225 research outputs found

    His Feminist Facade: The Neoliberal Co-option of the Feminist Movement

    Get PDF

    Chronology of Lead Pollution Contained in Banded Coral Skeletons

    Get PDF
    Lead concentrations relative to calcium within dated subsamples of hermatypic (reef-building) coral skeletons from St. Croix, US Virgin Islands, record ambient pollution levels. Concentrations within a coral from a polluted reef (395 ng g-1) average five-fold higher than within a coral from a pristine site (87 ng g-1). The lead chronologies of both corals show a significant increase in concentration towards the present during the past 26 yr (1954–1980). The increase in lead concentration in the coral from the pristine site is suggested to represent the increase in lead availability from global pollution. Coral skeletons offer the probability of development into tools for longterm chemical recorders of levels of lead and possibly other metals or compounds in seawater

    Leap For A Man, Girls, It\u27s Leap Year

    Get PDF
    https://digitalcommons.library.umaine.edu/mmb-vp/4885/thumbnail.jp

    For Every Boy Who\u27s On The Level : There\u27s A Girl Who\u27s On The Square

    Get PDF
    https://digitalcommons.library.umaine.edu/mmb-vp/1470/thumbnail.jp

    Peggy O\u27Neil: Waltz Song

    Get PDF
    https://digitalcommons.library.umaine.edu/mmb-vp/2375/thumbnail.jp

    Simulating Windows-Based Cyber Attacks Using Live Virtual Machine Introspection

    Get PDF
    Static memory analysis has been proven a valuable technique for digital forensics. However, the memory capture technique halts the system causing the loss of important dynamic system data. As a result, live analysis techniques have emerged to complement static analysis. In this paper, a compiled memory analysis tool for virtualization (CMAT-V) is presented as a virtual machine introspection (VMI) utility to conduct live analysis during simulated cyber attacks. CMAT-V leverages static memory dump analysis techniques to provide live system state awareness. CMAT-V parses an arbitrary memory dump from a simulated guest operating system (OS) to extract user information, network usage, active process information and registry files. Unlike some VMI applications, CMAT-V bridges the semantic gap using derivation techniques. This provides increased operating system compatibility for current and future operating systems. This research demonstrates the usefulness of CMAT-V as a situational awareness tool during simulated cyber attacks and measures the overall performance of CMAT-V

    To God Be the Glory: Discussing Sex in Evangelical Communities in Southern Nigeria

    Get PDF
    Many people hold stereotypes and assumptions about religious communities in regards to their feelings and beliefs about sex and the impact it has on the lived experiences of religious people. However, stereotypes and assumptions are not often grounded in reality, and many people are hesitant to address the issue head on. This qualitative ethnographically informed preliminary grounded theory study aimed to engage an Evangelical Pentecostal community in Southern Nigeria with the ultimate goal of understanding how communities conceptualize and discuss sexuality topics, the factors influencing sexual decision making amongst youth and young adults, and to identify research needs that will better inform innovative and efficacious research utilizing religious communities in sexuality research. Results showed that this population was highly interested in discussing sexuality in their community including major threats to their ideal sexual behavior path, reasons why people stray from this ideal and how to keep people on this ideal path. This research demonstrates that religious communities are interested in conducting sexuality research so long as the research takes their values and beliefs into account and respects their limitations when it comes to research intent and methods.Keywords: Sexuality, faith-based, Nigeria, community based research, qualitativ
    • …
    corecore