Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Kennesaw State University

2023

Discipline
Keyword
Publication
Publication Type

Articles 1 - 30 of 52

Full-Text Articles in Engineering

Robotic Arms For Microgravity Manufacturing, Connor Talley, Joshua Diamond, Mickael Bah Dec 2023

Robotic Arms For Microgravity Manufacturing, Connor Talley, Joshua Diamond, Mickael Bah

Senior Design Project For Engineers

There is a need to reduce manufacturing cost in space to avoid sending earth manufactured parts that could suffer damage during launch. The proposed idea consists of a dual robotic arm system attached on a precision gantry setup. The team developed an innovative design that is flexible and efficient for different assemblies, improving space manufacturing. With its two specialized robotic arms, our system maximizes versatility by catering to a wide variety of applications from manufacturing to assembly. The dual arms made of Al 7075 coupled with the gantry provides stability and performance in microgravity environments.


Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman Dec 2023

Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman

Journal of Cybersecurity Education, Research and Practice

Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote learning environments for research as well. Researchers and students use these isolated environments to test sophisticated hardware, software, and procedures using full-fledged operating systems, networks, and applications. Virus and malware researchers may wish to release suspected malicious software in a controlled environment to observe their behavior better or gain the information needed to assist their reverse engineering processes. …


Imerys: Tube Mill Optimization Project, Ryan Waltman, Dalton Beasley, Dyson Beasley, Tristan Mcmichael Dec 2023

Imerys: Tube Mill Optimization Project, Ryan Waltman, Dalton Beasley, Dyson Beasley, Tristan Mcmichael

Senior Design Project For Engineers

The Tube Mill Optimization Project is in partnership with Imerys for Tube Mill 81 at their Marble Hill site in Georgia. Tube Mill 81 is a dry ball mill that operates 24/7 and makes an intermediary product for Plant 3. Tube Mill 81 needs quality improvement and a production rate increase to meet demand. Imerys’s quality specification is between a particle size of 12-18 microns and an acceptable production rate of 5 tons per hour. This project focuses on the development and implementation of three solutions: increase the amps on the separator to increase production, replace missing classifier blades in …


Assessing Blockchain’S Potential To Ensure Data Integrity And Security For Ai And Machine Learning Applications, Aiasha Siddika Dec 2023

Assessing Blockchain’S Potential To Ensure Data Integrity And Security For Ai And Machine Learning Applications, Aiasha Siddika

Master of Science in Information Technology Theses

The increasing use of data-centric approaches in the fields of Machine Learning and Artificial Intelligence (ML/AI) has raised substantial issues over the security, integrity, and trustworthiness of data. In response to this challenge, Blockchain technology offered a promising and practical solution, as its inherent characteristics as a decentralized distributed ledger, coupled with cryptographic processes, offer an unprecedented level of data confidentiality and immutability. This study examines the mutually beneficial connection between Blockchain technology and ML/AI, using Blockchain's inherent capacity to protect against unauthorized alterations of data during the training phase of ML models. The method involves building valid blocks of …


Comparison Of Different Weighting Scales When Measuring Mental Workload, Isabella Duque Nov 2023

Comparison Of Different Weighting Scales When Measuring Mental Workload, Isabella Duque

Symposium of Student Scholars

Mental workload, a concept within the field of human factors and ergonomics, refers to the cognitive and perceptual demands that individuals experience while performing various tasks in the workplace. Assessing mental workload holds a significant role in designing occupational tasks, as inappropriate levels can impact job performance, employee well-being, and even workplace safety. By assessing and optimizing mental workload, organizations can enhance productivity, reduce errors, and foster a healthier work environment. The NASA Task Load Index (NASA-TLX) and the Surgery Task Load Index (SURG-TLX) are two tools used to subjectively assess mental workload. Both tools offer unweighted and weighted mental …


Controlled Radiation Capsule For Precision And Rapid Cancer Treatment, Hoseon Lee, Zsolt Kollar, Bailey R. White, Junia Nguyen, David Roque, Sowjanya Palagani Nov 2023

Controlled Radiation Capsule For Precision And Rapid Cancer Treatment, Hoseon Lee, Zsolt Kollar, Bailey R. White, Junia Nguyen, David Roque, Sowjanya Palagani

Symposium of Student Scholars

This research aims to transform cancer treatment through the optimization of brachytherapy, with a focus on reducing treatment duration, setup complexities, and financial burdens, all while emphasizing patient safety. Patients living at a distance from radiation clinics, particularly those undergoing extended Low Dose Radiation brachytherapy, often struggle with the formidable financial challenges associated with securing nearby accommodations. In response to these issues, the research introduces a radiation capsule designed to condense the conventional six-month treatment period to approximately just one week, thereby significantly reducing the duration of required accommodations. This capsule is especially relevant considering the construction cost of $40 …


Kwad - Ksu All Weather Autonomous Drone, Nick Farinacci, Sebastian Gomez, Stewart Baker, Ed Sheridan Nov 2023

Kwad - Ksu All Weather Autonomous Drone, Nick Farinacci, Sebastian Gomez, Stewart Baker, Ed Sheridan

Symposium of Student Scholars

"KWAD" or "KSU all-Weather Autonomous Drone" project was sponsored by Ultool, LLC to the KSU Research and Service Foundation to create a lightweight drone capable of capturing HD video during all-weather operations. The conditions of all-weather operation include rainfall of one inch per hour and wind speeds of up to twenty miles per hour. In addition, a global minimum structural safety factor of two is required to ensure the system's integrity in extreme weather conditions. Potential mission profiles include autonomous aerial delivery, topological mapping in high moisture areas, security surveillance, search and rescue operations, emergency transportation of medical supplies, and …


An In-Depth Analysis Of Domain Adaptation In Computer And Robotic Vision, Muhammad Hassan Tanveer, Zainab Fatima, Shehnila Zardari, David A. Guerra-Zubiaga Nov 2023

An In-Depth Analysis Of Domain Adaptation In Computer And Robotic Vision, Muhammad Hassan Tanveer, Zainab Fatima, Shehnila Zardari, David A. Guerra-Zubiaga

Faculty and Research Publications

This review article comprehensively delves into the rapidly evolving field of domain adaptation in computer and robotic vision. It offers a detailed technical analysis of the opportunities and challenges associated with this topic. Domain adaptation methods play a pivotal role in facilitating seamless knowledge transfer and enhancing the generalization capabilities of computer and robotic vision systems. Our methodology involves systematic data collection and preparation, followed by the application of diverse assessment metrics to evaluate the efficacy of domain adaptation strategies. This study assesses the effectiveness and versatility of conventional, deep learning-based, and hybrid domain adaptation techniques within the domains of …


Validation Of Machine Vision And Action Sport Cameras For 3d Motion Analysis Model Reconstruction, John David Johnson, Michael Hales, Randy Emert Nov 2023

Validation Of Machine Vision And Action Sport Cameras For 3d Motion Analysis Model Reconstruction, John David Johnson, Michael Hales, Randy Emert

Faculty and Research Publications

The study investigated the feasibility of using action sport cameras for motion analysis research. Data acquired from two different marker-based motion capture systems and six different camera combinations were analyzed for motion reconstruction accuracy. Two different calibration procedures were used to determine the influence on marker position reconstruction. Static and dynamic calibration mean merit score differences between the reference and experimental camera systems were 0.4 mm and 1.3 mm, respectively. Angular displacement difference between the reference and experimental camera systems range between 0.1 and 2.0 degrees. A systematic bias (− 0.54 to 0.19 degrees) was determined between the reference and …


Screensafefuture: A Parent-Empathetic And Practical Mhealth Application For Toddlers' Brain Development Addressing Screen-Addiction Challenges, Nafisa Anjum Nov 2023

Screensafefuture: A Parent-Empathetic And Practical Mhealth Application For Toddlers' Brain Development Addressing Screen-Addiction Challenges, Nafisa Anjum

Master of Science in Information Technology Theses

The surging incidents of infants and toddlers screen addiction in the United States are becoming a pressing concern due to its detrimental and compound impact on cognitive development, mental health, and physical growth. To address this era's critical child health and human development problem, we propose an innovative mHealth application-- ScreenSafeFuture-- in this paper. ScreenSafeFuture provides practical and parent-friendly solutions that seamlessly fit into parents' busy lifestyles, also acknowledging the effectiveness and convenience of smartphones as a healthcare tool. Our offering includes essential features designed to enhance the experience between parents and their children under 3 years old. With an …


Survey On Wi-Fi And Cellular Communication Technology For Advanced Metering Infrastructure (Ami) In A Developing Economy, Tejumade F. Anthony, Folasade M. Dahunsi Nov 2023

Survey On Wi-Fi And Cellular Communication Technology For Advanced Metering Infrastructure (Ami) In A Developing Economy, Tejumade F. Anthony, Folasade M. Dahunsi

The African Journal of Information Systems

Traditional energy meters have suffered from a lack of automated analysis and inaccuracy in reading energy consumption, which has brought about smart metering systems. Developing economies such as in Africa. still experience a setback in electricity monitoring and load distribution because of existing traditional meter systems in use. Communication technologies play an important role to improve the monitoring of energy consumption and ensure a road map toward a smart grid. This paper reviews communication technologies used for Advanced Metering Infrastructure (AMI) emphasizing Wi-Fi and Cellular technologies. Metrics used to evaluate their performance include cost, energy efficiency, coverage, deployment, latency, payload, …


2023 - The Fourth Annual Fall Symposium Of Student Scholars Nov 2023

2023 - The Fourth Annual Fall Symposium Of Student Scholars

Symposium of Student Scholars Program Books

The full program book from the Fall 2023 Symposium of Student Scholars, held in November 2023. Includes abstracts from the presentations and posters.


Leveraging Vr/Ar/Mr/Xr Technologies To Improve Cybersecurity Education, Training, And Operations, Paul Wagner, Dalal Alharthi Oct 2023

Leveraging Vr/Ar/Mr/Xr Technologies To Improve Cybersecurity Education, Training, And Operations, Paul Wagner, Dalal Alharthi

Journal of Cybersecurity Education, Research and Practice

The United States faces persistent threats conducting malicious cyber campaigns that threaten critical infrastructure, companies and their intellectual property, and the privacy of its citizens. Additionally, there are millions of unfilled cybersecurity positions, and the cybersecurity skills gap continues to widen. Most companies believe that this problem has not improved and nearly 44% believe it has gotten worse over the past 10 years. Threat actors are continuing to evolve their tactics, techniques, and procedures for conducting attacks on public and private targets. Education institutions and companies must adopt emerging technologies to develop security professionals and to increase cybersecurity awareness holistically. …


Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim Oct 2023

Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim

Journal of Cybersecurity Education, Research and Practice

This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity resilience. Cameroon's cybersecurity legal framework provides for audits but does not explicitly enumerate controls. Consequently, integrating relevant controls from the NIST frameworks and ISO Standards can improve the cybersecurity posture in Cameroon while waiting for a comprehensive revision of the legal framework. NIST and ISO are internationally recognized as best practices in information …


Adoption Of Cybersecurity Policies By Local Governments 2020, Donald F. Norris Phd, Laura K. Mateczun Jd Oct 2023

Adoption Of Cybersecurity Policies By Local Governments 2020, Donald F. Norris Phd, Laura K. Mateczun Jd

Journal of Cybersecurity Education, Research and Practice

This paper should be of interest to the readers of this journal because it addresses a subject that has received little scholarly attention; namely, local government cybersecurity. The U.S. has over 90,000 units of local government, of which almost 39,000 are “general purpose” units (i.e., municipalities, counties, towns and townships). On average, these governments do not practice cybersecurity effectively (Norris, et al., 2019 and 2020). One possible reason is that they do not adopt and/or implement highly recommended cybersecurity policies. In this paper, we examine local government adoption or lack of adoption of cybersecurity policies using data from three surveys. …


Internet Of Things Affordance For Open Educational Resources In A Comprehensive Open Distance E-Learning, Lancelord Mncube Sep 2023

Internet Of Things Affordance For Open Educational Resources In A Comprehensive Open Distance E-Learning, Lancelord Mncube

African Conference on Information Systems and Technology

The Internet of Things (IoT) space has dual dimensions of affordance to support open educational resources (OER). The duality of affordance has little or not been well articulated in relation to OER, particularly in a Comprehensive open distance e-learning (CODEL) institution. Such an institution is a mega open distance in South Africa and beyond the continent to accommodate students globally and rely on information and communication technology (ICT) in the provision of tuition. In the CODEL institution, there is a recognizable shift as the institution encourages the appropriation of OER and phasing out the prescription of the prescribed textbooks. The …


A Social Profile-Based E-Learning Model, Xola Ntlangula Sep 2023

A Social Profile-Based E-Learning Model, Xola Ntlangula

African Conference on Information Systems and Technology

Many High Education Institutions (HEIs) have migrated to blended or complete online learning to cater for less interruption with learning. As such, there is a growing demand for personalized e-learning to accommodate the diversity of students' needs. Personalization can be achieved using recommendation systems powered by artificial intelligence. Although using student data to personalize learning is not a new concept, collecting and identifying appropriate data is necessary to determine the best recommendations for students. By reviewing the existing data collection capabilities of the e-learning platforms deployed by public universities in South Africa, we were able to establish the readiness of …


Predictive Maintenance Of Base Transceiver Station Power System Using Xgboost Algorithm: A Case Study Of Econet Wireless, Zimbabwe, Tavengwa Masamha Sep 2023

Predictive Maintenance Of Base Transceiver Station Power System Using Xgboost Algorithm: A Case Study Of Econet Wireless, Zimbabwe, Tavengwa Masamha

African Conference on Information Systems and Technology

Faults incurred by Base Transceiver Stations pose challenges to telecommunication organisations. Mostly the faults are due to BTS failures. BTS power system failures can have a significant impact on organizational performance in the telecommunications industry. These failures can cause disruptions in mobile network coverage, leading to dropped calls, slow data speeds, and difficulty connecting to the network. ECONET Zimbabwe has been experiencing unprecedented BTS power system failures for the past five years. Team Data Science Process was the pillar of the study methodology. The XGBoost algorithm was employed to develop a predictive model for the maintenance of Base Transceiver Station …


Experiences Of African Women In Stem Careers: A Systematic Literature Review., Kaluwa Siwale, Gwamaka Mwalemba, Ulrike Rivett Sep 2023

Experiences Of African Women In Stem Careers: A Systematic Literature Review., Kaluwa Siwale, Gwamaka Mwalemba, Ulrike Rivett

African Conference on Information Systems and Technology

The discourse on women's underrepresentation in science, technology, engineering, and mathematics (STEM) mainly centres on the global north, leaving a gap in understanding the perspectives of African women in STEM. To address this, a systematic literature review was conducted to explore African women's experiences in STEM careers and education. After applying inclusion and criteria, 18 published articles were analysed. 8 key issues emerge: work environment, education system, work-life balance, gender-based stereotypes, racial bias, sexual harassment, inadequate support/mentorship, and self-imposed limits. These themes intertwine, with some aspects influencing others. Grasping the complexities and interactions of these factors provides insights into challenges …


E-Wild Life Alert: Tackling The Human-Wildlife Conflict Problem, Eliel Kundai Zhuwankinyu, Sibonile Moyo, Catherine Chivasa, Smart Ncube Sep 2023

E-Wild Life Alert: Tackling The Human-Wildlife Conflict Problem, Eliel Kundai Zhuwankinyu, Sibonile Moyo, Catherine Chivasa, Smart Ncube

African Conference on Information Systems and Technology

Depletion of resources meant for both human and animal survival leads to competition for these. Human-wildlife conflict (HWC) occurs when these two parties compete for resources such as space, water, and food. If not properly managed, HWC can lead to loss of livelihoods and even loss of life. This paper discusses the design and development of an E-Wildlife Alert application that uses machine learning to detect dangerous animals. Using the Design Science Research method, a convolutional neural network is trained to build an artifact that detects five dangerous animals from an African context. The artifact is mounted on a robot …


A Customized Artificial Intelligence Based Career Choice Recommender System For A Rural University, Nosipho Carol Mavuso, Nobert Jere, Darelle Vangreunen Sep 2023

A Customized Artificial Intelligence Based Career Choice Recommender System For A Rural University, Nosipho Carol Mavuso, Nobert Jere, Darelle Vangreunen

African Conference on Information Systems and Technology

Rapid technological developments have enabled users to be supported and guided in decision-making. An example of this is the ability of tertiary students to use technology to explore different career options and make informed decisions about their future. Notwithstanding the increasing use of technology in general, the technology for career guidance and personalized career recommendations in South Africa is still limited. There are some limiting factors such as the ever-looming challenge of limited access to technology, language barriers and cultural differences that are prevalent in rural areas. With this premise, this study collected quantitative data from students at an Eastern …


Assessment Of Knee Flexion In Young Children With Prosthetic Knee Components Using Dynamic Time Warping, Mark Daniel Geil, Zahra Safaeepour Aug 2023

Assessment Of Knee Flexion In Young Children With Prosthetic Knee Components Using Dynamic Time Warping, Mark Daniel Geil, Zahra Safaeepour

Faculty and Research Publications

Introduction: Analysis of human locomotion is challenged by limitations in traditional numerical and statistical methods as applied to continuous timeseries data. This challenge particularly affects understanding of how close limb prostheses are to mimicking anatomical motion. This study was the first to apply a technique called Dynamic Time Warping to measure the biomimesis of prosthetic knee motion in young children and addressed the following research questions: Is a combined dynamic time warping/root mean square analysis feasible for analyzing pediatric lower limb kinematics? When provided at an earlier age than traditional protocols dictate, can children with limb loss utilize an articulating …


Designing Intelligent Energy Efficient Scheduling Algorithm To Support Massive Iot Communication In Lora Networks, Jui Mhatre Jul 2023

Designing Intelligent Energy Efficient Scheduling Algorithm To Support Massive Iot Communication In Lora Networks, Jui Mhatre

Master of Science in Computer Science Theses

We are about to enter a new world with sixth sense ability – “Network as a sensor -6G”. The driving force behind digital sensing abilities is IoT. Due to their capacity to work in high frequency, 6G devices have voracious energy demand. Hence there is a growing need to work on green solutions to support the underlying 6G network by making it more energy efficient. Low cost, low energy, and long-range communication capability make LoRa the most adopted and promising network for IoT devices. Since LoRaWAN uses ALOHA for multi-access of channels, collision management is an important task. Moreover, in …


Detection Of Crypto-Ransomware Attack Using Deep Learning, Muna Jemal May 2023

Detection Of Crypto-Ransomware Attack Using Deep Learning, Muna Jemal

Master of Science in Computer Science Theses

The number one threat to the digital world is the exponential increase in ransomware attacks. Ransomware is malware that prevents victims from accessing their resources by locking or encrypting the data until a ransom is paid. With individuals and businesses growing dependencies on technology and the Internet, researchers in the cyber security field are looking for different measures to prevent malicious attackers from having a successful campaign. A new ransomware variant is being introduced daily, thus behavior-based analysis of detecting ransomware attacks is more effective than the traditional static analysis. This paper proposes a multi-variant classification to detect ransomware I/O …


Quantification Of Various Types Of Biases In Large Language Models, Sudhashree Sayenju Apr 2023

Quantification Of Various Types Of Biases In Large Language Models, Sudhashree Sayenju

Doctor of Data Science and Analytics Dissertations

Natural Language Processing (NLP) systems are included everywhere on the internet from search engines, language translations to more advanced systems like voice assistant and customer service. Since humans are always on the receiving end of NLP technologies, it is very important to analyze whether or not the Large Language Models (LLMs) in use have bias and are therefore unfair. The majority of the research in NLP bias has focused on societal stereotype biases embedded in LLMs. However, our research focuses on all types of biases, namely model class level bias, stereotype bias and domain bias present in LLMs. Model class …


Human Factors Engineering, Robert S. Keyser Apr 2023

Human Factors Engineering, Robert S. Keyser

KSU Distinguished Course Repository

Human Factors Engineering is a comprehensive survey of human factors theory, research, and applications which are of particular relevance to Quality and Engineering Management. Emphasis will be placed on operator constraints in the design of work processes, workplaces, and instrumentation.


Analysis Of The Adherence Of Mhealth Applications To Hipaa Technical Safeguards, Bilash Saha Apr 2023

Analysis Of The Adherence Of Mhealth Applications To Hipaa Technical Safeguards, Bilash Saha

Master of Science in Information Technology Theses

The proliferation of mobile health technology, or mHealth apps, has made it essential to protect individual health details. People now have easy access to digital platforms that allow them to save, share, and access their medical data and treatment information as well as easily monitor and manage health-related issues. It is crucial to make sure that protected health information (PHI) is effectively and securely transmitted, received, created, and maintained in accordance with the rules outlined by the Health Insurance Portability and Accountability Act (HIPAA), as the use of mHealth apps increases. Unfortunately, many mobile app developers, particularly those of mHealth …


Optimization Of Metallic Interconnectors For Clean Energy Power Systems, Mason Cox Apr 2023

Optimization Of Metallic Interconnectors For Clean Energy Power Systems, Mason Cox

Symposium of Student Scholars

The need to eliminate carbon emissions coupled with intensified energy demands have led to an intensified research and development activities in clean energy technology. Taking advantage of fuels such as green hydrogen, solid oxide fuel cells (SOFC) power systems can serve as a potential energy conversion system. SOFCs combine O2 from air and H2 gas to generate electricity, consequently producing water (H2O) as the only byproduct of the electrochemical reaction. SOFCs typically have an operational temperature in the range of 500-900C and generate electricity without the requirement of recharging, so long as the fuel is supplied. A single SOFC cell …


Design And Development Of A Solar Module Health Monitoring Device, Elijah Madaris, Christopher Baden, Sandip Das Apr 2023

Design And Development Of A Solar Module Health Monitoring Device, Elijah Madaris, Christopher Baden, Sandip Das

Symposium of Student Scholars

Solar power has emerged as a promising renewable clean energy source and installations of solar panels are increasing sharply year after year. Monitoring the power output and health of solar panels is critically important to ensure safe and reliable operation of a solar power plant throughout its operational lifetime. In this project, we have designed and built a low-cost electronic device that is capable of measuring the electrical parameters of a solar cell or module. The device consists of a microprocessor with integrated analog-to-digital converter, a supercapacitor bank, current sense amplifier, and electromechanical relays. The microprocessor performs data acquisition through …


Analyzing The Effectiveness Of Helmet Laws In Reducing Motorcycle Fatalities In The United States: A State-Level Study In 2020, Liz Furlow Apr 2023

Analyzing The Effectiveness Of Helmet Laws In Reducing Motorcycle Fatalities In The United States: A State-Level Study In 2020, Liz Furlow

Symposium of Student Scholars

Motorcycle fatalities are a significant public health issue in the United States. Motorcyclists are more vulnerable than other motorists and have a higher risk of injury and death in the event of an accident. To reduce the number of preventable motorcycle fatalities, some states have implemented mandatory helmet laws. However, the effectiveness of helmet laws in reducing fatalities remains a topic of debate.

For this study, state-level data on motorcycle fatalities, motorcycle registrations, and helmet laws in the United States was collected for the year 2020. The data was obtained from the National Highway Traffic Safety Administration's (NHTSA) Fatality Analysis …