You limited your search to:

  Access Rights: Use restricted to UNT Community
  Partner: UNT Libraries
 Degree Level: Master's
 Collection: UNT Theses and Dissertations
Breaking Through: A Composition for Symphony Orchestra

Breaking Through: A Composition for Symphony Orchestra

Access: Use of this item is restricted to the UNT Community.
Date: August 2002
Creator: Dribus, John Alexander
Description: Breaking Through is a single-movement composition for symphony orchestra based on a fourteen-note melody. Every harmonic and melodic figure except the bass line is derived from this source melody. The structure of the work is based on a number of musical dichotomies that work on both local and large-scale levels. The local dichotomies contrast consonance with dissonance and ambiguity with clarity (in respect to texture and rhythm). The dichotomy of two-part form versus three-part form and the dichotomy of simplicity versus complexity operate on the large scale. The unity lended by the single source melody coupled with the contrasts furnished by the aforementioned dichotomies allow Breaking Through to be both coherent and interesting.
Contributing Partner: UNT Libraries
Brownian Movement and Quantum Computers

Brownian Movement and Quantum Computers

Access: Use of this item is restricted to the UNT Community.
Date: December 2004
Creator: Habel, Agnieszka
Description: This problem in lieu of thesis is a discussion of two topics: Brownian movement and quantum computers. Brownian movement is a physical phenomenon in which the particle velocity is constantly undergoing random fluctuations. Chapters 2, 3 and 4, describe Brownian motion from three different perspectives. The next four chapters are devoted to the subject of quantum computers, which are the signal of a new era of technology and science combined together. In the first chapter I present to a reader the two topics of my problem in lieu of thesis. In the second chapter I explain the idea of Brownian motion, its interpretation as a stochastic process and I find its distribution function. The next chapter illustrates the probabilistic picture of Brownian motion, where the statistical averages over trajectories are related to the probability distribution function. Chapter 4 shows how to derive the Langevin equation, introduced in chapter 1, using a Hamiltonian picture of a bath with infinite number of harmonic oscillators. The chapter 5 explains how the idea of quantum computers was developed and how step-by-step all the puzzles for the field of quantum computers were created. The next chapter, chapter 6, discus the basic quantum unit of information ...
Contributing Partner: UNT Libraries
Burn and Sow: The Ethical Implications of Ecological Restoration

Burn and Sow: The Ethical Implications of Ecological Restoration

Access: Use of this item is restricted to the UNT Community.
Date: August 2005
Creator: Mauritz, Elizabeth
Description: Ecological restoration is quickly becoming a major approach to how humans interact with the natural world. Some view restoration as another land management technique on par with conservation and preservation. Others view it as a way to make reparations for our misdeeds and to reincorporate humans into the natural world. Ideas regarding restoration from key academics and restorationists are evaluated here. Their views have set the stage for the contemporary paradigm. Values that may be attributed to restoration and received from it are evaluated. I discuss my own reservations regarding potential problems with the product and practice of restoration. What is at stake regarding the involvement of people in restoration is examined, focusing on the different impacts volunteers and paid workers have on the value of the practice and outcome of the product.
Contributing Partner: UNT Libraries
A Case Study of Leftist Terrorism in Turkey: DHKP/C

A Case Study of Leftist Terrorism in Turkey: DHKP/C

Access: Use of this item is restricted to the UNT Community.
Date: August 2001
Creator: Yayla, Ahmet
Description: Change in government has characterized the development of most nations. Sometimes this change has been marked by continued evolution, in a peaceful attempt to move forward. Other times, change has been fraught with violent revolution and terrorism. This process has been the subject of much debate by political scientists and economic philosophers. Today, Turkey suffers from continued threats to its government through violent acts of terrorism conducted by various groups, expressing ideologies of leftist and rightist organizations, as well as ethnic and religious extremists. This thesis examines DHKP/C as the primary leftist revolutionary group effecting Turkey, exploring its historical background in Europe and the Middle East, as well as its philosophical link to Marxism. Further, this treatise discusses the implication of revolution and terrorism expressed by DHKP/C; and explores innovative and peaceful solutions, strategies, and techniques to be used by the police forces of Turkey in combating this group
Contributing Partner: UNT Libraries
A Catalog of Extinctions

A Catalog of Extinctions

Access: Use of this item is restricted to the UNT Community.
Date: December 2009
Creator: Casey, Edward Anthony
Description: The preface describes the construction of a book-length, interwoven sequence of poems. This type of sequence differs from other types of poetry collections in its use of an overarching narrative, repeated images, and recurring characters. Three interwoven sequences are used as examples of how to construct such a sequence.
Contributing Partner: UNT Libraries
Challenge the Silence

Challenge the Silence

Access: Use of this item is restricted to the UNT Community.
Date: August 2012
Creator: Peterson, Erica
Description: This collection of personal essays about incest, abuse, and depression explores the lasting effects of an invisible childhood. The essays follow the protagonist from the age of five to her early twenties. Her brother, at a young age, becomes sexually abusive of her and her sisters, and her parents fail to protect their daughters. The family is divided as the older girls strive to defend their little sisters, while their parents attempt to excuse their son. When her brother is finally sent away, the protagonist is left to salvage what remains of her relationships with her parents.
Contributing Partner: UNT Libraries
Challenges encountered during law enforcement investigations of terrorist use of information technology.

Challenges encountered during law enforcement investigations of terrorist use of information technology.

Access: Use of this item is restricted to the UNT Community.
Date: May 2005
Creator: Morgan, Deanne
Description: The late 20th and early 21st centuries have seen a phenomenal growth in society's use of information technology. Criminals, including terrorists and terrorist organizations, have also adopted information technologies. Information technologies are used to enhance the efficiency, productivity, and effectiveness of terrorist activities and offenses. Investigating terrorist use of information technologies creates a number of challenges for law enforcement officials. While some of the challenges are encountered during conventional criminal investigations, terrorist investigations also present unique challenges. Through content and typological analysis, this study examined open source information to identify, categorize and propose a model of these challenges. Four primary categories were identified: technology, methodology, legal, and administration and human resources challenges.
Contributing Partner: UNT Libraries
Changing privacy concerns in the Internet era.

Changing privacy concerns in the Internet era.

Access: Use of this item is restricted to the UNT Community.
Date: August 2002
Creator: Demir, Irfan
Description: Privacy has always been a respected value regardless of national borders, cultural differences, and time in every society throughout history. This study focuses on the unprecedented changes in the traditional forms of privacy and consequent concerns with regard to invasion of privacy along with the recent emergence and wide use of the Internet. Government intrusion into private domains through the Internet is examined as a major concern. Privacy invasions by Web marketers, hacker threats against privacy, and employer invasion of employee privacy at the workplace are discussed respectively. Then a set of possible solutions to solve the current problems and alleviate the concerns in this field is offered. Legal remedies that need to be performed by the government are presented as the initial solution. Then encryption is introduced as a strong technical method that may be helpful. Finally, a set of individual measures emphasized as complementary practical necessities. Nevertheless, this study indicates that technology will keep making further changes in the form and concerns of privacy that possibly may outdate these findings in the near future, however, privacy itself will always remain as a cherished social value as it has always been so far.
Contributing Partner: UNT Libraries
Characterization of iron oxide deposits formed at Comanche Peak Steam Electric Station (CPSES)

Characterization of iron oxide deposits formed at Comanche Peak Steam Electric Station (CPSES)

Access: Use of this item is restricted to the UNT Community.
Date: May 2003
Creator: Namduri, Haritha
Description: The presence of deposits leading to corrosion of the steam generator (SG) systems is a major contributor to operation and maintenance cost of pressurized water reactor (PWR) plants. Formation and transport of corrosion products formed due to the presence of impurities, metallic oxides and cations in the secondary side of the SG units result in formation of deposits. This research deals with the characterization of deposit samples collected from the two SG units (unit 1 and unit 2) at Comanche Peak Steam Electric Station (CPSES). X-ray diffraction (XRD), Fourier transform infrared spectrophotometry (FTIR), scanning electron microscopy (SEM), and energy dispersive spectroscopy (EDS) techniques have been used for studying the compositional and structural properties of iron oxides formed in the secondary side of unit 1 and unit 2. Magnetite (Fe3O4) was found to be predominant in samples from unit 1 and maghemite (g-Fe2O3) was found to be the dominant phase in case of unit 2. An attempt has been made to customize FTIR technique for analyzing different iron oxide phases present in the deposits of PWR-SG systems.
Contributing Partner: UNT Libraries
Characterization of  Moraxella bovis Aspartate Transcarbamoylase

Characterization of Moraxella bovis Aspartate Transcarbamoylase

Access: Use of this item is restricted to the UNT Community.
Date: December 2001
Creator: Hooshdaran, Sahar
Description: Aspartate transcarbamoylase (ATCase) catalyzes the first committed step in the pyrimidine biosynthetic pathway. Bacterial ATCases have been divided into three classes, class A, B, and C, based on their molecular weight, holoenzyme architecture, and enzyme kinetics. Moraxella bovis is a fastidious organism, the etiologic agent of infectious bovine keratoconjunctivitis (IBK). The M. bovis ATCase was purified and characterized for the first time. It is a class A enzyme with a molecular mass of 480 to 520 kDa. It has a pH optimum of 9.5 and is stable at high temperatures. The ATCase holoenzyme is inhibited by CTP > ATP > UTP. The Km for aspartate is 1.8 mM and the Vmax 1.04 ┬Ámol per min, where the Km for carbamoylphosphate is 1.05 mM and the Vmax 1.74 ┬Ámol per min.
Contributing Partner: UNT Libraries