improvement, and an evaluation strategy. While each best practice is considered important, very few programs provide all of the components, and most emphasize one component over the other. A gap in the literature, therefore, is how these best practices can be combined into a single program. Following the review of literature of best practices, a case study, of the program design, of a comprehensive worksite program was conducted to demonstrate how these best practices are operationalized. The Game of Health, is a cognitive based program that focuses on stress management and behavior change in a program that provides onsite programs, a medical clinic, and a digital platform.</em><em></em></p>


2020 ◽  
Vol 4 (02) ◽  
pp. 34-45
Author(s):  
Naufal Dzikri Afifi ◽  
Ika Arum Puspita ◽  
Mohammad Deni Akbar

Shift to The Front II Komplek Sukamukti Banjaran Project is one of the projects implemented by one of the companies engaged in telecommunications. In its implementation, each project including Shift to The Front II Komplek Sukamukti Banjaran has a time limit specified in the contract. Project scheduling is an important role in predicting both the cost and time in a project. Every project should be able to complete the project before or just in the time specified in the contract. Delay in a project can be anticipated by accelerating the duration of completion by using the crashing method with the application of linear programming. Linear programming will help iteration in the calculation of crashing because if linear programming not used, iteration will be repeated. The objective function in this scheduling is to minimize the cost. This study aims to find a trade-off between the costs and the minimum time expected to complete this project. The acceleration of the duration of this study was carried out using the addition of 4 hours of overtime work, 3 hours of overtime work, 2 hours of overtime work, and 1 hour of overtime work. The normal time for this project is 35 days with a service fee of Rp. 52,335,690. From the results of the crashing analysis, the alternative chosen is to add 1 hour of overtime to 34 days with a total service cost of Rp. 52,375,492. This acceleration will affect the entire project because there are 33 different locations worked on Shift to The Front II and if all these locations can be accelerated then the duration of completion of the entire project will be effective


2016 ◽  
Vol 10 (2) ◽  
pp. 162-171
Author(s):  
Hafid Hafid ◽  
Tatang Sutisna

The design and manufacturing of the rotary table with the specification Ø 170 mm (6 inches) for CNC machine 4 axis has been done. The objective of manufacturing a rotary table is to increase the efficiency of CNC machine Hardford 4 axis to be above 80% in line machining center CV. IM’s workshop. The engineering methods was taken, consist of: working preparation, manufacturing of working drawing, engineering process, the manufacturing and testing. The prototype has been tested and operated, the resulting of increasing productivity of which were as follows: the process of assembling was increased to be 3 time ( before 1 time) and processing time for a specific case reduced from 5 hours to 3 hours, number of operators for the case of assembling the rotary reduced to 1 person (before 4 persons), safety and security become to be better. The results show increased efficiency of CNC machine Hardford, from under 50% to be above 80%. Based on the economical analysis obtained by the cost of good sold (C.G.S) of the rotary table is IDR 34.060.000. The results presented in this paper is expected to be case study for developing a business of the metal and engineering SMEs domestic to the effort of improving efficiency, quality, productivity and competitiveness in global market.ABSTRAKPerancangan dan pembuatan alat bantu meja putar (rotary table) dengan spesifikasi teknis Ø 170 mm (6 inci) untuk mesin CNC 4 axis telah dilakukan. Tujuan pembuatan rotary table adalah untuk meningkatkan efisiensi mesin CNC Hardford 4 axis di atas 80% pada line machining center Bengkel CV. IM. Metode rancang bangun yang dilakukan, meliputi: persiapan kerja, pembuatan gambar kerja, proses engineering, pembuatan dan uji coba. Prototip tersebut telah diuji coba dan dioperasikan dengan hasil peningkatan produktivitas sebagai berikut: proses pengerjaan bongkar pasang meningkat menjadi 3 kali (sebelumnya 1 kali) dan waktu pengerjaan untuk kasus tertentu berkurang dari 5 jam menjadi 3 jam, jumlah operator untuk kasus bongkar pasang rotary berkurang menjadi 1 orang (sebelumnya 4 orang), keselamatan kerja dan keamanan menjadi lebih baik. Hasil peningkatan berupa efisiensi mesin CNC Hardford 4 axis dari sebelumnya di bawah 50% menjadi di atas 80%. Berdasarkan hasil perhitungan analisis ekonomi diperoleh harga pokok produksi (HPP) alat bantu meja putar adalah sebesar Rp. 34.060.000. Bahasan ini diharapkan menjadi contoh kasus bagi pengembangan usaha IKM logam dan mesin dalam negeri untuk meningkatkan efisiensi, mutu, produktivitas dan keunggulan daya saing di pasar global.Kata kunci: alat bantu meja putar, mesin CNC, harga pokok produksi


Author(s):  
Michael Woo ◽  
Marcos Campos ◽  
Luigi Aranda

Abstract A component failure has the potential to significantly impact the cost, manufacturing schedule, and/or the perceived reliability of a system, especially if the root cause of the failure is not known. A failure analysis is often key to mitigating the effects of a componentlevel failure to a customer or a system; minimizing schedule slips, minimizing related accrued costs to the customer, and allowing for the completion of the system with confidence that the reliability of the product had not been compromised. This case study will show how a detailed and systemic failure analysis was able to determine the exact cause of failure of a multiplexer in a high-reliability system, which allowed the manufacturer to confidently proceed with production knowing that the failure was not a systemic issue, but rather that it was a random “one time” event.


2012 ◽  
Vol 7 (1) ◽  
Author(s):  
Yanjin Liu ◽  
Giraldo Eugenio

Cultured bacteria addition is one of the technologies used for odor control and FOG (fat, oil, and grease) removal in wastewater collection systems. This study investigated the efficiency of bacterial addition on wastewater odor control by conducting a set of full scale trials in a 60,000 cubic meter per day system for a period of two years. The objectives of this study were: (i) to identify factors that could impact wastewater treatment plant (WWTP) operations due to the effect of bacterial addition in the collection system, (ii) to estimate/understand the level of those impacts, and (iii) to present some interesting findings from the completed case study. The plant operation data before and during the bacterial addition were reviewed. The application of the cultured bacteria presented in the study was found to have significant impacts on the operation of the WWTP in terms of influent biological oxygen demand (BOD) and total suspended solids (TSS) loading, primary settling, sludge production, energy use, dissolved sulfides concentration, and methane production.


1992 ◽  
Vol 25 (9) ◽  
pp. 211-216
Author(s):  
A. Akyarli ◽  
Y. Arisoy

As the wave forces are the function of the wave height, period and the angle between the incoming wave direction and the axis of the discharge pipeline, the resultant wave force is directly related to the alignment of the pipeline. In this paper, a method is explained to determine an optimum pipeline route for which the resultant wave force becomes minimum and hence, the cost of the constructive measures may decrease. Also, the application of this method is submitted through a case study.


Author(s):  
David Whetham

Between 2007 and 2011, Wootton Bassett, a small Wiltshire town in the UK, became the focus of national attention as its residents responded to the regular repatriations of dead soldiers through its High Street. The town’s response came to symbolize the way that broader attitudes developed and changed over that period. As such, it is a fascinating case study in civil–military relations in the twenty-first century. Success may be the same as victory, but victory, at least as it has been traditionally understood, is not a realistic goal in many types of contemporary conflict. Discretionary wars—conflicts in which national survival is not an issue and even vital national interests may not be at stake—pose particular challenges for any government which does not explain why the cost being paid in blood and treasure is ‘worth it’.


Sensors ◽  
2021 ◽  
Vol 21 (16) ◽  
pp. 5300
Author(s):  
Antonia Nisioti ◽  
George Loukas ◽  
Stefan Rass ◽  
Emmanouil Panaousis

The use of anti-forensic techniques is a very common practice that stealthy adversaries may deploy to minimise their traces and make the investigation of an incident harder by evading detection and attribution. In this paper, we study the interaction between a cyber forensic Investigator and a strategic Attacker using a game-theoretic framework. This is based on a Bayesian game of incomplete information played on a multi-host cyber forensics investigation graph of actions traversed by both players. The edges of the graph represent players’ actions across different hosts in a network. In alignment with the concept of Bayesian games, we define two Attacker types to represent their ability of deploying anti-forensic techniques to conceal their activities. In this way, our model allows the Investigator to identify the optimal investigating policy taking into consideration the cost and impact of the available actions, while coping with the uncertainty of the Attacker’s type and strategic decisions. To evaluate our model, we construct a realistic case study based on threat reports and data extracted from the MITRE ATT&CK STIX repository, Common Vulnerability Scoring System (CVSS), and interviews with cyber-security practitioners. We use the case study to compare the performance of the proposed method against two other investigative methods and three different types of Attackers.


Sign in / Sign up

Export Citation Format

Share Document