4,986 research outputs found

    Nucleoprotein content of "L" strain of Staphylococcus aureus

    Full text link
    Thesis (M.A.)--Boston Universit

    Identification and Characterization of Microbial Contaminants and Associated Bacterial Viruses in Bioethanol Production Facilities to Suggest a Potential Alternative to Antibiotic Treatment

    Get PDF
    In recent years, bioethanol has received worldwide interest as a bioenergy source. This interest has stimulated the production of substantial quantities of ethanol annually. However, the inability to produce bioethanol under sterile conditions plagues the industry, resulting in frequent microbial contamination. Bacterial contamination is one of the more challenging problems facing the bioethanol industry because contaminants drastically lower ethanol yield. Conventional methods of antibiotic application to eradicate bacterial contaminants are expensive and prohibitive. A more sustainable approach to control bacterial contamination of industrial ethanol fermentation systems is to use bacteriophages (phage). The goal of this research was to create a cocktail of phages capable of infecting and eliminating bacterial contaminants that hinder the production of bioethanol. I isolated, purified, and characterized the common bacterial contaminants in an industrial bioethanol fermenter and beerwell and demonstrated that bacteriophage could be induced from some of these cultures. Further research is needed to determine if virulent mutants of these phages can be generated

    Trees of Western Australia. 87. Eucalyptus kruseana F. Muell. 88. Eucalyptus macrandra F. Muell. ex. Benth. 89. Mallalie. 90. The rose mallee (Eucalyptus rhodantha Blakely and Steedman)

    Get PDF
    THIS very decorative shrub was described by Baron von Mueller in the Australian Journal of Pharmacy in 1895 from specimens collected in the Fraser Range

    A model for integrating a career development course program into a college curriculum

    Get PDF
    The purpose of this dissertation is to address the need to practicalize higher education by expanding career coursework into an ongoing career curriculum, beginning in a student\u27s freshman year of college. Career development needs to serve as a finishing school for a college degree, the place where all a student has learned is combined into an awareness of the talents and skills they have developed, and can now be marketed to potential employers. The working world has become a volatile environment, and we do our students a disservice if we do not properly prepare them for the reality of the workplace of the 21st century by helping them monetize what they\u27ve learned. Unlike previous generations in which people often worked for one company during their entire career, corporate loyalty and job security are now a thing of the past. In the postmodern world, changes in the social context and global perspectives have changed the properties of career to one that is described as mobile, self-determined, employer independent, and free of hierarchy (DeFillippi & Arthur, 1994, p. 309). Unlike their parents, college students today will probably never work for just one employer and then retire. For them, work will mean freelancing. A freelancer is defined as a person who sells services to employers without a long-term commitment to any of them (Freelance, n.d.). Chapter One of this paper sets forth a brief background on the issue, the problem and why it is important, and the purpose and significance of the study. Chapter Two is the literature review, and includes an historical overview of career development in the United States, best practice career development courses in higher education, and a discussion of the theoretical model. Chapter Three deals with the methodology, including the research questions, the subjects to be interviewed, and how the data will be collected. Chapter Four provides the results of the research survey. Chapter Five summarizes the findings, discusses their implications, and presents suggestions and a new model based on those findings

    Authentication : can mobile environments be secured?

    Get PDF
    Due to the character of the original source materials and the nature of batch digitization, quality control issues may be present in this document. Please report any quality issues you encounter to [email protected], referencing the URI of the item.Includes bibliographical references (leaves 29-32).A mobile system is defined as a network in which one or more of the interconnection links is a wireless medium. Wireless media include but are not limited to, cellular or radio transmissions, satellite services, and wireless computer networks. The fundamental operations of storage, processing, and transmission of information are undergoing such rapid improvement that the application of securing mobile systems cannot keep up with the rate of advance. This research analyzes security problems and investigates possible solutions that stem from the absence of a "fixed" link between the user and service provider in mobile systems. This research approaches all security issues from the authentication standpoint, i.e. the process of reliably verifying the identity of two parties in a communication channel. Once identities have been verified, the channel authenticity must be maintained. Mobile communication systems that utilize three systems, symmetric ciphers, public key systems, and zero-knowledge techniques, are shown to be highly secure. The level security is not degraded due to the absence of a "fixed" link between the user and service provider

    Door to Remain: Community in Poetry\u27s Threshold

    Get PDF
    Austin Segrest, recipient of the 2022 Faculty Convocation Award, saw his debut book, Door to Remain, garner significant praise even before it hit bookshelves this spring. The book of poetry from the Lawrence University assistant professor of English took home the 2021 Vassar Miller Poetry Prize last year. Published by University of North Texas Press, the deeply personal book presents poems focused on Segrest’s mother, Susu, who died in 2003 when he was 23, and his time growing up in Alabama. Segrest, whose poetry also can be found in Poetry, The Yale Review, The Threepenny Review, Ecotone, New England Review, and Ploughshares, will deliver the Honors Convocation address at 12:30 p.m. May 27 in Memorial Chapel. He has been teaching at Lawrence since 2014, first as a visiting professor and for the last three years as an assistant professor of English. He teaches classes in poetry writing and literature, as well as First-Year Studies. Segrest earned a bachelor’s degree from Emory University, an MFA in poetry at Georgia State University, and a Ph.D. in literature and creative writing (poetry) at the University of Missouri

    Trees of Western Australia. 83. The many flowered mallee (Eucalyptus Cooperiana F. Muell). 84. The Yate (E. cornuta Labill.). 85. The grey gum (E. Griffithsii Maiden). 86. E. albida (Maiden and Blakely)

    Get PDF
    THIS species was described by Mueller in February, 1880, from a fragment with buds and flowers without fruits, collected by George Maxwell in South-Western Australia, without any locality. It remained imperfectly known until a few years ago when a specimen was collected, again without precise locality, but somewhere between Esperance and Eyre

    Does Attractiveness Matter For Sex Offenders? An Examination Of Defendant Attractiveness, Defendant Gender, And Crime Severity

    Get PDF
    There has been an abundance of research showcasing an attraction-leniency bias that benefits attractive defendants of various crimes. However, this bias tends to diminish if the crime is deemed serious or if the defendant uses his or her attractiveness to commit the crime (i.e., swindle). The purpose of the current study is to investigate judgments made about a defendant being accused of a sexual offense. The study represents a 2 (gender of defendant) x 3 (attractiveness of defendant: attractive, unattractive, no picture) x 3 (crime severity: low, medium, high) factorial design. Participants (N = 686) were asked to report their beliefs regarding the case. Results showed that gender and attractiveness did not affect the sentence length. However, gender and attractiveness did interact for conviction belief, such that participants were less willing to convict the attractive and not pictured woman compared to the other defendants. In addition, although women were sentenced to less time than men, attraction of the defendant did not affect whether participants believed the defendant should register as a sex offender or the length of time on the registry. The present study provides insight into how people perceive sex offenders based upon gender and attractiveness

    M*A*S*H, The Longest Yard and the Integrationist Imagination in the Post-Segregation Era

    Get PDF
    • …
    corecore