Degree Level

The Effects of Response Restriction on Non-Socially Maintained Self-Injury

Access: Use of this item is restricted to the UNT Community
This study examined the effects of response restriction (blocking and protective equipment) on subsequent durations of self-injury with two female participants with developmental disabilities. First, a functional analysis was conducted with each participant to identify potential maintaining variables of the self-injury. Second, access to the response was systematically restricted in a multiple schedule restriction paradigm. A baseline extended alone was conducted without the restriction component in place as a control condition. For one participant the results suggested that response restriction may have increased subsequent durations of responding once the restriction element was removed. For a second participant responding did not appear to be affected by the restriction component.
Date: May 2003
Creator: Blevins, Travis
System: The UNT Digital Library

Our enemy, ourselves: Political conspiracy in American cinema, 1970-present.

Access: Use of this item is restricted to the UNT Community
This thesis is an examination of "paranoid conspiracy" films, a film noir subgenre that emerged in mainstream American cinema in the early 1970s and turns on vast, shadowy conspiracies located within U.S. "power structures" (government agencies, the military, the media) and directed against the American public. Specifically, it focuses on the emergence of these films in the 1970s, their almost complete disappearance during the Reagan presidency, and subsequent reemergence in the early 1990s. Placing representative texts in the context of U.S. political and social reality of the last three decades, it analyzes the relationship between the conspiracy theory genre, the "crisis of confidence" in the American society, and the process of formation of American national identity.
Date: August 2003
Creator: Budziszewski, Przemyslaw
System: The UNT Digital Library

The Pink Papers

Access: Use of this item is restricted to the UNT Community
The Pink Papers is a collection of three short stories and a novel in progress consisting of four chapters. Each piece is a work of original fiction. The preface addresses the female writer and the female voice in fiction. "Broken Clock" and "Pink Paper" are the stories of two girls coping with endometriosis. "Normal Capacity" looks at the loss of a dream through the eyes of a first-year law student. The novel in progress, titled Blanchard, OK, is set in a rural farming town in Oklahoma. The novel tells the stories of 24-year-old Robin, her Aunt Paula, and Paula's boyfriend, Sam.
Date: August 2003
Creator: Blagg, Caroline
System: The UNT Digital Library

Bounded Dynamic Source Routing in Mobile Ad Hoc Networks

Access: Use of this item is restricted to the UNT Community
A mobile ad hoc network (MANET) is a collection of mobile platforms or nodes that come together to form a network capable of communicating with each other, without the help of a central controller. To avail the maximum potential of a MANET, it is of great importance to devise a routing scheme, which will optimize upon the performance of a MANET, given the high rate of random mobility of the nodes. In a MANET individual nodes perform the routing functions like route discovery, route maintenance and delivery of packets from one node to the other. Existing routing protocols flood the network with broadcasts of route discovery messages, while attempting to establish a route. This characteristic is instrumental in deteriorating the performance of a MANET, as resource overhead triggered by broadcasts is directly proportional to the size of the network. Bounded-dynamic source routing (B-DSR), is proposed to curb this multitude of superfluous broadcasts, thus enabling to reserve valuable resources like bandwidth and battery power. B-DSR establishes a bounded region in the network, only within which, transmissions of route discovery messages are processed and validated for establishing a route. All route discovery messages reaching outside of this bounded region are dropped, thus …
Date: August 2003
Creator: George, Glyco
System: The UNT Digital Library

Combating Corruption: A Comparison of National Anti-Corruption Efforts

Access: Use of this item is restricted to the UNT Community
The primary goal of this thesis is to provide a comparative analysis of the institutional and organizational mechanisms designed to monitor and control political corruption at the national level. The paper will provide comparisons of these arraignments and control systems across three nations. The thesis will identify differences across countries in terms of organizational and institutional political corruption control mechanisms, and use the CPI index to suggest and identify those control mechanisms that appear to be present in nations with low CPI measurements. Finally, the thesis will conclude with the discussion concerning the future prospects for controlling political corruption in Turkey based on the comparative analysis described above.
Date: August 2003
Creator: Turer, Ahmet
System: The UNT Digital Library

Godot in Earnest: Beckettian Readings of Wilde

Access: Use of this item is restricted to the UNT Community
Critics and audiences alike have neglected the idea of Wilde as a precursor to Beckett. But I contend that a closer look at each writer's aesthetic and philosophic tendencies-for instance, their interest in the fluid nature of self, their understanding of identity as a performance, and their belief in language as both a way in and a way out of stagnancy -will connect them in surprising and highly significant ways. This thesis will focus on the ways in which Wilde prefigures Beckett as a dramatist. Indeed, many of the themes that Beckett, free from the constraints of a censor and from the societal restrictions of Victorian England, unabashedly details in his drama are to be found residing obscurely in Wilde. Understanding Beckett's major dramatic themes and motifs therefore yields new strategies for reading Wilde.
Date: August 2003
Creator: Tucker, Amanda
System: The UNT Digital Library

Secret Key Agreement without Public-Key Cryptography

Access: Use of this item is restricted to the UNT Community
Secure communication is the primary challenge in today's information network. In this project an efficient secret key agreement protocol is described and analyzed along with the other existing protocols. We focus primarily on Leighton and Micali's secret-key agreement without the use of public-key encryption techniques. The Leighton-Micali protocol is extremely efficient when implemented in software and has significant advantages over existing systems like Kerberos. In this method the secret keys are agreed upon using a trusted third party known as the trusted agent. The trusted agent generates the keys and writes them to a public directory before it goes offline. The communicating entities can retrieve the keys either from the online trusted agent or from the public directory service and agree upon a symmetric-key without any public-key procedures. The principal advantage of this method is that the user verifies the authenticity of the trusted agent before using the keys generated by it. The Leighton-Micali scheme is not vulnerable to the present day attacks like fabrication, modification or denial of service etc. The Leighton-Micali protocol can be employed in real-time systems like smart cards. In addition to the security properties and the simplicity of the protocol, our experiments show that in …
Date: August 2003
Creator: Surapaneni, Smitha
System: The UNT Digital Library

Paying for the Arts: Fundraising Methods for Secondary Theater Programs

Access: Use of this item is restricted to the UNT Community
This project in lieu of thesis identifies successful methods of fundraising utilized by a sampling of three secondary theater arts programs from North Texas. Programs were evaluated on their ability to fund their programs and provide a quality arts education for their students. Guidelines for fundraising were developed that allow secondary theater programs to flourish without placing an additional burden on already overextended tax system. Findings were framed in a Marxist socio-economic context, seeking to find some relation between supply-side economics and the failure of certain communities to offer quality arts programs. Marxist philosophy, emphasizing the values of community and shared wealth, served to frame findings in the context of arts programs serving and enhancing their own communities.
Date: August 2003
Creator: Soward, David B.
System: The UNT Digital Library

Register Unification in Light of Twentieth-Century Vocal Pedagogy

Access: Use of this item is restricted to the UNT Community
The registers of the singing voice, as commonly understood by singers, refer to the different vocal qualities induced by adjustments at the level of the larynx and of the vocal tract. This explains why register unification can be approached either one or a combination of the following procedures: (1) resonance alignment through vowel modification, (2) register alignment through intensity exercises. The wide-spread acceptance of vowel modification has made singers reluctant in exploring other avenues of register development. If registers are laryngeally derived, there should be another way of register unification, which directly addresses the coordination of the laryngeal muscles. In support of this argument, this thesis investigates the teaching practices of a group of twentieth-century American voice teachers, who rely on intensity manipulation as the primary means for enhancing the register adjustments. Intensity exercises such as the messa di voce has long been practiced in historical pedagogy, but it is not until now that voice science confirmed its significance in register coordination.
Date: August 2003
Creator: Tan, Haidee Lynn C.
System: The UNT Digital Library

Synthesis and Properties of Novel Cage-Annulated Crown Ethers

Access: Use of this item is restricted to the UNT Community
Three cage-functionalized polyoxacrown ethers (9, 10 and 12) and four novel cage-functionalized polyoxamonoazacrown ethers (18, 20, 25 and 29) that contain 3,5-disubstituted-4-oxahexacyclo[5.4.0.02,6.03,10.05,9.08,11]dodecane ("oxahexacyclic") moiety have been synthesized and their respective alkali metal picrate extraction profiles along with that of three analogues 13, 14 and 21 have been obtained. The observed avidities and selectivities of the host molecules toward complexation and transport of alkali metal picrates can be related to the size and shape of their respective macrocyclic cavity and the number of donor atoms. The effect of N-alkyl substitution on the complexation properties of azacrown ethers has been studied. The avidity of N-Et azacrown ethers toward complexation with alkali metal cations is generally higher than that of the corresponding non-N-alkylated hosts. However, the presence of an N-Et group appears to have a negligible effect upon their relative selectivities in their regards. The effect of pH on extraction process was studied; it was thereby determined that the alkali metal picrate extraction experiments are best performed at high pH (ca. 11-12).
Date: May 2003
Creator: Huang, Zilin
System: The UNT Digital Library

Characterization of Iron Oxide Deposits Formed at Comanche Peak Steam Electric Station

Access: Use of this item is restricted to the UNT Community
The presence of deposits leading to corrosion of the steam generator (SG) systems is a major contributor to operation and maintenance cost of pressurized water reactor (PWR) plants. Formation and transport of corrosion products formed due to the presence of impurities, metallic oxides and cations in the secondary side of the SG units result in formation of deposits. This research deals with the characterization of deposit samples collected from the two SG units (unit 1 and unit 2) at Comanche Peak Steam Electric Station (CPSES). X-ray diffraction (XRD), Fourier transform infrared spectrophotometry (FTIR), scanning electron microscopy (SEM), and energy dispersive spectroscopy (EDS) techniques have been used for studying the compositional and structural properties of iron oxides formed in the secondary side of unit 1 and unit 2. Magnetite (Fe3O4) was found to be predominant in samples from unit 1 and maghemite (g-Fe2O3) was found to be the dominant phase in case of unit 2. An attempt has been made to customize FTIR technique for analyzing different iron oxide phases present in the deposits of PWR-SG systems.
Date: May 2003
Creator: Namduri, Haritha
System: The UNT Digital Library

Personality Correlates of Eating Disorder Symptomatology in a Nonclinical Sample of Female Undergraduates

Access: Use of this item is restricted to the UNT Community
Research indicates the existence of an eating disorder continuum. The two-component model of disordered eating suggests that certain personality traits may increase an individual's vulnerability to develop more severe variants of disordered eating symptomatology. The present study investigates pre-clinical elevations on a measure of personality based on the Five-Factor Model (FFM) and pre-clinical elevations on a measure of eating disorder symptomatology in a sample of nonclinical undergraduates. The personality dimensions Neuroticism, Extraversion, and Agreeableness accounted for 7% of the variability in Body Dissatisfaction. Subcomponents comprising the personality dimensions of the FFM as determined by Saucier (1998) (see Appendix A) were analyzed. The Self-Reproach and Intellectual Interests subcomponents were the strongest predictors of Drive for Thinness and Body Dissatisfaction. The subcomponent Sociability was the strongest predictor of Bulimia. Findings present implications for prevention and treatment interventions. Longitudinal studies are needed to determine the temporal directionality of personality and disturbed eating.
Date: May 2003
Creator: Baker, Kristine Genovese
System: The UNT Digital Library

Effects of Web-based Instruction in High School Chemistry.

Access: Use of this item is restricted to the UNT Community
The intent of this study is to identify correlations that might exist between Web-based instruction and higher assessment scores in secondary education. The study framework was held within the confines of a public high school chemistry classroom. Within this population there were students identified as gifted and talented (GT) as well as those without this designation. These two classifications were examined for statistically higher assessment scores using a two-tailed t-test. Results indicated that females outperformed males on pre- and post- instructional unit tests. All subgroups improved their logical-thinking skills and exhibited positive attitudes towards Web-based instruction. In general, Web-based instruction proved beneficial to improving classroom performance of all GT and non-GT groups as compared to traditional classroom instruction.
Date: May 2003
Creator: Stratton, Eric W.
System: The UNT Digital Library

Evaluation of MPLS Enabled Networks

Access: Use of this item is restricted to the UNT Community
Recent developments in the Internet have inspired a wide range of business and consumer applications. The deployment of multimedia-based services has driven the demand for increased and guaranteed bandwidth requirements over the network. The diverse requirements of the wide range of users demand differentiated classes of service and quality assurance. The new technology of Multi-protocol label switching (MPLS) has emerged as a high performance and reliable option to address these challenges apart from the additional features that were not addressed before. This problem in lieu of thesis describes how the new paradigm of MPLS is advantageous over the conventional architecture. The motivation for this paradigm is discussed in the first part, followed by a detailed description of this new architecture. The information flow, the underlying protocols and the MPLS extensions to some of the traditional protocols are then discussed followed by the description of the simulation. The simulation results are used to show the advantages of the proposed technology.
Date: May 2003
Creator: Ratnakaram, Archith
System: The UNT Digital Library

Study and Sample Implementation of the Secure Shell Protocol (SSH)

Access: Use of this item is restricted to the UNT Community
Security is one of the main concerns of users who need to connect to a remote computer for various purposes, such as checking e-mails or viewing files. However in today's computer networks, privacy, transmission to intended client is not guaranteed. If data is transmitted over the Internet or a local network as plain text it may be captured and viewed by anyone with little technical knowledge. This may include sensitive data such as passwords. Big businesses use firewalls, virtual private networks and encrypt their transmissions to counter this at high costs. Secure shell protocol (SSH) provides an answer to this. SSH is a software protocol for secure communication over an insecure network. SSH not only offers authentication of hosts but also encrypts the sessions between the client and the server and is transparent to the end user. This Problem in Lieu of Thesis makes a study of SSH and creates a sample secure client and server which follows SSH and examines its performance.
Date: May 2003
Creator: Subramanyam, Udayakiran
System: The UNT Digital Library

Students' Perception of Videoconference Courses: A Case Study of the University of North Texas

Access: Use of this item is restricted to the UNT Community
The objective of the survey is to observe students' perceptions of videoconference courses offered by the University of North Texas (UNT). The perceptions of 348 students enrolled in videoconferencing (VC) courses in the fall 2002 semester were obtained through a 29-item course evaluation questionnaire. From this study, I conclude generally that UNT students perceive videoconference courses as a positive stride in providing classes. While it was expected that students at remote sites would experience greater technological problems and lower levels of student/teacher interaction, evaluations from remote sites indicate higher degrees of student satisfaction than those students taking VC courses at the main campus location.
Date: May 2003
Creator: Christopher, Chris-Junior
System: The UNT Digital Library

Divine and the Everyday Devil (Short Stories)

Access: Use of this item is restricted to the UNT Community
Divine and the Everyday Devil contains a scholarly preface that discusses the experiences and literary works that influenced the author's writing with special attention in regards to spirituality and sexuality. The preface is followed by six original short stories. "Evil" is a work addressing a modern conception of evil. "Eschatology" concerns a man facing his own mortality. "The Gospel of Peter" tells the story of a husband grappling with his wife's religious beliefs. "The Mechanics of Projects" relates the experiences of a woman looking for love in Mexico. "The Rocky Normal Show" involves a husband growing apart from his wife and "Mutant: An Origin Story" is about a teenager trying to find his own unique identity.
Date: May 2003
Creator: Burks, T. Stephen
System: The UNT Digital Library

Use of Geographic Information System and Remote Sensing Technologies to Describe Mosquito Population Dynamics in the Ray Roberts Greenbelt, Denton County, Texas

Access: Use of this item is restricted to the UNT Community
A population survey was conducted from April through September 2002 on mosquito species occurring on the Ray Roberts Greenbelt, a riparian corridor used for public recreation on the Elm Fork of the Trinity River, in Denton County, Texas. ArcGIS software was used to set up a stratified random sampling design based on habitat parameters. Multivariate analyses of sampling data and climatic variables were used to describe spatial and temporal patterns of mosquito species. A total of 33 species were collected during this study belonging to the following genera: Aedes, Anopheles, Coquillettidia, Culex, Mansonia, Ochlerotatus, Orthopodomyia, Psorophora, Toxorhynchites, and Uranotaenia. Seasonal distributions of the dominant species revealed population fluctuations. Aedes vexans was the primary species collected in April and May, occurring in low numbers throughout the rest of the sampling period. Psorophora columbiae reached its highest population density in June, with a smaller peak occurring in late July. Present from May through the end of September, Culex erraticus was the most abundant species collected with major peaks in mid-June and the end of July. Abundance of Culex salinarius followed the same general trend as that for Cx. erraticus, but with smaller numbers. The specimens were tested for a variety of arboviruses …
Date: May 2003
Creator: Bolling, Bethany G.
System: The UNT Digital Library

The Production Effects of Protectionist Announcements: An Examination of the Steel Industry

Access: Use of this item is restricted to the UNT Community
The well-being of the American steel industry is vital to the overall health of the United States (U.S.) economy. This belief is, in part, the impetus for the enactment of protective tariffs and quotas. This paper examines the impact of the announcement of the 2001 tariffs. Numerous forces have buffeted the U.S. steel industry over the last decade. Domestic steel firms operate in a highly global, fiercely competitive, and capital-intensive industry. This environment has proven inhospitable to the U.S. steel industry, widely criticized for inefficiency and overcapacity. A regression analysis finds that the announcement of the 2001 tariffs had no statistically significant impact on U.S. domestic raw steel production. Supporting theories are reexamined, and the implications of this finding for trade policy are explored.
Date: May 2003
Creator: Pharr, Matthew C.
System: The UNT Digital Library

The Effects of Alternative Contingencies on Instruction Following.

Access: Use of this item is restricted to the UNT Community
The purpose of this experiment was to evaluate the effects of alternative contingencies on instruction following by an ABA design. Three college students consistently pressed keys 1-5-3 and 4-8-6 in the presence of the written instruction "Press 153" or "Press 486." During condition A, the contingencies for following and not following the instruction were the same: CON FR5 FR5 and CON FR20 FR20. During condition B, the contingencies for following and not following the instruction were different: CON FR20 FR5. For one participant, the schedule of reinforcement was then changed to FR30. The results showed that subjects followed instructions when the schedule of reinforcement was the same for instruction following and not following.
Date: May 2003
Creator: Patti, Nicole
System: The UNT Digital Library

The Concept of Dignity in the Early Science Fiction Novels of Kurt Vonnegut.

Access: Use of this item is restricted to the UNT Community
Kurt Vonnegut's early science fiction novels depict societies and characters that, as in the real world, have become callous and downtrodden. These works use supercomputers, aliens, and space travel, often in a comical manner, to demonstrate that the future, unless people change their concepts of humanity, will not be the paradise of advanced technology and human harmony that some may expect. In fact, Vonnegut suggests that the human condition may gradually worsen if people continue to look further and further into the universe for happiness and purpose. To Vonnegut, the key to happiness is dignity, and this key is to be found within ourselves, not without.
Date: May 2003
Creator: Dye, Scott Allen
System: The UNT Digital Library

Increasing the Dynamic Range of Audio THD Measurements Using a Novel Noise and Distortion Canceling Methodology

Access: Use of this item is restricted to the UNT Community
The objective of this study was to determine how a new experimental methodology for measuring Total-Harmonic-Distortion (THD) of operational amplifiers functioned when compared with two standard methodologies, and whether the new methodology offers any improvement in noise floor and dynamic range along with distortion canceling of the sine-wave source used in the testing. The new methodology (THD) is being tested against two standard methodologies: Spectral Analysis using a tuned receiver type Spectrum Analyzer with Notch Filter pre-processing, and a digitized Fast Fourier Transform (FFT) using Notch Filter pre-processing. The THD results appear to agree across all methodologies, and across all items of the sample within all methodologies, to within a percent or less. The distortion and noise canceling feature of the new methodology appeared to function as expected and in accordance with theory. The sample tested in the study consisted of thirty-five NE5534 operational amplifiers produced by Texas Instruments, Inc. and purchased from a local store. The NE5534 is a low-noise, low-distortion, operational amplifier that is widely used in industry and is representative of today's best audio amplifiers.
Date: May 2003
Creator: Dunipace, Richard Alan
System: The UNT Digital Library

A parametric analysis of the immediate and subsequent effects of response restriction on hand mouthing.

Access: Use of this item is restricted to the UNT Community
The immediate and subsequent effects of different durations of response restriction were evaluated in a multiple schedule design. Response restriction components of 15, 30, and 60 minutes were conducted between 15 minute alone components. Levels of responding subsequent to the termination of response restriction procedures were compared to free operant levels prior to the implementation of response restriction. Responding during response restriction components reduced to near zero levels. Subsequent levels of responding were similar to or exceeded free operant baseline levels. Results are discussed in terms of potential operant mechanisms responsible for levels of responding subsequent to response restriction.
Date: May 2003
Creator: Soderlund, Michael J.
System: The UNT Digital Library

Sex and Gender Differences in Perceived and Actual Leadership Performance: Self- and Subordinate Views

Access: Use of this item is restricted to the UNT Community
The purpose of this study was to examine how male and female leaders view their own effectiveness as compared to their objective performance. This study also examined sex and gender differences in subordinate's views of male and female leaders. Forty-two mixed-sex groups led by appointed male and female leaders were observed to assess objective and perceived leader effectiveness. Gender role of participants was assessed using the Bem Sex Role Inventory (BSRI). No sex or gender differences were found in objective leadership effectiveness. An unexpected finding was that male and female leaders perceived themselves accurately as leaders. Significant differences were found in the way male subordinates rated men and women leaders when taking into account gender role. Results indicated that the study of gender bias in leadership is complex and should be examined in conjunction with gender role. Social role theory helps to explain this bias.
Date: May 2003
Creator: Rivero, Arlene Jean
System: The UNT Digital Library