UNT Libraries - 369 Matching Results

Search Results

Note: All results matching your query require you to be a member of the UNT Community (you must be on campus or login with university credentials for access).

Art Criticism and the Gendering of Lee Bontecou's Art, ca. 1959 - 1964

Description: This thesis identifies and analyzes gendering in the art writing devoted to Lee Bontecou's metal and canvas sculptures made from the 1959 - 1964. Through a careful reading of reviews and articles written about Bontecou's constructions, this thesis reconstructs the context of the art world in the United States at mid-century and investigates how cultural expectations regarding gender directed the reception of Bontecou's art, beginning in 1959 and continuing through mid-1960s. Incorporating a description of the contemporaneous cultural context with description of the constructions and an analysis of examples of primary writing, the thesis chronologically follows the evolution of a tendency in art writing to associate gender-specific motivation and interpretation to one recurring feature of Bontecou's works.
Date: December 2005
Creator: Estrada-Berg, Victoria

Asserting Identity in Wagner's Shadow: The Case of Engelbert Humperdinck's Königskinder (1897)

Description: Engelbert Humperdinck (1854-1921), who was considered a Wagnerian due to to his past work in Bayreuth and the Wagnerian traits of his Hänsel und Gretel, seems to have believed that to define himself as a composer, he had to engage somehow with that designation, whether through orthodox Wagner imitation or an assertion of his independence from Wagner's musical legacy. The latter kind of engagement can be seen in Humperdinck's Königskinder (1897), in which he developed a new kind of declamatory notation within the context of melodrama, thus fulfilling Wagnerian ideals as well as progressing beyond them. The effectiveness of Humperdinck's effort is seen in the ensuing critical reception, in which the realities of being heard as a Wagnerian composer are clarified.
Date: August 2004
Creator: Kinnett, Forest Randolph

Assessing Optimal Sibling Training Conditions: An Empirical Approach.

Description: The purpose of the study was to investigate the effects of play materials on the interactions between a child with autism and her sibling. Three conditions were assessed: open choice, materials chosen by the child with autism, and materials chosen by the typically developing sibling. Within each activity, measures of social interactions were assessed. Results of the assessment showed that more interactions occurred with a material chosen by the child with autism. After sibling training (targeting specific teaching skills), social interactions remained highest in the condition with materials chosen by the child with autism. The results are discussed in terms of a material assessment to optimize sibling training conditions and the importance of sibling relationships.
Date: August 2005
Creator: Merker, Stephanie K.

Assessing the Potential Effects of Climate Variability on Reservoir Water Volume in North-Central Texas Using GIS and Models: A Case Study of Ray Roberts Lake.

Description: Assessing the impact of climate variability on water resources is one of the difficult tasks in planning the future growth of North-Central Texas. This study defined twelve extreme climate scenarios. Data from each scenario was input to a hydrological model (HEC-HMS) to calculate watershed runoff to Lake Ray Roberts. Model parameters are determined using Geographic Information System (GIS). The water balance was calculated for current and future water demand and resulting change in the volume and level of this reservoir. The results indicate certain climate scenarios decrease in volume. Thus, local governments should plan alternative water management strategies during droughts.
Date: December 2005
Creator: Osei-Adjei, Peter

Automated Defense Against Worm Propagation.

Description: Worms have caused significant destruction over the last few years. Network security elements such as firewalls, IDS, etc have been ineffective against worms. Some worms are so fast that a manual intervention is not possible. This brings in the need for a stronger security architecture which can automatically react to stop worm propagation. The method has to be signature independent so that it can stop new worms. In this thesis, an automated defense system (ADS) is developed to automate defense against worms and contain the worm to a level where manual intervention is possible. This is accomplished with a two level architecture with feedback at each level. The inner loop is based on control system theory and uses the properties of PID (proportional, integral and differential controller). The outer loop works at the network level and stops the worm to reach its spread saturation point. In our lab setup, we verified that with only inner loop active the worm was delayed, and with both loops active we were able to restrict the propagation to 10% of the targeted hosts. One concern for deployment of a worm containment mechanism was degradation of throughput for legitimate traffic. We found that with proper intelligent algorithm we can minimize the degradation to an acceptable level.
Date: December 2005
Creator: Patwardhan, Sudeep

Baeyer-Villiger Oxidation of 1,7- & 1,9-dibromopentacyclo[5.4.0.02,6.03,10.05,9]undecane-8,11-dione

Description: Baeyer-Villiger oxidation of 1,9-dibromopentacyclo[5.4.0.02,6.03,10.05,9]undecane-8,11-dione (1,9-dibromo-PCU-8,11-dione) was performed by using an excess amount of m-chloroperbenzoic acid (3 equivalents) and resulted in the formation of the corresponding monolactone. The reaction would not proceed to the dilactone stage. The structure of the reaction product was established unequivocally via single crystal X-ray diffraction. Baeyer-Villiger oxidation of 1,9-dibromo-PCU-8,11-dione using ceric ammonium nitrate (CAN) was also performed and afforded a mixture of lactones. Only one of these lactones, which also contained an alkene functionality, could be isolated and characterized. 1,7-dibromo-PCU-8,11-dione was also reacted with CAN, yielding the mono-lactone, which has also been characterized.
Date: May 2004
Creator: Akinola, Adeniyi O.

Barriers Limiting Access to Hospice Care for Elderly African Americans in Amarillo, Texas

Description: This study examines barriers limiting access to hospice care for elderly African Americans. Ethnic background plays a critical role in the development of attitudes, beliefs and expectations related to death and issues surrounding hospice care. The purpose of this study was to identify barriers that may limit access to hospice care for African Americans. A questionnaire was administered to 56 elderly African Americans in three religious settings and an African American senior citizens center. The questionnaire was designed to obtain information concerning African Americans' attitudes toward death and dying; religious beliefs; health beliefs; familiarity with hospice and prospective use of hospice. The results of the study indicate a number of barriers in access to hospice care for African Americans including: hospice knowledge barriers; education/outreach barriers; cultural knowledge barriers related to death/dying values; family/social support barriers; hospice organizational/provider barriers; health care organizational/provider barriers; and reimbursement barriers.
Date: August 2001
Creator: Anthony, Tomagene

"The Barroom Girls" and Other Stories

Description: This creative thesis is comprised of five original short stories and a critical preface. The preface discusses the changing cultural, sociopolitical, and socioeconomic landscape of the modern American South and the effects-positive, negative, and neutral-these changes have had on the region's contemporary literature, including the short stories contained within.
Date: May 2006
Creator: Mortazavi, Sohale Andrus

Between the Waves: Truth-Telling, Feminism, and Silence in the Modernist Era Poetics of Laura Riding Jackson and Muriel Rukeyser

Description: This paper presents the lives and early feminist works of two modernist era poets, Laura Riding Jackson and Muriel Rukeyser. Despite differences of style, the two poets shared a common theme of essentialist feminism before its popularization by 1950s and 60s second wave feminists. The two poets also endured periods of poetic silence or self censorship which can be attributed to modernism, McCarthyism, and rising conservatism. Analysis of their poems helps to remedy their exclusion from the common canon.
Date: December 2006
Creator: Cain, Christina

Bioinspired and biocompatible coatings of poly(butylene adipate-co-terephthalate) and layer double hydroxide composites for corrosion resistance

Description: Hierarchical arrangement of biological composites such as nacre and bone containing high filler (ceramic) content results in high strength and toughness of the natural material. In this study we mimic the design of layered bone microstructure and fabricate an optimal multifunctional bio-nanocomposite having strength, toughness and corrosion resistance. Poly (butylene adipate-co-terephthalate) (PBAT), a biodegradable polymer was used as a substrate material with the reinforcement of LDH (Layered double hydroxide) as a nanofiller in different concentrations to achieve enhancement in mechanical properties as well as processing related thermostability. Corrosion resistance was increased by mimicking a layered structured which incorporated a tortuous diffusion path.
Date: May 2016
Creator: Rizvi, Syed Hussain

Bird Bones and a Hatched Egg

Description: A fifty page manuscript of poetry and a critical introduction detailing the poet's aesthetics. Using the idea of the double-image and eroticism, the poet places her work in the category of the surreal. She describes the process of writing poetry born of fragmentary elements as a feminist emergence of agency. The manuscript is composed of four sections, each an element in the inevitable breakdown of a love relationship: meeting, love-making, birth of a child, death. Quotes from various authors of anthropological and fictional texts begin each section to reinforce thematic structure in a process of unveiling the agency of the narrator. The poems are organized as a series, beginning and ending with sequence poems.
Date: December 2000
Creator: Skebe, Carolyn Alifair

Bounded Dynamic Source Routing in Mobile Ad Hoc Networks

Description: A mobile ad hoc network (MANET) is a collection of mobile platforms or nodes that come together to form a network capable of communicating with each other, without the help of a central controller. To avail the maximum potential of a MANET, it is of great importance to devise a routing scheme, which will optimize upon the performance of a MANET, given the high rate of random mobility of the nodes. In a MANET individual nodes perform the routing functions like route discovery, route maintenance and delivery of packets from one node to the other. Existing routing protocols flood the network with broadcasts of route discovery messages, while attempting to establish a route. This characteristic is instrumental in deteriorating the performance of a MANET, as resource overhead triggered by broadcasts is directly proportional to the size of the network. Bounded-dynamic source routing (B-DSR), is proposed to curb this multitude of superfluous broadcasts, thus enabling to reserve valuable resources like bandwidth and battery power. B-DSR establishes a bounded region in the network, only within which, transmissions of route discovery messages are processed and validated for establishing a route. All route discovery messages reaching outside of this bounded region are dropped, thus preventing the network from being flooded. In addition B-DSR also guarantees loop-free routing and is robust for a rapid recovery when routes in the network change.
Date: August 2003
Creator: George, Glyco

Brain Computer Interface (BCI) Applications: Privacy Threats and Countermeasures

Description: In recent years, brain computer interfaces (BCIs) have gained popularity in non-medical domains such as the gaming, entertainment, personal health, and marketing industries. A growing number of companies offer various inexpensive consumer grade BCIs and some of these companies have recently introduced the concept of BCI "App stores" in order to facilitate the expansion of BCI applications and provide software development kits (SDKs) for other developers to create new applications for their devices. The BCI applications access to users' unique brainwave signals, which consequently allows them to make inferences about users' thoughts and mental processes. Since there are no specific standards that govern the development of BCI applications, its users are at the risk of privacy breaches. In this work, we perform first comprehensive analysis of BCI App stores including software development kits (SDKs), application programming interfaces (APIs), and BCI applications w.r.t privacy issues. The goal is to understand the way brainwave signals are handled by BCI applications and what threats to the privacy of users exist. Our findings show that most applications have unrestricted access to users' brainwave signals and can easily extract private information about their users without them even noticing. We discuss potential privacy threats posed by current practices used in BCI App stores and then describe some countermeasures that could be used to mitigate the privacy threats. Also, develop a prototype which gives the BCI app users a choice to restrict their brain signal dynamically.
Date: May 2017
Creator: Bhalotiya, Anuj Arun

The Break-up of the Confederate Trans-Mississippi Army, 1865

Description: Unlike other Confederate armies at the conclusion of the Civil War, General Edmund Kirby Smith's Trans-Mississippi Army disbanded, often without orders, rather than surrender formally. Despite entreaties from military and civilian leaders to fight on, for Confederate soldiers west of the Mississippi River, the surrender of armies led by Generals Robert E. Lee and Joseph E. Johnston ended the war. After a significant decline in morale and discipline throughout the spring of 1865, soldiers of the Confederate Trans-Mississippi Department chose to break-up and return home. As compensation for months of unpaid service, soldiers seized both public and private property. Civilians joined the soldiers to create disorder that swept many Texas communities until the arrival of Federal troops in late June.
Date: May 2001
Creator: Clampitt, Brad R.

Breaking Through: A Composition for Symphony Orchestra

Description: Breaking Through is a single-movement composition for symphony orchestra based on a fourteen-note melody. Every harmonic and melodic figure except the bass line is derived from this source melody. The structure of the work is based on a number of musical dichotomies that work on both local and large-scale levels. The local dichotomies contrast consonance with dissonance and ambiguity with clarity (in respect to texture and rhythm). The dichotomy of two-part form versus three-part form and the dichotomy of simplicity versus complexity operate on the large scale. The unity lended by the single source melody coupled with the contrasts furnished by the aforementioned dichotomies allow Breaking Through to be both coherent and interesting.
Date: August 2002
Creator: Dribus, John Alexander

Burn and Sow: The Ethical Implications of Ecological Restoration

Description: Ecological restoration is quickly becoming a major approach to how humans interact with the natural world. Some view restoration as another land management technique on par with conservation and preservation. Others view it as a way to make reparations for our misdeeds and to reincorporate humans into the natural world. Ideas regarding restoration from key academics and restorationists are evaluated here. Their views have set the stage for the contemporary paradigm. Values that may be attributed to restoration and received from it are evaluated. I discuss my own reservations regarding potential problems with the product and practice of restoration. What is at stake regarding the involvement of people in restoration is examined, focusing on the different impacts volunteers and paid workers have on the value of the practice and outcome of the product.
Date: August 2005
Creator: Mauritz, Elizabeth

Can Observing Behavior Predict Performance in Conditional Discriminations?

Description: Prompts are implemented often in training procedures, to include conditional discriminations, and this can lead to prompt dependency. The current study extends a prior study that suggested that the effectiveness of supplementary visual stimuli displaying the sample and comparison was dependent on the timing in relation to the selection task, presented as a prompt or feedback, in a match-to-sample procedure. The current research examines if the differences in that effectiveness were due to differences in observing behavior in those two conditions. Measures of observing behavior were determined by making access to the individual visual stimuli contingent on clicking on the visual stimulus and keeping the cursor located on the stimulus. Participants viewed the sample comparison much less than the comparison stimulus in both the prompt and feedback conditions. Latency to select the comparison stimulus was much shorter for the prompt condition suggesting that the participants might have interacted differently with the selection task in the two conditions.
Date: December 2016
Creator: Marchini, Kevin Julian

Case Studies to Learn Human Mapping Strategies in a Variety of Coarse-Grained Reconfigurable Architectures

Description: Computer hardware and algorithm design have seen significant progress over the years. It is also seen that there are several domains in which humans are more efficient than computers. For example in image recognition, image tagging, natural language understanding and processing, humans often find complicated algorithms quite easy to grasp. This thesis presents the different case studies to learn human mapping strategy to solve the mapping problem in the area of coarse-grained reconfigurable architectures (CGRAs). To achieve optimum level performance and consume less energy in CGRAs, place and route problem has always been a major concern. Making use of human characteristics can be helpful in problems as such, through pattern recognition and experience. Therefore to conduct the case studies a computer mapping game called UNTANGLED was analyzed as a medium to convey insights of human mapping strategies in a variety of architectures. The purpose of this research was to learn from humans so that we can come up with better algorithms to outperform the existing algorithms. We observed how human strategies vary as we present them with different architectures, different architectures with constraints, different visualization as well as how the quality of solution changes with experience. In this work all the case studies obtained from exploiting human strategies provide useful feedback that can improve upon existing algorithms. These insights can be adapted to find the best architectural solution for a particular domain and for future research directions for mapping onto mesh-and- stripe based CGRAs.
Date: May 2017
Creator: Malla, Tika Kumari

A Case Study of Leftist Terrorism in Turkey

Description: Change in government has characterized the development of most nations. Sometimes this change has been marked by continued evolution, in a peaceful attempt to move forward. Other times, change has been fraught with violent revolution and terrorism. This process has been the subject of much debate by political scientists and economic philosophers. Today, Turkey suffers from continued threats to its government through violent acts of terrorism conducted by various groups, expressing ideologies of leftist and rightist organizations, as well as ethnic and religious extremists. This thesis examines DHKP/C as the primary leftist revolutionary group effecting Turkey, exploring its historical background in Europe and the Middle East, as well as its philosophical link to Marxism. Further, this treatise discusses the implication of revolution and terrorism expressed by DHKP/C; and explores innovative and peaceful solutions, strategies, and techniques to be used by the police forces of Turkey in combating this group
Date: August 2001
Creator: Yayla, Ahmet

The Castle/Nikki Heat Phenomenon: A Detailed Examination of Female Representation in Entertainment Media

Description: As entertainment reflects a culture's ideology, it is important for researchers to study its messages and subsequently its potential meanings. Entertainment has the power to inform and persuade, creating models for behavior with which the public interacts. The entertainment texts for the purpose of this study are the Castle television series and the Nikki Heat novels. Together, they create a unique multi-layer fictional world. By using postmodern, feminist, communication, and entertainment theories, the results of this study provide a tightly focused lens which views a narrow aspect of entertainment media. Each text was thoroughly examined using textual analysis, Feminist Poststructuralist Discourse Analysis, and conversation analysis. Contrary to expectations, the results indicated that the Castle and Nikki Heat texts support hegemonic ideology, particularly through the use of exaggerated stereotypes, strict gender roles, imagery, and narrative choices that help perpetuate rape culture. The discussion outlines how these results can be interpreted through the dominant messages presented in the texts. This research is intended to serve as a foundation for future research regarding entertainment media.
Date: December 2016
Creator: Skinner, Katharine Virginia

Catalytic Properties and Mechanical Behavior of Metallic Glass Powders

Description: Lack of crystalline order and microstructural features such as grain/grain-boundary in metallic glasses results in a suite of remarkable attributes including very high strength, close to theoretical elasticity, high corrosion and wear resistance, and soft magnetic properties. By altering the morphology and tuning of composition, MGs may be transformed into high-performance catalytic materials. In this study, the catalytic properties of metallic glass powders were demonstrated in dissociating toxic organic chemicals such as AZO dye. BMG powders showed superior performance compared to state of the art crystalline iron because of their high catalytic activity, durability, and reusability. To enhance the catalytic properties, high energy mechanical milling was performed to increase the surface area and defect density. Iron-based bulk metallic glass (BMG) of composition Fe48Cr15Mo14Y2C15B6 was used because of its low cost and ability to make large surface area by high energy ball milling. AZO dye was degraded in less than 20 minutes for the 9 hours milled Fe-BMG. However, subsequent increase in ball milling time resulted in devitrification and loss of catalytic activity as measured using UV-Visible spectroscopy. Aluminum-based bulk metallic glass (Al-BMG) powder of composition Al82Fe3Ni8Y7 was synthesized by arc-melting the constituent elements followed by gas-atomization. The particle size and morphology were similar to Fe-BMG with a fully amorphous structure. A small percentage of transition metal constituents (Fe and Ni) in a mostly aluminum alloy showed high catalytic activity, with no toxic by-products and no change in surface characteristics. Al-alloy particles, being light-weight, were easily dispersed in aqueous medium and accelerated the redox reactions. The mechanism of dye dissociation was studied using Raman and Infrared (IR) spectroscopy. Breaking of -C-H- and - C-N- bonds of AZO dye was found to be the primary mechanism. Mechanical behavior of individual BMG particles was evaluated by in situ pico-indentation in a scanning electron ...
Date: May 2017
Creator: Garrison, Seth Thomas

Challenge the Silence

Description: This collection of personal essays about incest, abuse, and depression explores the lasting effects of an invisible childhood. The essays follow the protagonist from the age of five to her early twenties. Her brother, at a young age, becomes sexually abusive of her and her sisters, and her parents fail to protect their daughters. The family is divided as the older girls strive to defend their little sisters, while their parents attempt to excuse their son. When her brother is finally sent away, the protagonist is left to salvage what remains of her relationships with her parents.
Date: August 2012
Creator: Peterson, Erica

Challenges Encountered During Law Enforcement Investigations of Terrorist Use of Information Technology.

Description: The late 20th and early 21st centuries have seen a phenomenal growth in society's use of information technology. Criminals, including terrorists and terrorist organizations, have also adopted information technologies. Information technologies are used to enhance the efficiency, productivity, and effectiveness of terrorist activities and offenses. Investigating terrorist use of information technologies creates a number of challenges for law enforcement officials. While some of the challenges are encountered during conventional criminal investigations, terrorist investigations also present unique challenges. Through content and typological analysis, this study examined open source information to identify, categorize and propose a model of these challenges. Four primary categories were identified: technology, methodology, legal, and administration and human resources challenges.
Date: May 2005
Creator: Morgan, Deanne

Changing Privacy Concerns in the Internet Era.

Description: Privacy has always been a respected value regardless of national borders, cultural differences, and time in every society throughout history. This study focuses on the unprecedented changes in the traditional forms of privacy and consequent concerns with regard to invasion of privacy along with the recent emergence and wide use of the Internet. Government intrusion into private domains through the Internet is examined as a major concern. Privacy invasions by Web marketers, hacker threats against privacy, and employer invasion of employee privacy at the workplace are discussed respectively. Then a set of possible solutions to solve the current problems and alleviate the concerns in this field is offered. Legal remedies that need to be performed by the government are presented as the initial solution. Then encryption is introduced as a strong technical method that may be helpful. Finally, a set of individual measures emphasized as complementary practical necessities. Nevertheless, this study indicates that technology will keep making further changes in the form and concerns of privacy that possibly may outdate these findings in the near future, however, privacy itself will always remain as a cherished social value as it has always been so far.
Date: August 2002
Creator: Demir, Irfan