You limited your search to:

  Partner: UNT Libraries
Second-Order Conditional Control of Members of an Equivalence Class

Second-Order Conditional Control of Members of an Equivalence Class

Date: August 1997
Creator: Cammilleri, Anthony Peter
Description: The conditional control of equivalence has received much attention in the analysis of verbal behavior. While previous research identified conditional control of relational responding and conditional control of equivalence class formation, this study investigated the possibility of conditional control of members of an equivalence class. Following baseline conditional discrimination training and equivalence testing, subjects were taught to select a particular member in the presence of a Green background screen and another member in the presence of a Red background screen.
Contributing Partner: UNT Libraries
The Second Vatican Council and American Catholic theological research: A bibliometric analysis of Theological Studies: 1940-1995

The Second Vatican Council and American Catholic theological research: A bibliometric analysis of Theological Studies: 1940-1995

Date: August 2000
Creator: Phelps, Helen Stegall
Description: A descriptive analysis was given of the characteristics of the authors and citations of the articles in the journal Theological Studies from 1940-1995. Data was gathered on the institutional affiliation, geographic location, occupation, and gender and personal characteristics of the author. The citation characteristics were examined for the cited authors, date and age of the citations, format, language, place of publication, and journal titles. These characteristics were compared to the time-period before and after the Second Vatican Council in order to detect any changes that might have occurred in the characteristics after certain recommendations by the council were made to theologians. Subject dispersion of the literature was also analyzed. Lotka's Law of author productivity and Bradford's Law of title dispersion were also performed for this literature. The profile of the characteristics of the authors showed that the articles published by women and laypersons has increased since the recommendations of the council. The data had a good fit to Lotka's Law for the pre-Vatican II time period but not for the period after Vatican II. The data was a good fit to Bradford's Law for the predicted number of journals in the nucleus and Zone 2, but the observed number of ...
Contributing Partner: UNT Libraries
Secondary Economic Education in North Texas

Secondary Economic Education in North Texas

Date: May 1964
Creator: Perry, William A.
Description: There has been a great deal of discussion about the adequacy or inadequacy of economic education and the amount of economic illiteracy in the United States.
Contributing Partner: UNT Libraries
Secondary Teachers’ Concerns about Response to Intervention: Using the Concerns-Based Adoption Model

Secondary Teachers’ Concerns about Response to Intervention: Using the Concerns-Based Adoption Model

Date: May 2013
Creator: Isbell, Laura J.
Description: This case study addressed the problem of implementing response to intervention (RTI) in general secondary education. To investigate this problem, one north Texas school's RTI implementation was examined using the theoretical framework of the concerns-based adoption model (CBAM) and defining RTI as the innovation. RTI-related practices were studied for 10 secondary teachers, two from each core subject (i.e., mathematics, English language arts, science, and social studies) and the fine arts who had been implementing RTI for several years. Data regarding participants' stages of concern about and levels of use of RTI were collected across three time intervals using the three diagnostic instruments of CBAM (i.e., Stages of Concern Questionnaire, Levels of Use interviews, and Innovation Configuration Checklist matrix), behavioral observations during instruction and RTI meetings, and structured exit interviews of participants. Overall, findings indicated that the secondary teachers were at similar stages of concern and levels of use of RTI. Teachers' RTI concerns scores remained highest in the Self phase and lowest in the Impact phase of concern at all three intervals of data collection. As levels of RTI use increased, observed RTI use increased; however, teachers' RTI levels of use scores remained in the early levels of RTI implementation ...
Contributing Partner: UNT Libraries
Secondary traumatic stress disorder in the therapists from the Oklahoma City bombing

Secondary traumatic stress disorder in the therapists from the Oklahoma City bombing

Access: Use of this item is restricted to the UNT Community.
Date: May 1999
Creator: Landry, Lisa Pinkenburg
Description: Little empirical research has been done to examine the effects that working with traumatized individuals has had on their therapists. It is known that mental health professionals often do suffer ill effects, especially symptoms of secondary traumatic stress disorder. The present investigation tested predictors of secondary traumatic stress disorder in the therapists who provided services for the Oklahoma City bombing. Predictors were therapist social network involvement, years of counseling experience, and amount of self-reported empathy experienced from others. Indicators of secondary traumatic stress were the Frederick Reaction Index-A, the Compassion Fatigue Self-test for Helpers, and the SCL-90R. Hypotheses were tested using a series of hierarchical multiple regressions. Results demonstrated no significance for years of experience or social network, but perceived empathy accounted for 11% of the variance on the SCL-90 and the Compassion Fatigue Self-test for Psychotherapists with social network and years of experience controlled.
Contributing Partner: UNT Libraries
The Secret Art of Science: An Aural-Based Analysis of Jonty Harrison's Acousmatic Work "Pair/Impair"

The Secret Art of Science: An Aural-Based Analysis of Jonty Harrison's Acousmatic Work "Pair/Impair"

Date: August 2004
Creator: Vega, Henry
Description: This paper observes the problems that impede meaningful analysis of form and structure in modern music, specifically electronic music. The premise of this research is to present methods, tools and practice for analyzing music whose visual interpretation, if any, do not represent the aural result of the composition. The means for suggesting a method are derived from documented observations in aural psychology, as well as composers' writings about musical perception. The result is an analytic model that focuses on the aural experience rather than the composers' compositional strategies which do not always agree with the resultant composition. The results from the analysis of music by Parmegiani, Harvey, Vega and Harrison help prove the general applicability of this research.
Contributing Partner: UNT Libraries
Secret Key Agreement without Public-Key Cryptography

Secret Key Agreement without Public-Key Cryptography

Access: Use of this item is restricted to the UNT Community.
Date: August 2003
Creator: Surapaneni, Smitha
Description: Secure communication is the primary challenge in today's information network. In this project an efficient secret key agreement protocol is described and analyzed along with the other existing protocols. We focus primarily on Leighton and Micali's secret-key agreement without the use of public-key encryption techniques. The Leighton-Micali protocol is extremely efficient when implemented in software and has significant advantages over existing systems like Kerberos. In this method the secret keys are agreed upon using a trusted third party known as the trusted agent. The trusted agent generates the keys and writes them to a public directory before it goes offline. The communicating entities can retrieve the keys either from the online trusted agent or from the public directory service and agree upon a symmetric-key without any public-key procedures. The principal advantage of this method is that the user verifies the authenticity of the trusted agent before using the keys generated by it. The Leighton-Micali scheme is not vulnerable to the present day attacks like fabrication, modification or denial of service etc. The Leighton-Micali protocol can be employed in real-time systems like smart cards. In addition to the security properties and the simplicity of the protocol, our experiments show that in ...
Contributing Partner: UNT Libraries
Secret Schemes: Frequently There Must Be a Beverage

Secret Schemes: Frequently There Must Be a Beverage

Date: May 1994
Creator: Phillips, Laura Rachel
Description: Secret Schemes is a collection of four short stories and three chapters of a novel; all the stories are humorous and deal with young women and their struggles in romantic relationships.
Contributing Partner: UNT Libraries
Secretarial and Stenographic Duties and Qualifications in  Department Stores in Dallas and Fort Worth

Secretarial and Stenographic Duties and Qualifications in Department Stores in Dallas and Fort Worth

Date: 1941
Creator: Landes, J. D.
Description: This survey presents views of department store officials on what they expect from their employees in an effort to improve the training of stenographers and secretaries.
Contributing Partner: UNT Libraries
Securing Maximum Educational Advantages by the Use of Cooperative Criteria

Securing Maximum Educational Advantages by the Use of Cooperative Criteria

Date: August 1939
Creator: Ramsey, Cecil Bion
Description: This study is an examination of the Alvarado, Texas middle school. Advantages afforded by the school building, family income level, and cooperative standards helped indicate future success.
Contributing Partner: UNT Libraries