Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

PDF

Old Dominion University

Discipline
Keyword
Publication Year
Publication
Publication Type

Articles 31 - 60 of 17843

Full-Text Articles in Entire DC Network

The Vulnerabilities Of Artificial Intelligence Models And Potential Defenses, Felix Iov Apr 2024

The Vulnerabilities Of Artificial Intelligence Models And Potential Defenses, Felix Iov

Cybersecurity Undergraduate Research Showcase

The rapid integration of artificial intelligence (AI) into various commercial products has raised concerns about the security risks posed by adversarial attacks. These attacks manipulate input data to disrupt the functioning of AI models, potentially leading to severe consequences such as self-driving car crashes, financial losses, or data breaches. We will explore neural networks, their weaknesses, and potential defenses. We will discuss adversarial attacks including data poisoning, backdoor attacks, evasion attacks, and prompt injection. Then, we will explore defense strategies such as data protection, input sanitization, and adversarial training. By understanding how adversarial attacks work and the defenses against them, …


Predictive Ai Applications For Sar Cases In The Us Coast Guard, Joshua Nelson Apr 2024

Predictive Ai Applications For Sar Cases In The Us Coast Guard, Joshua Nelson

Cybersecurity Undergraduate Research Showcase

This paper explores the potential integration of predictive analytics AI into the United States Coast Guard's (USCG) Search and Rescue Optimal Planning System (SAROPS) for deep sea and nearshore search and rescue (SAR) operations. It begins by elucidating the concept of predictive analytics AI and its relevance in military applications, particularly in enhancing SAR procedures. The current state of SAROPS and its challenges, including complexity and accuracy issues, are outlined. By integrating predictive analytics AI into SAROPS, the paper argues for streamlined operations, reduced training burdens, and improved accuracy in locating drowning personnel. Drawing on insights from military AI applications …


A Case Study Of The Crashoverride Malware, Its Effects And Possible Countermeasures, Samuel Rector Apr 2024

A Case Study Of The Crashoverride Malware, Its Effects And Possible Countermeasures, Samuel Rector

Cybersecurity Undergraduate Research Showcase

CRASHOVERRIDE is a modular malware tailor-made for electric grid Industrial Control System (ICS) equipment and was deployed by a group named ELECTRUM in a Ukrainian substation. The malware would launch a protocol exploit to flip breakers and would then wipe the system of ICS files. Finally, it would execute a Denial Of Service (DOS) attack on protective relays. In effect, months of damage and thousands out of power. However, due to oversights the malware only caused a brief power outage. Though the implications of the malware are cause for researching and implementing countermeasures against others to come. The CISA recommends …


High-Resolution And Quality Settings With Latent Consistency Models, Steven Chen, Junrui Zhang, Rui Ning Apr 2024

High-Resolution And Quality Settings With Latent Consistency Models, Steven Chen, Junrui Zhang, Rui Ning

Cybersecurity Undergraduate Research Showcase

Diffusion Models have become powerful generative models which is capable of synthesizing high-quality images across various domains. This paper explores Stable Diffusion and mostly focuses on Latent Diffusion Models. Latent Consistency Models can enhance the inference with minimal iterations. It demonstrates the performance in image in-painting and class-conditional synthesis tasks. Throughout the experiment different datasets and parameter configurations, the paper highlights the image quality, processing time, and parameter. It also discussed the future directions including adding trigger-based implementation and emotional-based themes to replace the prompt.


The Ethical And Legal Implications Of Iot Data In Business Organizations, Kennedy Bellamy Apr 2024

The Ethical And Legal Implications Of Iot Data In Business Organizations, Kennedy Bellamy

Cybersecurity Undergraduate Research Showcase

The Internet of Things (IoT) has transformed how our day to day lives by implementing and evolving technology that allows data to be exchanged between interconnected devices without the need for human involvement. This paper investigates the implications of IoT expansion and development in corporate organizations, focusing on both the opportunities and challenges it brings. IoT encompasses a wide range of data kinds, from sensor readings to user interactions, across industries such as manufacturing, healthcare, and retail. However, greater connection raises ethical and legal challenges, especially over data privacy, ownership, and control. Potential breaches of privacy and illegal data access …


Data Profits Vs. Privacy Rights: Ethical Concerns In Data Commerce, Amiah Armstrong Apr 2024

Data Profits Vs. Privacy Rights: Ethical Concerns In Data Commerce, Amiah Armstrong

Cybersecurity Undergraduate Research Showcase

In today’s digital age, the collection and sale of customer data for advertising is gaining a growing number of ethical concerns. The act of amassing extensive datasets encompassing customer preferences, behaviors, and personal information raises questions of its true purpose. It is widely acknowledged that companies track and store their customer’s digital activities under the pretext of benefiting the customer, but at what cost? Are users aware of how much of their data is being collected? Do they understand the trade-off between personalized services and the potential invasion of their privacy? This paper aims to show the advantages and disadvantages …


What Students Have To Say On Data Privacy For Educational Technology, Stephanie Choi Apr 2024

What Students Have To Say On Data Privacy For Educational Technology, Stephanie Choi

Cybersecurity Undergraduate Research Showcase

The literature on data privacy in terms of educational technology is a growing area of study. The perspective of educators has been captured extensively. However, the literature on students’ perspectives is missing, which is what we explore in this paper. We use a pragmatic qualitative approach with an experiential lens to capture students’ attitudes towards data privacy in terms of educational technology. We identified preliminary, common themes that appeared in the survey responses. The paper concludes by calling for more research on how students perceive data privacy in terms of educational technology.


Investigating Vulnerabilities In The Bluetooth Host Layer In Linux, Jack Dibari Apr 2024

Investigating Vulnerabilities In The Bluetooth Host Layer In Linux, Jack Dibari

Cybersecurity Undergraduate Research Showcase

This paper investigates vulnerabilities within the Bluetooth host layer in Linux systems. It examines the Bluetooth protocol's evolution, focusing on its implementation in Linux, particularly through the BlueZ host software. Various vulnerabilities, including BleedingTooth, BLESA, and SweynTooth, are analyzed.


The Security Of Deep Neural Networks, Jalaya Allen Apr 2024

The Security Of Deep Neural Networks, Jalaya Allen

Cybersecurity Undergraduate Research Showcase

Our society has transitioned from our primitive lifestyle to soon, an increasingly automatic one. That idea is further exemplified as we shift into an AI era, better known as Artificial intelligence. Artificial Intelligence is classified as computer systems that can perform tasks that typically require human intelligence. However, a common thought or question that most might have is, how is this done? How does AI process information the way we want it to and have access to so much information? AI is trained by systems called AI models. These modeling programs are trained on data to recognize patterns or make …


Profiling Cybercriminals: Behavioral Analysis And Motivations Behind Cybercrime Activities, A'Shya Latrice Reynolds Apr 2024

Profiling Cybercriminals: Behavioral Analysis And Motivations Behind Cybercrime Activities, A'Shya Latrice Reynolds

Cybersecurity Undergraduate Research Showcase

The study of cybercriminal behavior and motivations is crucial for understanding and combating the evolving landscape of digital crime. This paper delves into the intricate realm of cybercrime profiling, employing a multidisciplinary approach to dissect the behavioral patterns and underlying motivations of cybercriminals. Drawing from psychology, sociology, and criminology, the research examines the intricate interplay of individual traits, social dynamics, and technological factors that shape cybercriminal activities.

Through analysis of case studies and research, this paper uncovers the diverse range of motivations driving individuals towards engaging in cybercrime. From financial gain and ideological extremism to thrill-seeking and revenge, cybercriminals exhibit …


Analyzing The Role Of Cybersecurity In Correctional Facilities, Jaysia I. Leeheung Apr 2024

Analyzing The Role Of Cybersecurity In Correctional Facilities, Jaysia I. Leeheung

Cybersecurity Undergraduate Research Showcase

In recent years, the use of technology has evolved in correctional facilities which may result in more vulnerabilities in correctional facilities systems. This study analyzes the types of security measures used in correctional facilities to stop cyber attacks such as firewalls, artificial intelligence, and facial recognition systems. The analysis also examines new challenges correctional facilities may face in cyber security and prevention strategies that will enhance cyber protection in correctional facilities. Additionally, this analysis compares the implementation of cyber security methods between jails and prisons.


Remarks For The 100th Anniversary Of The Virginia Academy Of Science, Timothy M. Kaine Apr 2024

Remarks For The 100th Anniversary Of The Virginia Academy Of Science, Timothy M. Kaine

Virginia Journal of Science

Recorded video and transcript of remarks by Virginia Senator and Former Governor, Timothy M. Kaine. Video recorded on May 9, 2023 in mp4 format and sent to VAS.


Some Notable Women Botanists In The Vas: Their Roles In Supporting The Development Of The Modern Flora Of Virginia, Marion B. Lobstein Apr 2024

Some Notable Women Botanists In The Vas: Their Roles In Supporting The Development Of The Modern Flora Of Virginia, Marion B. Lobstein

Virginia Journal of Science

With the publishing of the 2012 Flora of Virginia by the Foundation of the Flora of Virginia Project, the dream of modern flora for Virginia was realized. This was a goal of the Virginia Flora Committee of the Virginia Academy of Science as well as other groups such as the Virginia Botanical Associates and the Virginia Native Plant Society. The Flora of Virginia and the 2017 Flora of Virginia App were realized with the work, support, and encouragement of many individuals and organizations. This paper focuses on the lives, contributions, and work of six women botanists in the Academy who …


Chapter 09: Web Conferencing Best Practices For Online K-12 Teachers, Mitch A. Cumings Apr 2024

Chapter 09: Web Conferencing Best Practices For Online K-12 Teachers, Mitch A. Cumings

Instructional Message Design, Volume 3

Web conferencing - the ability to hold live meetings from a distance through an online platform - has become an integral instructional tool to make learning more accessible and flexible. Although these technologies have been accessible for decades and utilized in both professional and institutional settings with degrees of regularity, they only arrived at a large scale onto the K-12 primary and secondary education scene out of necessity as prompted by the COVID pandemic. K-12 education systems had a crash course in web conferencing through the pandemic, and its value as a meaningful instructional tool persists.


Chapter 04: Cultural Sensitivity, Inclusion, And Social Presence In Instructional Message Design, Cheryl Cook-Posley Apr 2024

Chapter 04: Cultural Sensitivity, Inclusion, And Social Presence In Instructional Message Design, Cheryl Cook-Posley

Instructional Message Design, Volume 3

It is critical for Instructional Designers (IDs) and Human Performance Technologists (HPTs) to consider the backgrounds of the learner to help them plan, develop, and design relevant and appropriate content for the audience of focus. The interests, assets, and needs of the learner must be researched and studied so the designer is able to fully know, empathize, understand, and design. Applying an audience centric approach equips designers to design culturally inclusive and sensitive instructional messages, as well as content that aligns with, are responsive to, and are respectful of diverse groups. In this way, IDs and HPTs can be able …


Chapter 07: What Can Instructional Designers Learn From Graphic Designers?, Mark Richard Parsons Apr 2024

Chapter 07: What Can Instructional Designers Learn From Graphic Designers?, Mark Richard Parsons

Instructional Message Design, Volume 3

Instructional message design uses learning theories to effectively communicate information using technology. The instructional designer identifies the main objectives and skills to be learned to devise and deliver a strategy for the learner. The graphic designer plays a role by helping guide the learner through the material without distraction. Graphic design plays a vital role with visual learners. Using instructional and graphic design principles is important for effective instructional message design. This chapter looks at the importance of graphic design in the instructional design process. It will explore what skills and strategies instructional designers can utilize from a graphic design …


Chapter 08: Add Depth To Your Message - The Use Of 3d Printing In Instructional Message Design, Jennifer Tolley Apr 2024

Chapter 08: Add Depth To Your Message - The Use Of 3d Printing In Instructional Message Design, Jennifer Tolley

Instructional Message Design, Volume 3

3D printing is an emerging technology used for the creation of physical objects. While it does not seem like a tool for instructional message design, 3D printing facilitates the development of many skills, such as creativity, critical thinking, and problem solving, as well as the development of content knowledge. It allows students to design and create real objects, or for teachers to show recreations of items from history. Tools, such as math manipulatives, can be designed and printed to help students learn abstract concepts. This chapter aims to provide a conceptual framework for 3D printing integration into instructional message design, …


Chapter 05: Message Design: How To Communicate Visual Information To Learners Who Are Visually Impaired, Meaghan Mcleod Apr 2024

Chapter 05: Message Design: How To Communicate Visual Information To Learners Who Are Visually Impaired, Meaghan Mcleod

Instructional Message Design, Volume 3

Message design consists of signs and symbols that play a crucial role in guiding our daily lives. text, images, videos, graphics, and diagrams are essential tools for communication and education. However, individuals with visual impairments are not able to fully access this visual content that plays such a critical part of our daily lives. Therefore, there is a need to create educational material that can be accessed by all learners including those with visual impairments. This chapter explores practical strategies that instructional designers, teachers, professors, and instructors can use to provide an inclusive learning experience for learners with visual impairments. …


Chapter 03: Message Design For Instructional Designers – Audio And Video Best Practices, Shelby Taylor Apr 2024

Chapter 03: Message Design For Instructional Designers – Audio And Video Best Practices, Shelby Taylor

Instructional Message Design, Volume 3

Instructional message design is the way that information is delivered to users or the learners. Learners have short-term and long-term memory. Cognitive load theory and multimedia learning theory are two theories that can be applied to best practices in audio and video. Audio and video can range from speeches, podcasts, DVDs, and streaming videos. Both can enhance learning but should not drive the instruction. Segmenting video and audio is one of the many best practices as it allows learners to chunk the information and process it in small bits. There are learners who have auditory and visual deficits and instructional …


Chapter 01: Message Design For Instructional Designers - An Introduction, Miguel Ramlatchan Apr 2024

Chapter 01: Message Design For Instructional Designers - An Introduction, Miguel Ramlatchan

Instructional Message Design, Volume 3

Instructional message design is the use of learning theories to effectively communicate information using technology. Design is guided by theories including gestalt, cognitive load, multimedia learning, media selection, media attributes, and general communication systems. Our communication designs can be based on a wide variety of technologies or a combination of technologies. Technology in the form of tools and techniques includes, among others, the study and the use of typography, color, illustrations, photographs, modeled graphics, augmented reality, animation, video, video games, simulations, and virtual reality. This introduction serves as a brief overview of these theories, tools, and techniques, while subsequent chapters …


Physical Educators’ Self-Efficacy To Teach Students With Disabilities Across Instructional Placements, Lindsey Ann Nowland Apr 2024

Physical Educators’ Self-Efficacy To Teach Students With Disabilities Across Instructional Placements, Lindsey Ann Nowland

Human Movement Studies & Special Education Theses & Dissertations

Although there are several well used self-efficacy instruments designed to measure PE teachers’ self-efficacy to teach students with disabilities, limitations to these scales exits, such as a narrow focus on integrated instructional placements and an absence of theoretically relevant sources of self-efficacy information built within the scales. These limitations translate to a significant gap in the literature between measuring PE teachers’ self-efficacy and understanding how sources of self-efficacy information interact to shape PE teachers’ self-efficacy beliefs, as well as understanding how different instructional placements may inform efficacy. This dissertation was structured in a two-manuscript approach. The purpose of the first …


Co-Constructing Physical Education Resources And Recommendations With Blind Adults, M. Ally Keene Apr 2024

Co-Constructing Physical Education Resources And Recommendations With Blind Adults, M. Ally Keene

Human Movement Studies & Special Education Theses & Dissertations

Blind youth have reported unfavorable PE experiences, however, are optimistic that positive changes could be made. Despite recommendations to involve students in learning decisions, those made for teaching blind youth in PE have largely been constructed from nondisabled adults. This dissertation used a participatory research method and positioned blind people as research partners, amplifying their voices as knowers, collaborators, and researchers, to help construct resources and recommendations to disseminate to PE teachers. With that, the overall aim of this dissertation was to construct a product that provides PE teachers with useful and relevant resources and recommendations, in an attempt to …


The Volleyball Attack: Training, Kinematics, And The Role Of The Torso, Kiara Baeleah Barrett Apr 2024

The Volleyball Attack: Training, Kinematics, And The Role Of The Torso, Kiara Baeleah Barrett

Human Movement Studies & Special Education Theses & Dissertations

Volleyball is an explosive, dynamic sport popular around the globe. The volleyball attack is the predominant point-scoring avenue and the point of interest for many coaches and players. As this motion is repeated many times throughout the course of a match, it is linked to overuse injuries at the shoulder. The purpose of this dissertation is to investigate methodological approaches for research in this movement as well as establishing mechanisms for improving performance and the health of the volleyball players’ shoulder.

For the first study, a systematic review of published literature was performed to ascertain training protocols beneficial to volleyball …


College Of Health Sciences Newsletter, College Of Health Sciences, Old Dominion University Apr 2024

College Of Health Sciences Newsletter, College Of Health Sciences, Old Dominion University

College of Health Sciences Newsletters

April 2024 issue of Old Dominion University's College of Health Sciences Newsletter.


“What Line Can’T Be Measured With A Ruler?” Riddles And Concept-Formation In Mathematics And Aesthetics, William H. Brenner, Samuel J. Wheeler Apr 2024

“What Line Can’T Be Measured With A Ruler?” Riddles And Concept-Formation In Mathematics And Aesthetics, William H. Brenner, Samuel J. Wheeler

Philosophy Faculty Publications

We analyze two problems in mathematics – the first (stated in our title) is extracted from Wittgenstein’s “Philosophy for Mathematicians”; the second (“What set of numbers is non-denumerable?”) is taken from Cantor. We then consider, by way of comparison, a problem in musical aesthetics concerning a Brahms variation on a theme by Haydn. Our aim is twofold: first, to bring out and elucidate the essentially riddle-like character of these problems; second, to show that the comparison with riddles does not reduce their solution to an exercise in bare subjectivity


Gay Cultural Studies Newsletter: Spring 2024, Women's And Gender Studies, Old Dominion University Apr 2024

Gay Cultural Studies Newsletter: Spring 2024, Women's And Gender Studies, Old Dominion University

Gay Cultural Studies Newsletter

Spring 2024 issue of the Gay Cultural Studies Newsletter, produced by students in the Department of Women's and Gender Studies. Delivered via email and reformatted as PDF.


Coming Home Again: Television Sitcom Revivals, Brandon K. Hedgepeth Apr 2024

Coming Home Again: Television Sitcom Revivals, Brandon K. Hedgepeth

Communication & Theatre Arts Theses

This thesis argues that the success of television situational comedy revivals correlates with television’s technological affordances as they have evolved over the past half-century. Specifically, three revival series are examined within this study, consisting of The New Leave it to Beaver (1983-1989), Fuller House (2016-2020), and The Conners (2018-Present). This paper uses the revival case studies to showcase their parallel relationship with the introduction of cable television and streaming media, alongside the resurgence of broadcast television to highlight the changing media landscape and the intertwined nature between technological advancement and the revival form. The study’s investigation of how nostalgia intersects …


More Than Representation Heartstopper: A Multimodal Critical Discourse Analysis, Tracyann Josephine Harmer Apr 2024

More Than Representation Heartstopper: A Multimodal Critical Discourse Analysis, Tracyann Josephine Harmer

Communication & Theatre Arts Theses

This thesis is a multimodal critical discourse analysis of Netflix’s Heartstopper, written with the goal of understanding its methods of representation and queer world creation. Through analysis of the ideology of heteronormativity as it relates to masculinity, internalized homophobia, homophobia, and mental health, I expand upon the significance of queer representation for queer audiences, heterosexual audiences, and producers of queer media. Through a nuanced analysis of these themes, I display how and why Heartstopper has had enormous success and expand upon the cultural phenomena surrounding this media. Finally, this thesis places these nuanced analyses into the real-world reaction to …


The Place Of Nuclear Weapons In Russian Identity: An Ontological Security Analysis, Peter Ernest Yeager Apr 2024

The Place Of Nuclear Weapons In Russian Identity: An Ontological Security Analysis, Peter Ernest Yeager

Graduate Program in International Studies Theses & Dissertations

On May 9, 2008, Russia’s Victory Day, four 14-wheeled MAZ-7917s drove through Red Square carrying Topol intercontinental ballistic missiles. This was the first time nuclear weapons had been paraded through Moscow since before the end of the Cold War. The previous August, Russia had resumed nuclear-capable bomber patrols, and in January, 2007, President Putin acknowledged Russia had begun to build new nuclear weapons. These remarkable events were met with little acknowledgement in the West, as if they were completely normal. Instead, they represented a major evolution in the bilateral relationship between the United States and Russia. Sixteen years of fitful …


Monarch Science Observer, Volume 18, College Of Sciences, Old Dominion University Apr 2024

Monarch Science Observer, Volume 18, College Of Sciences, Old Dominion University

College of Sciences Newsletter

Spring 2024, issue of Monarch Science Observer, ODU Colleges of Sciences Newsletter.