Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 12181 - 12210 of 302419

Full-Text Articles in Physical Sciences and Mathematics

A Multivariate Investigation Of The Motivational, Academic, And Well-Being Characteristics Of First-Generation And Continuing-Generation College Students, Christopher L. Thomas, Staci Zolkoski Jul 2023

A Multivariate Investigation Of The Motivational, Academic, And Well-Being Characteristics Of First-Generation And Continuing-Generation College Students, Christopher L. Thomas, Staci Zolkoski

Journal of Research Initiatives

Prior research has noted differences in motivational, academic, and well-being factors between first-generation and continuing-education students. However, past investigations have primarily overlooked the interactive influence of protective and risk factors when comparing the characteristics of first-generation and continuing-education students. Thus, the current study adopted a multivariate approach to gain a more nuanced understanding of the influence of generational status on students' self-regulated learning capabilities, academic anxiety, sense of belonging, academic barriers, mental health concerns, and satisfaction with life. University students (N = 432, 67.46% Caucasian, 87.55% female, Age = 28.10 ± 9.46) completed the Cognitive Test Anxiety Scale-2nd …


Future Trends And Directions For Secure Infrastructure Architecture In The Education Sector: A Systematic Review Of Recent Evidence, Isaac Atta Senior Ampofo, Isaac Atta Junior Ampofo Jul 2023

Future Trends And Directions For Secure Infrastructure Architecture In The Education Sector: A Systematic Review Of Recent Evidence, Isaac Atta Senior Ampofo, Isaac Atta Junior Ampofo

Journal of Research Initiatives

The most efficient approach to giving large numbers of students’ access to computational resources is through a data center. A contemporary method for building the data center's computer infrastructure is the software-defined model, which enables user tasks to be processed in a reasonable amount of time and at a reasonable cost. The researcher examines potential directions and trends for a secured infrastructure design in this article. Additionally, interoperable, highly reusable modules that can include the newest trends in the education industry are made possible by cloud-based educational software. The Reference Architecture for University Education System Using AWS Services is presented …


Some New Techniques And Their Applications In The Theory Of Distributions, Kevin Kellinsky-Gonzalez Jul 2023

Some New Techniques And Their Applications In The Theory Of Distributions, Kevin Kellinsky-Gonzalez

LSU Doctoral Dissertations

This dissertation is a compilation of three articles in the theory of distributions. Each essay focuses on a different technique or concept related to distributions.

The focus of the first essay is the concept of distributional point values. Distribu- tions are sometimes called generalized functions, as they share many similarities with ordi- nary functions, with some key differences. Distributional point values, among other things, demonstrate that distributions are even more akin to ordinary functions than one might think.

The second essay concentrates on two major topics in analysis, namely asymptotic expansions and the concept of moments. There are many variations …


Gama/Devils: Cosmic Star Formation And Agn Activity Over 12.5 Billion Years, Jordan C J D’Silva, Simon P. Driver, Claudia D P Lagos, Aaron S G Robotham, Sabine Bellstedt, Luke J M Davies, Jessica E. Thorne, Joss Bland-Hawthorn, Matias Bravo, Benne Holwerda, Steven Phillipps, Nick Seymour, Malgorzata Siudek, Rogier A. Windhorst Jul 2023

Gama/Devils: Cosmic Star Formation And Agn Activity Over 12.5 Billion Years, Jordan C J D’Silva, Simon P. Driver, Claudia D P Lagos, Aaron S G Robotham, Sabine Bellstedt, Luke J M Davies, Jessica E. Thorne, Joss Bland-Hawthorn, Matias Bravo, Benne Holwerda, Steven Phillipps, Nick Seymour, Malgorzata Siudek, Rogier A. Windhorst

Faculty and Staff Scholarship

We use the Galaxy and Mass Assembly (GAMA) and the Deep Extragalactic Visible Legacy Survey (DEVILS) observational data sets to calculate the cosmic star formation rate (SFR) and active galactic nuclei (AGN) bolometric luminosity history (CSFH/CAGNH) over the last 12.5 billion years. SFRs and AGN bolometric luminosities were derived using the spectral energy distribution fitting code ProSpect, which includes an AGN prescription to self consistently model the contribution from both AGN and stellar emission to the observed rest-frame ultra-violet to far-infrared photometry. We find that both the CSFH and CAGNH evolve similarly, rising in the early Universe up to a …


Short-Term Responses Of Soil Carbon, Nitrogen, And Microbial Biomass To Cover Crop Mixtures And Monocultures, Igor Alexandre De Souza, Amanda B. Daly, Jorg Schnecker, Nicholas D. Warren, Adalfredo Rocha Lobo Jr., Richard G. Smith, Andre Fonseca Brito, A. Stuart Grandy Jul 2023

Short-Term Responses Of Soil Carbon, Nitrogen, And Microbial Biomass To Cover Crop Mixtures And Monocultures, Igor Alexandre De Souza, Amanda B. Daly, Jorg Schnecker, Nicholas D. Warren, Adalfredo Rocha Lobo Jr., Richard G. Smith, Andre Fonseca Brito, A. Stuart Grandy

Faculty Publications

Increasingly, cover crops are being adopted for the purpose of improving soil health, yet the timescale and magnitude by which living annual cover crops might modify soil chemical and biological aspects of soil health is not well understood. At the same time, there is growing interest among farmers in cover crop mixtures due to perceptions that species-rich cover crop communities will enhance soil health relative to monocultures. In a field experiment in southeast New Hampshire, we investigated how groups of cover crops grown as monocultures and mixtures for specific seasonal niches (winter/spring, summer, and fall) influenced levels of soil nitrogen …


The Existence Of Solutions To A System Of Nonhomogeneous Difference Equations, Stephanie Walker Jul 2023

The Existence Of Solutions To A System Of Nonhomogeneous Difference Equations, Stephanie Walker

Rose-Hulman Undergraduate Mathematics Journal

This article will demonstrate a process using Fixed Point Theory to determine the existence of multiple positive solutions for a type of system of nonhomogeneous even ordered boundary value problems on a discrete domain. We first reconstruct the problem by transforming the system so that it satisfies homogeneous boundary conditions. We then create a cone and an operator sufficient to apply the Guo-KrasnoselâA˘Zskii Fixed Point Theorem. The majority of the work involves developing the constraints ´ needed to utilized this fixed point theorem. The theorem is then applied three times, guaranteeing the existence of at least three distinct solutions. Thus, …


Cyberbullying: Senior Prospective Teachers’ Coping Knowledge And Strategies, Kürşat Arslan, İnan Aydın Jul 2023

Cyberbullying: Senior Prospective Teachers’ Coping Knowledge And Strategies, Kürşat Arslan, İnan Aydın

Journal of Cybersecurity Education, Research and Practice

This study aimed to determine senior prospective teachers’ coping knowledge and strategies for cyberbullying in terms of demographic variables. The sample consisted of 471 prospective teachers (324 female and 147 male) studying in the 4th grade in Dokuz Eylül University Buca Education Faculty in Izmir in the 2019-2020 academic year. It was a quantitative study using a causal-comparative research design to find out whether prospective teachers’ coping knowledge differed by independent variables. The "Coping with Cyberbullying Scale" developed by Koç et al. (2016) was employed to discover prospective teachers’ coping strategies for cyberbullying. A "Personal Information" form was also prepared …


A Systematic Mapping Study On Gamification Applications For Undergraduate Cybersecurity Education, Sherri Weitl-Harms, Adam Spanier, John Hastings, Matthew Rokusek Jul 2023

A Systematic Mapping Study On Gamification Applications For Undergraduate Cybersecurity Education, Sherri Weitl-Harms, Adam Spanier, John Hastings, Matthew Rokusek

Journal of Cybersecurity Education, Research and Practice

Gamification in education presents a number of benefits that can theoretically facilitate higher engagement and motivation among students when learning complex, technical concepts. As an innovative, high-potential educational tool, many educators and researchers are attempting to implement more effective gamification into undergraduate coursework. Cyber Security Operations (CSO) education is no exception. CSO education traditionally requires comprehension of complex concepts requiring a high level of technical and abstract thinking. By properly applying gamification to complex CSO concepts, engagement in students should see an increase. While an increase is expected, no comprehensive study of CSO gamification applications (GA) has yet been undertaken …


Effects Of Coastal Freshening On Porewater Salinity And Nitrogen Cycling In Brackish Marsh Soils: Implications For Biogeochemical Resilience In Barataria Basin, La, Robert C. Feder Jul 2023

Effects Of Coastal Freshening On Porewater Salinity And Nitrogen Cycling In Brackish Marsh Soils: Implications For Biogeochemical Resilience In Barataria Basin, La, Robert C. Feder

LSU Master's Theses

The Mid-Barataria Sediment Diversion will divert sediments and fresh water from the Mississippi River into mid-Barataria Basin, LA for the purposes of building and sustaining coastal marshes, potentially reducing the estuarine salinity to 0 during operation. Increased freshwater inputs to the area of project influence may reduce porewater salinity and induce ammonium adsorption in brackish marsh soils of the region, potentially impacting the activity of ammonium-producing and denitrifying bacteria. However, brackish soils occur in zones of intermediate salinity and may, therefore, exhibit biogeochemical resilience to episodic changes in surface water salinity. I hypothesized that inundating brackish marsh soils with fresh …


Sociocultural Barriers For Female Participation In Stem: A Case Of Saudi Women In Cybersecurity, Alanoud Aljuaid, Xiang Michelle Liu Jul 2023

Sociocultural Barriers For Female Participation In Stem: A Case Of Saudi Women In Cybersecurity, Alanoud Aljuaid, Xiang Michelle Liu

Journal of Cybersecurity Education, Research and Practice

The participation of women in Science, Technology, Engineering, and Mathematics (STEM) workforces is overwhelmingly low as compared to their male counterparts. The low uptake of cybersecurity careers has been documented in the previous studies conducted in the contexts of the West and Eastern worlds. However, most of the past studies mainly covered the Western world leaving more knowledge gaps in the context of Middle Eastern countries such as Saudi Arabia. Thus, to fill the existing knowledge gaps, the current study focused on women in Saudi Arabia. The aim of the study was to investigate the factors behind the underrepresentation of …


Editorial - 2023 - 1, Hossain Shahriar, Herbert J. Mattord, Michael E. Whitman Jul 2023

Editorial - 2023 - 1, Hossain Shahriar, Herbert J. Mattord, Michael E. Whitman

Journal of Cybersecurity Education, Research and Practice

No abstract provided.


How Effective Is The Efficiency Gap?, Thomas Q. Sibley Jul 2023

How Effective Is The Efficiency Gap?, Thomas Q. Sibley

Mathematics Faculty Publications

Gerrymandering has affected U. S. politics since at least 1812. A political cartoon that year decried this tactic by then Massachusetts Governor Elbridge Gerry. (Gerrymandering is manipulating the boundaries of districts to benefit a group unfairly.)

While we may feel we know a gerrymander when we see one, finding a meaningful metric has proven challenging. This article uses elementary mathematics to investigate the efficiency gap, a recent model proposed to measure gerrymandering.


Face Readers: The Frontier Of Computer Vision And Math Learning, Beverly Woolf, Margrit Betke, Hao Yu, Sarah Adel Bargal, Ivan Arroyo, John J. Magee Iv, Danielle Allessio, William Rebelsky Jul 2023

Face Readers: The Frontier Of Computer Vision And Math Learning, Beverly Woolf, Margrit Betke, Hao Yu, Sarah Adel Bargal, Ivan Arroyo, John J. Magee Iv, Danielle Allessio, William Rebelsky

Computer Science

The future of AI-assisted individualized learning includes computer vision to inform intelligent tutors and teachers about student affect, motivation and performance. Facial expression recognition is essential in recognizing subtle differences when students ask for hints or fail to solve problems. Facial features and classification labels enable intelligent tutors to predict students’ performance and recommend activities. Videos can capture students’ faces and model their effort and progress; machine learning classifiers can support intelligent tutors to provide interventions. One goal of this research is to support deep dives by teachers to identify students’ individual needs through facial expression and to provide immediate …


Case Study: The Impact Of Emerging Technologies On Cybersecurity Education And Workforces, Austin Cusak Jul 2023

Case Study: The Impact Of Emerging Technologies On Cybersecurity Education And Workforces, Austin Cusak

Journal of Cybersecurity Education, Research and Practice

A qualitative case study focused on understanding what steps are needed to prepare the cybersecurity workforces of 2026-2028 to work with and against emerging technologies such as Artificial Intelligence and Machine Learning. Conducted through a workshop held in two parts at a cybersecurity education conference, findings came both from a semi-structured interview with a panel of experts as well as small workgroups of professionals answering seven scenario-based questions. Data was thematically analyzed, with major findings emerging about the need to refocus cybersecurity STEM at the middle school level with problem-based learning, the disconnects between workforce operations and cybersecurity operators, the …


How Effective Are Seta Programs Anyway: Learning And Forgetting In Security Awareness Training, David Sikolia, David Biros, Tianjian Zhang Jul 2023

How Effective Are Seta Programs Anyway: Learning And Forgetting In Security Awareness Training, David Sikolia, David Biros, Tianjian Zhang

Journal of Cybersecurity Education, Research and Practice

Prevalent security threats caused by human errors necessitate security education, training, and awareness (SETA) programs in organizations. Despite strong theoretical foundations in behavioral cybersecurity, field evidence on the effectiveness of SETA programs in mitigating actual threats is scarce. Specifically, with a broad range of cybersecurity knowledge crammed into in a single SETA session, it is unclear how effective different types of knowledge are in mitigating human errors in a longitudinal setting. his study investigates how knowledge gained through SETA programs affects human errors in cybersecurity to fill the longitudinal void. In a baseline experiment, we establish that SETA programs reduce …


Anonymity And Gender Effects On Online Trolling And Cybervictimization, Gang Lee, Annalyssia Soonah Jul 2023

Anonymity And Gender Effects On Online Trolling And Cybervictimization, Gang Lee, Annalyssia Soonah

Journal of Cybersecurity Education, Research and Practice

The purpose of this study was to investigate the effects of the anonymity of the internet and gender differences in online trolling and cybervictimization. A sample of 151 college students attending a southeastern university completed a survey to assess their internet activities and online trolling and cybervictimization. Multivariate analyses of logistic regression and ordinary least squares regression were used to analyze online trolling and cybervictimization. The results indicated that the anonymity measure was not a significant predictor of online trolling and cybervictimization. Female students were less likely than male students to engage in online trolling, but there was no gender …


Compete To Learn: Toward Cybersecurity As A Sport, Tj Oconnor, Dane Brown, Jasmine Jackson, Bryson Payne, Suzanna Schmeelk Jul 2023

Compete To Learn: Toward Cybersecurity As A Sport, Tj Oconnor, Dane Brown, Jasmine Jackson, Bryson Payne, Suzanna Schmeelk

Journal of Cybersecurity Education, Research and Practice

To support the workforce gap of skilled cybersecurity professionals, gamified pedagogical approaches for teaching cybersecurity have exponentially grown over the last two decades. During this same period, e-sports developed into a multi-billion dollar industry and became a staple on college campuses. In this work, we explore the opportunity to integrate e-sports and gamified cybersecurity approaches into the inaugural US Cyber Games Team. During this tenure, we learned many lessons about recruiting, assessing, and training cybersecurity teams. We share our approach, materials, and lessons learned to serve as a model for fielding amateur cybersecurity teams for future competition.


Examination Of Cybersecurity Technologies, Practices, Challenges, And Wish List In K-12 School Districts, Florence Martin, Julie Bacak, Erik Jon Byker, Weichao Wang, Jonathan Wagner, Lynn Ahlgrim-Delzell Jul 2023

Examination Of Cybersecurity Technologies, Practices, Challenges, And Wish List In K-12 School Districts, Florence Martin, Julie Bacak, Erik Jon Byker, Weichao Wang, Jonathan Wagner, Lynn Ahlgrim-Delzell

Journal of Cybersecurity Education, Research and Practice

With the growth in digital teaching and learning, there has been a sharp rise in the number of cybersecurity attacks on K-12 school networks. This has demonstrated a need for security technologies and cybersecurity education. This study examined security technologies used, effective security practices, challenges, concerns, and wish list of technology leaders in K-12 settings. Data collected from 23 district websites and from interviews with 12 district technology leaders were analyzed. Top security practices included cloud-based technologies, segregated network/V-LAN, two-factor authentication, limiting access, and use of Clever or Class Link. Top challenges included keeping users informed, lack of buy-in from …


Deep Learning-Based Diagnosis Of Disease Activity In Patients With Graves’ Orbitopathy Using Orbital Spect/Ct, Ni Yao, Longxi Li, Zhengyuan Gao, Chen Zhao, Yanting Li, Chuang Han, Jiaofen Nan, Zelin Zhu, Yi Xiao, Fubao Zhu, Min Zhao, Weihua Zhou Jul 2023

Deep Learning-Based Diagnosis Of Disease Activity In Patients With Graves’ Orbitopathy Using Orbital Spect/Ct, Ni Yao, Longxi Li, Zhengyuan Gao, Chen Zhao, Yanting Li, Chuang Han, Jiaofen Nan, Zelin Zhu, Yi Xiao, Fubao Zhu, Min Zhao, Weihua Zhou

Michigan Tech Publications

Purpose: Orbital [99mTc]TcDTPA orbital single-photon emission computed tomography (SPECT)/CT is an important method for assessing inflammatory activity in patients with Graves’ orbitopathy (GO). However, interpreting the results requires substantial physician workload. We aim to propose an automated method called GO-Net to detect inflammatory activity in patients with GO. Materials and methods: GO-Net had two stages: (1) a semantic V-Net segmentation network (SV-Net) that extracts extraocular muscles (EOMs) in orbital CT images and (2) a convolutional neural network (CNN) that uses SPECT/CT images and the segmentation results to classify inflammatory activity. A total of 956 eyes from 478 patients with GO …


Pathogen Emergence As Complex Biological Invasion: Lessons From Dynamical Systems Modeling, Sudam Surasinghe, Marisabel Rodriguez, Victor Meszaros, Jane Molofsky, Salvador Almagro-Moreno, Brandon Ogbunugafor Jul 2023

Pathogen Emergence As Complex Biological Invasion: Lessons From Dynamical Systems Modeling, Sudam Surasinghe, Marisabel Rodriguez, Victor Meszaros, Jane Molofsky, Salvador Almagro-Moreno, Brandon Ogbunugafor

Northeast Journal of Complex Systems (NEJCS)

Infectious disease emergence has become the target of cross-disciplinary efforts
that aim to understand and predict the shape of outbreaks. The many challenges
involved with the prediction of disease emergence events is a characteristic that in-
fectious diseases share with biological invasions in many subfields of ecology (e.g.,
how certain plants are able to successfully invade a new niche). Like infectious
diseases, biological invasions by plants and animals involve interactions between
agents (pathogens and plants in their respective cases) and a recipient niche. In
this study, we examine the problem of pathogen emergence through the lens of a
framework first …


Water Current, Volume 55, No. 2, Summer 2023 Jul 2023

Water Current, Volume 55, No. 2, Summer 2023

Water Current Newsletter

No abstract provided.


Reef Benthic Fauna And Sediment Characterization, Robert M. Cerrato, Matthew Sclafani Jul 2023

Reef Benthic Fauna And Sediment Characterization, Robert M. Cerrato, Matthew Sclafani

School of Marine & Atmospheric Sciences Faculty Publications

High-resolution backscatter and bathymetric maps created by multibeam sonar surveys were used to identify different seafloor bottom types within existing, potentially expanded, and newly proposed reef areas in New York waters. Existing sites included Smithtown in Long Island Sound (LIS), and Rockaway, Atlantic Beach, Hempstead, Yellowbar, Kismet, Fire Island, Twelve Mile along the South Shore. Potential expansions are proposed on the South Shore for McAllister, Moriches, and Shinnecock reefs in addition to a new site called Sixteen Fathom. In Long Island Sound, new sites are proposed for Huntington/Oyster Bay, Port Jefferson/Mount Sinai, and Mattituck. Grab samples were collected within these …


Lagrange’S Study Of Wilson’S Theorem, Carl Lienert Jul 2023

Lagrange’S Study Of Wilson’S Theorem, Carl Lienert

Number Theory

No abstract provided.


Lagrange’S Proof Of The Converse Of Wilson’S Theorem, Carl Lienert Jul 2023

Lagrange’S Proof Of The Converse Of Wilson’S Theorem, Carl Lienert

Number Theory

No abstract provided.


Lagrange’S Proof Of Wilson’S Theorem—And More!, Carl Lienert Jul 2023

Lagrange’S Proof Of Wilson’S Theorem—And More!, Carl Lienert

Number Theory

No abstract provided.


Lagrange’S Alternate Proof Of Wilson’S Theorem, Carl Lienert Jul 2023

Lagrange’S Alternate Proof Of Wilson’S Theorem, Carl Lienert

Number Theory

No abstract provided.


How To Propagate Interval (And Fuzzy) Uncertainty: Optimism-Pessimism Approach, Vinícius F. Wasques, Olga Kosheleva, Vladik Kreinovich Jul 2023

How To Propagate Interval (And Fuzzy) Uncertainty: Optimism-Pessimism Approach, Vinícius F. Wasques, Olga Kosheleva, Vladik Kreinovich

Departmental Technical Reports (CS)

In many practical situations, inputs to a data processing algorithm are known with interval uncertainty, and we need to propagate this uncertainty through the algorithm, i.e., estimate the uncertainty of the result of data processing. Traditional interval computation techniques provide guaranteed estimates, but from the practical viewpoint, these bounds are too pessimistic: they take into account highly improbable worst-case situations when all the measurement and estimation errors happen to be strongly correlated. In this paper, we show that a natural idea of having more realistic estimates leads to the use of so-called interactive addition of intervals, techniques that has already …


How To Combine Probabilistic And Fuzzy Uncertainty: Theoretical Explanation Of Clustering-Related Empirical Result, Lázló Szilágyi, Olga Kosheleva, Vladik Kreinovich Jul 2023

How To Combine Probabilistic And Fuzzy Uncertainty: Theoretical Explanation Of Clustering-Related Empirical Result, Lázló Szilágyi, Olga Kosheleva, Vladik Kreinovich

Departmental Technical Reports (CS)

In contrast to crisp clustering techniques that assign each object to a class, fuzzy clustering algorithms assign, to each object and to each class, a degree to which this object belongs to this class. In the most widely used fuzzy clustering algorithm -- fuzzy c-means -- for each object, degrees corresponding to different classes add up to 1. From this viewpoint, these degrees act as probabilities. There exist alternative fuzzy-based clustering techniques in which, in line with the general idea of the fuzzy set, the largest of the degrees is equal to 1. In some practical situations, the probability-type fuzzy …


Which Fuzzy Implications Operations Are Polynomial? A Theorem Proves That This Can Be Determined By A Finite Set Of Inequalities, Sebastia Massanet, Olga Kosheleva, Vladik Kreinovich Jul 2023

Which Fuzzy Implications Operations Are Polynomial? A Theorem Proves That This Can Be Determined By A Finite Set Of Inequalities, Sebastia Massanet, Olga Kosheleva, Vladik Kreinovich

Departmental Technical Reports (CS)

To adequately represent human reasoning in a computer-based systems, it is desirable to select fuzzy operations that are as close to human reasoning as possible. In general, every real-valued function can be approximated, with any desired accuracy, by polynomials; it is therefore reasonable to use polynomial fuzzy operations as the appropriate approximations. We thus need to select, among all polynomial operations that satisfy corresponding properties -- like associativity -- the ones that best fit the empirical data. The challenge here is that properties like associativity mean satisfying infinitely many constraints (corresponding to infinitely many possible triples of values), while most …


Methodological Lesson Of Pythagorean Triples, Julio C. Urenda, Olga Kosheleva, Vladik Kreinovich Jul 2023

Methodological Lesson Of Pythagorean Triples, Julio C. Urenda, Olga Kosheleva, Vladik Kreinovich

Departmental Technical Reports (CS)

There are many right triangles in which all three sides a, b, and c have integer lengths. The triples (a,b,c) formed by such lengths are known as Pythagorean triples. Since ancient times, it is known how to generate all Pythagorean triples: we can enumerate primitive Pythagorean triples -- in which the three numbers have no common divisors -- by considering all pairs of natural numbers m>n in which m and n have no common divisors, and taking a =m2 − n2, b = 2mn, and c = m2 + n2. Multiplying all elements of a triple by the same …