Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 28 of 28

Full-Text Articles in Physical Sciences and Mathematics

How Can Generative Ai (Genai) Enhance Or Hinder Qualitative Studies? A Critical Appraisal From South Asia, Nepal, Niroj Dahal Mar 2024

How Can Generative Ai (Genai) Enhance Or Hinder Qualitative Studies? A Critical Appraisal From South Asia, Nepal, Niroj Dahal

The Qualitative Report

Qualitative researchers can benefit from using generative artificial intelligence (GenAI), such as different versions of ChatGPT—GPT-3.5 or GPT-4, Google Bard—now renamed as a Gemini, and Bing Chat—now renamed as a Copilot, in their studies. The scientific community has used artificial intelligence (AI) tools in various ways. However, using GenAI has generated concerns regarding potential research unreliability, bias, and unethical outcomes in GenAI-generated research results. Considering these concerns, the purpose of this commentary is to review the current use of GenAI in qualitative research, including its strengths, limitations, and ethical dilemmas from the perspective of critical appraisal from South Asia, Nepal. …


History Of Clover Leaf Syndrome, Isabella Perez Feb 2024

History Of Clover Leaf Syndrome, Isabella Perez

Mako: NSU Undergraduate Student Journal

The purpose of this paper is to summarize the history of clover leaf syndrome and describe the newest advancements made to treat it. Clover leaf syndrome is more formally referred to as Kleeblattschadel syndrome. Information was gathered from several scholarly, peer-reviewed articles, and was condensed down into the key takeaways. This syndrome impacts the formation of the skull due to premature fusion of its sutures, creating a tri-lobar skull that resembles a clover leaf. This premature fusion is referred to as a type of craniosynostosis and has been linked to causing several other health complications ranging in severity. This is …


Optimizing Constraint Selection In A Design Verification Environment For Efficient Coverage Closure, Vanessa Cooper Jan 2023

Optimizing Constraint Selection In A Design Verification Environment For Efficient Coverage Closure, Vanessa Cooper

CCE Theses and Dissertations

No abstract provided.


Integrating The Spatial Pyramid Pooling Into 3d Convolutional Neural Networks For Cerebral Microbleeds Detection, Andre Accioly Veira Jan 2023

Integrating The Spatial Pyramid Pooling Into 3d Convolutional Neural Networks For Cerebral Microbleeds Detection, Andre Accioly Veira

CCE Theses and Dissertations

Cerebral microbleeds (CMB) are small foci of chronic blood products in brain tissues that are critical markers for cerebral amyloid angiopathy. CMB increases the risk of symptomatic intracerebral hemorrhage and ischemic stroke. CMB can also cause structural damage to brain tissues resulting in neurologic dysfunction, cognitive impairment, and dementia. Due to the paramagnetic properties of blood degradation products, CMB can be better visualized via susceptibility-weighted imaging (SWI) than magnetic resonance imaging (MRI).CMB identification and classification have been based mainly on human visual identification of SWI features via shape, size, and intensity information. However, manual interpretation can be biased. Visual screening …


Adversarial Training Of Deep Neural Networks, Anabetsy Termini Jan 2023

Adversarial Training Of Deep Neural Networks, Anabetsy Termini

CCE Theses and Dissertations

Deep neural networks used for image classification are highly susceptible to adversarial attacks. The de facto method to increase adversarial robustness is to train neural networks with a mixture of adversarial images and unperturbed images. However, this method leads to robust overfitting, where the network primarily learns to recognize one specific type of attack used to generate the images while remaining vulnerable to others after training. In this dissertation, we performed a rigorous study to understand whether combinations of state of the art data augmentation methods with Stochastic Weight Averaging improve adversarial robustness and diminish adversarial overfitting across a wide …


Orientation And Social Influences Matter: Revisiting Neutralization Tendencies In Information Systems Security Violation, Frank Curtis King Jan 2021

Orientation And Social Influences Matter: Revisiting Neutralization Tendencies In Information Systems Security Violation, Frank Curtis King

CCE Theses and Dissertations

It is estimated that over half of all information systems security breaches are due directly or indirectly to the poor security practices of an organization’s employees. Previous research has shown neutralization techniques as having influence on the intent to violate information security policy. In this study, we proposed an expansion of the neutralization model by including the effects of business and ethical orientation of individuals on their tendencies to neutralize and compromise with information security policy. Additionally, constructs from social influences and pressures have been integrated into this model to measure the impact on the intent to violate information security …


Pause For A Cybersecurity Cause: Assessing The Influence Of A Waiting Period On User Habituation In Mitigation Of Phishing Attacks, Amy Antonucci Jan 2021

Pause For A Cybersecurity Cause: Assessing The Influence Of A Waiting Period On User Habituation In Mitigation Of Phishing Attacks, Amy Antonucci

CCE Theses and Dissertations

Social engineering costs organizations billions of dollars a year. Social engineering exploits the weakest link of information security systems, the people who are using them. Phishing is a form of social engineering in which the perpetrator depends on the victim’s instinctual thinking towards an email designed to create a fear or excitement response. It is well-documented in literature that users continue to click on phishing emails costing them and their employers significant monetary resources and data loss. Training does not appear to mitigate the effects of phishing much; other solutions are necessary to mitigate phishing.

Kahneman introduced the concepts of …


Improving Employees’ Compliance With Password Policies, Enas Albataineh Jan 2021

Improving Employees’ Compliance With Password Policies, Enas Albataineh

CCE Theses and Dissertations

Employees’ lack of compliance with password policies increases password susceptibility, which leads to financial damages to the organizations as a result of information disclosure, fraud, and unauthorized transactions. However, few studies have examined what motivates employees to comply with password policies.

The purpose of this quantitative cross-sectional study was to examine what factors influence employees’ compliance with password policies. A theoretical model was developed based on Protection Motivation Theory (PMT), General Deterrence Theory (GDT), Theory of Reasoned Action (TRA), and Psychological Ownership Theory to explain employees’ compliance with password policies.

A non-probability convenience sample was employed. The sample consisted of …


An Empirical Assessment Of Users' Information Security Protection Behavior Towards Social Engineering Breaches, Nisha Jatin Patel Jan 2021

An Empirical Assessment Of Users' Information Security Protection Behavior Towards Social Engineering Breaches, Nisha Jatin Patel

CCE Theses and Dissertations

User behavior is one of the most significant information security risks. Information Security is all about being aware of who and what to trust and behaving accordingly. Due to technology becoming an integral part of nearly everything in people's daily lives, the organization's need for protection from security threats has continuously increased. Social engineering is the act of tricking a user into revealing information or taking action. One of the riskiest aspects of social engineering is that it depends mainly upon user errors and is not necessarily a technology shortcoming. User behavior should be one of the first apprehensions when …


A Study Of Factors That Influence Symbol Selection On Augmentative And Alternative Communication Devices For Individuals With Autism Spectrum Disorder, William Todd Dauterman Jan 2021

A Study Of Factors That Influence Symbol Selection On Augmentative And Alternative Communication Devices For Individuals With Autism Spectrum Disorder, William Todd Dauterman

CCE Theses and Dissertations

According to the American Academy of Pediatrics (AAP), 1 in 59 children are diagnosed with Autism Spectrum Disorder (ASD) each year. Given the complexity of ASD and how it is manifested in individuals, the execution of proper interventions is difficult. One major area of concern is how individuals with ASD who have limited communication skills are taught to communicate using Augmentative and Alternative Communication devices (AAC). AACs are portable electronic devices that facilitate communication by using audibles, signs, gestures, and picture symbols. Traditionally, Speech-Language Pathologists (SLPs) are the primary facilitators of AAC devices and help establish the language individuals with …


Stem Education In College: An Analysis Of Stakeholders’ Recent Challenges And Potential Solutions, Santanu De, Georgina Arguello Nov 2020

Stem Education In College: An Analysis Of Stakeholders’ Recent Challenges And Potential Solutions, Santanu De, Georgina Arguello

FDLA Journal

A vast majority of academic disciplines and curricula in the college center around Science, Technology, Engineering, and Mathematics (STEM), which are critical to developing the skills necessary for a global workforce. Rapid changes in pedagogical setups, educational modes, and advances in instructional technology entail diverse challenges for key stakeholders (i.e. students, faculty, and the organizations). This paper highlights the most relevant challenges and potential solutions in STEM higher education at the college level, reported in the last decade. The holistic analysis combining the three stakeholders’ perspectives would help elucidate significant contemporary aspects impacting the fields. The goal is to further …


Personalized Medicine: The Use Of Biomarkers And Molecularly Targeted Therapies For Patient Care And Cancer Intervention, Wafa Asad, Emily Schmitt Lavin Sep 2020

Personalized Medicine: The Use Of Biomarkers And Molecularly Targeted Therapies For Patient Care And Cancer Intervention, Wafa Asad, Emily Schmitt Lavin

Mako: NSU Undergraduate Student Journal

Personalized medicine and targeted therapy have been emerging fields of study for the remediation and inhibition of cancer. Personalized medicine in the treatment of cancer involves using genetic, immune, and proteomic profiling to provide therapeutic options as well as prognostic background for every patient and their tumor’s genetic mutations. Targeted therapies allow researchers and medical personnel alike to determine the appropriate treatment for a patient based on the molecular basis and mechanistic actions of a cancerous tumor. The overall significance of this study was to express how these treatments use biomarkers to pinpoint the location, and severity of the cancer, …


Arranged Marriages: An Inappropriate Fabrication, Karika Sethi, Michael D. Reiter Feb 2020

Arranged Marriages: An Inappropriate Fabrication, Karika Sethi, Michael D. Reiter

Mako: NSU Undergraduate Student Journal

This paper explores what an inappropriate relationship is and the taxonomy scale used to evaluate different relationships, specifically, arranged marriages. Arranged marriage is a topic that is considered taboo depending on global location. It is more prevalent in Eastern nations such as India, China, Oriental countries, and the Middle East. However, Western influence plays a significant role on what is and is not acceptable, as societal norms differ from place to place. What is defined as normal by culture is what helps to define if a relationship is or is not viewed as inappropriate. This paper is designed to explore …


A Comprehensive Cybersecurity Defense Framework For Large Organizations, Willarvis Smith Jan 2019

A Comprehensive Cybersecurity Defense Framework For Large Organizations, Willarvis Smith

CCE Theses and Dissertations

There is a growing need to understand and identify overarching organizational requirements for cybersecurity defense in large organizations. Applying proper cybersecurity defense will ensure that the right capabilities are fielded at the right locations to safeguard critical assets while minimizing duplication of effort and taking advantage of efficiencies. Exercising cybersecurity defense without an understanding of comprehensive foundational requirements instills an ad hoc and in many cases conservative approach to network security. Organizations must be synchronized across federal and civil agencies to achieve adequate cybersecurity defense. Understanding what constitutes comprehensive cybersecurity defense will ensure organizations are better protected and more efficient. …


Comprehending The Safety Paradox And Privacy Concerns With Medical Device Remote Patient Monitoring, Marc Doyle Jan 2019

Comprehending The Safety Paradox And Privacy Concerns With Medical Device Remote Patient Monitoring, Marc Doyle

CCE Theses and Dissertations

Medical literature identifies a number of technology-driven improvements in disease management such as implantable medical devices (IMDs) that are a standard treatment for candidates with specific diseases. Among patients using implantable cardiac defibrillators (ICD), for example, problems and issues are being discovered faster compared to patients without monitoring, improving safety. What is not known is why patients report not feeling safer, creating a safety paradox, and why patients identify privacy concerns in ICD monitoring.

There is a major gap in the literature regarding the factors that contribute to perceived safety and privacy in remote patient monitoring (RPM). To address this …


An Investigation Into The Impact Of Social Networking On Knowledge Sharing, James Harold Gorham Jan 2019

An Investigation Into The Impact Of Social Networking On Knowledge Sharing, James Harold Gorham

CCE Theses and Dissertations

Today we are experiencing a rapidly increasing trend to use social networking in ways that dramatically affect both our personal and our public lives. This is a global phenomenon being experienced around the world. Exactly how this technology is being used and by whom is of great interest. The problem is that not a lot of research has been conducted to investigate the role social networking sites play to influence a person’s attitude toward sharing knowledge at work. In light of the marked increase in the use of social networking sites and how it is changing the way we live, …


Attributing Accelerated Increases In Salinity In The Mediterranean Coastal Zone To Climate Change And Seawater Desalination Brine And The Resultant Unsustainability Of Modern Desalination Technology, Brandon W. Harper Dec 2018

Attributing Accelerated Increases In Salinity In The Mediterranean Coastal Zone To Climate Change And Seawater Desalination Brine And The Resultant Unsustainability Of Modern Desalination Technology, Brandon W. Harper

HCNSO Student Capstones

Anthropogenic climate change influences our oceans on a global scale and has brought about increased salinity levels in large areas of our oceans such as the North Atlantic (Dunbar 2009). Concentrations of large scale desalination plants around small bodies of water add to this pattern and have shown even larger increases in salinity due to desalination brine discharge (Purnama et al., 2005). Salinity profile data over time should show similar increases in salinity in the Mediterranean Sea due to climate change and localized data should show increased salinity due to brine discharge. This study aims to pinpoint the extent of …


Perceptions Of Female Cybersecurity Professionals Toward Factors That Encourage Females To The Cybersecurity Field, Kembley Kay Lingelbach Jan 2018

Perceptions Of Female Cybersecurity Professionals Toward Factors That Encourage Females To The Cybersecurity Field, Kembley Kay Lingelbach

CCE Theses and Dissertations

Despite multiple national, educational, and industry initiatives, women continue to be underrepresented in the cybersecurity field. Only 11% of cybersecurity professionals, globally, are female. This contributes to the growing overall shortage of workers in the field. This research addressed the significant underrepresentation of females in the cybersecurity workforce. There are many practitioner and industry studies that suggest self-efficacy, discrimination and organizational culture play important roles in the low rate of women in the cybersecurity field. A limited number of scholarly studies identify causal factors; however, there is not a general consensus or framework to explain the problem thoroughly. Moreover, there …


Exploring Generational Differences In Text Messaging Usage And Habits, Daniel Wayne Long Jan 2018

Exploring Generational Differences In Text Messaging Usage And Habits, Daniel Wayne Long

CCE Theses and Dissertations

Members of society today embrace multiple communication media for various purposes and intents. Text messaging has been identified as the medium of choice for continual relationship maintenance and text messaging from mobile devices overshadows all other media forms for the support of social connections. Text messaging is changing everything from how operators market their plans to how advertisers and service providers reach consumers. But just as technology usage of social media and internet access are different across generational boundaries, text messaging usage and habits may also be different for various generational groups. The majority of peer-reviewed research regarding text messaging …


Data Masking, Encryption, And Their Effect On Classification Performance: Trade-Offs Between Data Security And Utility, Juan C. Asenjo Jan 2017

Data Masking, Encryption, And Their Effect On Classification Performance: Trade-Offs Between Data Security And Utility, Juan C. Asenjo

CCE Theses and Dissertations

As data mining increasingly shapes organizational decision-making, the quality of its results must be questioned to ensure trust in the technology. Inaccuracies can mislead decision-makers and cause costly mistakes. With more data collected for analytical purposes, privacy is also a major concern. Data security policies and regulations are increasingly put in place to manage risks, but these policies and regulations often employ technologies that substitute and/or suppress sensitive details contained in the data sets being mined. Data masking and substitution and/or data encryption and suppression of sensitive attributes from data sets can limit access to important details. It is believed …


Effects Of Emf Emissions From Undersea Electric Cables On Coral Reef Fishes, Robert F. Jermain Jul 2016

Effects Of Emf Emissions From Undersea Electric Cables On Coral Reef Fishes, Robert F. Jermain

HCNSO Student Theses and Dissertations

The objective of this project was to determine if the electromagnetic field (EMF) emissions from undersea power cables impacted the local and transient marine life, with an emphasis on reef fishes. The work was done at South Florida Ocean Measurement Facility of Naval Surface Warfare Center, Carderock Division, Broward County, Florida. This facility functions as the hub for a range of active undersea detection and data transmission cables. It has multiple active submarine power cables that extend several miles offshore and which can deliver power and enable data transmission to and from a range of acoustic and EMF sensors. The …


15th Annual Undergraduate Student Symposium, Farquhar Honors College Apr 2016

15th Annual Undergraduate Student Symposium, Farquhar Honors College

Undergraduate Student Symposium

The Undergraduate Student Symposium, sponsored by the Farquhar Honors College, presents student projects through presentations, papers, films, and poster displays. The event serves as a “showcase” demonstrating the outstanding scholarship of undergraduate students at NSU. The symposium is open to undergraduate students from all disciplines. Projects cover areas of student scholarship ranging from the experimental and the applied to the computational, theoretical, artistic, and literary. They are taken from class assignments and independent projects. Project presentations can represent any stage in a concept’s evolution, from proposal and literature review to fully completed and realized scholarly work. As in past symposia, …


An Empirical Investigation Of The Willingness Of Us Intelligence Community Analysts To Contribute Knowledge To A Knowledge Management System (Kms) In A Highly Classified And Sensitive Environment, Robert Hambly Jan 2016

An Empirical Investigation Of The Willingness Of Us Intelligence Community Analysts To Contribute Knowledge To A Knowledge Management System (Kms) In A Highly Classified And Sensitive Environment, Robert Hambly

CCE Theses and Dissertations

Since September 11, 2001, the United States Government (USG) has possessed unparalleled capability in terms of dedicated intelligence and information collection assets supporting the analysts of the Intelligence Community (IC). The USG IC has sponsored, developed, and borne witness to extraordinary advances in technology, techniques, and procedures focused on knowledge harvesting, knowledge sharing, and collaboration. Knowledge, within successful (effective & productive) organizations, exists as a commodity; a commodity that can be created, captured, imparted, shared, and leveraged. The research problem that this study addressed is the challenge of maintaining strong organizational effectiveness and productivity through the use of an information …


A Usability And Learnability Case Study Of Glass Flight Deck Interfaces And Pilot Interactions Through Scenario-Based Training, Thomas James De Cino Jan 2016

A Usability And Learnability Case Study Of Glass Flight Deck Interfaces And Pilot Interactions Through Scenario-Based Training, Thomas James De Cino

CCE Theses and Dissertations

In the aviation industry, digitally produced and presented flight, navigation, and aircraft information is commonly referred to as glass flight decks. Glass flight decks are driven by computer-based subsystems and have long been a part of military and commercial aviation sectors. Over the past 15 years, the General Aviation (GA) sector of the aviation industry has become a recent beneficiary of the rapid advancement of computer-based glass flight deck (GFD) systems.

While providing the GA pilot considerable enhancements in the quality of information about the status and operations of the aircraft, training pilots on the use of glass flight decks …


14th Annual Undergraduate Student Symposium, Farquhar Honors College Apr 2015

14th Annual Undergraduate Student Symposium, Farquhar Honors College

Undergraduate Student Symposium

The Undergraduate Student Symposium, sponsored by the Farquhar College of Arts and Sciences, presents student projects through presentations, papers, and poster displays. The event serves as a “showcase” demonstrating the outstanding scholarship of undergraduate students at NSU. The symposium is open to undergraduate students from all disciplines. Projects cover areas of student scholarship ranging from the experimental and the applied to the computational, theoretical, artistic, and literary. They are taken from class assignments and independent projects. The projects do not have to be complete; presentations can represent any stage in the concept’s evolution, from proposal and literature review to fully …


12th Annual Undergraduate Student Symposium, Farquhar Honors College Apr 2013

12th Annual Undergraduate Student Symposium, Farquhar Honors College

Undergraduate Student Symposium

The Undergraduate Student Symposium, sponsored by the Farquhar College of Arts and Sciences, presents student projects through presentations, papers, and poster displays. The event serves as a “showcase” demonstrating the outstanding scholarship of undergraduate students at NSU. The Symposium is open to undergraduate students from all disciplines. Projects cover areas of student scholarship ranging from the experimental and the applied to the computational, theoretical, artistic, and literary. They are taken from class assignments as well as from independent projects. The projects do not have to be complete; presentations can represent any stage in the concept’s evolution, from proposal and literature …


Ocean Current Measurements: Challenges And Opportunities In The Florida Current, William E. Baxley Mar 2013

Ocean Current Measurements: Challenges And Opportunities In The Florida Current, William E. Baxley

HCNSO Student Capstones

The water velocities offshore south Florida are dominated by the Florida Current, and these effects result not only from the tremendous flow of water between Florida and the Bahamas, but also from the eddies and other rotational components imparted by the change in flow direction from eastward to northward along the Florida Keys and the end of the peninsula. These currents have been measured for decades, with methods ranging from subsurface floats to acoustic Doppler current profilers (ADCPs) and surface current measuring radars. Data suggests that there is a large degree of variability in the mean flow, including significant vorticity …


11th Annual Undergraduate Student Symposium, Farquhar Honors College Apr 2012

11th Annual Undergraduate Student Symposium, Farquhar Honors College

Undergraduate Student Symposium

The Undergraduate Student Symposium, sponsored by the Farquhar College of Arts and Sciences, presents student projects through presentations, papers, and poster displays. The event serves as a “showcase” demonstrating the outstanding scholarship of undergraduate students at NSU. The Symposium is open to undergraduate students from all disciplines. Projects cover areas of student scholarship ranging from the experimental and the applied to the computational, theoretical, artistic, and literary. They are taken from class assignments as well as from independent projects. The projects do not have to be complete; presentations can represent any stage in the concept’s evolution, from proposal and literature …