Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Oceanography and Atmospheric Sciences and Meteorology (1770)
- Physics (1587)
- Engineering (1475)
- Computer Sciences (1449)
- Life Sciences (1067)
-
- Oceanography (1025)
- Social and Behavioral Sciences (591)
- Electrical and Computer Engineering (569)
- Chemistry (560)
- Earth Sciences (557)
- Environmental Sciences (512)
- Climate (468)
- Marine Biology (413)
- Elementary Particles and Fields and String Theory (410)
- Nuclear (360)
- Computer Engineering (355)
- Artificial Intelligence and Robotics (330)
- Engineering Physics (327)
- Mathematics (288)
- Medicine and Health Sciences (286)
- Ecology and Evolutionary Biology (281)
- Quantum Physics (276)
- Public Affairs, Public Policy and Public Administration (257)
- Theory and Algorithms (222)
- Applied Mathematics (219)
- Information Security (210)
- Plasma and Beam Physics (204)
- Atmospheric Sciences (202)
- Statistics and Probability (185)
- Keyword
-
- Climate change (163)
- Sea level rise (143)
- Phytoplankton (117)
- Machine learning (115)
- Chesapeake Bay (111)
-
- Physics (98)
- Virginia (87)
- Cavity (76)
- Deep learning (70)
- Quantum chromodynamics (65)
- Scattering (65)
- Oceanography (61)
- Flooding (58)
- Simulation (58)
- Algorithms (51)
- Model (50)
- Artificial intelligence (49)
- Electron (47)
- Carbon (44)
- Neural networks (44)
- SRF (42)
- Computer simulation (41)
- Variability (41)
- Sea level (39)
- Temperature (39)
- Resilience (38)
- Cybersecurity (37)
- Remote sensing (37)
- Dynamics (36)
- Digital libraries (34)
- Publication Year
- Publication
-
- Physics Faculty Publications (871)
- OES Faculty Publications (481)
- OES Theses and Dissertations (392)
- CCPO Publications (344)
- Electrical & Computer Engineering Faculty Publications (314)
-
- Electrical & Computer Engineering Theses & Dissertations (305)
- Computer Science Faculty Publications (297)
- Chemistry & Biochemistry Faculty Publications (278)
- Mathematics & Statistics Faculty Publications (242)
- Biological Sciences Faculty Publications (182)
- Computer Science Theses & Dissertations (174)
- Physics Theses & Dissertations (174)
- Chemistry & Biochemistry Theses & Dissertations (143)
- Mathematics & Statistics Theses & Dissertations (127)
- Virginia Journal of Science (109)
- News Items (100)
- Biological Sciences Theses & Dissertations (90)
- Cybersecurity Undergraduate Research Showcase (90)
- CCPO Circulation (67)
- VMASC Publications (66)
- Mechanical & Aerospace Engineering Faculty Publications (62)
- Engineering Management & Systems Engineering Faculty Publications (57)
- Computational Modeling & Simulation Engineering Theses & Dissertations (56)
- Bioelectrics Publications (55)
- Engineering Technology Faculty Publications (54)
- Mechanical & Aerospace Engineering Theses & Dissertations (53)
- Engineering Management & Systems Engineering Theses & Dissertations (48)
- Civil & Environmental Engineering Faculty Publications (46)
- Civil & Environmental Engineering Theses & Dissertations (44)
- College of Sciences Posters (42)
- Publication Type
- File Type
Articles 241 - 270 of 5947
Full-Text Articles in Physical Sciences and Mathematics
Higher Education Faculty Perceptions Of Chatgpt And The Influencing Factors: A Sentiment Analysis Of X, Yoseph Mamo, Helen Crompton, Diane Burke, Christine E. Nickel
Higher Education Faculty Perceptions Of Chatgpt And The Influencing Factors: A Sentiment Analysis Of X, Yoseph Mamo, Helen Crompton, Diane Burke, Christine E. Nickel
STEMPS Faculty Publications
ChatGPT, an AI chatbot developed by OpenAI, was released in November 2022, sparking a significant surge in global awareness and utilization of generative AI across various domains. Although recent studies have acknowledged the significance of ChatGPT in the education sector, they have yet to focus on exploring faculty attitudes toward ChatGPT. We gathered a comprehensive corpus of tweets containing “#ChatGPT” and “#highered” between November 30th, 2022, and April 30th, 2023. We analyzed data by triangulating VADER, NRC lexicon, and ground coding. Findings suggest that 40% of the expressed sentiments were positive, 51% were neutral, and 9% were negative. The study …
Differences In Student-Ai Interaction Process On A Drawing Task: Focusing On Students' Attitude Towards Ai And The Level Of Drawing Skills, Jinhee Kim, Yoonhee Ham, Sang-Soog Lee
Differences In Student-Ai Interaction Process On A Drawing Task: Focusing On Students' Attitude Towards Ai And The Level Of Drawing Skills, Jinhee Kim, Yoonhee Ham, Sang-Soog Lee
STEMPS Faculty Publications
Recent advances and applications of artificial intelligence (AI) have increased the opportunities for students to interact with AI in their learning tasks. Although various fields of scholarly research have investigated human-AI collaboration, the underlying processes of how students collaborate with AI in a student-AI teaming scenario have been scarcely investigated. To develop effective AI applications in education, it is necessary to understand differences in the student-AI interaction (SAI) process depending on students' characteristics. The present study attempts to fill this gap by exploring the differences in the SAI process amongst students with varying drawing proficiencies and attitudes towards AI in …
The Transformative Integration Of Artificial Intelligence With Cmmc And Nist 800-171 For Advanced Risk Management And Compliance, Mia Lunati
Cybersecurity Undergraduate Research Showcase
This paper explores the transformative potential of integrating Artificial Intelligence (AI) with established cybersecurity frameworks such as the Cybersecurity Maturity Model Certification (CMMC) and the National Institute of Standards and Technology (NIST) Special Publication 800-171. The thesis argues that the relationship between AI and these frameworks has the capacity to transform risk management in cybersecurity, where it could serve as a critical element in threat mitigation. In addition to addressing AI’s capabilities, this paper acknowledges the risks and limitations of these systems, highlighting the need for extensive research and monitoring when relying on AI. One must understand boundaries when integrating …
The Vulnerabilities To The Rsa Algorithm And Future Alternative Algorithms To Improve Security, James Johnson
The Vulnerabilities To The Rsa Algorithm And Future Alternative Algorithms To Improve Security, James Johnson
Cybersecurity Undergraduate Research Showcase
The RSA encryption algorithm has secured many large systems, including bank systems, data encryption in emails, several online transactions, etc. Benefiting from the use of asymmetric cryptography and properties of number theory, RSA was widely regarded as one of most difficult algorithms to decrypt without a key, especially since by brute force, breaking the algorithm would take thousands of years. However, in recent times, research has shown that RSA is getting closer to being efficiently decrypted classically, using algebraic methods, (fully cracked through limited bits) in which elliptic-curve cryptography has been thought of as the alternative that is stronger than …
New Paths Of Attacks: Revealing The Adaptive Integration Of Artificial Intelligence In Evolving Cyber Threats Targeting Social Media Users And Their Data, Larry Teasley
Cybersecurity Undergraduate Research Showcase
The intersection between artificial intelligence tools and social media has opened doors to numerous opportunities and risks. This research delves into the escalating threat landscape in a society heavily dependent on social media. Despite the efforts by social media companies and cybersecurity professionals to mitigate cyber-attacks, the constant advancements of new technologies render social media platforms increasingly vulnerable. Malicious actors exploit generative AI to collect user data, enhancing cyber threats on social media. Notably, generative AI amplifies phishing attacks, disseminates false information, and propagates propaganda, posing substantial challenges to platform security. Ease access to large language models (LLMs) further complicates …
Lip(S) Service: A Socioethical Overview Of Social Media Platforms’ Censorship Policies Regarding Consensual Sexual Content, Sage Futrell
Lip(S) Service: A Socioethical Overview Of Social Media Platforms’ Censorship Policies Regarding Consensual Sexual Content, Sage Futrell
Cybersecurity Undergraduate Research Showcase
The regulation of sexual exploitation on social media is a pressing issue that has been addressed by government legislation. However, laws such as FOSTA-SESTA has inadvertently restricted consensual expressions of sexuality as well. In four social media case studies, this paper investigates the ways in which marginalized groups have been impacted by changing censorship guidelines on social media, and how content moderation methods can be inclusive of these groups. I emphasize the qualitative perspectives of sex workers and queer creators in these case studies, in addition to my own experiences as a content moderation and social media management intern for …
A Review Of Threat Vectors To Dna Sequencing Pipelines, Tyler Rector
A Review Of Threat Vectors To Dna Sequencing Pipelines, Tyler Rector
Cybersecurity Undergraduate Research Showcase
Bioinformatics is a steadily growing field that focuses on the intersection of biology with computer science. Tools and techniques developed within this field are quickly becoming fixtures in genomics, forensics, epidemiology, and bioengineering. The development and analysis of DNA sequencing and synthesis have enabled this significant rise in demand for bioinformatic tools. Notwithstanding, these bioinformatic tools have developed in a research context free of significant cybersecurity threats. With the significant growth of the field and the commercialization of genetic information, this is no longer the case. This paper examines the bioinformatic landscape through reviewing the biological and cybersecurity threats within …
How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim
How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim
Cybersecurity Undergraduate Research Showcase
The powers of OpenAI's groundbreaking AI language model, ChatGPT, startled millions of users when it was released in November. But for many, the tool's ability to further accomplish the goals of evil actors swiftly replaced their initial excitement with significant concerns. ChatGPT gives malicious actors additional ways to possibly compromise sophisticated cybersecurity software. Leaders in a sector that is currently suffering from a 38% global spike in data breaches in 2022 must acknowledge the rising influence of AI and take appropriate action. Cybercriminals are writing more complex and focused business email compromise (BEC) and other phishing emails with the assistance …
The Underrepresentation Of Black Females In Cybersecurity, Makendra Latrice Crosby
The Underrepresentation Of Black Females In Cybersecurity, Makendra Latrice Crosby
Cybersecurity Undergraduate Research Showcase
The significance of cybersecurity methods, strategies, and programs in protecting computers and electronic devices is crucial throughout the technological infrastructure. Despite the considerable growth in the cybersecurity field and its expansive workforce, there exists a notable underrepresentation, specifically among Black/African American females. This study examines the barriers hindering the inclusion of Black women in the cybersecurity workforce such as socioeconomic factors, limited educational access, biases, and workplace culture. The urgency of addressing these challenges calls for solutions such as education programs, mentorship initiatives, creating inclusive workplace environments, and promoting advocacy and increased awareness within the cybersecurity field. Additionally, this paper …
Privacy Concerns And Proposed Solutions With Iot In Wearable Technology, Hyacinth Abad
Privacy Concerns And Proposed Solutions With Iot In Wearable Technology, Hyacinth Abad
Cybersecurity Undergraduate Research Showcase
This paper examines the dynamic relationship between IoT cybersecurity and privacy concerns associated with wearable devices. IoT, with its exponential growth, presents both opportunities and challenges in terms of accessibility, integrity, availability, scalability, confidentiality, and interoperability. Cybersecurity concerns arise as diverse attack surfaces exploit vulnerabilities in IoT systems, necessitating robust defenses. In the field of wearable technology, these devices offer benefits like health data tracking and real-time communication. However, the adoption of these devices raises privacy concerns. The paper explores proposed solutions, including mechanisms for user-controlled data collection, the implementation of Virtual Trip Line (VTL) and virtual wall approaches, and …
The Analysis And Impact Of Artificial Intelligence On Job Loss, Ava Baratz
The Analysis And Impact Of Artificial Intelligence On Job Loss, Ava Baratz
Cybersecurity Undergraduate Research Showcase
This paper illustrates the analysis and impact of Artificial Intelligence (AI) on job loss across various industries. This paper will discuss an overview of AI technology, a brief history of AI in industry, the positive impacts of AI, the negative impacts of AI on employment, AI considerations that contribute to job loss, the future outlook of AI, and employment loss mitigation strategies Various professional source articles and reputable blog posts will be used to finalize research on this topic.
Integrating Ai Into Uavs, Huong Quach
Integrating Ai Into Uavs, Huong Quach
Cybersecurity Undergraduate Research Showcase
This research project explores the application of Deep Learning (DL) techniques, specifically Convolutional Neural Networks (CNNs), to develop a smoke detection algorithm for deployment on mobile platforms, such as drones and self-driving vehicles. The project focuses on enhancing the decision-making capabilities of these platforms in emergency response situations. The methodology involves three phases: algorithm development, algorithm implementation, and testing and optimization. The developed CNN model, based on ResNet50 architecture, is trained on a dataset of fire, smoke, and neutral images obtained from the web. The algorithm is implemented on the Jetson Nano platform to provide responsive support for first responders. …
Potential Security Vulnerabilities In Raspberry Pi Devices With Mitigation Strategies, Briana Tolleson
Potential Security Vulnerabilities In Raspberry Pi Devices With Mitigation Strategies, Briana Tolleson
Cybersecurity Undergraduate Research Showcase
For this research project I used a Raspberry Pi device and conducted online research to investigate potential security vulnerabilities along with mitigation strategies. I configured the Raspberry Pi by using the proper peripherals such as an HDMI cord, a microUSB adapter that provided 5V and at least 700mA of current, a TV monitor, PiSwitch, SD Card, keyboard, and mouse. I installed the Rasbian operating system (OS). The process to install the Rasbian took about 10 minutes to boot starting at 21:08 on 10/27/2023 and ending at 21:18. 1,513 megabytes (MB) was written to the SD card running at (2.5 MB/sec). …
Rising Threat - Deepfakes And National Security In The Age Of Digital Deception, Dougo Kone-Sow
Rising Threat - Deepfakes And National Security In The Age Of Digital Deception, Dougo Kone-Sow
Cybersecurity Undergraduate Research Showcase
This paper delves into the intricate landscape of deepfakes, exploring their genesis, capabilities, and far-reaching implications. The rise of deepfake technology presents an unprecedented threat to American national security, propagating disinformation and manipulation across various media formats. Notably, deepfakes have evolved from a historical backdrop of disinformation campaigns, merging with the advancements of artificial intelligence (AI) and machine learning to craft convincing but false multimedia content.
Examining the capabilities of deepfakes reveals their potential for misuse, evidenced by instances targeting individuals, companies, and even influencing political events like the 2020 U.S. elections. The paper highlights the direct threats posed by …
Knowing Just Enough To Be Dangerous: The Sociological Effects Of Censoring Public Ai, David Hopkins
Knowing Just Enough To Be Dangerous: The Sociological Effects Of Censoring Public Ai, David Hopkins
Cybersecurity Undergraduate Research Showcase
This paper will present the capabilities and security concerns of public AI, also called generative AI, and look at the societal and sociological effects of implementing regulations of this technology.
The Propagation And Execution Of Malware In Images, Piper Hall
The Propagation And Execution Of Malware In Images, Piper Hall
Cybersecurity Undergraduate Research Showcase
Malware has become increasingly prolific and severe in its consequences as information systems mature and users become more reliant on computing in their daily lives. As cybercrime becomes more complex in its strategies, an often-overlooked manner of propagation is through images. In recent years, several high-profile vulnerabilities in image libraries have opened the door for threat actors to steal money and information from unsuspecting users. This paper will explore the mechanisms by which these exploits function and how they can be avoided.
Considering Equity In Infrastructure Planning Processes And Outcomes For Coastal Resilience, Wie Yusuf, Marina Saitgalina, Tom Allen, Nicole S. Hutton, Jennifer L. Whytlaw, Joshua Behr
Considering Equity In Infrastructure Planning Processes And Outcomes For Coastal Resilience, Wie Yusuf, Marina Saitgalina, Tom Allen, Nicole S. Hutton, Jennifer L. Whytlaw, Joshua Behr
School of Public Service Faculty Publications
No abstract provided.
Optics Studies For Multipass Energy Recovery At Cebaf: Er@Cebaf, Isurumali Neththikumara
Optics Studies For Multipass Energy Recovery At Cebaf: Er@Cebaf, Isurumali Neththikumara
Physics Theses & Dissertations
Energy recovery linacs (ERLs), focus on recycling the kinetic energy of electron beam for the purpose of accelerating a newly injected beam within the same accelerating structure. The rising developments in the super conducting radio frequency technology, ERL technology has achieved several noteworthy milestones over the past few decades. In year 2003, Jefferson Lab has successfully demonstrated a single pass energy recovery at the CEBAF accelerator. Furthermore, they conducted successful experiments with IR-FEL demo and upgrades, as well as the UV FEL driver. This multi-pass, multi-GeV range energy recovery demonstration proposed to be carried out at CEBAF accelerator at Jefferson …
The Prevalence Of Burnout In Saudi Arabia Dental Hygienists, Nouf Hamad Aldayel
The Prevalence Of Burnout In Saudi Arabia Dental Hygienists, Nouf Hamad Aldayel
Dental Hygiene Theses & Dissertations
Purpose: The purpose of this pilot study was to assess the prevalence of burnout in Saudi Arabian dental hygienists and identify risk factors associated with burnout. Methods: A descriptive survey design using the Copenhagen Burnout Inventory (CBI) assessed burnout among a convenience sample of n=123 Saudi dental hygienists. The survey was disseminated electronically to 1,000 Saudi Arabian dental hygienists. The CBI measures three subscales: personal, work-related, and client/patient-related burnout on a five-point Likert-type scale. The survey also included six demographic questions, two Likert-type, one “yes/no,” and one openended question, related to burnout. Descriptive statistics, one-way between subject’s ANOVA, independent samples …
Organic Carbon Decay Mediated By Mesopelagic Microbial Communities, Noah Jonathan Craft
Organic Carbon Decay Mediated By Mesopelagic Microbial Communities, Noah Jonathan Craft
OES Theses and Dissertations
Substantial remineralization of organic carbon occurs in the mesopelagic zone (i.e., the biological pump), the efficiency of which is responsible for the oceans’ capacity to store carbon originally derived from the atmosphere. To better understand how a substrate’s composition influences its degradation by mesopelagic microbial communities, we added treatments made of live algal cells, dead particulate organic carbon and dissolved organic carbon from 14C-labeled algal cultures to mesopelagic water collected in-situ. Each incubation took place in the laboratory over a period of months, during which PO14C, DO14C, ATP, prokaryote abundances and biochemical fractions were measured. …
Faster, Cheaper, And Better Cfd: A Case For Machine Learning To Augment Reynolds-Averaged Navier-Stokes, John Peter Romano Ii
Faster, Cheaper, And Better Cfd: A Case For Machine Learning To Augment Reynolds-Averaged Navier-Stokes, John Peter Romano Ii
Mechanical & Aerospace Engineering Theses & Dissertations
In recent years, the field of machine learning (ML) has made significant advances, particularly through applying deep learning (DL) algorithms and artificial intelligence (AI). The literature shows several ways that ML may enhance the power of computational fluid dynamics (CFD) to improve its solution accuracy, reduce the needed computational resources and reduce overall simulation cost. ML techniques have also expanded the understanding of underlying flow physics and improved data capture from experimental fluid dynamics.
This dissertation presents an in-depth literature review and discusses ways the field of fluid dynamics has leveraged ML modeling to date. The author selects and describes …
A New View Of Chlorophyll Dynamics In The Southern Mid-Atlantic Bight From A Two-Year High-Resolution Spray Glider Survey, Francesco Lane
A New View Of Chlorophyll Dynamics In The Southern Mid-Atlantic Bight From A Two-Year High-Resolution Spray Glider Survey, Francesco Lane
OES Theses and Dissertations
The southern Mid-Atlantic Bight (MAB) near Cape Hatteras, NC, USA, is likely a hotspot for the episodic export of carbon-rich shelf waters to the open ocean. Over a 2 year period, from March 2017 to May 2019, Spray gliders repeatedly occupied transects, along the slope and across the shelf, generating high-resolution chlorophyll fluorescence (fChl) data in the southern MAB. This study implements an fChl calibration method utilizing remotely sensing ocean color as a standard. We validate the method’s utility by demonstrating a reduction in post-calibration cross-mission fChl variability and demonstrating close correspondence between the calibrated fChl data and an in …
Lithium Extraction From Aqueous Solution Using Magnesium Doped Lithium Ion-Sieve Composite, Ujjwal Pokharel
Lithium Extraction From Aqueous Solution Using Magnesium Doped Lithium Ion-Sieve Composite, Ujjwal Pokharel
Civil & Environmental Engineering Theses & Dissertations
This study focused on the development of a magnesium doped ion-sieve composite to extract lithium from an aqueous solution using adsorption process. The extraction process will provide a sustainable alternative to the currently practiced solar evaporation/concentration method which is very slow (takes 24 months) and water intensive. Currently, most of the lithium in the world comes from the mining of lithium or from the evaporative extraction process from the brine. Additionally, the Salton Sea area geothermal brines are recognized as potentially important domestic sources of lithium. Lithium concentration in geothermal brines from the Salton Sea area is reported to be …
Structural Insights Into The Cl-Par-4 Protein: Ionic Requirements, Conformational Transitions, And Interaction With Cisplatin, Krishna Kumar Raut
Structural Insights Into The Cl-Par-4 Protein: Ionic Requirements, Conformational Transitions, And Interaction With Cisplatin, Krishna Kumar Raut
Chemistry & Biochemistry Theses & Dissertations
Cancer continues to be the leading global cause of death, with challenges in early diagnosis, drug resistance, non-specific drug targeting, and cancer recurrence and metastasis posing formidable obstacles in cancer therapy. In this context, Prostate Apoptosis Response-4 (Par-4), a pro-apoptotic tumor suppressor protein, emerged as a promising therapeutic target due to its ability to selectively induce apoptosis in cancer cells, thereby minimizing the drug-associated adverse effects. However, a comprehensive understanding of the structural features of Par-4, specifically the caspase-cleaved fragment (cl-Par-4), is crucial for therapeutic advancements.
This dissertation investigated the effects of various ions, both monovalent and divalent, on the …
Machine Learning Approach To Activity Categorization In Young Adults Using Biomechanical Metrics, Nathan Q. C. Holland
Machine Learning Approach To Activity Categorization In Young Adults Using Biomechanical Metrics, Nathan Q. C. Holland
Mechanical & Aerospace Engineering Theses & Dissertations
Inactive adults often have decreased musculoskeletal health and increased risk factors for chronic diseases. However, there is limited data linking biomechanical measurements of generally healthy young adults to their physical activity levels assessed through questionnaires. Commonly used data collection methods in biomechanics for assessing musculoskeletal health include but are not limited to muscle quality (measured as echo intensity when using ultrasound), isokinetic (i.e., dynamic) muscle strength, muscle activations, and functional movement assessments using motion capture systems. These assessments can be time consuming for both data collection and processing. Therefore, understanding if all biomechanical assessments are necessary to classify the activity …
Dental Hygiene Students Reported Physiological Symptoms Associated With Wearing An N95 Respirator Mask, Peyton Shea Butler
Dental Hygiene Students Reported Physiological Symptoms Associated With Wearing An N95 Respirator Mask, Peyton Shea Butler
Dental Hygiene Theses & Dissertations
Purpose: Physiological symptoms and comfort levels while wearing an N95 respiratory mask has not been examined with dental hygienists. The purpose of this study was to investigate dental hygiene students reported physiological symptoms and comfort perception while wearing an N95 respirator mask during patient care appointments. Methods: After IRB approval (IRB #1987754-2), a 16-item questionnaire was distributed through email to a convenience sample of 65 dental hygiene students. Questions assessed respiratory, dermatologic, cardiac, mask mouth and general physiological symptoms, as well as comfort levels. Additionally, participants were asked to respond to demographic questions and one open ended question inquiring about …
Tracing And Segmentation Of Molecular Patterns In 3-Dimensional Cryo-Et/Em Density Maps Through Algorithmic Image Processing And Deep Learning-Based Techniques, Salim Sazzed
Computer Science Theses & Dissertations
Understanding the structures of biological macromolecules is highly important as they are closely associated with cellular functionalities. Comprehending the precise organization of actin filaments is crucial because they form the dynamic cytoskeleton, which offers structural support to cells and connects the cell’s interior with its surroundings. However, determining the precise organization of actin filaments is challenging due to the poor quality of cryo-electron tomography (cryo-ET) images, which suffer from low signal-to-noise (SNR) ratios and the presence of missing wedge, as well as diverse shape characteristics of actin filaments. To address these formidable challenges, the primary component of this dissertation focuses …
Do Microplastics, Vibrio Bacteria, And Warming Water Temperatures Cause Disease In The Northern Star Coral, Astrangia Poculata?, Heather Leigh Sheffey
Do Microplastics, Vibrio Bacteria, And Warming Water Temperatures Cause Disease In The Northern Star Coral, Astrangia Poculata?, Heather Leigh Sheffey
OES Theses and Dissertations
As marine plastic pollution increases, it becomes imperative to study the effects of microplastics on marine fauna. Marine plastic debris is a vector for disease to marine invertebrates (Lamb et al., 2018; Rotjan et al., 2019). In this context, studies have shown Astrangia poculata will consume microplastics as they do their normal food (Allen et al, 2017; Rotjan et al., 2019). Further, with temperatures increasing worldwide, there is a concern the virulence of disease-causing bacteria will increase (Vezzulli et al., 2015). In a series of manipulative laboratory experiments, this study quantified changes in respiration rates and visual health of Astrangia …
A New Method To Determine The Posterior Distribution Of Coefficient Alpha, John Mart V. Delosreyes
A New Method To Determine The Posterior Distribution Of Coefficient Alpha, John Mart V. Delosreyes
Psychology Theses & Dissertations
There is a focus within the behavioral/social sciences on non-physical, psychological constructs (i.e., constructs). These constructs are indirectly measured using measurement instruments that consist of questions that capture the manifestations of these constructs. The indirect nature of measuring constructs results in a need of ensuring that measurement instruments are reliable. The most popular statistic used to estimate reliability is coefficient alpha as it is easy to compute and has properties that make it desirable to use. Coefficient alpha’s popularity has resulted in a wide breadth of research into its qualities. Notably, research about coefficient alpha’s distribution has led to developments …
Monarch Science Observer, Volume 17, College Of Sciences, Old Dominion University
Monarch Science Observer, Volume 17, College Of Sciences, Old Dominion University
College of Sciences Newsletter
Fall 2023, issue of Monarch Science Observer, ODU Colleges of Sciences Newsletter.