1,965 research outputs found

    The World War One Gold Star Soldiers From Adams County

    Full text link
    Adams County had 1,074 men and 12 women in the military in World War I, 53 of whom died while in service, becoming Gold Star soldiers. During this war, the practice of displaying a flag with a blue star was begun to signify that a family member was fighting in the war; when a soldier died, the blue star was changed to a gold star. The term “Gold Star” soldier came to represent a member of the service who died during a time of conflict, and is still in use today. Adams County’s Gold Star soldiers were described in a book published in 1921 by Percy S. Eichelberger and Paul L. Foulk entitled Adams County in the World War: April 6, 1917 to November 11, 1918. A copy of this book came to my possession from my mother, Rena Bower Young, a niece of Paul Foulk and his wife Mary Bower Foulk, whose families were from Adams County (Foulk from Mt. Pleasant Township and Bower from New Oxford). Mary was the younger sister of my mother’s father, Chester Allen Bower. They also had an older brother, two older sisters, and a younger brother, Charles Edward Bow-er (called Charlie). Both Chester and Charlie served in the Great War; Chester with the Army’s 79th Division at the Meuse-Argonne Offensive in France (September to November 1918), and Charlie with Medical Supply Depots at Camp Merritt (New Jersey) and Camp Mills (New York). Chester survived the war and returned to New Oxford in 1919. Charlie perished from the influenza pandemic while stationed at Camp Mills in October 1918. Thus, the Bowers of New Oxford were a Gold Star family. [excerpt

    Bringing to Life the Grandfather I Never Knew

    Full text link
    My grandfather, Chester Allen Bower, was born in New Oxford, Pennsylvania on August 30, 1894 and died near there in Hanover on December 30, 1939. He was my mother\u27s father, and she was just 12 years old when he died. I never had the chance to meet him. Chester served in the Great War in the U.S. Army\u27s 79th Division, which took part in the Meuse-Argonne Offensive from September to November 1918. This Offensive was the largest military operation ever undertaken by the U.S. Army at that time and its success led, in part, to the end of the war. My grandfather was not wounded in the war, but he was gassed very close to the Armistice, around November 3, 1918. This gassing was thought to have contributed to his long-term health issues, and ultimately to his early death at age 45. [excerpt

    Decoupling Crossover in Asymmetric Broadside Coupled Split Ring Resonators at Terahertz Frequencies

    Get PDF
    We investigate the electromagnetic response of asymmetric broadside coupled split ring resonators (ABC-SRRs) as a function of the relative in-plane displacement between the two component SRRs. The asymmetry is defined as the difference in the capacitive gap widths (\Delta g) between the two resonators comprising a coupled unit. We characterize the response of ABC-SRRs both numerically and experimentally via terahertz time-domain spectroscopy. As with symmetric BC-SRRs (\Delta g=0 \mu m), a large redshift in the LC resonance is observed with increasing displacement, resulting from changes in the capacitive and inductive coupling. However, for ABC-SRRs, in-plane shifting between the two resonators by more than 0.375Lo (Lo=SRR sidelength) results in a transition to a response with two resonant modes, associated with decoupling in the ABC-SRRs. For increasing \Delta g, the decoupling transition begins at the same relative shift (0.375Lo), though with an increase in the oscillator strength of the new mode. This strongly contrasts with symmetric BC-SRRs which present only one resonance for shifts up to 0.75Lo. Since all BC-SRRs are effectively asymmetric when placed on a substrate, an understanding of ABC-SRR behavior is essential for a complete understanding of BC-SRR based metamaterials

    A Small Story Speaks Louder: Insights from an Internal Evaluation of the Discussion Circle Project

    Get PDF
    This paper reports on a small-scale internal evaluation of the Discussion Circle (DC) project within the English Language Institute (ELI) Listening and Speaking level 80 class at the University of Hawaii at Manoa. Four questions were asked to evaluate DC project in online and face-to-face ELI 80. The study employed a variety of methods aimed at collecting data from multiple directions about the DC project and its implementation

    Opera Gala 2008

    Get PDF
    Kennesaw State University School of Music presents Opera Gala 2008.https://digitalcommons.kennesaw.edu/musicprograms/1603/thumbnail.jp

    Twitter Use and its Effects on Student Perception of Instructor Credibility

    Get PDF
    This study investigates college student perceptions of instructor credibility based on the content of an instructor’s Twitterfeed and student beliefs about Twitter as a communication tool. Quantitative and qualitative methods were utilized to explore the effects of three manipulated Twitter feeds (e.g., tweeting social topics, professional topics, or a blend) on student perceptions of instructor credibility and examine how students perceive Twitter as a teaching tool. Quantitative results suggest that the profile with professional content was most credible. Credibility ratings were also associated with other Twitter use variables, including positive student attitudes about instructors who use Twitter and Tweet frequency. Coded qualitative responses indicated that Twitter may be both an asset and an obstacle for instructors

    Bankrupting DoS Attackers

    Full text link
    To defend against denial-of-service (DoS) attacks, we employ a technique called resource burning (RB). RB is the verifiable expenditure of a resource, such as computational power, required from clients before receiving service from the server. To the best of our knowledge, we present the first DoS defense algorithms where the algorithmic cost -- the cost to both the server and the honest clients -- is bounded as a function of the attacker's cost. We model an omniscient, Byzantine attacker, and a server with access to an estimator that estimates the number of jobs from honest clients in any time interval. We examine two communication models: an idealized zero-latency model and a partially synchronous model. Notably, our algorithms for both models have asymptotically lower costs than the attacker's, as the attacker's costs grow large. Both algorithms use a simple rule to set required RB fees per job. We assume no prior knowledge of the number of jobs, the adversary's costs, or even the estimator's accuracy. However, these quantities parameterize the algorithms' costs. We also prove a lower bound on the cost of any randomized algorithm. This lower bound shows that our algorithms achieve asymptotically tight costs as the number of jobs grows unbounded, whenever the estimator output is accurate to within a constant factor
    corecore