Browsing Library by Title
Now showing items 2959-2978 of 7484
-
Forecasting Success: Using the Texas Risk Assessment System to Predict Early Discharge in a Large Sample of High, Moderate, and Low Risk Offenders
(2020-05-05)Little is known regarding predictive factors that contribute to adults successfully completing felony probation—particularly those who are granted early release. The current study attempts to fill this gap by analyzing ... -
Foreign Body Reactions To Neural Implants In The Brain
(Biomedical Engineering, 2008-04-22)Neural implants have been used and studied for many decades. They are applied to record neural signals or to locally deliver drugs. Unfortunately, foreign body reaction and accompanied glial scar formation often lead to ... -
Forgotten
(Oliver Ditson Company, BostonCentral Library, University of Texas at Arlington, 1894) -
Formal Processes for Inspecting Bridge Deck Drains Using Lidar and Photogrammetry
(2023-05-08)**Please note that the full text is embargoed until 05/04/2025** ABSTRACT: Poor-performing bridge deck drains result in water standing on the bridge deck. The standing water threatens the safety of bridge users and ... -
Formal Verification of DC Distribution Networks
(2017-08-10)Power electronics-intensive DC distribution networks are emerging as popular alternative to their AC counterparts being more efficient and reliable power delivery platforms. With the recent evolution of control methodology ... -
Formalization Of The Engineering Science Discipline - Knowledge Engineering
Knowledge is the most precious ingredient facilitating aerospace engineering research and product development activities. Currently, the most common knowledge retention methods are paper-based documents, such as reports, ... -
A Formalized Method For State Machine Software Implementation In Smart Microgrid Control Systems
(Electrical Engineering, 2014-07-14)The introduction section begins with a discussion of the electric power grid in general and a specific definition for Smart Grids and Microgrids. These two different but complimentary technologies combine to form the ... -
FORMATION AND MORPHOLOGICAL CHANGES OF STRESS ACTIN FILAMENTS IN ADIPOSE-DERIVED STEM CELLS
(2023-12-18)Adipose-Derived Stem Cells (ADSCs) are a sub-type of stem cell that can be collected and isolated from the adipose tissue. Adipogenesis describes the commitment and differentiation of stem cells, including ADSCs, toward ... -
The Formation And Obduction Of Ophiolites Since The Late Precambrian
(Geology, 2007-08-23)Ophiolite formation and emplacement has been episodic since the Late Precambrian. This research study examines ophiolites that formed during the Cenozoic, Mesozoic, Paleozoic and Late Precambrian. The ophiolites were ... -
FORMATION FLIGHT FOR FUEL SAVING IN CORONET MISSIONS OF KC-135R AND F-15C/E
(2016-12-21)The fuel saving benefit of formation flight has been demonstrated through theoretical and computational analyses, simulation, wind tunnel and flight tests. When an aircraft flies in a specific region in the wake of another ... -
Formation Of Au Nanoparticles Through Reaction Of Na₃Au(SO₃)₂ By Electrochemically Evolved Hydrogen
(Materials Science & Engineering, 2010-07-19)Hydrogen evolution during electrochemical deposition has long been regarded as undesired and deliberately suppressed since small hydrogen bubbles could cause a rough surface of deposits. Here, we demonstrate a new role for ... -
FORMATION OF PROFESSIONAL IDENTITY AND EVERYDAY ETHICAL COMPORTMENT IN PRE-LICENSURE BACCALAUREATE NURSING STUDENTS: A GROUNDED THEORY APPROACH
Formation of professional identity in nursing students is a necessary prerequisite to skilled, ethical, expert nursing practice. Nurses who have not formed an ethical professional identity have a negative impact on the ... -
FORMATION OF SUPPLY CHAIN CONTRACT: THEORY AND EXPERIMENT
(2021-07-12)In recent years, the globalization in business has transformed the traditional linear supply chain into a complex network of interactions among supply chain participants across different tiers. In such a supply chain system, ... -
Former and present military service members' perceptions of the use of psychedelic substances for the treatment of mental health conditions
(2023-12-19)Now more than ever, Americans are experiencing a serious mental health crisis. However, it can be asserted that veterans are even more in need of effective interventions to address mental health concerns. Veterans experience ... -
FORMING COALITIONS AND SHARING PAYOFFS IN n-PERSON NORMAL FORM GAMES
(2022-12-19)For a given n-person normal form game, we form all possible sets of mutually exclusive and collectively exhaustive coalitions of the n players. For each set of coalitions, we define a coalitional semi-cooperative game as ... -
Formulation Of Lean Six Sigma Critical Business Processes For Manufacturing Facilitites
(Industrial & Manufacturing Engineering, 2008-04-22)The author desired to create a method organizing the concepts from Lean, Six Sigma, critical business processes, and simplifying the usage of these concepts to identify Lean Six Sigma Critical Business Processes. Inspired ... -
The Found Object(s) Of Rhetoric
(English, 2014-03-12)The following dissertation expands the notion of posthumanism beyond the work in transhumanism, new media studies, animal studies, and material feminism by incorporating speculative realist philosophies into and with the ... -
Foundations of Social Work Research
(Mavs Open Press, 2020)This textbook was created to provide an introduction to research methods for BSW and MSW students, with particular emphasis on research and practice relevant to students at the University of Texas at Arlington. It provides ... -
FOURTH AMENDMENT KNOWLEDGE IN STUDENT HOUSING: A STUDY OF TEXAS PUBLIC UNIVERSITY OFFICIALS
The purpose of this quantitative study was to analyze Texas public college and university housing professionals’ knowledge of constitutional Fourth Amendment law using a 20-question True/False/Unsure survey. This survey ... -
The Fox Is Guarding The Henhouse: Can Interpersonal Conflict Damage An Organization's Information Security?
(Information Systems & Operations Management, 2014-07-14)As computer networks grow ever more interconnected, securing an organization's information is becoming increasingly vital. At the forefront of this threat is that of the insider, an individual who is already behind the ...