March 27th, 2009
Message from the Program Committee:
Welcome to the fifth annual meeting of the SC Upstate Research Symposium! The SC Upstate Research Symposium Series offers faculty and students the opportunity to showcase their current research, scholarly, and creative activities while interacting with other researchers and community leaders from throughout the Upstate. This year’s meeting features presentations and posters from faculty and students from USC Upstate, Converse College, Wofford College, Limestone College, Spartanburg Methodist College, Spartanburg Community College, Southern Wesleyan University, Lander University, Sherman College, and Presbyterian College. We would like to sincerely thank our community sponsors: Stäubli (our GOLD Sponsor), Spartanburg Regional Healthcare System (our SILVER Sponsor). Such support from prominent regional businesses and institutions is greatly appreciated and essential for the advancement of academic research in the Upstate. We would also like to thank the EPSCoR/IDeA RS state grant program. This year’s event will include keynote speeches by Mayor William Barnet III, Mayor of Spartanburg and Dr. Jay Moskowitz, President of Health Sciences South Carolina. Special invited guests include Mr. David Root of Converse Motors, who will present his company’s cutting edge Hydrogen Add-on Technology for automobiles during the Poster Session. If you have any questions or comments about this Symposium Series, or would like to receive an additional printed copy of the most recent Symposium Proceedings, please contact Dr. Sebastian van Delden, (864) 503-5292, [email protected]. More information can also be found on the Symposium website: http://www.uscupstate.edu/symposium.
Once again, welcome! The Program Committee
Sincere Thanks to our Community Sponsors:
The Stäubli Corporation is the Gold Level Sponsor for the Fifth Annual SC Upstate Research Symposium. Stäubli is a mechatronics solution provider with three dedicated divisions: textile machinery, connectors, and robotics. With a workforce of over 3000, the company generates a yearly turnover surpassing 1 billion Swiss francs. Originally founded 1892 as a small workshop in Horgen / Zurich, today Stäubli is an international group with its head office in Pfäffikon, Switzerland. Visit http://www.staubli.com for more information. The Spartanburg Regional Healthcare System is the Silver Level Sponsor for the Fifth Annual SC Upstate Research Symposium. The Spartanburg Regional Healthcare System offers a unique combination of world-class facilities, caring and dedicated professionals, advanced technology, and specialized treatment options. “Spartanburg Regional is more than a hospital, we’re are a family of healthcare providers who live and work in the Upstate. We're here to care for you when you need medical attention, but we're also here to help keep you well. We're your healthcare system, and we're with you for life.” Visit http://www.srhs.com for more information.
Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant. 1
Fifth Annual SC Upstate Research Symposium
Table of Contents The Program Committee ...... 7 Keynote Speakers and Tutorial Presenters ...... 8 Symposium Schedule Overview ...... 9 Breakout Session 1: Biology ...... 10 Session Chair: Neval Erturk, Converse College Comparative Histopathology of the Lungs and Urinary Bladder of Rana pipiens Infected with Parasitic Helminths...... 10 Edna Steele, Stephanie Newton and Baye Williamson Converse College Ploidy Levels and Genome Sizes of Magnolia L. Species, Hybrids, and Cultivars .... 13 Kevin Parris, Spartanburg Community College; Thomas Ranney, N.C. State University W. Vance Baird and Halina Knap, Clemson University Messin' with Texas! The genus Isoetes (Isoetaceae) in the Lonestar State ...... 16 C. Matthew Hardman and Kerry Heafner Limestone College Using Spatial Assessment of Drift Fence Captures to Investigate Juvenile Dispersal of Ranid Frogs ...... 18 Chelsea Kross and Melissa Pilgrim USC Upstate Three Allotetraploid Segregates of Isoetes piedmontana (Pfeiffer) Reed ...... 21 Ricky Brannon, Miranda Dornis, Kristen Smith and Kerry Heafner Limestone College
Breakout Session 2: Human and Civil Rights: Around the World...... 24 Session Chair: Jane Watkins, Limestone College Charles W. Chesnutt and Racial Caricatures in Post-Bellum, ...... 24 Pre-Harlem America Peter Caster USC Upstate Child Trafficking - Borderline Slavery ...... 30 Landis Bunch and Carolyn Hooker Spartanburg Community College Environmental Activism in the Middle East ...... 32 Joni Hammond and Lizabeth Zack USC Upstate Scars of Africa ...... 34 Robin Ivey and Carolyn Hooker Spartanburg Community College Child Soldiers in Burma...... 36 Sam Karns and Carolyn Hooker Spartanburg Community College
Breakout Session 3: Mathematics and Computer Science ...... 38 Session Chair: Jerome Lewis, USC Upstate A Novel Robotic Approach to Contour Recovery using Structured Light ...... 38 Nicole Hodge, Robert Mahmoudishad, Mark Parrish, and Sebastian van Delden USC Upstate
2 Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant.
March 27th, 2009
Multithreaded and Parallel Programming: Problems and the Environments and Tools to Handle Them ...... 41 Edward Stokes and Wayne Smith Presbyterian College Mining Exceptions as Interesting Knowledge ...... 44 Stephen St. Peter and Rick Chow USC Upstate Determinants of Information Technology Acceptance: A Review ...... 48 of Technology Acceptance Model Bilquis Ferdousi Spartanburg Community College Mathematical Modeling of non-Newtonian Peristaltic Flows ...... 52 Muhammad Hameed USC Upstate Poster Session ...... 54 Investigation of the Role of Promoter Methylation and Histone Modification in the Down-regulation of the Colon Tumor Suppressor, DRA ...... 54 Derek Griffith and Jeannie Chapman USC Upstate An In-Depth Study of the Length of Hospital Stays with Regard to Procedures performed on Type II Diabetes Patients ...... 56 Anneliese Schmidt and Wei Zhong USC Upstate Implementation of the North American Amphibian Monitoring Program in ...... 58 the Upstate Region of South Carolina Alexsis Ferguson and Melissa Pilgrim USC Upstate Size of Rank Tests for Location in Linear Models with Repeated Observations ...... 61 Daniel Hagerman and Bernard Omolo USC Upstate On the Properties and Applications of the Space of Linear Functions L(R) ...... 63 Michael Blackmon and Gamal Elnagar USC Upstate Action Rule Summaries ...... 65 Cuong Hoang, Anna Novo and Angelina Tzacheva USC Upstate Transition to Preschool Programs for Young Children with Disabilities ...... 68 Delia Malone, Converse College Peggy Gallagher, Georgia State University The Effects of Linoleic Acid on Taste Preferences in Rats ...... 71 Harry Quedenfield and David Pittman Wofford College How Water-Replete Rats Respond to Different Tastes under the Influences of benzodiazepines ...... 74 Lindsey Richardson and David Pittman Wofford College How Water-Deprived Rats Respond to Different Tastes under the Influence of benzodiazepines ...... 77 Molly McGinnis and David Pittman Wofford College
Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant. 3
Fifth Annual SC Upstate Research Symposium
Older Husbands and Younger Wives: The January-May Marriage in Nineteenth-Century British Literature ...... 80 Esther Godfrey USC Upstate Oil and Western Friendliness, The Cause for Russian Interference in Former Soviet-bloc Nations ...... 84 Seth Rubenstein and Trevor Rubenzer USC Upstate Efficient Estimation of Cox Model with Time-Dependent Coefficients with Missing Causes ...... 87 Seunggeun Hyun, USC Upstate Yanging Sun, University of North Carolina at Charlotte Modernism's Egypt "And Other Disorders of a Revolutionary Character" ...... 90 Celena Kusch USC Upstate Southern Wesleyan University Strategic Human Resource Plan ...... 93 Beverly Lowe, Felicia Thomas-Adams, Nicole Varnum and Lee Kizer Southern Wesleyan University Metaphor Familiarity and L2 Instruction ...... 95 Quincy Jenkins Spartanburg Community College The Preparation and Coordination Chemistry of N-2-pyridyl-N-2- (-4-phenylthiazoly)amine ...... 98 Geoffrey Ford and Edward Gouge Presbyterian College The Effects of Exposure to Domestic Violence on Child and Adolescent Development ...... 101 Vernette Porter, Jennifer Parker and Stefanie Keen USC Upstate Implementation of Hierarchical Clustering Algorithm for Type-2 Diabetes Patients ...... 104 Nicole Hodge and Wei Zhong USC Upstate Breakout Session 4: Healthcare ...... 107 Session Chair: Gayle Casterline, USC Upstate Correlation of Selected Health Determinants and Outcomes in the United States: 2005 ...... 107 John Hart Sherman College of Straight Chiropractic Ukranian Nursing: A Survey of Caring Behaviors ...... 109 Gayle Casterline and Nataliya Lishchenko USC Upstate Prevention of Hospital-Acquired, Catheter-Associated Urinary Tract Infections: A Pilot Study ...... 112 Brian Conner Lander University Classification of Patients with Heart Disease Using Multi-Level Support Vector Machines ...... 116 Wei Zhong, Rick Chow, Richard Stolz and Marsha Dowell USC Upstate
4 Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant.
March 27th, 2009
Evidence of a New Taste Sensation for Dietary Fat...... 119 David Pittman Wofford College
Breakout Session 5: Human and Civil Rights: Here At Home ...... 122 Session Chair: Cole Cheek, Spartanburg Methodist College The Story of a "Typical American Girl" ...... 122 Christen Burrell and Melissa Walker Converse College Talkin' 'bout South Carolina: Addressing Dialect Diversity in Middle School Classrooms...... 124 George Reed and David Marlow USC Upstate Race and Class Identity in The Great Gatsby and Passing...... 126 John Crocker and Celena Kusch USC Upstate Meg Barnhouse: A Case Study of Discrimination in the Ministry ...... 129 Elizabeth Roberds and Melissa Walker Converse College From Lighting was Born a Man: Myth, Reality and Chief Pushmataha ...... 132 Cole Cheek Spartanburg Methodist College
Breakout Session 6: Education & Pedagogy: Learning & Assessment ...... 136 Session Chair: Jane Watkins, Limestone College Effect of the 6+1 Trait Writing Model on Student Writing Achievement ...... 136 Nancy DeJarnette, Limestone College Implementation of Learner-Centered Teaching in Higher Education: A "Customer Service" concept for academia? ...... 139 Joseph Ongeri, Spartanburg Methodist College The Peer Mentoring Program: A Pilot Program for the USC Upstate School of Education ...... 142 Daphine Dawson and Tina Herzberg, USC Upstate A Study in Cooperative Group Learning Styles at Spartanburg Community College ...... 145 William Gelders, Spartanburg Community College Assessment Beliefs and Practices of South Carolina Teachers...... 148 Sharon Feaster-Lewis, Southern Wesleyan University Chris Burkett, Columbia College
Breakout Session 7: Music and The Arts ...... 151 Session Chair: Rachel Snow, USC Upstate Audiation: The Musical Key to a Magical Life ...... 151 Jarrod Haning Converse College Playing the Gig You're On: Coltrane Knew How ...... 154 Gregg Akkerman USC Upstate
Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant. 5
Fifth Annual SC Upstate Research Symposium
Parallels of Musical Prosospopoeia in Buxtehude's Frieid und Freudenreiche Hinfahrt (1674) and Jacopo Peri's L'Euridice (1600) ...... 158 Ashley Higgins Converse College Romare Bearden: Contribution and Contrast to the Harlem Renaissance ...... 161 Mckensie Hall and Rachel Snow USC Upstate
Breakout Session 8: Business and Economics ...... 166 Session Chair: Royce Caines, Southern Wesleyan University A Preliminary Discussion of Corporate Social Responsibility ...... 166 Lilly Lancaster and Megan Creech USC Upstate Existence of Economies of Scale within Athletic Departments at Private, Four Year Institutions ...... 169 John Frazier Southern Wesleyan University Pro-Israel Campaign Contributions and Congressional Votes ...... 171 Trevor Rubenzer and Christopher Weidensee USC Upstate Strategic Human Resources Plan for the SWU Marketing Department ...... 174 Diana West, Joan Burgess, Leesa Inabinet, Susan Jones, Kirk Smith and Lee Kizer, Southern Wesleyan University
Breakout Session 9: Education & Pedagogy: Beyond the Classroom ...... 176 Session Chair: Tina Herzberg, USC Upstate The Classroom of the Future: Global, Interactive, Narrative ...... 176 Liezell Bradshaw, Tasha Thomas and York Bradshaw USC Upstate A Descriptive Analysis of Quality Online Practices as Perceived by West Virgina Higher Education Faculty ...... 179 Michael Murphy Lander University Undegraduate Community Translators and Interpreters: Professional Foreign Language Practice in Non-Profit, Food Service, and Health Care at Home and Abroad ...... 181 Douglas Jackson, Dierrias Booker, William Davis, Kayla Crim, Eric Guerreo and Melissa Trejo, USC Upstate The Marketing and Enrollment Department for Adult MBA Graduate Studies Strategic Human Resources Plan ...... 183 Barbara Peters, Zeolean Kinard, Deborah Williams, Mamie Whitaker, Howard Green and Lee Kizer, Southern Wesleyan University
6 Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant.
March 27th, 2009
The 2009 Program Committee
Dr. Sebastian van Delden, Dr. Caleb Arrington Symposium Chair Associate Professor of Chemistry Assistant Professor of Computer Wofford College Science; Director of Research Support USC Upstate
Susan Hodge, Sponsors Chair Dr. John Hart Senior Director of Community Associate Professor of Clinical Engagement Sciences; USC Upstate Assistant Director of Research Sherman College of Straight Chiropractic
Dr. Neval Erturk, Student Dr. Latha Gearheart Awards Chair Associate Professor of Chemistry; Assistant Professor of Biology Director of PC Summer Fellows Converse College Program Presbyterian College
Dr. Royce Caines Dr. Jane Watkins Dean and Professor Assistant Professor of Computer School of Business Science Southern Wesleyan University Limestone College
Dr. David Slimmer Dr. Dwight Dimaculangan Dean of the College of Science and Professor of Biology; Math; Director of Undergraduate Professor of Physics Research in CAS Lander University Winthrop University
Sherill Vaughn Cole Cheek Vice President of Academic Affairs Professor of History and Spartanburg Community College Anthropology Spartanburg Methodist College
Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant. 7
Fifth Annual SC Upstate Research Symposium
Keynote Speakers
Mayor William Barnet III, Mayor of the City of Spartanburg, South Carolina. Mayor Barnet received a Bachelor of Arts degree from Dartmouth College in 1964 and a Master of Business Administration degree from Amos Tuck School at Dartmouth College in 1965. He was a 1st Lieutenant in the US Army and Adjutant General’s Corps in 1967/1968. Mayor Barnet joined the family business, William Barnet & Son, Inc. (founded 1898) on December 1, 1968. He was elected President and CEO in 1976 and sold the company to a management team in April 2001. He is currently CEO of The Barnet Company and Barnet Development Company. He has served on several public and civic boards, including: Bank of America, Duke Energy, Palmetto Business Forum, ETV Endowment, Palmetto Institute, The Duke Endowment, Girl Scouts of South Carolina – Mountains to Midlands Council, Education Oversight Committee (Chairman), Leadership Spartanburg (Past Chairman), South Carolina Textile Manufacturers Association (Past President), Spartanburg County Foundation (Past Trustee). Mayor Barnet has received several Honors, including the Al Willis Award, Business Leader of the Year – 2001, the Dexter Edgar Converse Award, The Daniel Morgan Award, The Neville Holcombe Distinguished Citizen Award, the Order of the Palmetto, Paul Harris Fellow, South Carolina Business Hall of Fame, Citizen of the Year, Drummond Award for Statesmanship, and the National Alumni Association – Distinguished Citizen Award.
Dr. Jay Moskowitz, President of Health Sciences South Carolina. Dr. Moskowitz attended Queens College (City University of New York) from 1960-65, graduating from Brown University, in 1969, with a Ph.D. from the Division of Biological and Medical Sciences. Dr. Moskowitz joined the National Institutes of Health in 1969 and for over 26 years served in a number of capacities from Postdoctoral Research Associate, to Director, National Institute of Deafness and Other Communication Disorders, to Principal Deputy Director and Deputy Director for Science, Policy and Technology Transfer. In 1995, Dr. Moskowitz joined Wake Forest University School of Medicine (formerly Bowman Gray School of Medicine) as Senior Associate Dean (Science and Technology) and tenured Professor of Public Health Sciences serving in that capacity until January 2002. In January 2002, Dr. Moskowitz joined The Pennsylvania State University as Associate Vice President for Health Sciences Research, Vice Dean for Research and Graduate Studies, Penn State College of Medicine, and Chief Scientific Officer, Milton S. Hershey Medical Center. He was a Professor of Medicine in the College of Medicine and Professor of Health Policy and Administration in the College of Health and Human Development. In September 2007, Dr. Moskowitz accepted the positions of President and CEO of Health Sciences South Carolina, Endowed Chair and Professor of Translational Clinical Research in the Arnold School of Public Health, University of South Carolina. He also serves as Professor of Medicine, Medical University of South Carolina, and Adjunct Professor of Public Health, Clemson University. He has received numerous national, scientific, and community awards throughout his career. Tutorial Presenters
Granting Writing Engaging New Technology Elaine Marshall Undergraduates for Increasing Director of in Research Research Sponsored Awards Julie Morris Productivity USC Upstate Director of Cindy Jennings Undergraduate Director of Research Instructional USC Columbia Technology USC Upstate
8 Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant.
March 27th, 2009
PROGRAM SCHEDULE Fifth Annual SC Upstate Research Symposium March 27th, 2009 - Spartanburg Marriott
8:00-8:30 Registration, Poster Set-up 8:30-8:40 Opening Remarks, Sebastian van Delden, Symposium Chair 8:40-9:00 Welcome Address, Mayor William Barnet III, Mayor of Spartanburg 9:00-10:15 BREAKOUT SESSIONS I Tutorial Session 1: New Technology for Research (Ballroom) Cindy Jennings, USC Upstate Breakout Session 1: Biology (Salon A) Breakout Session 2: Human and Civil Rights: Around the World (Salon B) Breakout Session 3: Math and Computer Science (Salon C)
10:15-11:15 POSTER SESSION, Coffee Break 11:15-12:30 BREAKOUT SESSIONS II Tutorial Session 2: Engaging Undergraduates in Research Julie Morris, USC Columbia Breakout Session 4: Healthcare (Salon A) Breakout Session 5: Human and Civil Rights: Here At Home (Salon B) Breakout Session 6: Education & Pedagogy: Learning & Assessment (Salon C) 12:30-1:30 LUNCH; Keynote Speaker: Dr. Jay Moskowitz, President of Health Sciences South Carolina; Student Awards - Best Paper and Poster Awards 1:30-2:30 BREAKOUT SESSIONS III Tutorial Session 3: Grant Writing Elaine Marshall, USC Upstate Breakout Session 7: Music and The Arts (Salon A) Breakout Session 8: Business and Economics (Salon B) Breakout Session 9: Education & Pedagogy: Beyond the Classroom (Salon C)
2:30-2:45 Poster break-down
Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant. 9
Fifth Annual SC Upstate Research Symposium
Comparative Histopathology of the Lungs and Urinary Bladder of Rana pipiens Infected with Parasitic Helminths
Stephanie Newton, Baye Williamson, and Edna Steele Department of Biology Converse College 580 E. Main St., Spartanburg, SC 29302 {Stephanie.newton, Baye.williamson, Edna.steele}@converse.edu
Abstract — A total of 37 leopard frogs (Rana pipiens), metacercariae excyst and release the young flukes obtained in August and October 2006 from Nashville, which then migrate to the esophagus, trachea, and Tennessee, were examined for the presence of parasitic finally to lungs where they mature into adults [2]. helminths. Seventy six percent of the lungs examined Another parasite that inhabits the lung of frogs were infected with digenetic trematodes, is the nematode, Rhabdias spp. The infective Haematoloechus medioplexus, with a mean parasite filariform larvae of this nematode penetrate the intensity of 7.45. Rhabdias spp., a parasitic nematode, skin of an anuran, such as R. pipiens. They lodge was also found inhabiting the lungs, with parasite within various tissues in the host. However, only prevalence of 89% and mean parasite intensity of 8.45. those that reach the lungs are able to survive. In some of the lungs that were concurrently infected Within the lungs, the nematodes mature into with Haematoloechus and Rhabdias, significant hermaphroditic adults [3]. hemorrhage and copious mucus were observed. The The urogenital system of frogs is also urinary bladder was infected with another digenetic frequently inhabited by parasitic flukes, trematode, Gorgodera amplicava, with a parasite particularly the members of the Gorgoderidae family [4]. Gorgodera amplicava inhabits the prevalence of 50% and mean intensity of 0.69. Unlike urinary bladder of Rana pipiens. The adult fluke is the lungs, no nematodes and no hemorrhaging or 3 - 5mm long. The anterior portion is smaller than copious mucus secretions were observed in the bladder. the posterior. The ventral sucker is 2 – 3 times To determine if the helminth parasites cause any larger than the oral sucker. Its first intermediate significant damage to the frog’s lung and bladder at the host is a clam which serves as the host for the egg, tissue level, the histology of infected and uninfected miracidium, sporocyst, and cercariae stages. organs were compared. Results of this study showed Cercariae are expelled from the clam and eaten by minor localized erosion and blood infiltration in tissues the second intermediate host, usually tadpoles, due to the parasites. However, the extent of damage is larvae of salamanders, and crayfish. The frog minimal. This study suggests that the parasitic becomes infected by ingestion of the second helminths have very little histopathological effect on intermediate host containing infective lung and bladder of their amphibian host. metacercariae (5). Helminth parasites affect a wide range of Keywords — Histopathology, Rana, Haematoloechus, amphibians and reptiles. However, the definitive Rhabdias, Gorgodera hosts for these parasites usually show no obvious INTRODUCTION symptoms of disease. The purpose of this study is to examine, at the histological level, the infected Frogs play an important role as predators in food lungs and bladder to determine if any significant webs. They also serve as hosts to various species of damage is inflicted by the parasite to their parasitic helminths. The most commonly amphibian hosts. encountered parasites of the frog are the lung flukes, Haematoloechus spp. The adult flukes are MATERIALS AND METHODS dorsoventrally flattened worms with an inconspicuous acetabulum, about 1/4 - 1/5 the size A total of thirty seven leopard frogs (Rana pipiens) of the oral sucker. This parasite utilizes two were obtained from Sullivan’s Supply in Nashville, intermediate hosts, a snail and an odonate insect, Tennessee in August and October 2006. The frogs to complete its larval development prior to its were maintained alive in the laboratory until ready maturation into adult in the frog [1]. The frog for examination. The frogs were euthanized becomes infected by ingestion of the adult odonate according to the guidelines set by the Institutional insect (dragonfly) containing infective Animal Care and Use Committee and dissected metacercariae. Within the frog’s gut, the 10 Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant.
March 27th, 2009
immediately. The length and sex of the frog were DISCUSSION recorded and the lungs and bladder were examined for the presence of parasitic helminths. The Flukes and nematodes are known to feed off the parasite prevalence and intensity of infection were host tissue fluid or blood. Thus, hemorrhaging of determined. the infected tissue is expected. The copious mucus Infected and uninfected lungs and bladders could be attributed to the host response in their were removed and immediately fixed in 10% attempt to rid themselves of the parasites. Bolek phosphate buffered formalin. Routine histological and Janovy [6] reported that parasitism in juvenile processing of the lungs and bladders were frog results in decreased host performance and negatively impacts growth. This is an important performed at the Spartanburg Pathology point to consider in future studies. The Consultants. The slides were examined using insignificant damage observed in the lungs and compound light microscope. bladder may be attributed to the fact that all frogs examined were adults. It should be taken into RESULTS consideration that adult frogs may have developed resistance to the damaging effect of the parasites. All 37 frogs examined in this study appeared to be In a study by Gendron [7], it is noted that adult healthy, showing no external signs of disease. frogs can tolerate moderate levels of lung worm However, dissection of the lungs and urinary infection without much obvious impact on their bladders revealed presence of parasitic helminths. health. Rhabdias parasites are not considered Seventy six percent were infected with highly virulent pathogens in adults but the effects Haematoloechus medioplexus, 89% with Rhabdias on young anurans can be much more detrimental. spp., and 50% with Gorgodera amplicava. The Lung and bladder tissue are known for being mean parasite intensity was 7.45, 8.45, and 0.69 particularly stretchy and flexible. This fact may respectively. Haematoloechus and Rhabdias were allow the organs to accommodate these parasitic found in the lungs while Gorgodera was found in invaders. The fact that amphibians employ the urinary bladder. Some of the lungs were concurrently infected with Haematoloechus and multiple methods of breathing may also lessen the Rhabdias. Significant hemorrhage and copious effect of the parasites residing in the lungs. The mucus were observed in some of these lungs. In seemingly minimal effect on the host is beneficial particular, a lung heavily infected with thirty three to the parasite, as it would be fatal to the parasites H. medioplexus appeared shriveled compared to its to kill the host. healthier counterpart. The lung tissue was less elastic and resistant to return to its original shape CONCLUSION upon being compressed. Histological examination of the infected lungs revealed sections of parasites Results of this study showed that the in situ. Tissues adjacent to the parasite showed histopathological effect of Haematoloechus infiltration of blood cells, and slight erosion of epithelial tissue accompanied by hemorrhage. medioplexus, Rhabdias spp. and Gorgodera Epithelial cells adjacent to the parasite amplicava on the lungs and urinary bladder of (Haematoloechus or Rhabdias) lack the cilia their amphibian host is only minimal and does not normally found in uninfected cells (Fig. 1, 2). cause serious damage to the host organs. However, the damage does not appear to be extensive and are restricted only to areas that are ACKNOWLEDGMENTS in direct contact with the parasites. Examination of infected bladders also showed Special thanks are extended to Nita Russell of several parasites with a plug of host tissue within Spartanburg Pathology Consultants for technical the muscular sucker (Fig. 3, 4), Interestingly, no assistance with histological processing of tissues visible hemorrhage is apparent. Other than severe and Converse College for the use of its facilities. stretching of the bladder epithelial and smooth This research was supported by a grant from the muscle tissue, no apparent epithelial erosion was South Carolina Independent Colleges and observed. Universities.
Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant. 11
Fifth Annual SC Upstate Research Symposium
REFERENCES [6] M, Bolek and J. Janovy, Jr. Small frogs get their worms first: the role of nonodonate arthropods in [1] S. Snyder, and J. Janovy, Jr. Second intermediate the recruitment of Haematoloechus coloradensis host-specificity of Haematoloechus complexus amd and Haematoloechus complexus in newly Haematoloechus medioplexus metamorphosed northern leopard frogs, Rana (Digenea:Haematoloechidae). Journal of pipiens, and Woodhouse’s toads, Bufo woodhousii. Parasitology, vol 80(6), pp1052-1055, 1994. The Journal of Parasitology vol (93), pp 300-312 [2] Haematoloechus medioplexus, University of [7] A. Gendron, D. Marcogliese, S. Barbeau, M. Michigan Museum of Zoology, Animal Diversity Christin, P. Brousseau, S. Ruby, D. Cyr, and M Web. Fournier. Exposure of leopard frogs to a pesticide http://animaldiversity.ummz.umich.edu/site/accou mixture affects life history characteristics of the nts/information/Haematoloechus_medioplexus.ht lungworm, Rhabdias ranae. Conservation Ecology, ml vol. 135, pp 469-476, 2003 [3] The Rhabditid Nematodes (Order Rhabditida) http://www.k-state.edu/parasitology/classes/ 625nematode19.html [4] K. Kim, K. Joo, and H. Rim. Gorgoderid trematodes (Digenea:Gorgoderidae) from the urinary bladder of frogs in Korea. Korean Journal of Parasitology, vol 33(2), pp 75-83, 1995 [5] O. Olsen. “Animal Parasites: Their Life Cycles and Ecology”. University Park Press, Baltimore, Maryland, 1974
12 Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant.
March 27th, 2009
Ploidy Levels and Genome Sizes of Magnolia L. Species, Hybrids, and Cultivars J. Kevin Parris1, Thomas G. Ranney2, W. Vance Baird1, and Halina T. Knap3 1Clemson University, Department of Horticulture, 164 Poole Agricultural Center, Clemson, SC 29634 2N.C. State University, Dept. of Horticultural Science, 455 Research Dr., Fletcher NC, 28732 3Clemson University, Dept. of Entomology, Soils, and Plant Sciences and Dept. of Genetics and Biochemistry, 276 P&AS Bldg., Clemson, SC 29634; [email protected]
Key Words: Cytology, Flow Cytometry, Genome Size, Because many species with significant Magnolia, Polyploidy ornamental appeal are polyploids with high chromosome counts, traditional cytology with light INTRODUCTION microscopy is extremely difficult. Diploid counts The genus Magnolia L. includes a broad range of are more feasible, but still require considerable valuable nursery and landscape plants. In 1980, skill and effort. Flow cytometry has proved to be The Journal of the American Magnolia Society an efficient means of estimating genome size and posthumously quoted E.H. Wilson, the great 19th allows for elucidation of ploidy level [5]. The century British plant explorer as saying: “No group objectives of this study were to determine the of trees and shrubs is more favorably known or genome sizes and relationships to ploidy levels of a more highly appreciated in gardens than diverse collection of species, hybrids, and cultivars magnolias, and no group produces larger or more of Magnolia by using flow cytometry in order to: 1) abundant blossoms.” [9]. Considerable progress increase sampling among and within species to has been made breeding improved Magnolias; develop an extensive database for use by magnolia however, a greater understanding of polyploidy in breeders; 2) determine the ploidy level of this genus would greatly enhance future breeding suspected, but unconfirmed, polyploid taxa (both efforts. Polyploidy is an important factor in plant naturally occurring and chemically induced); and breeding as it can influence reproductive 3) confirm hybridity in interploid crosses and compatibility, fertility, and gene expression [7]. interspecific hybrids that vary in genome size. This research provides an extensive survey of Over 275 diverse species and cultivars were polyploidy and determination of genome sizes in sampled from various sources that included taxa the genus Magnolia and will provide a valuable from each subgenera of Magnolia as well as both database for Magnolia breeders. species of genus Liriodendron. Nuclei, from newly expanded leaf or tepal tissue, were extracted, NATURE OF WORK stained (with DAPI), and then analyzed (minimum The genus Magnolia contains more than 250 2500 events) using a flow cytometer (PA-I, Partec, species belonging to various sections within three Münster, Germany) to determine relative DNA subgenera [3]. Although basic information on content. Genome sizes were determined by chromosome counts and ploidy levels of different comparing mean relative fluorescence of each magnolia species have been compiled [1, 2], sample with an internal standard, Pisum sativum sampling has been limited and little is known L. ‘Ctirad’, with a known genome size of 8.76 ρg about ploidy levels of specific hybrids and [4]. To increase resolution of genome size, cultivars. The base chromosome number for tetraploid Magnolias which have similar genome Magnolia is 1n=1x=19. However, different sizes to Pisum sativum ‘Ctirad’. M. virginiana subgenera contain species with a variety of ploidy ‘Jim Wilson’ (3.73 ρg) and M. grandiflora ‘Little levels from 2n=2x=38 to 2n=6x=114. Crosses of Gem’ (10.92 ρg) were used as secondary standards. species with varying ploidy levels may yield hybrids Genome sizes for the secondary standards were with odd ploidy levels, which often result in calculated as the mean of 10 separate subsamples reduced fertility or sterility [7]. Because of these determined with the Pisum sativum ‘Ctirad’ as an constraints, Magnolia breeders with a desire to internal standard. Holoploid, 2C DNA contents incorporate the best features of these hybrids have were calculated as: 2C = DNA content of standard attempted to induce new polyploids to overcome (mean fluorescence value of sample/ mean these limitations, yet most of these putative fluorescence value of standard). The relationship polyploids have never been confirmed. The range between ploidy levels and genome sizes was in ploidy levels within this genus also provides an determined for plants with documented opportunity to indirectly substantiate hybridity of chromosome numbers. Mean 1Cx monoploid distant hybrids, based on chromosome number genome size (i.e., DNA content of the non- and genome size, when parents differ in ploidy replicated base set of chromosomes with x = 19) levels.
Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant. 13
Fifth Annual SC Upstate Research Symposium
Table 1. Summary of means and ranges for 2C, holoploid genome size (ρg) of Magnolia species grouped by section and ploidy level. 1Numbers in parenthesis, following classifications, indicated the number of species sampled, and the total number of taxa within those species sampled. 2Values represent means followed by (ranges) for all magnolia species sampled. Means for 2C genome size followed by different letters, within a column, are significantly different, P<0.05
Ploidy Level Classification 2n=2x=38 2n=4x=76 2n=6x=114 2n=8x=152 Subgenus Magnolia Section Magnolia 2C=3.792 D NA 2C=11.16 C NA (including Theorhodon,5,401) (3.43-4.40) (10.83-11.63)
Section Gwillimia (2,3) 2C=5.34 A NA NA NA (5.1-5.47)
Section Oyama (1,7) 2C=4.52 C NA NA NA (4.35-4.62)
Section Manglietia (6,12) 2C=4.78 B NA NA NA (4.65-5.07)
Section Rhytidospermum (4,8) 2C=3.96 D NA NA NA (3.66-4.69)
Section Macrophylla (1,5) 2C=4.56 BC NA NA NA (4.41-4.87)
Section Auriculata (1,2) 2C=3.83 D NA NA NA (3.74-3.92)
Section Kmeria (1,1) 2C=5.51 A NA NA NA (5.48-5.54)
Subgenus Yulania Section Yulania 2C=4.07 D 2C=8.43 A 2C=12.74 A 2C=17.34 (including Beurgaria and (3.84-4.16) (7.71-8.88) (11.49-13.22) (17.07-17.49 M. liliiflora, 13,46) Section Tulipastrum (1,3) NA 2C=8.01 A NA NA (7.86-8.26)
Section Michelia (14,22) 2C=4.55 BC NA NA NA (4.27-4.87)
Subgenus Gynopodium Section Gynopodium (1,3) NA NA 2C=11.57 B NA (11.44-11.72)
Genus Liriodendron (2,2) 2C=3.39 E NA NA NA (3.35-3.43)
14 Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant.
March 27th, 2009
was calculated as (2C genome size / ploidy level) to subgenus Yulania. Relative genome size (2C =6.16 assess variability in base genome size. A minimum ρg) of this hybrid is consistent with a triploid of two subsamples were tested to derive a mean condition, confirming it to be intermediate relative genome size for each taxa. Data were between the diploid and tetraploid parents. M. subjected to analysis of variance and means (insignis x virginiana) ‘Katie-0’ is another separation using the Waller procedure. important intersectional cross that demonstrates pigmentation of tepals can be introgressed into CONCLUSIONS white flowered species of subgenus Magnolia. Hybridity of M.‘Katie-O’ is suggested based on Flow cytometry was an efficient and effective morphological appearance, but intermediate method of estimating genome size. Genome size genome size (2C= 4.33 ρg) further substantiated its varied significantly among taxonomic sections hybrid origin. The difference in mean relative (Table 1), indicating that these groups have genome size for diploids in section Manglietia undergone considerable evolutionary divergence (2C=4.78 ρg) and section Magnolia (2C=3.79 ρg) [8]. Furthermore, this indicates that it is necessary allow for this distinction to be made. Flow to calibrate ploidy level with genome size for each cytometry did not allow for distinction of cultivars section, in order to estimate ploidy level from or interspecific hybrids within a given section due genome size in Magnolias. However, within a to highly conserved genome sizes within sections. section, genome sizes for a given ploidy level had Overall, flow cytometry provides an extremely narrow ranges and could clearly be used to useful tool to study polyploidy and provides an determine ploidy levels (Table 1). In general, the entry to the investigation of reproductive biology in ploidy levels determined for different species was the genus Magnolia. This research provides a consistent with past reports, with a few exceptions. foundation and database for breeders that will Magnolia cylindrica was found to be a tetraploid facilitate the development of hybrids in the future. here, while past reports have indicated it is a diploid [1, 2]. REFERENCES The results of this study also verified that M. [1] Callaway, D.J. 1994. The World of Magnolias. stellata and M. cylindrica accessions from the Timber Press, Portland. Holden Arboretum were induced polyploids. [2] Chen Zhong-yi, X. Huang, R. Wang, S. Chen. 2000. Phenotypic characteristics such as thickened Chromosome Data of Magnoliaceae. Proceedings of foliage and increased width to length ratio in The International Symposium on the Family foliage [6,7] were suggestive of polyploidy in M. Magnoliaceae. Beijing: Science Press. 192-201. seiboldii ‘Colossus’, a reported hexaploid. In this [3] Figlar, R.B. 2004 Classification of Magnoliaceae. study, samples of M. seiboldii ‘Colossus’ from Magnolia Society International. Nov. 2008. multiple sources had genome sizes (2C =4.35 ρg -
Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant. 15
Fifth Annual SC Upstate Research Symposium
Messin’ With Texas! The genus Isoetes (Isoetaceae) in the Lonestar State
C. Matthew Hardman and Kerry D. Heafner Department of Biology Limestone College 1115 College Drive, Gaffney, SC 29340 [email protected] Abstract — Isoetes is a genus of heterosporous lycopods Isoetes melanopoda is a wide-ranging diploid that with 300 to 400 species worldwide. Approximately ten occurs throughout much of the eastern two-thirds percent of these species occur in North America. Based of the United States in a variety of ephemerally wet on megaspore ornamentation, four Isoetes species were habitats. recently recognized from the Llano Uplift region of Most recently, Holmes et al. [3] used megaspore central Texas: Isoetes butleri Engelmann, I. lithophila surface ornamentation patterns to distinguish four Pfeiffer, I. melanopoda Gay & Durieu, and I. Isoetes species in Texas, all of which were collected piedmontana (Pfeiffer) Reed. Historically, I. from the Llano Uplift and Edwards Plateau regions piedmontana has been regarded as endemic to granite of central Texas. In addition to I. lithophila and I. flatrocks of the southeastern United States Piedmont melanopoda, Holmes et al. [3] recognized I. butleri region. These Texas populations are of interest because Engelmann, a diploid species typically occurring on of their significant geographic separation from the limestone seeps and on the much-studied cedar closest rock outcrop Isoetes populations in eastern barrens of central Tennessee, and I. piedmontana Alabama. Collections of rock outcrop Isoetes from the (Pfeiffer) Reed, a species historically considered endemic to the granite flatrocks of the Llano Uplift region of central Texas were made in May, southeastern U.S. Piedmont. 2008. Material for chromosome counts was obtained The Llano Uplift region of central Texas is from populations in Burnet, Llano, and Mason Counties. composed of Precambrian granite and protrudes Specimens from Bell and Coryell Counties are I. butleri. through the larger region of Cretaceous limestone All plants sampled were diploid and more closely that makes up the Edwards Plateau. The resembled I. melanopoda in terms of morphology. We occurrence of I. piedmontana in the Llano Uplift also sampled populations historically identified as I. region of central Texas seems unlikely for two lithophila. However, our material did not match major reasons. First, habitats that would support Pfeiffer’s original description which brings the identity of I. piedmontana do not occur between eastern this species into question. Alabama and central Texas, a distance of approximately 800 air miles. Because the spores Keywords — Isoetes, quillwort, Llano Uplift, of Isoetes are produced in subterranean sporangia, Texas. and because Isoetes produces the largest INTRODUCTION megaspores of the vascular land plants, dispersal Isoetes, the quillworts (Isoetaceae) is a genus of by wind, such as that documented in homosporous heterosporous lycopods that represents an ancient ferns, does not provide a plausible explanation for lineage in vascular land plant evolution. The genus the occurrence of I. piedmontana in Texas. is cosmopolitan and is composed of approximately Second, the different geochemistries of the Llano 300 to 400 species. The southeastern United Uplift and southeastern U.S. Piedmont would States is a significant center of diversity for this support the hypothesis of independent colonization genus in North America, especially in terms of the events and adaptations to substrates of different number of allopolyploid species, many of which mineral compositions as evidenced by the red or have been described in the last decade. pink granite of the Llano Uplift versus the lighter Correll and Johnston [1] recognized two species grey granite of the southeastern Piedmont. of Isoetes in Texas: Isoetes lithophylla [sic] Our study attempts to address three questions: Pfeiffer, and I. melanopoda Gay and Durieu. 1) Does I. piedmontana occur in Texas? 2) If so, do Pfeiffer [2] described I. lithophila as producing populations of I. piedmontana in Texas occur at megaspores that are grey when dry and brown more than one ploidy level, and do these different when wet, and having sporangia that are ploidy levels represent previously-unrecognized completely covered by the velum. This description species? 3) How diverse is the genus Isoetes in the is strikingly similar to that of I. melanospora Llano Uplift region of central Texas? Engelmann, which is endemic to central Georgia.
16 Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant.
March 27th, 2009
MATERIALS AND METHODS populations in Alabama and North Carolina have Specimens previously identified as I. piedmontana, recently been separated out of I. piedmontana [4]. I. lithophila, and I. melanopoda were collected Isoetes lithophila was described by Pfeiffer in from sites in Bell, Burnet, Gillespie, Llano, and her 1922 monograph of the genus. The type Mason Counties, Texas. Seventeen individual material was collected in 1914 on a granite dome in populations were sampled, and roots were used to Burnet County. Pfeiffer cited grey or brown obtain chromosome counts. Sites sampled megaspores and sporangia that are completely included Fort Hood Military Installation, Inks Lake covered by vela as distinguishing features of I. State Park, enchanted rock State Park, property lithophila. Based on this description, I. lithophila adjacent to Ferguson Power Plant, and Mason is most morphologically similar to the federally Mountain Wildlife Management Area. endangered I. melanospora Engelmann of central For chromosome squashes, roots were harvested Georgia. The identity of I. lithophila should be re- and fixed for 3 hrs. in aqueous examined not only due to its resemblance to I. paradichlorobenzene (PDB) followed by 1 hr. in a melanospora, but also because none of the 3:1 solution of absolute ethanol/glacial acetic acid. material we collected from the Llano Uplift region For squashing, roots were hydrolyzed in 1N HCl for of central Texas matched Pfeiffer’s description of I. 12 min. followed by a 10 min. wash in 95% ethanol. lithophila. At present, three species of Isoetes can Roots were stained in Wittman’s hemotoxylin for 1 be recognized from Texas: I. butleri, I. lithophila, hr. then destained in glacial acetic acid for less and I. melanopoda. than 1 min. Root apices were excised and placed on a glass slide in a drop of Hoyer’s Medium, and ACKNOWLEDGMENTS squashed under a glass cover slip. Countable We acknowledge funding from South Carolina figures were photographed at 1000X. Independent Colleges and Universities, Inc. (SCICU). J.L. Pridmore, Limestone College, began RESULTS this project. We acknowledge the assistance of Plants collected in Bell and Coryell Counties on Ft. Laura Sanchez-Hansen and Eric Runfeldt at Fort Hood were actually I.butleri and not I. Hood, Jason Singhurst of the Texas Department of piedmontana. Because I. butleri is so Parks and Recreation, Dr. Walter Holmes at Baylor morphologically distinctive, no chromosome University, the herbarium at The University of counts were obtained from the Fort Hood plants. Texas at Austin, and Steve Leonard of The Nature All plants counted from the other sites were diploid Conservancy in Mississippi. (2n=22), and were more similar morphologically to I. melanopoda. REFERENCES
DISCUSSION [1] D.S. Correll and M.C. Johnston. Manual of the Vascular Plants of Texas. Texas Research In the Llano Uplift region of central Texas, both I. Foundation, Renner, Texas. 1970. butleri and I. melanopoda have been incorrectly [2] N.E. Pfeiffer. Monograph of the Isoetaceae. Annals identified as I. piedmontana. Isoetes butleri is the of the Missouri Botanical Garden, vol. 9, pp.79-232, common quillwort of limestone glades and seeps in 1922. the central and eastern portions of the United [3] W.C. Holmes, A.E. Rushing, and J.R. Singhurst. States. Historical collections of I. butleri from as Taxonomy and identification of Isoetes (Isoetaceae) far north in Texas as Dallas and Tarrant Counties in Texas based on megaspore features. Lundelia, vol. 8, pp. 1-6, 2005. suggest that I. butleri may be more widespread in [4] K.D. Heafner, R.D. Brannon, M.L. Dornis, and K.M. Texas than currently realized. Morphologically, Smith. Three allotetraploid segregates of Isoetes material that we examined from granitic habitats piedmontana (Pfeiffer) Reed. Manuscript on the Llano Uplift more closely resemble I. submitted, Castanea, 2009. melanopoda, a diploid species of ephemerally wet habitats ranging over most of the central and eastern portions of the United States. Until its systematic relationships to I. melanopoda can be adequately assessed, I. piedmontana should be interpreted as the common diploid quillwort of only the granite flatrocks of the southeastern United States Piedmont. Three allotetraploid
Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant. 17
Fifth Annual SC Upstate Research Symposium
Using Spatial Assessment of Drift Fence Captures to Investigate Juvenile Dispersal of Ranid Frogs
Chelsea Kross and Melissa Pilgrim Division of Natural Sciences and Engineering University of South Carolina Upstate 800 University Way, Spartanburg, SC 29303 [email protected], [email protected]
Abstract - In spring of 2007 we started a drift fence individuals weighing less than 5grams (see Figure study evaluating the use of an abandoned homestead by 1). We suspected that we were documenting a herpetofauna (reptiles and amphibians). When wave of juvenile dispersal from nearby aquatic evaluating data collected during 2007, we noticed that habitats. A retention pond is located the majority of our ranid frog captures were of approximately 150m from the drift fence site and individuals weighing less than 5grams. We suspected Lawsons Fork Creek is located approximately 125m that we were documenting a wave of juvenile dispersal from the drift fence site. We hypothesized that the from nearby aquatic habitats. A retention pond is majority of ranid frogs entering the drift fence site located approximately 150m from the drift fence site were captured in traps oriented towards the nearby and Lawsons Fork Creek is located approximately 125m aquatic habitats. In addition, ranid frogs captured from the drift fence site. We hypothesized that the at our site represented four different species: Rana majority of ranid frogs entering the drift fence site were catesbeiana (American Bullfrog), R. clamitans captured in traps oriented towards the nearby aquatic (Green Frog), R. palustris (Pickerel Frog), and R. habitats. Evaluation of the spatial distribution of ranid sphenocephala (Southern Leopard Frog). Each frog species has a particular breeding phenology. frog captures revealed that we captured 91% of the Thus, there can be seasonal variation in emergence ranid frogs in traps facing the aquatic habitats and of metamorphosed individuals from aquatic only 9% of the ranid frogs in traps facing the forest habitats. In addition to assessing the spatial habitats. In addition, ranid frogs captured at our site distribution of ranid frogs captured at the drift represented four different species. We hypothesized fence site, we evaluated the arrival time of each that there would be interspecific variation in the timing ranid frog species at the drift fence site. of ranid frog captures at the drift fence site. In fact, we Specifically, we hypothesized that there would be did observe temporal variation in the arrival dates of interspecific variation in the timing of ranid frogs ranid species at the fence. Our drift fence site lies < captured at the drift fence site. 200m away from the aquatic habitats and would be considered part of their “buffer zone”. Thus, as our data set grows, the drift fence site has the potential to 0.9 contribute useful data relevant to increasing our 0.8 understanding of how buffer zones impact amphibian 0.7 Funnel Trap Pitfall Trap population persistence. 0.6
INTRODUCTION 0.5 0.4
Drift fence arrays are a standard technique used to 0.3 inventory and monitor many wildlife species, including reptiles and amphibians [1,2,3]. In 0.2 0.1 addition to allowing documentation of species Frog Captures Proportion Ranid of richness in an area, drift fence arrays can assess 0 seasonal movement patterns of a species or 0-5 >10 movement patterns of animals relative to specific Mass (g) habitat features within a landscape [4,5]. In spring of 2007 we started a drift fence study evaluating Fig 1. Size distribution of ranid frogs captured in pitfall the use of an abandoned homestead by and funnel traps. herpetofauna (reptiles and amphibians). When evaluating data collected during 2007, we noticed that the majority of our ranid frog captures were of
18 Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant.
March 27th, 2009
METHODS captured entering the homestead from each direction simply by calculating the percentages of DRIFT FENCE DESIGN total ranid frogs captured in each of the two divisions. We used EXCEL (version 2003) for data To assess the use of the abandoned homestead by management and analyses. herpetofauna, we surrounded the homestead with a 62m drift fence in March of 2007. We dug a RESULTS 15cm deep trench around the homestead. We Between 4/26/07 and 6/15/2008, we captured 33 erected pre-staked silt fencing (61cm high) in the ranid frogs entering the drift fence site (Table 1). trench and buried the bottom of the fence. We We captured 91% of the ranid frogs in traps facing placed a pair of traps every 3m around the fence. the aquatic habitats and only 9% of the ranid frogs We placed one trap of a pair on the inside of the in traps facing the forest habitats. We observed fence and one trap of a pair on the outside of the interspecific differences in the timing of frog fence. In total, we surrounded the fence with 20 captures (Table 1). We captured 16 R. pitfall traps and 20 funnel traps. We used 18.9L sphenocephala (Southern Leopard Frogs) in July buckets as pitfall traps. We drilled holes in the of 2007; thus July represented the peak month of bottom of each bucket for drainage and then ranid frog arrival at the drift fence site. buried the buckets flush with the fence and the surface of the ground. We placed a sponge in each Table 1. Ranid Frogs Captured Entering the Upstate bucket to act as a flotation device for animals Homestead captured during periods with heavy rain. We constructed our funnel traps using 0.64cm Drift Fence Site. N = the number of individual frogs. hardware cloth, following the design of Fitch [1]. Species: N: Dates Captured: Our funnel traps were covered with extra silt Rana catesbeiana 2 10/9 – 10/24/2007 fencing to provide shade for captured animals. (American Bullfrog) Rana clamitans 4 6/26 – 6/27/2007 DATA COLLECTION AND ANALYSIS (Green Frog) Rana palustris 1 3/5/2008 During time periods when the fence was open, we (Pickerel Frog) checked the fence daily for trapped animals. We Rana sphenocephala 26 5/13 – 9/ 16/2007 (Southern Leopard recorded the trap number and species name for Frog) each captured animal. We transported captured animals to the laboratory for data collection. We recorded the length (to 0.1cm) and mass (to 0.1g) CONCLUSIONS of each reptile and amphibian captured. We permanently marked snakes weighing more than Evaluation of the spatial distribution of traps that 20g with passive integrated transponders (PIT- tags). In addition, we used probes to determine captured ranid frogs entering the drift fence site the gender of each snake and used palpation to supported our hypothesis that ranid frogs in our determine the reproductive condition of female study were predominantly arriving at the snakes. Following data collection, we transported homestead site from the direction of the closest captured animals back to the fence for release. We aquatic habitats. In addition, assessing differences released animals five meters from the fence in the in the arrival time of each ranid species at the drift direction they were heading when trapped (i.e., we fence site supported our hypothesis that arrival at released animals captured in outside traps within the fenced area, and we released animals captured the drift fence site would show interspecific in inside traps outside of the fenced area). variation. Our expectation is that as our data set To assess the spatial distribution of ranid frogs grows, we will be able to further assess temporal captured entering the homestead site, we divided and spatial variability in use of our terrestrial site the fence in half along its north to south axis. Traps by amphibian species. In addition, we hope to lying west of the division faced aquatic habitats, implement a study that uses frogloggers while traps lying east of the division faced forest habitat. We compared the number of ranid frogs (automated data acquisition systems) to record breeding choruses at the aquatic habitats. We Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant. 19
Fifth Annual SC Upstate Research Symposium
would then be able to assess whether or not there is an association between specific breeding events and waves of ranid frogs arriving at the drift fence site. The importance of terrestrial habitats surrounding wetlands to the survival of amphibian populations is well-recognized [6,7,8,9]. Our drift fence site lies < 200m away from aquatic habitats and would be considered part of the “buffer zone” for both the retention pond and Lawsons Fork Creek. Thus, our site has the potential to contribute useful data relevant to increasing our understanding of how buffer zones impact amphibian population persistence.
REFERENCES
[1] H. Fitch, H.S. “Collecting and life-history techniques,” In Snakes: Ecology and Evolutionary
Biology. R. Seigel, J. Collins, and S. Novak (Eds). McGraw-Hill, Inc., New York, pp 143-164, 1987.
[2] W. Heyer, M. Donnelly, R. McDiarmid, L. Hayek and M. Foster (Eds), “Standard techniques for inventory and monitoring,” In Measuring and Monitoring Biological Diversity: Standard methods for amphibians. Smithsonian Institution Press, Washington, pp 75-141, 1994. [3] B. Todd, C. Winne, J. Willson, and J. Gibbons. “Getting the drift: examining the effects of timing, trap type, and taxon on herpetofaunal drift fence surveys,” American Midland Naturalist 158, pp 292- 305, 2007. [4] X. Glaudas, K. Andrews, J. Willson, and J. Gibbons. “Migration patterns in a population of cottonmouths (Agkistrodon piscivorus) inhabiting an isolated wetland,” Journal of Zoology 271, pp 119-124, 2007.
[5] D. Patrick, M. Hunter, Jr., and A. Calhoun. “Effects of experimental forestry treatments on a Maine amphibian community,” Forest Ecology and Management 234, pp 323-332, 2006. [6] R. Semlitsch, “Biological delineation of terrestrial buffer zones for pond-breeding salamanders,” Conservation Biology 12, pp 1113-1119, 2001. [7] J. Gibbons, “Terrestrial habitat: a vital component for herpetofauna of isolated wetlands,” Wetlands 23, pp 630-635, 2003. [8] R. Semlitsch and J. Bodie, “Biological criteria for buffer zones around wetlands and riparian habitats for amphibians and reptiles,” Conservation Biology 17, pp 1219-1228, 2003. [9] T. Rittenhouse and R. Semlitsch, “Distribution of amphibians in terrestrial habitat surrounding wetlands,” Wetlands 27, pp 153-161, 2007.
20 Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant.
March 27th, 2009
Three Allotetraploid Segregates of Isoetes piedmontana (Pfeiffer) Reed
Ricky D. Brannon, Miranda L. Dornis, Kristen M. Smith, and Kerry D. Heafner Department of Biology Limestone College 1115 College Drive, Gaffney, SC 29340 [email protected]
Abstract — Isoetes piedmontana (Pfeiffer) Reed type population in Georgia, as well as the (Isoetaceae) has historically been recognized as the tetraploid (2n=44) status of a population in common quillwort of the much-studied granite flatrocks Randolph County, Alabama. Subsequent of the southeastern United States Piedmont Region. cytological analyses have also revealed additional Cytological studies have confirmed diploid (2n=22) and tetraploid populations in Hancock County, tetraploid (2n=44) populations included in this species. We present the results of a study comparing thirteen Georgia, Franklin and Wake Counties, North morphological features in plants from three tetraploid Carolina, and Powhatan County, Virginia [4], [5]. populations in Alabama and North Carolina that have A cursory examination of the enzyme historically been identified as I. piedmontana. The triosephosphate isomerase (TPI) demonstrated Alabama population differed significantly from both that tetraploid populations of I. piedmontana in North Carolina populations in seven characters. The Randolph County, Alabama, and Franklin and two North Carolina populations differed significantly Wake Counties, North Carolina exhibit additive, from each other in twelve of thirteen characters. Based yet different, allele compositions at TPI-2 and TPI- on previously published genetic evidence and the results 2 [5]. of the present morphological study, we recognize three allotetraploid segregates of I. piedmontana: Isoetes While there is sufficient genetic evidence to alabamensis sp. nov. from Randolph County, warrant recognition of the Alabama and North Alabama; Isoetes carolinae-septentrionalis sp. Carolina tetraploid populations at the species level, nov. from Wake County, North Carolina, and Isoetes no analyses testing the morphological distinctness analogous sp. nov. from Franklin County, North Carolina. Isoetes piedmontana sensu stricto of tetraploid populations included in I. should be interpreted as the common diploid quillwort piedmontana have been conducted until the found on granite flatrocks in the southeastern United present study. The goals of this paper are to 1) States Piedmont Region. report the results of a morphological study
comparing Alabama and North Carolina Keywords — Isoetes, quillwort, tetraploid. allotetraploid populations of I. piedmontana and 2) provide names for these newly delineated INTRODUCTION allotetraploid taxa. Isoetes piedmontana (Pfeiffer) Reed was originally described as a variety of Isoetes virginica Pfeiffer MATERIALS AND METHODS based on having shorter and more numerous The three populations of I. piedmontana examined leaves per plant and megaspores with a different in this study have previously been confirmed as ornamentation pattern [1]. Reed [2] subsequently being tetraploid [5]. All data were derived from elevated I. virginica var. piedmontana to species plants collected in the 2007 field season. Thirteen status in a treatment of Isoetes of the southeastern morphological features were examined from a total United States. Populations presently recognized as of 58 pressed and alcohol-preserved plants. I. piedmontana have been collected on granitic Sample sizes for each character varied among the outcrops ranging from eastern Alabama, through three populations. Microphylls were delineated central Georgia, through central South and North into subulate and alate portions [5]. Total leaf Carolina, and to east-central Virginia. length was measured from the point of attachment Genetic evidence, derived from chromosome on the corm to the subla apex. Alate lengths were counts and allozymes, suggests that I. measured from the leaf base to either the longer of piedmontana may contain more than one species. the two ala apices or to the ala apex that was most Matthews and Murdy[3] confirmed the diploid accessible. Subulate length was calculated as the (2n=22) status of fifteen populations, including the difference between total leaf length and alate
Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant. 21
Fifth Annual SC Upstate Research Symposium
length. Subulate width was measured at mid- the Randolph County Alabama population had subula, and alate width was measured at the ala’s triangular to deltate ligules and labia that were widest point above the sporangium. Sporangial commonly bifid. Leaves from plants in the Wake features were measured at either 400 or 500X with County, North Carolina population had variously an ocular micrometer. Sporangium length and triangular ligules and irregularly undulate labia. width, as well as velum coverage and ligule and Leaves from plants in the Franklin County, North labium features were measured on plants Carolina population had triangular to broadly preserved in 91% isopropyl alcohol. Ligule width deltate ligules and had labia that are mostly was measured across the base of the ligule; ligule spatulate. length was measured from the bottom of the base Four significantly different principal to the apex. Labium width was measured across components were generated which accounted for the lower lip of the foveola, the pit from which the 61% of the total variation explained in the data set. ligule arises; labium length was measured from the Characters with the most heavily weighted edge of the lower lip of the foveola to the labium’s component loadings in PC 1 were percent velum highest point. Selected ligules and labia were coverage (-0.789), ligule width (0.742), and labium drawn with camera lucida. Megaspore diameters length (0.620). In PC 2, alate length, sporangium were measured from air-dried spores at 500X with width and megaspore diameter had the three most an ocular micrometer oriented parallel to the heavily weighted component loadings (-0.740, equatorial ridge of the spore. Microspore lengths 0.489, and 0.452, respectively). The jack-knifed were measured from spores mounted in Hoyer’s classification matrix that resulted from the DFA medium at 1,000X with the micrometer parallel to using percent velum coverage and ligule width the spore’s hylar ridge. from PC 1 revealed that 90% of the plants from the Means and standard deviations were calculated Randolph County, Alabama population whereas for each character in each population. Statistical plants from Wake and Franklin Counties, North analyses were conducted on standardized data Carolina were correctly classified while 85% and using SYSTAT Version 10.2 [6]. First, pair-wise 100% of the time, respectively. Using all thirteen two sample t-tests were used to assess which morphological characters, 90% of the plants from characters differed significantly among the three Alabama were correctly classified, whereas plants populations. Then, twenty samples for which all from Wake and Franklin Counties, North Carolina thirteen morphological variables could be were correctly classified 85% and 95% of the time, measured from each of the three populations were respectively. used for principal components analysis (PCA). Finally, two separate discriminant function DISCUSSION analyses (DFAs) were conducted to assess the Based on the results of this morphological study degree to which individuals from each population and on previously published genetic evidence, we could be correctly assigned to their respective recognize three new allotetraploid segregates of I. population. The first DFA was run using the two piedmontana: Isoetes alabamensis sp. nov. from characters with the heaviest component loadings in Randolph County, Alabama; Isoetes carolinae- PC 1. The second DFA was run using all thirteen septentrionalis sp. nov. from Wake County, North morphological features because plants from each Carolina; and Isoetes analogous sp. nov. from population could be classified a priori based on Franklin County, North Carolina. Formal geography. Jack-knifed classification matrices and descriptions of these new taxa have been submitted canonical scores plots demonstrating the best to Castanea, the journal of the Southern possible delineation among the three populations Appalachian Botanical Society. While not were generated by the DFAs. necessarily a useful field character, the importance of obtaining chromosome counts from any Isoetes RESULTS population cannot be overemphasized. Pair-wise two sample t-tests revealed that the Identifications based on a single morphological Alabama plants differed significantly from both feature, such as megaspore ornamentation, are North Carolina populations in seven characters, tenuous at best and need to be supported with some of which were the same for both populations. either multiple morphological features, The Franklin County population, however, differed chromosome counts, or both. Assessing spore size significantly from the Wake County population in alone may allow only an estimation of ploidy level. twelve of thirteen characters. Ligules and labia The simple task of counting chromosomes led to were among the most variable features among the the realization that the entity long thought to be I. three populations. Ligules from all three populations are auriculate. Leaves from plants in 22 Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant.
March 27th, 2009
lacustris L., a decaploid (2n=110) in southeastern Tennessee is actually an octaploid (2n=88) [7]. Isoetes piedmontana sensu stricto should be interpreted as the common diploid quillwort of the southeastern U.S. granitic flatrocks until its systematic relationship to the wide-ranging diploid species I. melanopoda can be thoroughly examined.
ACKNOWLEDGMENTS
This research was funded by South Carolina Independent Colleges and Universities (SCICU), Inc. We acknowledge the assistance of C.M. Hardman, J.L. Pridmore, D. Drmač, A. Cox, and
W. Knapp. We extend special thanks to R.D. Bray.
REFERENCES
[5] N.E. Pfeiffer. A new variety of Isoetes virginica. Bulletin of the Torrey Botanical Club, vol.66, pp. 411-413, 1939. [6] C.F. Reed. Isoetes in the southeastern United States. Phytologia, vol 12, pp. 369-400, 1965. [7] J.F. Matthews and W.H. Murdy. A study of the Isoetes common to the granite outcrops of the southeastern piedmont, United States. Botanical Gazette, vol. 130, pp. 53-61, 1969. [8] L.J. Musselman and D.A. Knepper. Quillworts of Virginia. American Fern Journal, vol. 84, pp. 48- 68. [9] K.D. Heafner and R.D. Bray. Taxonomic reassessment of North American granite outcrop Isoetes species with emphasis on vegetative morphology and I. piedmontana (Pfeiffer) Reed sensu lato. Castanea, vol. 70, pp. 204-221. [10] SYSTAT Software Inc., Richmond, CA. [11] N.T. Luebke and J.M. Budke. Isoetes tennesseensis (Isoetaceae), an octaploid quillwort from Tennessee. American Fern Journal, vol. 93, pp. 184-190.
Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant. 23
Fifth Annual SC Upstate Research Symposium
Charles W. Chesnutt and Racial Caricature in Post-Bellum, Pre- Harlem America
Peter Caster Languages, Literature, and Composition University of South Carolina Upstate 800 University Way, Spartanburg, SC 29303 [email protected]
Abstract - Charles W. Chesnutt’s plantation fiction of demonstrates how that racist visions appear in the the late nineteenth century for the Atlantic Monthly and “large black type” of print journalism, thus staging The Conjure Woman operate in a register that the complementary nature not only of history and capitulated to white stereotypes of blackness, even as fiction, but visual image and printed text in his deft narrative strategies both extend beyond folklore producing black masculinity in the national to historical precedent and humanize African American men and women. However, a combination of factors led imagination. Chesnutt’s 1901 novel joins the irony him to abandon plantation narrative, namely his and use of dialect from his tragicomic plantation middle-class assimilationist disdain for dialectic fiction, tales of the previous fifteen years with the the rise of racist violence in South and North during the sentimentality of his passing narrative The House 1880s and 1890s, and his suspicion that comic Behind the Cedars (1900) in a sensationalist plot, depictions did not deflect that violence, but instead which culminates in a fictionalization of the 1898 legitimized it. The House Behind the Cedars, The Wilmington massacre as white rioters killed many Marrow of Tradition, and a number of his short stories African American citizens and overthrew the reconfigure the racist stereotypes of black men, no elected Republican government in North Carolina’s longer furthering minstrelsy tropes, but reinterpreting the servility of Sambo and the violent threat of Nat as a then-largest city. That event, related to the white construction and black masculine heroism, novelist by many of his friends and family who had respectively. Chesnutt’s portrayals offer an alternate seen it firsthand, joined with his longstanding discourse to the caricatures common to popular frustration with plantation fiction, leading him to periodicals such as Harper’s Weekly. Reformulating reconfigure the racial caricatures of black men. In these stereotypes celebrated the black middle and The Marrow of Tradition, he recasts the working classes and integrities of black selfhood, threatening “buck” figure of Nat and the servility of family, community.. the Rastus type as, respectively, heroic and a white Keywords — African-American, Charles W. construction. These literary depictions contrast Chesnutt, caricature, Harper’s Weekly with the illustrations of Harper’s Weekly’s Thomas Nast and lesser-known artists such as Sol Eytinge INTRODUCTION Jr., S.G. McCutcheon, and others, wherein African American men often appeared as simple, All over the United States the Associated Press submissive, even childlike, whether in that had flashed the report of another dastardly magazine or the others published during and after outrage by a burly black brute,--all black brutes reconstruction, some of them the very periodicals it seems are burly,--and of the impending in which much of Chesnutt’s short fiction initially lynching with its prospective horrors. This news, being highly sensational in its character, appeared. This essay demonstrates how the had been displayed in large black type on the illustrations of the nationally popular middle-class front pages of the daily papers. weekly Harper’s Weekly helped naturalize and promulgate stereotypical images of black men in Charles W. Chesnutt the decade following reconstruction, the very The epigraph, a provocative passage from Charles caricatures Chesnutt contested through W. Chesnutt’s novel The Marrow of Tradition reconfiguring them. (1901), sardonically lances the popular expectation of the “burly black brute” even as the passage 24 Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant.
March 27th, 2009
The tagline of Harper’s Weekly declared it “A They are leaving a field, and a crescent moon Journal of Civilization,” and its illustrations indicates night, perhaps implying that their harvest celebrating Republican ideals, domestic prosperity, is theft. The caption reads, “Water-millions is ripe” and identifies the artist as Eytinge, a frequent and “genteel” manners certainly depicted a world contributor to the weekly magazine and illustrator Chesnutt sought to join. Those illustrations played for editions of Elizabeth Barrett Browning, Charles a significant role in the magazine’s success, as it Dickens, and Alfred Tennyson. The right-facing outstripped its closest competitor Frank Leslie’s detailed engraving matches its opposite in size, Illustrated Newspaper after the end of the Civil occupying three-quarters of the page, and depicts War. The editor of Frank Leslie’s in 1875 “A Zulu Scout” peering from brush, his eyes wide acknowledged that in comparison with his and expression serious. He holds a carbine in hand, bears a shield and bandolier of cartridges, publication’s emphasis on current, transitory wears prominent earrings, and is shirtless. These events, Harper’s Weekly’s illustrations offered are the Sambo and Nat stereotypes prevalent since “pictures of sentiment” that “last in the mind of the the antebellum era: one version is childlike, purchaser.” [1] Images depicting the inequities of simple, non-threatening, and happy in a rural class and racial difference may well have lasted in setting of likely poverty; the other is adult, serious, the mind of Chesnutt, who had access to such armed, and potentially violent. While we cannot magazines and read thoroughly in the 1870s and know what editorial process led to the commissioning of these two images and their 1880s and onward in his effort to improve himself adjacent publication, their side-by-side appearance and better his circumstances in becoming an invites at least one simple interpretation: African author. In an 1880 journal entry, he describes a men could be warriors, but Harper’s Weekly local bookseller recounting “a paragraph in preferred its black men at home to present less Harper’s [Monthly] Magazine,” though the potent forms of masculinity. episode in question is not a paragraph from an In the decade immediately following article but part of the caption of a three-panel reconstruction and the period of Chesnutt’s illustration—so easily do image and text confound. decision to become an author, Harper’s Weekly [2] Two years later, Chesnutt recounts his reading kept the eye of the nation turned southward. A and describes his motives to head north for a lead article in 1877 on “The Southern Question” literary career, writing, “I pine for civilization and begins, “As slavery was the commanding question ‘equality.’” [3] Harper’s Weekly promised the of our politics for a generation before the war, so former, and while its articles made some effort to the ‘Southern question’ which grows out of promote the latter, the frequent illustrations tell a reconstruction will long be the most important of different story. The nation’s most popular weekly all our political problems. The first step in its wise provides an illustrative record of imaginations of and peaceful solution is knowledge of the black men broadly held by the white middle class, situation.” [4] The magazine sought to increase the the very readership Chesnutt sought to cultivate. nation’s understanding of race relations in the Even as that “journal of civilization” often declared South, and 1880 alone saw Harper’s Weekly in print its commitment to racial justice, its publish one of Sherwood Bonner’s dialect tales, illustrations more generally capitulated to racist over thirty illustrations of African Americans, and stereotypes of black men. a four-part series of two-page articles focusing on black rural life in Georgia, South Carolina, and SECTION TWO Alabama. [5] The variations of black masculinity in these engravings balance among clinging to Two images appear on facing pages in the August 23, 1879 issue of Harper’s Weekly in a fashion that antebellum stereotypes, offering mostly accurate starkly dramatizes the polarized and competing but limited and limiting accounts of rural poverty, versions of black masculinity. On the left-facing and satirizing the efforts of African Americans to page, a detailed, stand-alone engraving features a enter the middle and upper classes. baby-faced black man with a watermelon under each arm and one balanced on his head, smiling and looking at the reader, followed by a young boy, perhaps his son, struggling with another melon.
Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant. 25
Fifth Annual SC Upstate Research Symposium
African American men to the paternalism of white mastery. These pages depict black men almost uniformly as rural and poor; occasional middle class depictions, often in Eytinge’s Blackville series, generally lampoon aspirations of social mobility. Almost exclusively, African American speech is offered as dialect in phonetic spelling, as a rule for comic effect, and only black men in Africa are offered as warriors and leaders. Such depictions tightly bound meanings of class and gender with race. That is, the professional occupations most available to black men in the mid- to late-nineteenth century were the ministry and education. Preaching, teaching, and the educational preparation increasingly undergirding each in their professionalization made knowledge, proper dress, and speech the defining characteristics of middle- and upper-class manliness. Lampooning ignorance, non-standard dialect, and foolishness not only generally denigrated blackness, but specifically attacked black masculinity. Furthermore, given the associations of honor and truthfulness—a man’s
Fig. 3. Petty thieves and liars. The caption for this image reads, “Injured Innocence—[Drawn by C.M. Coolidge.] Fig. 1 and 2 - Two versions of black masculinity. These “I hain’t seen nuffin of yer Chickens! Do you took me for facing pages of the August 23, 1879 issue of Harper’s a Thief? Do you see any Chickens ‘bout me? Go ‘way Weekly indicate the polarized and competing Sambo and dar, white man! Treat a boy ‘spectable, if he am brack!” Nat stereotypes. word being his bond—portrayals of black men as While Nast sometimes portrayed black men in the lying implied their lack of honor and thus lack of South as a voting bloc in a tug-of-war between manhood. Republicans and Democrats, more common were Criminality is among the most pernicious of depictions of black men as variously lazy, lying, the expectations fostered in the images. A drawing happy and smiling, petty thieves, and nostalgic for from the February, 9, 1878 issue offers a detailed “old massah.” The last of these fostered caricature of a seemingly guileless young black romanticized versions of slavery and subordinated 26 Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant.
March 27th, 2009
man denying the apparently outrageous accusation wherever there is portable property, and I don’t from a white man that he has stolen chickens, only imagine colored people like chickens any better to be undone by the chicks peering out from his than any one else.” Chesnutt’s longstanding hat. The caption for this image reads, “Injured storyteller Julius corrects her and offers a tale Innocence—[Drawn by C.M. Coolidge.] ‘I hain’t explaining that overworking starving slaves led to a seen nuffin of yer Chickens! Do you took me for a back-and-forth of conjuring, finally resulting in an Thief? Do you see any Chickens ‘bout me? Go ‘way exceptional hunger for chickens for the race. [9] dar, white man! Treat a boy ‘spectable, if he am Though humorous in tone, “A Victim of brack!’” His shirt and broad hat are in tatters and Heredity” in particular maintains the underlying suggest a rural setting, and the dark skin, tragedy that lays bare the relationships among exaggerated lips, and dialect clearly mark his poverty, race, crime, and punishment, as the blackness. His eyes meet those of the Harper’s Weekly readers and his address to the “white man” narrator’s capture of an young African American directly invokes the race, if not the gender, of many chicken thief encourages him to set an example, of those readers. The intended humor lies in the and “five years in the penitentiary would be about ironic distance between evidence of the crime and right”—a draconian sentence dodged when the the umbrage of his wounded pride at the narrator’s wife has Julius set the captive free after accusation and demand to be treated “‘spectable”— hearing the latter’s tale. [10] Petty crime and its better concealed than the chicks in this scene is the punishment provide the basis of an August 13, potential violence an African American could face in the South of 1878 for this mix of lie, theft, and 1887 cartoon appearing in Harper’s Weekly the insolence. same year as the publication of “A Virginia A seemingly insatiable lust for chicken and Chicken.” A magistrate addresses a shabbily watermelon harbored by black men appears in dressed black man, telling the defendant, “It’s ten numerous images of Harper’s Weekly from 1877 to dollars or thirty days, Uncle Rastus. You can take 1887. A May 4, 1878 cartoon features a black man fleeing a farm at night, his arms full of stolen chickens, and the caption laments, “Oh, why does the white man follow my path?” [6] An August 4, 1883 half-page detailed caricature manages to at once depict black masculinity as lazy, impotent, and criminal, as a black man in the foreground holds a rifle but slouches in sleep, his foolish grin clueless as two black children steal watermelons behind him. [7] A full page, detailed engraving and accompanying brief interpretive sketch from October 23, 1886 detail the trial of “The Village Pest,” a general class of youth likely to make town “lively” through petty thievery. Though the drawing in question depicts an African American boy, the short article that serves as an extended caption seems to pitch its defense of the boy in a light-hearted, ironic register, as “the abstracted fowls have no connection with the accused boy,” and his mother defends him. “There can be little doubt that the case will be dismissed.” [8] While the text indicates such a pest “is oftener white than black,” the image and is part of a larger pattern telling a different story. Chesnutt addressed this appetite in both “A Virginia Chicken” (1887) and “A Victim of Heredity; or, Why the Darkey Loves Fig. 4. Truth and consequences. The caption reads, “His Chicken” (1900). In the first, he overturns the Choice. Magistrate. ‘It’s ten dollars or thirty days, Uncle stereotype by demonstrating how all hungry men Rastus. You can take your choice.’ Uncle Rastus (after some appreciate roast chicken and in dire circumstances contemplation). ‘Well, yo’ kin gimme de money, sah.’” will steal to get it. In the second, the narrator and his wife are white upper-class sojourners in the South, and she declares, “There are thieves Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant. 27
Fifth Annual SC Upstate Research Symposium
your choice.” Rastus replies, “Well, yo’ kin gimme realistic portrayals of white subjects in illustrations de money, sah,” a misunderstanding of the penalty (aside from strictly political or comic works) and of fine or incarceration, to which the bailiff the more frequent caricatures of black subjects. Analysis of these illustrations does not dictate that responds with a look of shock. [11] It is a Harper’s Weekly or its illustrators were entirely sophisticated cartoon, a static image that racist, that men and women of African descent did nevertheless depicts a brief passage of time not not imitate the cultural practices of (largely white) only in the caption—“after some brief middle and upper classes in hopes of social contemplation”—but, read left to right, charts the mobility, or that such effort may have at times question, the answer, and the bailiff’s response of fallen short. However, it seems much most likely surprise at the answer. This brief narrative time that white illustrators drew their imaginations of blackness in a fashion both capitulating to the and space is itself bracketed by the presumed prior expectations of their predominantly white action of Rastus’s unnamed crime and the audience and to foster southern white readership. subsequent punishment, undoubtedly the jail For a reader and writer like Chesnutt, such sentence given his implied economic position. caricatures may have spurred him to envision Another layer of interpretation remains available alternative representations. as well. The judge holds his hands together in a Chesnutt’s only appearance in Harper’s fashion precisely matched by Rastus’s gesture of Weekly occurred in 1905, after he had given up contemplation, his right fingers under his chin, so making a career as a full-time literary writer, and it that his hand mirrors that of the white judge; is not one of his short stories or essays that moreover, Rastus’s very dark skin contrasts with appears, but a photograph of him at a table of his white lips, evoking the characterization of eight, part of a gathering of nearly 150 people to blackface. Illustrated in all likelihood by a white celebrate the seventieth birthday of Mark Twain. engraver for a primarily white middle-class [12] Twain’s dialect story “A True Story, Repeated readership, this drawing of the stereotypically Word for Word as I Heard It” appeared in the named Uncle Rastus operates as a trope of Atlantic Monthly in 1874, twelve years prior to minstrelsy, the popular racist white imaginations Chesnutt’s first publication there. Thirty-one years of black life that reached their height in the later and just months before the honoring of antebellum period but remained in some vogue Twain, Chesnutt saw the release of his last novel through the 1870s and 1880s. published in his lifetime, The Colonel’s Dream (1905), which sold poorly and ended what hopes he CONCLUSIONS still held for success as a novelist. The guests at the party included Twain, Howells, and Joseph Henry The images of African American families in Harper’s Weekly illustrations from 1877 to 1887 Harper of the Harper’s publishing empire, as well regularly depict African American men (and less as Andrew Carnegie, Willa Cather, and Nathaniel often, women) negatively: childlike, petty criminals Hawthorne’s son Julian. Chesnutt appears in the and loafers, living in rural poverty, their speech an photo somewhat in the background, seated at a impoverished version of English, poorly imitating table including seven other writers: May Isabel middle- and upper-class behavior, all for the Fisk, a frequent contributor to Harper’s Monthly intended amusement of white readers. Of course, Magazine; John Kendrick Bangs, then editor of the African American population of the United States immediately after reconstruction was Puck magazine, which had published nine of generally rural, often poor, and literacy varied. Chesnutt’s early short works; naturalist Ernest However, much of the magazine’s readership likely Ingersoll, author of fourteen non-fiction books; saw in the illustrations of well-to-do white men Anna P. Paret of Harper’s Bazaar; Roy L. and women dining, traveling, or otherwise McCardell, early film scenarist and prolific engaging in leisure less an accurate reflection of magazine writer; John Luther Long, author of the their present circumstances than a wishful mirror, a portrayal of themselves as rich, cultured, literate, short story “Madame Butterfly” (1898), the basis of and who they aspired to be. Black families were the play and opera; and poet Caroline Duer. Here depicted as poor, coarse, and foolish—emphasizing Chesnutt sat amidst the society he so aspired to what a racist white imagination believed them to join, and he likely felt a little of the ironic be. The contrast is underscored by generally more 28 Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant.
March 27th, 2009
ambivalence so common to his narratives as he joined his esteemed company to honor a white southern writer who earned his literary reputation and wealth in part through incorporating African American dialect and depicting black life.
Fig 5. Chesnutt in the background. In this 1905
photograph from Harper’s Weekly, Charles W. Chesnutt joined his contemporary authors at a party celebrating Mark Twain’s seventieth birthday. Chesnutt is seated in the back of the table in the very center of the photo, the fourth person from the left.
ACKNOWLEDGMENTS
I would like to thank the USC Upstate Office of Sponsored Awards and Research Support for their generous financial assistance Fall 2008.
REFERENCES
[1] J. Brown. Beyond the Lines: Pictorial Reporting, Everyday Life, and the Crisis of Gilded Age America. University of California Press, pp 4, 62, 2005. [2] C. Chesnutt. The Journals of Charles W. Chesnutt. Duke University Press, pp 126, 1993. [3] C. Chesnutt, The Journals, pp 172. [4] Harper’s Weekly vol. 21(1051), pp 122, 1877. [5] Harper’s Weekly vol. 24(1251), pp 816-817, 1880;
Harper’s Weekly 24(1246), pp 733-734, 1880; Harper’s Weekly 24(1247), pp 749-750, 1880; Harper’s Weekly 24(1248), pp 765-766, 1880; Harper’s Weekly 24(1249), pp 781-782, 1880. [6] Harper’s Weekly 22(1114), pp 360, 1878. [7] Harper’s Weekly 27(1389), pp 1389, 1883. [8] Harper’s Weekly 30(1557), pp 1557, 1886. [9] C. Chesnutt. The Short Fiction of Charles W. Chesnutt. Howard University Press, pp 125, 1981. [10] C. Chesnutt. The Short Fiction, pp 123, 131. [11] Harper’s Weekly 31(1598), pp 588, 1887. [12] Harper’s Weekly 44(2557), pp 1884, 1905.
Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant. 29
Fifth Annual SC Upstate Research Symposium
Child Trafficking - Borderline Slavery Landis Bunch and Carolyn Hooker Spartanburg Community College 523 Chesnee Hwy, Gaffney, SC 29341 [email protected], [email protected]
Abstract - In some Middle Eastern countries, such as Fortunately for Etse, he didn’t go because he saw Africa, China, and Japan, children are sold by their what had happened to his friends who had believed parents or voluntarily go with child traffickers. They the traffickers. Etse said of his friends, “They told are sent away from their families, do not get paid me they worked in the fields…, but none of them much, and often work in terrible conditions. Families wanted to go back. They said the traffickers are often tricked or are in such terrible debt, that they deceived them”[2]. have to find a way to support themselves. They agree to Africa, China, and Japan are a few of the send their children to work. Child trafficking has countries that engage in child trafficking. In these become a popular way for countries to have legal countries, trafficking has also come to mean that borderline slavery and has become a tragic form of children could possibly be forced into an unwanted human rights abuse. marriage. Countries have made trafficking “forms of forced labor and servitude” [2]. Some Keywords – Child trafficking, human rights governments, such as Thailand, target and punish abuse the victims, not the perpetrators. This allows these countries to continue to traffic children. Most of the time, the children are smuggled into countries INTRODUCTION [3]. The European Commission is an organization Child trafficking is an ongoing crisis in many parts that tries to control child trafficking. When they of the world, especially in Eastern countries, such find other organizations involved or associated as Africa, China, and Japan. Child trafficking with the trafficking, they immediately start begins between a family and a trafficker, a typically investigating and freezing funds to prevent any private arrangement. Most families traffic their other illegal trafficking. The European children because of economic troubles. Other Commission has been around since 2000 [4], and has found “serious abuse [of] migrants and asylum families traffic their children without realizing they seekers at the hands of human traffickers” [4]. The have done it. Most traffickers go around to small group focuses on vulnerable children who are villages and claim that they have well-paying jobs victims of trafficking. The victims are “considered available for these children. Yet, in reality, the useful for the purpose of investigating, arresting, parents are giving the children to a life of and prosecuting traffickers” [4]. servitude. The traffickers traffic children because Child trafficking causes problems for every they can make a profit and the children work for person involved in the process. The governments of some countries allow the trafficking, but some, little to no pay [1]. Children who are victims of this such as the European Commission groups, try to atrocious practice lose their childhood and are protest against this human rights violation. So far, often scarred for life. Their lives border on slavery. these groups have been able to stop a some of the countries that traffic in children but have made SECTION TWO only a dent into the others. Families are not helping the violation issue either. Some families Etse is a young boy from Togo who told his story of send their children away to earn money. Others are being harassed by child traffickers to leave his tricked into letting their children go with family and come with them to Nigeria. They traffickers. Trafficking does not benefit anyone promised him that he could help his family and except the traffickers and the families, but for only make lots of money. According to Etse, he was a little while. The families briefly profit, but the living in Togo and his family was very poor. He money lasts for only so long. The traffickers are said, “Life was hard, and a friend told me I should the ones who get the most out of trafficking. They go to Nigeria, because I was not doing anything are the ones who benefit from the cheap labor and here. I thought if I could go to Nigeria and get rich, get the servitude from the children [5]. I could come back and learn a trade”[2].
30 Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant.
March 27th, 2009
CONCLUSION
The basic human rights of children are abused through child trafficking. The children end up in a life of servitude. All of their rights are taken away; they have no life; they are not allowed to move on and have families. If they do not get out, their lives are scarred forever. For those who do get out, their lives are often scarred by the memories of their lives in servitude. This violation needs to be stopped in all countries. The perpetrators should be punished for taking away children’s rights. The victims should not be punished for crimes committed against them.
REFERENCES
[1] “Trafficking.” Human Rights Watch. Human
Rights Watch. 20 October 2008
Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant. 31
Fifth Annual SC Upstate Research Symposium
Environmental Activism in the Middle East Lizabeth Zack and Joni Hammond Department of Sociology, Criminal Justice, Women’s Studies University of South Carolina Upstate 800 University Way, Spartanburg, SC 29303 [email protected], [email protected]
Abstract - In the last twenty years, civil society and And organizations in Jordan have begun to raise community-based groups have emerged across the environmental awareness through the schools and Middle East to address a variety of environmental businesses. challenges, from water scarcity and waste disposal to Despite evidence of this trend, little scholarly industrial pollution and coastal degradation. Despite research exists on this relatively new kind of evidence of the trend, little scholarly research exists on political activism. During the 1990s, after this relatively new kind of political activism. Research international agencies and NGOs, along with on the Middle Eastern environment has examined the scientists, academics, and local residents, pointed prominent environmental issues facing the region and to an impending environmental crisis in the the varying policies and protections states have Middle East, scholars produced a number of books and articles on the Middle Eastern environment. instituted in response to those challenges, while They reported on the variety of environmental research on political activism in the Middle East has challenges facing the region, from water issues to focused on Islamist movements and other popular industrial pollution to coastal degradation [1]. campaigns against authoritarian rule. Neither Some analyzed the variation in environmental approach accounts very well for the patterns of policy and protection structures created across environmental activism that have emerged in recent different Middle Eastern countries; others years. This project addresses that gap in our examined the impact of traditional and eco- understanding by looking closely at grassroots and civil friendly forms of tourism on the natural society campaigns around environmental issues in environment [2]. Most of the research followed the Jordan in recent years. The project draws on state-centered, top-down approach to addressing information from newspapers, organizational websites, environmental issues and paid less attention to interviews, and government documents. The analysis organized efforts to address environmental pays close attention to the groups involved, their concerns in the civil society sector and at the complaints and demands, how they mobilize, and the grassroots level. Moreover, the recent burst of outcomes and impact of their efforts. This analysis of research on political activism in the Middle East environmental activism in Jordan should shed light on has tended to focus on Islamic activism and the varying patterns of mobilization around popular movements against authoritarian rule, environmental issues across the Middle East and the with some analysts rendering environmental role civil society plays in addressing environmental causes a luxury issue for the elites. None of these concerns in the region. approaches accounts very well for the patterns of environmental activism emerging in recent years. Keywords — environment; politics; Middle East What accounts for this type of political activism in the Middle East? Who mobilizes INTRODUCTION around environmental causes and how and why they do it? In a region where national security and In the last twenty years, civil society and economic development usually dominate community-based groups have emerged across the governmental agendas and where issues of human Middle East to address a variety of environmental rights, religion and democratization preoccupy challenges, from water scarcity and waste disposal opposition movements, why and how do people to industrial pollution and coastal degradation. join campaigns to protect the environment? This Local branches of Greenpeace-Mediterranean were project seeks to address these questions about established in Turkey, Lebanon and Israel. environmental activism by examining the level and Neighborhood groups in Cairo pushed for better type of activity, the groups and communities sewage systems and parks and campaigned against involved, how they organize, the factors prompting cement and lead smelter factories. More recently, activism, and the outcomes of their efforts. Iraqis have mobilized to save the southern Marshes Broadly speaking, the project seeks to expand our that were nearly destroyed in the first Gulf War. understanding about the impact of environmental
32 Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant.
March 27th, 2009
change from the perspective of residents and local Government documents – Jordan Ministry of communities across the region and the role that Environment (www.moenv.gov.jo). grassroots campaigns have in addressing environmental challenges in the Middle East. SIGNIFICANCE
RESEARCH PLAN A study of environmental activism in Jordan should give us a better understanding of the The goal of our research is to better understand conditions under which people collectively how grassroots and community-based groups mobilize to address consequential changes in the respond to environmental change in the Middle local and regional environment. It should offer a East. We examine environmental activism in clearer picture of which groups become involved, Jordan, a country that is notable for the level of the issues they choose to address, the types of citizen-based mobilization around environmental activities they organize, and the effects of their issues. The project is an extension of preliminary efforts. An in-depth look at the case of Jordan research conducted in Jordan in 2006-07 that should also give us a better sense of how and why focused closely on an organized campaign against a mobilization around environmental issues varies cement factory in a community just outside the across the Middle East and the conditions that capital city of Amman. The campaign was striking both promote and inhibit it. The project should in its history, sophisticated organizational also broaden our knowledge about the role civil structure, and degree to which it functioned at the society has played, and can potentially play, in grass-roots level. It also appeared to be part of a addressing environmental challenges and broader pattern of popular interest and political problems in the region and the impact it can have activity around environmental issues. The project in shaping policies and protection structures meant suggests that, despite the authoritarian restrictions to mitigate those problems. on political life in Jordan, civil society does have a A study of environmental activism in Jordan role to play in addressing environmental concerns can also expand our knowledge of popular political in the country. life in the Middle East. The Middle East is a region Our current research examines these broader where authoritarian rule persists to varying patterns across Jordan and expands the scope of degrees in most countries, and where political the preliminary research beyond the single case participation is restricted in myriad ways and can study to include other environmental campaigns, incur high personal costs, making it especially issues and groups. Our data analysis will pay close important to understand how and why people attention to the groups involved, their concerns mobilize collectively and publicly to address their and demands, how they mobilize, and the impact grievances. In recent years, the heightened interest of their efforts. Our analysis will rely on the in Islamic activism and the Islamist parties, following sources: organizations, networks and movements that operate across the region has meant that attention Newspapers - The Jordan Times is the on-line to other forms of political activism, including English language newspaper, and has a history campaigns around women’s issues, human rights, of reporting on environmental issues. economic distress and the environment, has Websites of Environmental organizations – waned. A project that helps to capture the diverse organizations with websites include the Royal types of political activism should certainly enhance Society for the Conservation of Nature our knowledge of political life in the region. (www.rscn.org.jo), International Union for the Conservation of Nature-West Asia/Middle ACKNOWLEDGMENTS East Regional Office (www.iucn.org), Friends of Environment Society (www.foe.org.jo), and The authors would like to thank the CURS Jordan Environment Society (www.jes.org.jo); Research Assistant Program for their support. these websites offer information on the history, mission, activities, and other aspects of the REFERENCES organization. [1] J.G. Jabbra, N.W. Jabbra. “Challenging Blogs – Jordan Environment Watch Environmental Issues,” E.J. Brill, 1997. (www.arabenvironment.net) [2] E. Watkins. “The Middle Eastern Environment,” Cambridge: St. Malo, 1995.
Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant. 33
Fifth Annual SC Upstate Research Symposium
Scars of Africa Robin Ivey and Carolyn Hooker English Department Spartanburg Community College 523 Chesnee Hwy, Gaffney, SC 29341 {rkkirby, hookerc}@sccsc.edu
Abstract - Young women in Ethiopia are victims of SECTION TWO female genital mutilation. There are three different types of female genital mutilation; Ethiopia practices Female genital mutilation involves the cutting the most horrific kind. Some countries forbid this of female genitalia to reduce a woman’s sexual practice, unless it is done in a clinical setting, but it is enjoyment. There are three main types of still legal in Ethiopia. It is referred to as “circumcision.” female genital circumcision. Type I, also Women are said to be impure and unfit for marriage if referred to as Sunna circumcision, involves they have not been circumcised. After enduring the the removal of the tip of the clitoris. 80% of torture of female circumcision, some women have a all incidents are done using this method. Type lifetime of adverse physical effects from the procedure. II involves the removal of all of the clitoris and In some countries, groups are trying to educate people to perform the procedure under sterile conditions. scraping away the parts of the labia majora and minora. Type II is mainly done in areas Keywords — Female, mutilation, Ethiopia where infibulation is discouraged. Type III includes infibulation, which includes the INTRODUCTION complete removal of the clitoris, labia majora and minora, and the sewing of the sides and Today, there are at least 130 million victims of vulva with thorns or some other suturing female genital mutilation. Some eight to ten material. A very small opening is left for million of these occur in the Middle East and passing urine and menstrual fluids. Infibulation is widely used in the areas of Africa. In addition, there are thousands of Ethiopia, Kenya and Djibouti. It is also used victims in the United States[1]. Laws are in throughout the Nile Valley, Southern Egypt, place in Kenya and other areas of Africa that and along the red sea. Type III is considered make this practice illegal; however, in to be the most brutal form of female genital Ethiopia the practice is still legal. Males mutilation[3]. predominantly rule Ethiopia while women and The reasons for female genital mutilation children have very few rights. When a girl is are complex. It is important to note that female genital mutilation or female born in Ethiopia, she represents a dowry for circumcision is not a religious practice, but her family. Her father prearranges her more a cultural practice. Jews, Christians, marriage. In many cases, she must marry Muslims, and members of other religions, someone that is 20-30 years older than she is. practice female genital mutilation. In Female genital mutilation is a ritual that takes Ethiopia, none of these religions requires the place before marriage. Women are said to be practice of female genital mutilation. Female impure and unfit for marriage unless they circumcision has been referred to as the “coming-of-age ritual”[4]. Others believe the have been circumcised[2]. This female female genitalia will continue to grow, circumcision or female genital mutilation is a becoming a grotesque penislike organ violation of human rights and in Ethiopia; dangling between a woman’s legs[4]. however, this practice is still legal. This However, the main reason for this culture practice is one of the most horrifying examples ritual is to ensure purity. An uncircumcised of a violation of a woman’s human rights. female is considered unclean and impure. Female genital mutilation is a ritual performed on female children between the ages of four and twelve[4]. Often times the 34 Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant.
March 27th, 2009
girls are held with such force that if they Majid and women like her are trying to struggle to escape, they end up breaking their educate people about the horrific dangers of own bones[5]. performing this ritual. Still, education will One of the most horrifying examples is of a take time and the people of Ethiopia will be young six-year-old child, Aisha Majid. Early hard to convince. This is the only way of life one morning her mother told her they were that they know and changing their cultural going to visit a sick relative. They arrived at a rituals will be hard. One suggestion for now red brick house, which the young child did not might be to have a licensed professional recognize. By the time the child realized perform these procedures under sterile where she was, it was too late. Young Aisha conditions with the use of anesthesia. tried to escape, but was subdued by her mother and aunt. Aisha referred to the REFERENCES midwife performing the circumcision as the [1] J. Carroll. “Circumcision of young girls violates their rights.” Do children have rights?. Jamuna Carroll. cruelest person she had ever seen. Aisha still Detroit: Greenhaven. 2006 Opposing Viewpoints remembers catching a glimpse of the razor Resource Center. Gale. Spartanburg Community Coll. Lib. 12 Oct 2008 that the midwife used. It was wrapped in a
Fifth Annual SC Upstate Research Symposium
Child Soldiers in Burma Sam Karns and Carolyn English Department Spartanburg Community College 523 Chesnee Hwy, Gaffney, SC 29341 [email protected]
Abstract – Burma, a country located in Southeastern recruited are often poor and separated from their Asia, has had a long history of turmoil. After winning family and are picked up at public places by its independence from Britain’s Indian Empire, a junta military personnel who are rewarded for bringing forcefully took over the country and has controlled it in new soldiers[2]. When it comes to age in the since. Refusals by the junta to liberalize the government Burmese army, morals do not play a role in have kept the country in poverty – an issue that inevitably led to the problem of poor children being deciding who is too young to enlist. recruited by the army. As a result, Burmese children While in the Burmese army, child soldiers are well under the age of eighteen are forced to fight and subjected to various kinds of atrocities. When commit atrocities that will physically and mentally scar approached and told to join the military, children them for the rest of their lives. who refuse are put in jail and continually beaten until they agree to join[2]. Other, grimmer ways of Keywords – Burma, Child Soldiers, Abuse persuading children to enlist are also used such as cutting off the lips and ears of those that refuse[4]. INTRODUCTION To make sure that the children remain loyal to the army, many officers force the new recruits to kill Burma is a country in Southeastern Asia bordered their own families so they will have no incentive to by the Bay of Bengal, Bangladesh, and Thailand. return home[3]. Training of the soldiers often The country won its independence from Britain’s includes what is known as “the ram” which Indian Empire in 1937 and has been run by a involves the children rolling almost nude on a military junta since that time. Due to stony surface while being kicked by officers[4]. mismanagement by the junta and refusal to Also included in training are long runs while liberalize their system of government, Burma’s carrying heavy machine guns – no easy task for the economy has been dwindling. Further younger soldiers who can barely lift the guns[5]. In contributing to the country’s less than desirable battle, children are given numbing drugs to dull economic status is the government’s hostile their pain and fear and forced to go on suicide attitude towards democracy exemplified in their missions[4]. At other times they are told to walk attacks on pro-democracy demonstrators. All of through questionable fields and become human these factors keep the majority of Burma in a land mine “detectors”[4]. Burmese army officers perpetual state of poverty, causing children with choose adolescents for such terrible tasks because nothing else to turn to to join, either voluntarily or they are too young to refuse or comprehend what involuntarily, the army[1]. This issue of child they are doing[3]. soldiers in Burma is a most unfortunate situation Some children either escape or are relieved of and is a major violation to children’s rights. their military duty and go on to tell their horrific tales of being in the army. Sai Seng of Burma SECTION TWO describes his experience of watching his friend,
Burma’s army forces unwilling children into who unsuccessfully tried to escape, being beaten enlisting, many of whom are well under the age of with a bamboo stick by the entire training camp[5]. eighteen. In the Burmese military, which consists Seng recalls his friend “being bloody because of 350,000 people, about twenty percent of those sometimes the sticks broke when they hit him[5]. enlisted are under the age of eighteen[2]. While His friend died the same night after officers coldly the age of eighteen does not seem like a terribly “laid him on the cement floor without a mat” and unreasonable age, Burma delves lower to ages as low as eight for being eligible for the military[3]. let him bleed profusely without treatment[5]. Seng In fact, the age of the children is not what concerns witnessed horrible events that no one should ever recruitment officers; instead, the children who be subjected to – especially not children. “[stand] as tall as a rifle [are] often deemed eligible for military service”[4]. The children that are
36 Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant.
March 27th, 2009
CONCLUSION
Enlisting children under the age of eighteen in the Burmese army is a serious issue that should not be overlooked. Beyond the fact that this practice is morally wrong, Burma is ruining its chance at having a peaceful future. By placing children on the frontlines of war, Burma is subjecting them to extreme brutality as well as to a culture that promotes senseless killing. These children, assuming they survive their military service, are the same people who will grow up and take part in society – a society that will continue the cycle of militarization and violence[4]. For the country’s sake and for the rest of the world’s safety, some action should be taken immediately to stop Burma’s use of children in its army.
REFERENCES
[1] “Burma,” Central Intelligence Agency, https://www.cia.gov/library/publications/the- world-factbook/geos/bm.html.
[2] A. Kazmin. “Burma ‘Forcing Children into Army,’” General OneFile, Gale, Spartanburg Community Coll. Lib., http://find.galegroup.com.
[3] “Facts about Child Soldiers,” Human Rights Watch, http://hrw.org/campaigns/crp/fact_sheet.html.
[4] M. Wessells. “Child Soldiers: In Some Places, if You’re as Tall as a Rifle, You’re Old Enough to Carry One,” General Onefile, Gale, Spartanburg Community Coll. Lib., http://find.galegroup.com. [5] “Sold to Be Soldiers: The Recruitment and Use of
Child Soldiers in Burma,” Human Rights Watch, http://hrw.org/reports/2007/burma1007.
Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant. 37
Fifth Annual SC Upstate Research Symposium
A Novel Robotic Approach to Contour Recovery using Structured Light Nicole T. Hodge, Robert Mahmoudishad, Mark Parrish, and Sebastian van Delden Division of Mathematics and Computer Science University of South Carolina Upstate 800 University Way, Spartanburg, SC 29303 [email protected], [email protected] Abstract — This paper describes a novel approach to ultrasonic sensor, for example, can use timed depth recovery using structured light in which a single pulses to recover depth but cannot recover fine- camera and simple laser dot pointer are mounted to the grain surface fluctuations. Structured light can also end of a robotic manipulator. This approach is very be used to recover depth in which case light is novel, but interesting because unlike most structured projected in a known pattern on the surface. A light approaches it requires no camera/laser camera (or cameras) is then used to observe how calibration. The algorithm has been implemented and the light pattern has been projected on the surface. tested on a Stäubli RX60 robotic manipulator with This paper describes a novel approach to depth CS7B controller onto which an inexpensive off-the-shelf recovery using structured light in which a single USB camera and laser-dot pointer are mounted with a camera and simple laser dot pointer are mounted bracket. Once depth has been recovered a 3D digital to the end of a robotic manipulator. The basic model of the surface is re-constructed which can be concept is illustrated in Figure 1. The initial viewed by an operator. Experimental test results are position of the laser dot is observed as the initial reported. depth (distance to surface) – all other depth Keywords — Robotics, Structured Light, quantities that will be recovered are with respect to Computer Vision. this initial surface location. The robotic arm then proceeds to translate the camera/laser end-effector INTRODUCTION along the unknown contour that is to be measured. Determining the distance to an object with respect As the depth changes so will the location of the to oneself typically requires the integration of data laser dot. Immediately as the laser dot’s location in gathered from at least two input sensors that are the input images moves, the robotic arm translates observing the object. Humans can recover depth the camera-laser dot away from or towards the information because we are equipped with two surface until the laser dot is back in its original eyes that are mounted in a fixed position in our eye position. Once it has returned to its original sockets. The way this stereo input data is position, the distance that the robotic arm has integrated in the brain is not yet fully understood. Computer vision systems can also be built to translated is recorded as the new depth to the recover depth and typically also use two cameras surface. When all depths have been recovered a 3D mounted at a known offset and angle with respect digital model of the surface is re-constructed so to each other. A single camera can be mounted to that an operator can observe the contour the end of a robotic manipulator (a monocular graphically. Although this approach is very novel, it vision system) and then translated a known is interesting because it requires no camera/laser distance. An image is taken at the initial position calibration - unlike most structured light and then again at the final position. These two images are used to recover depth. In both of these approaches. cases, the most difficult issue is the correspondence problem – the ability to determine the locations of the real world points in both of the images. There have several approaches developed for tackling the correspondence problem. These approaches typically try to match high-interest points (small areas of high image contrast) in the both images. Approaches with two cameras degenerate quickly when the input images do not contain high- interest points. In such cases, different types of input sensors can be used to recover depth. An
38 Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant.
March 27th, 2009
THE ALOGITHM then the robotic arm moves on to the next location. The lastMove variable (initialized on line 12) is The algorithm is formally defined below. Lines 01- used to keep track of which Z direction the arm has 07 of the algorithm performs several required been translating – either positive or negative (away initializations, including setting the X, Y, and Z from or towards the surface). If this sign flips, then robotic translation quantities to some mm values. the algorithm has over shot the required depth and Note that the values N, M, Xoffset and Yoffset has translated in the reverse direction. This occurs defined the size of the area to be scanned in mm. when the Zoffset is set at a value too high causing The initial position of the laser dot (line 06) is set the algorithm to shoot pass its goal. If this at an initial depth of 0 – all other depth quantities happens, the currentDepth is recorded and the that will be recovered are with respect to this initial algorithm moves on to the next location. If this is surface location. Line 07 defines how the camera not handled, the algorithm could bounce around coordinate system is aligned (mapped) with the the desired depth and never converge for that robot coordinate system. The laser dot moves in a particular location. straight line in the camera coordinate system, and Finally, once all depths have been recovered a this mapping information is required to determine 3D digital model of the surface is re-constructed so the corresponding robot world direction that the that an operator can observe the data graphically. laser dot moves. This can be manually user defined, or automatically determined. The nested NO CALIBRATION REQUIRED for-loops translate the camera/laser end-effector so that depth is recovered for each location in the Although this approach is very novel, it is surface area. The condition in lines 16-18 interesting because it requires no camera/laser determine if the laser dot has been lost in the calibration - unlike most structured light camera’s FOV due to an occlusion or excessive approaches. In most previous approaches, the depth variation since the last location. In such angle offsets between the camera, laser and surface cases, the previous depth is simply recorded since must be known so that depth can be properly the depth cannot be accurately determined, and triangulated. This is not required in our approach primarily because the camera/laser end-effector is mounted to a robotic arm which can precisely translate it in the robot’s world or tool coordinate system. Furthermore, because the camera/laser end-effector is moving, a large area can be scanned – larger than the camera’s field of view, and large global depth difference can be recovered. Figure 2 illustrates the geometry of our camera/laser end-effector, and shows how depth recovery is possible without knowing α and β – the angle offsets of the camera and laser. It is important to note that the baseline of the triangle with unknown α and β angles does not necessarily have to be aligned with the robot’s world coordinate system. As the camera/laser end- effector is translated along an unknown contour in the robot world’s X and Y axes, the location of the laser-dot in the camera’s input image stream changes when the distance to the surface changes and so do the α and β offset angles. Any change in the location of the imaged laser dot results in the robot arm translating the end-effector away from or towards the contour. Once the laser dot is back to its original location the camera’s input image stream, the original α and β angles will have been restored – even though the algorithm does not know what they are. The amount of world Z translation is store as the depth to the contour at this location.
Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant. 39
Fifth Annual SC Upstate Research Symposium
Fig. 2. The camera/laser geometry is uncalibrated as angles α and β are unknown. (a) shows the initial geometry; (b) shows the new geometry after the robotic arm translates along its world X and/or Y axes; (c) shows that the initial geometry is recovered as the robot translates along its world Z axis so that the laser dot it back to its original location in the camera’s input image and the α and β angles are restored.
EXPERIMENTAL RESULTS the depth changes abruptly by a distance large enough to cause the laser dot to move outside the The algorithm has been implemented and tested camera field of view, then the algorithm will fail on a Stäubli RX60 robotic manipulator with CS7B because it will no longer be able to locate where the controller. An inexpensive off-the-shelf USB laser dot has moved too. Furthermore, the speed of camera and laser-dot pointer were mounted with a this algorithm suffers from the fact that bracket to the end of the manipulator. Figure 3 movements are incremental (movement and image shows our implementation of the system which has capture are synchronized), causing the robot to recovered a portion of a car door’s contour, and constantly start and stop its movements. displayed it in 3D on the monitor. A video CONCLUSIONS demonstration of the project can also be found on the following website: The novel algorithm described in this paper http://faculty.uscupstate.edu/svandelden. accurately recovers the depth of an unknown The detail of the recovered 3D model is contour without the need to calibrate the determined by the X, Y, and Z translation offsets camera/laser geometry. We are currently working that are defined by the user in the algorithm. For example, if the Z translation offset is set to 1 mm, to solve the occlusion problem, and also the speed then the algorithm will accurately recover the inefficiency associated with the algorithm. distance to contour to within 1 mm. There are several traditional limitations to ACKNOWLEDGMENTS using structured light to recover depth. Shiny We would like to sincerely thank Stäubli for surfaces can cause the reflection of the laser dot to generously donating several robotic arms to USC also be captured by the camera, causing the camera Upstate. This project has been partially funded by to observe two laser dots – the reflected and the the Magellan Scholars Program offered by USC refracted one. The surface must be relatively dull, Columbia. or dulled by, for example, coating it with powder. Occlusions can cause the structure light to not be observed by the camera because it is blocked by an object in the scene. This problem could be minimized in our approach by rotating the camera/laser end-effector until the laser dot becomes visible once again – we are currently working on this problem. Surrounding light sources can also be an issue when using structured light. In our approach, the room must be relatively dark so that the laser dot can be reliably and accurately located in the camera’s input image stream. As noted above, this approach can recover large global depth changes over a surface area larger that the cameras field of view. However, if
40 Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant.
March 27th, 2009
Multithreaded and Parallel Programming: Problems and the Environments and Tools to Handle Them Andrew Stokes Physics and Computer Science Presbyterian College 503 South Broad Street, Clinton, South Carolina 29325 [email protected]
Abstract — Multithreaded applications and parallel ANALYSIS programming have been pushed greatly for increased efficiency, especially as multi-core and multiple processors With these increased complexities come more become cheaper and more accessible. However, there are difficulties in debugging these applications. Several some complex issues that spring from these techniques problems arise, or become much worse, due to the including race conditions (where a program behaves differently if one piece of it runs faster than another), parallel nature of these applications. Deadlock (where deadlocks (where multiple pieces of a program are unable to an application locks up because multiple processes are do anything as they wait on each other), and memory leak waiting on each other), race conditions (where (where the longer an application runs the more resources it undesirable behaviour can arise when processes or claims though it does so unnecessarily). To the programmer threads run in an unexpected order), and memory leak who is new to these application styles, some of these problems (where an application unnecessarily claims resources) can be dealt with easily while others seem unavoidable. Many are all problems that parallel programmers face when have trouble debugging their applications as the tools they they try to write their applications. have used up until this point no longer give them enough information and time is lost as they search through code with a fine toothed comb. To help combat these issues special PROBLEMS development environments have been created and a handful of tools have been assembled. However, many programmers find Deadlock is a problem often found in parallel themselves armed with discovering their own solutions and processing applications but it is also usually easily learning only through experience. Through the use of various fixed. When a deadlock occurs the developer must look applications, development environments, and literature, this back at the application and see which resources became paper surveys some of these problems and looks at some locked. This can sometimes be found by looking at solutions from literature and from developers used in theory when the deadlock occurred in an application but often and in practice as well as some of the environments designed deadlocks are much subtler than that. According to for the development of these applications. Herlihy and Shavit, “the heart of the problem with
deadlocks is that no one really knows how to organize and maintain large systems that rely on locking. The Keywords —Parallel, Multithreaded, Deadlock association between locks and data is established mostly by convention.” In the past, companies often simply INTRODUCTION paid a dedicated team of highly skilled programmers to write the parts of applications that locked data so as to As processors with multiple cores get cheaper the avoid deadlock. However, applications today are too demand for applications that can be executed in a large and need to be too scalable to do that affordably. parallel fashion is increasing quickly, both in the [1] private and public sector. Programmers are being Race conditions happen whenever it is assumed that asked to write complex applications that do many an application’s commands will run in a certain order things simultaneously, both in dependent and but unique circumstances cause them to run in a independent fashions, that all work towards a different order. Often this issue comes around because common goal. These applications can be upwards of scheduling in a multitasking system or because the developers write their code with a particular flow of of millions of lines long and being developed by commands in mind and something delays one of the hundreds of different developers. As any manager threads or processes causing it to become out of step. for a big convention can tell you this is a logistics These issues are usually fixed by locking down data in nightmare and it is no easier when you are working such a way that it must be done in the order imagined by on separate processes instead of people and, in the developer. However, this can cause the program to fact, it can be much harder. be inefficient and may not even be possible if the particulars of the data are not known beforehand. Also, Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant. 41
Fifth Annual SC Upstate Research Symposium
one of the things that make race conditions so difficult loss they cause, and the amount of information they give to work with is that they may not occur very often or to the developer this paper surveys these tools and how consistently. Common developer tricks, such as using they aid the developer with these tasks and problems. command line output, can cause the race condition to BoundsChecker, for example, monitors all calls not occur as it changes the timing of the data flow. from API modules, COM objects, and software Memory leak is not just a problem for multi libraries. Because of this it can find memory out of threaded applications but it is a lot more prevalent in bounds errors, memory leaks, and even detecting them. Memory leak occurs when some memory is no deadlocks. However, it is only for C++ and only usable longer needed but it is also not freed either. In with the Microsoft Visual C++ compiler, which limits programming languages that do not have a garbage its possible use quite a bit. collector, such as C, a programmer must be very careful IBM Rational Purify inserts code into the to free any memory when it is no longer necessary. application during the linking step of the program Even in languages that have a garbage collector memory compilation. After a program has been linked to Purify, leak can still be a problem if the garbage collector if there is an error Purify can give the location of the thinks that the referenced memory can still be useful. In error and the memory address at which it occurred. a non-multithreaded application that runs for a relatively Purify can detect memory leaks, array out of bounds short time memory leak is not usually a problem as the errors, attempts to access unallocated memory as well as applications resources are freed when it finishes. attempts to free memory that is not allocated. IBM However, in multithreaded applications, the resources Rational Purify may be run with Microsoft Visual will not be freed until the entire application finishes, Studio and gcc/g++ for Unix/Linux and is compatible rather than the individual threads. According to Hughes with C/C++, Java, and .NET. and Hughes, the key difference between threads and Valgrind is unusual as it could possibly be processes is that processes have their own encapsulated considered an environment rather than a tool. Valgrind address space while threads all share one address space. reads the machine code of a compiled application and [2] then translates the code into a processor neutral, single- Memory leak can also be a problem in an static assignment language it calls Intermediate application that is supposed to run for long periods of Representation (IR). It then allows tools, both native to time, such as most server applications. Memory leak is the environment and created by third parties, to inspect hard to find or notice as well because the developer and modify the code before the code is translated back would have to find when a resource is no longer being into machine code and run in the Valgrind environment. used but is still being referenced. This can be nearly This process causes a great deal of performance loss but impossible in situations where the developer does not it has a great deal of customizability. It can detect race specifically know the particulars of the data they will be conditions, memory leaks, and reading and writing to handling. unallocated and uninitialized memory as well as having Several techniques have been developed to try and a heap and cache profiler. One other advantage of combat memory leak. One such technique is called Valgrind is that because it reads an application from Resource Acquisition Is Initialization (RAII). RAII says machine language the original code can be written using that a programmer should have their objects acquire any language on any compiler. However, Valgrind itself their resources when they are initialized and they should has only been made available for Linux but it has always free them when the object is destroyed. This unofficial ports to Unix as well as an experimental port technique can greatly help reduce or eliminate memory to Wine. leak but if the programmer is too zealous in destroying their objects or freeing their memory then they can ENVIRONMENTS create dangling pointers. Along with these tools come development TOOLS environments, such as nVidia’s CUDA environment. CUDA is a development environment for the C These problems are often hard to locate and some of language (though there are several third party wrappers them may not even show up except in very specific for other languages) that is designed to help developers conditions. Several things have been done to try and write applications that utilize nVidia’s Graphical overcome these problems including textbooks, Processing Units, or GPUs. GPUs are particularly good development tools, and special working environments. at doing simultaneous data operations and as such are These tools include IBM Rational Purify, Memwatch, often used for large amounts of numerical calculations. Valgrind, and BoundsChecker. By looking at what According to Dr. Thomas Kurfess, BMW Chair of conditions these tools can specifically detect, the Manufacturing of ICAR, even the automotive industry methods in which they detect them, the performance is looking into using GPUs and CUDA for parallel data
42 Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant.
March 27th, 2009
processing (personal communication, February 10, 2009). [2] Hughes, C., & Hughes, T. Professional Multicore OpenMP is another environment for developing Programming: Design and Implementation for C++ parallel processing applications in a shared memory Developers. Wiley Publishing Inc., 2008. environment. Since it is an API package it can be used [3] Riegel, E. The Khronos Group Releases OpenCL 1.0 in a variety of compilers for the C, C++, and Fortran Specification. Khronos Press Releases. Retrieved languages. OpenMP is praised because it allows a February 09, 2009, from developer to make an application multithreaded without http://www.khronos.org/news/press/ having to make very many code changes. In essence, a developer can mark sets of code as being threads with a particular style of work (such as splitting up looping work, consecutive but independent work, and making sure a particular piece of code is only executed once). Also, if the code is compiled in a non-multithreading system then the compiler will ignore the lines of OpenMP code, meaning that only one version of the code needs to be written. OpenMP does have some drawbacks, however. It lacks a reliable error handler, which can be a bit problematic. Also, it only runs efficiently on shared memory systems. OpenCL is another environment and it can be considered the new OpenMP. OpenCL is an environment for working with GPUs, CPUs, and multicore processors. It allows for both task based parallelism (which is usually what CPUs and multicore processors are used for) and data based parallelism (which is what GPUs are commonly used for). However, any discussion of OpenCL is merely theoretical as it will see its first usage in Mac OS 10.6 [3]
CONCLUSION
As more and more developers are being called upon to create multithreaded and parallel processing applications they are looking for more and more help in creating them faster and with less faults. Some new issues arise from the very nature of multithreaded and parallel processing and the resources that are available to the common developer can seem very limited. There are tools and environments available but their ability to detect these conditions are usually limited or come at a high price. It would seem that, despite the availability of these tools and environments, what developers use the most is simply experience. Each developer seems to have their own method and set of tools for avoiding, finding, and fixing these problems.
REFERENCES
[1] Herlihy, M., & Shavit, N. The Art of Multiprocessor Programming. Elsevier Inc, 2008
Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant. 43
Fifth Annual SC Upstate Research Symposium
Mining Exceptions as Interesting Knowledge Stephen St. Peter1, Rick Chow2 Division of Mathematics and Computer University of South Carolina Upstate 800 University Way, Spartanburg, SC 29303 [email protected] [email protected]
Abstract — Exceptions are interesting but unexpected predefined knowledge. The algorithm requires the knowledge that may exist in transaction databases. computations of probabilities of certain items, such Suzuki et al. proposed a formal definition of exception as used_seat_belt and injury, or sets of items that as a rule triplet and an algorithm to mine for those occur in a dataset [1, 2]. However, Suzuki’s work exceptions using probabilities of item sets in the does not include an algorithm to compute those transactions [1, 2]. However, the algorithm does not probabilities effectively and efficiently. This address how some of those crucial probabilities can be research focuses on adopting an item set mining computed effectively and efficiently. This research algorithm proposed by Rácz [3] to compute the focuses on the implementation of an exception mining probabilities of item sets and mine for exceptions algorithm that combines the exception definitions by as defined in Suzuki’s papers [1, 2]. Suzuki and an item set discovery algorithm by Rácz et. al. [3]. The algorithm utilizes a prefix tree structure call DEFINING EXCEPTION RULES a trie to facilitate the computations of certain probability based interestingness measures. The In data mining, an association rule is a presentation of knowledge that is expressed as y → efficacy of the algorithm is tested using a national x where x and y are items in a dataset of healthcare dataset. transactions. The item y is called the antecedent Keywords — Data mining, exception mining, and x is called the consequent. Let P(z) be the probability that an item z occurs in a transaction; interestingness measures. in other words, it is the percentage of transactions in which z appears. Hence, the Support of a rule y INTRODUCTION → x is defined to be P(y) and the Confidence of the rule is defined to be Hilderman and Hamilton define data mining as P(x | y), which is the conditional probability of x “the efficient discovery of previously unknown, occurring in a transaction given the presence of y. valid, novel, potentially useful, and understandable The Support of a rule measures the rule’s patterns in large databases” [4]. Current research generality as P(y) must exceed a certain threshold has been attempting to define various θS. The higher the threshold θS, the more general interestingness measures which are designed to the rule will be, meaning more transactions select and rank discovered patterns according to involving this rule are present in the transaction their potential interest to a target end user [1, 4, 5]. file. On the other hand, Confidence models the Some of the interestingness measures focus on the conditional probability P(x | y) to measure the surprisingness of the knowledge – surprising accuracy of a rule. The higher the Confidence, the patterns contradict a person’s previous knowledge greater the chance that x will occur if y occurs. or expectations. Patterns that are exceptions to Similarly, Confidence is expected to exceed a previously discovered patterns can also be threshold θF, i.e., P(x | y) > θF. A negative rule, u considered surprising. Exceptions are interesting v, is for measuring the lack of association because they challenge existing knowledge and between the items u and v. For a negative rule to be encourage further research in new directions [1]. A interesting, P(u) is expected to exceeds θS while P(v real-world example of an exception discovered in | u) is expected to be less than another threshold car accident data is that the common knowledge θI. general rule of [IF used_seat_belt = yes THEN An exception rule is defined as a triplet of injury = no] has a surprising exception of [IF three rules: A common sense rule, a negative rule, used_seat_belt = yes AND passenger = child THEN injury = yes] [2]. and a reference rule. For example, the seatbelt Suzuki et. al. proposed a probability based exception can be presented as a special type of exception algorithm that does not depend on triplet as follow:
44 Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant.
March 27th, 2009
Table 1: Triplets with a Single Antecedent in the Exception Rule
Type 1 Type Type Type Type Type Type Type Type Type10 Type11 2 3 4 5 6 7 8 9 y → x y → x y → x y → x y → x y → x y → x y → x y → x y → x y → x z x z x x z y z xy xz xy xz yz xy z yz z y z y x x y → z z → y z → y z → x z → x y → z y → z z → y z → y z → y z → x
Common Sense Rule: seatbelt → no_injury calculation of the probabilities P(y), P(α), P(γ), P(x Negative Rule: seatbelt, child no_injury | y) , P(δ | y), and P(β | α) requires an effective and Reference Rule: child → seatbelt efficient algorithm since the item variables x, y, and z can be mapped to hundreds if not thousands In this paper, the common sense rules and of items. Rácz suggested the use of a prefix tree or reference rules are restricted to having just one trie for computing the probabilities of item sets [3]. antecedent while the negative rules are allowed to Item sets of one, two, and three or more items are have one or two antecedents. Furthermore, all represented in a trie, which allow quick rules are allowed to have exactly one consequent. calculations of support and confidence. This The simplicity of the triplets allows users to have research adopts Rácz’s algorithm, instead of better comprehension of the rule and hence, Suzuki’s, as a framework to generate the items in a enables easier decision making based on the rule. rule template. Under the above constraints, eleven different types of triplets can be enumerated. If only one TRIE Data Structure antecedent is allowed in the negative rule, four different types of triplets can be generated as Consider Figure 1 in which five transactions with shown in Table 1. If two antecedents are allowed in items a, b, c, and d. Rácz’s trie is structured so that the negative rules, seven more triplets types (Type the root of the trie holds the number of 5 to Type 11) can be enumerated. transactions in the dataset. The nodes at the first level store the occurrences of single items. In this For example, the triplet for the seatbelt example is example, the single items a, b, c, and d occur 2, 3, a Type 9 triplet. In general, a triplet can be defined 3, and 1 times in the transactions, respectively. formally as a tuple t with three rules: t(y → x, α Nodes at the second level store the occurrences of β, γ → δ), where the 2-item sets. The item sets {a, b}, {a, c}, {b, c} and {c, d} occur 2, 1, 1, and 2 times, respectively. (α, β, γ, δ) ϵ {(z, x, y, z), (z, x, z, y), (x, z, z, y), (y, z, Likewise, the third level holds the occurrences of z, x), (xy, z, y, z), (xz, y, y, z), (xy, z, z, y), (xz, y, z, the only 3-item set {a b c}. Using this trie, the y), (yz, x, z, y), (xy, z, z, x), (yz, x, z, x)} support and confidence of a rule can be calculated easily. For instance, Support for the rule c → d is MINING INTERESTING EXCEPTION RULES calculated as P(c) = 3/5. The Confidence of the rule 2/5 2 If a triplet t(y → x, α β, γ → δ) satisfies the is P(d | c) = P(c d) / P(c) = . 3/5 3 constraints P(y) > θS, P(α) > θS, P(γ) > θS, P(x | y) > θF, P(δ | y) > θF, and P(β | α) < θI, where θS , θF , and θI are the thresholds for Support, Confidence, and negative rule, respectively, the exception rule triplet is considered to be interesting. However, the
Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant. 45
Fifth Annual SC Upstate Research Symposium
Transactions Trie
5 1. a b c 2. c d 3. a b 4. b a 2 b 3 c 3 d 1 5. c d
b 2 c 1 c 1 d 2
c 1
Fig. 1. Transactions and the Corresponding Trie Structure
EXPERIMENTAL RESULTS CONCLUSIONS
This study utilizes the Healthcare Cost & This research implements an exception mining Utilization Project (HCUP-3) database, which is algorithm using Rácz’s trie and Suzuki’s definition the largest and most robust U.S. national inpatient of exception rule triplets. The efficacy of the database [6]. In this paper, a subset of patient algorithm is tested against a healthcare dataset. records from 2004 is selected by restricting the Even though the algorithm is effective in finding patient’s age to 65 years or older, the main some exceptions in the data set, the algorithm still diagnosis to diabetes only, and the number of needs further improvements to increase the procedures to two or more. A data cleaning step is number of antecedents and consequents in the also applied to the dataset to remove records that rules for mining more complex exceptions. have incomplete information or noisy data. The However, the increase number of items in a rule resulting dataset consists of 6765 transactions. In triplet also requires additional optimization this experiment, the transactions include only the techniques to reduce processing time. diagnosis codes for the patients’ complications and Table 2. Descriptions of Diagnosis Codes the length of stay labels, which indicate whether or not a patient stays 9 or more days in the hospital. Diagnosis Codes Descriptions With the following threshold settings, θS = 0.05, θF = 0.8, and 2 Septicemia (except in labor) θI = 0.2, five Type 4 rules are discovered and listed below. The descriptions of the diagnosis codes are 157 Acute and unspecified renal listed in Table 2. The rules are subject to further failure studies by healthcare professionals. 238 Complications of surgical
procedures or medical care
Rule 1: Rule 2: Rule 3: Rule 4: Rule 5: 238→ ≥ 9 days 238 → ≥ 9 days 2→ ≥ 9 days 157 → ≥ 9 days 157 → ≥ 9 days 238 157 238 2 2 238 157 238 157 2 157 → ≥ 9 days 2 → ≥ 9 days 238 → ≥ 9 days 238 → ≥ 9 days 2 → ≥ 9 days
46 Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant.
March 27th, 2009
ACKNOWLEDGMENTS
This research is supported by the Student Research Assistant Program and Research Incentive Award from University of South Carolina Upstate and the Healthy Living Initiative Faculty Research Grant from the ReGenesis Community Health Center (RCHC).
REFERENCES
[1] E. Suzuki and J.M. Żytkow, “Unified algorithm for undirected discovery of exception rules: Research Articles,” Int. J. Intell. Syst. 20, 7, pp. 673-691, Jul. 2005. [2] E. Suzuki, “Discovering interesting exception rules with rule pair,” In Proc. Workshop on Advances in Inductive Rule Learning, PKDD-2004, pp.163-178, 2004. [3] Balázs Rácz, Ferenc Bodon, Lars Schmidt-Thieme, Benchmarking Frequent Itemset Mining Algorithms: from Measurement to Analysis, ACM SIGKDD Workshop on Open Source Data Mining Workshop (OSDM'05), in Bart Goethals and Siegfried Nijssen and Mohammed J. Zaki editors, pp. 36 - 45, Chicago, IL, USA. 2005. [4] R.J. Hilderman and H.J. Hamilton. “Knowledge Discovery and Interestingness Measures: A Survey,” Technical Report, University of Regina, 1999. [5] L. Geng and H.J. Hamilton, “Interestingness measures for data mining: A survey,” ACM Comput. Surv. 38, 3, Sept. 2006. [6] M. Dowell, B. Rozell, D. Roth, H. Delugach, P. Chaloux, and J. Dowell, “Economic and Clinical Disparities in Hospitalized Patients with Type-2 Diabetes,” Journal of Nursing Scholarship, 36, pp. 66–72, 2004.
Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant. 47
Fifth Annual SC Upstate Research Symposium
Determinants of Information Technology Acceptance: A Review of Technology Acceptance Model
Bilquis Ferdousi Business Technology Spartanburg Community College 800 Brisack Road, Spartanburg, SC 29303 [email protected]
Abstract — The expected productivity gains and investments in IT. The expected productivity gains organizational benefits delivered by IT cannot be and organizational benefits delivered by IT cannot realized unless IT is actually accepted and used in be realized unless IT is actually accepted and used optimal level. Despite advances in computer hardware in optimal level. For that reason, the acceptance of and software, the troubling problem of underutilized IT IT has been a major focus of Information Systems continues. For that reason, the mainstream IS research relentlessly attempts to understand and explain the (IS) research for more than two decades [1]. determinants of IT acceptance. In such an effort, Davis According to Compeau and Higgins [2], (1989) developed Technology Acceptance Model (TAM), understanding the factors that influence people’s the most researched and widely used theory in IS use of IT has been a goal of IS research since the literature to study the factors that affect people’s mid-1970s. Since then, people’s IT acceptance has acceptance of IT. Davis proposed that Perceived been a focal research topic in IS and is considered Usefulness (PU) and Perceived Ease of Use (PEOU) of IT as “one of the most mature research areas in the form people’s belief on IT and therefore, predict their contemporary IS literature” [3, p. 426]. attitude toward IT, which in turn predicts acceptance of IT. Thus, PU and PEOU determine the acceptance of an TECHNOLOGY ACCEPTANCE MODEL IT. Extensive research supports the notion that PU and PEOU are primary drivers of people’s acceptance of an The mainstream IS research relentlessly attempts IT. Nevertheless, the findings on TAM are mixed in to understand and explain the determinants of IT terms of statistical significance, direction, and acceptance [4]. In such an effort, Davis (1989) [5] magnitude. The inconsistent results of empirical developed his Technology Acceptance Model researches suggest that not all significant factors were (TAM) to study the factors that affect people’s explained in TAM. Further research revealed that acceptance of IT. TAM, a refinement of Ajzen and additional factors have effect on people’s IT acceptance. Fishbern’s [6] Theory of Reasoned Action, Besides, the effects of PU and PEOU are not same in provided a foundation for research on why people significance. accept or reject IT. TAM is the most researched and widely used theory among several models in Keywords — Acceptance of Information the IS literature to explain people’s acceptance of Technology, Technology Acceptance Model, IT. Although prolific stream of research on Perceived usefulness, Perceived ease of use. acceptance of IT uses a variety of theoretical models, of all theories, the TAM is considered the INTRODUCTION most influential and commonly employed theory for explaining people’s use of IT. TAM still Use of IT has been demonstrated to be a key driver continues to be most widely applied theoretical model in the IS research field [7]. of organizational performance and organizations Davis in his TAM proposed that Perceived are making significant investments in IT [1]. Usefulness (PU) and Perceived Ease of Use However, if people do not use IT as anticipated, (PEOU) of IT form people’s belief on IT and successful productivity gain from IT can be hard to therefore, predict their attitude toward IT, which in achieve. Despite advances in computer hardware turn predicts acceptance of IT [8]. Thus, Davis and software capabilities, the troubling problem of explained, people’s intention to use an IT primarily underutilized IT continues. The low use of installed is the product of a rational analysis of desirable perceived outcome, namely PU and PEOU of an IT, IT has been identified as a major factor underlying which finally determine the acceptance of that IT. the lackluster returns from organizational
48 Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant.
March 27th, 2009
Thus, the constructs - PU and PEOU - are as “the degree to which a person believes that using theoretical base of TAM. a particular system would be free of effort.” (p. The conclusions and implications drawn from 320). But these perceptions may change with time Davis’ research have already been highly relevant as users gain first-hand experience with IT usage, in IT acceptance research and are providing which in turn, may change their subsequent IT important direction in investigation on this issue. usage behavior. It is difficult to tell whether people In IS research, the TAM has been frequently used use an IT because of favorable perceived to analyze people’s intention and actual use of characteristics or whether favorable perception, in different IT [9]. PU and PEOU are important fact, emerged over the course of using the IT. constructs and probably two of the most widely Experience plays an important role, which was not cited correlates of IT acceptance and usage [10]. explicitly included in the original TAM. Empirical Since its inception, the TAM has been validated evidences that show PEOU becomes non- with various applications in different studies and significant with increased experience [12], and PU has become the most widely applied model on IT and prior use of an IT has a significant impact on acceptance and usage [8]. Extensive research actual use of that IT lead researchers to include supports the notion that PU and PEOU are primary experience, voluntariness, and gender as drivers of people’s intentions to adopt an IT. constructs in TAM2. Results of numerous studies are consistent with Like experience, voluntariness and gender these two factors to explain people’s IT acceptance issues were not explicitly included in TAM. TAM2 and usage [11]. extended original TAM by including subjective Nevertheless, the reported findings on TAM norm as an additional predictor of intention to use are mixed in terms of statistical significance, an IT in the mandatory situation [14]. When an IT direction, and magnitude [8]. The inconsistent use is mandated, as it is in many organizations, the results of empirical researches suggest that not all underline relationships of original TAM will be significant factors were explained in TAM [9]. different. That is, when people must use a specific Consequently, it is important to know whether two IT, the importance of their beliefs and attitudes as aforementioned constructs in TAM are enough for antecedents to the acceptance of IT is likely to be complete explanation of people’s IT acceptance. It minimized. Users might not like to use an IT but is also important to know if both constructs have they use it anyway because they are required to do same significance in predicting people’s IT so [15]. In addition, PU is more salient for men acceptance. while PEOU is more salient for women [14]. Again, the effect of subjective norm is more salient for CONSTRUCTS IN TAM NOT EXHAUSTIVE women in the early stages of experience [3]. In IT acceptance, TAM focused more on PU; TAM, which has been widely applied to a diverse even then, the length of that PU has not been set of technologies and users, allow only two core addressed. PU can be of two distinct types – long- constructs - PU and PEOU [3]. Using only two term usefulness and near-term usefulness. constructs, it is assumed that when people Perceived near-term usefulness has the most intended to use an IT, they are free to use that significant influence on people’s IT acceptance without limitation. In the real world, there are while perceived long-term usefulness has positive many constraints, such as limited ability, time but lesser impact [8]. constraints, environmental or organizational Extending the theoretical constructs, empirical limits, or unconscious habits, which limit users’ researches found more factors such as force of freedom to use an IT. Thus, it is obvious that the habit, management support, trust and enjoyment, PU and PEOU are not only factors that can have perceived compatibility and perceived fit have effect on people’s use of an IT [12, 13]. The influence on people’s IT acceptance. Again, PEOU inclusion of more factors to explain people’s IT along with some other factors such as experience acceptance and usage based on findings in further and frequency of use positively correlated with PU studies lead to develop TAM2 or combine original [11]. Further researches demonstrate that TAM with other theoretical model or variables. computer self-efficacy (CSE) is one of the individual factors consistently supported in IS EXTENTION OF TAM – TAM2 literature as an important factor to predict people’s IT acceptance [18]. CSE implies that individuals Davis (1989) defined Perceived Usefulness (PU) as who consider computers too complex and believe “the degree to which a person believes that using a that they will never be able to control these particular system would enhance his or her job computers will prefer to avoid them and are less performance” and Perceived Ease of Use (PEOU) likely to use them [16]. CSE explains considerable Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant. 49
Fifth Annual SC Upstate Research Symposium
proportion of variance (48%) of PEOU; and CSE PEOU [19]. Researches demonstrate that there is and PEOU together explain 50% of PU [8]. strong correlation both between PU and IT Therefore, understanding CSE is important for the acceptance and between PU and PEOU, but the successful implementation of IT in organizations direct relationship between PEOU and IT [2]. acceptance is weak [8]. Again, although PU has a USEFULNESS VS. EASE OF USE direct positive relationship with IT acceptance and PEOU has an indirect positive relationship (via Different researches found the applicability of PU) with IT acceptance, PEOU has no significant Davis’ (1989) proposition about the role of direct relationship with people’s intention to use IT Perceived Usefulness (PU) and Perceived Ease of [10]. While some researchers found that PEOU has Use (PEOU) in people’s acceptance of different IT no relationship with PU and PU has direct [3]. However, while PU has been identified relationship with IT acceptance [19], some found consistently in the literature as significant in that PEOU has a positive impact on PU of an IT. people’s IT acceptance, the evidence for PEOU has Again, PEOU affects PU, which in turn, has an been inconsistent [20]. Some studies suggest that influence on duration and frequency of use of the PEOU does not have an effect on intention to use IT [20]. Davis emphasized on further research to an IT [8], while others show that PEOU has address the possibility of halo effect between the significant effect on intention to use or actual use PEOU, PU, and acceptance of IT. of IT [9, 3]. Most research found that PU has a strong CONCLUSIONS persistent effect on individuals’ intention to use IT, and PEOU has a smaller effect [1]. Davis himself IS researchers have investigated and replicated found that PU is significantly correlated with both TAM, and agreed that it is valid in predicting self-reported current use and self-predicted future people’s acceptance of various IT. TAM is a use of an IT. PEOU is also significantly correlated representative model in the stream of IS research, with current use and future use of IT but, PU has a which has experienced improvements and significantly greater correlation with use of IT than refinement over the years, and is considered the does PEOU. Emphasizing on the greater influence most well known model. Yet the existing empirical of PU on people’s IT acceptance, Davis made a findings on TAM are neither consistent nor major conclusion, “perceived usefulness is a strong conclusive, and provide relatively low explanation. correlate of user acceptance and should not be As a result, researchers have started to question ignored by those attempting to design or the generalizability of TAM [14]. Scholars argued implement successful systems.” (p.334). Thus, that despite the plethora of literature on TAM, the Davis implied that the importance of PU should empirical researches have so far produced not be sacrificed for PEOU. It makes sense that significantly mixed and inconclusive results. user will not accept an IT that is easy to use but not Although they are not uncommon in social sciences useful. Rather they will accept an IT that is useful, where human behavior is difficult and complex to even if that requires some degree of efforts to learn explain, the mixed findings not only undermine the how to use that IT [19, 8]. Davis suggested that precision of TAM, but also complicate efforts for IT from a causal perspective “ease of use may be an practitioners and researchers to identify the antecedent to usefulness, rather than a parallel, antecedents to people’s acceptance of IT [8]. direct determinant of usage.” (p.334). That is, According to Davis, Bagozzi, and Warshaw [21], PEOU affects PU, which in turn, influences the IT TAM was developed acceptance. Davis admitted that this intriguing interpretation, which conceptually explains that to provide an explanation of the there might have causal influence of PEOU on PU, determinants of computer acceptance that underscores the theoretical importance of PU. is generally capable of explaining user Obviously, this interpretation contradicts his behavior across a broad range of end-user conclusion that PU has stronger relationships with computing technologies and user people’s IT acceptance, and PU has prominences populations, while at the same time being over PEOU, the factor “overemphasized” by the both parsimonious and theoretically human-computer interaction designers (5, p.334). justified. (p. 985) Admitting this contradiction, Davis left the issue for further research. Further research, TAM is often employed because of its parsimony consistent with Davis’ finding, found that PU is and robustness, allowing the researcher to explain more influential than PEOU in driving people’s IT considerable variance of IT acceptance while using acceptance and is a more important predictor than 50 Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant.
March 27th, 2009
only two constructs, PU and PEOU [10]. However, context,” The Journal of Computer Information although parsimony is an important consideration Systems, vol. 45(3), pp 43-52, 2005. [12] R. Agarwal, and J. Prasad. “Is individual differences in scientific research, people’s use of new IT is germane to the acceptance of new information likely to differ depending on the context within technologies?” Decision Science, vol. 30(2), pp 361- which such IT is encountered. Complete 391, 1997. understanding of people’s use of IT requires a [13] B. Szajna. “Empirical evaluation of the revised technology acceptance model,” Management model that includes different factors that affect the Science, vol. 42(1), pp 85-92, 1996. IT acceptance process across many different [14] V. Venkatesh, and M. G. Morris. “Why don't men contexts [22]. The PU and PEOU constructs are ever stop to ask for directions? Gender, social influence, and their role in technology acceptance useful to explain IT acceptance, but has to be and usage behavior,” MIS Quarterly, vol. 24(1), pp integrated into a broader model, which would 115-139, 2000. include factors related to both human and social [15] A. S. Brown, P. A. Massey, M. M. Weiss, and R. J. change process [9]. Burkman. “Do I really have to? User acceptance mandated technology,” European Journal of Information Systems, vol. 11, pp 283-295, 2002. REFERENCES [16]Hasan, B. “The influence of specific computer experiences on computer self efficacy beliefs,” [1] A. Bhattacherjee, and G. Premkumar. Computers in Human Behavior, vol. 19, pp 443-450, “Understanding changes in belief and attitude 2003. toward information technology usage: A theoretical [17] M. Igbaria, and J. Ivari. “The effects of self-efficacy model and longitudinal test,” MIS Quarterly, vol. on computer usage,” Omega - International Journal 28(2), pp 229-254, 2004. of Management Science, vol. 23(6), pp 587-605, [2] D. R. Compeau, and C. A. Higgins. “Computer self- 1995. efficacy: Development of a measure and initial test,” [18] M. I. Klopping, and E. McKinney. “Extending the MIS Quarterly, vol. 19, pp 189-211, 1995. technology acceptance model and the task- [3] V. Venkatesh, G. M. Morris, B. G. Davis, and D. F. technology fit model,” Information Technology, Davis. “User acceptance of information technology: Learning, and Performance Journal, vol. 22(1), pp Toward a unified view,” MIS Quarterly, vol. 27(3), 35-48, 2004. pp 425-478, 2003. [19] M. Koufaris. “Applying the technology acceptance [4] H. M. Selim. “An empirical investigation of student model and flow theory to acceptance of course websites,” Computers & online consumer behavior,” Information Systems Education, vol. 40, pp 343-360, 2003. Research, vol. 13(2), pp 205-224, 2002. [5] F. D. Davis. “Perceived usefulness, perceived ease of [20]D. McCloskey. “Evaluating electronic commerce use, and user acceptance of information acceptance with the technology acceptance model,” technology,” MIS Quarterly, vol. 13(3), pp 319-340, The Journal of Computer Information Systems, vol. 1989. 44(2), pp 49-57, 2003. [6] I. Ajzen, and M. Fishbein. “Understanding attitudes [21] F. D. Davis, R. P. Bagozzi, and P. R. Warshaw. “User and predicting social behavior,” Prentice-Hall acceptance of computer technology: A comparison publishers, 1980. of two theoretical models,” Management Science, [7] E.M. van, Raaij, and J. J. L. Schepers. “The vol. 35(8), pp 982-1003, 1989. acceptance and use of a virtual learning [22] R. C. Plouffe, S. J. Hulland, and M. Vandenbosch. environment in China,” Computers and Education, “Research report: Richness vol. 50(3), pp 838-852, 2008. versus parsimony in modeling technology adoption [8] Q. Ma, and L. Liu. “The technology acceptance decisions—understanding merchant adoption of a model: A meta-analysis of empirical findings.” smart card-based payment system,” Information Journal of Organizational and End User Computing, Systems Research, vol. 12(2), pp 208-220, 2001. vol. 16(1), pp 59-72, 2004. [9] P. Legris, J. Ingham, and P. Collerette. “Why do people use information technology? A critical review of the technology acceptance model,” Information & Management, vol. 40, pp 191-204, 2003. [10] O. N. Ndubisi, K. O. Gupta, and C. G. Ndubisi. “The moguls’ model of computing: Integrating the moderating impact of users’ persona into the technology acceptance model,” Journal of Global Information Technology Management, vol. 8(1), pp 27-47, 2005. [11] M. Zviran, N. Pliskin, and R. Levin. “Measuring user satisfaction and perceived usefulness in the ERP
Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant. 51
Fifth Annual SC Upstate Research Symposium
Mathematical Modeling of non-Newtonian Peristaltic Flows Muhammad Hameed Division of Mathematics & Computer Science University of South Carolina Upstate 800 University Way, Spartanburg, SC 29303 [email protected]
Abstract — We have analyzed the peristaltic transport fluid is assumed to be viscous and Newtonian, of a heat conducting non-Newtonian fluid through an mostly for mathematical simplicity. This axi-symmetric tube and in a planner channel. assumption is not valid everywhere because most Governing equations for the flow system are derived of the industrial and biological fluids are non- using longwave length approximations on the walls of Newtonian in nature. the boundary. Analytical results are obtained using Non-Newtonian fluids are of great interest regular perturbation analysis. Numerical computations because of their practical importance in are performed and the numerical results are compared engineering and industry. The classical Navier- with the analytical solutions to determine the validity of Stokes equations have been proved inadequate to results. Various quantities of interest are evaluated and describe and capture the characteristics of complex discussed. The expressions for the pressure rise, rheological fluids as well as polymer solutions. frictional force and the relation between the flow rate These kinds of fluids are generally known as non- and pressure gradient are obtained. Newtonian fluids. Most of the biological and industrial fluids are non-Newtonian in nature. Few Keywords — List no more than 5 keywords here. examples of such fluids are blood, tomato ketchup, honey, mud, plastics and polymer solutions. The INTRODUCTION inadequacy of the classical theories to describe these complex fluids has led to the development of Peristalsis is a mechanism of pumping fluids in different new theories to study non-Newtonian cylinederical tubes and channels when a fluids. There are different models which have been progressive wave of contraction or expansion proposed to describe the non-Newtonian flow propagates along the walls of a distensible tube behavior. Among these, the fluids of differential containing liquids. In general, it includes type [5] have received considerable attention. Fluid propulsive and mixing movements and pumps the of second grade is a subclass of fluids of differential fluid against pressure rise. Physiologically, type, which has been studied successfully in peristaltic action is an inherent property of smooth various types of flow situations and is known to muscle contraction. It is an automatic and vital capture the non-Newtonian affects such as shear process that drives the urine from the kidney to the thinning or shear thinking. bladder, food through the digestive tract, blood in small vessels and many other situations. MATHEMATICAL FORMULATION Mathematical and computer modeling of the peristaltic motion has attracted the attention of We consider the motion of a second order fluid many researchers starting with the work of Latham through a two-dimensional channel of width 2L [1] and Shapiro [2]. Since then, several with flexible wall. Using Cartesian coordinates, we investigators have contributed to the study of take X along the centerline and Y normal to the peristaltic motion in both mechanical and channel. The components of velocity V are physiological situations. Provost & Schwarz [3] did longitudinal velocity U and transverse velocity V. a theoretical investigation to study the viscous We assume an infinite train of sinusoidal waves effects in peristaltic pumping and assumed that the which progress with velocity c along the walls of flow is free of interial effects. Later on, Pozrikidis the channel. [4] extended the idea and used boundary integral The height of the wall for peristaltic flow is method to study the peristaltic flow in a channel defined by for Stokes flow and studied the relationship of 2 molecular convective-transport to the mean h( x , t ) a b sin ( X ct ), pressure gradient. After the pioneering work of the above researchers, studies of peristaltic flows in where b is the amplitude of the wave, a is the mean different flow geometries have been reported half width of the channel and represents the analytically, numerically and experimentally by a number of researchers. In most of the studies, the 52 Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant.
March 27th, 2009
wavelength. Furthermore, we assume that there is solutions, we have computed numerical solutions no longitudinal motion of the wall. using finite difference scheme to find the flow and The basic governing equations for the flow of a energy fields. In order to study the quantitative second order non-Newtonian fluid neglecting effects, graphical results are obtained and thermal effects are the field equations, known as discussed for different physical quantities. The the continuity equation and the momentum results are analyzed for an adequate range of equation given as influential physical parameters.
V 0 REFERENCES
dV f div [1] T. W. Latham, “Fluid motions in a peristaltic pump,” dt M.S. Thesis, MIT, Cambridge, MA, 1966. [2] A. H. Shapiro, M.Y. Jaffrin and S. L. Weinberg, dT 2 Peristaltic pumping with long wavelengthA t low Cp k T grad V , Reynolds number. J. Fluid Mech. Vol. 37, pp 799- dt 825, 1969. [3] A. M. Provost, W. H. Schwarz: A theoretical study of where represents the density, V represents the viscous effects in peristaltic pumping, J. Fluid. Mech. Vol. 279, pp. 177–195, 1994. velocity vector, T is the temperature, C p is the [4] C. A. Pozrikidis, C. A study of peristaltic flow. J. of specific heat and f represents the body force per Fluid Mechanics, vol. 180 pp 515- 527, 1987. [5] C. Truesdell, W. Noll, “The non-linear fields theories unit mass. The constitutive equation for the extra of Mechanics (3 Ed.)”, Springer, 2004. stress tensor is give as
2 pI A1 1 A 2 2 A 1 .
The Rivilin-Erickson tensors A1 , A2 are defined as T A1 ()() gradV gradV T A2 A 1t V grad A 1 ()(). A 1 gradV A 1 gradV
The above equations are non-dimensionalized and solved using a regular perturbation technique 2a based on the small parameter , which is the ratio of mean half width a to the wavelength .
CONCLUSIONS
Considering the importance of heat transfer in peristalsis and keeping in mind the sensitivity of liquid viscosity to temperature, an attempt is made to study the effect of heat transfer on peristaltic flow of a non-Newtonian fluid. The non- dimensional problem is formulated in the wave frame under the long wavelength limits with finite Reynolds number. By using perturbation expansion method, asymptotic solutions for velocity and temperature fields are obtained accurate to o(2 ) and o ( 2 Re 2 ) . The results for the viscous case become a special case of our work. Furthermore, to check the validity of analytical
Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant. 53
Fifth Annual SC Upstate Research Symposium
Investigation of the Role of Promoter Methylation and Histone Modification in the Down-regulation of the Colon Tumor Suppressor, DRA Derek L. Griffith and Jeannie M. Chapman Division of Natural Sciences and Engineering University of South Carolina Upstate 800 University Way, Spartanburg, SC 29303 [email protected], [email protected]
Abstract — Expression of the tumor suppressor, DRA, is not been investigated. It is not likely due to aberrantly lost in tumors of the colon. The mechanism deletion of the gene since DRA DNA (but not RNA by which this occurs has not been investigated. It is or protein) has been detected in colon carcinoma known that loss of expression is not due to gene deletion cell lines [1]. Rather, it is more likely that one or or major chromosomal rearrangements. Since DRA more elements associated with the promoter of mRNA cannot be detected in colon cancer tumors, DRA are altered or missing in colorectal cancer. down-regulation is likely at the transcriptional level. Since there is evidence that DRA plays a role in The goal of this project was to determine if either controlling cellular proliferation in the colon [3], histone modification or promoter methylation is and, since down-regulation of this gene is observed responsible for loss of DRA expression. Both of these in colorectal cancer [1], understanding the processes are common mechanisms for loss of tumor mechanism of down-regulation may be an suppressor expression. Re-expression of DRA mRNA important step in understanding the overall was assessed by RT-PCR in two colon adenocarcinoma molecular basis of this form of cancer. The current cell lines, DLD-1 and Caco-2, after treatment with study is an investigation into the mechanism by which DRA is down-regulated in two colon cancer inhibitors of histone deacetylation and/or promoter cell lines, DLD-1 and Caco-2. Two common methylation. mechanisms of gene down-regulation, promoter hypermethylation and histone deacetylation, are Keywords — DRA, tumor suppressor, investigated. methylation, histone deacetylation, colorectal cancer MATERIALS AND METHODS
INTRODUCTION CELL CULTURE
There are two main types of genes that play a role The human colorectal cancer cell lines DLD-1 and in cancer progression—oncogenes and tumor Caco-2 were grown in RPMI 1640 and DMEM suppressors. Oncogenes promote cell growth, so supplemented with 10% and 20% fetal bovine their overexpression in cells can lead to tumor serum, respectively. Both media were formation. Tumor suppressors, as their name supplemented with 100 units/mL penicillin, 100 suggests, prevent cell growth. Cells that lose g/mL streptomycin, and 292 g/mL glutamine. expression of these types of genes are susceptible Incubation took place at 37˚C in a 5% CO2 to tumor formation. DRA, for down-regulated in atmosphere. Cells were allowed to reach 75-80% adenoma, is a putative tumor suppressor that was confluency before being subcultured. Cell counts originally identified in a search for genes that were were carried out using a hemacytometer. As a underexpressed in colon cancer [1]. Expression of positive control for DRA mRNA expression [4], DRA is either lowered or absent altogether in Caco-2 cells were allowed to grow at the post- tumors from colorectal cancer patients as well as confluent state for 12 days before RNA harvest. colorectal cancer cell lines maintained in the laboratory [1, 2]. It has been demonstrated that DRUG TREATMENTS restoring DRA expression can suppress the growth of colon cancer cells [2]. Additionally, mice that Cells were seeded on day 0 in 6-well plates at have been genetically engineered not to express ~50,000 cells per well in 2 mL of the appropriate DRA (DRA -/- mice) exhibit an increase in cell medium. Drug treatments were performed on days proliferation in the colon, suggesting that DRA 1, 3, and 5. Cells were treated with 2 µM 5-aza-2- truly regulates cell proliferation in vivo [3]. deoxycytidine (azaC), 2 mM sodium butyrate, or a The mechanism by which DRA expression is combination of both. One well in each plate lost in colorectal cancer is not understood and has 54 Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant.
March 27th, 2009
received no drug treatment and served as a CONCLUSIONS negative control. The cell death observed in DLD-1 and Caco-2 cells RNA HARVEST treated with both azaC and sodium butyrate suggests a synergistic effect for these two drugs. RNA harvests were performed on days 2, 4, and 6 The exact mechanism of cell death is unknown at using the RNA isolation reagent RNA STAT-60 this time. Further investigation could reveal according to the manufacturer’s protocol. In brief, whether cell death was via apoptosis or necrosis or medium was aspirated and 500 µL of RNA STAT- simply a toxic event. 60 reagent was added. The wells were scraped and GAPDH PCR results confirm successful the contents were placed in microcentrifuge tubes. isolation and purification of mRNA from all cell After a 3 minute incubation at room temperature, treatments as well as successful amplification of 100 µL of chloroform were added. The contents cDNA from this gene. Because DRA cDNA was were centrifuged for 15 minutes at 4°C, followed by detected in post-confluent Caco-2 cells, PCR retention of the aqueous layer which contained the primers and parameters were appropriate for this RNA. This layer was then mixed with 250 µL of gene. However, because we were unable to detect isopropanol at room temperature for 5-10 minutes. p14 and p16 cDNA, we were unable to determine if Centrifugation at 4°C for 10 minutes followed. the drug treatments were effective for re- The pellet was retained and washed with 500 µL of expression of these genes or if primer design ethanol. After a brief centrifugation, the ethanol and/or PCR parameters were appropriate. Human was aspirated, and the pellets were thoroughly genomic DNA could serve as a positive control for dried. RNase-free water was used to dissolve the p14 and p16 cDNA amplification by PCR in future RNA pellet, and the samples were stored at -80˚C. experiments. Until p14 and p16 cDNA are detected following drug treatment, we are unable to RT-PCR AND GEL ELECTROPHORESIS definitively conclude what, if any, effect these drugs had on DRA mRNA expression. Semi-quantitative reverse transcriptase polymerase chain reaction (RT-PCR) using the ACKNOWLEDGMENTS Protoscript® II RT-PCR Kit was performed according to manufacturer’s protocol. mRNA was The authors wish to thank the University of South first mixed with dT23VN primer and dNTPs and Carolina Upstate Office of Sponsored Awards and heated for 5 minutes at 70°C. First-strand cDNA Research Support for a research assistantship synthesis carried out at 42°C for one hour with M- awarded to D. L. G. MuLV Reverse Transcriptase in the presence of RNase inhibitor. PCR amplification of cDNA REFERENCES utilized gene-specific primers, and PCR products [1] C.W. Schweinfest, K.W. Henderson, S. Suster, N. were analyzed by agarose gel electrophoresis. Kondoh, and T.S. Papas, “Identification of a colon mucosa gene that is down-regulated in colon RESULTS adenomas and adenocarcinomas.” Proceedings of the National Academy of Science U S A, 1993, vol.
90(9): p. 4166-70. Cell morphology and confluency were monitored [2] J.M. Chapman, S.M. Knoepp, M.K. Byeon, K.W. daily during azaC and sodium butyrate treatment. Henderson, and C.W. Schweinfest, “The colon anion No changes were apparent until the sixth day when transporter, down-regulated in adenoma, induces significant cell death was observed in both cell growth suppression that is abrogated by E1A.” types. In Caco-2 and DLD-1 cells treated with the Cancer Research, 2002, vol. 62(17): p. 5083-8. combination of azaC and sodium butyrate, a [3] C. W. Schweinfest, D.D. Spyropoulos, K.W. reduction in cell number of ~80-85% was Henderson, J.H. Kim, J.M. Chapman, S. Barone, observed. Cell death was also observed in both cell R.T. Worrell, Z. Wang, and M. Soleimani, “slc26a3 types treated with sodium butyrate alone, but it (dra)-deficient mice display chloride-losing diarrhea, enhanced colonic proliferation, and was significantly less than that seen in cells treated distinct up-regulation of ion transporters in the with both drugs. There was little cell death colon.” Journal of Biological Chemistry, 2006, vol. observed in cells treated with azaC alone. Gel 281(49): p. 37962-71. electrophoresis confirmed that PCR amplification [4] D.G. Silberg, W. Wang, R.H. Moseley, and P.G. was successful in all samples for GAPDH cDNA Traber, “The Down regulated in Adenoma (dra) and in post-confluent Caco-2 cells for DRA cDNA. gene encodes an intestine-specific membrane Amplification of p14 and p16 cDNA was not sulfate transport protein.” Journal of Biological apparent, however. Chemistry, 1995, vol. 270(20): p. 11897-902. Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant. 55
Fifth Annual SC Upstate Research Symposium
An in Depth Study of the Length of Hospital Stays with Regard to Procedures Performed on Type II Diabetes Patients Anneliese Schmidt and Wei Zhong Computer Science University of South Carolina Upstate 800 University Way, Spartanburg, SC 29303 [email protected], [email protected]
Abstract — The initial data provided moderate results examples creating a file that line for line shows with error rates ranging from 17-29% with whether each case was correctly or incorrectly corresponding predicted error rates ranging from 32- predicted and provides the actual error, precision, 40%. For the revised data, the unfiltered files resulted and recall rates corresponding to the test data. in predicted error rates ranging from 23.9-52.3%, whereas the actual error rates ranged from 17.3-70.0%. The filtered files, from the revised data, resulted in the SECTION TWO predicted error rates ranging from 23.9-52.3%, First, it was necessary to extract the cases whereas the actual error rates ranged from 0.0-75.0%. regarding Type II diabetes from the NIS. Dr. Wei Zhong wrote and executed the programs necessary Keywords — Data mining, Type II Diabetes, C4.5, for this stage. Not only did these programs extract SVMlight. the appropriate cases, they trimmed the cases’ data to provide only the relevant information including INTRODUCTION procedures performed and length of hospital stay. This data mining project was an investigation of Secondly, Dr. Zhong prepared files containing patients diagnosed with Type II Diabetes. either training sets of data or testing sets of data. Specifically, it was an exploration into the length of In the next stage, several C based programs time a patient remained in the hospital, nine plus were written in order to convert these data sets to days or less, with regard to the procedures the the proper format necessary to run C4.5. The first patient may have received. The study was version of the program explicitly listed the conducted using data from the Nationwide attributes, procedure code numbers, pertaining to Inpatient Sample (NIS), a nationwide database of a particular cluster to write the ~.data file used by hospital inpatient stays, provided by the C4.5. The second version of the converter program Healthcare Cost and Utilization Project (HCUP) combined two input files, a test file and its cross- [1]. The ultimate goal of the ongoing project is to validation file, into one ~.data file. The third help reduce overall healthcare costs by providing a version of the converter program extracted the base from which doctors can determine how long a attributes from the training file, created an patient will need to remain in the hospital. attribute file, ~.names, and created the ~.data file. Two statistically based programs C4.5, written The fourth version of the converter program added by Ross Quinlan [2], and SVMlight, written by a conversion of the procedure code numbers to the Thorsten Joachims [3], were used to analyze data procedure code names. A similar program was extracted from the NIS. C4.5 was designed to written to convert the testing data sets into the generate decision trees, and rule sets based on the ~.test file. These programs were then executed on decision trees produced, from a set of training all the data sets provide by Dr. Zhong. data. C4.5 builds a decision tree using the concepts At this stage, the data clusters were tested of Information Entropy, a measure of the using C4.5 and the results were interpreted. C4.5 uncertainty associated with a random variable, and provides numerous options that can be invoked to Information Gain, the difference in entropy [54]. improve the error rates produced by the induced C4.5 produces statistical and probabilistic results, decision tree on both the training data and the as well as provides an estimate of the error rate on testing data. For example, when many cases have new data based on the tree and rule set generated. the same outcome it can lead to odd trees and SVMlight is an implementation of Vapnik’s Support therefore reduce the predictive power of that tree. Vector Machine [5] and is designed for pattern Weighting is an option that attempts to improve recognition and optimization. Similar to Quinlan’s the predictive power by ensuring that the sum of C4.5, SVMlight uses a set of training data to create a the weights of cases must meet some minimum. model file and provides estimates for error, The options were tested with several degrees of precision, and recall rates. SVMlight then uses the rigorousness. Each option was tested singly as well learned model to make predictions on test as in conjunction with others, and none of the
56 Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant.
March 27th, 2009
combinations of options made a significant CONCLUSIONS improvement to the results. The initial data sets provided moderate results with error rates ranging The attempt to improve the results of this project from 17-29% and predicted error rates ranging through in depth study by producing a trimmed from 32-40% (i.e. only 60-68% accuracy on new the data set showed a slight improvement but also data). broadened the range of error rates. There are an The next stage of the project was to produce extensive number of procedures that can be somewhat larger training sets of data. A new C performed on any given patient. In other words, based program was written to combined two there is a large number of attributes that must be related sets of data and proportionally considered for each case provided to C4.5. This redistributed the combined data into four different component seems to be a large factor in producing files. A separate program was written that reasonable actual and predicted error rates. To combined three of the four newly redistributed files increase the size of the training clusters would be creating the training data file while leaving the the most practical next stage of testing for this fourth as the corresponding test data file. This project. Larger clusters would provide enough program was executed such that each of the four cases so that more of the attributes, with a paired files was used as a test data file, essentially outcome, would be represented. It may even be quadrupling the number of data and test files. necessary to do another in depth study of these The subsequent stage of the project was to use larger training clusters to determine which SVMlight as a tool to determine which cases were attributes appear to have the most significance, accurately predicted. Also, an optimization and then to trim the insignificant ones, as program written by Dr. Zhong was used to evaluate attempted here. three parameters used by SVMlight: trade-off Once an acceptable accuracy rate is achieved, between training error and margin; cost-factor by the next stage of this project would be to scale the which training errors on positive examples converter program to handle exceptionally large outweigh errors on negative examples; and the sets of data and test these sets using C4.5. The gamma parameter in the rbf kernel. These final stage of development would be to create a parameters provided somewhat low results for user friendly interface for a physician to input accuracy, precision, and recall rates were, around information regarding a current patient to predict 60%. After these new training/test files were whether that patient will remain in the hospital for evaluated with SVMlight, another C program was nine plus days or less. written that created filtered data files by comparing the prediction file that SVMlight created to the ACKNOWLEDGMENTS corresponding test file. Dr. Wei Zhong, assistant professor, Department of Finally, the converter program was used on Computer Science, University of South Carolina these redistributed, filtered and unfiltered, files Upstate. and then the files were tested using C4.5. The error rates on both the data and test files varied REFERENCES widely. For the unfiltered files the predicted error [1] The HCUP Nationwide Inpatient Sample; Agency rates ranged from 23.9-52.3%, whereas the actual for Healthcare Research and Quality Healthcare error rates ranged from 17.3-70.0%. There was one Cost and Utilization Project: Rockville, Maryland, outlier from the unfiltered data whose actual error 2004. [2] Quinlan, J.R.; C4.5: Programs for Machine rate was 100% for which it is believe that the data Learning. Elsevier, 1992. set was simply too small. For the filtered files the [3] Joachims, T. Making large-Scale SVM Learning predicted error rates ranged from 23.9-52.3%, Practical. In Schölkopf, B., Burges, C., and Smola, whereas the actual error rates ranged from 0.0- A., editors, Advances in Kernel Methods – Support 75.0%. The range for the predicted error rate Vector Learning. MIT Press, 1999a. remained unchanged for the filtered data but the [4] Han, Jiawei; Kamber, Micheline; Classification and range for the actual error rate increased. When Prediction. Data Mining: Concepts and Techniques, looked at more closely, 82.7% of the data files Second Edition; Jim Gray, Microsoft Research, improved in actual error rate for the filtered files Series Editor; The Morgan Kaufmann Series in Data but the predicted error rate remained unchanged Management Systems; Morgan Kaufmann Publishers: San Francisco, 2006; pp 285-310, 318- for all of the filtered files. 327, 337-347, 354-366. [5] Vapnik, V. Statistcal Learning Theory. Wiley, 1998.
Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant. 57
Fifth Annual SC Upstate Research Symposium
Implementation of the North American Amphibian Monitoring Program in the Upstate Region of South Carolina Alexsis Ferguson and Melissa Pilgrim Division of Natural Sciences and Engineering University of South Carolina Upstate 800 University Way, Spartanburg, SC 29303 [email protected], [email protected]
Abstract - The North American Amphibian Monitoring In both scientific and public communities, one Program (NAAMP) was developed in 1995 as an of the most publicized outgrowths of the initiative to monitor amphibian population trends in biodiversity crisis is the issue of global amphibian Canada, Mexico and the United States (see decline. Of the 5,743 described species of www.pwrc.usgs.gov/naamp). NAAMP uses breeding amphibians, 32.5% are listed as threatened by the call surveys to inventory and monitor presence and persistence of amphibian species in a region. South World Conservation Union [6]. In addition, the Carolina joined NAAMP in 2008. USC Upstate’s most conservative estimate of the current research group, Upstate Herpetology, is responsible for amphibian extinction rate is 211 times greater than collecting NAAMP data for the Upstate region of South the background extinction rate for amphibians [3]. Carolina. Specifically, we are responsible for The disappearance of this group draws much conducting call surveys along 11 routes that span 7 attention for good reason. In many ecosystems counties in the Upstate. Our objectives for the 2008 amphibians are critical to energy/nutrient cycling season were to evaluate the productivity of Upstate within the system [7]. Amphibians make up the calling routes, the species richness of our region and bulk of the vertebrate biomass in many ecosystems. seasonal impacts on breeding phenology. We followed standard NAAMP protocol (see For example, in a single Carolina Bay over the http://www.pwrc.usgs.gov/ course of one year, there was the exchange of more NAAMP/protocol/index.html) for data collection along than a ton (over 400,000 individual captures) of each route; for the 2008 season we were able to collect amphibian biomass between the wetland and data for NAAMP sampling window 2 (March 15 – April surrounding forest [8]. In addition to their role in 30) and NAAMP sampling window 3(May 15 – June ecosystem function, amphibians are often viewed 30). Our objectives for the 2008 season were to as measures of ecosystem quality. Because of their evaluate the productivity of Upstate calling routes, the sensitivity to environmental perturbation (e.g., species richness of our region and seasonal impacts on breeding phenology. Of the 110 potential breeding sites thin skin makes them susceptible to pesticide surveyed, 91 had anuran calling activity. The number of poisoning), they are viewed as bioindicators that species calling per site varied from 1-5, with per site reflect the health of an ecosystem. Amphibian loss species richness increasing during sampling window 3. is perceived as a factor that can destabilize In total, we recorded 12 anuran species calling along ecosystem function and represents environmental Upstate routes. We documented both interspecific and degradation. Thus, from a human perspective, intraspecific variation in calling activity between global amphibian declines are often viewed to sampling windows. represent overall environmental degradation likely associated with a reduction in ecosystem services INTRODUCTION and direct health risks. Humanity currently faces an environmental crisis: In response to the global amphibian decline the loss of biodiversity [see 1 and 2]. Biodiversity issue, the World Conservation Union (IUCN)/SSC) refers to the variety of life on Earth. To date, there developed the Declining Amphibian Task Force. are approximately 1.4 million identified living One goal of the task force is to identify geographic species [3]. We are losing these species to areas where amphibian declines are happening. extinction at a rate 100 –10,000 times faster than Thus, some of their work involves conducting the background extinction rate observed in the inventories delineating the location of current fossil record [4]. In fact, the fossil record is amphibian populations and monitoring the dominated by five mass extinction events, and identified populations for persistence through some scientists label the current trend in time. One large scale inventory and monitoring biodiversity loss as a sixth mass extinction [5]. program developed through the task force is the Unlike the previous five mass extinction events, the North American Amphibian Monitoring Program current event is largely the result of human (NAAMP). NAAMP was developed in 1995 as an impacts on the environment [5]. initiative to monitor amphibian population trends
58 Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant.
March 27th, 2009
in Canada, Mexico and the United States (see 2, we recorded calling activity for only 10 of the 12 www.pwrc.usgs.gov/naamp). NAAMP takes species. The three dominant callers during window advantage of a particular behavior associated with 2 were Spring Peepers, Northern Cricket Frogs, anuran breeding events. Each species of frog or and Fowler’s Toads. During window 3, we recorded toad has a unique breeding call calling activity for only 9 of the 12 species. The (vocalization/song). NAAMP uses breeding call three dominant callers during window 3 were surveys to inventory and monitor presence and Fowler’s Toads, Green Treefrogs, and Northern persistence of amphibian species in a region. South Cricket Frogs. In addition to documenting Carolina joined NAAMP in 2008. USC Upstate’s interspecific variation in calling activity between research group, Upstate Herpetology, is sampling windows, we recorded intraspecific responsible for collecting NAAMP data for the variation in calling activity. For example, we Upstate region of South Carolina. Our objectives recorded a 50% increase in American Bullfrog for the 2008 season were to evaluate the calling activity between windows 2 and 3. productivity of Upstate calling routes, the species We recorded at least 1 full chorus for 9 out of the richness of our region and seasonal impacts on 12 species. In sampling window 2, we scaled over breeding phenology. 70% of Spring Peeper calling activity as full breeding choruses. In sampling window 3, we METHODS scaled over 50% of American Toad and Green The USGS assigned 11 routes that spanned 7 Treefrog calling activity as full breeding choruses. counties to the Upstate region of South Carolina. We followed standard NAAMP protocol (see Table 1. Anurans recorded calling along Upstate http://www.pwrc.usgs.gov/ NAAMP routes during sampling windows 2 and 3. NAAMP/protocol/index.html) for data collection along each route. Each route had ten stops. Each Scientific Name: Common Name: stop represented a potential amphibian breeding Acris crepitans Northern Cricket Frog site for our region; thus, there were 110 potential Bufo americanus Ameri can Toad Bufo fowleri Fowler’s Toad breeding sites in the Upstate of South Carolina. Gastrophryne Eastern Narrow-Mouthed Potential breeding sites represented a variety of carolinensis Toad habitats, such as flooded wetlands, farm ponds, Hyla chrysoscelis Cope’s Gray Treefrog creeks, and road ditches. We conducted anuran Hyla cinerea Green Treefrog calling surveys at each stop during NAAMP Pseudacris crucifer Spring Peeper sampling windows 2 and 3. Sampling window 2 was March 15 through April 30, while sampling Pseudacris feriarum Southeastern Chorus Frog window 3 was May 15 through June 30. At each Rana catesbeiana American Bullfrog stop, we recorded the time, temperature, noise Rana clamitans Green Frog factor (e.g., traffic) and moon visibility. Then we Rana palustris Pickerel Frog recorded any species calling during a five minute Rana sphenocephala Southern Leopard Frog period. We used a numerical scale to score anuran calling activity. The scale ranged from 1 to 3, with one representing low calling activity (e.g., hearing CONCLUSIONS individual frog calls) and three representing high Overall, our 11 Upstate routes were very calling activity (e.g., full breeding chorus of many productive. In our first year of NAAMP overlapping calls). We used EXCEL (version participation, we documented the presence of 12 of 2003) for data management. the 15 anuran species expected to occur in the Upstate region. Two of the 12 species (i.e., RESULTS Northern Cricket Frogs and Pickerel Frogs) are Of the 110 potential breeding sites surveyed, 91 had listed as species of concern by the South Carolina anuran calling activity. The York county route was Department of Natural Resources our least productive route, with 6 of 10 stops (https://www.dnr.sc.gov). Our hope is that data having no calling activity. Our Spartanburg county collected in the Upstate will be useful when route was the most productive route, with 8 of 10 developing management plans targeting stops having calling activity in both sampling conservation of these species statewide. windows. The number of species calling per stop Often the numerical score for calling activity is varied from 1-5, with per stop species richness used as an index of species abundance at a site. being higher during sampling window 3. For example, Nelson and Graves [9] found there We recorded 12 anuran species calling along was a positive correlation between the number of Upstate routes (Table 1). During sampling window individual Green Frogs captured at farm ponds in Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant. 59
Fifth Annual SC Upstate Research Symposium
Michigan and the numerical score recorded for [4] R. Hassan, R. Scholes and N. Ash, “Ecosystems and calling activity in the ponds. Nine of the 12 species Human Well-Being, Volume 1, Current state and we recorded had at least one site where we scored trends: findings of the conditions and trends their calling activity as a full breeding chorus (i.e., working group,” Island Press, 2005. [5] R. Frankham. “Stress and adaptation in conservation a numerical score of 3). Thus, it appears several genetics,” Journal of Evolutionary Biology 18:750- species have sites in the Upstate where they are 755, 2005. locally abundant. [6] S. Stuart, J. Chanson, N. Cox, B. Young, A. NAAMP protocol has received some criticism Rodrigues, D. Fischman and R. Waller, “Status and [10, 11 and 12]. For example, NAAMP protocol trends of amphibian declines and extinctions specifies that call surveys are to be conducted in worldwide,” Science 306:1783-1786, 2004. the time window spanning half an hour following [7] K. Regester, K. Lips, and M. Whiles, “Energy flow sunset until 1am. The concern is that the protocol and subsidies associated with the complex life cycle will underestimate the presence of species that call of ambystomatid salamanders in ponds and during other times of the day. For example, adjacent forest in southern Illinois,” Oecologia 147:303-314, 2006. Bridges and Dorcas [13] demonstrated that the [8] J. Gibbons, C. Winne, D. Scott, J. Willson, X. NAAMP protocol would likely underestimate Glaudas, K. Andrews, B. Todd, L. Fedewa, L. Southern Leopard Frog occurrence on the Wilkinson, R. Tsaliagos, S. Harper, J. Greene, T. Savannah River Site (SRS; Aiken, South Carolina) Tuberville, B. Metts, M. Dorcas, J. Nestor, C. Young, during certain times of the year. On the SRS in T. Akre, R. Reed, K. Buhlmann, J. Norman, D. July, Southern Leopard Frogs had peak calling Croshaw, C. Hagen and B. Rothermel, “Remarkable activity between midnight and dawn. NAAMP data amphibian biomass and abundance in an isolated sets do have certain limitations. However, if wetland: implications for wetland conservation,” Conservation Biology 20:1457:1465, 2006. viewed as a long term inventory and monitoring [9] G. Nelson and B. Graves. “Anuran Population program, NAAMP can contribute useful Monitoring: Comparison of the North American information on both presence and persistence of Amphibian Monitoring Program’s Calling Index anuran species in a region. Our expectation is that with Mark-Recapture Estimates for Rana through time our NAAMP data set will allow us to clamitans,” Journal of Herpetology 38:355-359, evaluate how global climate change variables (e.g., 2004. precipitation and temperature patterns) impact [10] R. Alford and S. Richards. “Global Amphibian anuran range expansion, range contraction, Declines: A Problem in Applied Ecology,” Annual breeding phenology and community assemblages Reviews 30: 33-165, 1999. [11] W. Crouch III and W. Paton. “Assessing the Use of in the Piedmont of South Carolina. Call Surveys to Monitor Breeding Anurans in Rhode Island,” Journal of Herpetology 36:185-192, 1999. ACKNOWLEDGEMENTS [12] K. Genet and L. Sargent. “Evaluation of Methods We would like to thank the following volunteers for and Data Quality from a Volunteer—Based helping us collect NAAMP data during the 2008 Amphibian Call Survey,” Wildlife Society Bulletin season: Jared Ballenger, David Brothers, Lauren 31: 703-714, 2003. Horton, Sanjana Iddyadinesh, Martha Miller, Dr. [13] A. Bridges and M. Dorcas, “Temporal Variation in Gill Newberry, Matt Phillips, Will Reid, and Maria Anuran Calling Behavior: Implications for Surveys Sarkozi. We are grateful to our state coordinators and Monitoring Programs,” Copeia 2000: 587-592, 2000. (Dr. Eran Kilpatrick and Steve Bennett) for assistance with implementing NAAMP in Upstate region of South Carolina. We would like to thank J.D. Willson and Chelsea Kross for providing the photographs used in the poster.
LITERATURE CITED [1] E. Wilson. “The Diversity of Life,” Norton and Company, 1992. [2] E. Wilson. “The Future of Life”, Random House Incorporated, 2002. [3] M. McCallum. “Amphibian decline or extinction? Current declines dwarf background extinction rates,” Journal of Herpetology 41:483-491, 2007.
60 Sponsors: Stäubli, Spartanburg Regional Healthcare System, EPSCoR/IDeA RS grant.
March 27th, 2009
Size of Rank Tests for Location in Linear Models with Repeated Observations Bernard Omolo, Ph.D, and Daniel Hagerman Division of Mathematics and Computer Science University of South Carolina Upstate 800 University Way, Spartanburg, SC 29303 [email protected], [email protected]
Abstract - An aligned rank test for location in a linear observations are defined on the unit interval, with model is considered. The power of the test under the null Cauchy errors, we can express as follows: hypothesis model is examined when repeated observations are present, via Monte Carlo simulations. = 2 + + We conclude that the test achieves the nominal √ significant levels for finite samples, as is expected from = 1, 2, … , ; = 1, 2, … , . statistical theory. Our interest is in testing if the function generating Keywords – Linear model; rank test; these observations is linear in [0, 1]. Using matrix orthonormal matrix; Type I error; statistical notation, the observations can be expressed as power.