81818app手机版下载

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

215,164 Full-Text Articles 270,852 Authors 47,230,550 Downloads 417 Institutions

All Articles in Physical Sciences and Mathematics

Faceted Search

215,164 full-text articles. Page 6 of 6051.

Alternative Perennial Legumes On Acid Soils In Southern New South Wales, Australia, Guangdi Li, Richard C. Hayes, B. S. Dear 2020 EH Graham Centre for Agricultural Innovation, Australia

Alternative Perennial Legumes On Acid Soils In Southern New South Wales, Australia, Guangdi Li, Richard C. Hayes, B. S. Dear

International Grassland Congress Proceedings

No abstract provided.


Diet Selection And Intake Of Yak (Bos Grunniens) In Warm‐And Cold‐Season Paddocks Of Potentilla Fruticosa Rangeland In Northern Qinghai‐Tibetan Plateau, Guomei Li, Nobumi Hasegawa, Rende Song, Youliang Wang, Shengqing Feng 2020 Yushu Prefectural Grassland Station, China 81818app手机版下载

Diet Selection And Intake Of Yak (Bos Grunniens) In Warm‐And Cold‐Season Paddocks Of Potentilla Fruticosa Rangeland In Northern Qinghai‐Tibetan Plateau, Guomei Li, Nobumi Hasegawa, Rende Song, Youliang Wang, Shengqing Feng

International Grassland Congress Proceedings

81818app手机版下载No abstract provided.


Long‐Term Cattle Grazing Effects On Soil Chemistry In The Rough Fescue Grassland, Chunli Li, Walter D. Willms, Xiying Hao, Ben Ellert, Mengli Zhao, Guodong Han 2020 Agriculture and Agri‐Food Canada, Canada 81818app手机版下载

Long‐Term Cattle Grazing Effects On Soil Chemistry In The Rough Fescue Grassland, Chunli Li, Walter D. Willms, Xiying Hao, Ben Ellert, Mengli Zhao, Guodong Han

International Grassland Congress Proceedings

No abstract provided.


Large Scale Upper-Level Precursors For Dust Storm Formation Over North Africa And Poleward Transport To The Iberian Peninsula. Part I: An Observational Analysis, J.A. G. Orza, Michael L. Kaplan, S. Dhital, S. Fiedler 2020 Universidad Miguel Hernández de Elche

Large Scale Upper-Level Precursors For Dust Storm Formation Over North Africa And Poleward Transport To The Iberian Peninsula. Part I: An Observational Analysis, J.A. G. Orza, Michael L. Kaplan, S. Dhital, S. Fiedler

Publications

The analysis of three extreme African dust outbreaks over the Iberian Peninsula (IP) shows that a double Rossby wave breaking (RWB) process in the polar jet (PJ) creates the conditions for dust storm formation over subtropical deserts in North Africa and the restructuring of upper-level air flows critical for the dust transport poleward after ablation. Two consecutive anticyclonic RWBs initiate over the IP and the adjacent Atlantic, the first commencing 10 days before dust reaches the IP and the second three to five days later. The first RWB becomes quasi-stationary over the eastern Mediterranean when the second RWB develops. In ...


Computer Science Principles, Seth D. Bergmann 2020 Rowan University

Computer Science Principles, Seth D. Bergmann

Open Educational Resources

This textbook is intended to be used for a first course in computer science, such as the College Board’s Advanced Placement course known as AP Computer Science Principles (CSP). This book includes all the topics on the CSP exam, plus some additional topics. It takes a breadth-first approach, with an emphasis on the principles which form the foundation for hardware and software. No prior experience with programming should be required to use this book.


Factors Influencing Apparent Nest Success In Eastern Bluebirds, Katelynn Gierlinger 2020 State University of New York College at Brockport

Factors Influencing Apparent Nest Success In Eastern Bluebirds, Katelynn Gierlinger

Senior Honors Theses

Collection of basic breeding biology data and analysis of factors that can impact the apparent nest success of passerines is critical in tracking population dynamics and making decisions concerning conservation. The Eastern Bluebird (Sialis sialis) is one species of concern whose declines in abundances fueled the common practice of establishing artificial nest boxes. I carried out my study in 2019 on the SUNY Brockport campus using 20 Audubon and 20 Peterson nest boxes to investigate what variables may impact fledgling success, including egg and nestling traits as well as site characteristics. Egg mass and volume tended to be larger in ...


The Effect Of Urbanization On The Intensity Of Heavy Rainfall In The Midwestern United States, Adrianna Kremer 2020 State University of New York College at Brockport 81818app手机版下载

The Effect Of Urbanization On The Intensity Of Heavy Rainfall In The Midwestern United States, Adrianna Kremer

Senior Honors Theses

81818app手机版下载In recent years, the global population has become more concentrated in cities and this urbanization has influenced a number of changes in climate and land use. While some studies have examined how urbanization impacts precipitation, most of these studies have examined precipitation patterns rather than intensity. Increases in the intensity of precipitation can increase the risk of flooding and flash floods, which can have devastating impacts. Stage IV multi-sensor precipitation data was used to examine heavy rainfall events during the warm-season (May-September) from 2003-2017 in Midwestern cities to examine how urbanization influences rainfall intensity. NCEI precipitation data was also used ...


Pollinator Communities On Public Lands: Creating New Opportunities For Management, Jacob Kearney 2020 State University of New York College at Brockport

Pollinator Communities On Public Lands: Creating New Opportunities For Management, Jacob Kearney

Senior Honors Theses

81818app手机版下载Because butterfly species such as monarchs (Danaus plexippus) are declining, they have received renewed public and scientific interest. Butterflies provide important ecological services, such as pollination. Understanding their ecology is vital for proper conservation and management, with targeted management on public lands increasing in the last few decades. To determine useful management strategies for butterfly populations on public lands, I investigated butterfly use in two “non-traditional” sites utilized by butterflies at Montezuma National Wildlife Refuge (MNWR): a marsh in full drawdown phase (MP) and a marsh in partial drawdown phase (SF). I also investigated butterfly use at an upland field ...


Optical Study Of Pks B1322-110, The Intra-Hour Variable Radio Source, Juan P. Madrid, Artem V. Tuntsov, Mischa Schirmer, Mark A. Walker, Carlos J. Donzelli, Keith W. Bannister, Hayley E. Bignall, Jamie Stevens, Cormac Reynolds, Simon Johnston 2020 The University of Texas Rio Grande Valley

Optical Study Of Pks B1322-110, The Intra-Hour Variable Radio Source, Juan P. Madrid, Artem V. Tuntsov, Mischa Schirmer, Mark A. Walker, Carlos J. Donzelli, Keith W. Bannister, Hayley E. Bignall, Jamie Stevens, Cormac Reynolds, Simon Johnston

Physics and Astronomy Faculty Publications and Presentations

Observations with the Australia Telescope Compact Array revealed intra-hour variations in the radio source PKS B1322-110 (Bignall et al. 2019). As part of an optical follow-up, we obtained Gemini Hα and Hα continuum (HαC) images of the PKS B1322-110 field. A robust 19 σ detection of PKS B1322- 110 in the Hα−HαC image prompted us to obtain the first optical spectrum of PKS B1322-110. With the Gemini spectrum we determine that PKS B1322-110 is a flat-spectrum radio quasar at a redshift of z = 3.007 ± 0.002. The apparent flux detected in the Hα filter is likely to originate ...


Performance Analysis Of Test Data Generation For Path Coverage Based Testing Using Three Metaheuristic Algorithms, MADHUMITA PANDA, PARTHA PRATIM SARANGI 2020 Department of MCA, Seemanta Engineering College, Mayurbhanj, Odisha, 757086 81818app手机版下载

Performance Analysis Of Test Data Generation For Path Coverage Based Testing Using Three Metaheuristic Algorithms, Madhumita Panda, Partha Pratim Sarangi

International Journal of Computer Science and Informatics

This paper discusses an approach to generate test data for path coverage based testing using Genetic Algorithms, Differential Evolution and Artificial Bee Colony optimization algorithms. Control flow graph and cyclomatic complexity of the example program has been used to find out the number of feasible paths present in the program and it is compared with the actual no of paths covered by the evolved test cases using those meta-heuristic algorithms. Genetic Algorithms, Artificial Bee Colony optimization and Differential Evolution are acting here as meta-heuristic search paradisms for path coverage based test data generation. Finally the performance of the test data ...


Critical Components Identification Using Mutation Based Components Impact Analysis, D. JEYAMALA, K. SABARI NATHAN, A. JALILA, S. BALAMURUGAN 2020 Department of Computer Applications, Thiagarajar College of Engineering, Tamilnadu – 625 015 81818app手机版下载

Critical Components Identification Using Mutation Based Components Impact Analysis, D. Jeyamala, K. Sabari Nathan, A. Jalila, S. Balamurugan

International Journal of Computer Science and Informatics

High quality software can be obtained by means of resolving the complexity of the software. According to Pareto principle, 20% of components lead to 80% of the problems [1]. So, we need to identify those 20% of the components during testing. Therefore, this research work suggested an automated software testing framework to identify critical components using mutant based dynamic impact analysis for Software under Test (SUT). Mutants are automatically generated by injecting faults in the components using Offutt mutation operators and they are utilised to identify their impact level over other components of the system. The generated mutants and original ...


Fault-Prone Components Identification For Real Time Complex Systems Based On Criticality Analysis, D. JEYAMALA, S. BALAMURUGAN, A. JALILA, K. SABARI NATHAN 2020 Department of Computer Applications, Thiagarajar College of Engineering, Tamilnadu – 625 015

Fault-Prone Components Identification For Real Time Complex Systems Based On Criticality Analysis, D. Jeyamala, S. Balamurugan, A. Jalila, K. Sabari Nathan

International Journal of Computer Science and Informatics

81818app手机版下载Generally, complexity of Software affects the development and maintenance Cost. The Complexity of the software increases, when the number of Components increase, among these components, some are more critical than others which will lead to catastrophic effects on field use. Hence, it is needed to identify such critical components after coding to test them rigorously. In this paper, we presented a novel approach that helps to identify the critical components in the software based on Criticality Analysis. Criticality Analysis analyzes the critical value of each component based on their Sensitivity and Severity metrics.


Model Based Regression Testing Approach Of Serviceoriented Architecture(Soa) Based Application: A Case Study, PRACHET BHUYAN, ABHISHEK KUMAR 2020 School of Computer Engineering, KIIT University, Bhubaneswar, Odisha, India

Model Based Regression Testing Approach Of Serviceoriented Architecture(Soa) Based Application: A Case Study, Prachet Bhuyan, Abhishek Kumar

International Journal of Computer Science and Informatics

Service-Oriented Architecture(SOA) is an approach for designing, deploying and managing services that represent reusable business functionality. SOA removes the gap between software and business. Reliability and fault-free implementation are major concern for SOA based applications. Traditional testing are no more beneficial for verifying and validating the quality of services in SOA systems. Regression testing is inevitable that is undertaken every time to provide confidence that modification do not introduce new bugs into previously validated code. In this paper we addressed the UML based regression testing method using UML use case diagram and UML activity diagram to generate a test ...


Generation Of Test Cases Using Activity Diagram, RANJITA KUMARI SWAIN, VIKAS PANTHI, PRAFULLA KUMAR BEHERA 2020 Rourkela Institute of Mgt. Studies, Rourkela

Generation Of Test Cases Using Activity Diagram, Ranjita Kumari Swain, Vikas Panthi, Prafulla Kumar Behera

International Journal of Computer Science and Informatics

81818app手机版下载As Unified Modeling Language (UML) activity diagrams capture the key system behavior, the UML activity diagram is well suited for the system level testing of systems. In this paper, first an activity flow graph is derived from activity diagram. Then, all the required information is extracted from the activity flow graph (AFG). The activity flow graph (AFG) for the activity diagram is created by traversing the activity diagram from beginning to end, showing choices, conditions, concurrent executions, loop statements. From the graph different control flow sequence are identified by traversing the AFG by depth first traversal technique. Next, an algorithm ...


Mobile Devices Overview, M.ARJUN GOUD 2020 Satavahana University, Karimnagar Andhra Pradesh, INDIA

Mobile Devices Overview, M.Arjun Goud

International Journal of Computer Science and Informatics

81818app手机版下载Now a day's mobile devices are multi-functional devices capable of hosting a broad range of applications for both business and consumer use. Personal Digital Assistants (PDA) and the ever-growing category of smart phones allow people to access the Internet for e-mail, instant messaging, text messaging and Web browsing, as well as work documents, contact lists and more. This paper presents an overview of mobile devices and also the operating systems used in the devices.


Domain Bounded English To Indian Sign Language Translation Model, SYED FARAZ ALI, GOURI SANKAR MISHRA, ASHOK KUMAR SAHOO 2020 Computer Science and Engineering, Sharda University, Greater Noida, India

Domain Bounded English To Indian Sign Language Translation Model, Syed Faraz Ali, Gouri Sankar Mishra, Ashok Kumar Sahoo

International Journal of Computer Science and Informatics

This is a proposal for the English text to Indian Sign Language translation model wherein the system will accept the input text and then translates the given words in sequence by making an avatar to display signs of each word. The translation here is corpus based. There is direct mapping between the English and ISL text. Since it is very inefficient to make signs for each word our domain is bounded by certain criteria for which the translator translates the given text. Like, the system which we propose is for railway reservation counters for enquiry.


Nlp Challenges For Machine Translation From English To Indian Languages, MALLAMMA V REDDY, DR. M. HANUMANTHAPPA 2020 Department of Computer Science and Applications, Jnanabharathi Campus, Bangalore University, Bangalore, INDIA 81818app手机版下载

Nlp Challenges For Machine Translation From English To Indian Languages, Mallamma V Reddy, Dr. M. Hanumanthappa

International Journal of Computer Science and Informatics

81818app手机版下载This Natural Langauge processing is carried particularly on English-Kannada/Telugu. Kannada is a language of India. The Kannada language has a classification of Dravidian, Southern, Tamil-Kannada, and Kannada. Regions Spoken: Kannada is also spoken in Karnataka, Andhra Pradesh, Tamil Nadu, and Maharashtra. Population: The total population of people who speak Kannada is 35,346,000, as of 1997. Alternate Name: Other names for Kannada are Kanarese, Canarese, Banglori, and Madrassi. Dialects: Some dialects of Kannada are Bijapur, Jeinu Kuruba, and Aine Kuruba. There are about 20 dialects and Badaga may be one. Kannada is the state language of Karnataka. About ...


A Comparative Study Of Protein Tertiary Structure Prediction Methods, CHANDRAYANI N.ROKDE, DR.MANALI KSHIRSAGAR 2020 Department of Computer Technology, Yeshwantrao Chavan College of Engineering, Nagpur, Maharashtra, India-441110

A Comparative Study Of Protein Tertiary Structure Prediction Methods, Chandrayani N.Rokde, Dr.Manali Kshirsagar

International Journal of Computer Science and Informatics

81818app手机版下载Protein structure prediction (PSP) from amino acid sequence is one of the high focus problems in bioinformatics today. This is due to the fact that the biological function of the protein is determined by its three dimensional structure. The understanding of protein structures is vital to determine the function of a protein and its interaction with DNA, RNA and enzyme. Thus, protein structure is a fundamental area of computational biology. Its importance is intensed by large amounts of sequence data coming from PDB (Protein Data Bank) and the fact that experimentally methods such as X-ray crystallography or Nuclear Magnetic Resonance ...


Theoretical Concepts & Applications Of Independent Component Analysis, SONALI MISHRA, NITISH BHARDWAJ, DR. RITA JAIN 2020 LNCT, Bhopal, M.P. India

Theoretical Concepts & Applications Of Independent Component Analysis, Sonali Mishra, Nitish Bhardwaj, Dr. Rita Jain

International Journal of Computer Science and Informatics

81818app手机版下载This paper deals with the study of Independent Component Analysis. Independent Component Analysis is basically a method which is used to implement the concept of Blind Source Separation. Blind Source Separation is a technique which is used to extract set of source signal from set of their mixed source signals. The various techniques which are used for implementing Blind Source Separation totally depends upon the properties and the characteristics of original sources. Also there are many fields nowadays in which Independent Component Analysis is widely used. This paper deals with the theoretical concepts of Independent Component Analysis, its principles and ...


A Comparative Analysis Of Ecdsa V/S Rsa Algorithm, AMANPREET KAUR, VIKAS GOYAL 2020 CSE deptt., BSSTC, Ferozepur-INDIA

A Comparative Analysis Of Ecdsa V/S Rsa Algorithm, Amanpreet Kaur, Vikas Goyal

International Journal of Computer Science and Informatics

Elliptic curve Cryptography with its various protocols implemented in terms of accuracy and fast observation of results for better security solution. ECC applied on two finite fields: prime field and binary field. Because it is public key cryptography so, it also focus on generation of elliptic curve and shows why finite fields are introduced. But for accurate observation we do analysis on category of cryptographic primitives used to solve given security problem. RSA & ECDSA both have basic criteria of production of keys and method of encryption and decryption in basic application as per security and other properties which are authentication ...