Degree Department

Degree Discipline

Degree Level

52 Matching Results

Results open in a new window/tab.

Accountability for U.S. Equipment Provided to Pakistani Security Forces in the Western Frontier Needs to Be Improved (open access)

Accountability for U.S. Equipment Provided to Pakistani Security Forces in the Western Frontier Needs to Be Improved

Correspondence issued by the Government Accountability Office with an abstract that begins "Al Qaeda, the Taliban, and other extremists have used safe havens along Pakistan's Western Frontier (border) region to attack Pakistani, Afghan, U.S., and coalition troops; plan and train for attacks against U.S. interests and the U.S. homeland; destabilize Pakistan, a nuclear-armed U.S. ally; and spread radical Islamic ideologies that threaten U.S. interests. A key U.S. national security objective is to disrupt, dismantle, and defeat al Qaeda and its violent extremist affiliates in Pakistan and to deny them a safe haven. Since 2002, the United States has provided over $18 billion in assistance and reimbursement to Pakistan including (1) reimbursements to the Pakistani government for costs incurred in direct support of U.S. counterterrorism operations; (2) security assistance such as grants to Pakistan for the acquisition of military equipment; and (3) development, economic, and humanitarian assistance. Since 2006, this assistance has included $1.5 billion to improve the counterterrorism and counterinsurgency capabilities of Pakistani security forces operating along the country's border with Afghanistan, including $400 million for the Pakistan Counterinsurgency Fund (PCF) and $700 million for the Pakistan Counterinsurgency Capabilities Fund (PCCF). The President has requested an additional $1.2 billion for …
Date: February 15, 2011
Creator: United States. Government Accountability Office.
Object Type: Text
System: The UNT Digital Library
The Altus Times (Altus, Okla.), Vol. 112, No. 311, Ed. 1 Tuesday, February 15, 2011 (open access)

The Altus Times (Altus, Okla.), Vol. 112, No. 311, Ed. 1 Tuesday, February 15, 2011

Daily newspaper from Altus, Oklahoma that includes local, state, and national news along with advertising.
Date: February 15, 2011
Creator: Bush, Michael
Object Type: Newspaper
System: The Gateway to Oklahoma History
The Baytown Sun (Baytown, Tex.), Vol. 90, No. 293, Ed. 1 Tuesday, February 15, 2011 (open access)

The Baytown Sun (Baytown, Tex.), Vol. 90, No. 293, Ed. 1 Tuesday, February 15, 2011

Daily newspaper from Baytown, Texas that includes local, state, and national news along with advertising.
Date: February 15, 2011
Creator: Gray, Janie
Object Type: Newspaper
System: The Portal to Texas History
The Boerne Star (Boerne, Tex.), Vol. 105, No. 13, Ed. 1 Tuesday, February 15, 2011 (open access)

The Boerne Star (Boerne, Tex.), Vol. 105, No. 13, Ed. 1 Tuesday, February 15, 2011

Semiweekly newspaper from Boerne, Texas that includes local, state, and national news along with advertising.
Date: February 15, 2011
Creator: Cartwright, Brian & Velvin, Candace E.
Object Type: Newspaper
System: The Portal to Texas History
Border Security: Preliminary Observations on Border Control Measures for the Southwest Border (open access)

Border Security: Preliminary Observations on Border Control Measures for the Southwest Border

Testimony issued by the Government Accountability Office with an abstract that begins "The Department of Homeland Security (DHS) reports that the nearly 2,000-mile U.S. border with Mexico is vulnerable to cross-border illegal activity. The Office of Border Patrol (Border Patrol), within DHS's U.S. Customs and Border Protection (CBP), is responsible for securing the border between U.S. ports of entry and has divided responsibility for southwest border miles among nine Border Patrol sectors. CBP reported spending about $3 billion on Border Patrol's southwest border efforts in fiscal year 2010, apprehending over 445,000 illegal entries. This testimony provides preliminary observations on (1) the extent to which DHS reported progress in achieving operational control--Border Patrol was able to detect, respond, and interdict cross-border illegal activity--of the southwest border; (2) the extent to which operational control reflects Border Patrol's ability to respond to illegal activity at the border or after entry into the United States; and (3) how DHS reports the transition to new border security measures will change oversight and resource requirements for securing the southwest border. This testimony is based on GAO's ongoing work for the House Committee on Homeland Security. GAO analyzed DHS border security documents and data supporting border security …
Date: February 15, 2011
Creator: United States. Government Accountability Office.
Object Type: Text
System: The UNT Digital Library
The Brand (Abilene, Tex.), Vol. 99, No. 11, Ed. 1 Tuesday, February 15, 2011 (open access)

The Brand (Abilene, Tex.), Vol. 99, No. 11, Ed. 1 Tuesday, February 15, 2011

Bi-weekly student newspaper from Hardin-Simmons University in Abilene, Texas that includes campus news and local news of interest to students along with advertising.
Date: February 15, 2011
Creator: Hahne, Elyse
Object Type: Newspaper
System: The Portal to Texas History

Captain John R. Hughes: Lone Star Ranger

Access: Use of this item is restricted to the UNT Community
Captain John R. Hughes, Lone Star Ranger is the first full and complete modern biography of a man who served as a Texas Ranger from 1887 until early 1915. He came to the attention of the Rangers after doggedly trailing horse thieves for nearly a year and recovering his stolen stock. After helping Ranger Ira Aten track down another fugitive from justice, Hughes then joined Company D of the Texas Rangers on Aten’s recommendation, intending to stay for only a few months; he remained in the service for nearly thirty years. When Sgt. Charles Fusselman was killed by bandits, Hughes took his place. When Captain Frank Jones was killed by bandits in 1893, Hughes was named captain of Company D. As captain, Hughes and his men searched the border and identified every bandit involved in the killing of Jones. They all received justice. Toward the end of his career Hughes became a senior captain based in Austin, and in 1915, having served as a captain and ranger longer than any other man, he retired from the force. His later years were happy ones, with traveling and visiting friends and relatives. He became a Texas icon and national celebrity, receiving more …
Date: February 15, 2011
Creator: Parsons, Chuck
Object Type: Book
System: The UNT Digital Library
China's Energy and Carbon Emissions Outlook to 2050 (open access)

China's Energy and Carbon Emissions Outlook to 2050

As a result of soaring energy demand from a staggering pace of economic expansion and the related growth of energy-intensive industry, China overtook the United States to become the world's largest contributor to CO{sub 2} emissions in 2007. At the same time, China has taken serious actions to reduce its energy and carbon intensity by setting both a short-term energy intensity reduction goal for 2006 to 2010 as well as a long-term carbon intensity reduction goal for 2020. This study presents a China Energy Outlook through 2050 that assesses the role of energy efficiency policies in transitioning China to a lower emission trajectory and meeting its intensity reduction goals. Over the past few years, LBNL has established and significantly enhanced its China End-Use Energy Model which is based on the diffusion of end-use technologies and other physical drivers of energy demand. This model presents an important new approach for helping understand China's complex and dynamic drivers of energy consumption and implications of energy efficiency policies through scenario analysis. A baseline ('Continued Improvement Scenario') and an alternative energy efficiency scenario ('Accelerated Improvement Scenario') have been developed to assess the impact of actions already taken by the Chinese government as well as …
Date: February 15, 2011
Creator: Zhou, Nan; Fridley, David; McNeil, Michael; Zheng, Nina; Ke, Jing & Levine, Mark
Object Type: Report
System: The UNT Digital Library
Climate Change Issues: Options for Addressing Challenges to Carbon Offset Quality (open access)

Climate Change Issues: Options for Addressing Challenges to Carbon Offset Quality

A letter report issued by the Government Accountability Office with an abstract that begins "Carbon offsets are reductions in greenhouse gas emissions in one place to compensate for emissions elsewhere. Examples of offset projects include planting trees, developing renewable energy sources, or capturing emissions from landfills. Recent congressional proposals would have limited emissions from utilities, industries, or other "regulated entities," and allowed these entities to buy offsets. Research suggests that offsets can significantly lower the cost of a program to limit emissions because buying offsets may cost regulated entities less than making the reductions themselves. Some existing international and U.S. regional programs allow offsets to be used for compliance with emissions limits. A number of voluntary offset programs also exist, where buyers do not face legal requirements but may buy offsets for other reasons. Prior GAO work found that it can be difficult to ensure offset quality--that offsets achieve intended reductions. One quality criterion is that reductions must be "additional" to what would have occurred without the offset program. This report provides information on (1) key challenges in assessing the quality of different types of offsets and (2) options for addressing key challenges associated with offset quality if the U.S. …
Date: February 15, 2011
Creator: United States. Government Accountability Office.
Object Type: Report
System: The UNT Digital Library
Compensated Work Sharing Arrangements (Short-Time Compensation) as an Alternative to Layoffs (open access)

Compensated Work Sharing Arrangements (Short-Time Compensation) as an Alternative to Layoffs

This report describes short-term compensation (STC) as a beneficial alternative to layoffs. It also describes the status of STC (or work sharing) in the U.S., particularly as it varies from state to state.
Date: February 15, 2011
Creator: Shelton, Alison M.
Object Type: Report
System: The UNT Digital Library
Constraining the reservoir model of an injected CO2 plume with crosswell CASSM at the Frio-II brine plot (open access)

Constraining the reservoir model of an injected CO2 plume with crosswell CASSM at the Frio-II brine plot

Crosswell CASSM (continuous active-source seismic monitoring) data was acquired as part of the Frio-II brine pilot CO{sub 2} injection experiment. To gain insight into the CO{sub 2} plume evolution, we have integrated the 3D multiphase flow modeling code TOUGH2 with seismic simulation codes via a petrophysical model that predicts seismic velocity for a given CO{sub 2} saturation. Results of forward seismic modeling based on the CO{sub 2} saturation distribution produced by an initial TOUGH2 model compare poorly with the CASSM data, indicating that the initial flow model did not capture the actual CO{sub 2} plume dynamics. Updates to the TOUGH2 model required to better match the CASSM field data indicate vertical flow near the injection well, with increased horizontal plume growth occurring at the top of the reservoir sand. The CASSM continuous delay time data are ideal for constraining the modeled spatiotemporal evolution of the CO{sub 2} plume and allow improvement in reservoir model and estimation of CO{sub 2} plume properties.
Date: February 15, 2011
Creator: Daley, T. M.; Ajo-Franklin, J. & Doughty, C. A.
Object Type: Article
System: The UNT Digital Library
A data variance technique for automated despiking of magnetotelluric data with a remote reference (open access)

A data variance technique for automated despiking of magnetotelluric data with a remote reference

The magnetotelluric method employs co-located surface measurements of electric and magnetic fields to infer the local electrical structure of the earth. The frequency-dependent 'apparent resistivity' curves can be inaccurate at long periods if input data are contaminated - even when robust remote reference techniques are employed. Data despiking prior to processing can result in significantly more reliable estimates of long period apparent resistivities. This paper outlines a two-step method of automatic identification and replacement for spike-like contamination of magnetotelluric data; based on the simultaneity of natural electric and magnetic field variations at distant sites. This simultaneity is exploited both to identify windows in time when the array data are compromised, and to generate synthetic data that replace observed transient noise spikes. In the first step, windows in data time series containing spikes are identified via intersite comparison of channel 'activity' - such as the variance of differenced data within each window. In the second step, plausible data for replacement of flagged windows is calculated by Wiener filtering coincident data in clean channels. The Wiener filters - which express the time-domain relationship between various array channels - are computed using an uncontaminated segment of array training data. Examples are shown where …
Date: February 15, 2011
Creator: Kappler, K.
Object Type: Article
System: The UNT Digital Library
Doctoral Lecture Recital: 2011-02-15 – Katrin Meidell, viola transcript

Doctoral Lecture Recital: 2011-02-15 – Katrin Meidell, viola

Recital presented at the UNT College of Music Recital Hall in partial fulfillment of the Doctor of Musical Arts (DMA) degree.
Date: February 15, 2011
Creator: Meidell, Katrin
Object Type: Sound
System: The UNT Digital Library

Economic Impacts of the Natural Gas Industry in North Texas

This presentation is part of the UNT Speaks Out faculty lecture series, Gas Well Drilling: What Does it Mean for North Texas? In this presentation, the author discusses the economic benefits to natural gas production, reviews the most recent study on regional economic impacts, considers recent trends in drilling activity, and considers some of the downsides.
Date: February 15, 2011
Creator: Clower, Terry L.
Object Type: Presentation
System: The UNT Digital Library
Electrostatically Self-assembled Amphiplexes (open access)

Electrostatically Self-assembled Amphiplexes

This research will focus on characterizing the phase behavior of polyelectrolyte-surfactant microemulsions (PSM) that were recently discovered in our lab and indentifing possible uses of their long-range ordered nanostructures towards bioseparation, oil-recovery and drug delivery systems. In addition, we are proposing strategies for synthesizing solid and long-range ordered materials with unit cells on the nanometer scale using polymerization and/or cross-linking to solidify the soft template.
Date: February 15, 2011
Creator: Strey, Helmut H.
Object Type: Report
System: The UNT Digital Library
Evaluation of sustained release polylactate electron donors for removal of hexavalent chromium from contaminated groundwater (open access)

Evaluation of sustained release polylactate electron donors for removal of hexavalent chromium from contaminated groundwater

To evaluate the efficacy of bioimmobilization of Cr(VI) in groundwater at the Department of Energy Hanford site, we conducted a series of microcosm experiments using a range of commercial electron donors with varying degrees of lactate polymerization (polylactate). These experiments were conducted using Hanford Formation sediments (coarse sand and gravel) immersed in Hanford groundwater, which were amended with Cr(VI) and several types of lactate-based electron donors (Hydrogen Release Compound, HRC; primer-HRC, pHRC; extended release HRC) and the polylactate-cysteine form (Metal Remediation Compound, MRC). The results showed that polylactate compounds stimulated an increase in bacterial biomass and activity to a greater extent than sodium lactate when applied at equivalent carbon concentrations. At the same time, concentrations of headspace hydrogen and methane increased and correlated with changes in the microbial community structure. Enrichment of Pseudomonas spp. occurred with all lactate additions, and enrichment of sulfate-reducing Desulfosporosinus spp. occurred with almost complete sulfate reduction. The results of these experiments demonstrate that amendment with the pHRC and MRC forms result in effective removal of Cr(VI) from solution most likely by both direct (enzymatic) and indirect (microbially generated reductant) mechanisms.
Date: February 15, 2011
Creator: Brodie, E. L.; Joyner, D. C.; Faybishenko, B.; Conrad, M. E.; Rios-Velazquez, C.; Mork, B. et al.
Object Type: Article
System: The UNT Digital Library
Explosive Detection in Aviation Applications Using CT (open access)

Explosive Detection in Aviation Applications Using CT

CT scanners are deployed world-wide to detect explosives in checked and carry-on baggage. Though very similar to single- and dual-energy multi-slice CT scanners used today in medical imaging, some recently developed explosives detection scanners employ multiple sources and detector arrays to eliminate mechanical rotation of a gantry, photon counting detectors for spectral imaging, and limited number of views to reduce cost. For each bag scanned, the resulting reconstructed images are first processed by automated threat recognition algorithms to screen for explosives and other threats. Human operators review the images only when these automated algorithms report the presence of possible threats. The US Department of Homeland Security (DHS) has requirements for future scanners that include dealing with a larger number of threats, higher probability of detection, lower false alarm rates and lower operating costs. One tactic that DHS is pursuing to achieve these requirements is to augment the capabilities of the established security vendors with third-party algorithm developers. A third-party in this context refers to academics and companies other than the established vendors. DHS is particularly interested in exploring the model that has been used very successfully by the medical imaging industry, in which university researchers develop algorithms that are eventually …
Date: February 15, 2011
Creator: Martz, H E & Crawford, C R
Object Type: Article
System: The UNT Digital Library
The Express-Star (Chickasha, Okla.), Ed. 1 Tuesday, February 15, 2011 (open access)

The Express-Star (Chickasha, Okla.), Ed. 1 Tuesday, February 15, 2011

Daily newspaper from Chickasha, Oklahoma that includes local, state, and national news along with advertising.
Date: February 15, 2011
Creator: Wray, Kelly
Object Type: Newspaper
System: The Gateway to Oklahoma History
Facilitation of Third-party Development of Advanced Algorithms for Explosive Detection Using Workshops and Grand Challenges (open access)

Facilitation of Third-party Development of Advanced Algorithms for Explosive Detection Using Workshops and Grand Challenges

The US Department of Homeland Security (DHS) has requirements for future explosive detection scanners that include dealing with a larger number of threats, higher probability of detection, lower false alarm rates and lower operating costs. One tactic that DHS is pursuing to achieve these requirements is to augment the capabilities of the established security vendors with third-party algorithm developers. The purposes of this presentation are to review DHS's objectives for involving third parties in the development of advanced algorithms and then to discuss how these objectives are achieved using workshops and grand challenges. Terrorists are still trying and they are getting more sophisticated. There is a need to increase the number of smart people working on homeland security. Augmenting capabilities and capacities of system vendors with third-parties is one tactic. Third parties can be accessed via workshops and grand challenges. Successes have been achieved to date. There are issues that need to be resolved to further increase third party involvement.
Date: February 15, 2011
Creator: Martz, H. E.; Crawford, C. R.; Beaty, J. S. & Castanon, D.
Object Type: Article
System: The UNT Digital Library
Federal Mandates: Few Rules Trigger Unfunded Mandates Reform Act (open access)

Federal Mandates: Few Rules Trigger Unfunded Mandates Reform Act

Testimony issued by the Government Accountability Office with an abstract that begins "Many federal programs and initiatives involve shared responsibilities--and benefits--for the federal, state, local and tribal governments, and the private sector. Federal statutes and rules often require nonfederal parties to expend their resources in support of certain national goals. The Unfunded Mandates Reform Act of 1995 (UMRA) was enacted to address some of the concerns about federal statutes and regulations that require nonfederal parties to expend resources to achieve these goals without being provided funding to cover the costs. UMRA generates information about how these potential federal mandates could affect other levels of government and the private sector as Congress and agency decision makers consider proposed legislation and regulations. Congress has asked GAO to evaluate the effectiveness of UMRA procedures and requirements several times since it was enacted. Based on that body of work, this testimony focuses on Title II of UMRA regarding federal mandates in rules and (1) describes the exceptions and exclusions in the act when identifying a federal mandate and (2) summarizes GAO findings on UMRA's implementation over the years and views of knowledgeable parties on potential improvements. GAO is not making recommendations in this testimony."
Date: February 15, 2011
Creator: United States. Government Accountability Office.
Object Type: Text
System: The UNT Digital Library
Federal Register, Volume 76, Number 31, February 15, 2011, Pages 8603-8870 (open access)

Federal Register, Volume 76, Number 31, February 15, 2011, Pages 8603-8870

Daily publication of the U.S. Office of the Federal Register contains rules and regulations, proposed legislation and rule changes, and other notices, including "Presidential proclamations and Executive Orders, Federal agency documents having general applicability and legal effect, documents required to be published by act of Congress, and other Federal agency documents of public interest" (p. ii). Table of Contents starts on page iii.
Date: February 15, 2011
Creator: United States. Office of the Federal Register.
Object Type: Journal/Magazine/Newsletter
System: The UNT Digital Library
Foreign Aid Reform, National Strategy, and the Quadrennial Review (open access)

Foreign Aid Reform, National Strategy, and the Quadrennial Review

This report addresses foreign aid reform through early 2011. Several development proponents, nongovernmental organizations (NGOs), and policymakers have pressed Congress to reform U.S. foreign aid capabilities to better address 21st century development needs and national security challenges. Foreign aid reform may continue to be a concern in the 112th Congress.
Date: February 15, 2011
Creator: Epstein, Susan B.
Object Type: Report
System: The UNT Digital Library
[Funeral Program for Mattie Ida Edwards, February 15, 2011] (open access)

[Funeral Program for Mattie Ida Edwards, February 15, 2011]

Funeral program for Mattie Ida Edwards, born May 16, 1924 and died February 9, 2011. The funeral was held February 15, 2011 at Holy Redeemer Catholic Church, officiated by Father Kevin Fausz. Funeral arrangements were made through Lewis Funeral Home and she was buried in Meadowlawn Park in San Antonio, Texas.
Date: February 15, 2011
Creator: unknown
Object Type: Pamphlet
System: The Portal to Texas History
FY2011 National Defense Authorization Act: Selected Military Personnel Policy Issues (open access)

FY2011 National Defense Authorization Act: Selected Military Personnel Policy Issues

This report focuses on the annual defense authorization process. It includes discussions of pay raises, insurance, social programs, and other personnel policy issues.
Date: February 15, 2011
Creator: Henning, Charles A.; Burrelli, David F.; Jansen, Don J. & Kapp, Lawrence
Object Type: Report
System: The UNT Digital Library