13,674 Matching Results

Search Results

Advanced search parameters have been applied.

Solution of the General Nonlinear Programming Problem with Subroutine VMCOM

Description: The solution of the general nonlinear programming problem by means of a subroutine called VMCON is described. VMCON uses an algorithm that solves a sequence of positive-definite quadratic programming sub-problems. Each solution determines a direction in which a one-dimensional minimization is performed. In developing this code, changes in the original implementation were made to make the program easier to use and maintain and to incorporate some recently developed LINPACK subprograms. The current implementation contains extensive in-line documentation; an interface subroutine, VMCON1, with a simplified calling sequence; and print options to aid the user in interpreting results.
Date: July 1980
Creator: Crane, Roger L.; Hillstrom, Kenneth E. & Minkoff, Michael
Partner: UNT Libraries Government Documents Department

Comprehensive National Cybersecurity Initiative: Legal Authorities and Policy Considerations

Description: This report discusses the legal issues and addresses policy considerations related to the Comprehensive National Cybersecurity Initiative (CNCI). The CNCI establishes a multi-pronged approach the federal government plans to take in identifying current and emerging cyber threats; shoring up current and future telecommunications and cyber vulnerabilities; and responding to, or proactively addressing, entities that wish to steal or manipulate protected data on secure federal systems.
Date: March 10, 2009
Creator: Rollins, John & Henning, Anna C.
Partner: UNT Libraries Government Documents Department

3DTOM, Three-Dimensional Geophysical Tomography

Description: Abstract: 3DTOM is a DOS-compatible computer program developed by the Mines U.S. Bureau of for three-dimensional tomographic imaging of the subsurface at mine sites. The program uses the simultaneous iterative reconstruction technique (SIRT) to invert travel- time data and produce maps of wave velocity, or to invert amplitude data and generate maps of wave attenuation coefficients. Either seismic (compressional and/or shear) or electromagnetic (e.g., radio or radar) wave data may be used. Ray tracing in 3DTOM uses several different methods, including ray bending, network theory, and a combination of these. User-defined constraints are important in reducing the mathematical nonuniqueness of inversions based on limited data. 3DTOM permits the use of hard constraints, or soft constraints based on fuzzy logic, to allow for uncertainty in the constraints. Reliable subsurface images are useful in many different mine-related problems, including void detection, fracture detection, fluid monitoring, and qualitative stress evaluation.
Date: 1996
Creator: Jackson, M. J. & Tweeton, Daryl R.
Partner: UNT Libraries Government Documents Department

Users Guide and Tutorial for PC-GenoGraphics: Version 1

Description: PC-GenoGraphics is a visual database/query facility designed for reasoning with genomic data. Data are represented to reflect variously accurate notions of the location of their sites, etc., along the length of the genome. Sequence data are efficiently stored and queried via a rather versatile language so that entire sequences of organisms will be treatable as they emerge. Other classes of information, such as function descriptions, are stored in a relational form, and joint queries relating these to sequence properties are supported. All queries result in visual responses that indicate locations along the genome. The results of queries can themselves be promoted to be queryable objects against which further queries can be launched.
Date: December 1992
Creator: Hagstrom, Ray; Overbeek, Ross & Price, Morgan
Partner: UNT Libraries Government Documents Department

Sequencing as a factor associated with students' ability to learn programming

Description: The problem of this study concerns the performance of students in computer programming following exposure to a computer-aided instruction (CAI) drill in sequencing and practice exercises. The purpose of this study was to determine whether or not student success rates improve in computer programming after completing CAI sequencing drills and practice exercises.
Date: August 1991
Creator: Honarvar, Hassanali
Partner: UNT Libraries

Defensive Programming

Description: This research explores the concepts of defensive programming as currently defined in the literature. Then these concepts are extended and more explicitly defined. The relationship between defensive programming, as presented in this research, and current programming practices is discussed and several benefits are observed. Defensive programming appears to benefit the entire software life cycle. Four identifiable phases of the software development process are defined, and the relationship between these four phases and defensive programming is shown. In this research, defensive programming is defined as writing programs in such a way that during execution the program itself produces communication allowing the programmer and the user to observe its dynamic states accurately and critically. To accomplish this end, the use of defensive programming snap shots is presented as a software development tool.
Date: May 1980
Creator: Bailey, L. Mark
Partner: UNT Libraries

Visual literacy in computer culture: reading, writing, and drawing Logo turtle graphics

Description: This study seeks to explore relationships between Logo turtle graphics and visual literacy by addressing two related questions: (a) can traditional visual literacy concepts, as found in the published literature, be synthesized in terms of Logo turtle graphics, and (b) do the literature and "hands-on" experience with turtle graphics indicate that visual competencies are pertinent to graphics-based electronic communications in computer culture?
Date: August 1989
Creator: Horn, Carin E.
Partner: UNT Libraries

Encryption and Evolving Technology: Implications for U.S. Law Enforcement Investigations

Description: This report provides an overview of the perennial issue involving technology outpacing law enforcement and discusses how policy makers and law enforcement officials have dealt with this issue in the past. It also outlines the current debate surrounding smartphone data encryption and how this may impact U.S. law enforcement operations, as well as existing law enforcement capabilities, the debate over whether law enforcement is "going dark" because of rapid technological advances, and resulting issues that policy makers may consider.
Date: February 18, 2016
Creator: Finklea, Kristin
Partner: UNT Libraries Government Documents Department

The Federal Cybersecurity Workforce: Background and Congressional Oversight Issues for the Departments of Defense and Homeland Security

Description: This report examines congressional oversight of two strategies undertaken by Congress and the executive branch to strengthen the federal cybersecurity workforce: initiatives to define and identify the federal cybersecurity workforce, and hiring and pay flexibilities applicable to cybersecurity positions at the Department of Defense (DOD) and the Department of Homeland Security (DHS).
Date: January 8, 2016
Creator: Francis, Kathryn A. & Ginsberg, Wendy
Partner: UNT Libraries Government Documents Department

Cybersecurity: Overview Reports and Links to Government, News, and Related Resources

Description: This report directs the reader to authoritative sources that address many of the most prominent issues related to cybersecurity. Included in the reports are resources and studies from government agencies (federal, state, local, and international), think tanks, academic institutions, news organizations, and other sources.
Date: March 2, 2016
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department

Cybersecurity: Authoritative Reports and Resources

Description: This report provides links to cybersecurity hearings and legislation under consideration in the 113th Congress and those considered in the 112th Congress, as well as executive orders and presidential directives, data and statistics, glossaries, and authoritative reports.
Date: August 2, 2013
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department

Encryption: Selected Legal Issues

Description: This report first provides background to the ongoing encryption debate, including a primer on encryption basics and an overview of Apple, Google, and Facebook's new encryption policies. Next, it provides an overview of the Fifth Amendment right to be free from self-incrimination.
Date: March 3, 2016
Creator: Thompson, Richard M., II & Jaikaran, Chris
Partner: UNT Libraries Government Documents Department

IBM Problem M Curves

Description: Abstract: Presented here are working graphs of pressure, density, velocity, and temperature from the Los Alamos Scientific Laboratory calculations (IBM Problem M) of a spherically symmetric explosion in a homogeneous atmosphere.
Date: June 29, 1960
Creator: Broyles, C. D.
Partner: UNT Libraries Government Documents Department

Cybersecurity: Authoritative Reports and Resources

Description: This report provides links to cybersecurity hearings and legislation under consideration in the 113th Congress and those considered in the 112th Congress, as well as executive orders and presidential directives, data and statistics, glossaries, and authoritative reports.
Date: September 20, 2013
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department

Vermont Utility Cybersecurity Alarm

Description: This report discusses the cyber-security alarm, which was raised after a joint report by the Federal Bureau of Investigation (FBI) and the Department of Homeland Security (DHS) urged electric utilities to search their networks for signs of an infiltration linked to a Russian hacking operation (called the Grizzly Steppe) suspected in the hack of Democratic Party servers.
Date: January 3, 2017
Creator: Campbell, Richard J.
Partner: UNT Libraries Government Documents Department