Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Physical Sciences and Mathematics (5902)
- Social and Behavioral Sciences (4170)
- Engineering (3566)
- Education (2970)
- Life Sciences (2813)
-
- Medicine and Health Sciences (2348)
- Arts and Humanities (2188)
- Oceanography and Atmospheric Sciences and Meteorology (1762)
- Physics (1574)
- Computer Sciences (1434)
- Electrical and Computer Engineering (1128)
- Oceanography (1019)
- Psychology (1013)
- Business (986)
- Public Affairs, Public Policy and Public Administration (903)
- Higher Education (680)
- Sociology (655)
- Ecology and Evolutionary Biology (631)
- Marine Biology (619)
- Economics (569)
- Chemistry (557)
- Music (556)
- Earth Sciences (552)
- Biochemistry, Biophysics, and Structural Biology (537)
- Music Performance (532)
- Computer Engineering (513)
- Environmental Sciences (511)
- Mechanical Engineering (508)
- Public Health (508)
- Medical Specialties (486)
- Keyword
-
- Virginia (310)
- Climate change (186)
- United States (179)
- Hampton Roads (153)
- Sea level rise (152)
-
- Chesapeake Bay (135)
- Phytoplankton (134)
- Machine learning (119)
- COVID-19 (110)
- Education (110)
- Simulation (110)
- Community college (100)
- Physics (99)
- Students (96)
- Electroporation (95)
- Humans (94)
- College students (90)
- Model (81)
- Higher education (79)
- Engineering education (76)
- Cavity (75)
- Deep learning (75)
- Resilience (70)
- Women (70)
- Surveys (69)
- Training (69)
- China (66)
- Flooding (66)
- Collaboration (65)
- Quantum chromodynamics (65)
- Publication Year
- Publication
-
- Physics Faculty Publications (869)
- OTS Master's Level Projects & Papers (598)
- Biological Sciences Faculty Publications (582)
- Electrical & Computer Engineering Theses & Dissertations (582)
- OES Faculty Publications (505)
-
- Electrical & Computer Engineering Faculty Publications (463)
- Virginia Journal of Science (461)
- Psychology Theses & Dissertations (434)
- Biological Sciences Theses & Dissertations (396)
- OES Theses and Dissertations (390)
- Mechanical & Aerospace Engineering Theses & Dissertations (382)
- CCPO Publications (375)
- Bioelectrics Publications (361)
- STEMPS Faculty Publications (333)
- Educational Leadership & Workforce Development Theses & Dissertations (318)
- Computer Science Faculty Publications (308)
- Chemistry & Biochemistry Faculty Publications (297)
- History Theses & Dissertations (279)
- Mathematics & Statistics Faculty Publications (257)
- Student Recitals (257)
- Engineering Technology Faculty Publications (235)
- Engineering Management & Systems Engineering Theses & Dissertations (230)
- Graduate Program in International Studies Theses & Dissertations (230)
- Teaching & Learning Faculty Publications (224)
- Chemistry & Biochemistry Theses & Dissertations (217)
- State of the Region Reports: Hampton Roads (207)
- Engineering Management & Systems Engineering Faculty Publications (205)
- Sociology & Criminal Justice Theses & Dissertations (204)
- English Faculty Publications (203)
- Ensemble Performances (199)
Articles 31 - 60 of 17843
Full-Text Articles in Entire DC Network
The Vulnerabilities Of Artificial Intelligence Models And Potential Defenses, Felix Iov
The Vulnerabilities Of Artificial Intelligence Models And Potential Defenses, Felix Iov
Cybersecurity Undergraduate Research Showcase
The rapid integration of artificial intelligence (AI) into various commercial products has raised concerns about the security risks posed by adversarial attacks. These attacks manipulate input data to disrupt the functioning of AI models, potentially leading to severe consequences such as self-driving car crashes, financial losses, or data breaches. We will explore neural networks, their weaknesses, and potential defenses. We will discuss adversarial attacks including data poisoning, backdoor attacks, evasion attacks, and prompt injection. Then, we will explore defense strategies such as data protection, input sanitization, and adversarial training. By understanding how adversarial attacks work and the defenses against them, …
Predictive Ai Applications For Sar Cases In The Us Coast Guard, Joshua Nelson
Predictive Ai Applications For Sar Cases In The Us Coast Guard, Joshua Nelson
Cybersecurity Undergraduate Research Showcase
This paper explores the potential integration of predictive analytics AI into the United States Coast Guard's (USCG) Search and Rescue Optimal Planning System (SAROPS) for deep sea and nearshore search and rescue (SAR) operations. It begins by elucidating the concept of predictive analytics AI and its relevance in military applications, particularly in enhancing SAR procedures. The current state of SAROPS and its challenges, including complexity and accuracy issues, are outlined. By integrating predictive analytics AI into SAROPS, the paper argues for streamlined operations, reduced training burdens, and improved accuracy in locating drowning personnel. Drawing on insights from military AI applications …
A Case Study Of The Crashoverride Malware, Its Effects And Possible Countermeasures, Samuel Rector
A Case Study Of The Crashoverride Malware, Its Effects And Possible Countermeasures, Samuel Rector
Cybersecurity Undergraduate Research Showcase
CRASHOVERRIDE is a modular malware tailor-made for electric grid Industrial Control System (ICS) equipment and was deployed by a group named ELECTRUM in a Ukrainian substation. The malware would launch a protocol exploit to flip breakers and would then wipe the system of ICS files. Finally, it would execute a Denial Of Service (DOS) attack on protective relays. In effect, months of damage and thousands out of power. However, due to oversights the malware only caused a brief power outage. Though the implications of the malware are cause for researching and implementing countermeasures against others to come. The CISA recommends …
High-Resolution And Quality Settings With Latent Consistency Models, Steven Chen, Junrui Zhang, Rui Ning
High-Resolution And Quality Settings With Latent Consistency Models, Steven Chen, Junrui Zhang, Rui Ning
Cybersecurity Undergraduate Research Showcase
Diffusion Models have become powerful generative models which is capable of synthesizing high-quality images across various domains. This paper explores Stable Diffusion and mostly focuses on Latent Diffusion Models. Latent Consistency Models can enhance the inference with minimal iterations. It demonstrates the performance in image in-painting and class-conditional synthesis tasks. Throughout the experiment different datasets and parameter configurations, the paper highlights the image quality, processing time, and parameter. It also discussed the future directions including adding trigger-based implementation and emotional-based themes to replace the prompt.
The Ethical And Legal Implications Of Iot Data In Business Organizations, Kennedy Bellamy
The Ethical And Legal Implications Of Iot Data In Business Organizations, Kennedy Bellamy
Cybersecurity Undergraduate Research Showcase
The Internet of Things (IoT) has transformed how our day to day lives by implementing and evolving technology that allows data to be exchanged between interconnected devices without the need for human involvement. This paper investigates the implications of IoT expansion and development in corporate organizations, focusing on both the opportunities and challenges it brings. IoT encompasses a wide range of data kinds, from sensor readings to user interactions, across industries such as manufacturing, healthcare, and retail. However, greater connection raises ethical and legal challenges, especially over data privacy, ownership, and control. Potential breaches of privacy and illegal data access …
Data Profits Vs. Privacy Rights: Ethical Concerns In Data Commerce, Amiah Armstrong
Data Profits Vs. Privacy Rights: Ethical Concerns In Data Commerce, Amiah Armstrong
Cybersecurity Undergraduate Research Showcase
In today’s digital age, the collection and sale of customer data for advertising is gaining a growing number of ethical concerns. The act of amassing extensive datasets encompassing customer preferences, behaviors, and personal information raises questions of its true purpose. It is widely acknowledged that companies track and store their customer’s digital activities under the pretext of benefiting the customer, but at what cost? Are users aware of how much of their data is being collected? Do they understand the trade-off between personalized services and the potential invasion of their privacy? This paper aims to show the advantages and disadvantages …
What Students Have To Say On Data Privacy For Educational Technology, Stephanie Choi
What Students Have To Say On Data Privacy For Educational Technology, Stephanie Choi
Cybersecurity Undergraduate Research Showcase
The literature on data privacy in terms of educational technology is a growing area of study. The perspective of educators has been captured extensively. However, the literature on students’ perspectives is missing, which is what we explore in this paper. We use a pragmatic qualitative approach with an experiential lens to capture students’ attitudes towards data privacy in terms of educational technology. We identified preliminary, common themes that appeared in the survey responses. The paper concludes by calling for more research on how students perceive data privacy in terms of educational technology.
Investigating Vulnerabilities In The Bluetooth Host Layer In Linux, Jack Dibari
Investigating Vulnerabilities In The Bluetooth Host Layer In Linux, Jack Dibari
Cybersecurity Undergraduate Research Showcase
This paper investigates vulnerabilities within the Bluetooth host layer in Linux systems. It examines the Bluetooth protocol's evolution, focusing on its implementation in Linux, particularly through the BlueZ host software. Various vulnerabilities, including BleedingTooth, BLESA, and SweynTooth, are analyzed.
The Security Of Deep Neural Networks, Jalaya Allen
The Security Of Deep Neural Networks, Jalaya Allen
Cybersecurity Undergraduate Research Showcase
Our society has transitioned from our primitive lifestyle to soon, an increasingly automatic one. That idea is further exemplified as we shift into an AI era, better known as Artificial intelligence. Artificial Intelligence is classified as computer systems that can perform tasks that typically require human intelligence. However, a common thought or question that most might have is, how is this done? How does AI process information the way we want it to and have access to so much information? AI is trained by systems called AI models. These modeling programs are trained on data to recognize patterns or make …
Profiling Cybercriminals: Behavioral Analysis And Motivations Behind Cybercrime Activities, A'Shya Latrice Reynolds
Profiling Cybercriminals: Behavioral Analysis And Motivations Behind Cybercrime Activities, A'Shya Latrice Reynolds
Cybersecurity Undergraduate Research Showcase
The study of cybercriminal behavior and motivations is crucial for understanding and combating the evolving landscape of digital crime. This paper delves into the intricate realm of cybercrime profiling, employing a multidisciplinary approach to dissect the behavioral patterns and underlying motivations of cybercriminals. Drawing from psychology, sociology, and criminology, the research examines the intricate interplay of individual traits, social dynamics, and technological factors that shape cybercriminal activities.
Through analysis of case studies and research, this paper uncovers the diverse range of motivations driving individuals towards engaging in cybercrime. From financial gain and ideological extremism to thrill-seeking and revenge, cybercriminals exhibit …
Analyzing The Role Of Cybersecurity In Correctional Facilities, Jaysia I. Leeheung
Analyzing The Role Of Cybersecurity In Correctional Facilities, Jaysia I. Leeheung
Cybersecurity Undergraduate Research Showcase
In recent years, the use of technology has evolved in correctional facilities which may result in more vulnerabilities in correctional facilities systems. This study analyzes the types of security measures used in correctional facilities to stop cyber attacks such as firewalls, artificial intelligence, and facial recognition systems. The analysis also examines new challenges correctional facilities may face in cyber security and prevention strategies that will enhance cyber protection in correctional facilities. Additionally, this analysis compares the implementation of cyber security methods between jails and prisons.
Remarks For The 100th Anniversary Of The Virginia Academy Of Science, Timothy M. Kaine
Remarks For The 100th Anniversary Of The Virginia Academy Of Science, Timothy M. Kaine
Virginia Journal of Science
Recorded video and transcript of remarks by Virginia Senator and Former Governor, Timothy M. Kaine. Video recorded on May 9, 2023 in mp4 format and sent to VAS.
Some Notable Women Botanists In The Vas: Their Roles In Supporting The Development Of The Modern Flora Of Virginia, Marion B. Lobstein
Some Notable Women Botanists In The Vas: Their Roles In Supporting The Development Of The Modern Flora Of Virginia, Marion B. Lobstein
Virginia Journal of Science
With the publishing of the 2012 Flora of Virginia by the Foundation of the Flora of Virginia Project, the dream of modern flora for Virginia was realized. This was a goal of the Virginia Flora Committee of the Virginia Academy of Science as well as other groups such as the Virginia Botanical Associates and the Virginia Native Plant Society. The Flora of Virginia and the 2017 Flora of Virginia App were realized with the work, support, and encouragement of many individuals and organizations. This paper focuses on the lives, contributions, and work of six women botanists in the Academy who …
Chapter 09: Web Conferencing Best Practices For Online K-12 Teachers, Mitch A. Cumings
Chapter 09: Web Conferencing Best Practices For Online K-12 Teachers, Mitch A. Cumings
Instructional Message Design, Volume 3
Web conferencing - the ability to hold live meetings from a distance through an online platform - has become an integral instructional tool to make learning more accessible and flexible. Although these technologies have been accessible for decades and utilized in both professional and institutional settings with degrees of regularity, they only arrived at a large scale onto the K-12 primary and secondary education scene out of necessity as prompted by the COVID pandemic. K-12 education systems had a crash course in web conferencing through the pandemic, and its value as a meaningful instructional tool persists.
Chapter 04: Cultural Sensitivity, Inclusion, And Social Presence In Instructional Message Design, Cheryl Cook-Posley
Chapter 04: Cultural Sensitivity, Inclusion, And Social Presence In Instructional Message Design, Cheryl Cook-Posley
Instructional Message Design, Volume 3
It is critical for Instructional Designers (IDs) and Human Performance Technologists (HPTs) to consider the backgrounds of the learner to help them plan, develop, and design relevant and appropriate content for the audience of focus. The interests, assets, and needs of the learner must be researched and studied so the designer is able to fully know, empathize, understand, and design. Applying an audience centric approach equips designers to design culturally inclusive and sensitive instructional messages, as well as content that aligns with, are responsive to, and are respectful of diverse groups. In this way, IDs and HPTs can be able …
Chapter 07: What Can Instructional Designers Learn From Graphic Designers?, Mark Richard Parsons
Chapter 07: What Can Instructional Designers Learn From Graphic Designers?, Mark Richard Parsons
Instructional Message Design, Volume 3
Instructional message design uses learning theories to effectively communicate information using technology. The instructional designer identifies the main objectives and skills to be learned to devise and deliver a strategy for the learner. The graphic designer plays a role by helping guide the learner through the material without distraction. Graphic design plays a vital role with visual learners. Using instructional and graphic design principles is important for effective instructional message design. This chapter looks at the importance of graphic design in the instructional design process. It will explore what skills and strategies instructional designers can utilize from a graphic design …
Chapter 08: Add Depth To Your Message - The Use Of 3d Printing In Instructional Message Design, Jennifer Tolley
Chapter 08: Add Depth To Your Message - The Use Of 3d Printing In Instructional Message Design, Jennifer Tolley
Instructional Message Design, Volume 3
3D printing is an emerging technology used for the creation of physical objects. While it does not seem like a tool for instructional message design, 3D printing facilitates the development of many skills, such as creativity, critical thinking, and problem solving, as well as the development of content knowledge. It allows students to design and create real objects, or for teachers to show recreations of items from history. Tools, such as math manipulatives, can be designed and printed to help students learn abstract concepts. This chapter aims to provide a conceptual framework for 3D printing integration into instructional message design, …
Chapter 05: Message Design: How To Communicate Visual Information To Learners Who Are Visually Impaired, Meaghan Mcleod
Chapter 05: Message Design: How To Communicate Visual Information To Learners Who Are Visually Impaired, Meaghan Mcleod
Instructional Message Design, Volume 3
Message design consists of signs and symbols that play a crucial role in guiding our daily lives. text, images, videos, graphics, and diagrams are essential tools for communication and education. However, individuals with visual impairments are not able to fully access this visual content that plays such a critical part of our daily lives. Therefore, there is a need to create educational material that can be accessed by all learners including those with visual impairments. This chapter explores practical strategies that instructional designers, teachers, professors, and instructors can use to provide an inclusive learning experience for learners with visual impairments. …
Chapter 03: Message Design For Instructional Designers – Audio And Video Best Practices, Shelby Taylor
Chapter 03: Message Design For Instructional Designers – Audio And Video Best Practices, Shelby Taylor
Instructional Message Design, Volume 3
Instructional message design is the way that information is delivered to users or the learners. Learners have short-term and long-term memory. Cognitive load theory and multimedia learning theory are two theories that can be applied to best practices in audio and video. Audio and video can range from speeches, podcasts, DVDs, and streaming videos. Both can enhance learning but should not drive the instruction. Segmenting video and audio is one of the many best practices as it allows learners to chunk the information and process it in small bits. There are learners who have auditory and visual deficits and instructional …
Chapter 01: Message Design For Instructional Designers - An Introduction, Miguel Ramlatchan
Chapter 01: Message Design For Instructional Designers - An Introduction, Miguel Ramlatchan
Instructional Message Design, Volume 3
Instructional message design is the use of learning theories to effectively communicate information using technology. Design is guided by theories including gestalt, cognitive load, multimedia learning, media selection, media attributes, and general communication systems. Our communication designs can be based on a wide variety of technologies or a combination of technologies. Technology in the form of tools and techniques includes, among others, the study and the use of typography, color, illustrations, photographs, modeled graphics, augmented reality, animation, video, video games, simulations, and virtual reality. This introduction serves as a brief overview of these theories, tools, and techniques, while subsequent chapters …
Physical Educators’ Self-Efficacy To Teach Students With Disabilities Across Instructional Placements, Lindsey Ann Nowland
Physical Educators’ Self-Efficacy To Teach Students With Disabilities Across Instructional Placements, Lindsey Ann Nowland
Human Movement Studies & Special Education Theses & Dissertations
Although there are several well used self-efficacy instruments designed to measure PE teachers’ self-efficacy to teach students with disabilities, limitations to these scales exits, such as a narrow focus on integrated instructional placements and an absence of theoretically relevant sources of self-efficacy information built within the scales. These limitations translate to a significant gap in the literature between measuring PE teachers’ self-efficacy and understanding how sources of self-efficacy information interact to shape PE teachers’ self-efficacy beliefs, as well as understanding how different instructional placements may inform efficacy. This dissertation was structured in a two-manuscript approach. The purpose of the first …
Co-Constructing Physical Education Resources And Recommendations With Blind Adults, M. Ally Keene
Co-Constructing Physical Education Resources And Recommendations With Blind Adults, M. Ally Keene
Human Movement Studies & Special Education Theses & Dissertations
Blind youth have reported unfavorable PE experiences, however, are optimistic that positive changes could be made. Despite recommendations to involve students in learning decisions, those made for teaching blind youth in PE have largely been constructed from nondisabled adults. This dissertation used a participatory research method and positioned blind people as research partners, amplifying their voices as knowers, collaborators, and researchers, to help construct resources and recommendations to disseminate to PE teachers. With that, the overall aim of this dissertation was to construct a product that provides PE teachers with useful and relevant resources and recommendations, in an attempt to …
The Volleyball Attack: Training, Kinematics, And The Role Of The Torso, Kiara Baeleah Barrett
The Volleyball Attack: Training, Kinematics, And The Role Of The Torso, Kiara Baeleah Barrett
Human Movement Studies & Special Education Theses & Dissertations
Volleyball is an explosive, dynamic sport popular around the globe. The volleyball attack is the predominant point-scoring avenue and the point of interest for many coaches and players. As this motion is repeated many times throughout the course of a match, it is linked to overuse injuries at the shoulder. The purpose of this dissertation is to investigate methodological approaches for research in this movement as well as establishing mechanisms for improving performance and the health of the volleyball players’ shoulder.
For the first study, a systematic review of published literature was performed to ascertain training protocols beneficial to volleyball …
College Of Health Sciences Newsletter, College Of Health Sciences, Old Dominion University
College Of Health Sciences Newsletter, College Of Health Sciences, Old Dominion University
College of Health Sciences Newsletters
April 2024 issue of Old Dominion University's College of Health Sciences Newsletter.
“What Line Can’T Be Measured With A Ruler?” Riddles And Concept-Formation In Mathematics And Aesthetics, William H. Brenner, Samuel J. Wheeler
“What Line Can’T Be Measured With A Ruler?” Riddles And Concept-Formation In Mathematics And Aesthetics, William H. Brenner, Samuel J. Wheeler
Philosophy Faculty Publications
We analyze two problems in mathematics – the first (stated in our title) is extracted from Wittgenstein’s “Philosophy for Mathematicians”; the second (“What set of numbers is non-denumerable?”) is taken from Cantor. We then consider, by way of comparison, a problem in musical aesthetics concerning a Brahms variation on a theme by Haydn. Our aim is twofold: first, to bring out and elucidate the essentially riddle-like character of these problems; second, to show that the comparison with riddles does not reduce their solution to an exercise in bare subjectivity
Gay Cultural Studies Newsletter: Spring 2024, Women's And Gender Studies, Old Dominion University
Gay Cultural Studies Newsletter: Spring 2024, Women's And Gender Studies, Old Dominion University
Gay Cultural Studies Newsletter
Spring 2024 issue of the Gay Cultural Studies Newsletter, produced by students in the Department of Women's and Gender Studies. Delivered via email and reformatted as PDF.
Coming Home Again: Television Sitcom Revivals, Brandon K. Hedgepeth
Coming Home Again: Television Sitcom Revivals, Brandon K. Hedgepeth
Communication & Theatre Arts Theses
This thesis argues that the success of television situational comedy revivals correlates with television’s technological affordances as they have evolved over the past half-century. Specifically, three revival series are examined within this study, consisting of The New Leave it to Beaver (1983-1989), Fuller House (2016-2020), and The Conners (2018-Present). This paper uses the revival case studies to showcase their parallel relationship with the introduction of cable television and streaming media, alongside the resurgence of broadcast television to highlight the changing media landscape and the intertwined nature between technological advancement and the revival form. The study’s investigation of how nostalgia intersects …
More Than Representation Heartstopper: A Multimodal Critical Discourse Analysis, Tracyann Josephine Harmer
More Than Representation Heartstopper: A Multimodal Critical Discourse Analysis, Tracyann Josephine Harmer
Communication & Theatre Arts Theses
This thesis is a multimodal critical discourse analysis of Netflix’s Heartstopper, written with the goal of understanding its methods of representation and queer world creation. Through analysis of the ideology of heteronormativity as it relates to masculinity, internalized homophobia, homophobia, and mental health, I expand upon the significance of queer representation for queer audiences, heterosexual audiences, and producers of queer media. Through a nuanced analysis of these themes, I display how and why Heartstopper has had enormous success and expand upon the cultural phenomena surrounding this media. Finally, this thesis places these nuanced analyses into the real-world reaction to …
The Place Of Nuclear Weapons In Russian Identity: An Ontological Security Analysis, Peter Ernest Yeager
The Place Of Nuclear Weapons In Russian Identity: An Ontological Security Analysis, Peter Ernest Yeager
Graduate Program in International Studies Theses & Dissertations
On May 9, 2008, Russia’s Victory Day, four 14-wheeled MAZ-7917s drove through Red Square carrying Topol intercontinental ballistic missiles. This was the first time nuclear weapons had been paraded through Moscow since before the end of the Cold War. The previous August, Russia had resumed nuclear-capable bomber patrols, and in January, 2007, President Putin acknowledged Russia had begun to build new nuclear weapons. These remarkable events were met with little acknowledgement in the West, as if they were completely normal. Instead, they represented a major evolution in the bilateral relationship between the United States and Russia. Sixteen years of fitful …
Monarch Science Observer, Volume 18, College Of Sciences, Old Dominion University
Monarch Science Observer, Volume 18, College Of Sciences, Old Dominion University
College of Sciences Newsletter
Spring 2024, issue of Monarch Science Observer, ODU Colleges of Sciences Newsletter.