Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Oceanography and Atmospheric Sciences and Meteorology (1728)
- Physics (1477)
- Computer Sciences (1214)
- Engineering (1205)
- Life Sciences (1033)
-
- Oceanography (1013)
- Social and Behavioral Sciences (550)
- Earth Sciences (537)
- Chemistry (531)
- Environmental Sciences (494)
- Climate (454)
- Electrical and Computer Engineering (410)
- Marine Biology (409)
- Elementary Particles and Fields and String Theory (399)
- Nuclear (345)
- Artificial Intelligence and Robotics (276)
- Ecology and Evolutionary Biology (271)
- Quantum Physics (265)
- Mathematics (259)
- Engineering Physics (258)
- Computer Engineering (254)
- Medicine and Health Sciences (253)
- Public Affairs, Public Policy and Public Administration (239)
- Applied Mathematics (211)
- Plasma and Beam Physics (201)
- Information Security (195)
- Atmospheric Sciences (191)
- Biogeochemistry (180)
- Statistics and Probability (171)
- Keyword
-
- Climate change (156)
- Sea level rise (143)
- Phytoplankton (116)
- Chesapeake Bay (111)
- Machine learning (100)
-
- Physics (91)
- Virginia (87)
- Cavity (70)
- Scattering (62)
- Deep learning (61)
- Quantum chromodynamics (61)
- Flooding (58)
- Oceanography (57)
- Simulation (56)
- Model (51)
- Electron (44)
- Carbon (42)
- Algorithms (40)
- Variability (40)
- Sea level (39)
- Artificial intelligence (38)
- Temperature (38)
- Remote sensing (37)
- SRF (37)
- Resilience (36)
- Digital libraries (34)
- Dynamics (33)
- Neural networks (33)
- Circulation (32)
- Modeling (32)
- Publication Year
- Publication
-
- Physics Faculty Publications (836)
- OES Faculty Publications (471)
- OES Theses and Dissertations (379)
- CCPO Publications (340)
- Electrical & Computer Engineering Faculty Publications (297)
-
- Computer Science Faculty Publications (278)
- Chemistry & Biochemistry Faculty Publications (267)
- Mathematics & Statistics Faculty Publications (226)
- Biological Sciences Faculty Publications (179)
- Computer Science Theses & Dissertations (168)
- Physics Theses & Dissertations (164)
- Chemistry & Biochemistry Theses & Dissertations (137)
- Mathematics & Statistics Theses & Dissertations (123)
- Virginia Journal of Science (104)
- News Items (100)
- Cybersecurity Undergraduate Research Showcase (90)
- Electrical & Computer Engineering Theses & Dissertations (88)
- Biological Sciences Theses & Dissertations (81)
- CCPO Circulation (67)
- VMASC Publications (60)
- Mechanical & Aerospace Engineering Faculty Publications (58)
- Computational Modeling & Simulation Engineering Theses & Dissertations (56)
- Bioelectrics Publications (54)
- Engineering Management & Systems Engineering Faculty Publications (54)
- Engineering Technology Faculty Publications (52)
- Mechanical & Aerospace Engineering Theses & Dissertations (50)
- Engineering Management & Systems Engineering Theses & Dissertations (47)
- Civil & Environmental Engineering Faculty Publications (43)
- College of Sciences Posters (42)
- Civil & Environmental Engineering Theses & Dissertations (41)
- Publication Type
- File Type
Articles 151 - 180 of 5514
Full-Text Articles in Physical Sciences and Mathematics
Extracting Information From Twitter Screenshots, Tarannum Zaki, Michael L. Nelson, Michele C. Weigle
Extracting Information From Twitter Screenshots, Tarannum Zaki, Michael L. Nelson, Michele C. Weigle
Modeling, Simulation and Visualization Student Capstone Conference
Screenshots are prevalent on social media as a common approach for information sharing. Users rarely verify before sharing screenshots whether they are fake or real. Information sharing through fake screenshots can be highly responsible for misinformation and disinformation spread on social media. There are services of the live web and web archives that could be used to validate the content of a screenshot. We are going to develop a tool that would automatically provide a probability whether a screenshot is fake by using the services of the live web and web archives.
Automatic Generation Of Virtual Work Guide For Complex Procedures: A Case, Shan Liu, Yuzhong Shen
Automatic Generation Of Virtual Work Guide For Complex Procedures: A Case, Shan Liu, Yuzhong Shen
Modeling, Simulation and Visualization Student Capstone Conference
Practical work guides for complex procedures are significant and highly affect the efficiency and accuracy of on-site users. This paper presents a technique to generate virtual work guides automatically for complex procedures. Firstly, the procedure information is extracted from the electronic manual in PDF format. And then, the extracted procedure steps are mapped to the virtual model parts in preparation for animation between adjacent steps. Next, smooth animations of the procedure are generated based on a 3D natural cubic spline curve to improve the spatial ability of the work guide. In addition, each step's annotation is automatically adjusted to improve …
The Legacy Of Colonization And Civil Societies In South Africa, Erika Frydenlund, Melissa Miller-Felton, Bolu Ayankojo
The Legacy Of Colonization And Civil Societies In South Africa, Erika Frydenlund, Melissa Miller-Felton, Bolu Ayankojo
Modeling, Simulation and Visualization Student Capstone Conference
This research analyzes the unique ways that civil societies operate in Sub-Saharan Africa in the context of post-apartheid Cape Town, South Africa. Decades after the demise of apartheid, remnants of inequality remain without the promise of actionable change. We used a computational modeling approach to understand the dynamics of migrants in the receiving community as derived from qualitative interviews conducted with 24 stakeholders in Cape Town, South Africa between 2020 and 2021. Our findings show that the presence of NGOs can promote access to resources and reduce xenophobia if they can have the right influence on government policies.
Digital Game-Based Approach To Math Learning For Students, Gul Ayaz, Katherine Smith
Digital Game-Based Approach To Math Learning For Students, Gul Ayaz, Katherine Smith
Modeling, Simulation and Visualization Student Capstone Conference
Mathematics is an important subject that is pervasive across many disciplines. It is also a subject that has proven to be challenging to both teach and learn. Students face many challenges with learning math such as a lack of motivation and anxiety. To address these challenges, game-based learning has become a popular approach to stimulate students and create a more positive classroom environment. It can serve as an alternative or supplement to traditional teaching and can better engage students while developing a positive attitude toward learning. The use of games in a classroom can create a more exciting and engaging …
Gpu Utilization: Predictive Sarimax Time Series Analysis, Dorothy Dorie Parry
Gpu Utilization: Predictive Sarimax Time Series Analysis, Dorothy Dorie Parry
Modeling, Simulation and Visualization Student Capstone Conference
This work explores collecting performance metrics and leveraging the output for prediction on a memory-intensive parallel image classification algorithm - Inception v3 (or "Inception3"). Experimental results were collected by nvidia-smi on a computational node DGX-1, equipped with eight Tesla V100 Graphic Processing Units (GPUs). Time series analysis was performed on the GPU utilization data taken, for multiple runs, of Inception3’s image classification algorithm (see Figure 1). The time series model applied was Seasonal Autoregressive Integrated Moving Average Exogenous (SARIMAX).
Lidar Buoy Detection For Autonomous Marine Vessel Using Pointnet Classification, Christopher Adolphi, Dorothy Dorie Parry, Yaohang Li, Masha Sosonkina, Ahmet Saglam, Yiannis E. Papelis
Lidar Buoy Detection For Autonomous Marine Vessel Using Pointnet Classification, Christopher Adolphi, Dorothy Dorie Parry, Yaohang Li, Masha Sosonkina, Ahmet Saglam, Yiannis E. Papelis
Modeling, Simulation and Visualization Student Capstone Conference
Maritime autonomy, specifically the use of autonomous and semi-autonomous maritime vessels, is a key enabling technology supporting a set of diverse and critical research areas, including coastal and environmental resilience, assessment of waterway health, ecosystem/asset monitoring and maritime port security. Critical to the safe, efficient and reliable operation of an autonomous maritime vessel is its ability to perceive on-the-fly the external environment through onboard sensors. In this paper, buoy detection for LiDAR images is explored by using several tools and techniques: machine learning methods, Unity Game Engine (herein referred to as Unity) simulation, and traditional image processing. The Unity Game …
Assessing Frustration Towards Venezuelan Migrants In Columbia: Path Analysis On Newspaper Coded Data, Brian Llinás, Guljannat Huseynli, Erika Frydenlund, Katherine Palacia, Jose Padilla
Assessing Frustration Towards Venezuelan Migrants In Columbia: Path Analysis On Newspaper Coded Data, Brian Llinás, Guljannat Huseynli, Erika Frydenlund, Katherine Palacia, Jose Padilla
Modeling, Simulation and Visualization Student Capstone Conference
This study analyzes the impact of Venezuelan migrants on local frustration levels in Colombia. The study found a relationship between the influx of Venezuelan migrants and the level of frustration among locals towards migrants, infrastructure, government, and geopolitics. Additionally, we identified that frustration types have an impact on other frustrations. The study used articles from a national newspaper in Colombia from 2015 to 2020. News articles were coded during a previous study qualitatively and categorized into frustration types. The code frequencies were then used as variables in this study. We used path modeling to statistically study the relationship between dependent …
The Effectiveness Of Visualization Techniques For Supporting Decision-Making, Cansu Yalim, Holly A. H. Handley
The Effectiveness Of Visualization Techniques For Supporting Decision-Making, Cansu Yalim, Holly A. H. Handley
Modeling, Simulation and Visualization Student Capstone Conference
Although visualization is beneficial for evaluating and communicating data, the efficiency of various visualization approaches for different data types is not always evident. This research aims to address this issue by investigating the usefulness of several visualization techniques for various data kinds, including continuous, categorical, and time-series data. The qualitative appraisal of each technique's strengths, weaknesses, and interpretation of the dataset is investigated. The research questions include: which visualization approaches perform best for different data types, and what factors impact their usefulness? The absence of clear directions for both researchers and practitioners on how to identify the most effective visualization …
Enhancement Of Deep Learning Protein Structure Prediction, Ruoming Shen
Enhancement Of Deep Learning Protein Structure Prediction, Ruoming Shen
Modeling, Simulation and Visualization Student Capstone Conference
Protein modeling is a rapidly expanding field with valuable applications in the pharmaceutical industry. Accurate protein structure prediction facilitates drug design, as extensive knowledge about the atomic structure of a given protein enables scientists to target that protein in the human body. However, protein structure identification in certain types of protein images remains challenging, with medium resolution cryogenic electron microscopy (cryo-EM) protein density maps particularly difficult to analyze. Recent advancements in computational methods, namely deep learning, have improved protein modeling. To maximize its accuracy, a deep learning model requires copious amounts of up-to-date training data.
This project explores DeepSSETracer, a …
Behind Derogatory Migrants' Terms For Venezuelan Migrants: Xenophobia And Sexism Identification With Twitter Data And Nlp, Joseph Martínez, Melissa Miller-Felton, Jose Padilla, Erika Frydenlund
Behind Derogatory Migrants' Terms For Venezuelan Migrants: Xenophobia And Sexism Identification With Twitter Data And Nlp, Joseph Martínez, Melissa Miller-Felton, Jose Padilla, Erika Frydenlund
Modeling, Simulation and Visualization Student Capstone Conference
The sudden arrival of many migrants can present new challenges for host communities and create negative attitudes that reflect that tension. In the case of Colombia, with the influx of over 2.5 million Venezuelan migrants, such tensions arose. Our research objective is to investigate how those sentiments arise in social media. We focused on monitoring derogatory terms for Venezuelans, specifically veneco and veneca. Using a dataset of 5.7 million tweets from Colombian users between 2015 and 2021, we determined the proportion of tweets containing those terms. We observed a high prevalence of xenophobic and defamatory language correlated with the …
An Algorithm For Finding Data Dependencies In An Event Graph, Erik J. Jensen
An Algorithm For Finding Data Dependencies In An Event Graph, Erik J. Jensen
Modeling, Simulation and Visualization Student Capstone Conference
This work presents an algorithm for finding data dependencies in a discrete-event simulation system, from the event graph of the system. The algorithm can be used within a parallel discrete-event simulation. Also presented is an experimental system and event graph, which is used for testing the algorithm. Results indicate that the algorithm can provide information about which vertices in the experimental event graph can affect other vertices, and the minimum amount of time in which this interference can occur.
U-Net Based Multiclass Semantic Segmentation For Natural Disaster Based Satellite Imagery, Nishat Ara Nipa
U-Net Based Multiclass Semantic Segmentation For Natural Disaster Based Satellite Imagery, Nishat Ara Nipa
Modeling, Simulation and Visualization Student Capstone Conference
Satellite image analysis of natural disasters is critical for effective emergency response, relief planning, and disaster prevention. Semantic segmentation is believed to be on of the best techniques to capture pixelwise information in computer vision. In this work we will be using a U-Net architecture to do a three class semantic segmentation for the Xview2 dataset to capture the level of damage caused by different natural disaster which is beyond the visual scope of human eyes.
Statistical Approach To Quantifying Interceptability Of Interaction Scenarios For Testing Autonomous Surface Vessels, Benjamin E. Hargis, Yiannis E. Papelis
Statistical Approach To Quantifying Interceptability Of Interaction Scenarios For Testing Autonomous Surface Vessels, Benjamin E. Hargis, Yiannis E. Papelis
Modeling, Simulation and Visualization Student Capstone Conference
This paper presents a probabilistic approach to quantifying interceptability of an interaction scenario designed to test collision avoidance of autonomous navigation algorithms. Interceptability is one of many measures to determine the complexity or difficulty of an interaction scenario. This approach uses a combined probability model of capability and intent to create a predicted position probability map for the system under test. Then, intercept-ability is quantified by determining the overlap between the system under test probability map and the intruder’s capability model. The approach is general; however, a demonstration is provided using kinematic capability models and an odometry-based intent model.
Towards Nlp-Based Conceptual Modeling Frameworks, David Shuttleworth, Jose Padilla
Towards Nlp-Based Conceptual Modeling Frameworks, David Shuttleworth, Jose Padilla
Modeling, Simulation and Visualization Student Capstone Conference
This paper presents preliminary research using Natural Language Processing (NLP) to support the development of conceptual modeling frameworks. NLP-based frameworks are intended to lower the barrier of entry for non-modelers to develop models and to facilitate communication across disciplines considering simulations in research efforts. NLP drives conceptual modeling in two ways. Firstly, it attempts to automate the generation of conceptual models and simulation specifications, derived from non-modelers’ narratives, while standardizing the conceptual modeling process and outcome. Secondly, as the process is automated, it is simpler to replicate and be followed by modelers and non-modelers. This allows for using a common …
Review Of Nighttime Temperature Effects On Long-Term Health Condition Through Sleep Studies, Sydnie Matkins
Review Of Nighttime Temperature Effects On Long-Term Health Condition Through Sleep Studies, Sydnie Matkins
Modeling, Simulation and Visualization Student Capstone Conference
Over the past 40 years, there has been increasing interest in human sleep quality and duration. This nonsystematic review looked at over 80 peer-reviewed papers on the association among sleep, temperature, and long-term health conditions. Generally, warmer temperatures lend to poorer sleep quality, and poor sleep quality lend to mental illness and a higher risk of coronary heart disease and mortality. Future research should be to conduct a study that relies more on health records rather than questionnaires to accurately map current and future health quality.
Enhancing Pedestrian-Autonomous Vehicle Safety In Low Visibility Scenarios: A Comprehensive Simulation Method, Zizheng Yan, Yang Liu, Hong Yang
Enhancing Pedestrian-Autonomous Vehicle Safety In Low Visibility Scenarios: A Comprehensive Simulation Method, Zizheng Yan, Yang Liu, Hong Yang
Modeling, Simulation and Visualization Student Capstone Conference
Self-driving cars raise safety concerns, particularly regarding pedestrian interactions. Current research lacks a systematic understanding of these interactions in diverse scenarios. Autonomous Vehicle (AV) performance can vary due to perception accuracy, algorithm reliability, and environmental dynamics. This study examines AV-pedestrian safety issues, focusing on low visibility conditions, using a co-simulation framework combining virtual reality and an autonomous driving simulator. 40 experiments were conducted, extracting surrogate safety measures (SSMs) from AV and pedestrian trajectories. The results indicate that low visibility can impair AV performance, increasing conflict risks for pedestrians. AV algorithms may require further enhancements and validations for consistent safety performance …
Unveiling The Dark Web And The Impact Of Revil's Cyberattacks, Tanya Sasnouskaya
Unveiling The Dark Web And The Impact Of Revil's Cyberattacks, Tanya Sasnouskaya
Cybersecurity Undergraduate Research Showcase
The United States Navy originally created the Dark Web for intelligence purposes, but it was later promoted by Western countries as a tool for safeguarding privacy and anonymity. Currently, the Dark Web serves as a platform for deliberate information leaks by nations that want to keep certain information out of the mainstream media. This paper provides an overview of the dark web and the browser used to access it. It covers the layers of the internet and highlights REvil ransomware and some of its technical details. By understanding these risks, users can take appropriate preventive measures to protect themselves from …
Role Of Ai In Threat Detection And Zero-Day Attacks, Kelly Morgan
Role Of Ai In Threat Detection And Zero-Day Attacks, Kelly Morgan
Cybersecurity Undergraduate Research Showcase
Cybercrime and attack methods have been steadily increasing since the 2019 pandemic. In the years following 2019, the number of victims and attacks per hour rapidly increased as businesses and organizations transitioned to digital environments for business continuity amidst lockdowns. In most scenarios cybercriminals continued to use conventional attack methods and known vulnerabilities that would cause minimal damage to an organization with a robust cyber security posture. However, zero-day exploits have skyrocketed across all industries with an increasingly growing technological landscape encompassing internet of things (IoT), cloud hosting, and more advanced mobile technologies. Reports by Mandiant Threat Intelligence (2022) concluded …
Cybersecurity Workforce Development In Nigeria: Transforming The Cybercrime Gangs Into Cybersecurity Specialists, Olohi Favor Anteyi
Cybersecurity Workforce Development In Nigeria: Transforming The Cybercrime Gangs Into Cybersecurity Specialists, Olohi Favor Anteyi
Cybersecurity Undergraduate Research Showcase
This paper addresses the issue of cybercrime in Nigeria and the possibility of creating a cybersecurity workforce development program for cyber criminals to develop their skills for the cybersecurity profession, which may facilitate Nigeria’s economic development.
Coastal Squeeze, Climigration, Equity, Oh My! An Agenda For Engaged And Applied Research On Social Equity And Coastal Resilience, Wie Yusuf, Tom Allen, Nicole Hutton, Jennifer Whytlaw, Marina Saitgalina, Joshua Behr
Coastal Squeeze, Climigration, Equity, Oh My! An Agenda For Engaged And Applied Research On Social Equity And Coastal Resilience, Wie Yusuf, Tom Allen, Nicole Hutton, Jennifer Whytlaw, Marina Saitgalina, Joshua Behr
Presentations, Lectures, Posters, Reports
No abstract provided.
Some Legal And Practical Challenges In The Investigation Of Cybercrime, Ritz Carr
Some Legal And Practical Challenges In The Investigation Of Cybercrime, Ritz Carr
Cybersecurity Undergraduate Research Showcase
According to the Internet Crime Complaint Center (IC3), in 2021, the United States lost around $6.9 billion to cybercrime. In 2022, that number grew to over $10.2 billion (IC3, 2022). In one of many efforts to combat cybercrimes, at least 40 states “introduced or considered more than 250 bills or resolutions that deal significantly with cybersecurity” with 24 states officially enacting a total of 41 bills (National Conference on State Legislatures, 2022).
The world of cybercrime evolves each day. Nevertheless, challenges arise when we investigate and prosecute cybercrime, which will be examined in the following collection of essays that highlight …
The Linkage Between The Climate Change And The Cybercrimes, Min Kim
The Linkage Between The Climate Change And The Cybercrimes, Min Kim
Cybersecurity Undergraduate Research Showcase
At the beginning of the new era, the rise of the Fourth Industrial Revolution has been rapidly transforming society into a new form that has never been experienced before. While previous industrial revolutions have also contributed to societal growth through phenomenal inventions and discoveries, the Fourth Industrial Revolution has the potential to break the most conventional rule, and one that has dominated social and economic activities: physical interaction. In the near future, sitting at the office, having an in-person meeting, or going on a business trip may no longer be needed as physical barriers are destroyed by cyberspace. However, two …
Cyber Security In Cyber Space, James D. Lee Jr.
Cyber Security In Cyber Space, James D. Lee Jr.
Cybersecurity Undergraduate Research Showcase
For almost twenty years, the Internet has been a driving force in global communication and an integral part of people's everyday lives. As a result of technical developments and declining prices, over 3 billion people worldwide now utilize the Internet. The Internet has created a global infrastructure, and it is worth billions of dollars annually to the global economy (Judge et al.). Today's economic, commercial, cultural, social, and governmental activities and exchanges occur in Cyberspace, involving individuals, enterprises, non-profit organizations, and government and governmental agencies (Aghajani and Ghadimi 220). Cyberspace is the birthplace of much of the world's most essential …
Leveraging Artificial Intelligence And Machine Learning For Enhanced Cybersecurity: A Proposal To Defeat Malware, Emmanuel Boateng
Leveraging Artificial Intelligence And Machine Learning For Enhanced Cybersecurity: A Proposal To Defeat Malware, Emmanuel Boateng
Cybersecurity Undergraduate Research Showcase
Cybersecurity is very crucial in the digital age in order to safeguard the availability, confidentiality, and integrity of data and systems. Mitigation techniques used in the industry include Multi-factor Authentication (MFA), Incident Response Planning (IRP), Security Information and Event Management (SIEM), and Signature-based and Heuristic Detection.
MFA is employed as an additional layer of protection in several sectors to help prevent unauthorized access to sensitive data. IRP is a plan in place to address cybersecurity problems efficiently and expeditiously. SIEM offers real-time analysis and alerts the system of threats and vulnerabilities. Heuristic-based detection relies on detecting anomalies when it comes …
A Targeted Study On The Match Between Cybersecurity Higher Education Offerings And Workforce Needs, Diane Murphy, Nektaria Tryfona, Andrew M. Marshall
A Targeted Study On The Match Between Cybersecurity Higher Education Offerings And Workforce Needs, Diane Murphy, Nektaria Tryfona, Andrew M. Marshall
Virginia Journal of Science
The Cybersecurity Workforce Gap is a call to action on a two-fold problem: the worldwide shortage of qualified cybersecurity workers and the need to develop a growing highly-knowledgeable, agile, well-trained cybersecurity workforce. This paper presents a methodological approach to achieve this goal in the Northern Virginia area. The area is characterized by an abundance of cyber-related industries, government agencies, and large businesses with high demand of skilled cybersecurity workers; at the same time, academic institutions offer cutting edge education and training access to highly capable students. Central to this methodology is the collaboration between local academia and industry and it …
Artificial Intelligence In Higher Education: The State Of The Field, Helen Crompton, Diane Burke
Artificial Intelligence In Higher Education: The State Of The Field, Helen Crompton, Diane Burke
Teaching & Learning Faculty Publications
This systematic review provides unique findings with an up-to-date examination of artificial intelligence (AI) in higher education (HE) from 2016 to 2022. Using PRISMA principles and protocol, 138 articles were identified for a full examination. Using a priori, and grounded coding, the data from the 138 articles were extracted, analyzed, and coded. The findings of this study show that in 2021 and 2022, publications rose nearly two to three times the number of previous years. With this rapid rise in the number of AIEd HE publications, new trends have emerged. The findings show that research was conducted in six of …
Synthesis, Characterization, And Cytotoxicity Studies Of A Copper(Ii) Complex With Vanillin 3-Ethyl-Thiosemcarbazone A Ligand, Novia Mann, Ifeoluwa Oyeyemi, Duaa R. Alajroush, Elizabeth A. Tonsel-White, Stephen J. Beebe, Alvin Holder
Synthesis, Characterization, And Cytotoxicity Studies Of A Copper(Ii) Complex With Vanillin 3-Ethyl-Thiosemcarbazone A Ligand, Novia Mann, Ifeoluwa Oyeyemi, Duaa R. Alajroush, Elizabeth A. Tonsel-White, Stephen J. Beebe, Alvin Holder
Undergraduate Research Symposium
Triple-negative breast cancer (TNBC) is one of the most aggressive and challenging breast cancer subtypes to treat, as these cancer cells lack three common receptors: estrogen, progesterone, and human epidermal growth factor receptor 2. The multiple oxidation states transition metals can occupy have made this narrowly explored group popular for anti-cancer research in recent decades. Furthermore, the success of cisplatin, which has platinum as a metal center, while being a cancer-fighting agent with serious side effects, has caused other metal centers to be investigated as possible alternatives as chemotherapeutic drugs. Copper, as a biologically essential metal, makes an attractive candidate …
Margalefidinium Polykrikoides Cyst Resuspension In The Lafayette River, A Sub-Tributary Of The Chesapeake Bay, Gabrielle Greaney, Eduardo Perez Vega, Katherine Crider, Dreux Chappell, Kimberly Powell, Richard Hale, Peter Bernhardt, Margaret Mulholland
Margalefidinium Polykrikoides Cyst Resuspension In The Lafayette River, A Sub-Tributary Of The Chesapeake Bay, Gabrielle Greaney, Eduardo Perez Vega, Katherine Crider, Dreux Chappell, Kimberly Powell, Richard Hale, Peter Bernhardt, Margaret Mulholland
Undergraduate Research Symposium
Harmful Algal Blooms are a collection of algae in a body of water that can cause serious environmental issues and health problems in both people and aquatic organisms. Dinoflagellates are microscopic, unicellular, and eukaryotic organisms that are well known for forming harmful algal blooms because of eutrophication. Coastal Virginia suffers from HABs in the Chesapeake Bay and its tributaries. A common species of dinoflagellate, known as Margalefidinium polykrikoides exists in the Chesapeake Bay. The purpose of this study is to determine if sediment resuspension produced by wind generated surface gravity waves cause cysts (dinoflagellate resting stages) to be suspended into …
Partnering To Advance Equity In Coastal Resilience: Lessons Learned For Research And Practice Collaborations For On-The-Ground Projects, Marina Saitgalina, Jennifer Whytlaw, Nicole Hutton, Tom Allen, Joshua Behr, Wie Yusuf
Partnering To Advance Equity In Coastal Resilience: Lessons Learned For Research And Practice Collaborations For On-The-Ground Projects, Marina Saitgalina, Jennifer Whytlaw, Nicole Hutton, Tom Allen, Joshua Behr, Wie Yusuf
Presentations, Lectures, Posters, Reports
No abstract provided.
Advancing An Agenda For Social Equity And Coastal Resilience Through A Multi-Sectoral, Multi-Disciplinary And Applied Research Lens, Wie Yusuf, Marina Saitgalina, Jennifer Whytlaw, Nicole Hutton, Tom Allen, Joshua Behr
Advancing An Agenda For Social Equity And Coastal Resilience Through A Multi-Sectoral, Multi-Disciplinary And Applied Research Lens, Wie Yusuf, Marina Saitgalina, Jennifer Whytlaw, Nicole Hutton, Tom Allen, Joshua Behr
Presentations, Lectures, Posters, Reports
No abstract provided.