Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Journal

Kennesaw State University

2017

Discipline
Keyword
Publication

Articles 1 - 15 of 15

Full-Text Articles in Physical Sciences and Mathematics

Visual Odometry Using Convolutional Neural Networks, Alec Graves, Steffen Lim, Thomas Fagan, Kevin Mcfall Phd. Dec 2017

Visual Odometry Using Convolutional Neural Networks, Alec Graves, Steffen Lim, Thomas Fagan, Kevin Mcfall Phd.

The Kennesaw Journal of Undergraduate Research

Visual odometry is the process of tracking an agent's motion over time using a visual sensor. The visual odometry problem has only been recently solved using traditional, non-machine learning techniques. Despite the success of neural networks at many related problems such as object recognition, feature detection, and optical flow, visual odometry still has not been solved with a deep learning technique. This paper attempts to implement several Convolutional Neural Networks to solve the visual odometry problem and compare slight variations in data preprocessing. The work presented is a step toward reaching a legitimate neural network solution.


Use Of An Alternative Natural Weed Suppressant: Effects Of Parboiled Rice Hull Mulch On The Growth Of Container Weeds, Amy R. Fields-Taylor, Vanessa Slinger-Friedman Dec 2017

Use Of An Alternative Natural Weed Suppressant: Effects Of Parboiled Rice Hull Mulch On The Growth Of Container Weeds, Amy R. Fields-Taylor, Vanessa Slinger-Friedman

The Kennesaw Journal of Undergraduate Research

The Chattahoochee Nature Center (CNC) is one of the leading educational centers in Georgia about the ecology of the Chattahoochee River. Due to lack of man power, keeping down the weeds in the CNC plant nursery is one of those tasks that often gets left undone. The nursery becomes overgrown with invasive weed species. Understandably, they must sometimes resort to the use of herbicides, such as Roundup®, to keep the hundreds of native and endangered species of plants housed at CNC from being choked out by invasive weeds. This study tests the ability to suppress weed growth by use of …


From The Editors, Herbert J. Mattord, Michael E. Whitman, Carole L. Hollingsworth Dec 2017

From The Editors, Herbert J. Mattord, Michael E. Whitman, Carole L. Hollingsworth

Journal of Cybersecurity Education, Research and Practice

No abstract provided.


A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard K. Nilsen, Yair Levy, Steven R. Terrell Ph.D., Dawn Beyer Dec 2017

A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard K. Nilsen, Yair Levy, Steven R. Terrell Ph.D., Dawn Beyer

Journal of Cybersecurity Education, Research and Practice

Organizational information system users (OISUs) that are open to cyber threats vectors are contributing to major financial and information losses for individuals, businesses, and governments. Moreover, technical cybersecurity controls may be rendered useless due to a lack of cybersecurity competency of OISUs. The main goal of this research study was to propose and validate, using subject matter experts (SMEs), a reliable hands-on assessment prototype tool for measuring the knowledge, skills, and abilities (KSAs) that comprise the cybersecurity competency of an OISU. Primarily using the Delphi methodology, this study implemented four phases of data collection using cybersecurity SMEs for proposing and …


Social Media Risk Perceptions Of Human Resource Professionals: Issues Undergraduate Students Should Consider, Julio C. Rivera, Jack Howard, Samuel Goh, James L. Worrell, Paul Di Gangi Dec 2017

Social Media Risk Perceptions Of Human Resource Professionals: Issues Undergraduate Students Should Consider, Julio C. Rivera, Jack Howard, Samuel Goh, James L. Worrell, Paul Di Gangi

Journal of Cybersecurity Education, Research and Practice

This study contrasts the social media risk perceptions of undergraduate students, versus those of certified Human Resource professionals. Social media is widely used by most segments of the population, and particularly among the age group that includes most undergraduate students. Organizations hiring employees are increasingly examining job applicant's social media postings as part of the applicant screening process. In this study we examine how these groups differ in their perceptions of the risks inherent in using social media, and what these differences may mean for students seeking employment. Recommendations are made for raising undergraduate student awareness of these risks.


Synergistic Security: A Work System Case Study Of The Target Breach, Martha Nanette Harrell Dec 2017

Synergistic Security: A Work System Case Study Of The Target Breach, Martha Nanette Harrell

Journal of Cybersecurity Education, Research and Practice

Recent publicized security breaches can be used to evaluate information security programs. The processes and procedures that allowed the event to occur can be examined in a case study and then be used to find methods for future mitigation of risk. The Target security breach is used in this study to examine the organization’s information security program using a macro-ergonomic model. This research posits that an information security program should consider the work system design, based in macro-ergonomics, to help mitigate information security risk to the organization and ensure an efficient and effective information security program. Based on a seminal …


A Toolkit Approach To Information Security Awareness And Education, Peter Korovessis, Steven Furnell, Maria Papadaki, Paul Haskell-Dowland Dec 2017

A Toolkit Approach To Information Security Awareness And Education, Peter Korovessis, Steven Furnell, Maria Papadaki, Paul Haskell-Dowland

Journal of Cybersecurity Education, Research and Practice

In today’s business environment where all operations are enabled by technology, information security has become an established discipline as more and more businesses realize its value. The human component has been recognized to have an important role in information security since the only way to reduce security risks is through making employees more information security aware. Towards this goal the research will appreciate the importance of information security awareness by illustrating the need for more effective user training. Further to that it proposes and develops an information security toolkit as a prototype awareness raising initiative. Apart from the elements of …


Accessibility And Usability Of Government Websites In Tanzania, Joel S. Mtebe, Aron W. Kondoro Sep 2017

Accessibility And Usability Of Government Websites In Tanzania, Joel S. Mtebe, Aron W. Kondoro

The African Journal of Information Systems

The government of Tanzania has been embracing information systems specifically websites in order to widen access to government services, lower administrative costs, and to increase public participation in decision making. As a result, almost every ministry, department, and agency (MDA) has developed a website of different kind. However, the majority of existing websites were developed without sufficiently considering user needs which indicates that they do have some usability and accessibility problems. This study used SortSite tool to evaluate accessibility and usability of government websites taking a sample of 22 websites. The report from the SortSite tool was then checked against …


Systematic Analysis Of Enterprise Perception Towards Cloud Adoption In The African States: The Nigerian Perspective, George A. Oguntala, Prof. Raed A. Abd-Alhameed, Dr. Janet O. Odeyemi Sep 2017

Systematic Analysis Of Enterprise Perception Towards Cloud Adoption In The African States: The Nigerian Perspective, George A. Oguntala, Prof. Raed A. Abd-Alhameed, Dr. Janet O. Odeyemi

The African Journal of Information Systems

The desirous benefits of cloud computing such as high return on investment through efficient resource management, high application throughput and on-demand capabilities have resulted in the unprecedented global acceptance of the computing paradigm. However, research on cloud adoption indicates that fewer organisations in the African states are adopting cloud services. Thus, the purview of the paper is to examine the factors responsible for the poor adoption of cloud computing in most African enterprises using Nigeria as a case study. The study focus on the perception of IT and non-IT employees towards cloud computing. Moreover, the paper reviews the literature on …


News - Fayette County Public Library, Gina L. Martin Jul 2017

News - Fayette County Public Library, Gina L. Martin

Georgia Library Quarterly

No abstract provided.


From The Editors, Carole L. Hollingsworth, Michael E. Whitman, Herbert J. Mattord Jun 2017

From The Editors, Carole L. Hollingsworth, Michael E. Whitman, Herbert J. Mattord

Journal of Cybersecurity Education, Research and Practice

Welcome to the third issue of the Journal of Cybersecurity Education, Research and Practice (JCERP).


Pedagogical Resources For Industrial Control Systems Security: Design, Implementation, Conveyance, And Evaluation, Guillermo A. Francia Iii, Greg Randall, Jay Snellen Jun 2017

Pedagogical Resources For Industrial Control Systems Security: Design, Implementation, Conveyance, And Evaluation, Guillermo A. Francia Iii, Greg Randall, Jay Snellen

Journal of Cybersecurity Education, Research and Practice

Industrial Control Systems (ICS), which are pervasive in our nation’s critical infrastructures, are becoming increasingly at risk and vulnerable to internal and external threats. It is imperative that the future workforce be educated and trained on the security of such systems. However, it is equally important that careful and deliberate considerations must be exercised in designing and implementing the educational and training activities that pertain to ICS. To that end, we designed and implemented pedagogical materials and tools to facilitate the teaching and learning processes in the area of ICS security. In this paper, we describe those resources, the professional …


Cyber Security For Everyone: An Introductory Course For Non-Technical Majors, Marc J. Dupuis Jun 2017

Cyber Security For Everyone: An Introductory Course For Non-Technical Majors, Marc J. Dupuis

Journal of Cybersecurity Education, Research and Practice

In this paper, we describe the need for and development of an introductory cyber security course. The course was designed for non-technical majors with the goal of increasing cyber security hygiene for an important segment of the population—college undergraduates. While the need for degree programs that focus on educating and training individuals for occupations in the ever-growing cyber security field is critically important, the need for improved cyber security hygiene from the average everyday person is of equal importance. This paper discusses the approach used, curriculum developed, results from two runs of the course, and frames the overall structure of …


How Much Should We Teach The Enigma Machine?, Jeffrey A. Livermore Jun 2017

How Much Should We Teach The Enigma Machine?, Jeffrey A. Livermore

Journal of Cybersecurity Education, Research and Practice

Developing courses and programs in Information Assurance can feel like trying to force ten pounds of flour into a five pound sack. We want to pack more into our courses than we have time to teach. As new technologies develop, we often find it necessary to drop old technologies out of the curriculum and our students miss out on the historical impacts the old technologies had. The discipline is so broad and deep that we have to carefully choose what concepts and technologies we study in depth, what we mention in passing, and what we leave out. Leaving out important …


Increasing Population, Urbanization And Climatic Factors In Lagos State, Nigeria: The Nexus And Implications On Water Demand And Supply, Amidu Owolabi Ayeni Dr. Apr 2017

Increasing Population, Urbanization And Climatic Factors In Lagos State, Nigeria: The Nexus And Implications On Water Demand And Supply, Amidu Owolabi Ayeni Dr.

Journal of Global Initiatives: Policy, Pedagogy, Perspective

This study examines the impact of population, urbanization, and climate on water supply in Lagos State. Population baseline data used for this research were based on provisional census data of 1963, 1973, 1991 and 2006. Information on water production, demand and supply for this study were cleaned from the Nigerian Bureau of statistics (NBS), Lagos State Water Corporation reports of different years and relevant literature on Lagos water supply and demand. Urbanization assessment were based on multi-temporal imageries from Landsat MSS, TM, NigeriaSat-1 and Landsat ETM+ for 1975, 1995, 2007, and 2015 respectively. The Census data revealed that the population …