UNT Libraries - 349 Matching Results

Search Results

Note: All results matching your query require you to be a member of the UNT Community (you must be on campus or login with university credentials for access).

Bounded Dynamic Source Routing in Mobile Ad Hoc Networks

Description: A mobile ad hoc network (MANET) is a collection of mobile platforms or nodes that come together to form a network capable of communicating with each other, without the help of a central controller. To avail the maximum potential of a MANET, it is of great importance to devise a routing scheme, which will optimize upon the performance of a MANET, given the high rate of random mobility of the nodes. In a MANET individual nodes perform the routing functions like route discovery, route maintenance and delivery of packets from one node to the other. Existing routing protocols flood the network with broadcasts of route discovery messages, while attempting to establish a route. This characteristic is instrumental in deteriorating the performance of a MANET, as resource overhead triggered by broadcasts is directly proportional to the size of the network. Bounded-dynamic source routing (B-DSR), is proposed to curb this multitude of superfluous broadcasts, thus enabling to reserve valuable resources like bandwidth and battery power. B-DSR establishes a bounded region in the network, only within which, transmissions of route discovery messages are processed and validated for establishing a route. All route discovery messages reaching outside of this bounded region are dropped, thus preventing the network from being flooded. In addition B-DSR also guarantees loop-free routing and is robust for a rapid recovery when routes in the network change.
Date: August 2003
Creator: George, Glyco

Brain Computer Interface (BCI) Applications: Privacy Threats and Countermeasures

Description: In recent years, brain computer interfaces (BCIs) have gained popularity in non-medical domains such as the gaming, entertainment, personal health, and marketing industries. A growing number of companies offer various inexpensive consumer grade BCIs and some of these companies have recently introduced the concept of BCI "App stores" in order to facilitate the expansion of BCI applications and provide software development kits (SDKs) for other developers to create new applications for their devices. The BCI applications access to users' unique brainwave signals, which consequently allows them to make inferences about users' thoughts and mental processes. Since there are no specific standards that govern the development of BCI applications, its users are at the risk of privacy breaches. In this work, we perform first comprehensive analysis of BCI App stores including software development kits (SDKs), application programming interfaces (APIs), and BCI applications w.r.t privacy issues. The goal is to understand the way brainwave signals are handled by BCI applications and what threats to the privacy of users exist. Our findings show that most applications have unrestricted access to users' brainwave signals and can easily extract private information about their users without them even noticing. We discuss potential privacy threats posed by current practices used in BCI App stores and then describe some countermeasures that could be used to mitigate the privacy threats. Also, develop a prototype which gives the BCI app users a choice to restrict their brain signal dynamically.
Date: May 2017
Creator: Bhalotiya, Anuj Arun

The Break-up of the Confederate Trans-Mississippi Army, 1865

Description: Unlike other Confederate armies at the conclusion of the Civil War, General Edmund Kirby Smith's Trans-Mississippi Army disbanded, often without orders, rather than surrender formally. Despite entreaties from military and civilian leaders to fight on, for Confederate soldiers west of the Mississippi River, the surrender of armies led by Generals Robert E. Lee and Joseph E. Johnston ended the war. After a significant decline in morale and discipline throughout the spring of 1865, soldiers of the Confederate Trans-Mississippi Department chose to break-up and return home. As compensation for months of unpaid service, soldiers seized both public and private property. Civilians joined the soldiers to create disorder that swept many Texas communities until the arrival of Federal troops in late June.
Date: May 2001
Creator: Clampitt, Brad R.

Breaking Through: A Composition for Symphony Orchestra

Description: Breaking Through is a single-movement composition for symphony orchestra based on a fourteen-note melody. Every harmonic and melodic figure except the bass line is derived from this source melody. The structure of the work is based on a number of musical dichotomies that work on both local and large-scale levels. The local dichotomies contrast consonance with dissonance and ambiguity with clarity (in respect to texture and rhythm). The dichotomy of two-part form versus three-part form and the dichotomy of simplicity versus complexity operate on the large scale. The unity lended by the single source melody coupled with the contrasts furnished by the aforementioned dichotomies allow Breaking Through to be both coherent and interesting.
Date: August 2002
Creator: Dribus, John Alexander

Burn and Sow: The Ethical Implications of Ecological Restoration

Description: Ecological restoration is quickly becoming a major approach to how humans interact with the natural world. Some view restoration as another land management technique on par with conservation and preservation. Others view it as a way to make reparations for our misdeeds and to reincorporate humans into the natural world. Ideas regarding restoration from key academics and restorationists are evaluated here. Their views have set the stage for the contemporary paradigm. Values that may be attributed to restoration and received from it are evaluated. I discuss my own reservations regarding potential problems with the product and practice of restoration. What is at stake regarding the involvement of people in restoration is examined, focusing on the different impacts volunteers and paid workers have on the value of the practice and outcome of the product.
Date: August 2005
Creator: Mauritz, Elizabeth

Can Observing Behavior Predict Performance in Conditional Discriminations?

Description: Prompts are implemented often in training procedures, to include conditional discriminations, and this can lead to prompt dependency. The current study extends a prior study that suggested that the effectiveness of supplementary visual stimuli displaying the sample and comparison was dependent on the timing in relation to the selection task, presented as a prompt or feedback, in a match-to-sample procedure. The current research examines if the differences in that effectiveness were due to differences in observing behavior in those two conditions. Measures of observing behavior were determined by making access to the individual visual stimuli contingent on clicking on the visual stimulus and keeping the cursor located on the stimulus. Participants viewed the sample comparison much less than the comparison stimulus in both the prompt and feedback conditions. Latency to select the comparison stimulus was much shorter for the prompt condition suggesting that the participants might have interacted differently with the selection task in the two conditions.
Date: December 2016
Creator: Marchini, Kevin Julian

Case Studies to Learn Human Mapping Strategies in a Variety of Coarse-Grained Reconfigurable Architectures

Description: Computer hardware and algorithm design have seen significant progress over the years. It is also seen that there are several domains in which humans are more efficient than computers. For example in image recognition, image tagging, natural language understanding and processing, humans often find complicated algorithms quite easy to grasp. This thesis presents the different case studies to learn human mapping strategy to solve the mapping problem in the area of coarse-grained reconfigurable architectures (CGRAs). To achieve optimum level performance and consume less energy in CGRAs, place and route problem has always been a major concern. Making use of human characteristics can be helpful in problems as such, through pattern recognition and experience. Therefore to conduct the case studies a computer mapping game called UNTANGLED was analyzed as a medium to convey insights of human mapping strategies in a variety of architectures. The purpose of this research was to learn from humans so that we can come up with better algorithms to outperform the existing algorithms. We observed how human strategies vary as we present them with different architectures, different architectures with constraints, different visualization as well as how the quality of solution changes with experience. In this work all the case studies obtained from exploiting human strategies provide useful feedback that can improve upon existing algorithms. These insights can be adapted to find the best architectural solution for a particular domain and for future research directions for mapping onto mesh-and- stripe based CGRAs.
Date: May 2017
Creator: Malla, Tika Kumari

A Case Study of Leftist Terrorism in Turkey

Description: Change in government has characterized the development of most nations. Sometimes this change has been marked by continued evolution, in a peaceful attempt to move forward. Other times, change has been fraught with violent revolution and terrorism. This process has been the subject of much debate by political scientists and economic philosophers. Today, Turkey suffers from continued threats to its government through violent acts of terrorism conducted by various groups, expressing ideologies of leftist and rightist organizations, as well as ethnic and religious extremists. This thesis examines DHKP/C as the primary leftist revolutionary group effecting Turkey, exploring its historical background in Europe and the Middle East, as well as its philosophical link to Marxism. Further, this treatise discusses the implication of revolution and terrorism expressed by DHKP/C; and explores innovative and peaceful solutions, strategies, and techniques to be used by the police forces of Turkey in combating this group
Date: August 2001
Creator: Yayla, Ahmet

The Castle/Nikki Heat Phenomenon: A Detailed Examination of Female Representation in Entertainment Media

Description: As entertainment reflects a culture's ideology, it is important for researchers to study its messages and subsequently its potential meanings. Entertainment has the power to inform and persuade, creating models for behavior with which the public interacts. The entertainment texts for the purpose of this study are the Castle television series and the Nikki Heat novels. Together, they create a unique multi-layer fictional world. By using postmodern, feminist, communication, and entertainment theories, the results of this study provide a tightly focused lens which views a narrow aspect of entertainment media. Each text was thoroughly examined using textual analysis, Feminist Poststructuralist Discourse Analysis, and conversation analysis. Contrary to expectations, the results indicated that the Castle and Nikki Heat texts support hegemonic ideology, particularly through the use of exaggerated stereotypes, strict gender roles, imagery, and narrative choices that help perpetuate rape culture. The discussion outlines how these results can be interpreted through the dominant messages presented in the texts. This research is intended to serve as a foundation for future research regarding entertainment media.
Date: December 2016
Creator: Skinner, Katharine Virginia

Catalytic Properties and Mechanical Behavior of Metallic Glass Powders

Description: Lack of crystalline order and microstructural features such as grain/grain-boundary in metallic glasses results in a suite of remarkable attributes including very high strength, close to theoretical elasticity, high corrosion and wear resistance, and soft magnetic properties. By altering the morphology and tuning of composition, MGs may be transformed into high-performance catalytic materials. In this study, the catalytic properties of metallic glass powders were demonstrated in dissociating toxic organic chemicals such as AZO dye. BMG powders showed superior performance compared to state of the art crystalline iron because of their high catalytic activity, durability, and reusability. To enhance the catalytic properties, high energy mechanical milling was performed to increase the surface area and defect density. Iron-based bulk metallic glass (BMG) of composition Fe48Cr15Mo14Y2C15B6 was used because of its low cost and ability to make large surface area by high energy ball milling. AZO dye was degraded in less than 20 minutes for the 9 hours milled Fe-BMG. However, subsequent increase in ball milling time resulted in devitrification and loss of catalytic activity as measured using UV-Visible spectroscopy. Aluminum-based bulk metallic glass (Al-BMG) powder of composition Al82Fe3Ni8Y7 was synthesized by arc-melting the constituent elements followed by gas-atomization. The particle size and morphology were similar to Fe-BMG with a fully amorphous structure. A small percentage of transition metal constituents (Fe and Ni) in a mostly aluminum alloy showed high catalytic activity, with no toxic by-products and no change in surface characteristics. Al-alloy particles, being light-weight, were easily dispersed in aqueous medium and accelerated the redox reactions. The mechanism of dye dissociation was studied using Raman and Infrared (IR) spectroscopy. Breaking of -C-H- and - C-N- bonds of AZO dye was found to be the primary mechanism. Mechanical behavior of individual BMG particles was evaluated by in situ pico-indentation in a scanning electron ...
Date: May 2017
Creator: Garrison, Seth Thomas

Challenge the Silence

Description: This collection of personal essays about incest, abuse, and depression explores the lasting effects of an invisible childhood. The essays follow the protagonist from the age of five to her early twenties. Her brother, at a young age, becomes sexually abusive of her and her sisters, and her parents fail to protect their daughters. The family is divided as the older girls strive to defend their little sisters, while their parents attempt to excuse their son. When her brother is finally sent away, the protagonist is left to salvage what remains of her relationships with her parents.
Date: August 2012
Creator: Peterson, Erica

Challenges Encountered During Law Enforcement Investigations of Terrorist Use of Information Technology.

Description: The late 20th and early 21st centuries have seen a phenomenal growth in society's use of information technology. Criminals, including terrorists and terrorist organizations, have also adopted information technologies. Information technologies are used to enhance the efficiency, productivity, and effectiveness of terrorist activities and offenses. Investigating terrorist use of information technologies creates a number of challenges for law enforcement officials. While some of the challenges are encountered during conventional criminal investigations, terrorist investigations also present unique challenges. Through content and typological analysis, this study examined open source information to identify, categorize and propose a model of these challenges. Four primary categories were identified: technology, methodology, legal, and administration and human resources challenges.
Date: May 2005
Creator: Morgan, Deanne

Changing Privacy Concerns in the Internet Era.

Description: Privacy has always been a respected value regardless of national borders, cultural differences, and time in every society throughout history. This study focuses on the unprecedented changes in the traditional forms of privacy and consequent concerns with regard to invasion of privacy along with the recent emergence and wide use of the Internet. Government intrusion into private domains through the Internet is examined as a major concern. Privacy invasions by Web marketers, hacker threats against privacy, and employer invasion of employee privacy at the workplace are discussed respectively. Then a set of possible solutions to solve the current problems and alleviate the concerns in this field is offered. Legal remedies that need to be performed by the government are presented as the initial solution. Then encryption is introduced as a strong technical method that may be helpful. Finally, a set of individual measures emphasized as complementary practical necessities. Nevertheless, this study indicates that technology will keep making further changes in the form and concerns of privacy that possibly may outdate these findings in the near future, however, privacy itself will always remain as a cherished social value as it has always been so far.
Date: August 2002
Creator: Demir, Irfan

Characterization of Iron Oxide Deposits Formed at Comanche Peak Steam Electric Station

Description: The presence of deposits leading to corrosion of the steam generator (SG) systems is a major contributor to operation and maintenance cost of pressurized water reactor (PWR) plants. Formation and transport of corrosion products formed due to the presence of impurities, metallic oxides and cations in the secondary side of the SG units result in formation of deposits. This research deals with the characterization of deposit samples collected from the two SG units (unit 1 and unit 2) at Comanche Peak Steam Electric Station (CPSES). X-ray diffraction (XRD), Fourier transform infrared spectrophotometry (FTIR), scanning electron microscopy (SEM), and energy dispersive spectroscopy (EDS) techniques have been used for studying the compositional and structural properties of iron oxides formed in the secondary side of unit 1 and unit 2. Magnetite (Fe3O4) was found to be predominant in samples from unit 1 and maghemite (g-Fe2O3) was found to be the dominant phase in case of unit 2. An attempt has been made to customize FTIR technique for analyzing different iron oxide phases present in the deposits of PWR-SG systems.
Date: May 2003
Creator: Namduri, Haritha

Characterization of Moraxella bovis Aspartate Transcarbamoylase

Description: Aspartate transcarbamoylase (ATCase) catalyzes the first committed step in the pyrimidine biosynthetic pathway. Bacterial ATCases have been divided into three classes, class A, B, and C, based on their molecular weight, holoenzyme architecture, and enzyme kinetics. Moraxella bovis is a fastidious organism, the etiologic agent of infectious bovine keratoconjunctivitis (IBK). The M. bovis ATCase was purified and characterized for the first time. It is a class A enzyme with a molecular mass of 480 to 520 kDa. It has a pH optimum of 9.5 and is stable at high temperatures. The ATCase holoenzyme is inhibited by CTP > ATP > UTP. The Km for aspartate is 1.8 mM and the Vmax 1.04 µmol per min, where the Km for carbamoylphosphate is 1.05 mM and the Vmax 1.74 µmol per min.
Date: December 2001
Creator: Hooshdaran, Sahar

Characterizaton of Triethoxyfluorosilane and Tetraethoxysilane Based Aerogels

Description: Aerogels are highly porous, low dielectric constant (low k) materials being considered by the semiconductor industry as an interlayer dielectric. Low k materials are needed to overcome capacitance problems that limit device feature sizes. Precursors triethoxyfluorosilane (TEFS) and tetraethoxysilane (TEOS) were used to prepare bulk aerogels. Samples were prepared by sol-gel methods, and then carbon dioxide supercritically-dried. Effects of varying the water to precursor ratio were studied with respect to aerogel properties and microstructure. Methods of analysis for this study include FTIR-ATR, TEM, RBS, EDS, SEM, dielectric constant determination by impedance and surface area by gas adsorption. Si-F bonds were determined to be present in both acid- and base-catalyzed TEFS as well as HF-catalyzed TEOS. Fluorine promotes a fractal network microstructure as opposed to a particle-like microstructure. Surface area and dielectric constant were determined to increase slightly with increases in the water to precursor ratio.
Date: December 2001
Creator: Roepsch, Jodi Ann

Characterizing the Municipal Solid Waste Stream in Denton, Texas

Description: Forty-two commercially collected dumpsters from Denton’s Municipal Solid Waste Stream were emptied, sorted and weighed to characterize the material types and make preliminary recycling policy recommendations. The general composition of Denton’s solid waste stream was not significantly different from the composition of the nation’s solid waste stream. Fifty-eight percent of the observed waste stream was recyclable. Paper made up the largest portion of recyclable materials and the "grocery" source category had more paper than any of the other five categories. Based on these findings, an incrementally aggressive approach is recommended to reduce certain types of wastes observed in the waste stream. This would include a Pay-As-You-Throw Program followed by an Intermediate Processing Center that can be converted to a Materials Recovery Facility.
Date: August 2000
Creator: Brady, Patricia D.

Chemotactic Response of Lumbricus terrestris Coelomocytes to Larval and Adult Stages of Rhabditis pellio

Description: Experiments were performed to assess the suitability of Rhabditis pellio, a nematode found in earthworms, as a challenge organism for use in development of a biomarker assay to determine the potential of chemicals to suppress the immunocompetence of the non-specific immune system. To accomplish this goal, information on the life cycle of R. pellio was determined; including effects of incubation time and temperature on growth rates; along with information on the immune response elicited in the earthworm, Lumbricus terrestris. Immune parameters measured were coelomocyte migration toward and attachment to R. pellio larvae and adults. Preliminary background information showed that R. pellio has potential as a challenge organism for development of a biomarker assay.
Date: December 1999
Creator: Medrano, Jennifer Centurion

El Cine De Terror Español Como Espejo De La Cultura Española

Description: This study traces the history and culture of Spain as seen through the lens of the nation´s production of horror cinema. Starting from the boom of Spanish horror film in the early 1960s, the thesis compares and contrasts the political and social aspects of Spanish society throughout three distinct eras of the 20th century: 1962 – 1975 (the boom of Spanish horror film through the Franco dictatorship), 1975 – 1999 (the transition to democracy through the end of the 20th century) and 2000 – present (the 21st century). Movies as diverse as Gritos en la noche (1962, Jesús Franco), ¿Quién puede matar a un niño? (1976, Narciso Ibáñez Serrador) and Angustia (1987, Bigas Luna) are framed by culturally-related anectodes as well as correlations to their respective social environments. Special attention has been paid to the production and release of each film, especially in regards to censorship during the Franco dictatorship. The results show that Spanish horror cinema has acted as a true mirror to culture, society and politics in its native country throughout the 20th century and that this trend will likely extend in to the future.
Date: May 2014
Creator: Donahue, Tyler

Clocks and Mirrors

Description: The essays featured in this collection highlight the gaps, as well as parallels, between mental illness and the human condition. In "Appearances," the narrator struggles with her own visual identity especially after reflecting on her Mom's own lengthy history with the mirror. In "Migrations," the lyrical voice of the narrator carries the reader through the typical day of a clinically depressed female character. Lastly, "Attempting the Fall," addresses the issues society has with mental illness by following the narrator from her suicide attempt to the mental ward.
Date: December 2016
Creator: Thies, Jaclyn Michele

Cognitive and Perceptual-Motor Indicators of Lateralized vs. Diffuse Brain Damage in Adults.

Description: Among the goals of the neuropsychological assessment are to detect the presence of brain damage, localize which areas of the brain may be dysfunctional and describe subsequent functional impairments. The sensitivity of neuropsychological instruments in carrying out these functions is a question of some debate. The purpose of this study is to determine the utility of lateralizing indicators from the WAIS-III, McCarron Assessment of Neuromuscular Development (MAND) and Haptic Visual Discrimination Test (HVDT), from the McCarron-Dial System Neuropsychological Assessment Battery (MDS), in ascertaining the presence or absence of brain damage as well as location of lesion. The classification accuracies of using performance level indicators from these tests and lateralizing indicators, alone and together, were compared.
Date: December 2002
Creator: Gregory, Erin Kathleen Taylor

Combating Corruption: A Comparison of National Anti-Corruption Efforts

Description: The primary goal of this thesis is to provide a comparative analysis of the institutional and organizational mechanisms designed to monitor and control political corruption at the national level. The paper will provide comparisons of these arraignments and control systems across three nations. The thesis will identify differences across countries in terms of organizational and institutional political corruption control mechanisms, and use the CPI index to suggest and identify those control mechanisms that appear to be present in nations with low CPI measurements. Finally, the thesis will conclude with the discussion concerning the future prospects for controlling political corruption in Turkey based on the comparative analysis described above.
Date: August 2003
Creator: Turer, Ahmet

A Comparative Analysis of Digital and Paper Restaurant Menus Based on Customer Perception and Nutritional Labeling

Description: The restaurant industry is a highly customer-driven field. Therefore, it is imperative that restaurateurs consider customer expectations with regard to restaurant menus. The purpose of this experimental study is to examine the effects of menu format (i.e., paper or digital) and amount of nutritional information (i.e., extensive, brief, or none) on customer perceptions of the effectiveness, perceived ease of use, and information quality of the menu. Furthermore, this research intends to test the effect of these three menu attributes on the outcomes of value and satisfaction in order to assess the competitive advantage of one format over the other. The Cognitive Appraisal and Information Processing Theories provide structure to the proposed conceptual framework and give credence to the findings. This study also fills gaps in the present research by not only ameliorating weaknesses of extant studies, but also by examining several different aspects of restaurant menus simultaneously within a single study.
Date: December 2016
Creator: Moody, Bailey