Catalog

    No available filters at the moment
    No available filters at the moment
    No available filters at the moment
    No available filters at the moment
28 results
Natural Distasters book cover

Natural Distasters

All Rights Reserved   English

Author(s): Carolyn Jackson

Last updated: 09/04/2024

Microbiology for Earth Scientists book cover

Microbiology for Earth Scientists

All Rights Reserved   English

Author(s): mfkirk

Subject(s): The Arts

Last updated: 09/04/2024

Crop Adaptation and Improvement for Drought-Prone Environments book cover

Crop Adaptation and Improvement for Drought-Prone Environments

CC BY-SA (Attribution ShareAlike)   English

Author(s): Editors: Ndjido A. Kane, Daniel Foncéka, and Timothy J. Dalton

Editor(s): Ndjido A. Kane, Daniel Foncéka, Timothy J. Dalton

Subject(s): The Arts

Institution(s): Kansas State University

Publisher: New Prairie Press

Last updated: 09/04/2024

This book focuses on three important elements in the development of cereal and legume crops in semi-arid West Africa. The first section illustrates the socioeconomic factors that affect the food system for these crops and contains an overview of crop production and consumption in the region. Then, important inputs that affect system productivity are presented: preferences for new seed varieties, yield response to fertilizer, counterfeit herbicides, climate information, and the way farmers develop expectations about the weather events that shape cropping outcomes. The final chapter of section one is dedicated to understanding urban consumer preferences for processed food products derived from pearl millet.

The second section addresses the state of the art of phenotyping and the modeling of crop adaptation to dryland farming systems. Chapters in section two focus on the regional network for phenotyping, high throughput phenotyping in field situations, root architectures, and crop ideotypes. In addition, empirical evidence is presented on root and soil interactions and the effectiveness of unmanned aerial vehicles (UAVs to assess sorghum physiology.

Finally, the third section investigates the genetic diversity and improvement of dryland crops. Chapters in this section focus on biodiversity and agricultural system sustainability, orphan crops such as fonio, and the utilization of a regional germplasm collection in the improvement of cowpea, groundnut, pearl millet, and sorghum.

Counter Unmanned Aircraft Systems Technologies and Operations book cover

Counter Unmanned Aircraft Systems Technologies and Operations

CC BY-NC-SA (Attribution NonCommercial ShareAlike)   English

Author(s): R. K. Nichols, J.J.C.H. Ryan, H.C. Mumm, C. Carter, W.D. Lonstein, J.P. Hood

Editor(s): R. K. Nichols

Subject(s): Aerospace and aviation technology

Institution(s): Kansas State University

Publisher: New Prairie Press

Last updated: 26/02/2024

As the quarter-century mark in the 21st Century nears, new aviation-related equipment has come to the forefront, both to help us and to haunt us. (Coutu, 2020) This is particularly the case with unmanned aerial vehicles (UAVs). These vehicles have grown in popularity and accessible to everyone. Of different shapes and sizes, they are widely available for purchase at relatively low prices. They have moved from the backyard recreation status to important tools for the military, intelligence agencies, and corporate organizations. New practical applications such as military equipment and weaponry are announced on a regular basis – globally. (Coutu, 2020) Every country seems to be announcing steps forward in this bludgeoning field.

In our successful 2nd edition of Unmanned Aircraft Systems in the Cyber Domain: Protecting USA’s Advanced Air Assets (Nichols, et al., 2019), the authors addressed three factors influencing UAS phenomena. First, unmanned aircraft technology has seen an economic explosion in production, sales, testing, specialized designs, and friendly / hostile usages of deployed UAS / UAVs / Drones. There is a huge global growing market and entrepreneurs know it. Second, hostile use of UAS is on the forefront of DoD defense and offensive planners. They are especially concerned with SWARM behavior. Movies like “Angel has Fallen,” where drones in a SWARM use facial recognition technology to kill USSS agents protecting POTUS, have built the lore of UAS and brought the problem forefront to DHS.  Third, UAS technology was exploding. UAS and Counter- UAS developments in navigation, weapons, surveillance, data transfer, fuel cells, stealth,  weight distribution, tactics, GPS / GNSS elements, SCADA protections, privacy invasions, terrorist uses, specialized software, and security protocols has exploded. (Nichols, et al., 2019) Our team has followed / tracked joint ventures between military and corporate entities and specialized labs to build UAS countermeasures.

As authors, we felt compelled to address at least the edge of some of the new C-UAS developments. It was clear that we would be lucky if we could cover a few of – the more interesting and priority technology updates – all in the UNCLASSIFIED and OPEN sphere.

Counter Unmanned Aircraft Systems: Technologies and Operations is the companion textbook to our 2nd edition. The civilian market is interesting and entrepreneurial, but the military and intelligence markets are of concern because the US does NOT lead the pack in C-UAS technologies. China does. China continues to execute its UAS proliferation along the New Silk Road Sea / Land routes (NSRL). It has maintained a 7% growth in military spending each year to support its buildup. (Nichols, et al., 2019) [Chapter 21]. They continue to innovate and have recently improved a solution for  UAS flight endurance issues with the development of advanced hydrogen fuel cell. (Nichols, et al., 2019) Reed and Trubetskoy presented a terrifying map of countries in the Middle East with armed drones and their manufacturing origin. Guess who? China.  (A.B. Tabriski & Justin, 2018, December)

Our C-UAS textbook has as its primary mission to educate and train resources who will enter the UAS / C-UAS field and trust it will act as a call to arms for military and DHS planners.  

DRONE DELIVERY OF CBNRECy – DEW WEAPONS Emerging Threats of Mini-Weapons of Mass Destruction and Disruption ( WMDD) book cover

DRONE DELIVERY OF CBNRECy – DEW WEAPONS Emerging Threats of Mini-Weapons of Mass Destruction and Disruption ( WMDD)

CC BY-NC-SA (Attribution NonCommercial ShareAlike)   English

Author(s): Candice Carter, CPT John Paul Hood, Dr Hans C. Mumm, Dr Mark Jackson, Dr Robert McCreight, Dr Suzanne Sincavage, Mike Monnik, Randall K. Nichols, Randall Mai, Wayne Lonstein, William Slofer

Editor(s): Randall K. Nichols

Subject(s): Weapons and equipment, Chemical and biological weapons, Aircraft and aviation

Institution(s): Kansas State University

Publisher: New Prairie Press

Last updated: 07/02/2024

Drone Delivery of CBNRECy – DEW Weapons: Emerging Threats of Mini-Weapons of Mass Destruction and Disruption (WMDD) is our sixth textbook in a series covering the world of UASs &  UUVs. Our textbook takes on a whole new purview for UAS / CUAS/ UUV (drones) – how they can be used to deploy Weapons of Mass Destruction and Deception against CBRNE and civilian targets of opportunity. We are concerned with the future use of these inexpensive devices and their availability to maleficent actors. Our work suggests that UASs in air and underwater UUVs will be the future of military and civilian terrorist operations. UAS / UUVs can deliver a huge punch for a low investment and minimize human casualties.

Repeating, we are concerned with the future use of these inexpensive devices and their availability to maleficent actors. As I write this description, we are on the 56th day of the savage invasion of Ukraine by Russia under President Putin. The Russian drone fleet numbers are above 500. They have had five years to grow their fleet. Russia currently uses them for domestic security, Syrian operations, and defense.  (Facon, 2016) In the conflict, Russian troops seriously outnumber Ukrainian forces. However, on February 8, 2022, a Forbes report stated that Ukraine used 20 Turkish TB-2 drones to hit Russian targets and offset some of Russia’s enormous military advantages. (Malsin, 2022) According to Fox News, on February 27, 2022, President Putin ordered nuclear deterrent forces status raised to “special combat readiness” (Colton, 2022)

News like this in just one conflict suggests that UASs in air and underwater UUVs will be the future of military and civilian terrorist operations. UAS / UUVs can deliver a huge punch for a low investment and minimize human casualties.  Our team believes that China is watching both the United States’ Neville Chamberlain appeasement strategy and the aggressive nature of Russia in its full-scale invasion of its neighbor. This portends that Taiwan is the next meal on the global plate. Unfortunately, two other state actors have season tickets: Iran and North Korea. Iran’s drone fleet is impressive and has caused other Gulf states’ inventories to escalate (UAE, Kingdom of Saudi Arabia, Egypt, Iraq, Jordan, Israel) (Barrie, 2021). North Korea (NK) lies about its air power. However, one report states that NK will have drones with stealth capability. (Choi, 2021) Maybe. According to Datablog, the US has the most drones and is best equipped for warfare. China, of course, might dispute these statistics. (DATABLOG, 2012) However, carrying a big stick doesn’t count anymore in the UAS’s future military play without the will to use it.

Our Wildcat team is composed of some impressive SMEs. We divided the work into four sections. Section 1 covers Chemical, Biological, Radiation, Nuclear, Explosive (CBRNE) weapons and payloads delivered by unmanned vehicles. Here we look at the technologies and damage delivered by drones as mini weapons of mass destruction and disruption. Chapter 7 concentrates on Deception and how drones can be used in PSYOPS and INFOWAR. Section 2 concentrates on Directed Energy Weapons (DEW), projectiles payloads, satellite killers, port disrupters, and cyberweapons against CBRN assets. Section 3 looks at policy considerations, risk assessments of threats and vulnerabilities of drone-based WMDD / DEW, practical crime scene investigations for hot zones, and unique challenges of responding to bioterrorism and chemical threats and attacks delivered by drones. Our final Section 4 concludes with social networking implications and DRONESEC security and tracking tools of the trade.

Over two years of solid research by a team of eleven SMEs is incorporated into our book. We trust you will enjoy reading it as much as we have in its writing. There are nightmares aplenty.

 

Marianna Kistler Beach Museum of Art at 25: People and Spaces book cover

Marianna Kistler Beach Museum of Art at 25: People and Spaces

CC BY-NC (Attribution NonCommercial)   English

Author(s): Anthony R. Crawford, Marla Day, Marlene VerBrugge, Martha Scott

Subject(s): The Arts

Institution(s): Kansas State University

Publisher: New Prairie Press

Last updated: 31/01/2024

The e-book MARIANNA KISTLER BEACH MUSEUM OF ART: PEOPLE AND SPACES was created by the Board of the Friends of the Beach Museum of Art and published by New Prairie Press of Kansas State University in 2021. The purpose of the book is to celebrate the 25th anniversary of the art museum’s opening on the K-State campus in October 1996. It includes articles about the people who are honored by named spaces in the museum. Their contributions allowed the museum to become a reality, including an addition to the building that opened in 2007. When Jon Wefald became president of K-State in 1986, the university was the only institution in the Big 8 Conference without an art museum. First Lady Ruth Ann Wefald took the lead in obtaining the supporters and funds to establish a home for the institution’s impressive art collection. The most notable contribution came from Ross and Marianna Kistler Beach whose generous financial support made the building possible. In 1991 they provided the lead gift for an art museum that would be named in honor of Marianna to commemorate the couple’s 50th wedding anniversary. After the book’s introduction by Linda Duke, the museum’s executive director, Ruth Ann summarizes the difficult journey to establish an art museum. It is followed by an account of Marianna’s many accomplishments. The remainder of the publication contains 23 articles — written by board members of the Friends of the Beach Museum of Art — devoted to the people for whom spaces in the building are named. Photographs are included of those who are honored and spaces in the building including galleries, educational wing, theater, offices, and work and storage locations. The diverse group of people and their contributions have made the museum what it has become during its 25 years — a vibrant place for the collecting, studying, caring for, and presenting the visual art of Kansas and the region. Editors of the e-book are Anthony R. Crawford, Marla Day, Martha Scott, and Marlene VerBrugge, board members of the Friends of the Beach Museum of Art.
Digital Signal Processing: The Essentials-Theory to Practice book cover

Digital Signal Processing: The Essentials-Theory to Practice

CC BY-NC-SA (Attribution NonCommercial ShareAlike)   English

Author(s): Dwight Day

Institution(s): Kansas State University

Publisher: New Prairie Press

Last updated: 29/01/2024

DISRUPTIVE TECHNOLOGIES WITH APPLICATIONS IN AIRLINE & MARINE AND DEFENSE INDUSTRIES book cover

DISRUPTIVE TECHNOLOGIES WITH APPLICATIONS IN AIRLINE & MARINE AND DEFENSE INDUSTRIES

CC BY-NC-SA (Attribution NonCommercial ShareAlike)   English

Author(s): Bart Shields, Candice Carter, Hans C Mumm, John Paul Hood, Mark Jackson, Professor Randall K. Nichols, Randall Mai, Suzanne Sincavage, W.D. Lonstein

Editor(s): Professor Randall K. Nichols

Subject(s): Disruptive innovation, Chemical and biological weapons, Other warfare and defence issues

Institution(s): Kansas State University

Publisher: New Prairie Press

Last updated: 19/01/2024

Disruptive Technologies With Applications in Airline, Marine, Defense Industries is the authors fifth textbook in a series covering the world of Unmanned Vehicle Systems & Operations On Air, Sea, Land;  Counter Unmanned Aircraft Systems Technologies and Operations;  Unmanned Aircraft Systems in the Cyber Domain: Protecting USA’s Advanced Air Assets, 2nd edition; and Unmanned Aircraft Systems (UAS) in the Cyber Domain Protecting USA’s Advanced Air Assets, 1st edition; have seen considerable global recognition in the field. (Nichols R. K., et al., 2020) (Nichols R. , et al., 2020) (Nichols R. , et al., 2019) (Nichols R. K., 2018)

The authors have expanded their purview beyond UAS / CUAS / UUV systems which they have written extensively about in our previous four textbooks. Our new title shows our concern for the emergence of Disruptive Technologies and how they apply to the Airline, Marine and Defense industries.

There is a difference between emerging technology trends and disruptive ones. Emerging technologies are technologies whose development, practical applications, or both are still largely unrealized, such that they are figuratively emerging into prominence from a background of nonexistence or obscurity. Some sources say that emerging technologies are taking over the world by a storm and if misused, it could turn out to be our worst enemy.

Disruptive technology is one that displaces an established technology and shakes up the industry or a ground-breaking product that creates a completely new industry. (Rouse, 2021)

That is what our book is about. The authors think they have found technology trends that will replace the status quo or disrupt the conventional technology paradigms.

The authors have written some explosive chapters in their Book 5. Dr. Hans Mumm has written about the Advances in Automation & Human Machine Interface. Wayne Lonstein, JD has given the reader a solid look at Social Media as a Battleground in Information Warfare (IW). CEO Bart Shields has delivered a viable, less risky, more robust  cyber-security alterative / replacement for the popular Blockchain Algorithm and a clean solution for Ransomware. Professor Randall K. Nichols has written about the Advanced Sensor Technologies that are used by UUVs for munitions characterization, assessment, and classification.  He reports on their counter hostile use of UUVs against U.S. capital assets in the South China Seas.  In a second chapter, Professor Nichols has challenged the status quo and debunked the climate change fraud with verifiable facts. In his third chapter, he explodes our minds with Nightmare Technologies that if they come to fruition may do more harm than good.

Dr. Mark Jackson has written authoritatively about Propulsion and Fuels: Disruptive Technologies for Submersible Craft Including UUVs. CEO Randall Mai has penned a chapter to Challenge the Ammunition Industry by Grassroots use of Recycled Metals.  Captain John Paul Hood writes about the changing landscape of UAS regulations and drone privacy laws. 2021 will prove to be most challenging for owners and manufacturers of UAS. CEO & Dr. Suzanne Sincavage and Professor Candice Carter have teamed up to scare the pants off of us – especially during the COVID-19 pandemic – by detailing  Bioterrorism Risks, Biodefense, Threat Agents and the need for advanced sensors to detect these attacks.  Their chapter is truly a wake-up call.

Autobiography of George Washington Owens: First African American Graduate of Kansas State University book cover

Autobiography of George Washington Owens: First African American Graduate of Kansas State University

CC BY-NC (Attribution NonCommercial)   English

Author(s): Anthony R. Crawford

Editor(s): Anthony R. Crawford

Institution(s): Kansas State University

Publisher: New Prairie Press

Last updated: 17/01/2024

George Washington Owens was the son of former slaves who migrated to Kansas in the early 1870s to find free land, finally settling in Wabaunsee County, Kansas, near Alma. It was there that he was born in 1875. In his handwritten autobiography, Owens chronicles the difficulties and successes of working hard growing up on the plains and as a student at District School #3 of Alma, and then at Kansas State Agricultural College. After learning that no African American had graduated from KSAC (now Kansas State University), “he resolved to be the first.” He did so, graduating in 1899. Owens continues by describing how he was recruited to Tuskegee Institute in Alabama to work under Booker T. Washington and George Washington Carver, and the methods he used as head of the dairy herd. While at Tuskegee, Owens recalls the marriage to his wife, Waddie L. Hill, a graduate of Clark University, and the successes of their three children. In 1908 his accomplishments at Tuskegee led Owens to becoming a faculty member at Virginia Normal and Industrial Institute (Virginia State University) where he distinguished himself as head of the agricultural program and a leader in vocational agriculture in the South. Owens recorded his life five years before his death in 1950. Ana Elnora Owens, daughter of George and Waddie Owens, donated the autobiography, photographs, and other documents, to the Richard L.D. and Marjorie J. Morse Department of Special Collections, Hale Library, in 1978.
Social World Sensing via Social Image Analysis from Social Media book cover

Social World Sensing via Social Image Analysis from Social Media

CC BY-NC-ND (Attribution NonCommercial NoDerivatives)   English

Author(s): Shalin Hai-Jew

Editor(s): Shalin Hai-Jew

Subject(s): Social media / social networking, Internet and digital media: arts and performance, Media, entertainment, information and communication industries

Publisher: New Prairie Press

Last updated: 05/01/2024

Social imagery, the visuals shared by users via various platforms and applications, may be analyzed to elicit something of massmind (and individual) thinking. This work involves the exploration of seven topics from various subject areas (global public health, environmentalism, human rights, political expression, and human predation) through social imagery and data from social media. The coding techniques involve manual coding, the integration of multiple social data streams, computational text analysis, data visualizations, and other combinations of approaches.