Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (2526)
- Engineering (1889)
- Environmental Sciences (1883)
- Chemistry (1869)
- Physics (1823)
-
- Life Sciences (1613)
- Earth Sciences (1537)
- Mathematics (1376)
- Social and Behavioral Sciences (1164)
- Oceanography and Atmospheric Sciences and Meteorology (722)
- Statistics and Probability (696)
- Medicine and Health Sciences (691)
- Education (645)
- Electrical and Computer Engineering (557)
- Astrophysics and Astronomy (526)
- Geology (482)
- Computer Engineering (460)
- Arts and Humanities (446)
- Databases and Information Systems (410)
- Applied Mathematics (400)
- Business (399)
- Natural Resources Management and Policy (367)
- Natural Resources and Conservation (357)
- Water Resource Management (347)
- Environmental Monitoring (343)
- Sustainability (292)
- Hydrology (272)
- Public Affairs, Public Policy and Public Administration (259)
- Optics (246)
- Institution
-
- Selected Works (1771)
- University of Nebraska - Lincoln (590)
- TÜBİTAK (419)
- Singapore Management University (359)
- University of Kentucky (337)
-
- Old Dominion University (282)
- University of Dayton (238)
- University of South Florida (206)
- Utah State University (196)
- City University of New York (CUNY) (189)
- Missouri University of Science and Technology (189)
- Portland State University (187)
- University of Wollongong (172)
- Louisiana State University (171)
- University of Texas at El Paso (163)
- Western University (154)
- William & Mary (154)
- Florida International University (146)
- Nova Southeastern University (141)
- Purdue University (134)
- University of Tennessee, Knoxville (131)
- Embry-Riddle Aeronautical University (128)
- SelectedWorks (128)
- Georgia Southern University (125)
- Brigham Young University (121)
- University of Arkansas, Fayetteville (114)
- Wayne State University (112)
- San Jose State University (110)
- Parkland College (109)
- Western Kentucky University (106)
- Keyword
-
- Stander Symposium project (151)
- Climate change (103)
- Mathematics (95)
- Course Syllabus (94)
- Chemistry (73)
-
- Sustainability (65)
- Chemical Engineering (51)
- GIS (50)
- Sea level rise (50)
- Physics (49)
- Carbon (47)
- Science (47)
- Graphene (46)
- Pure sciences (41)
- Applied sciences (40)
- Modeling (40)
- Computer Science (39)
- Statistics (38)
- Galaxies (37)
- Nanoparticles (37)
- Data (36)
- Earth sciences (36)
- Georgia Southern University (36)
- Security (36)
- Conservation (34)
- Management (33)
- Water quality (33)
- Biology (32)
- CCRM GIS Data (32)
- Geology (32)
- Publication
-
- Research Collection School Of Computing and Information Systems (345)
- Theses and Dissertations (329)
- Electronic Theses and Dissertations (214)
- John R Rice (175)
- Turkish Journal of Electrical Engineering and Computer Sciences (166)
-
- Australian Institute for Innovative Materials - Papers (160)
- Stander Symposium Projects (151)
- Physics and Astronomy Faculty Publications (128)
- Electronic Thesis and Dissertation Repository (119)
- Faculty Publications (115)
- USF Tampa Graduate Theses and Dissertations (115)
- Doctoral Dissertations (113)
- Turkish Journal of Chemistry (106)
- Honors Theses (101)
- Masters Theses (101)
- Physics Faculty Publications (93)
- Graduate Theses and Dissertations (92)
- Publications and Research (91)
- Open Access Theses & Dissertations (85)
- Turkish Journal of Mathematics (83)
- Donald P. Umstadter (81)
- Richard C. Holz (81)
- Departmental Technical Reports (CS) (78)
- Journal of Electrochemistry (78)
- Chemistry Faculty Publications (75)
- Walden Dissertations and Doctoral Studies (74)
- The Synapse: Intercollegiate science magazine (72)
- Open Access Dissertations (70)
- Dissertations (69)
- Publications (69)
- Publication Type
Articles 2101 - 2130 of 12617
Full-Text Articles in Physical Sciences and Mathematics
Modern Crypto-Analysis Of Polyalphabetic Ciphers Using A Genetic Algorithm, Benjamin E. Heald
Modern Crypto-Analysis Of Polyalphabetic Ciphers Using A Genetic Algorithm, Benjamin E. Heald
Student Publications
This project involved implementing a genetic algorithm to help automate the crypto-analysis of the Vigenere cipher.
Community Owned Renewable Energy In North Coast Nsw Social Housing, Kelly Leatherman
Community Owned Renewable Energy In North Coast Nsw Social Housing, Kelly Leatherman
Independent Study Project (ISP) Collection
This study assesses the feasibility of implementing community owned renewable energy (CORE) technology in social housing units in North Coast NSW. I completed this study by conducting interviews with three renewable energy policy experts to ascertain the current state of renewable energy and CORE in NSW. Second, I conducted four interviews with separate social housing unit employees/residents to understand their interpretation of current barriers to implementing renewable energy in the social housing and if any of the units currently have any renewable energy technology or energy efficiency programs in place. After finishing this assessment, I did a comparative analysis with …
Comparative Study Of Terrestrial Arthropod Diversity In Primary And Re-Planted Pine Forest In A Community Forest At Andasibe, Madagascar, Tyler George, Mira Kelly-Fair, Andrea Wade
Comparative Study Of Terrestrial Arthropod Diversity In Primary And Re-Planted Pine Forest In A Community Forest At Andasibe, Madagascar, Tyler George, Mira Kelly-Fair, Andrea Wade
Independent Study Project (ISP) Collection
This study is a comparison of tree and terrestrial arthropod diversity along native andre-planted pine transects.Transects were laid in a primary and re-planted pine forest in Andasibe Community Forest Park. Data was collected over six days, taking measurements of trees, inspecting and collecting specimens from pitfall traps once a day. Terrestrial arthropods were identified to morphospecies and measures of diversity were calculated. To understand the health of the trees, information was collected that included trees diameter at breast height, canopy cover and soil cover. Terrestrial arthropod communities and diversity were found to be significantly different in the native and replanted …
Impact Of Invasive Species Datura Arborea On Plant Species Richness In The West Usambara Mountains, Megan Foley
Impact Of Invasive Species Datura Arborea On Plant Species Richness In The West Usambara Mountains, Megan Foley
Independent Study Project (ISP) Collection
Invasive species have the potential to alter the evolutionary trajectory of ecosystems and native species; however, our understanding of the community level effects of invasive plants remains poor. The Eastern Arc Mountain Chain is listed as one of the top 25 biodiversity “hotspots” of the world, yet also as one of the 17 most threatened tropical forest ecosystems worldwide. The primary threat to biodiversity in the EAM is accredited to human encroachment; however, the impact of invasive species in the EAM, and across Tanzania, remains poorly understood. National biodiversity and resource management policy do not directly address invasive species, and …
La Vida Revivida: Una Exploración De La Salud, El Medio Ambiente Y La Cultura En Los Procesos De La Producción Ecológica De Cochabamba, Ethan Wood, Emily Wyler
La Vida Revivida: Una Exploración De La Salud, El Medio Ambiente Y La Cultura En Los Procesos De La Producción Ecológica De Cochabamba, Ethan Wood, Emily Wyler
Independent Study Project (ISP) Collection
Esta investigación intenta explorar cómo los productores incorporan la salud, el medio ambiente, y la cultura en su proceso de producción ecológica. Para responder a esta pregunta, trabajamos con la ONG CIOEC Cochabamba y los productores ecológicos de Cochabamba, para entender cómo es la producción ecológica. Con la investigación, intentamos identificar varias maneras en las que el gobierno del departamento puede brindar más apoyo a los productores y conservar los métodos tradicionales de la producción en Cochabamba. En esta investigación, se utilizaron la observación participativa y las entrevistas semi-estructuradas.
Towards Automatic Generation Of Security-Centric Descriptions For Android Apps, Mu Zhang, Yue Duan, Qian Feng, Heng Yin
Towards Automatic Generation Of Security-Centric Descriptions For Android Apps, Mu Zhang, Yue Duan, Qian Feng, Heng Yin
Research Collection School Of Computing and Information Systems
To improve the security awareness of end users, Android markets directly present two classes of literal app information: 1) permission requests and 2) textual descriptions. Unfortunately, neither can serve the needs. A permission list is not only hard to understand but also inadequate; textual descriptions provided by developers are not security-centric and are significantly deviated from the permissions. To fill in this gap, we propose a novel technique to automatically generate security-centric app descriptions, based on program analysis. We implement a prototype system, DESCRIBEME, and evaluate our system using both DroidBench and real-world Android apps. Experimental results demonstrate that DESCRIBEME …
Social Signal Processing For Real-Time Situational Understanding: A Vision And Approach, Kasthuri Jeyarajah, Shuchao Yao, Raghava Muthuraju, Archan Misra, Geeth De Mel, Julie Skipper, Tarek Abdelzaher, Michael Kolodny
Social Signal Processing For Real-Time Situational Understanding: A Vision And Approach, Kasthuri Jeyarajah, Shuchao Yao, Raghava Muthuraju, Archan Misra, Geeth De Mel, Julie Skipper, Tarek Abdelzaher, Michael Kolodny
Research Collection School Of Computing and Information Systems
The US Army Research Laboratory (ARL) and the Air Force Research Laboratory (AFRL) have established a collaborative research enterprise referred to as the Situational Understanding Research Institute (SURI). The goal is to develop an information processing framework to help the military obtain real-time situational awareness of physical events by harnessing the combined power of multiple sensing sources to obtain insights about events and their evolution. It is envisioned that one could use such information to predict behaviors of groups, be they local transient groups (e.g., protests) or widespread, networked groups, and thus enable proactive prevention of nefarious activities. This paper …
Structural Constraints For Multipartite Entity Resolution With Markov Logic Network, Tengyuan Ye, Hady W. Lauw
Structural Constraints For Multipartite Entity Resolution With Markov Logic Network, Tengyuan Ye, Hady W. Lauw
Research Collection School Of Computing and Information Systems
Multipartite entity resolution seeks to match entity mentions across several collections. An entity mention is presumed unique within a collection, and thus could match at most one entity mention in each of the other collections. In addition to domain-specific features considered in entity resolution, there are a number of domain-invariant structural contraints that apply in this scenario, including one-to-one assignment as well as cross-collection transitivity. We propose a principled solution to the multipartite entity resolution problem, building on the foundation of Markov Logic Network (MLN) that combines probabilistic graphical model and first-order logic. We describe how the domain-invariant structural constraints …
Density Peaks Clustering Approach For Discovering Demand Hot Spots In City-Scale Taxi Fleet Dataset, Dongchang Liu, Shih-Fen Cheng, Yiping Yang
Density Peaks Clustering Approach For Discovering Demand Hot Spots In City-Scale Taxi Fleet Dataset, Dongchang Liu, Shih-Fen Cheng, Yiping Yang
Research Collection School Of Computing and Information Systems
In this paper, we introduce a variant of the density peaks clustering (DPC) approach for discovering demand hot spots from a low-frequency, low-quality taxi fleet operational dataset. From the literature, the DPC approach mainly uses density peaks as features to discover potential cluster centers, and this requires distances between all pairs of data points to be calculated. This implies that the DPC approach can only be applied to cases with relatively small numbers of data points. For the domain of urban taxi operations that we are interested in, we could have millions of demand points per day, and calculating all-pair …
What Are The Characteristics Of High-Rated Apps? A Case Study On Free Android Applications, Tian Yuan, Meiyappan Nagappan, David Lo, Ahmed E. Hassan
What Are The Characteristics Of High-Rated Apps? A Case Study On Free Android Applications, Tian Yuan, Meiyappan Nagappan, David Lo, Ahmed E. Hassan
Research Collection School Of Computing and Information Systems
The tremendous rate of growth in the mobile app market over the past few years has attracted many developers to build mobile apps. However, while there is no shortage of stories of how lone developers have made great fortunes from their apps, the majority of developers are struggling to break even. For those struggling developers, knowing the “DNA” (i.e., characteristics) of high-rated apps is the first step towards successful development and evolution of their apps. In this paper, we investigate 28 factors along eight dimensions to understand how high-rated apps are different from low-rated apps. We also investigate what are …
Constrained Feature Selection For Localizing Faults, Tien-Duy B. Le, David Lo, Ming Li
Constrained Feature Selection For Localizing Faults, Tien-Duy B. Le, David Lo, Ming Li
Research Collection School Of Computing and Information Systems
Developers often take much time and effort to find buggy program elements. To help developers debug, many past studies have proposed spectrum-based fault localization techniques. These techniques compare and contrast correct and faulty execution traces and highlight suspicious program elements. In this work, we propose constrained feature selection algorithms that we use to localize faults. Feature selection algorithms are commonly used to identify important features that are helpful for a classification task. By mapping an execution trace to a classification instance and a program element to a feature, we can transform fault localization to the feature selection problem. Unfortunately, existing …
Spectral And Performance Analysis For The Propagation And Retrieval Of Signals From Modulated Chaos Waves Transmitted Through Modified Von Karman Turbulence, Fathi H.A. Mohamed, Monish Ranjan Chatterjee
Spectral And Performance Analysis For The Propagation And Retrieval Of Signals From Modulated Chaos Waves Transmitted Through Modified Von Karman Turbulence, Fathi H.A. Mohamed, Monish Ranjan Chatterjee
Electrical and Computer Engineering Faculty Publications
A transfer function formalism is applied to track propagation of modulated chaos waves through modified von Karman phase turbulence; the demodulated signal is examined vis-à-vis performance relative to turbulence strength in comparison with non-chaotic propagation.
Choosing Your Weapons: On Sentiment Analysis Tools For Software Engineering Research, Robbert Jongeling, Subhajit Datta, Alexander Serebrenik
Choosing Your Weapons: On Sentiment Analysis Tools For Software Engineering Research, Robbert Jongeling, Subhajit Datta, Alexander Serebrenik
Research Collection School Of Computing and Information Systems
Recent years have seen an increasing attention to social aspects of software engineering, including studies of emotions and sentiments experienced and expressed by the software developers. Most of these studies reuse existing sentiment analysis tools such as SentiStrength and NLTK. However, these tools have been trained on product reviews and movie reviews and, therefore, their results might not be applicable in the software engineering domain. In this paper we study whether the sentiment analysis tools agree with the sentiment recognized by human evaluators (as reported in an earlier study) as well as with each other. Furthermore, we evaluate the impact …
Two Formulas For Success In Social Media: Learning And Network Effects, Liangfei Qiu, Qian Tang, Andrew B. Whinston
Two Formulas For Success In Social Media: Learning And Network Effects, Liangfei Qiu, Qian Tang, Andrew B. Whinston
Research Collection School Of Computing and Information Systems
Recent years have witnessed an unprecedented explosion in information technology that enables dynamic diffusion of user-generated content in social networks. Online videos, in particular, have changed the landscape of marketing and entertainment, competing with premium content and spurring business innovations. In the present study, we examine how learning and network effects drive the diffusion of online videos. While learning happens through informational externalities, network effects are direct payoff externalities. Using a unique data set from YouTube, we empirically identify learning and network effects separately, and find that both mechanisms have statistically and economically significant effects on video views; furthermore, the …
A Secured Cloud System Based On Log Analysis, Sindhusha Doddapaneni
A Secured Cloud System Based On Log Analysis, Sindhusha Doddapaneni
Master's Projects
Now-a-days, enterprises’ acceptance over the Cloud is increasing but businesses are now finding issues related to security. Everyday, users store a large amount of data in the Cloud and user input may be malicious. Therefore, security has become the critical feature in the applications stored in the Cloud. Though there are many existing systems which provide us different encryption algorithms and security methods, there is still a possibility of attacks to applications and increasing data modifications. The idea behind this project is to find attacks and protect the applications stored in the Cloud using log analysis. The proposed solution detects …
Energy Efficiency And Quality Of Services In Virtualized Cloud Radio Access Network, Khushbu Mohta
Energy Efficiency And Quality Of Services In Virtualized Cloud Radio Access Network, Khushbu Mohta
Master's Projects
Cloud Radio Access Network (C-RAN) is being widely studied for soft and green fifth generation of Long Term Evolution - Advanced (LTE-A). The recent technology advancement in network virtualization function (NFV) and software defined radio (SDR) has enabled virtualization of Baseband Units (BBU) and sharing of underlying general purpose processing (GPP) infrastructure. Also, new innovations in optical transport network (OTN) such as Dark Fiber provides low latency and high bandwidth channels that can support C-RAN for more than forty-kilometer radius. All these advancements make C-RAN feasible and practical. Several virtualization strategies and architectures are proposed for C-RAN and it has …
Designing A Programming Contract Library For Java, Neha Rajkumar
Designing A Programming Contract Library For Java, Neha Rajkumar
Master's Projects
Programmers are now developing large and complex software systems, so it’s important to have software that is consistent, efficient, and robust. Programming contracts allow developers to specify preconditions, postconditions, and invariants in order to more easily identify programming errors. The design by contract principle [1] was first used in the Eiffel programming language [2], and has since been extended to libraries in many other languages. The purpose of my project is to design a programming contract library for Java. The library supports a set of preconditions, postconditions, and invariants that are specified in Java annotations. It incorporates contract checking for …
Sharedwealth: A Cryptocurrency To Reward Miners Evenly, Siddiq Ahmed Syed
Sharedwealth: A Cryptocurrency To Reward Miners Evenly, Siddiq Ahmed Syed
Master's Projects
Bitcoin [19] is a decentralized cryptocurrency that has recently gained popularity and has emerged as a popular medium of exchange. The total market capitalization is around 1.5 billion US dollars as of October 2013 [28]. All the operations of Bitcoin are maintained in a distributed public global ledger known as a block chain which consists of all the successful transactions that have ever taken place. The security of a block chain is maintained by a chain of cryptographic puzzles solved by participants called miners, who in return are rewarded with bitcoins. To be successful, the miner has to put in …
Metamorphic Code Generator Based On Bytecode Of Llvm Ir, Arjun Shah
Metamorphic Code Generator Based On Bytecode Of Llvm Ir, Arjun Shah
Master's Projects
Metamorphic software is famous for changing the internal structure of the code while keeping the functionality same. In order to escape the signature detection along with some advanced detection techniques, many malware writers have used metamorphism as the means. On the other hand, code morphing technique increases the diversity of the software which is considered to be a potential security advantage. In our paper, we have developed a metamorphic code generator based on the LLVM framework. The architecture of LLVM has a three-phase compiler design which includes the front end, the optimizer and the back end. It also gives assistance …
Implementing Type Inference In Jedi, Vaibhav Kamble
Implementing Type Inference In Jedi, Vaibhav Kamble
Master's Projects
This thesis begins with an overview of type systems: evolution, concepts, and problems. This survey is based on type systems of modern languages like Scala and Haskell. Scala has a very sophisticated type system that includes generics, polymorphism, and closures. It has a built-in type inference mechanism that enables the programmer to exclude certain type annotations. It is often not required in Scala to mention the type of a variable because the compiler can infer the type from the initialization of the variable. Study of such type system is demonstrated by the implementation of the type system. A type system …
Collaboration Prototyper: Automatic Generation Of Prototypes From Uml Collaborations, Ramya Badthody Shenoy
Collaboration Prototyper: Automatic Generation Of Prototypes From Uml Collaborations, Ramya Badthody Shenoy
Master's Projects
The thesis begins with a discussion of the use of designing versus prototyping in the initial stages of software development lifecycle. We present the idea of generating a working prototype directly from a UML analysis model to overcome time spent on creating a prototype. UML diagrams can be made to give sufficient information to generate code. Collaborations form the backbone of analysis models. A collaboration can be defined as a UML class diagram together with one or more sequence diagrams. Collaborations are the input of the Collaboration Prototyper (CP). CP transforms a collaboration into a Java prototype.
Scalable Techniques For Similarity Search, Siddartha Reddy Nagireddy
Scalable Techniques For Similarity Search, Siddartha Reddy Nagireddy
Master's Projects
Document similarity is similar to the nearest neighbour problem and has applications in various domains. In order to determine the similarity / dissimilarity of the documents first they need to be converted into sets containing shingles. Each document is converted into k-shingles, k being the length of each shingle. The similarity is calculated using Jaccard distance between sets and output into a characteristic matrix, the complexity to parse this matrix is significantly high especially when the sets are large. In this project we explore various approaches such as Min hashing, LSH & Bloom Filter to decrease the matrix size and …
Improving The Accuracy And Robustness Of Self-Tuning Histograms By Subspace Clustering, Sai Kiran Padooru
Improving The Accuracy And Robustness Of Self-Tuning Histograms By Subspace Clustering, Sai Kiran Padooru
Master's Projects
Self-tuning histograms are a type of histograms very popular these days, as they allow the usage of multidimensional datasets. The main advantage of them is that they have a low computational cost due to their capacity to understand the dataset. Also, they proposed a better approach as they stay up-to-date and have adaptability to query patterns. According to the above, many researchers have worked on improving the accuracy of these type of histograms, which has led to the use of subspace clustering methods as initialization values. Following this approach in this study, a self-tuning histogram code was developed with the …
A Javascript And Php Epub Reader Web Application, Xiaqing He
A Javascript And Php Epub Reader Web Application, Xiaqing He
Master's Projects
EPUB is one of the most popular ebook formats. It is supported by many e-Readers, such as Apple’s iBooks, BlackBerry Playbooks, Sony Reader, Kobo eReader, Amazon Kindle Fire, and the Mozilla Firefox add-on EPUBReader. In this report, we describe our implementation of a JavaScript and PHP EPUB reader web application. This web application allows users to read the EPUB format books easily across multiple devices without any specified platform lock-in. Our application provides an EPUB library. When a user logs in, he can borrow an EPUB book from the library and save into his own bookshelf, then choose any one …
Question Answering System For Yioop, Niravkumar Patel
Question Answering System For Yioop, Niravkumar Patel
Master's Projects
Yioop is an open source search engine developed and managed by Dr. Christopher Pollett. Currently, Yioop returns the search results of the query in the form of list of URLs, just like other search engines (Google, Bing, DuckDuckGo, etc.) This paper created a new module for Yioop. This new module, known as the Question-Answering (QA) System, takes the search queries in the form of natural language questions and returns results in the form of a short answer that is appropriate to the question asked. This feature is achieved by implementing various functionalities of Natural Language Processing (NLP). By using NLP, …
On-The-Fly Map Generator For Openstreetmap Data Using Webgl, Sreenidhi Pundi Muralidharan
On-The-Fly Map Generator For Openstreetmap Data Using Webgl, Sreenidhi Pundi Muralidharan
Master's Projects
This project describes an approach to create an On-the-fly Map Generator for Openstreetmap Data Using WebGL. The most common methods to generate online maps generate PNG overlay tile images from a wide range of data sources, like GeoJSON, GeoTIFF, PostGIS, CSV, and SQLite, etc., based on the coordinates and zoom-level. This project aims to send vector data for the map to the browser and hence render maps on-the-fly using WebGL. We push all of the vector computation to the GPU. This means that less data needs to be sent to the browser. We have compared existing approaches to our method …
Clustering Web Concepts Using Algebraic Topology, Harleen Kaur Ahuja
Clustering Web Concepts Using Algebraic Topology, Harleen Kaur Ahuja
Master's Projects
In this world of Internet, there is a rapid amount of growth in data both in terms of size and dimension. It consists of web pages that represents human thoughts. These thoughts involves concepts and associations which we can capture. Using mathematics, we can perform meaningful clustering of these pages. This project aims at providing a new problem solving paradigm known as algebraic topology in data science. Professor Vasant Dhar, Editor-In-Chief of Big Data (Professor at NYU) define data science as a generalizable extraction of knowledge from data. The core concept of semantic based search engine project developed by my …
Relationship Based Entity Recommendation System, Rakhi Poonam Verma
Relationship Based Entity Recommendation System, Rakhi Poonam Verma
Master's Projects
With the increase in usage of the internet as a place to search for information, the importance of the level of relevance of the results returned by search engines have increased by many folds in recent years. In this paper, we propose techniques to improve the relevance of results shown by a search engine, by using the kinds of relationships between entities a user is interested in. We propose a technique that uses relationships between entities to recommend related entities from a knowledge base which is a collection of entities and the relationships with which they are connected to other …
James City County Shoreline Management Plan, C. Scott Hardaway Jr., Donna A. Milligan, Christine A. Wilcox, Marcia Berman, Tamia Rudnicky, Karinna Nunez, Sharon A. Killeen
James City County Shoreline Management Plan, C. Scott Hardaway Jr., Donna A. Milligan, Christine A. Wilcox, Marcia Berman, Tamia Rudnicky, Karinna Nunez, Sharon A. Killeen
Reports
Actions taken by waterfront property owners to stabilize the shoreline can affect the health of the Bay as well as adjacent properties for decades. With these long-term implications, managers at the local level should have a more proactive role in how shorelines are managed. James City County recognizes that its natural environment is one of its most valuable assets as well as its most vulnerable (James City County, 2015). The shores of James City range from exposed open river to very sheltered creeks, and the nature of shoreline change varies accordingly (Figure 1-1). This shoreline management plan is useful for …
North-Central Nebraska Geology: Niobrara River Valley In Brown, Cherry, And Keya Paha Counties, R. M. Joeckel, L. M. Howard, S. T. Tucker
North-Central Nebraska Geology: Niobrara River Valley In Brown, Cherry, And Keya Paha Counties, R. M. Joeckel, L. M. Howard, S. T. Tucker
Conservation and Survey Division
No abstract provided.