40 Matching Results

Results open in a new window/tab.

Altus Times (Altus, Okla.), Vol. 105, No. 264, Ed. 1 Tuesday, January 20, 2004 (open access)

Altus Times (Altus, Okla.), Vol. 105, No. 264, Ed. 1 Tuesday, January 20, 2004

Daily newspaper from Altus, Oklahoma that includes local, state, and national news along with advertising.
Date: January 20, 2004
Creator: Andrews, Mike
Object Type: Newspaper
System: The Gateway to Oklahoma History
European Views and Policies Toward the Middle East (open access)

European Views and Policies Toward the Middle East

None
Date: January 20, 2004
Creator: Archick, Kristin
Object Type: Report
System: The UNT Digital Library
Sapulpa Daily Herald (Sapulpa, Okla.), Vol. 88, No. 112, Ed. 1 Tuesday, January 20, 2004 (open access)

Sapulpa Daily Herald (Sapulpa, Okla.), Vol. 88, No. 112, Ed. 1 Tuesday, January 20, 2004

Daily newspaper from Sapulpa, Oklahoma that includes local, state, and national news along with advertising.
Date: January 20, 2004
Creator: Broaddus, Matthew B.
Object Type: Newspaper
System: The Gateway to Oklahoma History
Perry Daily Journal (Perry, Okla.), Vol. 111, No. 12, Ed. 1 Tuesday, January 20, 2004 (open access)

Perry Daily Journal (Perry, Okla.), Vol. 111, No. 12, Ed. 1 Tuesday, January 20, 2004

Daily newspaper from Perry, Oklahoma that includes local, state, and national news along with advertising.
Date: January 20, 2004
Creator: Brown, Gloria
Object Type: Newspaper
System: The Gateway to Oklahoma History
The Numerical Electromagnetics Code (NEC) - A Brief History (open access)

The Numerical Electromagnetics Code (NEC) - A Brief History

The Numerical Electromagnetics Code, NEC as it is commonly known, continues to be one of the more widely used antenna modeling codes in existence. With several versions in use that reflect different levels of capability and availability, there are now 450 copies of NEC4 and 250 copies of NEC3 that have been distributed by Lawrence Livermore National Laboratory to a limited class of qualified recipients, and several hundred copies of NEC2 that had a recorded distribution by LLNL. These numbers do not account for numerous copies (perhaps 1000s) that were acquired through other means capitalizing on the open source code, the absence of distribution controls prior to NEC3 and the availability of versions on the Internet. In this paper we briefly review the history of the code that is concisely displayed in Figure 1. We will show how it capitalized on the research of prominent contributors in the early days of computational electromagnetics, how a combination of events led to the tri-service-supported code development program that ultimately led to NEC and how it evolved to the present day product. The authors apologize that space limitations do not allow us to provide a list of references or to acknowledge the numerous …
Date: January 20, 2004
Creator: Burke, G J; Miller, E K & Poggio, A J
Object Type: Article
System: The UNT Digital Library
The Express-Star (Chickasha, Okla.), Ed. 1 Tuesday, January 20, 2004 (open access)

The Express-Star (Chickasha, Okla.), Ed. 1 Tuesday, January 20, 2004

Daily newspaper from Chickasha, Oklahoma that includes local, state, and national news along with advertising.
Date: January 20, 2004
Creator: Bush, Kent
Object Type: Newspaper
System: The Gateway to Oklahoma History
The Boerne Star (Boerne, Tex.), Vol. 98, No. 6, Ed. 1 Tuesday, January 20, 2004 (open access)

The Boerne Star (Boerne, Tex.), Vol. 98, No. 6, Ed. 1 Tuesday, January 20, 2004

Semiweekly newspaper from Boerne, Texas that includes local, state, and national news along with advertising.
Date: January 20, 2004
Creator: Cartwright, Brian & Morgan, Clay
Object Type: Newspaper
System: The Portal to Texas History
The Baytown Sun (Baytown, Tex.), Vol. 82, No. 49, Ed. 1 Tuesday, January 20, 2004 (open access)

The Baytown Sun (Baytown, Tex.), Vol. 82, No. 49, Ed. 1 Tuesday, January 20, 2004

Daily newspaper from Baytown, Texas that includes local, state, and national news along with advertising.
Date: January 20, 2004
Creator: Cash, Wanda Garner
Object Type: Newspaper
System: The Portal to Texas History
Tracking the Inside Intruder Using Net Log on Debug Logging in Microsoft Windows Server Operating Systems (open access)

Tracking the Inside Intruder Using Net Log on Debug Logging in Microsoft Windows Server Operating Systems

In today's well-connected environments of the Internet, intranets, and extranets, protecting the Microsoft Windows network can be a daunting task for the security engineer. Intrusion Detection Systems are a must-have for most companies, but few have either the financial resources or the people resources to implement and maintain full-scale intrusion detection systems for their networks and hosts. Many will at least invest in intrusion detection for their Internet presence, but others have not yet stepped up to the plate with regard to internal intrusion detection. Unfortunately, most attacks will come from within. Microsoft Windows server operating systems are widely used across both large and small enterprises. Unfortunately, there is no intrusion detection built-in to the Windows server operating system. The security logs are valuable but can be difficult to manage even in a small to medium sized environment. So the question arises, can one effectively detect and identify an in side intruder using the native tools that come with Microsoft Windows Server operating systems? One such method is to use Net Logon Service debug logging to identify and track malicious user activity. This paper discusses how to use Net Logon debug logging to identify and track malicious user activity both …
Date: January 20, 2004
Creator: Davis, CS
Object Type: Report
System: The UNT Digital Library
Tracking the Inside Intruder Using Net Log on Debug Logging in Microsoft Windows Server Operating Systems (open access)

Tracking the Inside Intruder Using Net Log on Debug Logging in Microsoft Windows Server Operating Systems

In today's well-connected environments of the Internet, intranets, and extranets, protecting the Microsoft Windows network can be a daunting task for the security engineer. Intrusion Detection Systems are a must-have for most companies, but few have either the financial resources or the people resources to implement and maintain full-scale intrusion detection systems for their networks and hosts. Many will at least invest in intrusion detection for their Internet presence, but others have not yet stepped up to the plate with regard to internal intrusion detection. Unfortunately, most attacks will come from within. Microsoft Windows server operating systems are widely used across both large and small enterprises. Unfortunately, there is no intrusion detection built-in to the Windows server operating system. The security logs are valuable but can be difficult to manage even in a small to medium sized environment. So the question arises, can one effectively detect and identify an in side intruder using the native tools that come with Microsoft Windows Server operating systems? One such method is to use Net Logon Service debug logging to identify and track malicious user activity. This paper discusses how to use Net Logon debug logging to identify and track malicious user activity both …
Date: January 20, 2004
Creator: Davis, CS
Object Type: Report
System: The UNT Digital Library
Position Estimation of Transceivers in Communication Networks (open access)

Position Estimation of Transceivers in Communication Networks

With rapid developments in wireless sensor networks, there is a growing need for transceiver position estimation independent of GPS, which may not be available in indoor networks. Our approach is to use range estimates from time-of-flight (TOF) measurements, a technique well suited to large bandwidth physical links, such as in ultra-wideband (UWB) systems. In our UWB systems, pulse duration less than 200 psecs can easily be resolved to less than a foot. Assuming an encoded UWB physical layer, we first test positioning accuracy using simulations. We are interested in sensitivity to range errors and the required number of ranging nodes, and we show that in a high-precision environment, such as UWB, the optimal number of transmitters is four. Four transmitters with {+-}20ft. range error can locate a receiver to within one or two feet. We then implement these algorithms on an 802.11 wireless network and demonstrate the ability to locate a network access point to approximately 20 feet.
Date: January 20, 2004
Creator: Dowla, F. & Kent, C.
Object Type: Article
System: The UNT Digital Library
HARNESS: Heterogeneous Adaptable Reconfigurable Networked Systems. Final Progress Report (open access)

HARNESS: Heterogeneous Adaptable Reconfigurable Networked Systems. Final Progress Report

HARNESS was proposed as a system that combined the best of emerging technologies found in current distributed computing research and commercial products into a very flexible, dynamically adaptable framework that could be used by applications to allow them to evolve and better handle their execution environment. The HARNESS system was designed using the considerable experience from previous projects such as PVM, MPI, IceT and Cumulvs. As such, the system was designed to avoid any of the common problems found with using these current systems, such as no single point of failure, ability to survive machine, node and software failures. Additional features included improved intercomponent connectivity, with full support for dynamic down loading of addition components at run-time thus reducing the stress on application developers to build in all the libraries they need in advance.
Date: January 20, 2004
Creator: Fagg, G. E.
Object Type: Report
System: The UNT Digital Library
Generals and Flag Officers: Senior Military Officer Confirmations (open access)

Generals and Flag Officers: Senior Military Officer Confirmations

From Summary: This report describes the Department of Defense (DOD) process which discloses to the Senate adverse information about senior military officers awaiting confirmation of a General or Flag Officer (GFO) personnel action, such as a promotion or appointment.
Date: January 20, 2004
Creator: Fernandez, Adolfo J.
Object Type: Report
System: The UNT Digital Library
A Fundamental Study of Laser-Induced Breakdown Spectroscopy Using Fiber Optics for Remote Measurements Of Trace Metals (open access)

A Fundamental Study of Laser-Induced Breakdown Spectroscopy Using Fiber Optics for Remote Measurements Of Trace Metals

Develop a fiber-optic imaging probe for microanalysis of solid samples; Design a time-resolved plasma imaging system to measure the development of the LIBS signal; Setup a laboratory system capable of timing two lasers independently, for optimizing and characterizing dual-pulse LIBS; Compare the development of laser-induced plasmas generated with a single laser pulse to the development of laser-induced plasmas generated with a pre-ablation spark prior to sample ablation; Examine the effect of sample matrix on the LIBS signals of elements in different sample matrices; Investigate the effect of excitation wavelength of the ablation beam in pre-ablation spark dual-pulse LIBS experiments; Determine the effect of the physical properties of the sample on the mass of materials ablated.
Date: January 20, 2004
Creator: Goode, Scott & Angel, S. Michael
Object Type: Report
System: The UNT Digital Library
Identifying performance bottlenecks on modern microarchitectures using an adaptable probe (open access)

Identifying performance bottlenecks on modern microarchitectures using an adaptable probe

The gap between peak and delivered performance for scientific applications running on microprocessor-based systems has grown considerably in recent years. The inability to achieve the desired performance even on a single processor is often attributed to an inadequate memory system, but without identification or quantification of a specific bottleneck. In this work, we use an adaptable synthetic benchmark to isolate application characteristics that cause a significant drop in performance, giving application programmers and architects information about possible optimizations. Our adaptable probe, called sqmat, uses only four parameters to capture key characteristics of scientific workloads: working-set size, computational intensity, indirection, and irregularity. This paper describes the implementation of sqmat and uses its tunable parameters to evaluate four leading 64-bit microprocessors that are popular building blocks for current high performance systems: Intel Itanium2, AMD Opteron, IBM Power3, and IBM Power4.
Date: January 20, 2004
Creator: Griem, Gorden; Oliker, Leonid; Shalf, John & Yelick, Katherine
Object Type: Article
System: The UNT Digital Library
The Sealy News (Sealy, Tex.), Vol. 117, No. 6, Ed. 1 Tuesday, January 20, 2004 (open access)

The Sealy News (Sealy, Tex.), Vol. 117, No. 6, Ed. 1 Tuesday, January 20, 2004

Semiweekly newspaper from Sealy, Texas that includes local, state, and national news along with advertising.
Date: January 20, 2004
Creator: Griffin, Joanie & Horecka, Bobby
Object Type: Newspaper
System: The Portal to Texas History
Stability of Stationary Solutions of the Multifrequency Radiation Diffusion Equations (open access)

Stability of Stationary Solutions of the Multifrequency Radiation Diffusion Equations

A nondimensional model of the multifrequency radiation diffusion equation is derived. A single material, ideal gas, equation of state is assumed. Opacities are proportional to the inverse of the cube of the frequency. Inclusion of stimulated emission implies a Wien spectrum for the radiation source function. It is shown that the solutions are uniformly bounded in time and that stationary solutions are stable. The spatially independent solutions are asymptotically stable, while the spatially dependent solutions of the linearized equations approach zero.
Date: January 20, 2004
Creator: Hald, O H & Shestakov, A I
Object Type: Article
System: The UNT Digital Library
Social Security: Raising or Eliminating the Taxable Earnings Base (open access)

Social Security: Raising or Eliminating the Taxable Earnings Base

Social Security taxes are levied on earnings up to a maximum level set each year. In 2004, this maximum — or what is referred to as the taxable earnings base — is $87,900. There is no similar base for the Medicare Hospital Insurance (HI) portion of the tax; all earnings are taxable for HI purposes. Elimination of the HI base was proposed by President Clinton and enacted in 1993, effectively beginning in 1994. Recently others have proposed that the base for Social Security be raised or eliminated as well. They complain that taxing earnings only up to a certain level creates a regressive tax. They point out that 94% of all workers whose earnings fall below this level have a greater proportion of earnings taxed than the 6% whose earnings exceed it.
Date: January 20, 2004
Creator: Haltzel, Laura
Object Type: Report
System: The UNT Digital Library
Remote Chemical Sensing Using Quantum Cascade Lasers (open access)

Remote Chemical Sensing Using Quantum Cascade Lasers

Research done by the IR sensors team at PNNL is focused on developing advanced spectroscopic methods for detecting signatures of nuclear, chemical, biological and explosives weapons or weapons production. The sensors we develop fall into two categories: remote sensors that can be operated at distances ranging from 150 m to 10 km, and point sensors that are used for in-situ inspection and detection. FY03 has seen an explosion in FM DIAL progress with the net result being solid confirmation that FM DIAL is a technique capable of remote chemical monitoring in a wide variety of venues. For example, FM DIAL was used to detect a small plume of hydrogen sulfide, a candidate CW agent, released in the desert environment of the Hanford 200 Area site. These experiments were conducted over a range of physical conditions including outside temperatures ranging from 70 F to 105 F and turbulence conditions ranging from quiescent to chaotic. We are now rapidly developing the information needed to design prototype FM DIAL systems that are optimized for specific applications that include scenarios such as fixed position stand-off detection and mobile UAV mounted remote monitoring. Just as an example, in FY04 we will use FM DIAL to …
Date: January 20, 2004
Creator: Harper, Warren W.; Strasburg, Jana D.; Aker, Pam M. & Schultz, John F.
Object Type: Report
System: The UNT Digital Library
Rains County Leader (Emory, Tex.), Vol. 116, No. 32, Ed. 1 Tuesday, January 20, 2004 (open access)

Rains County Leader (Emory, Tex.), Vol. 116, No. 32, Ed. 1 Tuesday, January 20, 2004

Weekly newspaper from Emory, Texas that includes local, state, and national news along with advertising.
Date: January 20, 2004
Creator: Hill, Earl Clyde, Jr.
Object Type: Newspaper
System: The Portal to Texas History
Lipid Membrane Composition Analyzed by Multi-isotope Imaging Mass Spectrometry (open access)

Lipid Membrane Composition Analyzed by Multi-isotope Imaging Mass Spectrometry

The lateral organization of lipids and membrane-associated proteins in biological membranes is often detected by fluorescence microscopy. Although extremely sensitive, fluorescent labels, particularly those attached to lipid molecules, may alter their physical properties.
Date: January 20, 2004
Creator: Hutcheon, I D; Weber, P K; Marxer, C G; Park, E S & Boxer, S G
Object Type: Article
System: The UNT Digital Library
Failure of Vapor Overheads Discharge Line for a Radioactive Waste Evaporator (open access)

Failure of Vapor Overheads Discharge Line for a Radioactive Waste Evaporator

A 2-inch schedule 40 steel core pipe in an evaporator overheads discharge line broke at several locations downstream from a section of the line where it bridges a road. Fish mouth openings that developed along the pipe seams were initiated at lack of fusion defects in the pipe welds. A vacuum created in the piping upstream of the breaks prevented full drainage of the water upon shut down of the pump. Freezing of water in the pipe (the line was not heat traced) and water hammer effects occurring with pump restart could each contribute to the extensive deformation and tearing observed at the breaks. Both the weld flaws and the over pressure contributed to the outcome. All pipe was replaced and a vacuum break was installed to eliminate the problem.
Date: January 20, 2004
Creator: Jenkins, C.F.
Object Type: Article
System: The UNT Digital Library
The Oklahoma Daily (Norman, Okla.), Vol. 87, No. 85, Ed. 1 Tuesday, January 20, 2004 (open access)

The Oklahoma Daily (Norman, Okla.), Vol. 87, No. 85, Ed. 1 Tuesday, January 20, 2004

Student newspaper of the University of Oklahoma in Norman, Oklahoma that includes national, local, and campus news along with advertising.
Date: January 20, 2004
Creator: King, Christopher R.
Object Type: Newspaper
System: The Gateway to Oklahoma History
Life-Cycle Cost Analysis of Energy Efficiency Design Options for Residential Furnaces and Boilers (open access)

Life-Cycle Cost Analysis of Energy Efficiency Design Options for Residential Furnaces and Boilers

In 2001, the U.S. Department of Energy (DOE) initiated a rulemaking process to consider whether to amend the existing energy efficiency standards for furnaces and boilers. A key factor in DOE's consideration of new standards is the economic impacts on consumers of possible revisions to energy-efficiency standards. Determining cost-effectiveness requires an appropriate comparison of the additional first cost of energy efficiency design options with the savings in operating costs. DOE's preferred approach involves comparing the total life-cycle cost (LCC) of owning and operating a more efficient appliance with the LCC for a baseline design. This study describes the method used to conduct the LCC analysis and presents the estimated change in LCC associated with more energy-efficient equipment. The results indicate that efficiency improvement relative to the baseline design can reduce the LCC in each of the product classes considered.
Date: January 20, 2004
Creator: Lutz, James; Lekov, Alex; Whitehead, Camilla Dunham; Chan, Peter; Meyers,Steve & McMahon, James
Object Type: Report
System: The UNT Digital Library