Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Kennesaw State University

2017

Discipline
Keyword
Publication
Publication Type

Articles 1 - 30 of 123

Full-Text Articles in Physical Sciences and Mathematics

Stable Solution To L 2,1-Based Robust Inductive Matrix Completion And Its Application In Linking Long Noncoding Rnas To Human Diseases, Ashis Kumer Biswas, Dongchul Kim, Mingon Kang, Chris Ding Dec 2017

Stable Solution To L 2,1-Based Robust Inductive Matrix Completion And Its Application In Linking Long Noncoding Rnas To Human Diseases, Ashis Kumer Biswas, Dongchul Kim, Mingon Kang, Chris Ding

Faculty and Research Publications

Backgrounds A large number of long intergenic non-coding RNAs (lincRNAs) are linked to a broad spectrum of human diseases. The disease association with many other lincRNAs still remain as puzzle. Validation of such links between the two entities through biological experiments are expensive. However, a plethora lincRNA-data are available now, thanks to the High Throughput Sequencing (HTS) platforms, Genome Wide Association Studies (GWAS), etc, which opens the opportunity for cutting-edge machine learning and data mining approaches to extract meaningful relationships among lincRNAs and diseases. However, there are only a few in silico lincRNA-disease association inference tools available to date, and …


Visual Odometry Using Convolutional Neural Networks, Alec Graves, Steffen Lim, Thomas Fagan, Kevin Mcfall Phd. Dec 2017

Visual Odometry Using Convolutional Neural Networks, Alec Graves, Steffen Lim, Thomas Fagan, Kevin Mcfall Phd.

The Kennesaw Journal of Undergraduate Research

Visual odometry is the process of tracking an agent's motion over time using a visual sensor. The visual odometry problem has only been recently solved using traditional, non-machine learning techniques. Despite the success of neural networks at many related problems such as object recognition, feature detection, and optical flow, visual odometry still has not been solved with a deep learning technique. This paper attempts to implement several Convolutional Neural Networks to solve the visual odometry problem and compare slight variations in data preprocessing. The work presented is a step toward reaching a legitimate neural network solution.


Use Of An Alternative Natural Weed Suppressant: Effects Of Parboiled Rice Hull Mulch On The Growth Of Container Weeds, Amy R. Fields-Taylor, Vanessa Slinger-Friedman Dec 2017

Use Of An Alternative Natural Weed Suppressant: Effects Of Parboiled Rice Hull Mulch On The Growth Of Container Weeds, Amy R. Fields-Taylor, Vanessa Slinger-Friedman

The Kennesaw Journal of Undergraduate Research

The Chattahoochee Nature Center (CNC) is one of the leading educational centers in Georgia about the ecology of the Chattahoochee River. Due to lack of man power, keeping down the weeds in the CNC plant nursery is one of those tasks that often gets left undone. The nursery becomes overgrown with invasive weed species. Understandably, they must sometimes resort to the use of herbicides, such as Roundup®, to keep the hundreds of native and endangered species of plants housed at CNC from being choked out by invasive weeds. This study tests the ability to suppress weed growth by use of …


From The Editors, Herbert J. Mattord, Michael E. Whitman, Carole L. Hollingsworth Dec 2017

From The Editors, Herbert J. Mattord, Michael E. Whitman, Carole L. Hollingsworth

Journal of Cybersecurity Education, Research and Practice

No abstract provided.


A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard K. Nilsen, Yair Levy, Steven R. Terrell Ph.D., Dawn Beyer Dec 2017

A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard K. Nilsen, Yair Levy, Steven R. Terrell Ph.D., Dawn Beyer

Journal of Cybersecurity Education, Research and Practice

Organizational information system users (OISUs) that are open to cyber threats vectors are contributing to major financial and information losses for individuals, businesses, and governments. Moreover, technical cybersecurity controls may be rendered useless due to a lack of cybersecurity competency of OISUs. The main goal of this research study was to propose and validate, using subject matter experts (SMEs), a reliable hands-on assessment prototype tool for measuring the knowledge, skills, and abilities (KSAs) that comprise the cybersecurity competency of an OISU. Primarily using the Delphi methodology, this study implemented four phases of data collection using cybersecurity SMEs for proposing and …


Social Media Risk Perceptions Of Human Resource Professionals: Issues Undergraduate Students Should Consider, Julio C. Rivera, Jack Howard, Samuel Goh, James L. Worrell, Paul Di Gangi Dec 2017

Social Media Risk Perceptions Of Human Resource Professionals: Issues Undergraduate Students Should Consider, Julio C. Rivera, Jack Howard, Samuel Goh, James L. Worrell, Paul Di Gangi

Journal of Cybersecurity Education, Research and Practice

This study contrasts the social media risk perceptions of undergraduate students, versus those of certified Human Resource professionals. Social media is widely used by most segments of the population, and particularly among the age group that includes most undergraduate students. Organizations hiring employees are increasingly examining job applicant's social media postings as part of the applicant screening process. In this study we examine how these groups differ in their perceptions of the risks inherent in using social media, and what these differences may mean for students seeking employment. Recommendations are made for raising undergraduate student awareness of these risks.


Synergistic Security: A Work System Case Study Of The Target Breach, Martha Nanette Harrell Dec 2017

Synergistic Security: A Work System Case Study Of The Target Breach, Martha Nanette Harrell

Journal of Cybersecurity Education, Research and Practice

Recent publicized security breaches can be used to evaluate information security programs. The processes and procedures that allowed the event to occur can be examined in a case study and then be used to find methods for future mitigation of risk. The Target security breach is used in this study to examine the organization’s information security program using a macro-ergonomic model. This research posits that an information security program should consider the work system design, based in macro-ergonomics, to help mitigate information security risk to the organization and ensure an efficient and effective information security program. Based on a seminal …


A Toolkit Approach To Information Security Awareness And Education, Peter Korovessis, Steven Furnell, Maria Papadaki, Paul Haskell-Dowland Dec 2017

A Toolkit Approach To Information Security Awareness And Education, Peter Korovessis, Steven Furnell, Maria Papadaki, Paul Haskell-Dowland

Journal of Cybersecurity Education, Research and Practice

In today’s business environment where all operations are enabled by technology, information security has become an established discipline as more and more businesses realize its value. The human component has been recognized to have an important role in information security since the only way to reduce security risks is through making employees more information security aware. Towards this goal the research will appreciate the importance of information security awareness by illustrating the need for more effective user training. Further to that it proposes and develops an information security toolkit as a prototype awareness raising initiative. Apart from the elements of …


Search For Light Tetraquark States In Υ ( 1 S ) And Υ ( 2 S ) Decays, S. Jia Et Al., David Joffe, Ratnappuli L. Kulasiri Dec 2017

Search For Light Tetraquark States In Υ ( 1 S ) And Υ ( 2 S ) Decays, S. Jia Et Al., David Joffe, Ratnappuli L. Kulasiri

Faculty and Research Publications

We search for the JPC=0−− and 1+− light tetraquark states with masses up to 2.46 GeV/c2 in Υ(1S) and Υ(2S) decays with data samples of (102±2) million and (158±4) million events, respectively, collected with the Belle detector. No significant signals are observed in any of the studied production modes, and 90% credibility level (C.L.) upper limits on their branching fractions in Υ(1S)and Υ(2S) decays are obtained. The inclusive branching fractions of the Υ(1S) and Υ(2S) decays into final states with f1(1285) are measured to be B(Υ(1S)→f1(1285)+anything)=(46±28(stat)±13(syst))×10−4 and B(Υ(2S)→f1(1285)+anything)=(22±15(stat)±6.3(syst))×10−4. The measured χb2→J/ψ+anything branching fraction is measured to be (1.50±0.34(stat)±0.22(syst))×10−3, and 90% …


Feasibility Of Using Virtual Reality In Requirements Elicitation Process, Aman Bhimani Nov 2017

Feasibility Of Using Virtual Reality In Requirements Elicitation Process, Aman Bhimani

Master of Science in Software Engineering Theses

Contemporary Virtual Reality (VR) technologies offer an increasing number of functionalities including head-mounted displays (HMD), haptic and sound feedback, as well as motion tracking. This gives us the opportunity to leverage the immersive power offered by these technologies in the context of requirements elicitation, especially to surface those requirements that cannot be expressed via traditional techniques such as interviews and focus groups. The goal of this thesis is to survey uses of VR in requirements engineering, and to describe a method of elicitation using VR as a tool.

To validate the methodology, a research plan is developed with a strong …


Evidence For Isospin Violation And Measurement Of C P Asymmetries In B → K ∗ ( 892 ) Γ, T. Horiguchi Et Al., D. Joffe, Ratnappuli L. Kulasiri Nov 2017

Evidence For Isospin Violation And Measurement Of C P Asymmetries In B → K ∗ ( 892 ) Γ, T. Horiguchi Et Al., D. Joffe, Ratnappuli L. Kulasiri

Faculty and Research Publications

We report the first evidence for isospin violation in B→K∗γ and the first measurement of the difference of CP asymmetries between B+→K*+γ and B0→K*0γ. This analysis is based on the data sample containing 772×106B¯B pairs that was collected with the Belle detector at the KEKB energy-asymmetric e+e− collider. We find evidence for the isospin violation with a significance of 3.1σ, Δ0+=[+6.2±1.5(stat)±0.6(syst)±1.2(f+−/f00)]%, where the third uncertainty is due to the uncertainty on the fraction of B+B− to B0¯B0 production in Υ(4S) decays. The measured value is consistent with predictions of the standard model. The result for the difference of CP asymmetries …


Measurement Of The Decays B → Η ℓ Ν ℓ And B → Η ′ ℓ Ν ℓ In Fully Reconstructed Events At Belle, C. Beleño Et Al., D. Joffe, Ratnappuli L. Kulasiri Nov 2017

Measurement Of The Decays B → Η ℓ Ν ℓ And B → Η ′ ℓ Ν ℓ In Fully Reconstructed Events At Belle, C. Beleño Et Al., D. Joffe, Ratnappuli L. Kulasiri

Faculty and Research Publications

We report branching fraction measurements of the decays B+→ηℓ+νℓ and B+→η′ℓ+νℓ based on 711 fb−1 of data collected near the Υ(4S) resonance with the Belle experiment at the KEKB asymmetric-energy e+e− collider. This data sample contains 772 million B¯B events. One of the two Bmesons is fully reconstructed in a hadronic decay mode. Among the remaining (“signal-B”) daughters, we search for the η meson in two decay channels, η→γγ and η→π+π−π0, and reconstruct the η′meson in η′→ηπ+π− with subsequent decay of the η into γγ. Combining the two η modes and using an extended maximum likelihood, the B+→ηℓ+νℓ branching fraction …


Towards A Development Of A Social Engineering Exposure Index (Sexi) Using Publicly Available Personal Information, W. Shawn Wilkerson, Yair Levy, James Richard Kiper, Martha Snyder Oct 2017

Towards A Development Of A Social Engineering Exposure Index (Sexi) Using Publicly Available Personal Information, W. Shawn Wilkerson, Yair Levy, James Richard Kiper, Martha Snyder

KSU Proceedings on Cybersecurity Education, Research and Practice

Millions of people willingly expose their lives via Internet technologies every day, and even those who stay off the Internet find themselves exposed through data breaches. Trillions of private information records flow through the Internet. Marketers gather personal preferences to coerce shopping behavior, while providers gather personal information to provide enhanced services. Few users have considered where their information is going or who has access to it. Even fewer are aware of how decisions made in their own lives expose significant pieces of information, which can be used to harm the very organizations they are affiliated with by cyber attackers. …


A Comparison Of Personal Social Media Risk Perceptions Between Undergraduate Students And Human Resource Professionals, Julio C. Rivera, Jack Howard, Samuel Goh, James Worrell, Paul Di Gangi Oct 2017

A Comparison Of Personal Social Media Risk Perceptions Between Undergraduate Students And Human Resource Professionals, Julio C. Rivera, Jack Howard, Samuel Goh, James Worrell, Paul Di Gangi

KSU Proceedings on Cybersecurity Education, Research and Practice

This study contrasts the social media risk perceptions of undergraduate students, versus those of certified Human Resource professionals. Social media is widely used by most segments of the population, and particularly among the age group that includes most undergraduate students. Organizations hiring employees are increasingly examining job applicant's social media postings as part of the applicant screening process. In this study we examine how these groups differ in their perceptions of the risks inherent in using social media, and what these differences may mean for students seeking employment. Recommendations are made for raising undergraduate student awareness of these risks.


Experiments With Applying Artificial Immune System In Network Attack Detection, Alexis Cooper Oct 2017

Experiments With Applying Artificial Immune System In Network Attack Detection, Alexis Cooper

KSU Proceedings on Cybersecurity Education, Research and Practice

The assurance of security within a network is difficult due to the variations of attacks. This research conducts various experiments to implement an Artificial Immune System based Intrusion Detection System to identify intrusions using the Negative Selection Algorithm. This research explores the implementation of an Artificial Immune System opposed to the industry standard of machine learning. Various experiments were conducted to identify a method to separate data to avoid false-positive results. The use of an Artificial Immune System requires a self and nonself classification to determine if an intrusion is present within the network. The results of an Artificial Immune …


Reducing Human Error In Cyber Security Using The Human Factors Analysis Classification System (Hfacs)., Tommy Pollock Oct 2017

Reducing Human Error In Cyber Security Using The Human Factors Analysis Classification System (Hfacs)., Tommy Pollock

KSU Proceedings on Cybersecurity Education, Research and Practice

For several decades, researchers have stated that human error is a significant cause of information security breaches, yet it still remains to be a major issue today. Quantifying the effects of security incidents is often a difficult task because studies often understate or overstate the costs involved. Human error has always been a cause of failure in many industries and professions that is overlooked or ignored as an inevitability. The problem with human error is further exacerbated by the fact that the systems that are set up to keep networks secure are managed by humans. There are several causes of …


A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard Nilsen, Yair Levy, Steven Terrell, Dawn Beyer Oct 2017

A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard Nilsen, Yair Levy, Steven Terrell, Dawn Beyer

KSU Proceedings on Cybersecurity Education, Research and Practice

Organizational information system users (OISUs) that are open to cyber threats vectors are contributing to major financial and information losses for individuals, businesses, and governments. Moreover, technical cybersecurity controls may be rendered useless due to a lack of cybersecurity competency of OISUs. The main goal of this research study was to propose and validate, using subject matter experts (SMEs), a reliable hands-on assessment prototype tool for measuring the knowledge, skills, and abilities (KSAs) that comprise the cybersecurity competency of an OISU. Primarily using the Delphi methodology, this study implemented four phases of data collection using cybersecurity SMEs for proposing and …


Voice Hacking Proof Of Concept: Using Smartphones To Spread Ransomware To Traditional Pcs, Leonardo I. Mazuran, Bryson R. Payne, Tamirat T. Abegaz Oct 2017

Voice Hacking Proof Of Concept: Using Smartphones To Spread Ransomware To Traditional Pcs, Leonardo I. Mazuran, Bryson R. Payne, Tamirat T. Abegaz

KSU Proceedings on Cybersecurity Education, Research and Practice

This paper presents a working proof of concept that demonstrates the ability to deploy a sequence of hacks, triggered by speaking a smartphone command, to launch ransomware and other destructive attacks against vulnerable Windows computers on any wireless network the phone connects to after the voice command is issued. Specifically, a spoken, broadcast, or pre-recorded voice command directs vulnerable Android smartphones or tablets to a malicious download page that compromises the Android device and uses it as a proxy to run software designed to scan the Android device’s local area network for Windows computers vulnerable to the EternalBlue exploit, spreading …


Security Device Roles, Vabrice Wilder Oct 2017

Security Device Roles, Vabrice Wilder

KSU Proceedings on Cybersecurity Education, Research and Practice

“An abstract of this article was published in the proceedings of the Conference on Cybersecurity Education, Research & Practice, 2017”. Communication has evolved since the beginning of mankind from smoke signals to drones to now the internet. In a world filled with technology the security of one’s device is not to be taken for granted. A series of research was done in order to gather details about network devices that can aid in the protection of one’s information while being transferred through the internet. The findings included but not limited to, switches, the seven layers of OSI, routers, firewalls, load …


Analyzing Http Requests For Web Intrusion Detection, Sara Althubiti, Xiaohong Yuan, Albert Esterline Oct 2017

Analyzing Http Requests For Web Intrusion Detection, Sara Althubiti, Xiaohong Yuan, Albert Esterline

KSU Proceedings on Cybersecurity Education, Research and Practice

Many web application security problems related to intrusion have resulted from the rapid development of web applications. To reduce the risk of web application problems, web application developers need to take measures to write secure applications to prevent known attacks. When such measures fail, it is important to detect such attacks and find the source of the attacks to reduce the estimated risks. Intrusion detection is one of the powerful techniques designed to identify and prevent harm to the system. Most defensive techniques in Web Intrusion Systems are not able to deal with the complexity of cyber-attacks in web applications. …


"Think Before You Click. Post. Type." Lessons Learned From Our University Cyber Secuity Awareness Campaign, Rachael Innocenzi, Kaylee Brown, Peggy Liggit, Samir Tout, Andrea Tanner, Theodore Coutilish, Rocky Jenkins Oct 2017

"Think Before You Click. Post. Type." Lessons Learned From Our University Cyber Secuity Awareness Campaign, Rachael Innocenzi, Kaylee Brown, Peggy Liggit, Samir Tout, Andrea Tanner, Theodore Coutilish, Rocky Jenkins

KSU Proceedings on Cybersecurity Education, Research and Practice

This article discusses the lessons learned after implementing a successful university-wide cyber security campaign. The Cyber Security Awareness Committee (CyberSAC), a group comprised of diverse units across campus, collaborated together on resources, talent, people, equipment, technology, and assessment practices to meet strategic goals for cyber safety and education. The project involves assessing student learning and behavior changes after participating in a Cyber Security Password Awareness event that was run as a year-long campaign targeting undergraduate students. The results have implications for planning and implementing university-wide initiatives in the field of cyber security, and more broadly, higher education at large.


Ssetgami: Secure Software Education Through Gamification, Hector Suarez, Hooper Kincannon, Li Yang Oct 2017

Ssetgami: Secure Software Education Through Gamification, Hector Suarez, Hooper Kincannon, Li Yang

KSU Proceedings on Cybersecurity Education, Research and Practice

Since web browsers have become essential to accomplishing everyday tasks, developing secure web applications has become a priority in order to protect user data, corporate databases and critical infrastructure against cyber-crimes . This research presents a game-like (gamification) approach to teach key concepts and skills on how to develop secure web applications. Gamification draws on motivational models, one of psychological theories. Gamification design has great potential over traditional education where we often find students demotivated and lecturers failing to engage them in learning activities. This research created game-like learning modules to teach top vulnerabilities and countermeasures for these top vulnerabilities …


Search For Cp Violation And Measurement Of The Branching Fraction In The Decay D0 → K0 Sk0 S, N. Dash Et Al., D. Joffe, Ratnappuli L. Kulasiri Oct 2017

Search For Cp Violation And Measurement Of The Branching Fraction In The Decay D0 → K0 Sk0 S, N. Dash Et Al., D. Joffe, Ratnappuli L. Kulasiri

Faculty and Research Publications

We report a study of the decay D0→K0SK0S using 921  fb−1 of data collected at or near the Υ(4S) and Υ(5S) resonances with the Belle detector at the KEKB asymmetric energy e+e− collider. The measured time-integrated CP asymmetry is ACP(D0→K0SK0S)=(−0.02±1.53±0.02±0.17)%, and the branching fraction is B(D0→K0SK0S)=(1.321±0.023±0.036±0.044)×10−4, where the first uncertainty is statistical, the second is systematic, and the third is due to the normalization mode (D0→K0Sπ0). These results are significantly more precise than previous measurements available for this mode. The ACP measurement is consistent with the standard model expectation.


Accessibility And Usability Of Government Websites In Tanzania, Joel S. Mtebe, Aron W. Kondoro Sep 2017

Accessibility And Usability Of Government Websites In Tanzania, Joel S. Mtebe, Aron W. Kondoro

The African Journal of Information Systems

The government of Tanzania has been embracing information systems specifically websites in order to widen access to government services, lower administrative costs, and to increase public participation in decision making. As a result, almost every ministry, department, and agency (MDA) has developed a website of different kind. However, the majority of existing websites were developed without sufficiently considering user needs which indicates that they do have some usability and accessibility problems. This study used SortSite tool to evaluate accessibility and usability of government websites taking a sample of 22 websites. The report from the SortSite tool was then checked against …


Systematic Analysis Of Enterprise Perception Towards Cloud Adoption In The African States: The Nigerian Perspective, George A. Oguntala, Prof. Raed A. Abd-Alhameed, Dr. Janet O. Odeyemi Sep 2017

Systematic Analysis Of Enterprise Perception Towards Cloud Adoption In The African States: The Nigerian Perspective, George A. Oguntala, Prof. Raed A. Abd-Alhameed, Dr. Janet O. Odeyemi

The African Journal of Information Systems

The desirous benefits of cloud computing such as high return on investment through efficient resource management, high application throughput and on-demand capabilities have resulted in the unprecedented global acceptance of the computing paradigm. However, research on cloud adoption indicates that fewer organisations in the African states are adopting cloud services. Thus, the purview of the paper is to examine the factors responsible for the poor adoption of cloud computing in most African enterprises using Nigeria as a case study. The study focus on the perception of IT and non-IT employees towards cloud computing. Moreover, the paper reviews the literature on …


Human Energy Capstone Sep 2017

Human Energy Capstone

Activities

Movement is very important for humans. From our earliest days, we seem eager to get up and move around. The most celebrated moments of a child’s life seem to be geared around the ability to move: the first crawl, the first walk, the first bike ride, and (every parent’s nightmare) the first driver’s license. The ability to get around is one of the most cherished abilities and freedoms. For many Americans, our ability to get around when and how we want is almost considered a sacred right. Physics textbooks, which have many chapters devoted to motion, build a great many …


Efficiency Sep 2017

Efficiency

Activities

The previous two activities in this module have shown us the importance of conservation laws. These laws provide extra “tools” that allow us to analyze certain aspects of physical systems and to be able to predict the motion of objects in the systems without using more complicated analysis. Even in situations wherein we cannot exactly solve the motion, these laws are incredibly useful. For instance, if someone shows us an incredibly complicated device that can seemingly produce electricity with no energy input whatsoever, we know not to invest money in this device, as it must be a sham since it …


First Law Of Thermodynamics Sep 2017

First Law Of Thermodynamics

Activities

In last week’s activity, we calculated the motion of objects by studying the forces on them. Using Newton’s Second Law of Motion, we were able to relate the forces on an object to the acceleration it experienced. The presence of constant forces led to constant accelerations, which corresponded to linearly-increasing velocities with respect to time. Comparisons made between the velocities we measured and those calculated from a study of the forces on the objects allowed us to validate Newton’s equation F = ma. In this week’s activity, we are going to investigate almost the same experimental setup as last week, …


Newton's Second Law Sep 2017

Newton's Second Law

Activities

There are two ways to study the dynamics of a system in which there is motion. One of these is to study the kinematics of the system to see if there is any acceleration. If there is an acceleration, then this implies that there is a net force on some part of the system. If there is no acceleration, then this means that either there are no forces on the system, or that the forces within the system are all balanced. The other way to study the system is from an energy standpoint. Energy can flow from potential to kinetic, …


Population Growth Sep 2017

Population Growth

Activities

When George Washington started the first Presidency of the United States of America, he was governing less than 4 million people who occupied an area of 2,300,000 square kilometers. It was an agrarian society, with 95% of the population living on farms and only 5% in cities or towns of more than 2,500. There was plenty of land, and a vast array of natural resources, just waiting to be tapped. Today, we live in a country of over 294 million people. While we are one of the major food producers in the world, it is no longer due to us …