Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Kennesaw State University

Journal

2023

Discipline
Keyword
Publication

Articles 1 - 8 of 8

Full-Text Articles in Engineering

Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman Dec 2023

Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman

Journal of Cybersecurity Education, Research and Practice

Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote learning environments for research as well. Researchers and students use these isolated environments to test sophisticated hardware, software, and procedures using full-fledged operating systems, networks, and applications. Virus and malware researchers may wish to release suspected malicious software in a controlled environment to observe their behavior better or gain the information needed to assist their reverse engineering processes. …


Survey On Wi-Fi And Cellular Communication Technology For Advanced Metering Infrastructure (Ami) In A Developing Economy, Tejumade F. Anthony, Folasade M. Dahunsi Nov 2023

Survey On Wi-Fi And Cellular Communication Technology For Advanced Metering Infrastructure (Ami) In A Developing Economy, Tejumade F. Anthony, Folasade M. Dahunsi

The African Journal of Information Systems

Traditional energy meters have suffered from a lack of automated analysis and inaccuracy in reading energy consumption, which has brought about smart metering systems. Developing economies such as in Africa. still experience a setback in electricity monitoring and load distribution because of existing traditional meter systems in use. Communication technologies play an important role to improve the monitoring of energy consumption and ensure a road map toward a smart grid. This paper reviews communication technologies used for Advanced Metering Infrastructure (AMI) emphasizing Wi-Fi and Cellular technologies. Metrics used to evaluate their performance include cost, energy efficiency, coverage, deployment, latency, payload, …


Leveraging Vr/Ar/Mr/Xr Technologies To Improve Cybersecurity Education, Training, And Operations, Paul Wagner, Dalal Alharthi Oct 2023

Leveraging Vr/Ar/Mr/Xr Technologies To Improve Cybersecurity Education, Training, And Operations, Paul Wagner, Dalal Alharthi

Journal of Cybersecurity Education, Research and Practice

The United States faces persistent threats conducting malicious cyber campaigns that threaten critical infrastructure, companies and their intellectual property, and the privacy of its citizens. Additionally, there are millions of unfilled cybersecurity positions, and the cybersecurity skills gap continues to widen. Most companies believe that this problem has not improved and nearly 44% believe it has gotten worse over the past 10 years. Threat actors are continuing to evolve their tactics, techniques, and procedures for conducting attacks on public and private targets. Education institutions and companies must adopt emerging technologies to develop security professionals and to increase cybersecurity awareness holistically. …


Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim Oct 2023

Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim

Journal of Cybersecurity Education, Research and Practice

This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity resilience. Cameroon's cybersecurity legal framework provides for audits but does not explicitly enumerate controls. Consequently, integrating relevant controls from the NIST frameworks and ISO Standards can improve the cybersecurity posture in Cameroon while waiting for a comprehensive revision of the legal framework. NIST and ISO are internationally recognized as best practices in information …


Adoption Of Cybersecurity Policies By Local Governments 2020, Donald F. Norris Phd, Laura K. Mateczun Jd Oct 2023

Adoption Of Cybersecurity Policies By Local Governments 2020, Donald F. Norris Phd, Laura K. Mateczun Jd

Journal of Cybersecurity Education, Research and Practice

This paper should be of interest to the readers of this journal because it addresses a subject that has received little scholarly attention; namely, local government cybersecurity. The U.S. has over 90,000 units of local government, of which almost 39,000 are “general purpose” units (i.e., municipalities, counties, towns and townships). On average, these governments do not practice cybersecurity effectively (Norris, et al., 2019 and 2020). One possible reason is that they do not adopt and/or implement highly recommended cybersecurity policies. In this paper, we examine local government adoption or lack of adoption of cybersecurity policies using data from three surveys. …


Human Factors Engineering, Robert S. Keyser Apr 2023

Human Factors Engineering, Robert S. Keyser

KSU Distinguished Course Repository

Human Factors Engineering is a comprehensive survey of human factors theory, research, and applications which are of particular relevance to Quality and Engineering Management. Emphasis will be placed on operator constraints in the design of work processes, workplaces, and instrumentation.


Semiconductor Devices, Sheila D. Hill Pe Feb 2023

Semiconductor Devices, Sheila D. Hill Pe

KSU Distinguished Course Repository

3 Class Hours, 0 Laboratory Hours, 3 Credit Hours Prerequisites: CHEM 1211, CHEM 1211L, EE 1000
This course effectively applies the knowledge of chemistry and physics to understand the operating principles of various semiconductor devices. The course covers topics starting from the fundamental concepts of atomic and crystal structure, crystal growth, impurity doping and energy bands to the in-depth device operation and quantitative analysis of p-n junction diode, metal-semiconductor contacts and Schottky diode, BJTs and MOSFETs. Also fundamental operating principles of optoelectronic devices such as, LEDs and photodiodes are discussed. Simple device simulation components reinforces the understanding of various critical …


Launching A 3d Printing Program For Students: Recommendations And Best Practices For Libraries, Wilhelmina Randtke, Lee Bareford Feb 2023

Launching A 3d Printing Program For Students: Recommendations And Best Practices For Libraries, Wilhelmina Randtke, Lee Bareford

Georgia Library Quarterly

The Georgia Southern University Libraries launched a 3D printing program for students in July 2022. Prior to launch, library employees at two of Georgia Southern University’s campuses investigated options for implementing safe, affordable, and sustainable 3D printing in existing academic libraries without retrofitting costly ventilation systems into existing facilities. This article describes the reasons why the Georgia Southern University Libraries thought that a 3D printing program could fulfill a service need for students across university colleges and departments and outlines some of the challenges, best practices, and unique innovations that the library’s employees experienced throughout the program launch process. The …