You limited your search to:

  Access Rights: Use restricted to UNT Community
  Partner: UNT Libraries
 Degree Level: Master's
 Collection: UNT Theses and Dissertations
Asserting Identity in Wagner's Shadow: The Case of Engelbert Humperdinck's  Königskinder (1897)

Asserting Identity in Wagner's Shadow: The Case of Engelbert Humperdinck's Königskinder (1897)

Access: Use of this item is restricted to the UNT Community.
Date: August 2004
Creator: Kinnett, Forest Randolph
Description: Engelbert Humperdinck (1854-1921), who was considered a Wagnerian due to to his past work in Bayreuth and the Wagnerian traits of his Hänsel und Gretel, seems to have believed that to define himself as a composer, he had to engage somehow with that designation, whether through orthodox Wagner imitation or an assertion of his independence from Wagner's musical legacy. The latter kind of engagement can be seen in Humperdinck's Königskinder (1897), in which he developed a new kind of declamatory notation within the context of melodrama, thus fulfilling Wagnerian ideals as well as progressing beyond them. The effectiveness of Humperdinck's effort is seen in the ensuing critical reception, in which the realities of being heard as a Wagnerian composer are clarified.
Contributing Partner: UNT Libraries
Assessing Optimal Sibling Training Conditions: An Empirical Approach.

Assessing Optimal Sibling Training Conditions: An Empirical Approach.

Access: Use of this item is restricted to the UNT Community.
Date: August 2005
Creator: Merker, Stephanie K.
Description: The purpose of the study was to investigate the effects of play materials on the interactions between a child with autism and her sibling. Three conditions were assessed: open choice, materials chosen by the child with autism, and materials chosen by the typically developing sibling. Within each activity, measures of social interactions were assessed. Results of the assessment showed that more interactions occurred with a material chosen by the child with autism. After sibling training (targeting specific teaching skills), social interactions remained highest in the condition with materials chosen by the child with autism. The results are discussed in terms of a material assessment to optimize sibling training conditions and the importance of sibling relationships.
Contributing Partner: UNT Libraries
Assessing the Potential Effects of Climate Variability on Reservoir Water Volume in North-Central Texas Using GIS and Models: A Case Study of Ray Roberts Lake.

Assessing the Potential Effects of Climate Variability on Reservoir Water Volume in North-Central Texas Using GIS and Models: A Case Study of Ray Roberts Lake.

Access: Use of this item is restricted to the UNT Community.
Date: December 2005
Creator: Osei-Adjei, Peter
Description: Assessing the impact of climate variability on water resources is one of the difficult tasks in planning the future growth of North-Central Texas. This study defined twelve extreme climate scenarios. Data from each scenario was input to a hydrological model (HEC-HMS) to calculate watershed runoff to Lake Ray Roberts. Model parameters are determined using Geographic Information System (GIS). The water balance was calculated for current and future water demand and resulting change in the volume and level of this reservoir. The results indicate certain climate scenarios decrease in volume. Thus, local governments should plan alternative water management strategies during droughts.
Contributing Partner: UNT Libraries
Automated Defense Against Worm Propagation.

Automated Defense Against Worm Propagation.

Access: Use of this item is restricted to the UNT Community.
Date: December 2005
Creator: Patwardhan, Sudeep
Description: Worms have caused significant destruction over the last few years. Network security elements such as firewalls, IDS, etc have been ineffective against worms. Some worms are so fast that a manual intervention is not possible. This brings in the need for a stronger security architecture which can automatically react to stop worm propagation. The method has to be signature independent so that it can stop new worms. In this thesis, an automated defense system (ADS) is developed to automate defense against worms and contain the worm to a level where manual intervention is possible. This is accomplished with a two level architecture with feedback at each level. The inner loop is based on control system theory and uses the properties of PID (proportional, integral and differential controller). The outer loop works at the network level and stops the worm to reach its spread saturation point. In our lab setup, we verified that with only inner loop active the worm was delayed, and with both loops active we were able to restrict the propagation to 10% of the targeted hosts. One concern for deployment of a worm containment mechanism was degradation of throughput for legitimate traffic. We found that with proper ...
Contributing Partner: UNT Libraries
Baeyer-Villiger Oxidation of 1,7- & 1,9-dibromopentacyclo[5.4.0.02,6.03,10.05,9]undecane-8,11-dione

Baeyer-Villiger Oxidation of 1,7- & 1,9-dibromopentacyclo[5.4.0.02,6.03,10.05,9]undecane-8,11-dione

Access: Use of this item is restricted to the UNT Community.
Date: May 2004
Creator: Akinola, Adeniyi O.
Description: Baeyer-Villiger oxidation of 1,9-dibromopentacyclo[5.4.0.02,6.03,10.05,9]undecane-8,11-dione (1,9-dibromo-PCU-8,11-dione) was performed by using an excess amount of m-chloroperbenzoic acid (3 equivalents) and resulted in the formation of the corresponding monolactone. The reaction would not proceed to the dilactone stage. The structure of the reaction product was established unequivocally via single crystal X-ray diffraction. Baeyer-Villiger oxidation of 1,9-dibromo-PCU-8,11-dione using ceric ammonium nitrate (CAN) was also performed and afforded a mixture of lactones. Only one of these lactones, which also contained an alkene functionality, could be isolated and characterized. 1,7-dibromo-PCU-8,11-dione was also reacted with CAN, yielding the mono-lactone, which has also been characterized.
Contributing Partner: UNT Libraries
Barriers Limiting Access to Hospice Care for Elderly African Americans in Amarillo, Texas

Barriers Limiting Access to Hospice Care for Elderly African Americans in Amarillo, Texas

Access: Use of this item is restricted to the UNT Community.
Date: August 2001
Creator: Anthony, Tomagene
Description: This study examines barriers limiting access to hospice care for elderly African Americans. Ethnic background plays a critical role in the development of attitudes, beliefs and expectations related to death and issues surrounding hospice care. The purpose of this study was to identify barriers that may limit access to hospice care for African Americans. A questionnaire was administered to 56 elderly African Americans in three religious settings and an African American senior citizens center. The questionnaire was designed to obtain information concerning African Americans' attitudes toward death and dying; religious beliefs; health beliefs; familiarity with hospice and prospective use of hospice. The results of the study indicate a number of barriers in access to hospice care for African Americans including: hospice knowledge barriers; education/outreach barriers; cultural knowledge barriers related to death/dying values; family/social support barriers; hospice organizational/provider barriers; health care organizational/provider barriers; and reimbursement barriers.
Contributing Partner: UNT Libraries
"The Barroom Girls" and Other Stories

"The Barroom Girls" and Other Stories

Access: Use of this item is restricted to the UNT Community.
Date: May 2006
Creator: Mortazavi, Sohale Andrus
Description: This creative thesis is comprised of five original short stories and a critical preface. The preface discusses the changing cultural, sociopolitical, and socioeconomic landscape of the modern American South and the effects-positive, negative, and neutral-these changes have had on the region's contemporary literature, including the short stories contained within.
Contributing Partner: UNT Libraries
Between the Waves: Truth-Telling, Feminism, and Silence in the Modernist Era Poetics of Laura Riding Jackson and Muriel Rukeyser

Between the Waves: Truth-Telling, Feminism, and Silence in the Modernist Era Poetics of Laura Riding Jackson and Muriel Rukeyser

Access: Use of this item is restricted to the UNT Community.
Date: December 2006
Creator: Cain, Christina
Description: This paper presents the lives and early feminist works of two modernist era poets, Laura Riding Jackson and Muriel Rukeyser. Despite differences of style, the two poets shared a common theme of essentialist feminism before its popularization by 1950s and 60s second wave feminists. The two poets also endured periods of poetic silence or self censorship which can be attributed to modernism, McCarthyism, and rising conservatism. Analysis of their poems helps to remedy their exclusion from the common canon.
Contributing Partner: UNT Libraries
Bioinspired and biocompatible coatings of poly(butylene adipate-co-terephthalate) and layer double hydroxide composites for corrosion resistance

Bioinspired and biocompatible coatings of poly(butylene adipate-co-terephthalate) and layer double hydroxide composites for corrosion resistance

Access: Use of this item is restricted to the UNT Community.
Date: May 2016
Creator: Rizvi, Syed Hussain
Description: Hierarchical arrangement of biological composites such as nacre and bone containing high filler (ceramic) content results in high strength and toughness of the natural material. In this study we mimic the design of layered bone microstructure and fabricate an optimal multifunctional bio-nanocomposite having strength, toughness and corrosion resistance. Poly (butylene adipate-co-terephthalate) (PBAT), a biodegradable polymer was used as a substrate material with the reinforcement of LDH (Layered double hydroxide) as a nanofiller in different concentrations to achieve enhancement in mechanical properties as well as processing related thermostability. Corrosion resistance was increased by mimicking a layered structured which incorporated a tortuous diffusion path.
Contributing Partner: UNT Libraries
Bird Bones and a Hatched Egg

Bird Bones and a Hatched Egg

Access: Use of this item is restricted to the UNT Community.
Date: December 2000
Creator: Skebe, Carolyn Alifair
Description: A fifty page manuscript of poetry and a critical introduction detailing the poet's aesthetics. Using the idea of the double-image and eroticism, the poet places her work in the category of the surreal. She describes the process of writing poetry born of fragmentary elements as a feminist emergence of agency. The manuscript is composed of four sections, each an element in the inevitable breakdown of a love relationship: meeting, love-making, birth of a child, death. Quotes from various authors of anthropological and fictional texts begin each section to reinforce thematic structure in a process of unveiling the agency of the narrator. The poems are organized as a series, beginning and ending with sequence poems.
Contributing Partner: UNT Libraries
Bounded Dynamic Source Routing in Mobile Ad Hoc Networks

Bounded Dynamic Source Routing in Mobile Ad Hoc Networks

Access: Use of this item is restricted to the UNT Community.
Date: August 2003
Creator: George, Glyco
Description: A mobile ad hoc network (MANET) is a collection of mobile platforms or nodes that come together to form a network capable of communicating with each other, without the help of a central controller. To avail the maximum potential of a MANET, it is of great importance to devise a routing scheme, which will optimize upon the performance of a MANET, given the high rate of random mobility of the nodes. In a MANET individual nodes perform the routing functions like route discovery, route maintenance and delivery of packets from one node to the other. Existing routing protocols flood the network with broadcasts of route discovery messages, while attempting to establish a route. This characteristic is instrumental in deteriorating the performance of a MANET, as resource overhead triggered by broadcasts is directly proportional to the size of the network. Bounded-dynamic source routing (B-DSR), is proposed to curb this multitude of superfluous broadcasts, thus enabling to reserve valuable resources like bandwidth and battery power. B-DSR establishes a bounded region in the network, only within which, transmissions of route discovery messages are processed and validated for establishing a route. All route discovery messages reaching outside of this bounded region are dropped, thus ...
Contributing Partner: UNT Libraries
The Break-up of the Confederate Trans-Mississippi Army, 1865

The Break-up of the Confederate Trans-Mississippi Army, 1865

Access: Use of this item is restricted to the UNT Community.
Date: May 2001
Creator: Clampitt, Brad R.
Description: Unlike other Confederate armies at the conclusion of the Civil War, General Edmund Kirby Smith's Trans-Mississippi Army disbanded, often without orders, rather than surrender formally. Despite entreaties from military and civilian leaders to fight on, for Confederate soldiers west of the Mississippi River, the surrender of armies led by Generals Robert E. Lee and Joseph E. Johnston ended the war. After a significant decline in morale and discipline throughout the spring of 1865, soldiers of the Confederate Trans-Mississippi Department chose to break-up and return home. As compensation for months of unpaid service, soldiers seized both public and private property. Civilians joined the soldiers to create disorder that swept many Texas communities until the arrival of Federal troops in late June.
Contributing Partner: UNT Libraries
Breaking Through: A Composition for Symphony Orchestra

Breaking Through: A Composition for Symphony Orchestra

Access: Use of this item is restricted to the UNT Community.
Date: August 2002
Creator: Dribus, John Alexander
Description: Breaking Through is a single-movement composition for symphony orchestra based on a fourteen-note melody. Every harmonic and melodic figure except the bass line is derived from this source melody. The structure of the work is based on a number of musical dichotomies that work on both local and large-scale levels. The local dichotomies contrast consonance with dissonance and ambiguity with clarity (in respect to texture and rhythm). The dichotomy of two-part form versus three-part form and the dichotomy of simplicity versus complexity operate on the large scale. The unity lended by the single source melody coupled with the contrasts furnished by the aforementioned dichotomies allow Breaking Through to be both coherent and interesting.
Contributing Partner: UNT Libraries
Burn and Sow: The Ethical Implications of Ecological Restoration

Burn and Sow: The Ethical Implications of Ecological Restoration

Access: Use of this item is restricted to the UNT Community.
Date: August 2005
Creator: Mauritz, Elizabeth
Description: Ecological restoration is quickly becoming a major approach to how humans interact with the natural world. Some view restoration as another land management technique on par with conservation and preservation. Others view it as a way to make reparations for our misdeeds and to reincorporate humans into the natural world. Ideas regarding restoration from key academics and restorationists are evaluated here. Their views have set the stage for the contemporary paradigm. Values that may be attributed to restoration and received from it are evaluated. I discuss my own reservations regarding potential problems with the product and practice of restoration. What is at stake regarding the involvement of people in restoration is examined, focusing on the different impacts volunteers and paid workers have on the value of the practice and outcome of the product.
Contributing Partner: UNT Libraries
A Case Study of Leftist Terrorism in Turkey

A Case Study of Leftist Terrorism in Turkey

Access: Use of this item is restricted to the UNT Community.
Date: August 2001
Creator: Yayla, Ahmet
Description: Change in government has characterized the development of most nations. Sometimes this change has been marked by continued evolution, in a peaceful attempt to move forward. Other times, change has been fraught with violent revolution and terrorism. This process has been the subject of much debate by political scientists and economic philosophers. Today, Turkey suffers from continued threats to its government through violent acts of terrorism conducted by various groups, expressing ideologies of leftist and rightist organizations, as well as ethnic and religious extremists. This thesis examines DHKP/C as the primary leftist revolutionary group effecting Turkey, exploring its historical background in Europe and the Middle East, as well as its philosophical link to Marxism. Further, this treatise discusses the implication of revolution and terrorism expressed by DHKP/C; and explores innovative and peaceful solutions, strategies, and techniques to be used by the police forces of Turkey in combating this group
Contributing Partner: UNT Libraries
A Catalog of Extinctions

A Catalog of Extinctions

Access: Use of this item is restricted to the UNT Community.
Date: December 2009
Creator: Casey, Edward Anthony
Description: The preface describes the construction of a book-length, interwoven sequence of poems. This type of sequence differs from other types of poetry collections in its use of an overarching narrative, repeated images, and recurring characters. Three interwoven sequences are used as examples of how to construct such a sequence.
Contributing Partner: UNT Libraries
Challenge the Silence

Challenge the Silence

Access: Use of this item is restricted to the UNT Community.
Date: August 2012
Creator: Peterson, Erica
Description: This collection of personal essays about incest, abuse, and depression explores the lasting effects of an invisible childhood. The essays follow the protagonist from the age of five to her early twenties. Her brother, at a young age, becomes sexually abusive of her and her sisters, and her parents fail to protect their daughters. The family is divided as the older girls strive to defend their little sisters, while their parents attempt to excuse their son. When her brother is finally sent away, the protagonist is left to salvage what remains of her relationships with her parents.
Contributing Partner: UNT Libraries
Challenges Encountered During Law Enforcement Investigations of Terrorist Use of Information Technology.

Challenges Encountered During Law Enforcement Investigations of Terrorist Use of Information Technology.

Access: Use of this item is restricted to the UNT Community.
Date: May 2005
Creator: Morgan, Deanne
Description: The late 20th and early 21st centuries have seen a phenomenal growth in society's use of information technology. Criminals, including terrorists and terrorist organizations, have also adopted information technologies. Information technologies are used to enhance the efficiency, productivity, and effectiveness of terrorist activities and offenses. Investigating terrorist use of information technologies creates a number of challenges for law enforcement officials. While some of the challenges are encountered during conventional criminal investigations, terrorist investigations also present unique challenges. Through content and typological analysis, this study examined open source information to identify, categorize and propose a model of these challenges. Four primary categories were identified: technology, methodology, legal, and administration and human resources challenges.
Contributing Partner: UNT Libraries
Changing Privacy Concerns in the Internet Era.

Changing Privacy Concerns in the Internet Era.

Access: Use of this item is restricted to the UNT Community.
Date: August 2002
Creator: Demir, Irfan
Description: Privacy has always been a respected value regardless of national borders, cultural differences, and time in every society throughout history. This study focuses on the unprecedented changes in the traditional forms of privacy and consequent concerns with regard to invasion of privacy along with the recent emergence and wide use of the Internet. Government intrusion into private domains through the Internet is examined as a major concern. Privacy invasions by Web marketers, hacker threats against privacy, and employer invasion of employee privacy at the workplace are discussed respectively. Then a set of possible solutions to solve the current problems and alleviate the concerns in this field is offered. Legal remedies that need to be performed by the government are presented as the initial solution. Then encryption is introduced as a strong technical method that may be helpful. Finally, a set of individual measures emphasized as complementary practical necessities. Nevertheless, this study indicates that technology will keep making further changes in the form and concerns of privacy that possibly may outdate these findings in the near future, however, privacy itself will always remain as a cherished social value as it has always been so far.
Contributing Partner: UNT Libraries
Characterization of Iron Oxide Deposits Formed at Comanche Peak Steam Electric Station

Characterization of Iron Oxide Deposits Formed at Comanche Peak Steam Electric Station

Access: Use of this item is restricted to the UNT Community.
Date: May 2003
Creator: Namduri, Haritha
Description: The presence of deposits leading to corrosion of the steam generator (SG) systems is a major contributor to operation and maintenance cost of pressurized water reactor (PWR) plants. Formation and transport of corrosion products formed due to the presence of impurities, metallic oxides and cations in the secondary side of the SG units result in formation of deposits. This research deals with the characterization of deposit samples collected from the two SG units (unit 1 and unit 2) at Comanche Peak Steam Electric Station (CPSES). X-ray diffraction (XRD), Fourier transform infrared spectrophotometry (FTIR), scanning electron microscopy (SEM), and energy dispersive spectroscopy (EDS) techniques have been used for studying the compositional and structural properties of iron oxides formed in the secondary side of unit 1 and unit 2. Magnetite (Fe3O4) was found to be predominant in samples from unit 1 and maghemite (g-Fe2O3) was found to be the dominant phase in case of unit 2. An attempt has been made to customize FTIR technique for analyzing different iron oxide phases present in the deposits of PWR-SG systems.
Contributing Partner: UNT Libraries
Characterization of  Moraxella bovis Aspartate Transcarbamoylase

Characterization of Moraxella bovis Aspartate Transcarbamoylase

Access: Use of this item is restricted to the UNT Community.
Date: December 2001
Creator: Hooshdaran, Sahar
Description: Aspartate transcarbamoylase (ATCase) catalyzes the first committed step in the pyrimidine biosynthetic pathway. Bacterial ATCases have been divided into three classes, class A, B, and C, based on their molecular weight, holoenzyme architecture, and enzyme kinetics. Moraxella bovis is a fastidious organism, the etiologic agent of infectious bovine keratoconjunctivitis (IBK). The M. bovis ATCase was purified and characterized for the first time. It is a class A enzyme with a molecular mass of 480 to 520 kDa. It has a pH optimum of 9.5 and is stable at high temperatures. The ATCase holoenzyme is inhibited by CTP > ATP > UTP. The Km for aspartate is 1.8 mM and the Vmax 1.04 µmol per min, where the Km for carbamoylphosphate is 1.05 mM and the Vmax 1.74 µmol per min.
Contributing Partner: UNT Libraries
Characterizaton of Triethoxyfluorosilane and Tetraethoxysilane Based Aerogels

Characterizaton of Triethoxyfluorosilane and Tetraethoxysilane Based Aerogels

Access: Use of this item is restricted to the UNT Community.
Date: December 2001
Creator: Roepsch, Jodi Ann
Description: Aerogels are highly porous, low dielectric constant (low k) materials being considered by the semiconductor industry as an interlayer dielectric. Low k materials are needed to overcome capacitance problems that limit device feature sizes. Precursors triethoxyfluorosilane (TEFS) and tetraethoxysilane (TEOS) were used to prepare bulk aerogels. Samples were prepared by sol-gel methods, and then carbon dioxide supercritically-dried. Effects of varying the water to precursor ratio were studied with respect to aerogel properties and microstructure. Methods of analysis for this study include FTIR-ATR, TEM, RBS, EDS, SEM, dielectric constant determination by impedance and surface area by gas adsorption. Si-F bonds were determined to be present in both acid- and base-catalyzed TEFS as well as HF-catalyzed TEOS. Fluorine promotes a fractal network microstructure as opposed to a particle-like microstructure. Surface area and dielectric constant were determined to increase slightly with increases in the water to precursor ratio.
Contributing Partner: UNT Libraries
Characterizing the Municipal Solid Waste Stream in Denton, Texas

Characterizing the Municipal Solid Waste Stream in Denton, Texas

Access: Use of this item is restricted to the UNT Community.
Date: August 2000
Creator: Brady, Patricia D.
Description: Forty-two commercially collected dumpsters from Denton’s Municipal Solid Waste Stream were emptied, sorted and weighed to characterize the material types and make preliminary recycling policy recommendations. The general composition of Denton’s solid waste stream was not significantly different from the composition of the nation’s solid waste stream. Fifty-eight percent of the observed waste stream was recyclable. Paper made up the largest portion of recyclable materials and the "grocery" source category had more paper than any of the other five categories. Based on these findings, an incrementally aggressive approach is recommended to reduce certain types of wastes observed in the waste stream. This would include a Pay-As-You-Throw Program followed by an Intermediate Processing Center that can be converted to a Materials Recovery Facility.
Contributing Partner: UNT Libraries
Chemotactic Response of Lumbricus terrestris Coelomocytes to Larval and Adult Stages of Rhabditis pellio

Chemotactic Response of Lumbricus terrestris Coelomocytes to Larval and Adult Stages of Rhabditis pellio

Access: Use of this item is restricted to the UNT Community.
Date: December 1999
Creator: Medrano, Jennifer Centurion
Description: Experiments were performed to assess the suitability of Rhabditis pellio, a nematode found in earthworms, as a challenge organism for use in development of a biomarker assay to determine the potential of chemicals to suppress the immunocompetence of the non-specific immune system. To accomplish this goal, information on the life cycle of R. pellio was determined; including effects of incubation time and temperature on growth rates; along with information on the immune response elicited in the earthworm, Lumbricus terrestris. Immune parameters measured were coelomocyte migration toward and attachment to R. pellio larvae and adults. Preliminary background information showed that R. pellio has potential as a challenge organism for development of a biomarker assay.
Contributing Partner: UNT Libraries