UNT Libraries - Browse

ABOUT BROWSE FEED
Note: All results matching your query require you to be a member of the UNT Community (you must be on campus or login with university credentials for access).

Bird Bones and a Hatched Egg

Description: A fifty page manuscript of poetry and a critical introduction detailing the poet's aesthetics. Using the idea of the double-image and eroticism, the poet places her work in the category of the surreal. She describes the process of writing poetry born of fragmentary elements as a feminist emergence of agency. The manuscript is composed of four sections, each an element in the inevitable breakdown of a love relationship: meeting, love-making, birth of a child, death. Quotes from various authors of anthropological and fictional texts begin each section to reinforce thematic structure in a process of unveiling the agency of the narrator. The poems are organized as a series, beginning and ending with sequence poems.
Date: December 2000
Creator: Skebe, Carolyn Alifair

Bounded Dynamic Source Routing in Mobile Ad Hoc Networks

Description: A mobile ad hoc network (MANET) is a collection of mobile platforms or nodes that come together to form a network capable of communicating with each other, without the help of a central controller. To avail the maximum potential of a MANET, it is of great importance to devise a routing scheme, which will optimize upon the performance of a MANET, given the high rate of random mobility of the nodes. In a MANET individual nodes perform the routing functions like route discovery, route maintenance and delivery of packets from one node to the other. Existing routing protocols flood the network with broadcasts of route discovery messages, while attempting to establish a route. This characteristic is instrumental in deteriorating the performance of a MANET, as resource overhead triggered by broadcasts is directly proportional to the size of the network. Bounded-dynamic source routing (B-DSR), is proposed to curb this multitude of superfluous broadcasts, thus enabling to reserve valuable resources like bandwidth and battery power. B-DSR establishes a bounded region in the network, only within which, transmissions of route discovery messages are processed and validated for establishing a route. All route discovery messages reaching outside of this bounded region are dropped, thus preventing the network from being flooded. In addition B-DSR also guarantees loop-free routing and is robust for a rapid recovery when routes in the network change.
Date: August 2003
Creator: George, Glyco

The Break-up of the Confederate Trans-Mississippi Army, 1865

Description: Unlike other Confederate armies at the conclusion of the Civil War, General Edmund Kirby Smith's Trans-Mississippi Army disbanded, often without orders, rather than surrender formally. Despite entreaties from military and civilian leaders to fight on, for Confederate soldiers west of the Mississippi River, the surrender of armies led by Generals Robert E. Lee and Joseph E. Johnston ended the war. After a significant decline in morale and discipline throughout the spring of 1865, soldiers of the Confederate Trans-Mississippi Department chose to break-up and return home. As compensation for months of unpaid service, soldiers seized both public and private property. Civilians joined the soldiers to create disorder that swept many Texas communities until the arrival of Federal troops in late June.
Date: May 2001
Creator: Clampitt, Brad R.

Breaking Through: A Composition for Symphony Orchestra

Description: Breaking Through is a single-movement composition for symphony orchestra based on a fourteen-note melody. Every harmonic and melodic figure except the bass line is derived from this source melody. The structure of the work is based on a number of musical dichotomies that work on both local and large-scale levels. The local dichotomies contrast consonance with dissonance and ambiguity with clarity (in respect to texture and rhythm). The dichotomy of two-part form versus three-part form and the dichotomy of simplicity versus complexity operate on the large scale. The unity lended by the single source melody coupled with the contrasts furnished by the aforementioned dichotomies allow Breaking Through to be both coherent and interesting.
Date: August 2002
Creator: Dribus, John Alexander

Burn and Sow: The Ethical Implications of Ecological Restoration

Description: Ecological restoration is quickly becoming a major approach to how humans interact with the natural world. Some view restoration as another land management technique on par with conservation and preservation. Others view it as a way to make reparations for our misdeeds and to reincorporate humans into the natural world. Ideas regarding restoration from key academics and restorationists are evaluated here. Their views have set the stage for the contemporary paradigm. Values that may be attributed to restoration and received from it are evaluated. I discuss my own reservations regarding potential problems with the product and practice of restoration. What is at stake regarding the involvement of people in restoration is examined, focusing on the different impacts volunteers and paid workers have on the value of the practice and outcome of the product.
Date: August 2005
Creator: Mauritz, Elizabeth

Can Observing Behavior Predict Performance in Conditional Discriminations?

Description: Prompts are implemented often in training procedures, to include conditional discriminations, and this can lead to prompt dependency. The current study extends a prior study that suggested that the effectiveness of supplementary visual stimuli displaying the sample and comparison was dependent on the timing in relation to the selection task, presented as a prompt or feedback, in a match-to-sample procedure. The current research examines if the differences in that effectiveness were due to differences in observing behavior in those two conditions. Measures of observing behavior were determined by making access to the individual visual stimuli contingent on clicking on the visual stimulus and keeping the cursor located on the stimulus. Participants viewed the sample comparison much less than the comparison stimulus in both the prompt and feedback conditions. Latency to select the comparison stimulus was much shorter for the prompt condition suggesting that the participants might have interacted differently with the selection task in the two conditions.
Date: December 2016
Creator: Marchini, Kevin Julian

A Case Study of Leftist Terrorism in Turkey

Description: Change in government has characterized the development of most nations. Sometimes this change has been marked by continued evolution, in a peaceful attempt to move forward. Other times, change has been fraught with violent revolution and terrorism. This process has been the subject of much debate by political scientists and economic philosophers. Today, Turkey suffers from continued threats to its government through violent acts of terrorism conducted by various groups, expressing ideologies of leftist and rightist organizations, as well as ethnic and religious extremists. This thesis examines DHKP/C as the primary leftist revolutionary group effecting Turkey, exploring its historical background in Europe and the Middle East, as well as its philosophical link to Marxism. Further, this treatise discusses the implication of revolution and terrorism expressed by DHKP/C; and explores innovative and peaceful solutions, strategies, and techniques to be used by the police forces of Turkey in combating this group
Date: August 2001
Creator: Yayla, Ahmet

The Castle/Nikki Heat Phenomenon: A Detailed Examination of Female Representation in Entertainment Media

Description: As entertainment reflects a culture's ideology, it is important for researchers to study its messages and subsequently its potential meanings. Entertainment has the power to inform and persuade, creating models for behavior with which the public interacts. The entertainment texts for the purpose of this study are the Castle television series and the Nikki Heat novels. Together, they create a unique multi-layer fictional world. By using postmodern, feminist, communication, and entertainment theories, the results of this study provide a tightly focused lens which views a narrow aspect of entertainment media. Each text was thoroughly examined using textual analysis, Feminist Poststructuralist Discourse Analysis, and conversation analysis. Contrary to expectations, the results indicated that the Castle and Nikki Heat texts support hegemonic ideology, particularly through the use of exaggerated stereotypes, strict gender roles, imagery, and narrative choices that help perpetuate rape culture. The discussion outlines how these results can be interpreted through the dominant messages presented in the texts. This research is intended to serve as a foundation for future research regarding entertainment media.
Date: December 2016
Creator: Skinner, Katharine Virginia

A Catalog of Extinctions

Description: The preface describes the construction of a book-length, interwoven sequence of poems. This type of sequence differs from other types of poetry collections in its use of an overarching narrative, repeated images, and recurring characters. Three interwoven sequences are used as examples of how to construct such a sequence.
Date: December 2009
Creator: Casey, Edward Anthony

Challenge the Silence

Description: This collection of personal essays about incest, abuse, and depression explores the lasting effects of an invisible childhood. The essays follow the protagonist from the age of five to her early twenties. Her brother, at a young age, becomes sexually abusive of her and her sisters, and her parents fail to protect their daughters. The family is divided as the older girls strive to defend their little sisters, while their parents attempt to excuse their son. When her brother is finally sent away, the protagonist is left to salvage what remains of her relationships with her parents.
Date: August 2012
Creator: Peterson, Erica

Challenges Encountered During Law Enforcement Investigations of Terrorist Use of Information Technology.

Description: The late 20th and early 21st centuries have seen a phenomenal growth in society's use of information technology. Criminals, including terrorists and terrorist organizations, have also adopted information technologies. Information technologies are used to enhance the efficiency, productivity, and effectiveness of terrorist activities and offenses. Investigating terrorist use of information technologies creates a number of challenges for law enforcement officials. While some of the challenges are encountered during conventional criminal investigations, terrorist investigations also present unique challenges. Through content and typological analysis, this study examined open source information to identify, categorize and propose a model of these challenges. Four primary categories were identified: technology, methodology, legal, and administration and human resources challenges.
Date: May 2005
Creator: Morgan, Deanne

Changing Privacy Concerns in the Internet Era.

Description: Privacy has always been a respected value regardless of national borders, cultural differences, and time in every society throughout history. This study focuses on the unprecedented changes in the traditional forms of privacy and consequent concerns with regard to invasion of privacy along with the recent emergence and wide use of the Internet. Government intrusion into private domains through the Internet is examined as a major concern. Privacy invasions by Web marketers, hacker threats against privacy, and employer invasion of employee privacy at the workplace are discussed respectively. Then a set of possible solutions to solve the current problems and alleviate the concerns in this field is offered. Legal remedies that need to be performed by the government are presented as the initial solution. Then encryption is introduced as a strong technical method that may be helpful. Finally, a set of individual measures emphasized as complementary practical necessities. Nevertheless, this study indicates that technology will keep making further changes in the form and concerns of privacy that possibly may outdate these findings in the near future, however, privacy itself will always remain as a cherished social value as it has always been so far.
Date: August 2002
Creator: Demir, Irfan

Characterization of Iron Oxide Deposits Formed at Comanche Peak Steam Electric Station

Description: The presence of deposits leading to corrosion of the steam generator (SG) systems is a major contributor to operation and maintenance cost of pressurized water reactor (PWR) plants. Formation and transport of corrosion products formed due to the presence of impurities, metallic oxides and cations in the secondary side of the SG units result in formation of deposits. This research deals with the characterization of deposit samples collected from the two SG units (unit 1 and unit 2) at Comanche Peak Steam Electric Station (CPSES). X-ray diffraction (XRD), Fourier transform infrared spectrophotometry (FTIR), scanning electron microscopy (SEM), and energy dispersive spectroscopy (EDS) techniques have been used for studying the compositional and structural properties of iron oxides formed in the secondary side of unit 1 and unit 2. Magnetite (Fe3O4) was found to be predominant in samples from unit 1 and maghemite (g-Fe2O3) was found to be the dominant phase in case of unit 2. An attempt has been made to customize FTIR technique for analyzing different iron oxide phases present in the deposits of PWR-SG systems.
Date: May 2003
Creator: Namduri, Haritha

Characterization of Moraxella bovis Aspartate Transcarbamoylase

Description: Aspartate transcarbamoylase (ATCase) catalyzes the first committed step in the pyrimidine biosynthetic pathway. Bacterial ATCases have been divided into three classes, class A, B, and C, based on their molecular weight, holoenzyme architecture, and enzyme kinetics. Moraxella bovis is a fastidious organism, the etiologic agent of infectious bovine keratoconjunctivitis (IBK). The M. bovis ATCase was purified and characterized for the first time. It is a class A enzyme with a molecular mass of 480 to 520 kDa. It has a pH optimum of 9.5 and is stable at high temperatures. The ATCase holoenzyme is inhibited by CTP > ATP > UTP. The Km for aspartate is 1.8 mM and the Vmax 1.04 µmol per min, where the Km for carbamoylphosphate is 1.05 mM and the Vmax 1.74 µmol per min.
Date: December 2001
Creator: Hooshdaran, Sahar

Characterizaton of Triethoxyfluorosilane and Tetraethoxysilane Based Aerogels

Description: Aerogels are highly porous, low dielectric constant (low k) materials being considered by the semiconductor industry as an interlayer dielectric. Low k materials are needed to overcome capacitance problems that limit device feature sizes. Precursors triethoxyfluorosilane (TEFS) and tetraethoxysilane (TEOS) were used to prepare bulk aerogels. Samples were prepared by sol-gel methods, and then carbon dioxide supercritically-dried. Effects of varying the water to precursor ratio were studied with respect to aerogel properties and microstructure. Methods of analysis for this study include FTIR-ATR, TEM, RBS, EDS, SEM, dielectric constant determination by impedance and surface area by gas adsorption. Si-F bonds were determined to be present in both acid- and base-catalyzed TEFS as well as HF-catalyzed TEOS. Fluorine promotes a fractal network microstructure as opposed to a particle-like microstructure. Surface area and dielectric constant were determined to increase slightly with increases in the water to precursor ratio.
Date: December 2001
Creator: Roepsch, Jodi Ann

Characterizing the Municipal Solid Waste Stream in Denton, Texas

Description: Forty-two commercially collected dumpsters from Denton’s Municipal Solid Waste Stream were emptied, sorted and weighed to characterize the material types and make preliminary recycling policy recommendations. The general composition of Denton’s solid waste stream was not significantly different from the composition of the nation’s solid waste stream. Fifty-eight percent of the observed waste stream was recyclable. Paper made up the largest portion of recyclable materials and the "grocery" source category had more paper than any of the other five categories. Based on these findings, an incrementally aggressive approach is recommended to reduce certain types of wastes observed in the waste stream. This would include a Pay-As-You-Throw Program followed by an Intermediate Processing Center that can be converted to a Materials Recovery Facility.
Date: August 2000
Creator: Brady, Patricia D.

Chemotactic Response of Lumbricus terrestris Coelomocytes to Larval and Adult Stages of Rhabditis pellio

Description: Experiments were performed to assess the suitability of Rhabditis pellio, a nematode found in earthworms, as a challenge organism for use in development of a biomarker assay to determine the potential of chemicals to suppress the immunocompetence of the non-specific immune system. To accomplish this goal, information on the life cycle of R. pellio was determined; including effects of incubation time and temperature on growth rates; along with information on the immune response elicited in the earthworm, Lumbricus terrestris. Immune parameters measured were coelomocyte migration toward and attachment to R. pellio larvae and adults. Preliminary background information showed that R. pellio has potential as a challenge organism for development of a biomarker assay.
Date: December 1999
Creator: Medrano, Jennifer Centurion

A Chorus of Trees

Description: This two-part thesis includes a critical preface and a collection of my poems. Using three poems-Louise Glück's "Lullaby," Bob Hicok's "Poem for My Mother's Hysterectomy," and Nick Flynn's "Memento Mori"-the critical preface examines how, in poetry, the transformation of a body negotiates trauma and triggers a conceptual shift, the creation and revision of identity, and the release of the duende's inspirational force. The collection of poetry that follows seeks to transfigure the body as a way to explore the nuanced traumas of human experience.
Date: August 2010
Creator: Lyons, Renée Kathleen

El Cine De Terror Español Como Espejo De La Cultura Española

Description: This study traces the history and culture of Spain as seen through the lens of the nation´s production of horror cinema. Starting from the boom of Spanish horror film in the early 1960s, the thesis compares and contrasts the political and social aspects of Spanish society throughout three distinct eras of the 20th century: 1962 – 1975 (the boom of Spanish horror film through the Franco dictatorship), 1975 – 1999 (the transition to democracy through the end of the 20th century) and 2000 – present (the 21st century). Movies as diverse as Gritos en la noche (1962, Jesús Franco), ¿Quién puede matar a un niño? (1976, Narciso Ibáñez Serrador) and Angustia (1987, Bigas Luna) are framed by culturally-related anectodes as well as correlations to their respective social environments. Special attention has been paid to the production and release of each film, especially in regards to censorship during the Franco dictatorship. The results show that Spanish horror cinema has acted as a true mirror to culture, society and politics in its native country throughout the 20th century and that this trend will likely extend in to the future.
Date: May 2014
Creator: Donahue, Tyler

Clocks and Mirrors

Description: The essays featured in this collection highlight the gaps, as well as parallels, between mental illness and the human condition. In "Appearances," the narrator struggles with her own visual identity especially after reflecting on her Mom's own lengthy history with the mirror. In "Migrations," the lyrical voice of the narrator carries the reader through the typical day of a clinically depressed female character. Lastly, "Attempting the Fall," addresses the issues society has with mental illness by following the narrator from her suicide attempt to the mental ward.
Date: December 2016
Creator: Thies, Jaclyn Michele

Clutch

Description: Clutch is the title of the creative portion of my thesis as well as the name of my theory 'clutch' which I outline in the preface section. The purpose of the clutch theory is to recognize modes of inspiration in the body, heart and mind so that the poet can consciously move beyond passive receptivity to engage inspiration more fully. Mechanically, to "clutch" does not mean to create inspiration, but it is the opportunistic, spirited encouragement of these moments of inspiration and, more importantly, the direction of the artist's own response in moving from inspiration to creation. The clutch process unfolds through three centers: body, heart and mind, where we initially encounter inspiration. And, through a discussion of three notable poets' work, Henri Cole, Li-Young Lee and T.S. Eliot, the relationship between a completed work and clutch as a process further explains the boundaries of each mode.
Date: August 2009
Creator: Bauge, Jessica M.

Cognitive and Perceptual-Motor Indicators of Lateralized vs. Diffuse Brain Damage in Adults.

Description: Among the goals of the neuropsychological assessment are to detect the presence of brain damage, localize which areas of the brain may be dysfunctional and describe subsequent functional impairments. The sensitivity of neuropsychological instruments in carrying out these functions is a question of some debate. The purpose of this study is to determine the utility of lateralizing indicators from the WAIS-III, McCarron Assessment of Neuromuscular Development (MAND) and Haptic Visual Discrimination Test (HVDT), from the McCarron-Dial System Neuropsychological Assessment Battery (MDS), in ascertaining the presence or absence of brain damage as well as location of lesion. The classification accuracies of using performance level indicators from these tests and lateralizing indicators, alone and together, were compared.
Date: December 2002
Creator: Gregory, Erin Kathleen Taylor

Combating Corruption: A Comparison of National Anti-Corruption Efforts

Description: The primary goal of this thesis is to provide a comparative analysis of the institutional and organizational mechanisms designed to monitor and control political corruption at the national level. The paper will provide comparisons of these arraignments and control systems across three nations. The thesis will identify differences across countries in terms of organizational and institutional political corruption control mechanisms, and use the CPI index to suggest and identify those control mechanisms that appear to be present in nations with low CPI measurements. Finally, the thesis will conclude with the discussion concerning the future prospects for controlling political corruption in Turkey based on the comparative analysis described above.
Date: August 2003
Creator: Turer, Ahmet