14,487 research outputs found

    The search for a national identity and the changing representations of Benedict Arnold : an honors thesis (HONRS 499)

    Get PDF
    It took one television movie to initiate this research on Benedict Arnold. However, it took four years of college history classes to come to a decision about why people "invent" certain versions of historical events and turn them into "facts". The A&E movie, A Question of Honor, served as the springboard for my research, and this paper offers a detailed exploration of why people choose to promote certain "truths" in the pursuit of patriotism and historical pride.This analysis was based on my interpretation of eighteenth, twentieth, and twenty-first century sources. I used the immediate eighteenth century reactions of Arnold's treason, as well as poems, plays, and novels by such authors as Benjamin Young Prime, William Dunlap, and Mason Locke Weems. Twentieth and twenty-first century children's books, biographies, and film have also been incorporated to get a more modern perspective on Arnold's treason. Included in the research are primary sources from such authors as biographers James Kirby Martin and William Sterne, as well as children's books by Clarence Lindsey Alderman and Ann Rinaldi. I have also relied on the works of Joyce Appleby, Lynn Hunt, Margaret Jacobs, and Eric Hobsbawm in order to get the theory and method of how the American identity was created.Using these sources I have developed my own interpretation of how the American identity was created through Benedict Arnold's actions. There was a need for Americans to create a symbol that would show what it meant to be "un-American." Arnold provided the symbolism that the American people needed to educate others on what it means not only to be "un-American," but also what it meant to be "American," a symbolism that has lived on in years of representations.Honors CollegeThesis (B.?.

    Power politics in Korea and its impact on Korean foreign and domestic affairs, 1882-1907 /

    Get PDF

    MATH 211-017: Calculus III A

    Get PDF

    MATH 111-001: Calculus I

    Get PDF

    MATH 111-005: Calculus I

    Get PDF

    A formally verified decentralized key management architecture for wireless sensor networks

    Get PDF
    We present a decentralized key management architecture for wireless sensor networks, covering the aspects of key deployment, key refreshment and key establishment. Our architecture is based on a clear set of assumptions and guidelines. Balance between security and energy consumption is achieved by partitioning a system into two interoperable security realms: the supervised realm trades off simplicity and resources for higher security whereas in the unsupervised realm the vice versa is true. Key deployment uses minimal key storage while key refreshment is based on the well-studied scheme of Abdalla et al. The keying protocols involved use only symmetric cryptography and have all been verified with our constraint solving-based protocol verification tool CoProVe

    Fumigant activity of plant essential oil from Armoracia rusticana (L.) on Plodia interpunctella (Lepidoptera: Pyralidae) and Sitophilus zeamais (Coleoptera: Curculionidae)

    Get PDF
    The fumigant toxicity of essential oil from horseradish plant, Armoracia rusticana (L.), was assessed against Plodia interpunctella (HĆ¼bner) and Sitophilus zeamais Motschulsky. A. rusticana oil was active against different life stages of P. interpunctella and adults of S. zeamais. The LC50 value for adults was the lowest and that of pupa was the highest. The major compound found by gas chromatography-mass spectrometry was allyl isothiocyanate (97.81%). These results indicate that it may be possible to achieve toxicity levels similar to those of standard chemical fumigants through the applications of essential oils from A. rusticana.Key word: Plant essential oil, Plodia interpunctella, Sitophilus zeamais, fumigant activity, allyl isothiocyanate

    Count three for wear able computers

    Get PDF
    This paper is a postprint of a paper submitted to and accepted for publication in the Proceedings of the IEE Eurowearable 2003 Conference, and is subject to Institution of Engineering and Technology Copyright. The copy of record is available at the IET Digital Library. A revised version of this paper was also published in Electronics Systems and Software, also subject to Institution of Engineering and Technology Copyright. The copy of record is also available at the IET Digital Library.A description of 'ubiquitous computer' is presented. Ubiquitous computers imply portable computers embedded into everyday objects, which would replace personal computers. Ubiquitous computers can be mapped into a three-tier scheme, differentiated by processor performance and flexibility of function. The power consumption of mobile devices is one of the most important design considerations. The size of a wearable system is often a design limitation

    Gastrulation in Parhyale hawaiensis: How do they do it?

    Get PDF

    Marketing Strategy: A Tool for Library and Information Services Delivery by Academic Libraries in Southwest Nigeria.

    Get PDF
    Adoption of marketing concept into information oriented organizations such as academic libraries has becomeĀ imperative especially with the proliferation of information technology where libraries are no longer seen as theĀ sole custodian of knowledge. This study therefore aimed at investigating the need for marketing strategy as toolĀ for library and information services delivery by academic libraries using the various technology driven facilities.Ā The survey research design was adopted for the study. Stratified sampling technique was used to select 6Ā libraries from federal, state and private owned universities in South Western Nigeria. Total enumerationĀ technique was used in selecting the sample size consisting of 148 librarians and library officers in theĀ institutions. Data were gathered using questionnaire and the findings revealed that face to face approach and useĀ of the notice boards are the most common methods used in these libraries. Though some marketing strategiesĀ are already in use, services like indexing and abstracting which is even an ancient strategy is giving way for newĀ technologies. Likewise, database searching, network and rich site summary, and email alerts which are theĀ commonest of all are yet to be fully embraced. It was revealed that adopting marketing strategies in serviceĀ delivery has enhanced the image of these libraries and has boosted library professionalsā€™ self actualization.Ā However, challenges such as inadequate skills and lack of funds among others constitute threats to effective useĀ of marketing strategies in library service delivery
    • ā€¦
    corecore