Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Nova Southeastern University

Theses/Dissertations

Discipline
Keyword
Publication Year
Publication

Articles 1 - 21 of 21

Full-Text Articles in Engineering

Optimizing Constraint Selection In A Design Verification Environment For Efficient Coverage Closure, Vanessa Cooper Jan 2023

Optimizing Constraint Selection In A Design Verification Environment For Efficient Coverage Closure, Vanessa Cooper

CCE Theses and Dissertations

No abstract provided.


Integrating The Spatial Pyramid Pooling Into 3d Convolutional Neural Networks For Cerebral Microbleeds Detection, Andre Accioly Veira Jan 2023

Integrating The Spatial Pyramid Pooling Into 3d Convolutional Neural Networks For Cerebral Microbleeds Detection, Andre Accioly Veira

CCE Theses and Dissertations

Cerebral microbleeds (CMB) are small foci of chronic blood products in brain tissues that are critical markers for cerebral amyloid angiopathy. CMB increases the risk of symptomatic intracerebral hemorrhage and ischemic stroke. CMB can also cause structural damage to brain tissues resulting in neurologic dysfunction, cognitive impairment, and dementia. Due to the paramagnetic properties of blood degradation products, CMB can be better visualized via susceptibility-weighted imaging (SWI) than magnetic resonance imaging (MRI).CMB identification and classification have been based mainly on human visual identification of SWI features via shape, size, and intensity information. However, manual interpretation can be biased. Visual screening …


Adversarial Training Of Deep Neural Networks, Anabetsy Termini Jan 2023

Adversarial Training Of Deep Neural Networks, Anabetsy Termini

CCE Theses and Dissertations

Deep neural networks used for image classification are highly susceptible to adversarial attacks. The de facto method to increase adversarial robustness is to train neural networks with a mixture of adversarial images and unperturbed images. However, this method leads to robust overfitting, where the network primarily learns to recognize one specific type of attack used to generate the images while remaining vulnerable to others after training. In this dissertation, we performed a rigorous study to understand whether combinations of state of the art data augmentation methods with Stochastic Weight Averaging improve adversarial robustness and diminish adversarial overfitting across a wide …


Application Of Genomic Compression Techniques For Efficient Storage Of Captured Network Traffic Packets, James Alfred Loving Jan 2023

Application Of Genomic Compression Techniques For Efficient Storage Of Captured Network Traffic Packets, James Alfred Loving

CCE Theses and Dissertations

In cybersecurity, one of most important forensic tools are audit files; they contain a record of cyber events that occur on systems throughout the enterprise. Threats to an enterprise have become one of the top concerns of IT professionals world-wide. Although there are various approaches to detect anomalous insider behavior, these approaches are not always able to detect advanced persistent threats or even exfiltration of sensitive data by insiders. The issue is the volume of network data required to identify this anomalous activity. It has been estimated that an average corporate user creates a minimum of 1.5 MB audit data …


A Temporal Analysis Of The Microbiota And Biofouling Development On Artificial Substrates In The Port Everglades Inlet, Florida, Denise Swack Dec 2021

A Temporal Analysis Of The Microbiota And Biofouling Development On Artificial Substrates In The Port Everglades Inlet, Florida, Denise Swack

All HCAS Student Capstones, Theses, and Dissertations

A pilot project was deployed in Port Everglades Inlet, Florida that aimed to evaluate the biofilm composing the microbiome on ecologically engineered artificial substrates used to build Coastal Marine Infrastructure. In April of 2017, an Articulated Concrete Block Mattress comprised of an ecological engineered concrete substrate and a standard smooth surface control substrates were compared. This study will provide a profile on the microbiome community on artificial substrates within Port Everglades Inlet on bio-enhancing concrete-based solutions in our Coastal Marine Infrastructure. To study the microbial community, the 16s rRNA technology was used in Illumina’s high-throughput DNA sequencing. Samples were collected …


Orientation And Social Influences Matter: Revisiting Neutralization Tendencies In Information Systems Security Violation, Frank Curtis King Jan 2021

Orientation And Social Influences Matter: Revisiting Neutralization Tendencies In Information Systems Security Violation, Frank Curtis King

CCE Theses and Dissertations

It is estimated that over half of all information systems security breaches are due directly or indirectly to the poor security practices of an organization’s employees. Previous research has shown neutralization techniques as having influence on the intent to violate information security policy. In this study, we proposed an expansion of the neutralization model by including the effects of business and ethical orientation of individuals on their tendencies to neutralize and compromise with information security policy. Additionally, constructs from social influences and pressures have been integrated into this model to measure the impact on the intent to violate information security …


Pause For A Cybersecurity Cause: Assessing The Influence Of A Waiting Period On User Habituation In Mitigation Of Phishing Attacks, Amy Antonucci Jan 2021

Pause For A Cybersecurity Cause: Assessing The Influence Of A Waiting Period On User Habituation In Mitigation Of Phishing Attacks, Amy Antonucci

CCE Theses and Dissertations

Social engineering costs organizations billions of dollars a year. Social engineering exploits the weakest link of information security systems, the people who are using them. Phishing is a form of social engineering in which the perpetrator depends on the victim’s instinctual thinking towards an email designed to create a fear or excitement response. It is well-documented in literature that users continue to click on phishing emails costing them and their employers significant monetary resources and data loss. Training does not appear to mitigate the effects of phishing much; other solutions are necessary to mitigate phishing.

Kahneman introduced the concepts of …


Improving Employees’ Compliance With Password Policies, Enas Albataineh Jan 2021

Improving Employees’ Compliance With Password Policies, Enas Albataineh

CCE Theses and Dissertations

Employees’ lack of compliance with password policies increases password susceptibility, which leads to financial damages to the organizations as a result of information disclosure, fraud, and unauthorized transactions. However, few studies have examined what motivates employees to comply with password policies.

The purpose of this quantitative cross-sectional study was to examine what factors influence employees’ compliance with password policies. A theoretical model was developed based on Protection Motivation Theory (PMT), General Deterrence Theory (GDT), Theory of Reasoned Action (TRA), and Psychological Ownership Theory to explain employees’ compliance with password policies.

A non-probability convenience sample was employed. The sample consisted of …


An Empirical Assessment Of Users' Information Security Protection Behavior Towards Social Engineering Breaches, Nisha Jatin Patel Jan 2021

An Empirical Assessment Of Users' Information Security Protection Behavior Towards Social Engineering Breaches, Nisha Jatin Patel

CCE Theses and Dissertations

User behavior is one of the most significant information security risks. Information Security is all about being aware of who and what to trust and behaving accordingly. Due to technology becoming an integral part of nearly everything in people's daily lives, the organization's need for protection from security threats has continuously increased. Social engineering is the act of tricking a user into revealing information or taking action. One of the riskiest aspects of social engineering is that it depends mainly upon user errors and is not necessarily a technology shortcoming. User behavior should be one of the first apprehensions when …


A Study Of Factors That Influence Symbol Selection On Augmentative And Alternative Communication Devices For Individuals With Autism Spectrum Disorder, William Todd Dauterman Jan 2021

A Study Of Factors That Influence Symbol Selection On Augmentative And Alternative Communication Devices For Individuals With Autism Spectrum Disorder, William Todd Dauterman

CCE Theses and Dissertations

According to the American Academy of Pediatrics (AAP), 1 in 59 children are diagnosed with Autism Spectrum Disorder (ASD) each year. Given the complexity of ASD and how it is manifested in individuals, the execution of proper interventions is difficult. One major area of concern is how individuals with ASD who have limited communication skills are taught to communicate using Augmentative and Alternative Communication devices (AAC). AACs are portable electronic devices that facilitate communication by using audibles, signs, gestures, and picture symbols. Traditionally, Speech-Language Pathologists (SLPs) are the primary facilitators of AAC devices and help establish the language individuals with …


A Comprehensive Cybersecurity Defense Framework For Large Organizations, Willarvis Smith Jan 2019

A Comprehensive Cybersecurity Defense Framework For Large Organizations, Willarvis Smith

CCE Theses and Dissertations

There is a growing need to understand and identify overarching organizational requirements for cybersecurity defense in large organizations. Applying proper cybersecurity defense will ensure that the right capabilities are fielded at the right locations to safeguard critical assets while minimizing duplication of effort and taking advantage of efficiencies. Exercising cybersecurity defense without an understanding of comprehensive foundational requirements instills an ad hoc and in many cases conservative approach to network security. Organizations must be synchronized across federal and civil agencies to achieve adequate cybersecurity defense. Understanding what constitutes comprehensive cybersecurity defense will ensure organizations are better protected and more efficient. …


Comprehending The Safety Paradox And Privacy Concerns With Medical Device Remote Patient Monitoring, Marc Doyle Jan 2019

Comprehending The Safety Paradox And Privacy Concerns With Medical Device Remote Patient Monitoring, Marc Doyle

CCE Theses and Dissertations

Medical literature identifies a number of technology-driven improvements in disease management such as implantable medical devices (IMDs) that are a standard treatment for candidates with specific diseases. Among patients using implantable cardiac defibrillators (ICD), for example, problems and issues are being discovered faster compared to patients without monitoring, improving safety. What is not known is why patients report not feeling safer, creating a safety paradox, and why patients identify privacy concerns in ICD monitoring.

There is a major gap in the literature regarding the factors that contribute to perceived safety and privacy in remote patient monitoring (RPM). To address this …


An Investigation Into The Impact Of Social Networking On Knowledge Sharing, James Harold Gorham Jan 2019

An Investigation Into The Impact Of Social Networking On Knowledge Sharing, James Harold Gorham

CCE Theses and Dissertations

Today we are experiencing a rapidly increasing trend to use social networking in ways that dramatically affect both our personal and our public lives. This is a global phenomenon being experienced around the world. Exactly how this technology is being used and by whom is of great interest. The problem is that not a lot of research has been conducted to investigate the role social networking sites play to influence a person’s attitude toward sharing knowledge at work. In light of the marked increase in the use of social networking sites and how it is changing the way we live, …


Attributing Accelerated Increases In Salinity In The Mediterranean Coastal Zone To Climate Change And Seawater Desalination Brine And The Resultant Unsustainability Of Modern Desalination Technology, Brandon W. Harper Dec 2018

Attributing Accelerated Increases In Salinity In The Mediterranean Coastal Zone To Climate Change And Seawater Desalination Brine And The Resultant Unsustainability Of Modern Desalination Technology, Brandon W. Harper

HCNSO Student Capstones

Anthropogenic climate change influences our oceans on a global scale and has brought about increased salinity levels in large areas of our oceans such as the North Atlantic (Dunbar 2009). Concentrations of large scale desalination plants around small bodies of water add to this pattern and have shown even larger increases in salinity due to desalination brine discharge (Purnama et al., 2005). Salinity profile data over time should show similar increases in salinity in the Mediterranean Sea due to climate change and localized data should show increased salinity due to brine discharge. This study aims to pinpoint the extent of …


Perceptions Of Female Cybersecurity Professionals Toward Factors That Encourage Females To The Cybersecurity Field, Kembley Kay Lingelbach Jan 2018

Perceptions Of Female Cybersecurity Professionals Toward Factors That Encourage Females To The Cybersecurity Field, Kembley Kay Lingelbach

CCE Theses and Dissertations

Despite multiple national, educational, and industry initiatives, women continue to be underrepresented in the cybersecurity field. Only 11% of cybersecurity professionals, globally, are female. This contributes to the growing overall shortage of workers in the field. This research addressed the significant underrepresentation of females in the cybersecurity workforce. There are many practitioner and industry studies that suggest self-efficacy, discrimination and organizational culture play important roles in the low rate of women in the cybersecurity field. A limited number of scholarly studies identify causal factors; however, there is not a general consensus or framework to explain the problem thoroughly. Moreover, there …


Exploring Generational Differences In Text Messaging Usage And Habits, Daniel Wayne Long Jan 2018

Exploring Generational Differences In Text Messaging Usage And Habits, Daniel Wayne Long

CCE Theses and Dissertations

Members of society today embrace multiple communication media for various purposes and intents. Text messaging has been identified as the medium of choice for continual relationship maintenance and text messaging from mobile devices overshadows all other media forms for the support of social connections. Text messaging is changing everything from how operators market their plans to how advertisers and service providers reach consumers. But just as technology usage of social media and internet access are different across generational boundaries, text messaging usage and habits may also be different for various generational groups. The majority of peer-reviewed research regarding text messaging …


Data Masking, Encryption, And Their Effect On Classification Performance: Trade-Offs Between Data Security And Utility, Juan C. Asenjo Jan 2017

Data Masking, Encryption, And Their Effect On Classification Performance: Trade-Offs Between Data Security And Utility, Juan C. Asenjo

CCE Theses and Dissertations

As data mining increasingly shapes organizational decision-making, the quality of its results must be questioned to ensure trust in the technology. Inaccuracies can mislead decision-makers and cause costly mistakes. With more data collected for analytical purposes, privacy is also a major concern. Data security policies and regulations are increasingly put in place to manage risks, but these policies and regulations often employ technologies that substitute and/or suppress sensitive details contained in the data sets being mined. Data masking and substitution and/or data encryption and suppression of sensitive attributes from data sets can limit access to important details. It is believed …


Effects Of Emf Emissions From Undersea Electric Cables On Coral Reef Fishes, Robert F. Jermain Jul 2016

Effects Of Emf Emissions From Undersea Electric Cables On Coral Reef Fishes, Robert F. Jermain

HCNSO Student Theses and Dissertations

The objective of this project was to determine if the electromagnetic field (EMF) emissions from undersea power cables impacted the local and transient marine life, with an emphasis on reef fishes. The work was done at South Florida Ocean Measurement Facility of Naval Surface Warfare Center, Carderock Division, Broward County, Florida. This facility functions as the hub for a range of active undersea detection and data transmission cables. It has multiple active submarine power cables that extend several miles offshore and which can deliver power and enable data transmission to and from a range of acoustic and EMF sensors. The …


An Empirical Investigation Of The Willingness Of Us Intelligence Community Analysts To Contribute Knowledge To A Knowledge Management System (Kms) In A Highly Classified And Sensitive Environment, Robert Hambly Jan 2016

An Empirical Investigation Of The Willingness Of Us Intelligence Community Analysts To Contribute Knowledge To A Knowledge Management System (Kms) In A Highly Classified And Sensitive Environment, Robert Hambly

CCE Theses and Dissertations

Since September 11, 2001, the United States Government (USG) has possessed unparalleled capability in terms of dedicated intelligence and information collection assets supporting the analysts of the Intelligence Community (IC). The USG IC has sponsored, developed, and borne witness to extraordinary advances in technology, techniques, and procedures focused on knowledge harvesting, knowledge sharing, and collaboration. Knowledge, within successful (effective & productive) organizations, exists as a commodity; a commodity that can be created, captured, imparted, shared, and leveraged. The research problem that this study addressed is the challenge of maintaining strong organizational effectiveness and productivity through the use of an information …


A Usability And Learnability Case Study Of Glass Flight Deck Interfaces And Pilot Interactions Through Scenario-Based Training, Thomas James De Cino Jan 2016

A Usability And Learnability Case Study Of Glass Flight Deck Interfaces And Pilot Interactions Through Scenario-Based Training, Thomas James De Cino

CCE Theses and Dissertations

In the aviation industry, digitally produced and presented flight, navigation, and aircraft information is commonly referred to as glass flight decks. Glass flight decks are driven by computer-based subsystems and have long been a part of military and commercial aviation sectors. Over the past 15 years, the General Aviation (GA) sector of the aviation industry has become a recent beneficiary of the rapid advancement of computer-based glass flight deck (GFD) systems.

While providing the GA pilot considerable enhancements in the quality of information about the status and operations of the aircraft, training pilots on the use of glass flight decks …


Ocean Current Measurements: Challenges And Opportunities In The Florida Current, William E. Baxley Mar 2013

Ocean Current Measurements: Challenges And Opportunities In The Florida Current, William E. Baxley

HCNSO Student Capstones

The water velocities offshore south Florida are dominated by the Florida Current, and these effects result not only from the tremendous flow of water between Florida and the Bahamas, but also from the eddies and other rotational components imparted by the change in flow direction from eastward to northward along the Florida Keys and the end of the peninsula. These currents have been measured for decades, with methods ranging from subsurface floats to acoustic Doppler current profilers (ADCPs) and surface current measuring radars. Data suggests that there is a large degree of variability in the mean flow, including significant vorticity …