Crops were grown at the experimental farms using accepted cultural practices (within the limits of experimentation) or trials were conducted on growers' fields. Most experiments were designed as randomized complete blocks with three to five replications. Herbicide treatments were applied uniformly with CO₂ precision plot sprayers. Unless otherwise indicated, preplant...
Assessing students' information literacy skills can be difficult depending on the involvement of the librarian in a course. To overcome this, librarians created an assignment called the Paper Trail, where students wrote a short essay about their research process and reflected on what they would do differently. Through reviewing and...
The first reliable aircraft measurements of characteristic cloud drop charges were obtained by utilizing a counterflow virtual impactor to substantially increase charge sensitivity and eliminate spurious contact charging that contaminated previous aircraft measurements. We find average drop charges more than an order of magnitude larger than expected from mountain surface...
A hydrodynamic model incorporating a self‐consistent treatment of ocean self‐attraction and loading (SAL), and a physically based parameterization of internal tide (IT) drag, is used to assess how accurately barotropic tides can be modeled without benefit of data, and to explore tidal energetics in the last glacial maximum (LGM). M2...
In this expanded new edition of Living with Earthquakes, Robert Yeats, a leading authority on earthquakes in California and the Pacific Northwest, describes the threat posed by the Cascadia Subduction Zone, a great earthquake fault which runs for hundreds of miles offshore from British Columbia to northern California. New research...
This strategic plan is a bold and imaginative call for the libraries to reposition itself with the OSU community. Key stakeholder groups including faculty, students, and the Library Advisory Council expect the libraries to be a prominent player as Oregon State University moves to implement the campus strategic plan. Each...
This report presents an assessment of the wave power potential of the Oregon coast and how much of that power can actually be converted into useful energy, based on analysis of the conversion efficiency of the two most advanced and probable technologies: oscillating water columns (OWC) and buoys. The actual...
Keywords: tree ring chronology; climate; forest development; dendrochronology; otolith time series; Sebastes diploproa; Sebastes pinniger; Douglas Fir; Pseudotsuga menziesii
The Wadi el Far'a catchment is a tributary of the Jordan River located entirely the West Bank in the Middle East. Increasing population in the catchment, with economic development, is likely to increase water needs in this water region. In the water management of the region, agriculture is an essential...
Accreditation Board for Engineering and Technology, Inc. (ABET) is the primary organization responsible for monitoring, evaluating and certifying the quality of engineering, engineering technology, computing and applied sciences education in the United States. In 2000, ABET changed the way computer science (and engineering) programs are accredited from a ‘checklist’ approach...
"A non-redundant number system has the digit set limited ranging from 0 to radix -1. While the Signed digit numbers have digit set consisting of more than radix r values. Hence it is also called redundant number system. Furthermore, the advantage of redundant number system lies in its application for...
Conservation efforts have been increasing in recent years to help preserve threatened coastal and ocean resources. Marine protected areas (MPAs) are an important tool to protect and conserve ocean resources. The MPA Center was established to take the lead in developing a framework for a national system of MPAs. The...
In this report, I first introduce three areas of interest to collaborative filtering researchers, namely: (a) how to solve the sparsity and scalability problems in recommendation systems; (b) how to rapidly develop and test collaborative filtering algorithms; and (c) how to apply collaborative filtering to unbounded numeric preference data. In...
Timing attacks enable an attacker to extract secret information from a cryptosystem by observing timing differences with respect to different inputs given to an encryption or decryption algorithm. Werner Schindler has proposed a timing attack on smart card devices. We implemented this attack based on the same approach for RSA...
The purpose of this study was to document the initial change in vegetative canopy cover
following winter seismic exploration on the North Slope of Alaska. The study conducted herein
focuses solely on the impact to wet sedge meadow vegetation.
The overarching goal of this study is to contribute some level...