3,217 research outputs found

    A certain essence of the sun: Byron Herbert Reece and the southern poetry tradition

    Get PDF
    This study of Byron Herbert Reece (1917-1958) seeks to provide a broad look at his life, his work, his reputation,and his contributions to poetry. The record of his life is largely contained in a biography. The Mountain Singer, byRaymond Cook and in several published remembrances. These Remembrances often conform to a common assumption, promoted by Atlanta newspapers and others, that Reece was a mountain man poet. The accuracy of that image is challenged in this book and shown to be more an attempt to simplify Reese\u27s Character than to explore his complex nature or examine his unique poetic vision. Little serious criticism of his poetry has been written since his death, so part of the book describes the major forms, themes, and ideas present in the four volumes of poetry he published. In addition, the book considers Reece in context with other Southern poets of histime, notably the Fugitives, by comparing his life and work to theirs. Finally, the book argues that Reece was an original poet who should be recognized for several contributions to poetry, notably his use of ballads to express intimate thoughts and his focus on the insuperable separateness of the individual

    Improving the Effectiveness of Short-Term Overseas Study Programmes

    Get PDF

    Water Quality Modeling in the Ross Barnett Reservoir using Environmental Fluid Dynamics Code

    Get PDF
    This thesis investigates the utilization of hydrodynamic models as tools for assessing factors impacting water quality in the Ross Barnett Reservoir. The primary focus is development of a hydrodynamic model that provides transport information to subsequent application of a water quality model. Environmental Fluid Dynamics Code (EFDC) is a complex, dynamic, multi-dimensional computer model used to simulate hydrology in water bodies. The secondary focus is on data acquisition and manipulation methods for completing the hydrodynamic modeling. Monitoring was completed to create modern bathymetry of Ross Barnett Reservoir to provide accurate model cell grid representation. Temperature and dissolved oxygen profile monitoring occurred to provide data for model output comparison. The EFDC model successfully predicted lake stratification and subsequent mixing based on changes in observed meteorological conditions

    Shear strength behavior in silts and clay mixtures

    Get PDF
    A series of consolidated undrained triaxial tests with pore pressure measurements were performed on laboratory sedimented samples having various known silt to clay content ratios. The clay used was commercial grundite clay from Goose Lake, Illinois, and the silt used was extracted from Lebanon Silt Loam from Rolla, Missouri. Silt was mixed with clay in the following percentages by weight: 0%, 20%, 40%, 50%, and 80%. Results indicate an increasing angle of internal friction with an increase in silt content. The unconfined compressive strength of the samples remained constant, as would be expected in a clay, with increasing silt content up to the 80% silt mixture. At the 80% silt content, the soil behaved as a granular material --Synopsis, page 1

    Detecting intrusions at layer one: device fingerprinting for network access authorization

    Get PDF
    In modern computer networks, administrators have limited control over physical security of the network. Although reasonable control may be exercised over the digital services running on the network, the administrator can often do little to prevent unauthorized physical connections. The DILON (Detecting Intrusions at Layer ONe) research project is based on the hypothesis that due to inevitable variations in the construction of network devices, each will have a unique voiceprint or fingerprint which may be used to identify it, and that these features may be extracted from sections of data required by the data link protocols used on most networks. This presents the possibility of detecting connections by intruders who use techniques such as MAC address spoofing to pose as an authorized network user. It may also eventually be possible to use changes in the voiceprint to detect imminent device failure. We present a brief background of the DILON project, followed by an overview of the fingerprinting methods investigated so far. These methods draw on tools used in a variety of fields, ranging from engineering to collider physics to process quality control. The common goal is to identify parameters which may be used to uniquely identify a device and to monitor those parameters over time. The methods presented have met with varying levels of success so far, but all have shown promise for future work with both wired and wireless network security applications
    corecore