scholarly journals Selecting Species to Develop a Field-grown Wildflower Sod

1997 ◽  
Vol 7 (4) ◽  
pp. 411-414
Author(s):  
Anne Marie Johnson ◽  
Ted Whitwell

Twenty-nine annual and perennial wildflower species were evaluated for sod development based on ratings for appearance, root mat density, and stability following undercutting and storage and performance after replanting. Species selection was based on the lack of a large taproot, adaptability to the southeastern climate, flowering period, and potential for surviving root undercutting. Species were seeded in fall and spring, and leaf area and root mass samples were compared. Wildflower sod was undercut at a 5 cm (2 in) depth in March (fall-seeded plots) and May (spring-seeded plots) and then stored on clear plastic for 7 weeks and replanted. Fall-planted species had a higher survival rate than spring-planted species. Species selected for sod development were Achillea millefolium L., Chrysanthemum leucanthemum L., Coreopsis lanceolata L., Coreopsis tinctoria Nutt., Gaillardia aristata Foug., Monarda citriodora Cerv. ex Lag., Rudbeckia hirta L., and Verbena tenuisecta Briq. To reduce damage to aerial growth during harvesting, paclobutrazol, daminozide, and uniconazole were tested on eight greenhouse-grown wildflower species. Uniconazole had limited growth control over Rudbeckia hirta, Monarda citriodora, Coreopsis lanceolata, and Coreopsis tinctoria.

HortScience ◽  
1995 ◽  
Vol 30 (4) ◽  
pp. 895F-895
Author(s):  
Anne Marie Johnson ◽  
Ted Whitwell

In a study examining the potential for production of a field grown wildflower sod, 29 annual and perennial wildflower species were evaluated. Species selection for the study was based on lack of a large taproot, adaptability to the southeastern climate, flowering period, and potential for surviving root undercutting. Species were individually seeded in 1-m2 plots in Fall 1993 and Spring 1994 to determine an optimum planting time. In early Spring 1994, fall seeded plots were undercut at a 5 cm depth with a hand held sod cutter. Spring planted species were undercut in early summer. After undercutting, sod pieces were placed on clear plastic under overhead irrigation for 7 weeks then transplanted to prepared field sites. Ratings for flower appearance, root mat density, top growth vigor and fresh root weights were taken at the time of undercutting and after transplanting. Fall-planted species had a higher survival rate than spring-planted species. Species with the highest ratings and greatest increase in fresh root weights from the time of undercutting to transplanting were yarrow (Achillea millefolium), oxeye daisy (Chrysanthemum leucanthemum), lance-leaf coreopsis (Coreopsis lanceolata), plains coreopsis (Coreopsis tinctoria), blanketflower (Gaillardia aristata), lemon mint (Monarda citriodora), blackeyed Susan (Rudbeckia hirta), and moss verbena (Verbena tenuisecta).


1997 ◽  
Vol 7 (4) ◽  
pp. 415-417
Author(s):  
Anne Marie Johnson ◽  
Ted Whitwell

Twenty-nine annual and perennial wildflower species were evaluated for commercial seed production potential in South Carolina. Species selection was based on adaptability to southeastern conditions and potential for use in wildflower sod. Potential for seed production was based on seed maturation ratings, percent germination 4 to 6 weeks after harvest, and yield. Individual species were seeded into I-m2 plots (3.3 ft2), on 7 Oct. Seeds were collected, clcaned, and counted, and total seed yield (lb) was calculated based on seed germination and weight of 100 seeds. Species with potential for production were Hesperis matronalis L. (2605 lb/acre), Monarda citriodora Cer. ex Lag. (1247 lb/A), Silene armeria L. (1122 lb/acre), Bidens aristosa (Michaux) Britton. (41 lb/acre), Centaurea cyanus L. (823 lb/acre), Coreopsis tinctoria Nutall (185 lb/acre), Gypsophila elegans L. (120 lb/acre), Ipomopsis rubra (L.) (2301 lb/acre) Wherry, and Rudbeckia hirta L. (500 lb/acre).


2020 ◽  
Vol 12 (2) ◽  
pp. 639
Author(s):  
Reza Abbasinejad ◽  
Farzad Hourfar ◽  
Chandra Mouli R Madhuranthakam ◽  
Ali Elkamel

In oil and gas plants, the cost of devices applicable for supervising and controlling systems directly depends on the transmission and storage systems, which are related to the data size of process variables. In this paper, process variables frequency-domain and statistical analysis results have been studied to infer if there exists any possibility to reduce data size of the process variables without loss of any necessary information. Although automatic control is not applicable in a shutdown condition, for generalization of the obtained results, unscheduled shutdown data has also been analyzed and studied. The main goal of this paper is to develop an applicable algorithm for oil and gas plants to decrease the data size in controlling and monitoring systems, based on well-known and powerful mathematical techniques. The results show that it is possible to reduce the size of data dramatically (more than 99% for controlling, and more than 55% for monitoring purposes in comparison with existing methods), without loss of vital information and performance quality.


Author(s):  
Shaista Rashid ◽  
Dimitris Rigas

In all walks of life individuals are involved in a cumulative and incremental process of knowledge acquisition. This involves the accessing, processing and understanding of information which can be gained through many different forms. These include, deliberate means by picking up a book or passive by listening to someone. The content of knowledge is translated by individuals and often recorded by the skill of note-taking, which differs in method from one person to another. This article presents an investigation into the techniques to take notes including the most popular Cornell method. A comparative analysis with the Outlining and Mapping methods are carried out stating strengths and weaknesses of each in terms of simplicity, usefulness and effectiveness. The processes of developing such skills are not easy or straightforward and performance is much influenced by cognition. Therefore, such associations regarding cognitive conceptions involve the exploration into note-taking processes encoding and storage, attention and concentration, memory and other stimuli factors such as multimedia. The social changes within education from the traditional manner of study to electronic are being adapted by institutes. This change varies from computerising a sub-component of learning to simulating an entire lecture environment. This has enabled students to explore academia more conveniently however, is still arguable about its feasibility. The article discusses the underlying pedagogical principles, deriving instructions for the development of an e-learning environment. Furthermore, embarking on Tablet PC’s to replace the blackboard in combination with annotation applications is investigated. Semantic analysis into the paradigm shift in e-learning and knowledge management replacing classroom interaction presents its potential in the learning domain. The article concludes with ideas for the design and development of an electronic note-taking platform.


Author(s):  
Manjunatha R C ◽  
Rekha K R ◽  
Nataraj K R

<p>Wireless sensor networks are usually left unattended and serve hostile environment, therefore can easily be compromised. With compromised nodes an attacker can conduct several inside and outside attacks. Node replication attack is one of them which can cause severe damage to wireless sensor network if left undetected. This paper presents fuzzy based simulation framework for detection and revocation of compromised nodes in wireless sensor network. Our proposed scheme uses PDR statistics and neighbor reports to determine the probability of a cluster being compromised. Nodes in compromised cluster are then revoked and software attestation is performed.Simulation is carried out on MATLAB 2010a and performance of proposed scheme is compared with conventional algorithms on the basis of communication and storage overhead. Simulation results show that proposed scheme require less communication and storage overhead than conventional algorithms.</p>


Author(s):  
Manjunatha R C ◽  
Rekha K R ◽  
Nataraj K R

<p>Wireless sensor networks are usually left unattended and serve hostile environment, therefore can easily be compromised. With compromised nodes an attacker can conduct several inside and outside attacks. Node replication attack is one of them which can cause severe damage to wireless sensor network if left undetected. This paper presents fuzzy based simulation framework for detection and revocation of compromised nodes in wireless sensor network. Our proposed scheme uses PDR statistics and neighbor reports to determine the probability of a cluster being compromised. Nodes in compromised cluster are then revoked and software attestation is performed.Simulation is carried out on MATLAB 2010a and performance of proposed scheme is compared with conventional algorithms on the basis of communication and storage overhead. Simulation results show that proposed scheme require less communication and storage overhead than conventional algorithms.</p>


2019 ◽  
Vol 214 ◽  
pp. 03037
Author(s):  
M. Martinez Pedreira ◽  
C. Grigoras ◽  
V. Yurchenko

The ALICE experiment will undergo extensive hardware and software upgrades for the LHC Run3. This translates in significant increase of the CPU and storage resources required for data processing, and at the same time the data access rates will grow linearly with the amount of resources. JAliEn (Java ALICE Environment) is the new Grid middleware designed to scale-out horizontally to fulfil the computing needs of the upgrade, and at the same time to modernize all parts of the distributed system software. This paper will present the architecture of the JAliEn framework, the technologies used and performance measurements. This work will also describe the next generation solution that will replace our main database backend, the AliEn File Catalogue. The catalogue is an integral part of the system, containing the metadata of all files written to the distributed Grid storage and also provides powerful search and data manipulation tools. As for JAliEn, the focus has been put onto horizontal scalability, with the aim to handle near exascale data volumes and order of magnitude more workload than the currently used Grid middleware. Lastly, this contribution will present how JAliEn manages the increased complexity of the tasks associated with the new ALICE data processing and analysis framework (ALFA) and multi-core environments.


2019 ◽  
Vol 214 ◽  
pp. 04010
Author(s):  
Álvaro Fernández Casaní ◽  
Dario Barberis ◽  
Javier Sánchez ◽  
Carlos García Montoro ◽  
Santiago González de la Hoz ◽  
...  

The ATLAS EventIndex currently runs in production in order to build a complete catalogue of events for experiments with large amounts of data. The current approach is to index all final produced data files at CERN Tier0, and at hundreds of grid sites, with a distributed data collection architecture using Object Stores to temporarily maintain the conveyed information, with references to them sent with a Messaging System. The final backend of all the indexed data is a central Hadoop infrastructure at CERN; an Oracle relational database is used for faster access to a subset of this information. In the future of ATLAS, instead of files, the event should be the atomic information unit for metadata, in order to accommodate future data processing and storage technologies. Files will no longer be static quantities, possibly dynamically aggregating data, and also allowing event-level granularity processing in heavily parallel computing environments. It also simplifies the handling of loss and or extension of data. In this sense the EventIndex may evolve towards a generalized whiteboard, with the ability to build collections and virtual datasets for end users. This proceedings describes the current Distributed Data Collection Architecture of the ATLAS EventIndex project, with details of the Producer, Consumer and Supervisor entities, and the protocol and information temporarily stored in the ObjectStore. It also shows the data flow rates and performance achieved since the new Object Store as temporary store approach was put in production in July 2017. We review the challenges imposed by the expected increasing rates that will reach 35 billion new real events per year in Run 3, and 100 billion new real events per year in Run 4. For simulated events the numbers are even higher, with 100 billion events/year in run 3, and 300 billion events/year in run 4. We also outline the challenges we face in order to accommodate future use cases in the EventIndex.


Designs ◽  
2019 ◽  
Vol 3 (3) ◽  
pp. 40
Author(s):  
Julian D. Booker ◽  
Richard J. Lock ◽  
David Drury

The aim of this paper was to demonstrate the improved functionality and performance of an electromechanical brake for a helicopter main rotor, which to date has been hydraulically actuated using a disc brake and caliper arrangement. Increasingly, designers seek higher performing solutions to traditional problems through the integration of modern actuation and control strategies. This electromechanical device is required to constrain the helicopter tail rotor shaft protruding from the main rotor gearbox to allow safe taxiing and storage of the helicopter. A systematic and rigorous design methodology was used to converge on an effective solution which satisfied a very demanding specification. The design was further detailed and optimized, leading to the development of a prototype at a high technology readiness level that was tested within a bespoke rig, simulating the torque requirements found on a helicopter main rotor using the torque and position control. The design was shown to meet the required holding torque whilst providing additional functionality of continuous holding capability and meeting the challenging volumetric constraints.


Sign in / Sign up

Export Citation Format

Share Document