Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Life Sciences (10449)
- Earth Sciences (8243)
- Plant Sciences (7764)
- Soil Science (7667)
- Plant Biology (3115)
-
- Agronomy and Crop Sciences (3105)
- Agricultural Science (3104)
- Plant Pathology (3103)
- Weed Science (3101)
- Environmental Sciences (2831)
- Computer Sciences (1700)
- Engineering (1491)
- Oceanography and Atmospheric Sciences and Meteorology (1063)
- Statistics and Probability (1019)
- Natural Resources and Conservation (903)
- Medicine and Health Sciences (857)
- Marine Biology (827)
- Sustainability (823)
- Fresh Water Studies (819)
- Ecology and Evolutionary Biology (785)
- Physics (768)
- Social and Behavioral Sciences (752)
- Terrestrial and Aquatic Ecology (655)
- Chemistry (653)
- Oil, Gas, and Energy (633)
- Applied Mathematics (623)
- Environmental Monitoring (618)
- Applied Statistics (609)
- Environmental Indicators and Impact Assessment (589)
- Institution
-
- University of Kentucky (8229)
- Western Washington University (872)
- Kennesaw State University (540)
- Kansas State University Libraries (509)
- Virginia Commonwealth University (469)
-
- Utah State University (449)
- University of Nevada, Las Vegas (443)
- Illinois State University (436)
- Clemson University (349)
- Syracuse University (255)
- Purdue University (238)
- Embry-Riddle Aeronautical University (235)
- Western Kentucky University (203)
- University for Business and Technology in Kosovo (195)
- Roseman University of Health Sciences (156)
- Old Dominion University (128)
- Western University (110)
- Institute of Business Administration (104)
- Portland State University (101)
- Montclair State University (96)
- University of South Florida (93)
- Illinois Math and Science Academy (91)
- Stephen F. Austin State University (88)
- University of Nebraska at Omaha (85)
- Murray State University (80)
- Illinois Wesleyan University (75)
- Nova Southeastern University (72)
- Southwestern Oklahoma State University (71)
- Florida International University (66)
- Cedarville University (63)
- Keyword
-
- Grazing (333)
- And Energy; Structural Materials; Sustainability (248)
- Energy Systems; Environmental Indicators and Impact Assessment; Environmental Monitoring; Mining Engineering; Oil (248)
- Gas (248)
- Alfalfa (162)
-
- Grassland (152)
- Forage (139)
- Nitrogen (139)
- Pasture (139)
- Climate change (138)
- Sheep (136)
- Biodiversity (125)
- Cattle (125)
- Forage quality (114)
- Medicine (112)
- Silage (112)
- Yield (111)
- Epidemiology (100)
- Nutritive value (96)
- Digestibility (95)
- Sustainability (94)
- Livestock (93)
- Grasslands (90)
- Legumes (87)
- Grazing management (86)
- Intake (84)
- Perennial ryegrass (84)
- Stocking rate (81)
- Crude protein (78)
- Grass (78)
- Publication Year
- Publication
-
- IGC Proceedings (1993-2023) (7001)
- Salish Sea Ecosystem Conference (810)
- Conference on Applied Statistics in Agriculture (489)
- World of Coal Ash Proceedings (472)
- Biology and Medicine Through Mathematics Conference (469)
-
- Annual Symposium on Biomathematics and Ecology Education and Research (436)
- Kentucky Alfalfa and Stored Forage Conference (382)
- S.C. Water Resources Conference (336)
- C-Day Computing Showcase (307)
- International Building Physics Conference 2018 (255)
- UBT International Conference (195)
- Annual ADFSL Conference on Digital Forensics, Security and Law (191)
- Wildlife Damage Management Conference (189)
- Kentucky Grazing Conference (176)
- Student Research Symposium (160)
- Annual Research Symposium (156)
- Kentucky Water Resources Annual Symposium (154)
- Utah Space Grant Consortium (137)
- Mammoth Cave Research Symposia (132)
- The Summer Undergraduate Research Fellowship (SURF) Symposium (120)
- Symposium of Student Scholars (111)
- Scholars Week (99)
- International Conference on Gambling & Risk Taking (98)
- KSU Proceedings on Cybersecurity Education, Research and Practice (98)
- International Conference on Information and Communication Technologies (93)
- Sustainability Seminar Series (93)
- Cybersecurity Undergraduate Research Showcase (90)
- Undergraduate Research Conference (83)
- Undergraduate Student Research Internships Conference (81)
- John Wesley Powell Student Research Conference (75)
- File Type
Articles 15811 - 15840 of 16621
Full-Text Articles in Physical Sciences and Mathematics
Keynote: Emerging Era Of Cooperative Empowerment: Grid, Peer-To-Peer, And Community Computing, Dr. Javed I. Khan
Keynote: Emerging Era Of Cooperative Empowerment: Grid, Peer-To-Peer, And Community Computing, Dr. Javed I. Khan
International Conference on Information and Communication Technologies
In this paper we discuss an emerging trend in high performance computing-the social or community computing. The emergence of screensaver computing, grid computing, peer-to-peer systems, and their demonstrated ability to garner computing power as potent as the supercomputers seems to be auspicious. In this paper we discuss the new phenomenon of community computing-including their potential applications in solving a new set of grand challenge problems. We also discuss the previously uncharted technological challenges architects of these new paradigms are addressing.
Keynote: The Segmentation Problem In Arabic Character Recognition: The State Of The Art, Ahmed M. Zeki
Keynote: The Segmentation Problem In Arabic Character Recognition: The State Of The Art, Ahmed M. Zeki
International Conference on Information and Communication Technologies
Arabic characters are used in several languages other than Arabic, despite to this fact; Arabic Character Recognition (ACR) has not received enough interests by researchers. Little researchprogress has been achieved comparing to the one done on the Latin or Chinese and the solutions available in the market are still far from being perfect. However, recent years have shown a considerable increase in the number of research papers. The cursive nature of Arabic writing makes the process of recognition a very challenging one. Several methods to segment the Arabic words into characters have been proposed in the past two decades. This …
Tcp Attack Analysis On Packets Captured Using Symantec Decoy Server, Ali Bakhtiar Nizamani, Bahari Belaton
Tcp Attack Analysis On Packets Captured Using Symantec Decoy Server, Ali Bakhtiar Nizamani, Bahari Belaton
International Conference on Information and Communication Technologies
This paper discusses results obtained from Symantec Decoy Server (previously known as Mantrap) with an introduction to honeypots. Lance Spitzner of the Honeynet Project introduced the concept of honeypots. A honeypot is in essence a decoy server, which has no real or strategic value and is only setup to attract crackers towards it. The idea is to trap the crackers and learn cracking techniques from them. Rapid increase in unauthorized intrusions over the Internet provides a great motivation to explore honeypots at a greater depth. We will provide analysis on TCP based denial of service attack carried out on Symantec …
A New Approach For Anti-Aliasing Raster Data In Air Borne Imagery, Fahim Arif, Muhammad Akbar
A New Approach For Anti-Aliasing Raster Data In Air Borne Imagery, Fahim Arif, Muhammad Akbar
International Conference on Information and Communication Technologies
Air borne sensed data is in the form of raster data. Aliasing is always present in a sampled image causing artifact error. To reduce possible aliasing effects, it is a good idea to blur an image slightly before applying a resampling method on it. This paper presents a technique for anti-aliasing remotely sensed images. The technique uses Gaussian low pass filter (GLPF) for generation of slight blur. Then resampling of raster data is performed with the help of bilinear interpolation. Algorithm is developed in MATLAB using some inbuilt functions.
A Visual Tool For Trellis Construction And Decoder Debugging Rac Array Codes, Lami Kaya, Muhammad -Al- Qudah
A Visual Tool For Trellis Construction And Decoder Debugging Rac Array Codes, Lami Kaya, Muhammad -Al- Qudah
International Conference on Information and Communication Technologies
We have developed a visual tool for can be added to a specific RAC array positions and their effect can be easily determined by the help of the visual tool. The program environment has been set in a adaptive manner in order to change different parameters of the RAC codes and see their effect directly. decoding of row and column (RAC) array codes. The visual tool provides interface to view all paths corresponding selected input information bits. Errors constructing trellis diagram and tracing Viterbi.
Secured Network Model For Management Information System Based On Ip Security (Ipsec) Encryption Using Multilayered Approach Of Network Security, Dr. Amir Hassan Pathan, Muniza Irshad
Secured Network Model For Management Information System Based On Ip Security (Ipsec) Encryption Using Multilayered Approach Of Network Security, Dr. Amir Hassan Pathan, Muniza Irshad
International Conference on Information and Communication Technologies
Secured flow of information through the network and play important role in the management information systems. In this paper I describe Secured Network Model For Corporate & Business Organization In Based On Network Level IP Security (IPSec) Encryption & Its Physical Layout Using Multilayered Approach. I have four important considerations for adoption of secured network model as secured network model for management information system.
A Performance Comparison Of Data Encryption Algorithms, Aamer Nadeem, Dr. M. Younus Javed
A Performance Comparison Of Data Encryption Algorithms, Aamer Nadeem, Dr. M. Younus Javed
International Conference on Information and Communication Technologies
The principal goal guiding the design of any encryption algorithm must be security against unauthorized attacks. However, for all practical applications, performance and the cost of implementation are also important concerns. A data encryption algorithm would not be of much use if it is secure enough but slow in performance because it is a common practice to embed encryption algorithms in other applications such as e-commerce, banking, and online transaction processing applications. Embedding of encryption algorithms in other applications also precludes a hardware implementation, and is thus a major cause of degraded overall performance of the system. In this paper, …
Identification Of Ip Information Of Pakistan & Vulnerability Assessment, Nizar Diamond Ali
Identification Of Ip Information Of Pakistan & Vulnerability Assessment, Nizar Diamond Ali
International Conference on Information and Communication Technologies
Detailed IP information of Pakistan was not available prior to this study - at least not to the general public. It was not known how to harvest this information, from where and using which tools. This study came as answer to this challenge and shows how the IP information can be collected, what sources of information to use, methodologies to adopt and tools to utilize for this purpose. The next step was find out areas where network security lapses are present - i.e., to see which servers and which services are vulnerable to known attacks and vulnerabilities. In this way, …
Real Time Object Tracking Using Bma, Zeeshan Hameed Khan, Muhammad Aurangzeb
Real Time Object Tracking Using Bma, Zeeshan Hameed Khan, Muhammad Aurangzeb
International Conference on Information and Communication Technologies
This paper describes real time object tracking using block matching algorithm (BMA). Emphasis is made on the development of techniques for tracking a user-selected object through digital image sequences in multimedia systems. The ability to track objects in sequences is useful in situations where the motion of objects is important. It is also useful when a moving object is difficult to see and needs to be highlighted. A tracking tool is also of benefit to the developers of a multimedia system to automatically 'mark up' a moving object so a user of the system can select it and manipulate it.
Exploring The Possibility Of Implementing Telecommuting At University Utara Malaysia (Uum), Dr. Wan Rozaini Sheik Osman, Haitham Rashdan
Exploring The Possibility Of Implementing Telecommuting At University Utara Malaysia (Uum), Dr. Wan Rozaini Sheik Osman, Haitham Rashdan
International Conference on Information and Communication Technologies
Global technology has quickly progressed to provide more accessible business modes of communication. The image of the traditional workplace as a particular place to go to work is being replaced with employees working wherever they can be most efficient and productive, whether at home, on a plane, on the road, or a telework center. The availability of affordable technology has been one of the major contributors to the "any time, any place" telecommuting trend. The purpose of this study is to investigate the possibility of the implementation of teleworking at University Utara Malaysia (UUM), the suitable job selection criteria, the …
A Survey On Intrusion Detection Approaches, A Murali M. Rao
A Survey On Intrusion Detection Approaches, A Murali M. Rao
International Conference on Information and Communication Technologies
Intrusion detection plays one of the key roles in computer security techniques and is one of the prime areas of research. Usages of computer network services are tremendously increasing day by day and at the same time intruders are also playing a major role to deny network services, compromising the crucial services for Email, FTP and Web. Realizing the importance of the problem due to intrusions, many researchers have taken up research in this area and have proposed several solutions. It has come to a stage to take a stock of the research results and project a comprehensive view so …
G-Value Decoding Of Greedy Codes, Khalil Ahmad
G-Value Decoding Of Greedy Codes, Khalil Ahmad
International Conference on Information and Communication Technologies
Error-correcting codes are widely used to increase the reliability of transmission of information over various forms of communication channels. Codes with a given minimum distance d can be constructed by a greedy algorithm [2]. In this paper, I proposed a new algorithm for the allocation of g-values to the binary vectors. Hamming (7, 4, 3) code can be generated by the application of greedy algorithm on the binary vectors of length 7 arranged in B-ordering. This code is used to demonstrate a new decoding technique for linear codes in addition to the schemes already known for decoding such as Syndrome …
Optimization Of Semantic Caching For Xml Database, Sharifullah Khan, Awais Hamid
Optimization Of Semantic Caching For Xml Database, Sharifullah Khan, Awais Hamid
International Conference on Information and Communication Technologies
The availability of information on the Internet has increased exponentially the Internet users in the last few years. This made the web servers overloaded. Semantic caches store the semantics and results of the previously asked queries close to the users, in order to answer new queries. The caching reduces the burden of the web servers and optimizes their performance. This paper presents the SMOCE Cache, a framework for semantic caching of XML database. Specialized techniques such as indexing and broadening of semantic regions are proposed for the optimization of semantic caching. The evaluation of prototype proved the significance of proposed …
Knowledge Management In Public Sector Universities Of Pakistan, Eram Abbasi, Arshad Siddiqui
Knowledge Management In Public Sector Universities Of Pakistan, Eram Abbasi, Arshad Siddiqui
International Conference on Information and Communication Technologies
In the modern era of globalization of business, 'Information & Knowledge' is considered as the most vital resource for organizational stability. Businesses significantly depend on efficient management of 'Information' and transforming it into 'Knowledge'. Even though Information and Knowledge have been recognized as the vital resource, still the concepts of 'Information Systems' and 'Knowledge Management' are yet misunderstood. The paper firstly reviews the foundations of Information Systems to establish the basis for the conceptual understanding of 'Knowledge Management'. With these theoretical bases, then a generalized model for 'Knowledge Management' has been proposed. The discussion continues with concepts as to how …
A Dynamic Weight Assignment Approach For Ir Systems, M. Shoaib, Prof Dr. Abad Ali Shah, A. Vashishta
A Dynamic Weight Assignment Approach For Ir Systems, M. Shoaib, Prof Dr. Abad Ali Shah, A. Vashishta
International Conference on Information and Communication Technologies
Weights are assigned to the extracted keywords for partial matching and computing ranking in an IR system. Weight assignment technique is suggested by the IR model that is used for an IR system. Currently suggested weight assignment techniques are static which means that once weight is assigned a keyword it remains unchanged during life-span of an IR system. In this paper, we suggest a dynamic weight assignment technique. This technique can be used by any IR model that supports partial matching.
Using Agents For Unification Of Information Extraction And Data Mining, Sharjeel Imtiaz, Azmat Hussain, Dr. Sikandar Hiyat
Using Agents For Unification Of Information Extraction And Data Mining, Sharjeel Imtiaz, Azmat Hussain, Dr. Sikandar Hiyat
International Conference on Information and Communication Technologies
Early work for unification of information extraction and data mining is motivational and problem stated work. This paper proposes a solution framework for unification using intelligent agents. A Relation manager agent extracted feature with cross feedback approach and also provide a Unified Undirected graphical handle. An RPM agent an approach to minimize loop back proposes pooling and model utilization with common parameter for both text and entity level abstractions.
Design Phase Analysis Of Software Reliability Using Aspect-Oriented Programming, Farhan Rafique, Khalid Mahmood, Tauseef-U- Rehman, Khalid Rashid
Design Phase Analysis Of Software Reliability Using Aspect-Oriented Programming, Farhan Rafique, Khalid Mahmood, Tauseef-U- Rehman, Khalid Rashid
International Conference on Information and Communication Technologies
Software system may have various nonfunctional requirements such as reliability, security, performance and schedulability. If we can predict how well the system will meet such requirements at an early phase of software development, we can significantly save the total development cost and time. Among non-functional requirements, reliability is commonly required as the essential property of the system being developed. Therefore, many analysis methods have been proposed but methods that can be practically performed in the design phase are rare. In this paper we show how design-level aspects can be used to separate reliability concerns from essential functional concerns during software …
Study Of Data Provenance And Annotation Model For Information Reliability Suggested For Pathological Laboratory Environment In Pakistan, Naila Aamir, Aslam Pervez
Study Of Data Provenance And Annotation Model For Information Reliability Suggested For Pathological Laboratory Environment In Pakistan, Naila Aamir, Aslam Pervez
International Conference on Information and Communication Technologies
Trust and reliability of information is a very critical issue of today's information age. Keeping provenance of data not only ensures us about its origination but it also keeps track of all the changes that happen to the data through out its life cycle. In this paper we have discussed the importance of data provenance, difference between Where & Why Provenance and different models for keeping such information. The objective of this study is to select a provenance model which can be implemented in scientific environment of our country. For this purpose we have taken the annotation model and have …
Ergonomics: Implications On Computer End-Users, Maheen Ghauri, Dr. Arshad Siddiqi
Ergonomics: Implications On Computer End-Users, Maheen Ghauri, Dr. Arshad Siddiqi
International Conference on Information and Communication Technologies
Ergonomics is the application of scientific information related to humans to the design of objects, systems and environment for human use. The objective is to apply human characteristics to the design of computer-based work environments to reduce problems of people at work. Lack of ergonomics has serious repercussions on end-users, including physical and mental illnesses. Using ergonomics to design computer-intensive environments would maximize efficiency, productivity and job satisfaction of employees. Unfortunately, in the Government Sector in Pakistan, there is no application of ergonomics in computer-based environments, and this leads to inefficiencies, errors, and safety and health issues. The purpose of …
Visualization Of Retrieved Positive Data Using Blending Function, Muhammad Shoaib, Habib -Ur- Rehman, Dr. Abad Ali Shah
Visualization Of Retrieved Positive Data Using Blending Function, Muhammad Shoaib, Habib -Ur- Rehman, Dr. Abad Ali Shah
International Conference on Information and Communication Technologies
Data visualization is an important technique used in data mining. We present the retrieved data into visual format to discover features and trends inherent to the data. Some features of the data to be retrieved are already known to us. Visualization should preserve these known features inherent to the data. Positivity is one such known feature that is inherent to most of the scientific and business data sets. For example, mass, volume and percentage concentration are meaningful only when they are positive values. However certain visualization techniques do not guarantee to preserve this feature while constructing visualization of retrieved data …
Keynote: Role Of Values & Culture In Information Technology, Prof. Dr. Anis Ahmad
Keynote: Role Of Values & Culture In Information Technology, Prof. Dr. Anis Ahmad
International Conference on Information and Communication Technologies
It is no longer unusual to see, in a remote town in northern area in Pakistan, a practically non-literate wagon driver calling from his Nokia cell phone his uncle in Dubai or in Karachi. He enjoys sharing with him about his success in business and the settlement of family disputes. While he is driving on dangerous curvy roads and having this conversation, in the back seat of the wagon a comparatively young person is playing games on his cell phone. All this was unimaginable a quarter of a century ago.
Keynote: Hexagonal Structure For Intelligent Vision, Xiangjian He, Wenjing Jia
Keynote: Hexagonal Structure For Intelligent Vision, Xiangjian He, Wenjing Jia
International Conference on Information and Communication Technologies
Using hexagonal grids to represent digital images have been studied for more than 40 years. Increased processing capabilities of graphic devices and recent improvements in CCD technology have made hexagonal sampling attractive for practical applications and brought new interests on this topic. The hexagonal structure is considered to be preferable to the rectangular structure due to its higher sampling efficiency, consistent connectivity and higher angular resolution and is even proved to be superior to square structure in many applications. Since there is no mature hardware for hexagonal-based image capture and display, square to hexagonal image conversion has to be done …
The Row-Column Confounded 2MX4N Factorial Design And Its Different Fractions, Md Shamsuddin, Mian A S Adnan
The Row-Column Confounded 2MX4N Factorial Design And Its Different Fractions, Md Shamsuddin, Mian A S Adnan
Conference on Applied Statistics in Agriculture
The row-column confounded 2mX4n factorial designs and its different fractions can be constructed and analyzed using pseudo factors in the 4n portion. (Examples are shown)
The Use Of Pseudo Factors In 4N, 8N, 2MX4N, 2NX8N Factorial Designs, Md Shamsuddin, Mian A S Adnan
The Use Of Pseudo Factors In 4N, 8N, 2MX4N, 2NX8N Factorial Designs, Md Shamsuddin, Mian A S Adnan
Conference on Applied Statistics in Agriculture
The confounded factorial designs of the experiments 4n, 2mX4n, 8n, etc, and their different fractions can be constructed and analyzed using a suitable method of pseudo factors known as Rotation-Conversion Method. An example is shown.
The 3N Circular Factorial Designs: More Robust Estimate Of All Factorial Effects, Md Shamsuddin
The 3N Circular Factorial Designs: More Robust Estimate Of All Factorial Effects, Md Shamsuddin
Conference on Applied Statistics in Agriculture
A 3n circular factorial design which facilitates estimates of all factorial effects providing internal partial confounding with blocks within each of its diameters in different directions is constructed for use in analyzing the multi-directional data of different disciplines. The design possesses small error variance by eliminating the heterogeneity in different directions. An example is given.
Spatial Variability In Aggregation Based On Geostatistical Analysis, Shoufan Fang, George Z. Gertner, Guangxing Wang, Alan B. Anderson
Spatial Variability In Aggregation Based On Geostatistical Analysis, Shoufan Fang, George Z. Gertner, Guangxing Wang, Alan B. Anderson
Conference on Applied Statistics in Agriculture
This study derived the equations for computing the spatial variability in the aggregation of original maps of continuous attributes. The derivation of the equations is based on traditional statistical and geostatistical principles. The derived equations can be used to compute the variance, covariance, and spatial (auto-/cross-) covariance of the aggregated pixels and sub-areas in a given study area. Using the derived equations, the total uncertainty within a study area will not change after aggregation. For a case study, it has been shown that aggregation will reduce the values of variance/covariance and spatial covariance of the aggregated individual pixels. It was …
R2 Statistics For Mixed Models, Matthew Kramer
R2 Statistics For Mixed Models, Matthew Kramer
Conference on Applied Statistics in Agriculture
The R2 statistic, when used in a regression or ANOVA context, is appealing because it summarizes how well the model explains the data in an easy-to-understand way. R2 statistics are also useful to gauge the effect of changing a model. Generalizing R2 to mixed models is not obvious when there are correlated errors, as might occur if data are georeferenced or result from a designed experiment with blocking. Such an R2 statistic might refer only to the explanation associated with the independent variables, or might capture the explanatory power of the whole model. In the latter …
A Bayesian And Covariate Approach To Combine Results From Multiple Microarray Studies, John R. Stevens, R. W. Doerge
A Bayesian And Covariate Approach To Combine Results From Multiple Microarray Studies, John R. Stevens, R. W. Doerge
Conference on Applied Statistics in Agriculture
The growing popularity of microarray technology for testing changes in gene expression has resulted in multiple laboratories independently seeking to identify genes related to the same disease in the same organism. Despite the uniform nature of the technology, chance variation and fundamental differences between laboratories can result in considerable disagreement between the lists of significant candidate genes from each laboratory. By adjusting for known differences between laboratories through the use of covariates and employing a Bayesian framework to effectively account for between-laboratory variability, the results of multiple similar studies can be systematically combined via a meta-analysis. Meta-analyses yield additional information …
A Bayesian Random Coefficient Nonlinear Regression Model For A Split-Plot Experiment, Reid D. Landes, Trey Spencer, Ian A. Zelaya
A Bayesian Random Coefficient Nonlinear Regression Model For A Split-Plot Experiment, Reid D. Landes, Trey Spencer, Ian A. Zelaya
Conference on Applied Statistics in Agriculture
In random coefficients regression, we are often interested in the mean of a certain para-meter particular to the experimental unit (EU). When the mean depends on some treatment regimen, we are then interested in comparing the means among the different treatments. When the EUs are repeatedly measured on a variable containing information about the EU parameter, a standard procedure is to estimate each EU parameter and treat the estimates as the response variables. This is especially true when the regression model for an EU is non-linear. Often, for designed experiments with a factorial treatment structure, the estimated EU parameters are …
Evaluating The Effects Of Monensin Overdose In Dairy Cattle, Rebecca R. Hozak, James T. Symanowski, David G. Mcclary, Meliton N. Novilla, John C. Kube, R. Ken Mcguffey, John I. D. Wilkinson, Howard B. Green, Elvin E. Thomas
Evaluating The Effects Of Monensin Overdose In Dairy Cattle, Rebecca R. Hozak, James T. Symanowski, David G. Mcclary, Meliton N. Novilla, John C. Kube, R. Ken Mcguffey, John I. D. Wilkinson, Howard B. Green, Elvin E. Thomas
Conference on Applied Statistics in Agriculture
Monensin is approved as a feed additive by the FDA Center for Veterinary Medicine to increase milk production efficiency in lactating dairy cattle. To assess the effects of a gross error in mixing monensin into cattle feed, a 10-fold overdose was given for three consecutive days to naïve cows as well as cows previously dosed with monensin within the label range. Cows were evaluated during the overdose and for a subsequent 4 week observation period. Physiological variables were analyzed, including dry matter intake, body weight, body condition score, and serum chemistry profile. Production variables were analyzed, including milk yield and …