Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Kennesaw State University

Journal

Discipline
Keyword
Publication Year
Publication

Articles 1 - 30 of 35

Full-Text Articles in Engineering

The Past And The Promised Future Of Supersonic Flight, Rowan Seskin Jan 2024

The Past And The Promised Future Of Supersonic Flight, Rowan Seskin

Emerging Writers

The commercial aviation industry is extremely competitive, and constant innovation is an essential part of its success. In 1976, the Concorde raised the stakes by more than doubling the cruising speed of existing airliners. However, a handful of issues plagued the aircraft until its eventual retirement in November of 2003. Since then, no airliner has successfully taken its place, but the tides are turning. In my research, I investigated the factors that led to the Concorde's demise and examined the steps currently being taken to overcome those challenges.


Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman Dec 2023

Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman

Journal of Cybersecurity Education, Research and Practice

Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote learning environments for research as well. Researchers and students use these isolated environments to test sophisticated hardware, software, and procedures using full-fledged operating systems, networks, and applications. Virus and malware researchers may wish to release suspected malicious software in a controlled environment to observe their behavior better or gain the information needed to assist their reverse engineering processes. …


Survey On Wi-Fi And Cellular Communication Technology For Advanced Metering Infrastructure (Ami) In A Developing Economy, Tejumade F. Anthony, Folasade M. Dahunsi Nov 2023

Survey On Wi-Fi And Cellular Communication Technology For Advanced Metering Infrastructure (Ami) In A Developing Economy, Tejumade F. Anthony, Folasade M. Dahunsi

The African Journal of Information Systems

Traditional energy meters have suffered from a lack of automated analysis and inaccuracy in reading energy consumption, which has brought about smart metering systems. Developing economies such as in Africa. still experience a setback in electricity monitoring and load distribution because of existing traditional meter systems in use. Communication technologies play an important role to improve the monitoring of energy consumption and ensure a road map toward a smart grid. This paper reviews communication technologies used for Advanced Metering Infrastructure (AMI) emphasizing Wi-Fi and Cellular technologies. Metrics used to evaluate their performance include cost, energy efficiency, coverage, deployment, latency, payload, …


Leveraging Vr/Ar/Mr/Xr Technologies To Improve Cybersecurity Education, Training, And Operations, Paul Wagner, Dalal Alharthi Oct 2023

Leveraging Vr/Ar/Mr/Xr Technologies To Improve Cybersecurity Education, Training, And Operations, Paul Wagner, Dalal Alharthi

Journal of Cybersecurity Education, Research and Practice

The United States faces persistent threats conducting malicious cyber campaigns that threaten critical infrastructure, companies and their intellectual property, and the privacy of its citizens. Additionally, there are millions of unfilled cybersecurity positions, and the cybersecurity skills gap continues to widen. Most companies believe that this problem has not improved and nearly 44% believe it has gotten worse over the past 10 years. Threat actors are continuing to evolve their tactics, techniques, and procedures for conducting attacks on public and private targets. Education institutions and companies must adopt emerging technologies to develop security professionals and to increase cybersecurity awareness holistically. …


Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim Oct 2023

Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim

Journal of Cybersecurity Education, Research and Practice

This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity resilience. Cameroon's cybersecurity legal framework provides for audits but does not explicitly enumerate controls. Consequently, integrating relevant controls from the NIST frameworks and ISO Standards can improve the cybersecurity posture in Cameroon while waiting for a comprehensive revision of the legal framework. NIST and ISO are internationally recognized as best practices in information …


Adoption Of Cybersecurity Policies By Local Governments 2020, Donald F. Norris Phd, Laura K. Mateczun Jd Oct 2023

Adoption Of Cybersecurity Policies By Local Governments 2020, Donald F. Norris Phd, Laura K. Mateczun Jd

Journal of Cybersecurity Education, Research and Practice

This paper should be of interest to the readers of this journal because it addresses a subject that has received little scholarly attention; namely, local government cybersecurity. The U.S. has over 90,000 units of local government, of which almost 39,000 are “general purpose” units (i.e., municipalities, counties, towns and townships). On average, these governments do not practice cybersecurity effectively (Norris, et al., 2019 and 2020). One possible reason is that they do not adopt and/or implement highly recommended cybersecurity policies. In this paper, we examine local government adoption or lack of adoption of cybersecurity policies using data from three surveys. …


Human Factors Engineering, Robert S. Keyser Apr 2023

Human Factors Engineering, Robert S. Keyser

KSU Distinguished Course Repository

Human Factors Engineering is a comprehensive survey of human factors theory, research, and applications which are of particular relevance to Quality and Engineering Management. Emphasis will be placed on operator constraints in the design of work processes, workplaces, and instrumentation.


Semiconductor Devices, Sheila D. Hill Pe Feb 2023

Semiconductor Devices, Sheila D. Hill Pe

KSU Distinguished Course Repository

3 Class Hours, 0 Laboratory Hours, 3 Credit Hours Prerequisites: CHEM 1211, CHEM 1211L, EE 1000
This course effectively applies the knowledge of chemistry and physics to understand the operating principles of various semiconductor devices. The course covers topics starting from the fundamental concepts of atomic and crystal structure, crystal growth, impurity doping and energy bands to the in-depth device operation and quantitative analysis of p-n junction diode, metal-semiconductor contacts and Schottky diode, BJTs and MOSFETs. Also fundamental operating principles of optoelectronic devices such as, LEDs and photodiodes are discussed. Simple device simulation components reinforces the understanding of various critical …


Launching A 3d Printing Program For Students: Recommendations And Best Practices For Libraries, Wilhelmina Randtke, Lee Bareford Feb 2023

Launching A 3d Printing Program For Students: Recommendations And Best Practices For Libraries, Wilhelmina Randtke, Lee Bareford

Georgia Library Quarterly

The Georgia Southern University Libraries launched a 3D printing program for students in July 2022. Prior to launch, library employees at two of Georgia Southern University’s campuses investigated options for implementing safe, affordable, and sustainable 3D printing in existing academic libraries without retrofitting costly ventilation systems into existing facilities. This article describes the reasons why the Georgia Southern University Libraries thought that a 3D printing program could fulfill a service need for students across university colleges and departments and outlines some of the challenges, best practices, and unique innovations that the library’s employees experienced throughout the program launch process. The …


Work Measurement Study, Robert S. Keyser Sep 2022

Work Measurement Study, Robert S. Keyser

KSU Distinguished Course Repository

This course consists of an examination of the principles and practices of work analysis and work measurement. Emphasis is on a variety of analytical tools and the development of the student's skill in the use of a video timing device.


Electronic Circuits And Machines, Sheila D. Hill Pe Aug 2022

Electronic Circuits And Machines, Sheila D. Hill Pe

KSU Distinguished Course Repository

This course covers the electrical characteristics of fundamental circuit components including resistors, capacitors and inductors in DC circuits, single-phase AC and three-phase AC circuits. Fundamental concepts of AC power and phasors are examined. The course also introduces the devices that generate and transform electrical power, as well as switching and protection of electrical circuits. Practical applications of motors, generators, transformers and operational amplifiers will be covered to provide non-electrical engineering majors a comprehensive understanding of electro-mechanical systems.


Manufacturing & Service Systems, Robert S. Keyser Aug 2022

Manufacturing & Service Systems, Robert S. Keyser

KSU Distinguished Course Repository

An analysis of decision making in the current production environment and the tools and optimization models needed for finding solutions to problems relating to production planning and scheduling, inventory, and warehouse design.


Autonomous Vehicles On The Smart Roads: Challenges And Potentials, Laura Cristancho, Baleki Campbell, Mahyar Amirgholy Jul 2022

Autonomous Vehicles On The Smart Roads: Challenges And Potentials, Laura Cristancho, Baleki Campbell, Mahyar Amirgholy

The Kennesaw Journal of Undergraduate Research

Self-driving vehicles and smart roads are not new concepts. These ideas have been discussed for many years but for much of this time, the required technology was not available to make them a reality. Just recently has our technology caught up to our ideas and we are beginning to see progress towards the realization of the automated highway system. As the transition to a complete automated system is still in progress, this leaves many questions that still need to be answered as well as allowing for novel solutions to be presented. Using modern research papers to formulate a sound basis …


Predictors Of Successful Adoption Of Technology Supported Learning In Universities In Uganda: A Students’ Perspective, Esther Namirembe, Michael Eddie Kyobe Prof. Jun 2021

Predictors Of Successful Adoption Of Technology Supported Learning In Universities In Uganda: A Students’ Perspective, Esther Namirembe, Michael Eddie Kyobe Prof.

The African Journal of Information Systems

This study identified the predictors of successful adoption of technology supported learning (TSL) among students in universities. Presumably, the perspective of the students in understanding this study is crucial because students are key users of TSL systems and are faced with challenges in the adoption of such systems in learning institutions. We argue in the present study that predictors can be identified using Gestalts approach given the complex interactions between the organizational and individual factors. The extent of interaction between the factors was accomplished using the clustering algorithm. Data was collected from 184 students from Makerere and Gulu universities. Six …


The Future Of Artificial Intelligence, Alex Guerra May 2021

The Future Of Artificial Intelligence, Alex Guerra

Emerging Writers

Whether we like it or not Artificial Intelligence (AI) is coming, and we are not ready for it. AI has unimaginable potential and will revolutionize the world over the next few decades, but with this great potential we are faced with choices that could prove detrimental to humanity. This article examines the challenges AI presents and explores possible solutions to make AI align with human interests.


The Health Benefits Of Video Games, Zachary Shanks May 2021

The Health Benefits Of Video Games, Zachary Shanks

Emerging Writers

This paper seeks to evaluate if video games are useful as more than just entertainment.  The research shows that they can be utilized in the educational, medical, and business fields. Video Games have been shown to benefit the physical, emotional, and mental health of players, as well as create more efficient learning and working environments. The article argues that video games are no longer just a source of entertainment, as they are now becoming useful tools in society.


Interferometry In Fmcw Radars, Assid Nait, Theodore Grosch Jan 2021

Interferometry In Fmcw Radars, Assid Nait, Theodore Grosch

The Kennesaw Journal of Undergraduate Research

interferometry is used in many fields using all frequencies of the electromagnetic spectrum and sound waves. In this study, data was collected from an FMCW radar is used at multiple heights above a flat surface on which sat a single retroreflector. These data were post-processed to discover the signal obtained from the target and then the phase form the radar at multiple locations was compared. Using the known geometry and measured phase, we find the interferometry is possible using a freerunning radar under certain geometric conditions.


Efficiency Of Gas Turbine Engines, Tahir A. Upshaw Jan 2020

Efficiency Of Gas Turbine Engines, Tahir A. Upshaw

The Kennesaw Journal of Undergraduate Research

The following research involves conducting a confirmation of test bench results, and parametric cycle analysis. The results from these two methods of data collection is meant to show relationship between both. Where the data of the price induction can be verified with the parametric cycle analysis of the individual components to calculate the thrust and efficiency. Once we compare both methods, it will allow us to move on to part two of the research which involves determining how to make gas turbine engines more efficient based on the collected data.


Car Hacking: Accessing And Exploiting The Can Bus Protocol, Bryson R. Payne Jun 2019

Car Hacking: Accessing And Exploiting The Can Bus Protocol, Bryson R. Payne

Journal of Cybersecurity Education, Research and Practice

With the rapid adoption of internet-connected and driver-assist technologies, and the spread of semi-autonomous to self-driving cars on roads worldwide, cybersecurity for smart cars is a timely concern and one worth exploring both in the classroom and in the real world. Highly publicized hacks against production cars, and a relatively small number of crashes involving autonomous vehicles, have brought the issue of securing smart cars to the forefront as a matter of public and individual safety, and the cybersecurity of these “data centers on wheels” is of greater concern than ever.

However, up to this point there has been a …


News - Screven-Jenkins Regional Library, Sharon Blank Jan 2019

News - Screven-Jenkins Regional Library, Sharon Blank

Georgia Library Quarterly

No abstract provided.


Cultivating Third Party Development In Platform-Centric Software Ecosystems: Extended Boundary Resources Model, Brown C. Msiska Sep 2018

Cultivating Third Party Development In Platform-Centric Software Ecosystems: Extended Boundary Resources Model, Brown C. Msiska

The African Journal of Information Systems

Software ecosystems provide an effective way through which software solutions can be constructed by composing software components, typically applications, developed by internal and external developers on top of a software platform. Third party development increases the potential of a software ecosystem to effectively and quickly respond to context-specific software requirements. The boundary resources model gives a theoretical account for cultivation of third party development premised on the role of platform boundary resources such as application programming interfaces (API). However, from a longitudinal case study of the DHIS2 software ecosystem, this paper observes that no matter how good the boundary resources …


Development Of Digital Diary For Enhanced Parental School Involvement In Tanzania, Sekione R. Jeremiah, Joel S. Mtebe Phd May 2018

Development Of Digital Diary For Enhanced Parental School Involvement In Tanzania, Sekione R. Jeremiah, Joel S. Mtebe Phd

The African Journal of Information Systems

The study examined the use of digital diary as a tool for enhancing parental school involvement in Tanzania. The development of the digital diary followed eXtreme Programming agile method where 87 parents and 6 teachers from St. Florence school were involved. Parents and teachers were given six months to use the tool before testing for its effectiveness using data from 7 teachers and 156 parents through semi-structured interviews and questionnaires respectively. The study found that the majority of respondents (84.4% of parents and 96.7% of teachers) indicated that the digital diary was useful tool as enabled them to track children’s …


The E-Agriculture Research Landscape In South Africa: A Systematic Literature Review, Alain Nzuzi Kintoki Apr 2018

The E-Agriculture Research Landscape In South Africa: A Systematic Literature Review, Alain Nzuzi Kintoki

The African Journal of Information Systems

Despite the growing interest in e-agriculture research in South Africa, academic studies have not sufficiently and deeply investigated the current e-agriculture research trends in the South African context. It is unclear how primary e-agriculture research in South Africa will aid both current and future generations to create new and better ways to transform agricultural development using this modern technology. This study sought to determine the current status of e-agriculture research in the South African context. A systematic literature review was used to gather and analyze data. The results indicate that 17 papers (26.5%) were published during the first two years …


Tracing Sources Of Design Uncertainty And Controversy In Web 2.0 Facilitated Collaborative Design Process, Lockias Chitanana Dr, Desmond Wesley Govender Dr Apr 2018

Tracing Sources Of Design Uncertainty And Controversy In Web 2.0 Facilitated Collaborative Design Process, Lockias Chitanana Dr, Desmond Wesley Govender Dr

The African Journal of Information Systems

The integration of Internet-based collaborative tools such as Web 2.0 technologies to facilitate the design process has rendered collaborative design a chaotic practice filled with controversy and uncertainty, with the inevitable risk of unintended consequences. The purpose of this study was to trace the sources of design controversy in a Web 2.0 facilitated collaborative design process. The study employed an Actor Network Theory (ANT) methodological framework to explore design controversy in five design teams comprising of 4 to 6 undergraduate engineering students. Data was constituted by following the traces left by the actors, both human and nonhumans, their actions and …


Book Review - Dixie Highway: Road Building And The Making Of The Modern South, 1900-1930, Rebecca Rose Jul 2017

Book Review - Dixie Highway: Road Building And The Making Of The Modern South, 1900-1930, Rebecca Rose

Georgia Library Quarterly

No abstract provided.


Pedagogical Resources For Industrial Control Systems Security: Design, Implementation, Conveyance, And Evaluation, Guillermo A. Francia Iii, Greg Randall, Jay Snellen Jun 2017

Pedagogical Resources For Industrial Control Systems Security: Design, Implementation, Conveyance, And Evaluation, Guillermo A. Francia Iii, Greg Randall, Jay Snellen

Journal of Cybersecurity Education, Research and Practice

Industrial Control Systems (ICS), which are pervasive in our nation’s critical infrastructures, are becoming increasingly at risk and vulnerable to internal and external threats. It is imperative that the future workforce be educated and trained on the security of such systems. However, it is equally important that careful and deliberate considerations must be exercised in designing and implementing the educational and training activities that pertain to ICS. To that end, we designed and implemented pedagogical materials and tools to facilitate the teaching and learning processes in the area of ICS security. In this paper, we describe those resources, the professional …


Impact Of Threshold Clipping On Bit Error Rate In Ofdm-Like Systems, Felipe Hoshino, Theodore Grosch Jun 2017

Impact Of Threshold Clipping On Bit Error Rate In Ofdm-Like Systems, Felipe Hoshino, Theodore Grosch

The Kennesaw Journal of Undergraduate Research

In wireless communications, 3GPP LTE is one of the solutions to meet the greater transmission data rate demand. One issue inherent to this technology is the PAPR (Peak-to-Average Power Ratio) of OFDM (Orthogonal Frequency Division Multiplexing) modulation. This high PAPR affects of the efficiency of power amplifiers. One approach to mitigate this effect is the Crest Factor Reduction (CFR) technique. In this work we simulate the impact of Hard Limited Clipping Crest Factor Reduction technique on BER (Bit Error Rate) in OFDM based Systems. In general, the results showed CFR has more effect on higher digital modulation schemes, as expected. …


Autonomous Speed Control For Kia Optima, Andrew J. Combs, Kyle Fugatt, Kevin Mcfall Jun 2017

Autonomous Speed Control For Kia Optima, Andrew J. Combs, Kyle Fugatt, Kevin Mcfall

The Kennesaw Journal of Undergraduate Research

The standard method for speed control is the cruise control system built into most modern vehicles. These systems employ a PID controller which actuates the accelerator thus, in turn, maintains the desired vehicle speed. The main drawback of such a system is that typically the cruise control will only engage above 25 mph. The goal of this paper is to describe a system which we used to control vehicle speed from a stop to any desired speed using an Arduino microcontroller and a CAN BUS shield, from where autonomous features can be built upon. With this system, we were able …


Secure Software Engineering Education: Knowledge Area, Curriculum And Resources, Xiaohong Yuan, Li Yang, Bilan Jones, Huiming Yu, Bei-Tseng Chu Jun 2016

Secure Software Engineering Education: Knowledge Area, Curriculum And Resources, Xiaohong Yuan, Li Yang, Bilan Jones, Huiming Yu, Bei-Tseng Chu

Journal of Cybersecurity Education, Research and Practice

This paper reviews current efforts and resources in secure software engineering education, with the goal of providing guidance for educators to make use of these resources in developing secure software engineering curriculum. These resources include Common Body of Knowledge, reference curriculum, sample curriculum materials, hands-on exercises, and resources developed by industry and open source community. The relationship among the Common Body of Knowledge proposed by the Department of Homeland Security, the Software Engineering Institute at Carnegie Mellon University, and ACM/IEEE are discussed. The recent practices on secure software engineering education, including secure software engineering related programs, courses, and course modules …


News - Georgia State University - Gsu Library Receives $210,000 Neh Grant, Christian J. Steinmetz Apr 2013

News - Georgia State University - Gsu Library Receives $210,000 Neh Grant, Christian J. Steinmetz

Georgia Library Quarterly

Georgia State University Library recently received a $210,000 grant from the National Endowment for the Humanities for “Planning Atlanta: A New City in the Making, 1930s – 1990s”, submitted by librarian Joe Hurley (Principal Investigator) and history professor Kate Wilson (co-PI).