Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Conference

2021

Discipline
Institution
Keyword
Publication
File Type

Articles 2041 - 2056 of 2056

Full-Text Articles in Physical Sciences and Mathematics

Defoliation Effect Of Poa Ligularis Nees Ap Steudel On Aerial Biomass Production And Its Components In Northwestern Argentinian Patagonia, C. Gittins, G. F. Becker, C. A. Busso, G. L. Siffredi, L. G. Ghermandi Jan 2021

Defoliation Effect Of Poa Ligularis Nees Ap Steudel On Aerial Biomass Production And Its Components In Northwestern Argentinian Patagonia, C. Gittins, G. F. Becker, C. A. Busso, G. L. Siffredi, L. G. Ghermandi

IGC Proceedings (1997-2023)

No abstract provided.


Degradation Of Pastures In Mongolia: Challenges And Perspective, D. Dorligsuren, D. Avaadorj, M. Olonbayar, Ts. Enkh‐Amgalan Jan 2021

Degradation Of Pastures In Mongolia: Challenges And Perspective, D. Dorligsuren, D. Avaadorj, M. Olonbayar, Ts. Enkh‐Amgalan

IGC Proceedings (1997-2023)

No abstract provided.


Cultivating The Surface Soil To Renovate A Grama Rhodes (Chloris Gayana K. Cv. Callide) Pasture In Northwest Argentine (Noa). 3. Effect Of Interval Of Implements Applied, R. N. Berti Jan 2021

Cultivating The Surface Soil To Renovate A Grama Rhodes (Chloris Gayana K. Cv. Callide) Pasture In Northwest Argentine (Noa). 3. Effect Of Interval Of Implements Applied, R. N. Berti

IGC Proceedings (1997-2023)

No abstract provided.


Bodyweight Gain Of Grazing Sheep Responses To Stocking Rate In Stipa Breviflora Steppe, Zhongwu Wang, Guodong Han, Mengli Zhao Jan 2021

Bodyweight Gain Of Grazing Sheep Responses To Stocking Rate In Stipa Breviflora Steppe, Zhongwu Wang, Guodong Han, Mengli Zhao

IGC Proceedings (1997-2023)

No abstract provided.


Supplementation Levels For Crossbred Steers Kept In Pastures Grazing Brachiaria Brizantha, I. F. Andrade, M. M. Leão, A. A. F. Baião, E. A. A. M. Baião Jan 2021

Supplementation Levels For Crossbred Steers Kept In Pastures Grazing Brachiaria Brizantha, I. F. Andrade, M. M. Leão, A. A. F. Baião, E. A. A. M. Baião

IGC Proceedings (1997-2023)

No abstract provided.


Effect Of The Pasture On Milk Production From Cinisara Cows Over The Seasons, M. Alabiso, C. Giosuè, M. L. Alicata, V. Ilardi, D. Giambalvo, G. Maniaci Jan 2021

Effect Of The Pasture On Milk Production From Cinisara Cows Over The Seasons, M. Alabiso, C. Giosuè, M. L. Alicata, V. Ilardi, D. Giambalvo, G. Maniaci

IGC Proceedings (1997-2023)

No abstract provided.


Identifying And Solving Mineral Deficiencies In Sheep And Goats In Inner Mongolia, Adrian Williams, Dunyuan Hao Jan 2021

Identifying And Solving Mineral Deficiencies In Sheep And Goats In Inner Mongolia, Adrian Williams, Dunyuan Hao

IGC Proceedings (1997-2023)

No abstract provided.


An Investigation On Diet Selection By Sheep And Goats In Steppe Regions Of Yazd Province, Iran, Anahita Rashtian, Mansour Mesdaghi, Masoume Amirkhani Jan 2021

An Investigation On Diet Selection By Sheep And Goats In Steppe Regions Of Yazd Province, Iran, Anahita Rashtian, Mansour Mesdaghi, Masoume Amirkhani

IGC Proceedings (1997-2023)

No abstract provided.


Cybersecurity: Building A Better Defense With A Great Offense, David M. Cooke Jan 2021

Cybersecurity: Building A Better Defense With A Great Offense, David M. Cooke

Cybersecurity Undergraduate Research Showcase

The current industry standard for cybersecurity is risk mitigation, which is the identification, evaluation, and categorization of threats that are posed to an organization's network. The goal is to prevent attacks and if an organization is attacked popular standard is to react and remedy the attack. This form of cyber defense isn’t very reassuring to an organization and its users, once an attack is executed based on a study conducted by Booz Allen the average time an advanced persistent threat (APT) dwells on a victims’ network before it’s discovered is 200-250 days. That’s plenty of time for a malicious third …


Best Cybersecurity Practices For Companies, Post Van Buren, Mary Riley Jan 2021

Best Cybersecurity Practices For Companies, Post Van Buren, Mary Riley

Cybersecurity Undergraduate Research Showcase

Imagine this scenario: you are a small business owner, and you’ve just been informed of a network security breach. In your Zoom meeting with the IT Department, you learned the details: network activity logs revealed aberrant behavior after hours. Threat actors accessed systems containing sensitive information and downloaded copies of key files containing company trade secrets, market strategies, and customer data – all within a matter of minutes. Immediately, you review the consequences of the breach in your mind: reputational harm, monetary loss, and potential lawsuits. You ask the IT professional about the root cause of the breach. Was it …


Tackling Ai Bias With Gans, Noam Stanislawski Jan 2021

Tackling Ai Bias With Gans, Noam Stanislawski

Cybersecurity Undergraduate Research Showcase

Throughout the relatively short history of artificial intelligence (AI), there has been a significant concern surrounding AI’s ability to incorporate and maintain certain characteristics which were not inherently modeled out in its coding. These behaviors stem from the prominent usage of neural network AI, which can inherit human biases from the input data it receives. This paper argues for two possible avenues to combat these biases. The first is to rethink the traditional framework for neural network projects and retool them to be usable by a Generative Adversarial Network (GAN). In a GAN’s zero-sum game, two network techniques can combat …


Question Answering By Bert, Suman Karanjit Jan 2021

Question Answering By Bert, Suman Karanjit

Student Academic Conference

No abstract provided.


Integrating The Bullet Physics Engine Into Minecraft, Ethan Johnson Jan 2021

Integrating The Bullet Physics Engine Into Minecraft, Ethan Johnson

Student Academic Conference

During the past fall semester, I started a programming project called Rayon which is designed to be a realistic physics engine implementation that runs alongside the videogame Minecraft. It is a library which Minecraft mod developers can use to implement realistic entity movement into their own mods. Rayon, being entirely written in the Java programming language, currently uses a port of the Bullet physics engine called JBullet which is very outdated and no longer being maintained. To find a more performant solution, I have set out to replace JBullet with an alternative library called LibBulletJME which is designed to interface …


Leverage Psychological Factors Associated With Lapses In Cybersecurity In Organizational Management, Chad Holm Jan 2021

Leverage Psychological Factors Associated With Lapses In Cybersecurity In Organizational Management, Chad Holm

Cybersecurity Undergraduate Research Showcase

With computers being a standard part of life now with the evolution of the internet, many aspects of our lives have changed, and new ways of thinking must come. One of the biggest challenges in most cyber security problems is not related to the software or the hardware; it is the people that are using the computers to access the data and communicate with others, where the hackers could simply find a weak entry point that naturally exists and a weak link caused by human hands. The human factor as an “insider threat” will affect unauthorized access, credentials stealing, and …


On The Usage And Vulnerabilities Of Api Systems, Conner D. Yu Jan 2021

On The Usage And Vulnerabilities Of Api Systems, Conner D. Yu

Cybersecurity Undergraduate Research Showcase

To some, Application Programming Interface (API) is one of many buzzwords that seem to be blanketed in obscurity because not many people are overly familiar with this term. This obscurity is unfortunate, as APIs play a crucial role in today’s modern infrastructure by serving as one of the most fundamental communication methods for web services. Many businesses use APIs in some capacity, but one often overlooked aspect is cybersecurity. This aspect is most evident in the 2018 misuse case by Facebook, which led to the leakage of 50 million users’ records.1 During the 2018 Facebook data breach incident, threat actors …


The Introduction Of Big Data In Cloud Computing, Austin Gruenberg Jan 2021

The Introduction Of Big Data In Cloud Computing, Austin Gruenberg

Student Academic Conference

One of the fastest-growing technologies that many people are unaware of is the world of cloud computing. Having started in 2006, it is a relatively new technological advancement in the computer industry. The major branch of cloud computing that I decided to focus on was big data. I decided to research this topic to better understand what its current uses are, to see what the future holds for Big Data and cloud computing and because it is a growing, significant piece of technology being used in our society today. Big data and cloud computing are very important industries and have …