Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 27 of 27

Full-Text Articles in Engineering

The Rapid Increase Of Ransomware Attacks Over The 21st Century And Mitigation Strategies To Prevent Them From Arising, Sanjay Jacob May 2023

The Rapid Increase Of Ransomware Attacks Over The 21st Century And Mitigation Strategies To Prevent Them From Arising, Sanjay Jacob

Senior Honors Theses

Cyber-attacks have continued to become more common throughout the past century as more people are exposed to the Internet. Every year, various studies, reports, and scholarly research is done to emphasis the rapid increase of attacks. In this honors thesis, the student sought to gather further information about the rise of ransomware attacks, various cyber threats, discuss the psychological manipulation that exist, and provided the reader with an ethical complement of cyber-attacks. Additionally, case studies from previous research have been analyzed and mitigation strategies have been explained to provide the reader with practical application. This research emphasizes in on key …


Drone Detection Using Yolov5, Burchan Aydin, Subroto Singha Feb 2023

Drone Detection Using Yolov5, Burchan Aydin, Subroto Singha

Faculty Publications

The rapidly increasing number of drones in the national airspace, including those for recreational and commercial applications, has raised concerns regarding misuse. Autonomous drone detection systems offer a probable solution to overcoming the issue of potential drone misuse, such as drug smuggling, violating people’s privacy, etc. Detecting drones can be difficult, due to similar objects in the sky, such as airplanes and birds. In addition, automated drone detection systems need to be trained with ample amounts of data to provide high accuracy. Real-time detection is also necessary, but this requires highly configured devices such as a graphical processing unit (GPU). …


Automation, Ai, And Future Skills Needs: An Irish Perspective, Raimunda Bukartaite, Daire Hooper Jan 2023

Automation, Ai, And Future Skills Needs: An Irish Perspective, Raimunda Bukartaite, Daire Hooper

Articles

This study explores insights from key stakeholders into the skills they believe will be necessary for the future of work as we become more reliant on artificial intelligence (AI) and technology. The study also seeks to understand what human resource policies and educational interventions are needed to support and take advantage of these changes.


A Robust Platform For Mobile Robotics Teaching And Developing Using Arduino’S Integrated Development Environment (Ide) For Programming The Arduino Mega 2560, Sajjad Alhassan Dec 2022

A Robust Platform For Mobile Robotics Teaching And Developing Using Arduino’S Integrated Development Environment (Ide) For Programming The Arduino Mega 2560, Sajjad Alhassan

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

In light of the rapid pace at which development happens with modern technology, mobile robots play an important role in our daily lives. This is due to their great importance in facilitating the affairs of life in various economic, commercial, industrial, scientific, and many other fields. In this research and project, we have restructured the microcontroller and system for one of the mobile robots (CEENBOT) that was designed by the University of Nebraska and replaced it with an Arduino Mega 2560.

The purpose of using the Arduino Mega 2560 robot is to provide alternative programming for the CEENBOT platform to …


Society Dilemma Of Computer Technology Management In Today's World, Iwasan D. Kejawa Ed.D Apr 2022

Society Dilemma Of Computer Technology Management In Today's World, Iwasan D. Kejawa Ed.D

School of Computing: Faculty Publications

Abstract - Is it true that some of the inhabitants of the world’s today are still hesitant in using computers? Research has shown that today many people are still against the use of computers. Computer technology management can be said to be obliterated by security problems. Research shows that some people in society feel reluctant or afraid to use computers because of errors and exposure of their privacy and their sophistication, which sometimes are caused by computer hackers and malfunction of the computers. The dilemma of not utilizing computer technology at all or, to its utmost, by certain people in …


Designing Respectful Tech: What Is Your Relationship With Technology?, Noreen Y. Whysel Feb 2022

Designing Respectful Tech: What Is Your Relationship With Technology?, Noreen Y. Whysel

Publications and Research

According to research at the Me2B Alliance, people feel they have a relationship with technology. It’s emotional. It’s embodied. And it’s very personal. We are studying digital relationships to answer questions like “Do people have a relationship with technology?” “What does that relationship feel like?” And “Do people understand the commitments that they are making when they explore, enter into and dissolve these relationships?” There are parallels between messy human relationships and the kinds of relationships that people develop with technology. As with human relationships, we move through states of discovery, commitment and breakup with digital applications as well. Technology …


The Evolution Of The Internet And Social Media: A Literature Review, Charles Alves De Castro, Isobel O'Reilly Dr, Aiden Carthy Dec 2021

The Evolution Of The Internet And Social Media: A Literature Review, Charles Alves De Castro, Isobel O'Reilly Dr, Aiden Carthy

Articles

This article reviews and analyses factors impacting the evolution of the internet, the web, and social media channels, charting historic trends and highlight recent technological developments. The review comprised a deep search using electronic journal databases. Articles were chosen according to specific criteria with a group of 34 papers and books selected for complete reading and deep analysis. The 34 elements were analysed and processed using NVIVO 12 Pro, enabling the creation of dimensions and categories, codes and nodes, identifying the most frequent words, cluster analysis of the terms, and creating a word cloud based on each word's frequency. The …


Modernization Of Scienttific Mathematics Formula In Technology, Iwasan D. Kejawa Ed.D, Prof. Iwasan D. Kejawa Ed.D Jul 2021

Modernization Of Scienttific Mathematics Formula In Technology, Iwasan D. Kejawa Ed.D, Prof. Iwasan D. Kejawa Ed.D

Department of Mathematics: Faculty Publications

Abstract
Is it true that we solve problem using techniques in form of formula? Mathematical formulas can be derived through thinking of a problem or situation. Research has shown that we can create formulas by applying theoretical, technical, and applied knowledge. The knowledge derives from brainstorming and actual experience can be represented by formulas. It is intended that this research article is geared by an audience of average knowledge level of solving mathematics and scientific intricacies. This work details an introductory level of simple, at times complex problems in a mathematical epidermis and computability and solvability in a Computer Science. …


Effective Gamification Within Educational Virtual Reality Environments, Adrian Pilkington Apr 2021

Effective Gamification Within Educational Virtual Reality Environments, Adrian Pilkington

Honors Theses

With the advent and now widespread use of mobile phones and computers in educational settings, exploring effective and new ways of using technology in the classroom is important for educating the next generation of students. Innovative technology, like Virtual Reality, has started being discussed and researched for its potential benefits in educational settings. This paper presents a brief history of VR, game theory, and examines two VR educational games from the University of Nebraska-Lincoln College of Nursing’s (UNMC) Senior Design teams. The two games will be used to replace lecture-style classes and to go out and educate the community. We …


The Influence Of Information Technology Governance Audit Using Cobit 5 For The Development Public Library : (Case Study : Public Library In East Java ), Ilham M, Anis Eliyana, Indrianawati Usman Oct 2020

The Influence Of Information Technology Governance Audit Using Cobit 5 For The Development Public Library : (Case Study : Public Library In East Java ), Ilham M, Anis Eliyana, Indrianawati Usman

Library Philosophy and Practice (e-journal)

This study current technological developments have entered almost into the lines of people's lives. Currently, many public library have grown even bigger. And this development does not escape the good management of information technology governance. To maximize management to a better level, public library need information technology governance audits. The information technology audit used in this study uses the COBIT 5 framework which focuses on the APO04 and DSS01 domains. This study aims to improve the quality of services owned and to increase its competitiveness. The results of this study refer to the vision and mission of the public library …


Born-Digital Preservation: The Art Of Archiving Photos With Script And Batch Processing, Rachel S. Evans, Leslie Grove, Sharon Bradley Jul 2020

Born-Digital Preservation: The Art Of Archiving Photos With Script And Batch Processing, Rachel S. Evans, Leslie Grove, Sharon Bradley

Articles, Chapters and Online Publications

With our IT department preparing to upgrade the University of Georgia’s Alexander Campbell King Law Library (UGA Law Library) website from Drupal 7 to 8 this fall, a web developer, an archivist, and a librarian teamed up a year ago to make plans for preserving thousands of born-digital images. We wanted to harvest photographs housed only in web-based photo galleries on the law school website and import them into our repository’s collection. The problem? There were five types of online photo galleries, and our current repository did not include appropriate categories for all of the photographs. The solution? Expand our …


The Effects Of Computer And Information Technology On Education, Iwasan D. Kejawa Ed.D Jun 2020

The Effects Of Computer And Information Technology On Education, Iwasan D. Kejawa Ed.D

School of Computing: Faculty Publications

In the society of ours, is it true really that computers and information technology have contributed immensely to the way we learn? After observing and reading various educational paraphernalia and scanning the environment research has shown that the educational systems have greatly been impacted by computers and information technology. With the growth of technology, the ways we learn have been improved tremendously. Innovative technologies have contributed to the innovation of learning in the education arena and outside. The traditional ways of conveying instructions to learners have been augmented with the use of computers information technologies. The educational system of our …


Are You Experienced? - Simple Timesheets For Experiential Learning Courses, Eleanor C. Lanier, Leslie Grove Jun 2019

Are You Experienced? - Simple Timesheets For Experiential Learning Courses, Eleanor C. Lanier, Leslie Grove

Presentations

ABA Standards require students to complete six credit hours of experiential learning. Hours must be tracked, and field placements in particular require students to keep logs of their activities to document compliance. Various web-based solutions are used, including “high-end suites like CORE ELMS, the Symplicity experiential learning module, and the basic and free Dropbox and Google Suite” as well as Canvas, and a time-tracking program called Tick. Here at the University of Georgia School of Law, we decided to add simple timesheet functionality to our Drupal-based student portal, allowing students to securely log their hours and activities, and faculty to …


The Pedagogy Of Design And Technology At Xavier University Of Louisiana, New Orleans, Shayna Tova Blum Apr 2019

The Pedagogy Of Design And Technology At Xavier University Of Louisiana, New Orleans, Shayna Tova Blum

Faculty and Staff Publications

Abstract. Xavier University of Louisiana (XULA) is a Science, Technology, Engineering, and Mathematics (STEM) university located in New Orleans, Louisiana. As a Historically Black University (HBCU), the university serves a diverse community of students in which many are first-generation, college graduates. Students enrolled in Design courses at XULA are studying in Bachelor of Science and Bachelor of Art programs and majoring in subjects such as Computer Science, Physics, Mass Communication, Art, Business, and Science. The interdisciplinary student environment offers a unique opportunity for collaboration and peer learning, whereby students are able to share diverse perspectives on a topic by relating …


Great Modules In Drupal 7... And Drupal 8...?, Rachel S. Evans, Lauren Blais Feb 2019

Great Modules In Drupal 7... And Drupal 8...?, Rachel S. Evans, Lauren Blais

Presentations

The two presenters each shared their favorite Drupal modules, giving site examples of each in action and talking about the benefits and drawbacks of each. Most UGA websites using Drupal are in the process of migrating content from 7 to 8, so each module discussed was then described in terms of availability in 8. The following five modules were explored:

  • Quick Tabs
  • Flex Slider
  • Geolocation and Leaflet
  • Biblio (not in D8)
  • Environment Indicator


Human Performance Modelling For Adaptive Automation, Maria Chiara Leva, M. Wilkins, F. Coster Jan 2018

Human Performance Modelling For Adaptive Automation, Maria Chiara Leva, M. Wilkins, F. Coster

Conference papers

The relentless march of technology is increasingly opening new possibilities for the application of automation and new horizons for human machine interaction. However there is insufficient scientific evidence on human factors for modern socio-technical systems supporting the guidelines currently used to design Human Machine Interfaces (HMI) (ISA 2014). This dearth of knowledge presents a particular risk in safety critical industries. The continuing 60–90% of accidents currently that are rooted in Human Factors (HF) and the rapid developments in the Internet of Things (IoT) and its novel automation archetypes means that the requirements for new interfaces are becoming more demanding, and …


The Rhetoric Of Science Education And Technology, Iwasan D. Kejawa Jan 2018

The Rhetoric Of Science Education And Technology, Iwasan D. Kejawa

School of Computing: Faculty Publications

Nearly thousands of science experiments are performed both on humans and animals every year in the United States (Gregory, 1999). Does Science enormously play a role in the well-beings of individual in the society? Research has found that science education is through motivation and satisfying the needs of humans. The scientific world is part of an elongated human development. This can be substantiated with the use and evolution of TECHNOLOGY and SCIENCE (Minton, 2004). Education of the entities that comprise the need to achieve the goal of TECHNOLOGY and SCIENCE which are important issues of today. Research has shown that …


Computer Science Technology Education: An Incredible Explosion, Iwasan D. Kejawa Jan 2017

Computer Science Technology Education: An Incredible Explosion, Iwasan D. Kejawa

School of Computing: Faculty Publications

This paper explore what computers are, their usages and their functionalities. Computers can be used to learn or comprehend the understanding of all subjects, be it physics aerobics, swimming, biology, mathematics, agriculture, chemistry, business administration or commerce, just to name a few. In education, computers are used to project information to individuals in the classrooms or anywhere education is taking place, in churches, homes, schools, conference halls and so on. It is also used to convey the logic of a subject or behind a topic. Computers play an important role in educating our mind. With the usage of computers, we …


Studying The Effects Of Serpentine Soil On Adapted And Non-Adapted Species Using Arduino Technology, Kiana Saniee, Edward Himelblau, Brian Paavo Oct 2016

Studying The Effects Of Serpentine Soil On Adapted And Non-Adapted Species Using Arduino Technology, Kiana Saniee, Edward Himelblau, Brian Paavo

STAR Program Research Presentations

Abstract: Serpentine soils are formed from ultramafic rocks and are represent an extreme environment for plants. Serpentine soils are unique in that they carry high concentrations of heavy metals, are nutrient deficient, particularly in calcium, and have poor water retention capabilities. Although these soils constitute harsh conditions for plant growth, there are a number of species that are adapted and even endemic to serpentine soil. Water retention by commercial potting mix was compared with serpentine soil. Also, serpentine adapted and non-adapted species were grown in both soil treatments and physiological data were collected. We used the Arduino electronic platform to …


Fundamentals Of Library Instruction, Darren Sweeper Jun 2015

Fundamentals Of Library Instruction, Darren Sweeper

Sprague Library Scholarship and Creative Works

No abstract provided.


Toward A Closer Integration Of Law And Computer Science, Christopher S. Yoo Jan 2014

Toward A Closer Integration Of Law And Computer Science, Christopher S. Yoo

All Faculty Scholarship

Legal issues increasingly arise in increasingly complex technological contexts. Prominent recent examples include the Stop Online Piracy Act (SOPA) and the Protect Intellectual Property Act (PIPA), network neutrality, the increasing availability of location information, and the NSA’s surveillance program. Other emerging issues include data privacy, online video distribution, patent policy, and spectrum policy. In short, the rapid rate of technological change has increasingly shown that law and engineering can no longer remain compartmentalized into separate spheres. The logical response would be to embed the interaction between law and policy deeper into the fabric of both fields. An essential step would …


Research Project On Biometrics, Alia Hassan, Ingy Nazif Jan 2013

Research Project On Biometrics, Alia Hassan, Ingy Nazif

Papers, Posters, and Presentations

As technology evolves, and our personal details become more and more susceptible to hacking, one of the most important concerns we now have is being sure our phones, computers, networks are secure. We have begun to move on from simple password and motion patterns onto using facial recognition, and other forms of biometric recognition technology to protect our private information. The iPhone 5 for example, now presents features to identify uniquely the owner of the device, in the form of fingerprint detection. So we decided to focus on the topic biometrics for this research paper, which is basically how to …


Competition In Information Technologies: Standards-Essential Patents, Non-Practicing Entities And Frand Bidding, Herbert J. Hovenkamp Jan 2013

Competition In Information Technologies: Standards-Essential Patents, Non-Practicing Entities And Frand Bidding, Herbert J. Hovenkamp

All Faculty Scholarship

Standard Setting is omnipresent in networked information technologies. Virtually every cellular phone, computer, digital camera or similar device contains technologies governed by a collaboratively developed standard. If these technologies are to perform competitively, the processes by which standards are developed and implemented must be competitive. In this case attaining competitive results requires a mixture of antitrust and non-antitrust legal tools.

FRAND refers to a firm’s ex ante commitment to make its technology available at a “fair, reasonable and nondiscriminatory royalty.” The FRAND commitment results from bidding to have one’s own technology selected as a standard. Typically the FRAND commitment is …


Wireless Medical Sensor Networks: Design Requirements And Enabling Technologies, Cecilia H. Vallejos De Schatz, Henry P. Medeiros, Fabio K. Schneider, Paulo J. Abatti Jun 2012

Wireless Medical Sensor Networks: Design Requirements And Enabling Technologies, Cecilia H. Vallejos De Schatz, Henry P. Medeiros, Fabio K. Schneider, Paulo J. Abatti

Electrical and Computer Engineering Faculty Research and Publications

This article analyzes wireless communication protocols that could be used in healthcare environments (e.g., hospitals and small clinics) to transfer real-time medical information obtained from noninvasive sensors. For this purpose the features of the three currently most widely used protocols—namely, Bluetooth® (IEEE 802.15.1), ZigBee (IEEE 802.15.4), and Wi-Fi (IEEE 802.11)—are evaluated and compared. The important features under consideration include data bandwidth, frequency band, maximum transmission distance, encryption and authentication methods, power consumption, and current applications. In addition, an overview of network requirements with respect to medical sensor features, patient safety and patient data privacy, quality of service, and interoperability …


The Best Available Technology Standard, Lital Helman, Gideon Parchomovsky Jan 2011

The Best Available Technology Standard, Lital Helman, Gideon Parchomovsky

All Faculty Scholarship

Copyright liability for web-hosting will be a key determinant of the evolution of the Internet in years to come. Depending on their design, the legal rules that shape the liability of web-hosts can stunt the development of the Internet as a medium of expression or enhance it. Hence, adopting the optimal liability regime is a matter of crucial importance. This Article proposes a radical change in web-hosts’ copyright liability for illegal content posted by users. Our main thesis is that web-hosts’ liability should be guided by the “Best Available Technology” principle, according to which web-hosts that employ the best filtering …


Defending Privacy: The Development And Deployment Of A Darknet, Conor Mcmanamon, Fredrick Mtenzi Jan 2010

Defending Privacy: The Development And Deployment Of A Darknet, Conor Mcmanamon, Fredrick Mtenzi

Conference papers

New measures imposed by governments, Internet service providers and other third parties which threaten the state of privacy are also opening new avenues to protecting it. The unwarranted scrutiny of legitimate services such as file hosters and the BitTorrent protocol, once relatively unknown to the casual Internet user, is becoming more obvious. The darknet is a rising contender against these new measures and will preserve the default right to privacy of Internet users. A darknet is defined in the context of file sharing as a network which operates on top of another network such as the Internet for the purpose …


Proposed Model Rules Governing The Admissibility Of Computer-Generated Evidence, Lynn Mclain, James E. Carbine Jan 1998

Proposed Model Rules Governing The Admissibility Of Computer-Generated Evidence, Lynn Mclain, James E. Carbine

All Faculty Scholarship

Pursuant to a grant from the State Justice Institute, the Court of Appeals of Maryland Standing Committee on Rules of Practice and Procedure drafted, and the Court of Appeals adopted, model rules regarding computer-generated animations and simulations. The rules address discovery, pretrial rulings, and preservation of the record for appeal.