Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Conference

Discipline
Institution
Keyword
Publication Year
Publication
File Type

Articles 15781 - 15810 of 16621

Full-Text Articles in Physical Sciences and Mathematics

Grazing Programs: Environmentally Friendly, Economically Sound And Agronomically Feasible, Sid Brantly Jan 2006

Grazing Programs: Environmentally Friendly, Economically Sound And Agronomically Feasible, Sid Brantly

Kentucky Grazing Conference

The environmental soundness of our farms is the greatest, long term asset that farmers have. The topsoil, the trees, the cattle, the grass and crops on your farm are like unto a great financial account...and you are the banker. You make the decisions to: A) Use it all up now, B) Lock it away for someone in the future to make the decisions, or C) Utilize wisely in such a way that it is managed for financial success today, and still builds momentum for your future as well as your descendents.


Animal Behavior: Impacts On Grazing, Mark Kennedy Jan 2006

Animal Behavior: Impacts On Grazing, Mark Kennedy

Kentucky Grazing Conference

I am not an expert on this subject and give all credit for my limited understanding of this subject to Dr. Fred Provenza, Utah State University; Katy Voth, Livestock for Landscapes, LLC; Jim Gerrish and others. I have tried to put into practice, both personally and with other producers, many of these principles to aid in improved grazing management. This presentation will address only 2 aspects of animal behavior; 1) How animal behavior impacts grazing distribution and forage utilization over the landscape, and 2) How animal behavior affects diet selection.


Growing Forage Crops For Wildlife, Don Ball Jan 2006

Growing Forage Crops For Wildlife, Don Ball

Kentucky Grazing Conference

Numerous forage crops adapted in the Southeast offer benefits in production of various domestic animals including beef and dairy cattle, horses, and sheep (Ball, et al., 2002). Many of the same attributes these plants offer when grown in connection with livestock enterprises are also valuable in wildlife settings. Furthermore, the attitudes of many wildlife managers are changing, and their desire for knowledge of forage crops is on the rise. Consequently, forage crops are becoming more important and more greatly appreciated by wildlife enthusiasts within our region.


Maximizing Production Of Beef Cattle On Pastures, Justin Sexten Jan 2006

Maximizing Production Of Beef Cattle On Pastures, Justin Sexten

Kentucky Grazing Conference

Standardized performance analysis (SPA) of beef cattle operations continues to demonstrate the importance of reducing feed related costs. As producers look for alternative methods to reduce feed costs the benefits of improved forage management become increasingly important due to the opportunity to reduce feed costs while improving animal performance. One note of caution related to maximizing beef production from pasture, maximizing anything must be done carefully, the difference between maximum success and a total disaster is a fine line.


Grazing Program For Goats, Greg Brann Jan 2006

Grazing Program For Goats, Greg Brann

Kentucky Grazing Conference

Goats are often referred to as four legged bush hogs and actually they perform best when consuming browse. Goats eat from the top down so fields have a mown appearance even when forage is three feet tall. The typical browse height for goats is up to four foot however, they will rise up on their hind legs and sometimes prop on others backs to reach higher. Goats have an affinity for high quality forage. Much of the vegetation we have considered weeds as beef producers is excellent forage for goats. Goats select the high quality leaves and tender growing tips …


From Traditional Confinement Dairying To Grazing Replacement Heifers, Bill Payne Jan 2006

From Traditional Confinement Dairying To Grazing Replacement Heifers, Bill Payne

Kentucky Grazing Conference

I would like to share an account of a transition from a conventional dairy operation to our current Management Intensive Grazing (MIG) enterprise. In 1974, I joined my father who at that time had been dairying on a 265 acre farm in Lincoln County, Kentucky for twenty five years. We fed our registered Holsteins corn silage and alfalfa haylage and purchased a manufactured feed. Our herd of 70 Holsteins spent most of their time on concrete. We did make an effort to allow access to an exercise lot when weather permitted. However, during the greater part of the 1990’s we …


Pastures For Horses: Challenges And Opportunities, Robert Coleman Jan 2006

Pastures For Horses: Challenges And Opportunities, Robert Coleman

Kentucky Grazing Conference

Horses were born to eat grass and how they evolved has allowed them to be efficient users of a high forage diet. In fact, for many of today’s horses, they will survive and thrive on an all forage diet.


Can We Graze Year-Around In The Heart Of America, Edward N. Ballard Jan 2006

Can We Graze Year-Around In The Heart Of America, Edward N. Ballard

Kentucky Grazing Conference

Feed costs represent the major cost in most livestock production systems. A recently completed analysis of 225 Standardized Performance Analysis (SPA) Beef Cow Records on herds in Illinois and Iowa showed that feed cost was the overriding factor determining profitability, explaining over 57 percent of the herd-to-herd variation. Typically the cost of supplying nutrients to ruminant livestock is much greater using harvested feedstuffs as opposed to grazing pastures or crop residues. The primary function of a grassland farm is to convert solar energy to marketable livestock products in the most efficient manner. The fewer steps between the animal product and …


Foreword And Conference Information [2006], Garry D. Lacefield, Christi L. Forsythe Jan 2006

Foreword And Conference Information [2006], Garry D. Lacefield, Christi L. Forsythe

Kentucky Grazing Conference

No abstract provided.


Quantified Model Of Cobit For Corporate It Governance, M. Sibghatullah Siddiqui, Dr. Syed Jamal Hussain Aug 2005

Quantified Model Of Cobit For Corporate It Governance, M. Sibghatullah Siddiqui, Dr. Syed Jamal Hussain

International Conference on Information and Communication Technologies

Now organizations are more concerned about the appropriate IT governance. The growing dependency on IT due to the increasing volume of business process automation further challenges the role of Information System Auditor. IT Governance Institute has developed COBIT1 as a model for this purpose [1][2]. The model proposed in this research quantifies the COBIT by developing matrices for all four domains of COBIT; hence it provides a quantitative approach for better implementation of corporate IT governance through effective audit and control.


Making Decision In Requirement Change Management, Saffena Ramzan, Naveed Ikram Aug 2005

Making Decision In Requirement Change Management, Saffena Ramzan, Naveed Ikram

International Conference on Information and Communication Technologies

Requirement change management a significant activity, which is performed through out the development of the software and even during the maintenance phase. It is the core activity to obtain one of the main objectives of software development, which is to satisfy the evolving needs of the customers. Software requirements are linked and dependent on other requirements and changing one requirement definitely affects interlinked requirements. Impact analysis is the crux of requirement change management which is to obtain with the change of requirements, so that the scope of that change is identified. Traceability is the pre-requisite to acquire proper impact analysis. …


Enhancement Of Software Engineering By Shifting From Software Product To Software Service, Muhammad Saeed, Muhammad Jaffar-Ur- Rehman Aug 2005

Enhancement Of Software Engineering By Shifting From Software Product To Software Service, Muhammad Saeed, Muhammad Jaffar-Ur- Rehman

International Conference on Information and Communication Technologies

Software development has always been a supply side affair, in which domain experts were the main requirement providers. Software engineers have been creating new technologies, frameworks and methodologies but this has made the software engineering job more complex. Recently all this has been looked at from demand-side prospective. So a new concept of Service Based Software Engineering is shaping up which look at the software as a service rather then a product. This paper is going to analysis the fundamental requirements of such a paradigm shift, by first gathering the concept and then translating this to a workable solution. Different …


An Investigation Into The Skills Gap In The Software Industry Of Pakistan, Zareen Sharf, Dr. Wasim A. Khan Aug 2005

An Investigation Into The Skills Gap In The Software Industry Of Pakistan, Zareen Sharf, Dr. Wasim A. Khan

International Conference on Information and Communication Technologies

Software Industry workers require an adequate skill set to gain maximum output from the effective use of technology. The purpose of this study is to explore the nature of actual and desired software developer, jobs skill set. Survey methodology will be used to obtain reports of actual skill level and those desired to define common dimensions of the software developer skill set. Anticipated results will add to the existing body of IT job skills knowledge and may provide practice with job development and career planning guidance. We also intend to propose a skill standard for the software industry of Pakistan …


Implementation And Analysis Of Cmmi's Configuration Management Process Area; Applicable To "Defined" Level - 3, Ahmad Luqman Aug 2005

Implementation And Analysis Of Cmmi's Configuration Management Process Area; Applicable To "Defined" Level - 3, Ahmad Luqman

International Conference on Information and Communication Technologies

Enterprise Resource Planner (ERP) is a strategically important tool as integrated business application for long-term success in an increasingly competitive global market. This system requires the integration of data and business processes across the whole enterprise. In order to develop a good quality product there is a need of applying proper model. It becomes more costly in terms of training, appraisals, and improvement activities while applying multiple models that are not integrated within and across an organization. Where as Capability Maturity Model Integration is a set of integrated models that successfully addresses multiple disciplines and has integrated training support. Objective …


Opems: Online Peer-To-Peer Expertise Matching System, Sharifullah Khan, S.M. Nabeel Aug 2005

Opems: Online Peer-To-Peer Expertise Matching System, Sharifullah Khan, S.M. Nabeel

International Conference on Information and Communication Technologies

Internet is a vital source to disseminate and share information to the masses. This has made information available in abundance on the Web. However, finding relevant information is difficult if not impossible. This difficulty is bilateral between information providers and seekers in terms of information presentation and accessibility respectively. This paper proposed an online Peer-to-Peer Expertise Matching system. The approach provides a highly scalable and self-organizing system and helps individuals in presenting and accessing the information in a consistent format on the Web. This makes the sharing of information among the autonomous organizations successful.


Enhanced Risk Analysis-Relative Impact Factorization, Basit Shahzad, Tanveer Afzal, Rizwana Irfan Aug 2005

Enhanced Risk Analysis-Relative Impact Factorization, Basit Shahzad, Tanveer Afzal, Rizwana Irfan

International Conference on Information and Communication Technologies

Software engineering is an area of development which always has the risk factor present and software engineering can hardly be done on some straight line. So, the manager has to handle the dynamically changing circumstances in order to complete the job. The target of development team is to develop the software according to the requirements within specified time. Wide variety of risks I are present that may grab the development effort. A good manager must ensure that all measures have been taken against the risks that may possibly come. This paper focuses on determining the relative impact of risk factors …


Fuzzy Logic Control Of Coupled Liquid Tank System, Muhammad Abid Aug 2005

Fuzzy Logic Control Of Coupled Liquid Tank System, Muhammad Abid

International Conference on Information and Communication Technologies

This paper presents a fuzzy control of coupled liquid tank system. The Coupled Liquid Tank system is developed at PIEAS. It has three liquid tanks coupled together. The liquid level in tank 2 is maintained using fuzzy logic. The results are compared with the PID control, mostly used in industries.


A Comparative Study And Analysis Of Pvm And Mpi For Parallel And Distributed Systems, Dr. Syed Jamal Hussain, Ghufran Ahmed Aug 2005

A Comparative Study And Analysis Of Pvm And Mpi For Parallel And Distributed Systems, Dr. Syed Jamal Hussain, Ghufran Ahmed

International Conference on Information and Communication Technologies

Networks of Workstations (NOWs) based on various operating systems are globally accepted as the standard for computing environments in the IT industry. To harness the tremendous potential for computing capability represented by these NOWs, various new tools are being developed. Parallel Virtual Machine (PVM) and Message Passing Interface (MPI) have existed on UNIX workstations for some time, and are maturing in their capability for handling Distributed Parallel Processing (DPP). This research is aimed to explore each of these two vehicles for DPP, considering capability, ease of use, and availability, and compares their distinguishing features; and also explores programmer interface and …


Mapping Ogc Prince 2 To Sei Cmmi 1.1, Ahmad Luqman, Fida Hussain, Dr. S. Tauseef -Ur- Rehman Aug 2005

Mapping Ogc Prince 2 To Sei Cmmi 1.1, Ahmad Luqman, Fida Hussain, Dr. S. Tauseef -Ur- Rehman

International Conference on Information and Communication Technologies

The Capability Maturity Model Integration (CMMI) version 1.1, developed by the Software Engineering Institute (SEI), USA and the PRoject IN Controlled Environment (PRINCE) version 2 developed by Central Computing and Telecommunications Agency (CCTA) now Office of Government Commerce (OGC) as UK Government standard for IT Project Management, share a common concern with Project and Quality management by improved process management. Both are driven by similar concerns and intuitively correlated. Organizations concerned with PRINCE 2 certification often question its overlap with the CMMI. We have looked into OGC PRINCE 2 process/components and map it to the different goals/practices in the SEI …


Service-Oriented E-Learning Architecture Using Web Service-Based Intelligent Agents, Nasir Hussain, M. Khalid Khan Aug 2005

Service-Oriented E-Learning Architecture Using Web Service-Based Intelligent Agents, Nasir Hussain, M. Khalid Khan

International Conference on Information and Communication Technologies

There is no doubt that e-learning has found its way in our lives. From the very start to the Ph.D. level one can find e-learning courses every where and all the big names are supporting it. One thing that is needed to be understood is that e-learning is basically the integration of various technologies. Now this technology is maturing and we can find different standards for e-learning .New technologies such as agents and web services are promising better results. In this paper we have proposed an e-learning architecture that is dependent on multi-agent systems and web services. These communication technologies …


Towards Knowledge Morphing: A Triangulation Approach To Link Tacit And Explicit Knowledge, Fehmida Hussain, Syed Sibte Raza Abidi, Syed Ali Raza Aug 2005

Towards Knowledge Morphing: A Triangulation Approach To Link Tacit And Explicit Knowledge, Fehmida Hussain, Syed Sibte Raza Abidi, Syed Ali Raza

International Conference on Information and Communication Technologies

Current knowledge management systems are largely designed to deal with a single knowledge modality. Given the diversity of knowledge modalities that encompass any given topic/problem it is reasonable to demand access and use of all available knowledge, irrespective of their representation modality, to derive a knowledge-mediated solution. This calls for selecting all knowledge elements (represented in different modalities) that are relevant to the solution of the problem at hand. Thus here we pursue the specification and implementation of such a knowledge-mediated solution using a triangulation approach leading to Knowledge Morphing. In this paper we present a tacit-explicit knowledge morphing (TEKM) …


Using Software Engineering Principles To Develop Reusable Business Rules, Saqib Ali, Ben Soh, Torab Torabi Aug 2005

Using Software Engineering Principles To Develop Reusable Business Rules, Saqib Ali, Ben Soh, Torab Torabi

International Conference on Information and Communication Technologies

Nowadays, businesses need a system that can provide flexibility, reusability and simplicity for their business solutions. However, if business logics or rules are implemented using procedural paradigms, then the business systems will become more complex. In this paper we treat business logics separate from system logics, whereby we analyse a business by describing its rules and developing a set of rule statements. These business rules will be treated as a separate component in the design and implementation of the system. We have found that our proposed method leads to a system, which is more customisable, flexible, efficient, and reusable, in …


Poster Session A: Classification Of Compressed Human Face Images By Using Principle Components, Zahid Riaz, Arif Gilgiti, Zulfiqar Ali Aug 2005

Poster Session A: Classification Of Compressed Human Face Images By Using Principle Components, Zahid Riaz, Arif Gilgiti, Zulfiqar Ali

International Conference on Information and Communication Technologies

This paper describes the novel approach of classifying the humans on the basis of their compressed face images. The compression of the face images is performed using Discrete Wavelet Transform (DWT). While the classification encompass the use of Principal Components Analysis (PCA). Classification technique utilizes PCA in some different way. Only first principal component is used as feature vector out of 92 components (since image size is 112×92), causing a better results of 87.39%. The Euclidean distance is used as distance metric. In the end our results are compared to our previous research of classifying the uncompressed images.


Poster Session A: Address Auto-Configuration In Mobile Ad Hoc Networks Using Olsr, M.U. Saleem, Shoaib Mukhtar Aug 2005

Poster Session A: Address Auto-Configuration In Mobile Ad Hoc Networks Using Olsr, M.U. Saleem, Shoaib Mukhtar

International Conference on Information and Communication Technologies

Mobile Ad Hoc Networks is dynamic multi-hop network that is formed by a set of mobile wireless nodes that are sharing the same bandwidth. So every node possibly acts as a host as well as a router. In traditional networks, hosts can depend on the central servers like DHCP for IP assignment and management, but it cannot be extended to MANET due to its distributed and dynamic nature. Many solutions have been proposed, amongst them some are try to extend the stateless configuration of IPv6 for MANET; others distribute IP addresses among nodes (using binary distribution). Most of these proposed …


Poster Session A: Fingerprint Matching Using Ridge Patterns, Muhammad Umer Munir, Dr. Muhammad Younus Javed Aug 2005

Poster Session A: Fingerprint Matching Using Ridge Patterns, Muhammad Umer Munir, Dr. Muhammad Younus Javed

International Conference on Information and Communication Technologies

This paper presents a fingerprint matching scheme that utilizes a ridge patterns to match fingerprint images. The proposed scheme uses a set of 16 Gabor filters where spatial frequencies correspond to the average inter-ridge spacing in fingerprints. It is used to capture the ridge strength at equally spaced orientations. A circular tessellation of filtered image is then used to construct the ridge feature map. This ridge feature map contains both global and local details in a fingerprint as a compact fixed length feature vector. The fingerprint matching is based on the Euclidean distance between two corresponding feature vectors. The genuine …


Poster Session A: Analyzing & Enhancing Energy Efficient Communication Protocol For Wireless Micro-Sensor Networks, Irfan Majeed Butt, Shoab Ahmed Khan Aug 2005

Poster Session A: Analyzing & Enhancing Energy Efficient Communication Protocol For Wireless Micro-Sensor Networks, Irfan Majeed Butt, Shoab Ahmed Khan

International Conference on Information and Communication Technologies

The paper presents an analysis of energy efficient routing protocols with direct communication protocol. A comparison of these protocols is made analyzing energy consumption at each node and explaining system lifetime after certain rounds. The paper also proposes a novel energy conscious cluster head selection algorithm for making system more reliable and efficient. Simulation shows that our proposed algorithm enhances the system reliability and accuracy.


Poster Session A: Use Of Neural Networks In Multi-Sensor Fusion For Remote Sensing Applications, Engr. S. M. Haider Aejaz Aug 2005

Poster Session A: Use Of Neural Networks In Multi-Sensor Fusion For Remote Sensing Applications, Engr. S. M. Haider Aejaz

International Conference on Information and Communication Technologies

Remote sensing encounters different types of objects with similar spectral signatures. Multi-sensors form the solution of the problem with spectral different parts of the spectrum and the resulting information is then processed using digital signal processing techniques. Artificial neural networks provide another method for processing this information. The research describes how neural networks may be used to classify objects on the basis of their spectral response to different frequencies.


Poster Session A: A Multi-Priority Application Framework For Mobile Ad Hoc Networks, M. Ibrahim Channa, Ahsan Chaudhry, Kashif Sharif, Irum Memon Aug 2005

Poster Session A: A Multi-Priority Application Framework For Mobile Ad Hoc Networks, M. Ibrahim Channa, Ahsan Chaudhry, Kashif Sharif, Irum Memon

International Conference on Information and Communication Technologies

The fast spread of small wireless computers has enabled the design and deployment of wireless Ad Hoc networks. Typical applications proposed for such networks include both Real Time and Non-Real Time applications. We propose an architecture that provides a complete framework for Real Time applications and Best Effort traffic. The proposed architecture comprises of an Ad Hoc Routing Protocol for route setup and route repair, a Bandwidth Allocation and Reservation Scheme for Real Time traffic, and a MAC layer protocol that provides traffic differentiation. The Admission Control module is used to admit or reject a new Real Time flow request …


Poster Session A: Face Recognition Using Sub-Holistic Pca, Muhammad Murtaza Khan, Dr. Muhammad Younus Javed, Muhammad Almas Anjum Aug 2005

Poster Session A: Face Recognition Using Sub-Holistic Pca, Muhammad Murtaza Khan, Dr. Muhammad Younus Javed, Muhammad Almas Anjum

International Conference on Information and Communication Technologies

This paper proposes a face recognition scheme that enhances the correct face recognition rate as compared to conventional Principal Component Analysis (PCA). The proposed scheme, Sub-Holistic PCA (SH-PCA), was tested using ORL database and out performed PCA for all test scenarios. SH-PCA requires more computational power and memory as compared to PCA however it yields an improvement of 6% correct recognition on the complete ORL database of 400 images. The correct recognition rate for the complete ORL database is 90% for the SH-PCA technique.


Keynote: The Use Of Meta-Heuristic Algorithms For Data Mining, Dr. Beatrize De La Iglesia, A. Reynolds Aug 2005

Keynote: The Use Of Meta-Heuristic Algorithms For Data Mining, Dr. Beatrize De La Iglesia, A. Reynolds

International Conference on Information and Communication Technologies

In this paper we explore the application of powerful optimisers known as metaheuristic algorithms to problems within the data mining domain. We introduce some well-known data mining problems, and show how they can be formulated as optimisation problems. We then review the use of metaheuristics in this context. In particular, we focus on the task of partial classification and show how multi-objective metaheuristics have produced results that are comparable to the best known techniques but more scalable to large databases. We conclude by reinforcing the importance of research on the areas of metaheuristics for optimisation and data mining. The combination …