Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Social and Behavioral Sciences (224)
- Engineering (219)
- Life Sciences (149)
- Physical Sciences and Mathematics (141)
- Education (104)
-
- Arts and Humanities (96)
- Business (90)
- Nuclear Engineering (70)
- Physics (60)
- Chemistry (59)
- Medicine and Health Sciences (51)
- Public Affairs, Public Policy and Public Administration (46)
- Psychology (45)
- Nuclear (44)
- Human Resources Management (41)
- Law (38)
- Political Science (38)
- Training and Development (38)
- Educational Psychology (37)
- Defense and Security Studies (36)
- International Relations (36)
- Radiochemistry (35)
- Engineering Education (34)
- Teacher Education and Professional Development (34)
- Materials Science and Engineering (33)
- Electrical and Computer Engineering (32)
- National Security Law (32)
- English Language and Literature (31)
- Library and Information Science (31)
- Curriculum and Instruction (30)
- Keyword
-
- Internal documents (13)
- Education (12)
- DataONE (9)
- Gender (8)
- Tennessee (8)
-
- Marketing (7)
- Music (7)
- Biofuel (6)
- Nuclear Security (6)
- Security (6)
- Training (6)
- User experience (6)
- Writing (6)
- Obesity (5)
- Switchgrass (5)
- Women (5)
- Writing instruction (5)
- Agriculture (4)
- Appalachia (4)
- Archaeology (4)
- Architecture (4)
- Art (4)
- Bioinformatics (4)
- Community (4)
- Deaf (4)
- Evolution (4)
- Fire (4)
- Governance (4)
- Knoxville (4)
- Leadership (4)
- Publication
-
- Doctoral Dissertations (341)
- Masters Theses (228)
- Chancellor’s Honors Program Projects (128)
- International Journal of Nuclear Security (40)
- EURēCA: Exhibition of Undergraduate Research and Creative Achievement (30)
-
- Pursuit - The Journal of Undergraduate Research at The University of Tennessee (23)
- DataONE Sociocultural and Usability & Assessment Working Groups (19)
- Journal of Applied Sport Management (18)
- The Journal of the Assembly for Expanded Perspectives on Learning (17)
- Tennessee Journal of Law and Policy (14)
- Graduate Associate Deans' Group Minutes (11)
- SACSCOC Documentation (11)
- Faculty Publications and Other Works -- Biomedical and Diagnostic Sciences (9)
- Academic Policy Committee Reports (7)
- Baker Scholar Projects (7)
- Gamut: Online Journal of the Music Theory Society of the Mid-Atlantic (7)
- Graduate Council Minutes (7)
- Plant Sciences Publications and Other Works (7)
- Credentials Committee Reports (6)
- Microbiology Publications and Other Works (6)
- School of Information Sciences -- Faculty Publications and Other Works (6)
- Tennessee Citizens for Wilderness Planning Newsletters (6)
- Faculty Publications and Other Works -- Ecology and Evolutionary Biology (5)
- Theory and Practice in Teacher Education Publications and Other Works (5)
- Undergraduate Council Meeting Minutes (5)
- IACE Hall of Fame Repository (4)
- Southeastern Fishes Council Proceedings (4)
- The Forum: A Tennessee Student Legal Journal (4)
- UT Libraries Faculty: Peer-Reviewed Publications (4)
- Vernacular: New Connections in Language, Literature, & Culture (4)
- Publication Type
- File Type
Articles 1 - 30 of 1044
Full-Text Articles in Entire DC Network
Letter From The Editor
International Journal of Nuclear Security
No abstract provided.
Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene
Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene
International Journal of Nuclear Security
Ready access to abundant electricity is a key enabler of modern life. During the past decade the vulnerability of Critical Infrastructure sectors in the U.S. to a variety of natural hazards and man-made threats has become increasingly apparent. The electrical infrastructure (the “Grid”) is the foundation for all other critical civil infrastructures upon which our society depends. Therefore, protection of the Grid is an energy security, homeland security, and national security issue of highest importance. Geomagnetic disturbances (GMD) induced by solar coronal mass ejections (CMEs), electromagnetic pulse (EMP) attacks, and cyber attacks are three events having the potential to plunge …
Implementation Of The 1995 Middle East Resolution: A Vital Lifeline To The Extension And Success Of The Non-Proliferation Treaty, Haidy Y. Ghoname, Howard Lewis Hall
Implementation Of The 1995 Middle East Resolution: A Vital Lifeline To The Extension And Success Of The Non-Proliferation Treaty, Haidy Y. Ghoname, Howard Lewis Hall
International Journal of Nuclear Security
This study highlights the core non-proliferation dilemmas we face and suggests an effective mechanism for reviving the spirit and the hope of the Non-Proliferation Treaty. An indispensable key to the treaty calls for a rethinking of what we believe should be referred to as its four pillars: disarmament, non-proliferation, peaceful uses of nuclear energy, and implementation of the 1995 Middle East Resolution. We seek to contribute to the renaissance of the non-proliferation regime by addressing seven dilemmas that arise from the way various Non-Proliferation Treaty participants pursue the goals of the four pillars undergirding the treaty. This study highlights …
A New Pathway To Enhance The Nuclear Security Regime, Francesca Giovannini
A New Pathway To Enhance The Nuclear Security Regime, Francesca Giovannini
International Journal of Nuclear Security
The paper investigates the approach used by a new set of regional institutions, the Disaster Preparedness and Risk Management Organizations (DPRMOs), in strengthening regional governance and cooperation. It also inquires in what ways these new institutions might indirectly contribute to the establishment of a more cohesive global nuclear security framework. More specifically, through the examination of the case of Southeast Asia, the paper argues that these institutions, albeit without a specific and direct mandate to operate in the nuclear security domain, are fundamentally strengthening states’ capacity to assess risks and threats and to map vulnerabilities in timely fashion. They are …
Modern Advancements In Post-Detonation Nuclear Forensic Analysis, S. Adam Stratz, Jonathan A. Gill, John D. Auxier Ii, Howard L. Hall
Modern Advancements In Post-Detonation Nuclear Forensic Analysis, S. Adam Stratz, Jonathan A. Gill, John D. Auxier Ii, Howard L. Hall
International Journal of Nuclear Security
Deterring nuclear terrorism is a critical national asset to support the preclusion of non-state actors from initiating a nuclear attack on the United States. Successful attribution of a detonated nuclear weapon allows for timely responsive measures that prove essential in the period following a nuclear event. In conjunction with intelligence and law enforcement evidence, the technical nuclear forensics (TNF) post-detonation community supports this mission through the development and advancement of expertise to characterize weapon debris through a rapid, accurate, and detailed approach. Though the TNF field is young, numerous strides have been made in recent years toward a more robust …
Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame
Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame
International Journal of Nuclear Security
The potential for a relatively non-advanced nation to covertly acquire a significant quantity of weapons-grade plutonium using a gas-cooled, natural uranium-fueled reactor based on relatively primitive early published designed is evaluated in this article. The economic and technical issues that would influence the design decisions of a covert 239Pu production program are considered.
Several unconventional uranium acquisition approaches were explored. Methods for extracting uranium from enrichment tails, seawater, and coal ash sources were considered. The evaluation indicated that uranium extraction from coal ash or insitu leaching from underground deposits could be performed in economical manner that might be difficult …
Developing And Promoting A Nuclear Security Curriculum At Amity University, India: Beginnings, Successes And Challenges, Ms. Kawalpreet Kalra, Ms. Archana Yadav, Dr. Alpana Goel
Developing And Promoting A Nuclear Security Curriculum At Amity University, India: Beginnings, Successes And Challenges, Ms. Kawalpreet Kalra, Ms. Archana Yadav, Dr. Alpana Goel
International Journal of Nuclear Security
Amity University is one of India’s leading research- and innovation-driven private universities. The Amity Institute of Nuclear Science and Technology (AINST), established in 2009, contribute to Amity’s mission to promote national development through philanthropy, education and research. Very recently, courses related to nuclear security and security culture have been added to the existing AINST curriculum. The purpose of introducing this course was to enhance the understanding of technical, policy, and regulatory challenges associated with nuclear security and to create a nuclear security culture among relevant local institutions. This paper describes the process involved in establishing nuclear security as an elective …
Student Competition Cover
International Journal of Nuclear Security
No abstract provided.
Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed
Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed
International Journal of Nuclear Security
No abstract provided.
Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen
Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen
International Journal of Nuclear Security
No abstract provided.
Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan
Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan
International Journal of Nuclear Security
No abstract provided.
Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein
Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein
International Journal of Nuclear Security
No abstract provided.
Understanding Scientific Data Sharing Outside Of The Academy, Danielle Elaine Pollock
Understanding Scientific Data Sharing Outside Of The Academy, Danielle Elaine Pollock
DataONE Sociocultural and Usability & Assessment Working Groups
Sharing and reuse of scientific data, which can enhance the transparency and reproducibility of research and lead to the creation of new knowledge from existing data, is both a growing scholarly communication practice and an expanding area of interest in information science. However, much of the literature to date has focused on the data practices of scientists working in academic environments, with less research done on understanding the practices of scientists working in other types of environments, such as government or industry. This poster presents the results of a study in which data from a worldwide survey of scientists were …
Legal And Regulatory Framework Of Nuclear Security In Indonesia, Dahlia Cakrawati Sinaga
Legal And Regulatory Framework Of Nuclear Security In Indonesia, Dahlia Cakrawati Sinaga
International Journal of Nuclear Security
Nuclear security is one of the most important topics for regulatory purposes in Indonesia. Nuclear security measures exist to prevent, detect, and respond to unauthorized removal of radioactive material and the sabotage of nuclear and radiation facilities. Indonesia participates in bilateral and multilateral cooperation and international events such as the Nuclear Security Summit. Indonesia has also ratified several international instruments related to nuclear security. Based on commitment to international events and ratification, Indonesia has developed nuclear security infrastructures by strengthening legislation and regulation, enhancing building capacity, and strengthening equipment and facilities. Badan Pengawas Tenaga Nuklir (BAPETEN) is Indonesia’s nuclear energy …
Modified Fault Tree Method For Vulnerability Analysis Of Nuclear Medicine Facility Security System Case Study: Radiotherapy Facility, Sardjito General Hospital, Haryono Budi Santosa
Modified Fault Tree Method For Vulnerability Analysis Of Nuclear Medicine Facility Security System Case Study: Radiotherapy Facility, Sardjito General Hospital, Haryono Budi Santosa
International Journal of Nuclear Security
Assessing the vulnerability of physical protection systems (PPS) in nuclear medicine facilities is needed to prevent a security incident that could lead to the malicious use of nuclear material. Theft and sabotage of nuclear materials is becoming globally recognized. The current methods of assessing vulnerability tend to be oriented toward complex nuclear security; consequently, it is excessive to use such methods in simple facilities (i.e., radiotherapy facilities in hospitals).
The fault tree analysis is a method to assess vulnerability for a simple nuclear facility. The method’s primary events (i.e., basic events and undeveloped events) are able to accommodate fault causes …
Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan
Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan
International Journal of Nuclear Security
Organizations should increase safety to minimize the harmful effects of nuclear materials. Additionally, organizations should take measures to protect security culture within the organization itself. This paper covers the National Nuclear Energy Agency of Indonesia’s (BATAN’s) promotion of nuclear security culture and self- assessment projects, which is based on the International Atomic Energy Agency’s (IAEA) methodology.
From The Editor’S Desk
International Journal of Nuclear Security
No abstract provided.
Nuclear Security Risk Analysis: An Insider-Outsider Collusion Scenario, Mohammad A. Hawila, Sunil S. Chirayath
Nuclear Security Risk Analysis: An Insider-Outsider Collusion Scenario, Mohammad A. Hawila, Sunil S. Chirayath
International Journal of Nuclear Security
This study analyses the vulnerability of the physical protection system (PPS) deployed at a hypothetical facility. The PPS is designed to prevent and eliminate threats to nuclear materials and facilities. The analysis considers possible outsider and insider threats. A modified adversary sequence diagram (ASD) evaluates threat pathways to test an insider-outsider collusion case. The ASD also measures the probability of adversary interruption by demonstrating the methodology for a typical nuclear facility.
Opportunities And Challenges In Developing Nuclear Security In Africa, James Larkin Mfr
Opportunities And Challenges In Developing Nuclear Security In Africa, James Larkin Mfr
International Journal of Nuclear Security
Those involved in nuclear security recognize that regions of significant instability in Africa have an impact on the safety and security of the continent's nuclear material and un-enriched uranium; however, some countries outside of continental Africa have taken counterproductive approaches to this issue. Despite challenges, the nuclear security community continues to develop and apply appropriate levels of nuclear security where needed. The community also takes every opportunity to make significant contributions to the global discourse on nuclear security culture.
Graduate Associate Deans' Group Minutes - December 15, 2016, Graduate Council
Graduate Associate Deans' Group Minutes - December 15, 2016, Graduate Council
Graduate Associate Deans' Group Minutes
No abstract provided.
New Off-Site Location, Professional Mba Program (Sacscoc Response), Sacscoc
New Off-Site Location, Professional Mba Program (Sacscoc Response), Sacscoc
SACSCOC Documentation
SACSCOC response to the substantive change of a new off-campus location for the Professional MBA, Haslam College of Business.
Computational Simulation Of The Predicted Dosimetric Impact Of Adjuvant Yttrium-90 Pet/Ct-Guided Percutaneous Ablation Following Radioembolization, Alexander S. Pasciak, Abigail Lin, Christos Georgiades, Laura K. Findeiss, Shannon Kauffman, Yong C. Bradley
Computational Simulation Of The Predicted Dosimetric Impact Of Adjuvant Yttrium-90 Pet/Ct-Guided Percutaneous Ablation Following Radioembolization, Alexander S. Pasciak, Abigail Lin, Christos Georgiades, Laura K. Findeiss, Shannon Kauffman, Yong C. Bradley
Faculty Publications and Other Works -- UT Graduate School of Medicine
Background: 90Y PET/CT post-radioembolization imaging has demonstrated that the distribution of 90Y in a tumor can be non-uniform. Using computational modeling, we predicted the dosimetric impact of post-treatment 90Y PET/CT-guided percutaneous ablation of the portions of a tumor receiving the lowest absorbed dose. A cohort of fourteen patients with non-resectable liver cancer previously treated using 90Y radioembolization were included in this retrospective study. Each patient exhibited potentially under-treated areas of tumor following treatment based on quantitative 90Y PET/CT. 90Y PET/CT was used to guide electrode placement for simulated adjuvant radiofrequency ablation in areas of tumor receiving the lowest dose. The …
Draft Genome Sequence Of Antarctic Methanogen Enriched From Dry Valley Permafrost, Joy Buongiorno, Jordan T. Bird, Kirill Krivushin, Victoria Oshurkova, Victoria Shcherbakova, Elizaveta M. Rivkina, Karen Lloyd, Tatiana A. Vishnivetskaya
Draft Genome Sequence Of Antarctic Methanogen Enriched From Dry Valley Permafrost, Joy Buongiorno, Jordan T. Bird, Kirill Krivushin, Victoria Oshurkova, Victoria Shcherbakova, Elizaveta M. Rivkina, Karen Lloyd, Tatiana A. Vishnivetskaya
Faculty Publications and Other Works -- General Biology
A genomic reconstruction belonging to the genus Methanosarcina was assembled from metagenomic data from a methane-producing enrichment of Antarctic permafrost. This is the first methanogen genome reported from permafrost of the Dry Valleys and can help shed light on future climate-affected methane dynamics.
Substituting Failure Avoidance For Redundancy In Storage Fault Tolerance, Christopher David Brumgard
Substituting Failure Avoidance For Redundancy In Storage Fault Tolerance, Christopher David Brumgard
Doctoral Dissertations
The primary mechanism for overcoming faults in modern storage systems is to introduce redundancy in the form of replication and error correcting codes. The costs of such redundancy in hardware, system availability and overall complexity can be substantial, depending on the number and pattern of faults that are handled. This dissertation describes and analyzes, via simulation, a system that seeks to use disk failure avoidance to reduce the need for costly redundancy by using adaptive heuristics that anticipate such failures. While a number of predictive factors can be used, this research focuses on the three leading candidates of SMART errors, …
Constrained Multi-Group Project Allocation Using Mahalanobis Distance, Abdulaziz Saud Alkabaa
Constrained Multi-Group Project Allocation Using Mahalanobis Distance, Abdulaziz Saud Alkabaa
Doctoral Dissertations
Optimal allocation is one of the most active research areas in operation research using binary integer variables. The allocation of multi constrained projects among several options available along a given planning horizon is an especially significant problem in the general area of item classification. The main goal of this dissertation is to develop an analytical approach for selecting projects that would be most attractive from an economic point of view to be developed or allocated among several options, such as in-house engineers and private contractors (in transportation projects). A relevant limiting resource in addition to the availability of funds is …
Academic Library Resources And Services For Online Distance Learners: An Exploratory Study, Roseanne Michele Sasso
Academic Library Resources And Services For Online Distance Learners: An Exploratory Study, Roseanne Michele Sasso
Doctoral Dissertations
In this study distance learning library resources and services as provided by member institutions belonging to the Association of Research Libraries (ARL) were examined. The goals of this study were (a) to identify the types of distance learning library resources and services being provided, and (b) to gain insight into the experiences and perspectives of Association of Research Libraries’ library personnel in delivering library resources and services to their distance learning library patrons. This exploratory study consisted of two phases, where both quantitative and qualitative methods were used. Phase one involved a content analysis of member institution’s distance learning websites …
Assessing The Functional Similarity Of Native And Invasive Anolis Lizards In The Food Webs Of Structurally-Simple Habitats In Florida, Nathan W. Turnbough
Assessing The Functional Similarity Of Native And Invasive Anolis Lizards In The Food Webs Of Structurally-Simple Habitats In Florida, Nathan W. Turnbough
Doctoral Dissertations
Invasive species often displace ecologically-similar native species, but the extent to which invading and displaced species function similarly in the food web processes of invaded communities is largely unknown. I investigated whether populations and individuals of an invasive Anolis lizard (the brown anole, Anolis sagrei) and the native congener it displaces in Florida (the green anole, Anolis carolinensis) are functionally equivalent in the food webs of open and structurally-simple habitats. In a system of invaded and uninvaded dredge-spoils islands, I found that both arthropod communities and winter bird communities covaried with brown anole abundance (and therefore the identity …
Patristic Precedent And Vernacular Innovation: The Practice And Theory Of Anglo-Saxon Translation, Andrew Timothy Eichel
Patristic Precedent And Vernacular Innovation: The Practice And Theory Of Anglo-Saxon Translation, Andrew Timothy Eichel
Doctoral Dissertations
My dissertation investigates Anglo-Saxon translation and interpretation during the reign of King Alfred of Wessex in the ninth century, and the Benedictine Reform of the tenth and eleventh centuries. These two periods represent a time of renaissance in Anglo-Saxon England, when circumstance and ambition allowed for a number of impressive reformation enterprises, including increased dedication to education of both clerical orders and the laity, which therefore augmented the output of writing motivated by scholarly curiosity, ecclesiastical inquiry, and political strategizing. At these formative stages, translation emerged as perhaps the most critical task for the vernacular writers. The Latinate prestige culture …