Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Conference

Discipline
Institution
Keyword
Publication Year
Publication
File Type

Articles 15241 - 15270 of 16633

Full-Text Articles in Physical Sciences and Mathematics

Research Poster: Hydrological Impacts Of Climate Change On Colorado Basin, Peng Jiang, Zhongbo Yu Feb 2010

Research Poster: Hydrological Impacts Of Climate Change On Colorado Basin, Peng Jiang, Zhongbo Yu

2010 Annual Nevada NSF EPSCoR Climate Change Conference

Research poster


Research Poster: Water Source Partitioning For Shrubland Transpiration Using Innovative Field Methods, Amanda Wagner, Dale A. Devitt, Michael Young, Matthew S. Lachniet, Jeremy Koonce, Brian M. Bird Feb 2010

Research Poster: Water Source Partitioning For Shrubland Transpiration Using Innovative Field Methods, Amanda Wagner, Dale A. Devitt, Michael Young, Matthew S. Lachniet, Jeremy Koonce, Brian M. Bird

2010 Annual Nevada NSF EPSCoR Climate Change Conference

Research poster


Research Poster: Nevada System Of Higher Education College Student Climate Change Survey, Jenna Zulauf, Robert Futrell Feb 2010

Research Poster: Nevada System Of Higher Education College Student Climate Change Survey, Jenna Zulauf, Robert Futrell

2010 Annual Nevada NSF EPSCoR Climate Change Conference

Research poster


Research Poster: Architecture And Usability Aspects Of Environmental Data Portals, Victor Ivanov Feb 2010

Research Poster: Architecture And Usability Aspects Of Environmental Data Portals, Victor Ivanov

2010 Annual Nevada NSF EPSCoR Climate Change Conference

Research poster


Research Poster: Vulnerability To Climate Change And Policy Support In Rural Nevada, Ahmad Safi Feb 2010

Research Poster: Vulnerability To Climate Change And Policy Support In Rural Nevada, Ahmad Safi

2010 Annual Nevada NSF EPSCoR Climate Change Conference

Supervisor: Dr. William James Smith, Jr. Research poster


Research Poster: Climate Prediction Downscaling Of Temperature And Precipitation In The Great Basin Region, Ramesh Vellore, Benjamin J. Hatchett, Darko Koracin Feb 2010

Research Poster: Climate Prediction Downscaling Of Temperature And Precipitation In The Great Basin Region, Ramesh Vellore, Benjamin J. Hatchett, Darko Koracin

2010 Annual Nevada NSF EPSCoR Climate Change Conference

Research poster


Research Poster: Survey Of Environmental Data Portals: Features And Characteristics, David Walker Feb 2010

Research Poster: Survey Of Environmental Data Portals: Features And Characteristics, David Walker

2010 Annual Nevada NSF EPSCoR Climate Change Conference

Research poster


Climate Change Education For Nevada, David M. Hassenzahl, Michael Collopy, John W. Farley, Paul Buck, Jacque Ewing-Taylor, Shama Perveen Feb 2010

Climate Change Education For Nevada, David M. Hassenzahl, Michael Collopy, John W. Farley, Paul Buck, Jacque Ewing-Taylor, Shama Perveen

2010 Annual Nevada NSF EPSCoR Climate Change Conference

42 PowerPoint slides Session 1: Education Convener: David Hassenzahl, UNLV Abstract: -Five Year Strategic Plan -Goal 6 - Create a scholarly environment to promote research skills and intellectual development for Nevada educators and students (K-12, undergraduate undergraduate, and graduate) -Primary Strategy - Develop educational infrastructure to train students at all levels and provide public outreach in climate change issues


Annual State Nsf Epscor Climate Change Conference Agenda Feb 2010

Annual State Nsf Epscor Climate Change Conference Agenda

2010 Annual Nevada NSF EPSCoR Climate Change Conference

Conference agenda


Photo Highlights Of The 10th Kentucky Grazing Conference, Kentucky Grazing Conference Oct 2009

Photo Highlights Of The 10th Kentucky Grazing Conference, Kentucky Grazing Conference

Kentucky Grazing Conference

No abstract provided.


Forage Spokesman Information, Tom Flowers, Vince Rawe, Caldwell Willig Oct 2009

Forage Spokesman Information, Tom Flowers, Vince Rawe, Caldwell Willig

Kentucky Grazing Conference

No abstract provided.


Animal Welfare--Animal Rights: Role Of Grazing, Roy Burris Oct 2009

Animal Welfare--Animal Rights: Role Of Grazing, Roy Burris

Kentucky Grazing Conference

The care and handling of farm animals has drawn a lot of media attention lately. Some well-publicized events have given our industry the proverbial black-eye and led to a chain of events that has left livestock producers feeling very vulnerable to negative attacks. Although these events have been very isolated, they have had some very farreaching effects. Could they have been prevented? How? What do we do now?


Extended Grazing And Reduced Stored Feed, Edward N. Ballard Oct 2009

Extended Grazing And Reduced Stored Feed, Edward N. Ballard

Kentucky Grazing Conference

Feed costs represent the major cost in most livestock production systems. A recently completed analysis of 225 Standardized Performance Analysis (SPA) Beef Cow Records on herds in Illinois and Iowa showed that feed cost was the overriding factor determining profitability, explaining over 57 percent of the herd-to-herd variation. Typically the cost of supplying nutrients to ruminant livestock is much greater using harvested feedstuffs as opposed to grazing pastures or crop residues. The primary function of a grassland farm is to convert solar energy to marketable livestock products in the most efficient manner. The fewer steps between the animal product and …


Stored Feed Needs: How Much? What Quality?, Jeff Lehmkuhler Oct 2009

Stored Feed Needs: How Much? What Quality?, Jeff Lehmkuhler

Kentucky Grazing Conference

Feed resources are the largest variable expense in beef production systems outside the initial investment in the livestock. When we look at Standardized Performance Analysis (SPA) information from Texas and Minnesota, states that are at the extreme from an environment stance, the projected costs for maintaining a beef cow are strikingly similar. It is important to note that these costs include all expenses and opportunity costs. Getting back to the SPA information, in 2007 the annual cost to maintain a cow in Texas was determined to be roughly $590 while the Minnesota value was near $610 or only about $20/cow …


Tall Fescue Grazing Research, Glen Aiken Oct 2009

Tall Fescue Grazing Research, Glen Aiken

Kentucky Grazing Conference

‘Kentucky-31’ tall fescue, like it or hate it, covers 5 million acres of Kentucky and if you do not have it on your farm, it is likely that one of your bordering neighbors does! Tall fescue owes its persistence and productivity in large part to a fungal endophyte that infects most plants. This endophyte produces an array of alkaloids that benefit the plant in tolerating heat, drought, and grazing. Unfortunately, the endophyte also produces ergot alkaloids that can cause “fescue toxicosis” in cattle. Cattle inflicted with toxicosis have reduced dry matter intake, elevated body temperature, and often retain their winter …


Weed Control Options For Pastures, Jon Doran Oct 2009

Weed Control Options For Pastures, Jon Doran

Kentucky Grazing Conference

What is a weed? A pasture or hayfield “weed” is any plant that you deem as being out of place and/or a plant that is decreasing your desired forage production. Weeds may be classified in several ways including broadleaf weeds, woody plants, and undesirable grasses. Besides decreasing forage, weeds can also interfere with forage utilization, grazing distribution, etc. There are several methods available to control weeds and increase production of and access to desirable forages. The three main methods are cultural, mechanical, and chemical. The cultural method is quite simple-a thriving grass stand is an excellent form of weed control …


Our Experiences With Eastern Gamagrass, Tommy R. Yankey Oct 2009

Our Experiences With Eastern Gamagrass, Tommy R. Yankey

Kentucky Grazing Conference

As livestock producers try to reduce their cost of production, many look at ways to reduce their feed costs. Feed costs have been identified as the largest single cost of livestock production, making up 50 to 70% of the total cost of production. Grazing is the cheapest way to feed cattle on a cost per pound of nutrient basis.


New Developments In Grazing Species And Varieties, S. Ray Smith Oct 2009

New Developments In Grazing Species And Varieties, S. Ray Smith

Kentucky Grazing Conference

During the last 10 years there have been several new forage species that have emerged as useful in grazing systems and many new varieties have been released of traditional species. Plant breeders continue to make improvement in our traditional pasture species like tall fescue, orchardgrass, and red and white clover. In the following paragraphs, I will focus more on some of the forage species that you may not be as familiar with and highlight the advancements occurring in developing new varieties for grazing. There are many sources of information on this subject. I especially encourage you to read the new …


Why Should I Improve My Grazing Program?, Garry D. Lacefield Oct 2009

Why Should I Improve My Grazing Program?, Garry D. Lacefield

Kentucky Grazing Conference

Grazing represents the cheapest way to feed ruminants on a cost per pound of nutrient basis. Stored feed is usually the single largest item in livestock budgets and cost or amount of stored feed is usually the best prediction of potential profitability in most beef cattle operations.


Foreword And Kfgc Award Winners [2009], Garry D. Lacefield, Christi L. Forsythe Oct 2009

Foreword And Kfgc Award Winners [2009], Garry D. Lacefield, Christi L. Forsythe

Kentucky Grazing Conference

No abstract provided.


Networks - Ii: Optimal Fractional Frequency Reuse (Ffr) And Resource Allocation In Multiuser Ofdma System, Naveed Ul Hassan, Mohamad Assaad Sep 2009

Networks - Ii: Optimal Fractional Frequency Reuse (Ffr) And Resource Allocation In Multiuser Ofdma System, Naveed Ul Hassan, Mohamad Assaad

International Conference on Information and Communication Technologies

In this paper we determine the optimal fractional frequency reuse (FFR) and resource allocation in OFDMA system. Since the users at the cell edge are more exposed to inter-cell interference therefore each cell is partitioned into two regions; inner region and outer region. We determine the optimal FFR factor for the outer region, bandwidth assigned to each region and subcarrier and power allocation to all the users in the cell. The problem is formulated as sum-power minimization problem subject to minimum rate constraints in both the regions. This is a mixed linear integer programming problem which is relaxed into a …


Wireless Networks: Spert: A Stateless Protocol For Energy-Sensitive Real-Time Routing For Wireless Sensor Network, Sohail Jabbar, Abid Ali Minhas, Raja Adeel Akhtar Aug 2009

Wireless Networks: Spert: A Stateless Protocol For Energy-Sensitive Real-Time Routing For Wireless Sensor Network, Sohail Jabbar, Abid Ali Minhas, Raja Adeel Akhtar

International Conference on Information and Communication Technologies

Putting constraints on performance of a system in the temporal domain, some times turns right into wrong and update into outdate. These are the scenarios where apposite value of time inveterate in the reality. But such timing precision not only requires tightly scheduled performance constraints but also requires optimal design and operation of all system components. Any malfunctioning at any relevant aspect may causes a serious disaster and even loss of human lives. Managing and interacting with such real-time system becomes much intricate when the resources are limited as in wireless sensor nodes. A wireless sensor node is typically comprises …


Software Engineering: Security Characterization For Evaluation Of Software Architectures Using Atam, Asad Raza, Haider Abbas, Louise Yngstrom, Ahmed Hemani Aug 2009

Software Engineering: Security Characterization For Evaluation Of Software Architectures Using Atam, Asad Raza, Haider Abbas, Louise Yngstrom, Ahmed Hemani

International Conference on Information and Communication Technologies

Significant technological advancement in the current electronic era has influenced the work processes of private and government business entities. E-Government is one such area where almost every country is emphasizing and automating their work processes. Software architecture is the integral constituent of any software system with not only cumbersome modeling and development but require heedful evaluation. Considering this aspect we have highlighted in this paper, security evaluation of an ongoing e-society project ESAM using Architectural Tradeoff Analysis Method (ATAM). ESAM is a Web based system intended to provide e-services to the Swedish community residents. ATAM is primarily used for architectural …


Wireless Networks: Certificateless Id-Based Authentication Using Threshold Signature For P2p Manets, Aasia Samreen, Seema Ansari Aug 2009

Wireless Networks: Certificateless Id-Based Authentication Using Threshold Signature For P2p Manets, Aasia Samreen, Seema Ansari

International Conference on Information and Communication Technologies

As far as the security of MANET (mobile and ad hoc network) is concerned, it depends upon the secure authentication especially for P2P MANETs. Identity based encryption was introduced to construct Public Key without requiring a certificate. Therefore, certificateless authentication combined with threshold digital signature and efficient key generation using identities such as IP address, are the challenging issues in front of researchers. In this paper we have addressed the problem of identity based secure authentication employing well-known RSA algorithm and secret sharing to generate threshold signature on a message.


Software Engineering: An Open Source Service Oriented Mobile Business Intelligence Tool (Mbit), Bushra Sajjad, A. Mir, A. Khawar, F. Bashir, A. Tariq Aug 2009

Software Engineering: An Open Source Service Oriented Mobile Business Intelligence Tool (Mbit), Bushra Sajjad, A. Mir, A. Khawar, F. Bashir, A. Tariq

International Conference on Information and Communication Technologies

Corporate executives require relevant and intelligent business information in real-time to take strategic decisions. They require the freedom to access this information anywhere and anytime. There is a need to extend this functionality beyond the office and on the fingertips of the decision makers. Mobile Business Intelligence Tool (MBIT) aims to provide these features in a flexible and cost-efficient manner. This paper describes the detailed architecture of MBIT to overcome the limitations of existing mobile business intelligence tools. Further, a detailed implementation framework is presented to realize the design. This research highlights the benefits of using service oriented architecture to …


Software Engineering: A Pattern For The Effective Use Of Object Oriented Databases, Muhammad Ubaid, Nauman Atique, Saira Begum Aug 2009

Software Engineering: A Pattern For The Effective Use Of Object Oriented Databases, Muhammad Ubaid, Nauman Atique, Saira Begum

International Conference on Information and Communication Technologies

In object oriented scenario, inheritance is a process to make new classes by using classes that have already been defined. Inheritance helps to reuse existing code, by adding together of properties will enhance all new child objects without interfering with their existing ties. In object-oriented programming, an object is instance of class that consists of data and the methods, allows binding for them and operate on that data, stored in the memory of a running application. This paper presents a methodology of class hierarchy with the normalization in object oriented databases. CHNF (class hierarchy normal form) is good concept for …


Application Of Ict Ii: Analytic Network Process Applied To R&D Project Selection, Murad Habib, Raza Khan, Javaid L. Piracha Aug 2009

Application Of Ict Ii: Analytic Network Process Applied To R&D Project Selection, Murad Habib, Raza Khan, Javaid L. Piracha

International Conference on Information and Communication Technologies

Research and development (R&D) project selection is a complex decision-making process. Risks and uncertainties are also associated with the investments and returns of R&D projects. This research paper illustrates an application of ANP (analytic network process). The analytic network process (ANP) is presented as a potentially valuable method to support the selection of projects in a research and development (R&D) environment. The AHP (analytic hierarchy process) is employed to break down large unstructured decision problems into manageable and measurable components. The ANP, as the general form of AHP, is powerful to deal with complex decisions where interdependence exists in a …


Wireless Networks: Automated Frequency Distribution, Management & Assignment (Afdma) In Ieee 802.16, Khurram Shehzad, A. Ali, F. Rasool, R. M. Hashmi, A. Zubair, R. L. Ali Aug 2009

Wireless Networks: Automated Frequency Distribution, Management & Assignment (Afdma) In Ieee 802.16, Khurram Shehzad, A. Ali, F. Rasool, R. M. Hashmi, A. Zubair, R. L. Ali

International Conference on Information and Communication Technologies

Frequency is amongst the most exclusive and most costly resources in wireless communication networks, especially, while considering the demands of broadband wireless access (BWA). In BWA, the management of frequency distribution and its effective utilization is of utmost importance. This research explores possible ways to ensure the most effective allocation of bandwidth resources and their best possible utilization on need basis. The model for static frequency allocation has been optimized and the dynamic frequency management has been calculated while dividing the users in different user classes on the basis of their needs and requirements. The effect of ping-pong handovers has …


Wireless Networks: Improved Secure Network Authentication Protocol (Isnap) For Ieee 802.16, Raheel M. Hashmi, Arooj M. Siddiqui, M. Jabeen, K. Shehzad, A. Zubair, K. S. Alimgeer Aug 2009

Wireless Networks: Improved Secure Network Authentication Protocol (Isnap) For Ieee 802.16, Raheel M. Hashmi, Arooj M. Siddiqui, M. Jabeen, K. Shehzad, A. Zubair, K. S. Alimgeer

International Conference on Information and Communication Technologies

Security is amongst one of the major issues in broadband wireless access (BWA) networks. After the launch of the IEEE 802.16 standard (WiMAX), a number of security issues were reported in several articles. Ever since the beginning, work has been in progress for the neutralization of these identified threats. In this paper, the analysis of the authentication protocols implemented in WiMAX has been presented along with the description of the threats posed to them. The paper also describes security sub-layer and limitations of the existing architecture. An approach has also been presented for the prevention of these threats like the …


Application Of Ict Ii: Considerations On The Validity Constraints For The Bistatic Sar Processing, Qurat Ul-Ann, Otmar Loffeld, Holger Nies, Robert Wang Aug 2009

Application Of Ict Ii: Considerations On The Validity Constraints For The Bistatic Sar Processing, Qurat Ul-Ann, Otmar Loffeld, Holger Nies, Robert Wang

International Conference on Information and Communication Technologies

This paper gives some considerations on the validity constraints for spaceborne/airborne configurations, based on Loffeld's bistatic formula (LBF) for unequal azimuth contribution of transmitter and receiver phase terms.