Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Old Dominion University

Discipline
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 241 - 270 of 5947

Full-Text Articles in Physical Sciences and Mathematics

Higher Education Faculty Perceptions Of Chatgpt And The Influencing Factors: A Sentiment Analysis Of X, Yoseph Mamo, Helen Crompton, Diane Burke, Christine E. Nickel Jan 2024

Higher Education Faculty Perceptions Of Chatgpt And The Influencing Factors: A Sentiment Analysis Of X, Yoseph Mamo, Helen Crompton, Diane Burke, Christine E. Nickel

STEMPS Faculty Publications

ChatGPT, an AI chatbot developed by OpenAI, was released in November 2022, sparking a significant surge in global awareness and utilization of generative AI across various domains. Although recent studies have acknowledged the significance of ChatGPT in the education sector, they have yet to focus on exploring faculty attitudes toward ChatGPT. We gathered a comprehensive corpus of tweets containing “#ChatGPT” and “#highered” between November 30th, 2022, and April 30th, 2023. We analyzed data by triangulating VADER, NRC lexicon, and ground coding. Findings suggest that 40% of the expressed sentiments were positive, 51% were neutral, and 9% were negative. The study …


Differences In Student-Ai Interaction Process On A Drawing Task: Focusing On Students' Attitude Towards Ai And The Level Of Drawing Skills, Jinhee Kim, Yoonhee Ham, Sang-Soog Lee Jan 2024

Differences In Student-Ai Interaction Process On A Drawing Task: Focusing On Students' Attitude Towards Ai And The Level Of Drawing Skills, Jinhee Kim, Yoonhee Ham, Sang-Soog Lee

STEMPS Faculty Publications

Recent advances and applications of artificial intelligence (AI) have increased the opportunities for students to interact with AI in their learning tasks. Although various fields of scholarly research have investigated human-AI collaboration, the underlying processes of how students collaborate with AI in a student-AI teaming scenario have been scarcely investigated. To develop effective AI applications in education, it is necessary to understand differences in the student-AI interaction (SAI) process depending on students' characteristics. The present study attempts to fill this gap by exploring the differences in the SAI process amongst students with varying drawing proficiencies and attitudes towards AI in …


The Transformative Integration Of Artificial Intelligence With Cmmc And Nist 800-171 For Advanced Risk Management And Compliance, Mia Lunati Dec 2023

The Transformative Integration Of Artificial Intelligence With Cmmc And Nist 800-171 For Advanced Risk Management And Compliance, Mia Lunati

Cybersecurity Undergraduate Research Showcase

This paper explores the transformative potential of integrating Artificial Intelligence (AI) with established cybersecurity frameworks such as the Cybersecurity Maturity Model Certification (CMMC) and the National Institute of Standards and Technology (NIST) Special Publication 800-171. The thesis argues that the relationship between AI and these frameworks has the capacity to transform risk management in cybersecurity, where it could serve as a critical element in threat mitigation. In addition to addressing AI’s capabilities, this paper acknowledges the risks and limitations of these systems, highlighting the need for extensive research and monitoring when relying on AI. One must understand boundaries when integrating …


The Vulnerabilities To The Rsa Algorithm And Future Alternative Algorithms To Improve Security, James Johnson Dec 2023

The Vulnerabilities To The Rsa Algorithm And Future Alternative Algorithms To Improve Security, James Johnson

Cybersecurity Undergraduate Research Showcase

The RSA encryption algorithm has secured many large systems, including bank systems, data encryption in emails, several online transactions, etc. Benefiting from the use of asymmetric cryptography and properties of number theory, RSA was widely regarded as one of most difficult algorithms to decrypt without a key, especially since by brute force, breaking the algorithm would take thousands of years. However, in recent times, research has shown that RSA is getting closer to being efficiently decrypted classically, using algebraic methods, (fully cracked through limited bits) in which elliptic-curve cryptography has been thought of as the alternative that is stronger than …


New Paths Of Attacks: Revealing The Adaptive Integration Of Artificial Intelligence In Evolving Cyber Threats Targeting Social Media Users And Their Data, Larry Teasley Dec 2023

New Paths Of Attacks: Revealing The Adaptive Integration Of Artificial Intelligence In Evolving Cyber Threats Targeting Social Media Users And Their Data, Larry Teasley

Cybersecurity Undergraduate Research Showcase

The intersection between artificial intelligence tools and social media has opened doors to numerous opportunities and risks. This research delves into the escalating threat landscape in a society heavily dependent on social media. Despite the efforts by social media companies and cybersecurity professionals to mitigate cyber-attacks, the constant advancements of new technologies render social media platforms increasingly vulnerable. Malicious actors exploit generative AI to collect user data, enhancing cyber threats on social media. Notably, generative AI amplifies phishing attacks, disseminates false information, and propagates propaganda, posing substantial challenges to platform security. Ease access to large language models (LLMs) further complicates …


Lip(S) Service: A Socioethical Overview Of Social Media Platforms’ Censorship Policies Regarding Consensual Sexual Content, Sage Futrell Dec 2023

Lip(S) Service: A Socioethical Overview Of Social Media Platforms’ Censorship Policies Regarding Consensual Sexual Content, Sage Futrell

Cybersecurity Undergraduate Research Showcase

The regulation of sexual exploitation on social media is a pressing issue that has been addressed by government legislation. However, laws such as FOSTA-SESTA has inadvertently restricted consensual expressions of sexuality as well. In four social media case studies, this paper investigates the ways in which marginalized groups have been impacted by changing censorship guidelines on social media, and how content moderation methods can be inclusive of these groups. I emphasize the qualitative perspectives of sex workers and queer creators in these case studies, in addition to my own experiences as a content moderation and social media management intern for …


A Review Of Threat Vectors To Dna Sequencing Pipelines, Tyler Rector Dec 2023

A Review Of Threat Vectors To Dna Sequencing Pipelines, Tyler Rector

Cybersecurity Undergraduate Research Showcase

Bioinformatics is a steadily growing field that focuses on the intersection of biology with computer science. Tools and techniques developed within this field are quickly becoming fixtures in genomics, forensics, epidemiology, and bioengineering. The development and analysis of DNA sequencing and synthesis have enabled this significant rise in demand for bioinformatic tools. Notwithstanding, these bioinformatic tools have developed in a research context free of significant cybersecurity threats. With the significant growth of the field and the commercialization of genetic information, this is no longer the case. This paper examines the bioinformatic landscape through reviewing the biological and cybersecurity threats within …


How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim Dec 2023

How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim

Cybersecurity Undergraduate Research Showcase

The powers of OpenAI's groundbreaking AI language model, ChatGPT, startled millions of users when it was released in November. But for many, the tool's ability to further accomplish the goals of evil actors swiftly replaced their initial excitement with significant concerns. ChatGPT gives malicious actors additional ways to possibly compromise sophisticated cybersecurity software. Leaders in a sector that is currently suffering from a 38% global spike in data breaches in 2022 must acknowledge the rising influence of AI and take appropriate action. Cybercriminals are writing more complex and focused business email compromise (BEC) and other phishing emails with the assistance …


The Underrepresentation Of Black Females In Cybersecurity, Makendra Latrice Crosby Dec 2023

The Underrepresentation Of Black Females In Cybersecurity, Makendra Latrice Crosby

Cybersecurity Undergraduate Research Showcase

The significance of cybersecurity methods, strategies, and programs in protecting computers and electronic devices is crucial throughout the technological infrastructure. Despite the considerable growth in the cybersecurity field and its expansive workforce, there exists a notable underrepresentation, specifically among Black/African American females. This study examines the barriers hindering the inclusion of Black women in the cybersecurity workforce such as socioeconomic factors, limited educational access, biases, and workplace culture. The urgency of addressing these challenges calls for solutions such as education programs, mentorship initiatives, creating inclusive workplace environments, and promoting advocacy and increased awareness within the cybersecurity field. Additionally, this paper …


Privacy Concerns And Proposed Solutions With Iot In Wearable Technology, Hyacinth Abad Dec 2023

Privacy Concerns And Proposed Solutions With Iot In Wearable Technology, Hyacinth Abad

Cybersecurity Undergraduate Research Showcase

This paper examines the dynamic relationship between IoT cybersecurity and privacy concerns associated with wearable devices. IoT, with its exponential growth, presents both opportunities and challenges in terms of accessibility, integrity, availability, scalability, confidentiality, and interoperability. Cybersecurity concerns arise as diverse attack surfaces exploit vulnerabilities in IoT systems, necessitating robust defenses. In the field of wearable technology, these devices offer benefits like health data tracking and real-time communication. However, the adoption of these devices raises privacy concerns. The paper explores proposed solutions, including mechanisms for user-controlled data collection, the implementation of Virtual Trip Line (VTL) and virtual wall approaches, and …


The Analysis And Impact Of Artificial Intelligence On Job Loss, Ava Baratz Dec 2023

The Analysis And Impact Of Artificial Intelligence On Job Loss, Ava Baratz

Cybersecurity Undergraduate Research Showcase

This paper illustrates the analysis and impact of Artificial Intelligence (AI) on job loss across various industries. This paper will discuss an overview of AI technology, a brief history of AI in industry, the positive impacts of AI, the negative impacts of AI on employment, AI considerations that contribute to job loss, the future outlook of AI, and employment loss mitigation strategies Various professional source articles and reputable blog posts will be used to finalize research on this topic.


Integrating Ai Into Uavs, Huong Quach Dec 2023

Integrating Ai Into Uavs, Huong Quach

Cybersecurity Undergraduate Research Showcase

This research project explores the application of Deep Learning (DL) techniques, specifically Convolutional Neural Networks (CNNs), to develop a smoke detection algorithm for deployment on mobile platforms, such as drones and self-driving vehicles. The project focuses on enhancing the decision-making capabilities of these platforms in emergency response situations. The methodology involves three phases: algorithm development, algorithm implementation, and testing and optimization. The developed CNN model, based on ResNet50 architecture, is trained on a dataset of fire, smoke, and neutral images obtained from the web. The algorithm is implemented on the Jetson Nano platform to provide responsive support for first responders. …


Potential Security Vulnerabilities In Raspberry Pi Devices With Mitigation Strategies, Briana Tolleson Dec 2023

Potential Security Vulnerabilities In Raspberry Pi Devices With Mitigation Strategies, Briana Tolleson

Cybersecurity Undergraduate Research Showcase

For this research project I used a Raspberry Pi device and conducted online research to investigate potential security vulnerabilities along with mitigation strategies. I configured the Raspberry Pi by using the proper peripherals such as an HDMI cord, a microUSB adapter that provided 5V and at least 700mA of current, a TV monitor, PiSwitch, SD Card, keyboard, and mouse. I installed the Rasbian operating system (OS). The process to install the Rasbian took about 10 minutes to boot starting at 21:08 on 10/27/2023 and ending at 21:18. 1,513 megabytes (MB) was written to the SD card running at (2.5 MB/sec). …


Rising Threat - Deepfakes And National Security In The Age Of Digital Deception, Dougo Kone-Sow Dec 2023

Rising Threat - Deepfakes And National Security In The Age Of Digital Deception, Dougo Kone-Sow

Cybersecurity Undergraduate Research Showcase

This paper delves into the intricate landscape of deepfakes, exploring their genesis, capabilities, and far-reaching implications. The rise of deepfake technology presents an unprecedented threat to American national security, propagating disinformation and manipulation across various media formats. Notably, deepfakes have evolved from a historical backdrop of disinformation campaigns, merging with the advancements of artificial intelligence (AI) and machine learning to craft convincing but false multimedia content.

Examining the capabilities of deepfakes reveals their potential for misuse, evidenced by instances targeting individuals, companies, and even influencing political events like the 2020 U.S. elections. The paper highlights the direct threats posed by …


Knowing Just Enough To Be Dangerous: The Sociological Effects Of Censoring Public Ai, David Hopkins Nov 2023

Knowing Just Enough To Be Dangerous: The Sociological Effects Of Censoring Public Ai, David Hopkins

Cybersecurity Undergraduate Research Showcase

This paper will present the capabilities and security concerns of public AI, also called generative AI, and look at the societal and sociological effects of implementing regulations of this technology.


The Propagation And Execution Of Malware In Images, Piper Hall Nov 2023

The Propagation And Execution Of Malware In Images, Piper Hall

Cybersecurity Undergraduate Research Showcase

Malware has become increasingly prolific and severe in its consequences as information systems mature and users become more reliant on computing in their daily lives. As cybercrime becomes more complex in its strategies, an often-overlooked manner of propagation is through images. In recent years, several high-profile vulnerabilities in image libraries have opened the door for threat actors to steal money and information from unsuspecting users. This paper will explore the mechanisms by which these exploits function and how they can be avoided.


Considering Equity In Infrastructure Planning Processes And Outcomes For Coastal Resilience, Wie Yusuf, Marina Saitgalina, Tom Allen, Nicole S. Hutton, Jennifer L. Whytlaw, Joshua Behr Oct 2023

Considering Equity In Infrastructure Planning Processes And Outcomes For Coastal Resilience, Wie Yusuf, Marina Saitgalina, Tom Allen, Nicole S. Hutton, Jennifer L. Whytlaw, Joshua Behr

School of Public Service Faculty Publications

No abstract provided.


Optics Studies For Multipass Energy Recovery At Cebaf: Er@Cebaf, Isurumali Neththikumara Oct 2023

Optics Studies For Multipass Energy Recovery At Cebaf: Er@Cebaf, Isurumali Neththikumara

Physics Theses & Dissertations

Energy recovery linacs (ERLs), focus on recycling the kinetic energy of electron beam for the purpose of accelerating a newly injected beam within the same accelerating structure. The rising developments in the super conducting radio frequency technology, ERL technology has achieved several noteworthy milestones over the past few decades. In year 2003, Jefferson Lab has successfully demonstrated a single pass energy recovery at the CEBAF accelerator. Furthermore, they conducted successful experiments with IR-FEL demo and upgrades, as well as the UV FEL driver. This multi-pass, multi-GeV range energy recovery demonstration proposed to be carried out at CEBAF accelerator at Jefferson …


The Prevalence Of Burnout In Saudi Arabia Dental Hygienists, Nouf Hamad Aldayel Oct 2023

The Prevalence Of Burnout In Saudi Arabia Dental Hygienists, Nouf Hamad Aldayel

Dental Hygiene Theses & Dissertations

Purpose: The purpose of this pilot study was to assess the prevalence of burnout in Saudi Arabian dental hygienists and identify risk factors associated with burnout. Methods: A descriptive survey design using the Copenhagen Burnout Inventory (CBI) assessed burnout among a convenience sample of n=123 Saudi dental hygienists. The survey was disseminated electronically to 1,000 Saudi Arabian dental hygienists. The CBI measures three subscales: personal, work-related, and client/patient-related burnout on a five-point Likert-type scale. The survey also included six demographic questions, two Likert-type, one “yes/no,” and one openended question, related to burnout. Descriptive statistics, one-way between subject’s ANOVA, independent samples …


Organic Carbon Decay Mediated By Mesopelagic Microbial Communities, Noah Jonathan Craft Oct 2023

Organic Carbon Decay Mediated By Mesopelagic Microbial Communities, Noah Jonathan Craft

OES Theses and Dissertations

Substantial remineralization of organic carbon occurs in the mesopelagic zone (i.e., the biological pump), the efficiency of which is responsible for the oceans’ capacity to store carbon originally derived from the atmosphere. To better understand how a substrate’s composition influences its degradation by mesopelagic microbial communities, we added treatments made of live algal cells, dead particulate organic carbon and dissolved organic carbon from 14C-labeled algal cultures to mesopelagic water collected in-situ. Each incubation took place in the laboratory over a period of months, during which PO14C, DO14C, ATP, prokaryote abundances and biochemical fractions were measured. …


Faster, Cheaper, And Better Cfd: A Case For Machine Learning To Augment Reynolds-Averaged Navier-Stokes, John Peter Romano Ii Oct 2023

Faster, Cheaper, And Better Cfd: A Case For Machine Learning To Augment Reynolds-Averaged Navier-Stokes, John Peter Romano Ii

Mechanical & Aerospace Engineering Theses & Dissertations

In recent years, the field of machine learning (ML) has made significant advances, particularly through applying deep learning (DL) algorithms and artificial intelligence (AI). The literature shows several ways that ML may enhance the power of computational fluid dynamics (CFD) to improve its solution accuracy, reduce the needed computational resources and reduce overall simulation cost. ML techniques have also expanded the understanding of underlying flow physics and improved data capture from experimental fluid dynamics.

This dissertation presents an in-depth literature review and discusses ways the field of fluid dynamics has leveraged ML modeling to date. The author selects and describes …


A New View Of Chlorophyll Dynamics In The Southern Mid-Atlantic Bight From A Two-Year High-Resolution Spray Glider Survey, Francesco Lane Oct 2023

A New View Of Chlorophyll Dynamics In The Southern Mid-Atlantic Bight From A Two-Year High-Resolution Spray Glider Survey, Francesco Lane

OES Theses and Dissertations

The southern Mid-Atlantic Bight (MAB) near Cape Hatteras, NC, USA, is likely a hotspot for the episodic export of carbon-rich shelf waters to the open ocean. Over a 2 year period, from March 2017 to May 2019, Spray gliders repeatedly occupied transects, along the slope and across the shelf, generating high-resolution chlorophyll fluorescence (fChl) data in the southern MAB. This study implements an fChl calibration method utilizing remotely sensing ocean color as a standard. We validate the method’s utility by demonstrating a reduction in post-calibration cross-mission fChl variability and demonstrating close correspondence between the calibrated fChl data and an in …


Lithium Extraction From Aqueous Solution Using Magnesium Doped Lithium Ion-Sieve Composite, Ujjwal Pokharel Oct 2023

Lithium Extraction From Aqueous Solution Using Magnesium Doped Lithium Ion-Sieve Composite, Ujjwal Pokharel

Civil & Environmental Engineering Theses & Dissertations

This study focused on the development of a magnesium doped ion-sieve composite to extract lithium from an aqueous solution using adsorption process. The extraction process will provide a sustainable alternative to the currently practiced solar evaporation/concentration method which is very slow (takes 24 months) and water intensive. Currently, most of the lithium in the world comes from the mining of lithium or from the evaporative extraction process from the brine. Additionally, the Salton Sea area geothermal brines are recognized as potentially important domestic sources of lithium. Lithium concentration in geothermal brines from the Salton Sea area is reported to be …


Structural Insights Into The Cl-Par-4 Protein: Ionic Requirements, Conformational Transitions, And Interaction With Cisplatin, Krishna Kumar Raut Oct 2023

Structural Insights Into The Cl-Par-4 Protein: Ionic Requirements, Conformational Transitions, And Interaction With Cisplatin, Krishna Kumar Raut

Chemistry & Biochemistry Theses & Dissertations

Cancer continues to be the leading global cause of death, with challenges in early diagnosis, drug resistance, non-specific drug targeting, and cancer recurrence and metastasis posing formidable obstacles in cancer therapy. In this context, Prostate Apoptosis Response-4 (Par-4), a pro-apoptotic tumor suppressor protein, emerged as a promising therapeutic target due to its ability to selectively induce apoptosis in cancer cells, thereby minimizing the drug-associated adverse effects. However, a comprehensive understanding of the structural features of Par-4, specifically the caspase-cleaved fragment (cl-Par-4), is crucial for therapeutic advancements.

This dissertation investigated the effects of various ions, both monovalent and divalent, on the …


Machine Learning Approach To Activity Categorization In Young Adults Using Biomechanical Metrics, Nathan Q. C. Holland Oct 2023

Machine Learning Approach To Activity Categorization In Young Adults Using Biomechanical Metrics, Nathan Q. C. Holland

Mechanical & Aerospace Engineering Theses & Dissertations

Inactive adults often have decreased musculoskeletal health and increased risk factors for chronic diseases. However, there is limited data linking biomechanical measurements of generally healthy young adults to their physical activity levels assessed through questionnaires. Commonly used data collection methods in biomechanics for assessing musculoskeletal health include but are not limited to muscle quality (measured as echo intensity when using ultrasound), isokinetic (i.e., dynamic) muscle strength, muscle activations, and functional movement assessments using motion capture systems. These assessments can be time consuming for both data collection and processing. Therefore, understanding if all biomechanical assessments are necessary to classify the activity …


Dental Hygiene Students Reported Physiological Symptoms Associated With Wearing An N95 Respirator Mask, Peyton Shea Butler Oct 2023

Dental Hygiene Students Reported Physiological Symptoms Associated With Wearing An N95 Respirator Mask, Peyton Shea Butler

Dental Hygiene Theses & Dissertations

Purpose: Physiological symptoms and comfort levels while wearing an N95 respiratory mask has not been examined with dental hygienists. The purpose of this study was to investigate dental hygiene students reported physiological symptoms and comfort perception while wearing an N95 respirator mask during patient care appointments. Methods: After IRB approval (IRB #1987754-2), a 16-item questionnaire was distributed through email to a convenience sample of 65 dental hygiene students. Questions assessed respiratory, dermatologic, cardiac, mask mouth and general physiological symptoms, as well as comfort levels. Additionally, participants were asked to respond to demographic questions and one open ended question inquiring about …


Tracing And Segmentation Of Molecular Patterns In 3-Dimensional Cryo-Et/Em Density Maps Through Algorithmic Image Processing And Deep Learning-Based Techniques, Salim Sazzed Oct 2023

Tracing And Segmentation Of Molecular Patterns In 3-Dimensional Cryo-Et/Em Density Maps Through Algorithmic Image Processing And Deep Learning-Based Techniques, Salim Sazzed

Computer Science Theses & Dissertations

Understanding the structures of biological macromolecules is highly important as they are closely associated with cellular functionalities. Comprehending the precise organization of actin filaments is crucial because they form the dynamic cytoskeleton, which offers structural support to cells and connects the cell’s interior with its surroundings. However, determining the precise organization of actin filaments is challenging due to the poor quality of cryo-electron tomography (cryo-ET) images, which suffer from low signal-to-noise (SNR) ratios and the presence of missing wedge, as well as diverse shape characteristics of actin filaments. To address these formidable challenges, the primary component of this dissertation focuses …


Do Microplastics, Vibrio Bacteria, And Warming Water Temperatures Cause Disease In The Northern Star Coral, Astrangia Poculata?, Heather Leigh Sheffey Oct 2023

Do Microplastics, Vibrio Bacteria, And Warming Water Temperatures Cause Disease In The Northern Star Coral, Astrangia Poculata?, Heather Leigh Sheffey

OES Theses and Dissertations

As marine plastic pollution increases, it becomes imperative to study the effects of microplastics on marine fauna. Marine plastic debris is a vector for disease to marine invertebrates (Lamb et al., 2018; Rotjan et al., 2019). In this context, studies have shown Astrangia poculata will consume microplastics as they do their normal food (Allen et al, 2017; Rotjan et al., 2019). Further, with temperatures increasing worldwide, there is a concern the virulence of disease-causing bacteria will increase (Vezzulli et al., 2015). In a series of manipulative laboratory experiments, this study quantified changes in respiration rates and visual health of Astrangia …


A New Method To Determine The Posterior Distribution Of Coefficient Alpha, John Mart V. Delosreyes Oct 2023

A New Method To Determine The Posterior Distribution Of Coefficient Alpha, John Mart V. Delosreyes

Psychology Theses & Dissertations

There is a focus within the behavioral/social sciences on non-physical, psychological constructs (i.e., constructs). These constructs are indirectly measured using measurement instruments that consist of questions that capture the manifestations of these constructs. The indirect nature of measuring constructs results in a need of ensuring that measurement instruments are reliable. The most popular statistic used to estimate reliability is coefficient alpha as it is easy to compute and has properties that make it desirable to use. Coefficient alpha’s popularity has resulted in a wide breadth of research into its qualities. Notably, research about coefficient alpha’s distribution has led to developments …


Monarch Science Observer, Volume 17, College Of Sciences, Old Dominion University Sep 2023

Monarch Science Observer, Volume 17, College Of Sciences, Old Dominion University

College of Sciences Newsletter

Fall 2023, issue of Monarch Science Observer, ODU Colleges of Sciences Newsletter.