Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Nova Southeastern University

Theses/Dissertations

2022

Discipline
Keyword
Publication

Articles 1 - 19 of 19

Full-Text Articles in Physical Sciences and Mathematics

Examining The Relationship Between Stomiiform Fish Morphology And Their Ecological Traits, Mikayla L. Twiss Dec 2022

Examining The Relationship Between Stomiiform Fish Morphology And Their Ecological Traits, Mikayla L. Twiss

All HCAS Student Capstones, Theses, and Dissertations

Trait-based ecology characterizes individuals’ functional attributes to better understand and predict their interactions with other species and their environments. Utilizing morphological traits to describe functional groups has helped group species with similar ecological niches that are not necessarily taxonomically related. Within the deep-pelagic fishes, the Order Stomiiformes exhibits high morphological and species diversity, and many species undertake diel vertical migration (DVM). While the morphology and behavior of stomiiform fishes have been extensively studied and described through taxonomic assessments, the connection between their form and function regarding their DVM types, morphotypes, and daytime depth distributions is not well known. Here, three …


Larval Ecology Of Atlantic Bluefin Tuna (Thunnus Thynnus): New Insights From Otolith Microstructure, Biotic, And Abiotic Analyses From The Gulf Of Mexico And Mediterranean Sea, Estrella Malca Dec 2022

Larval Ecology Of Atlantic Bluefin Tuna (Thunnus Thynnus): New Insights From Otolith Microstructure, Biotic, And Abiotic Analyses From The Gulf Of Mexico And Mediterranean Sea, Estrella Malca

All HCAS Student Capstones, Theses, and Dissertations

Atlantic bluefin tuna (ABT), Thunnus thynnus, spawn in the Gulf of Mexico (GoM) and the Mediterranean Sea (MED). Spawning occurs within narrow temporal and environmental parameters. Efforts to characterize growth of ABT in wild conditions revealed a wide range of growth variability during the early life stages. This series of studies examined potential biotic and abiotic influences of larval growth from seven ABT cohorts, and identified several key drivers of growth for this commercially valuable species. A detailed investigation of larval dynamics using otolith microstructure was conducted as follows. First, companion growth curves and stable isotope analysis from the same …


Benthic Community Dynamics And Stony Coral Demographics In Florida In Relation To Acute Disturbances And Chronic Pressures, Nicholas P. Jones Aug 2022

Benthic Community Dynamics And Stony Coral Demographics In Florida In Relation To Acute Disturbances And Chronic Pressures, Nicholas P. Jones

All HCAS Student Capstones, Theses, and Dissertations

The persistence of coral reef communities is threatened by a suite of pressures operating at varying spatial and temporal scales. In general, acute disturbances (short term stochastic events such as marine heatwaves or hurricanes) and chronic pressures, such as ocean warming, have caused the most significant changes to stony coral assemblages (order Scleractinia) and continue to impair recovery potential. Additionally, many coral reefs are subject to local chronic anthropogenic pressures resulting in poor water quality or sedimentation, which further impact stony corals and shape benthic community structure, particularly near urbanized coastlines. For the viability of communities on coral reefs, a …


Exploration In Mental Performance For Division 1 Sec College Football Student Athletes, Alex Burgdorf Aug 2022

Exploration In Mental Performance For Division 1 Sec College Football Student Athletes, Alex Burgdorf

Department of Occupational Therapy Entry-Level Capstone Projects

The stigma surrounding mental health in sports has made intervention difficult. “There is a need for various actors to provide more effective strategies to overcome the stigma that surrounds mental illness, increase mental health literacy in the athlete/coach community, and address athlete-specific barriers to seeking treatment for mental illness” (Castadelli-Maia et.al 2019). The athletes in the football program at the University of Tennessee face more pressure today than ever in history. They have their class schedule, practice and training every day, and meetings with their position coaches. Now, with the introduction of name, image, and likeness (NIL) allowing players to …


Assessment Of Microplastics In Southeastern Florida Forage Fishes, Maria Kappos Aug 2022

Assessment Of Microplastics In Southeastern Florida Forage Fishes, Maria Kappos

All HCAS Student Capstones, Theses, and Dissertations

Microplastics threaten the health of numerous marine organisms at all trophic levels. Currently, the topic is well studied among larger predators such as marine birds, dolphins, pelagic fishes, and even herbivorous organisms such as manatees. However, knowledge of microplastics present in organisms at lower trophic levels is poorly understood. The aim of this study was to assess the presence of microplastics in lower trophic level forage fishes. To gain a clear depiction of microplastics in the forage fishes of South Florida, four locations were sampled. These locations were classified into two categories, urban (Port Everglades and Northern Biscayne Bay) and …


Polychlorinated Organic Contaminants In Baleen From North Pacific Ocean Whales, Briana R. Coulter Jun 2022

Polychlorinated Organic Contaminants In Baleen From North Pacific Ocean Whales, Briana R. Coulter

All HCAS Student Capstones, Theses, and Dissertations

Persistent organic pollutants (POP) have been detected and analyzed in various baleen whale tissues (blubber, muscles, liver, etc.) This study concentrated on detecting 7 polychlorinated biphenyls (PCB) and 14 organochlorine pesticides from baleen, a baleen whale tissue never before analyzed for POPs. These data were used to investigate temporal and geographic trends by sampling at every 1 cm interval along the length of the baleen plate. Four species of baleen whales stranded in the North Pacific Ocean were included in this study: gray (n=2), humpback (n=2), minke (n=1), and blue (n=1) whales. Organic contaminant concentrations were analyzed with respect to …


A Spatial Assessment Of Impacts To The Flats Fishery By Recreational Boating In The Florida Keys National Marine Sanctuary, Kristin Anderson Apr 2022

A Spatial Assessment Of Impacts To The Flats Fishery By Recreational Boating In The Florida Keys National Marine Sanctuary, Kristin Anderson

All HCAS Student Capstones, Theses, and Dissertations

The recreational flats fishery in the Florida Keys is a significant component of the marine resource-based economy, exceeding $465 million (USD) in annual economic impact. Permit (Trachinotus falcatus), bonefish (Albula vulpes), and tarpon (Megalops atlanticus) are the three main species targeted by flat fishers. Those participating in this fishery generally practice catch-and-release angling therefore, the fishery is considered a more sustainable marine use compared to more traditional commercial fisheries. However, with population and tourism rising in South Florida, the fishery is increasingly threatened by habitat degradation and user conflicts. Ongoing revisions to the Florida …


Diagnosis Of Errors In Stalled Inter-Organizational Workflow Processes, Mudassar Habib Ghazi Jan 2022

Diagnosis Of Errors In Stalled Inter-Organizational Workflow Processes, Mudassar Habib Ghazi

CCE Theses and Dissertations

Fault-tolerant inter-organizational workflow processes help participant organizations efficiently complete their business activities and operations without extended delays. The stalling of inter-organizational workflow processes is a common hurdle that causes organizations immense losses and operational difficulties. The complexity of software requirements, incapability of workflow systems to properly handle exceptions, and inadequate process modeling are the leading causes of errors in the workflow processes.

The dissertation effort is essentially about diagnosing errors in stalled inter-organizational workflow processes. The goals and objectives of this dissertation were achieved by designing a fault-tolerant software architecture of workflow system’s components/modules (i.e., workflow process designer, workflow engine, …


Experimental Study To Assess The Role Of Environment And Device Type On The Success Of Social Engineering Attacks: The Case Of Judgment Errors, Tommy Pollock Jan 2022

Experimental Study To Assess The Role Of Environment And Device Type On The Success Of Social Engineering Attacks: The Case Of Judgment Errors, Tommy Pollock

CCE Theses and Dissertations

Phishing continues to be an invasive threat to computer and mobile device users. Cybercriminals continuously develop new phishing schemes using e-mail and malicious search engine links to gather the personal information of unsuspecting users. This information is used for financial gains through identity theft schemes or draining victims' financial accounts. Many users of varying demographic backgrounds fall victim to phishing schemes at one time or another. Users are often distracted and fail to process the phishing attempts fully, then unknowingly fall victim to the scam until much later. Users operating mobile phones and computers are likely to make judgment errors …


A Universal Cybersecurity Competency Framework For Organizational Users, Patricia A. Baker Jan 2022

A Universal Cybersecurity Competency Framework For Organizational Users, Patricia A. Baker

CCE Theses and Dissertations

The global reliance on the Internet to facilitate organizational operations necessitates further investments in organizational information security. Such investments hold the potential for protecting information assets from cybercriminals. To assist organizations with their information security, The National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (NCWF) was created. The framework referenced the cybersecurity work, knowledge, and skills required to competently complete the tasks that strengthen their information security. Organizational users’ limited cybersecurity competency contributes to the financial and information losses suffered by organizations year after year. While most organizational users may be able to respond positively to a cybersecurity threat, …


Factors Affecting Customers’ Decision To Share Personal Data With Mobile Operators, Ammar Ali Qaffaf Jan 2022

Factors Affecting Customers’ Decision To Share Personal Data With Mobile Operators, Ammar Ali Qaffaf

CCE Theses and Dissertations

Companies that personalize their services based on users’ specific needs have increased sales and customer satisfaction. Personalization requires analyzing the user’s behavior and correlating the action with other pieces of information. The information available for cellular service providers has grown substantially as connectivity becomes ubiquitous. Customers are unknowingly sharing their locations, habits, activities, and preferences in real-time with their service providers. Although cellular service providers state that they share personal data with external entities in their publicly available privacy policies, users have limited control over who can access their personal information. Users have no, or suboptimal, control to manage their …


Social Media Analytics And Information Privacy Decisions: Impact Of User Intimate Knowledge And Co-Ownership Perceptions, Bradley Alukwe Wangia Jan 2022

Social Media Analytics And Information Privacy Decisions: Impact Of User Intimate Knowledge And Co-Ownership Perceptions, Bradley Alukwe Wangia

CCE Theses and Dissertations

Social media analytics has been recognized as a distinct research field in the analytics subdomain that is developed by processing social media content to generate important business knowledge. Understanding the factors that influence privacy decisions around its use is important as it is often perceived to be opaque and mismanaged. Social media users have been reported to have low intimate knowledge and co-ownership perception of social media analytics and its information privacy decisions. This deficiency leads them to perceive privacy violations if firms make privacy decisions that conflict with their expectations. Such perceived privacy violations often lead to business disruptions …


Modified Structured Domain Randomization In A Synthetic Environment For Learning Algorithms, Bryan L. Croft Jan 2022

Modified Structured Domain Randomization In A Synthetic Environment For Learning Algorithms, Bryan L. Croft

CCE Theses and Dissertations

Deep Reinforcement Learning (DRL) has the capability to solve many complex tasks in robotics, self-driving cars, smart grids, finance, healthcare, and intelligent autonomous systems. During training, DRL agents interact freely with the environment to arrive at an inference model. Under real-world conditions this training creates difficulties of safety, cost, and time considerations. Training in synthetic environments helps overcome these difficulties, however, this only approximates real-world conditions resulting in a ‘reality gap’. The synthetic training of agents has proven advantageous but requires methods to bridge this reality gap. This work addressed this through a methodology which supports agent learning. A framework …


A Validity-Based Approach For Feature Selection In Intrusion Detection Systems, Eljilani Hmouda Jan 2022

A Validity-Based Approach For Feature Selection In Intrusion Detection Systems, Eljilani Hmouda

CCE Theses and Dissertations

Intrusion detection systems are tools that detect and remedy the presence of malicious activities. Intrusion detection systems face many challenges in terms of accurate analysis and evaluation. One such challenge is the involvement of many features during analysis, which leads to high data volume and ultimately excessive computational overhead. This research surrounds the development of a new intrusion detection system by employing an entropy-based measure called v-measure to select significant features and reduce dimensionality. After the development of the intrusion detection system, this feature reduction technique was tested on public datasets by applying machine learning classifiers such as Decision Tree, …


Impact Of Knowledge Management Processes Upon Job Satisfaction And Job Performance, George Reid Cooper Jan 2022

Impact Of Knowledge Management Processes Upon Job Satisfaction And Job Performance, George Reid Cooper

CCE Theses and Dissertations

While we might know anecdotally that the implementation of knowledge management in an organization improves job satisfaction and job performance, there are limited empirical studies that assess this assumption. There have been studies done in this area but the results vary in terms of which knowledge management processes have an impact upon job satisfaction and which do not. Similarly, many studies make assumptions that job satisfaction leads to improved job performance without testing for that variable. The goal of this dissertation is to assess whether the knowledge management processes have a positive impact upon job satisfaction and job performance and …


An Approach For Efficient Robust Adversarial Training In Deep Neural Networks, Cesar Zalzalah Jan 2022

An Approach For Efficient Robust Adversarial Training In Deep Neural Networks, Cesar Zalzalah

CCE Theses and Dissertations

With advancements in computer hardware, deep neural networks outperform other methods for many applications, such as image and voice recognition. Unfortunately, existing deep neural networks are fragile at test time against adversarial examples, which are intentionally calculated perturbations that cause a neural network to misclassify the correct input label. This vulnerability makes the use of neural networks risky, especially in critical applications. Extensive prior research studies to build a robust neural network using diverse approaches have been proposed to tackle this problem, including customized models and their parameters, input pre-processing to detect and remove adversarial perturbations, blocking the adversarial input, …


Information Systems Security Countermeasures: An Assessment Of Older Workers In Indonesian Small And Medium-Sized Businesses, Hari Samudra Roosman Jan 2022

Information Systems Security Countermeasures: An Assessment Of Older Workers In Indonesian Small And Medium-Sized Businesses, Hari Samudra Roosman

CCE Theses and Dissertations

Information Systems (IS) misuse can result in cyberattacks such as denial-of-service, phishing, malware, and business email compromise. The study of factors that contribute to the misuse of IS resources is well-documented and empirical research has supported the value of approaches that can be used to deter IS misuse among employees; however, age and cultural nuances exist. Research focusing on older workers and how they can help to deter IS misuse among employees and support cybersecurity countermeasures within developing countries is in its nascent stages. The goal of this study was two-fold. The first goal was to assess what older workers …


An Empirical Investigation Of The Evidence Recovery Process In Digital Forensics, Kevin Parviz Jan 2022

An Empirical Investigation Of The Evidence Recovery Process In Digital Forensics, Kevin Parviz

CCE Theses and Dissertations

The widespread use of the digital media in committing crimes, and the steady increase of their storage capacity has created backlogs at digital forensic labs. The problem is exacerbated especially in high profile crimes. In many such cases the judicial proceedings mandate full analysis of the digital media, when doing so is rarely accomplished or practical. Prior studies have proposed different phases for forensic analysis, to lessen the backlog issues. However, these phases are not distinctly differentiated, and some proposed solutions may not be practical. This study utilized several past police forensic analyses. Each case was chosen for having five …


Exploring The Existing And Unknown Side Effects Of Privacy Preserving Data Mining Algorithms, Hima Bindu Sadashiva Reddy Jan 2022

Exploring The Existing And Unknown Side Effects Of Privacy Preserving Data Mining Algorithms, Hima Bindu Sadashiva Reddy

CCE Theses and Dissertations

The data mining sanitization process involves converting the data by masking the sensitive data and then releasing it to public domain. During the sanitization process, side effects such as hiding failure, missing cost and artificial cost of the data were observed. Privacy Preserving Data Mining (PPDM) algorithms were developed for the sanitization process to overcome information loss and yet maintain data integrity. While these PPDM algorithms did provide benefits for privacy preservation, they also made sure to solve the side effects that occurred during the sanitization process. Many PPDM algorithms were developed to reduce these side effects. There are several …