The WEPP (Water Erosion Prediction Project) application computes soil loss and sediment yield from a field based on the data on crops, management practices, and operations. In order to make WEPP, which is a Windows-based application, easily accessible, Web WEPP (Web-based WEPP) was developed by our research group.
Web WEPP...
We demonstrate an approach to transform keyword queries automatically into queries that combine keywords appropriately by boolean operations, such as and and or. Most current search engines will preprocess the queries before they really use these queries to search locally stored files or web pages. However, the search engines usually...
Recently several minimal perfect hashing functions far small static word sets have been developed. However, they are limited to sets of 50 words or less. In this paper, a Two Level Minimal Perfect Hash Function for large data sets is given. It partitions a large static set into small sets...
The goal of this project is to design and implement an information system for self-service chemistry stockroom at Oregon State University. The system will have the following major functionalities: (1) Recording inventory purchases and sales; (2) Customer account administration and periodic billing of customers; (3) Inventory monitoring; ( 4) Allowing...
It is widely believed that there is not enough experimentation in the field of computer science. One area in particular in which additional experimentation is needed involves regression testing of large, real software. Regression testing is the expensive process of validating changes made to previously tested software. One reason why...
A complete approach to reasoning under uncertainty requires support for both identification of the appropriate hypothesis space and ranking hypotheses based on available evidence. We present a hybrid reasoning scheme which combines symbolic and numeric methods for uncertainty management to provide efficient and effective support for both of these tasks....
A software system to study network algorithms was implemented on UNIX. Each part of a network algorithm can be written as a single C program which becomes a virtual node in the network. During a simulation all virtualized nodes run as separate processes on a single PDP 11/44. Inter-node communication...
It is difficult to build intelligent computer-aided design (ICAD) programs using available expert system shells and AI programming languages. To build ICAD programs, tools are needed that support (a) generative search of design spaces, (b) deep search of design spaces to evaluate alternative designs, (c) simultaneous exploration of alternative designs...
When Newell introduced the concept of the knowledge level as a useful level of description for computer systems, he focused on the representation of knowledge. This paper applies the knowledge level notion to the problem of knowledge acquisition. Two interesting issues arise. First, some existing machine learning programs appear to...
This report describes of current research in Artificial Intelligence at Oregon State University. The five areas of active research are ( a) intelligent aids for mechanical engineering design, (b) active experimentation as a method in machine learning, ( c) techniques for combining logic programming and assumption-based truth maintenance, ( d)...
This report reviews the 31 papers on machine learning that were presented at the Ninth International Joint Conference on Artificial Intelligence (IJCAI-85) held in Los Angeles during August, 1985. The papers are grouped according to a taxonomy of the various subareas of machine learning research. The areas receiving the most...
This chapter develops a taxonomy of learning methods using techniques based on Newell’s knowledge level. Two properties of each system are defined: knowledge level predictability and knowledge level learning. A system is predictable at the knowledge level if the principle of rationality can be applied to predict its behavior. A...
Authentication is a means of developing an electronic signature that works like a written signature. It assumes that your data is publicly known but nevertheless ensures that the message is not tampered with and that you have an audit trail.
This project discusses the techniques and concepts used to design...
Drought is a major concern for producers of food and forage crops. According to the U.S. Drought monitor, Central and Eastern Oregon in particular, are in severe drought. In the early 1990's, a trial was conducted to determine the yield per inch of water applied to 5 cereal species: barley,...
This PNW Extension publication provides an overview of various types of powderpost beetles, the symptoms associated with their damage, as well as tips for prevention and control.
Oregon State University (OSU) faculty members have supported the success of agriculture producers and their businesses for more than 100 years. Through research, education and community engagement, OSU faculty have helped agriculture producers and value-added operators respond to threats and opportunities in a manner that has brought vitality and sustainability...
The Oregon Sea Grant Visitor Center at Hatfield Marine Science Center attracts 150,000 visitors a year and does not require an admission fee. Surveying visitors, 39% of all people indicated that half or more of their reason for coming to the Oregon coast was to visit the Visitor Center.
The Community Action Partnership of Oregon (CAPO) approached Oregon State University to assist in developing statewide indicators which help local agencies better utilize data for continuous improvement. The project was expanded to include Washington and Idaho. This report summarizes the project's findings.
This presentation summarizes a collaborative effort of the Wallowa Resources, Northeast Oregon Economic Development District and Oregon State University faculty members jointly affiliated with Extension Service and the Rural Studies Program to develop indicators of Wallowa County community vitality in a way that reflects the goals and values of the...