About this Collection
The publications featured in this Digital Commons@Georgia Southern collection are produced by the faculty of the Allen E. Paulson College of Engineering and Computing.
Faculty Research in Digital Commons@Georgia Southern
Georgia Southern University faculty members are eligible to showcase their research in Digital Commons@Georgia Southern and to join the Expert Gallery hosted by the University Libraries. Their intellectual and creative works are accessible through galleries organized by College, Department, Research Center, and a customized SelectedWorks researcher profile.
We invite and encourage Georgia Southern faculty members to sign up to Join the Expert Gallery!
Publishing Information
Digital Commons@Georgia Southern is an open-access digital repository. Copyright and licensing agreements for works published by Digital Commons@Georgia Southern protect the author's rights while facilitating the sharing of research. The works in this gallery were originally published or presented under agreements with entities external to this repository. Records for each work provide the access permitted by the original copyright and licensing agreement. For additional access or questions about a work, please contact the authors or email the Digital Commons team.
Submissions from 2024
Experimental Demonstration of a Novel Supercritical CO2 Seal Concept on a 2′′ Static Test Rig, Mohammad Fuad Hassan, Hanping Xu, Mohammad Towhidul Islam, Sevki Cesmeci, Shuangbiao Liu, Aaron Harcrow, Ali Akbor Topu, Md Wasif Hasan, Jonah Henry, Joshua Bunting, David Dewis, and Jing Tang
Submissions from 2023
Big Cyber Security Data Analysis with Apache Mahou, Omotola Adekanbmi, Hayden Wimmer, and Jongyeop Kim
Resilient Cooperative Secondary Control of Islanded AC Microgrids Utilizing Inverter-Based Resources Against State-Dependent False Data Injection Attacks, Mahmood Jamali, Mahdieh S. Sadabadi, Masoud Davari, Subham Sahoo, and Frede Blaabjerg
Integration of EEG and Eye Tracking Technology: A Systematic Review, Suhaima Jamal, Meenalosini Vimal Cruz, Sibi Chakravarthy, Camden Wahl, and Hayden Wimmer
Performance Analysis of Machine Learning Algorithm on Cloud Platforms: AWS vs Azure vs GCP, Suhaima Jamal and Hayden Wimmer
JavaScript Frameworks -A Comparative Study, Qozeem Odeniran and Hayden Wimmer
Big Data Approach For IoT Botnet Traffic Detection Using Apache Spark Technology, Arokodare Oluwatomisin, Hayden Wimmer, and Jie Du
An Industry Survey of Analytics Spreadsheet Tools Adoption: Microsoft Excel vs Google Sheets, Carl Rebman, Queen Booker, Hayden Wimmer, Steven Levkoff, Mark McMurtrey, and Loreen Marie Powell
An Exploratory Study Comparing Zoom and Google Technology As A Group Decision Support System, Carl M. Rebman Jr and Hayden Wimmer
Faculty Opinions on Student Preparation, Performance, And Evaluations Post Covid, Carl M. Rebman Jr, Hayden Wimmer, Queen Booker, J. Breese, P. Rogers, Mark McMurtrey, and Steven Levkoff
Web Service Credibility Evaluation Methods in Different Application Domains, Atef Shalan, Jaciel E. Reyes, Hayden Wimmer, Sarika Jain, and Mohamed Hefny
Experimental and Numerical Investigation of Combustion and Emissions Characteristics in a Drone Jet Engine Fueled with Jet-A, Valentin Soloiu, John William McAfee, Marcel Ilie, Cesar Carapia, Amanda Weave, and Austin Brant
Anomaly Detection in Intrusion Detection System using Amazon SageMaker, Ian A. Trawinski, Hayden Wimmer, and Jongyeop Kim
Evaluating the Performance of Containerized Webservers against web servers on Virtual Machines using Bombardment and Siege, Daniel Ukene, Hayden Wimmer, and Jongyeop Kim
Text Prediction Using Artificial Intelligence: An Analysis of Two Text Prediction Systems, Hayden Wimmer, Jie Due, and Peter Heri
Integrating Engineering Standards into Manufacturing Engineering Curriculum, Yue Zhang, Haijun Gong, and Lianjun Wu
Submissions from 2022
Dark Web Forensics: An Investigation of Tracking Dark Web Activity with Digital Forensics, Robert Brinson, Hayden Wimmer, and Lei Chen
Botnet Intrusion Detection: a Modern Architecture to Defend a Virtual Private Cloud, Robert Brinson, Hayden Wimmer, and Carl Rebman
Predicting Customer Loyalty in the Mobile Banking Setting: An Integrated Approach, Nhuong Bui, Zach Moore, Hayden Wimmer, and Long Pham
Exploring Blockchain Performance with CPUHEAVY Microbenchmark on Smart Contracts, Beloved Egbedion, Hayden Wimmer, and Carl M. Rebman Jr
Arbitrage Behavior amongst Multiple Cryptocurrency Exchange Markets, Samuel Grone, Weitian Tong, Hayden Wimmer, and Yao Xu
Robotic Manufacturing System for Unattended Machining and Inspection of Graphite Bipolar Flow Field Plates for Proton Exchange Membrane Fuel Cells, Vladimir Gurau and Ryan Kent
Imagine An eLearning DAO, Felix G. Hamza-Lup
Learner Attention Quantification Using Eye Tracking and EEG Signals, Md Shakil Hossain, Dhruv Pandya, Andrew A. Allen, and Felix Hamza-Lup
Analysis of Deep Learning Libraries: Keras, PyTorch, and MXnet, Seongsoo Kim, Hayden Wimmer, and Jongyeop Kim
A Qualitative Multi-Disciplinary Analysis of Employers’ Technology Competency Perceptions for Graduates Readiness to the Workforce, Marcel Maghiar and Christopher M. Brown
Attention and Meditation Quantification using Neural Networks, Anca O. Muresan and Felix G. Hamza-Lup
Auto-ML Cyber Security Data Analysis Using Google, Azure and IBM Cloud Platforms, Emmanuel C. Opara, Hayden Wimmer, and Carl M. Rebman Jr
Treatment of Highway Stormwater Runoff Using Sustainable Biochar: A Review, Angelika S. Ouedraogo, George Yuzhu Fu, and Ahmed I. Yunus
Deep Learning: An Empirical Study on Kimia Path24, Shaikh Shiam Rahman, Hayden Wimmer, and Loreen Marie Powell
Sentiment Based LSTM for Stock Price Prediction: Congress vs General Public, Ian A. Trawinski, Hayden Wimmer, and DeJarvis Oliver
Submissions from 2021
An International Review and Study on Perceptions of Security, Adoption, and Implementation of Electronic Health Records, Faith Aliyu, Hayden Wimmer, Loreen Powell, and Carl M. Rebman Jr
Electric hybrid storage systems and their applications, Paul N. Borza, Mihai Machedon-Pisu, Sorin Vlase, and Felix Hamza-Lup
Security Analysis of the Amazon Echo Dot, Robert Brinson, Hayden Wimmer, and Queen Booker
Effects of Virtual Humans’ Gender and Spoken Accent on Users’ Perceptions of Expertise in Mental Wellness Conversations Title, Pedro G. Feijóo-García, M. Zalake, A de Siqueira, Benjamin Lok, and Felix Hamza-Lup
Finding approximate analytical solutions of differential equations using Neural Networks with self-adaptive training sets, Felix Hamza-Lup, Ionut Iacob, and Jeremy Orgeron
A Cryptocurrency Prediction Model Using LSTM and GRU Algorithms, Jongyeop Kim, Seongsoo Kim, Hayden Wimmer, and Hong Liu
A Streaming Data Collection and Analysis for Cryptocurrency Price Prediction using LSTM, Jongyeop Kim, Hayden Wimmer, Hong Liu, and Seongsoo Kim
Web-based 3D Visualization System for Anatomy Online Instruction, Eli MacLean, Felix G. Hamza-Lup, April W. Garrity, Casey Keck, and Michelle Smith
Design of a Novel Undergraduate/Graduate Course on Terrestrial LiDAR, Gustavo O. Maldonado, Shahnam Navaee, and Marcel Maghiar
Investigating Bluetooth Vulnerabilities to Defend from Attacks, Patel Nishitkumar, Hayden Wimmer, and Carl M. Rebman Jr
Documenting the Process of Hijacking a Raspberry Pi User Login Credentials via Remote Code Execution, Nishitkumar Patel, Hayden Wimmer, and Loreen Powell
Awareness of Blockchain Usage, Structure, & Generation of Platform’s Energy Consumption: Working Towards a Greener Blockchain, Loreen Marie Powell, Michalina Hendon, Andrew Mangle, and Hayden Wimmer
Pandemic Shift: Impact of Covid-19 on IS/Microsoft Office Specialist Excel Certification Exam Classes: Remote Testing and Lessons Learned, Carl M. Rebman Jr, Gwen White, Hayden Wimmer, Loreen Marie Powell, and Queen Booker
Disruption and Protection of Online Synchronous Learning Environments via 802.11 Manipulation, Matthew Tigner and Hayden Wimmer
Analysis of Kali Linux Penetration Testing Tools: A Survey of Hacking Tools, Matthew Tigner, Hayden Wimmer, and Carl M. Rebmann Jr.
Windows Reverse TCP Attack: The Threat of Out-of-Date Machinery, Matthew Tigner, Hayden Wimmer, and Carl M. Rebmann Jr.
Deep Learning on Cryptocurrency - Challenges Processing GPU and CPU Architectures, Ian A. Trawinski, Hayden Wimmer, and Weitian Tong
Ground-0 Axioms vs. First Principles and Second Law: From the Geometry of Light and Logic of Photon to Mind-Light-Matter Unity-AI&QI, Wen-Ran Zhang
Science vs. Sophistry- A Historical Debate on Bipolar Fuzzy Sets and Equilibrium Based Mathematic s for AI & QI, Wen-Ran Zhang
Submissions from 2020
An International Review and Study on Perceptions of Security, Adoption, and Implementation of Electronic Health Records, Faith Aliyu, Hayden Wimmer, Loreen Marie Powell, and Carl Rebman
Neural Network for Structural Health Monitoring With Combined Direct and Indirect Methods, Seyyed Pooya Hekmati Athar, Mohammad Taheri, Jameson Secrist, and Hossein Taheri
Water Quality Impacts of Bridge Stormwater Runoff From Scupper Drains on Receiving Waters: a Review, Ahmed Refaat Bakr, George Fu, and David Hedeen
A Comparative Analysis of Business and Non-business Students Awareness of IoT Devices and Security Practices: An Exploratory Study, Queen Booker, Carl Rebman, and Hayden Wimmer
A Practical Low-Cost Security Solution for Log Management and File Integrity Monitoring, Lei Chen, Ming Yang, Hayden Wimmer, and Brittany Wilbert
Predictive Analytics using Machine Learning for Electronic Health Records, Arjumand Fatima, Hayden Wimmer, and Cheryl L. Aasheim
Chapter 2: Recent Advances in Web3D Semantic Modeling, Jakub Flotyński, Athanasios G. Malamos, Don Brutzman, Felix G. Hamza-Lup, Nicholas Polys, Leslie F. Sikos, and Krzysztof Walczak
Artificial Intelligence Facial Expression Recognition for Emotion Detection: Performance and Acceptance, Annu George, Hayden Wimmer, and Carl Rebman
Intelligent Tutoring Systems for Generation Z’s Addiction, Ioana R. Goldbach and Felix G. Hamza-Lup
Hands-on Lab on Smart City Vulnerability Exploitation, Andrew Gomez, Hossain Shahriar, Victor Clincy, and Atef Shalan
Design and Demonstration of Automated Technologies for the Fabrication and Testing of PEM Fuel Cell Systems, Vladimir Gurau, Daniel Cox, Devin C. Fowler, Matthew Carter, and Adedayo Ogunleke
Prediction of Performance Variation Caused by Manufacturing Tolerances and Defects in Gas Diffusion Electrodes of Phosphoric Acid (PA)–Doped Polybenzimidazole (PBI)-Based High-Temperature Proton Exchange Membrane Fuel Cells, Vladimir Gurau and Emory S. De Castro
Design of a Methanol Reformer for on-board Production of Hydrogen as Fuel for a 3kW High-temperature Proton Exchange Membrane Fuel Cell Power System, Vladimir Gurau, Adedayo Ogunleke, and F. Strickland
Multimodal, Visuo-Haptic Games for Abstract Theory Instruction: Grabbing Charged Particles, Felix G. Hamza-Lup and Ioana R. Goldbach
Chapter 12: Medical 3DGraphicsWith eXtensible 3D, Felix G. Hamza-Lup, Nicholas Polys, Athanasios G. Malamos, and Nigel W. John
Attention Patterns Detection Using Brain Computer Interfaces, Felix G. Hamza-Lup, Aditya Suri, Ionut E. Iacob, Ioana R. Goldbach, Lateef Rasheed, and Paul N. Borza
An Exploratory Study of the Perceptions of Library Faculty and Patrons on Library Resources, Kyle Herman, Hayden Wimmer, and Carl Rebman
Crosswalking Electronic Thesis Dissertations Metadata Towards an Integrated Library Database, Kyle Herman, Hayden Wimmer, and Carl M. Rebman Jr
PPTP VPN: An Analysis of the Effects of a DDoS Attack, Joshua Jones, Hayden Wimmer, and Rami Haddad
Ultrasonic evaluation of polymer additively manufactured parts for defect inspection and structural integrity assessment, Jinsun Lee, Mostafa Hasanian, Hossain Saboonchi, Maggie Baechle, Valery Godinez-Azcuaga, and Hossein Taheri
Using Animations to Teach String Matching Effectively, Y. Daniel Liang, Lixin Li, and Weitian Tong
Defense and Analysis of Hijacking User Login Credentials via Remote Code Execution and Raspberry PI, Patel Nishitkumar, Hayden Wimmer, and Loreen Marie Powell
Defense and Analysis of Hijacking User Login Credentials via Remote Code Execution and Raspberry PI, Patel Nishitkumar, Hayden Wimmer, and Loreen Marie Powell
Text Classification of Digital Forensic Data, Chrisitan Sunday Nwankwo, Hayden Wimmer, Lei Chen, and Jongyeop Kim
Penetration Testing of the Amazon Echo Digital Voice Assistant Using a Denial-of-Service Attack, Johnathan Dain Overstreet, Hayden Wimmer, and Rami Haddad
PHPBB3 Bulletin Board Security Testing, Nishitkumar Patel, Hayden Wimmer, and Loreen Marie Powell
Improving the Predictive Performance of the c4.5 Decision Tree Algorithm for Categorical Medical Data, Shaikh Shiam Rahman, Hayden Wimmer, and Carl Rebman
Adaptive Group–Based Zero Knowledge Proof–Authentication Protocol (AGZKP–AP) in Vehicular Ad Hoc Networks, Amar Rasheed, Rabi N. Mahapatra, and Felix G. Hamza-Lup
Pandemic Shift: Impact of Covid-19 on IS/Microsoft Office Specialist Excel Certification Exam Classes: Remote Testing and Lessons Learned, Carl Rebman, Gwendolyn White, Hayden Wimmer, Loreen Marie Powell, and Queen Booker
Immobilization of Powdered Coal Fly Ashes (CFAs) into CFA Beads and Column Studies on Color Removal from Pulp Mill Effluents Using These CFA Beads, Musfiques Salahin and George Yuzhu Fu
Enhancing Proactive Control Mobile and Web Software Security Education with Hands-on Labware, Hossain Shahriar, Kai Qian, Atef Shalan, and Fan Wu
A Size-Reduced, 15-Element, Planar Yagi Antenna, Lauryn P. Smith, James C. Howell, and Sungkyun Lim
Carbon Footprint of Alternative Wood Product Retirement Strategies, Brian K. Thorn, Daniel Tomaszewski, and Andres L. Carrano
Barriers and Drivers to Adoption of Cloud Infrastructure Services: A Security, Michael Towsend, Hayden Wimmer, and Jei Du
Towards Rapid Development of Conversational Virtual Humans using Web3D Technologies, Mohan Zalake, Alexandre Gomes de Siqueira, Krishna Vaddiparti, Pavlo D. Antonenko, Felix G. Hamza-Lup, and Benjamin Chak Lum Lok
Submissions from 2019
Effects of Normalization Techniques on Logistic Regression in Data Science, Nureni Adekunle Adeyemo, Hayden Wimmer, and Loreen Powell
Adapted Near-State PWM for Dual Two-Level Inverters in Order to Reduce Common-Mode Voltage and Switching Losses, Amir Aghazadeh, Naser Khodabakhshi-Javinani, Hamed Nafisi, Masoud Davari, and Edris Pouresmaeil
Product Category Rule (PCR) Guidance: Wooden Pallets. Environmental Product Declaration (EPD) Requirements. UL 10003, Sevda Alanya-Rosenbaum, Richard Bergman, Andres L. Carrano, LeRoi Cochran, Brad Gething, and Laszlo Horvath
Detection of Pores in Additive Manufactured Parts by Near Field Response of Laser-Induced Ultrasound, Timothy A. Bigelow, Benjamin Schneider, and Hossein Taheri
NDE In-Process for Metal Parts Fabricated Using Powder Based Additive Manufacturing, Leonard J. Bond, Lucas W. Koester, and Hossein Taheri
Design of Wireless Sensors for IoT with Energy Storage and Communication Channel Heterogeneity, Paul N. Borza, Mihai Machedon-Pisu, and Felix G. Hamza-Lup
Cyber-Security Instructional Technology Design, Billy Carrie, Hayden Wimmer, Loreen Marie Powell, and Carl Rebman
A Comprehensive Design Approach for a Fail-Safe, Magnetorheological-Based Isolation System for Three-Dimensional Seismic Isolation of Building Structures, Sevki Cesmeci, Faramarz Gordaninejad, Keri L. Ryan, and Walaa Eltahawy
Soil Consolidation and Vacuum Pressure Distribution Under Prefabricated Vertical Drains, Lizhou Chen, Yanbin Gao, Assem Elsayed, and Xiaoming Yang
Vibration Energy Harvesting System with Coupled Bistable Modules, Patrick Dorin, Jinki Kim, and K. W. Wang
Preparation of Carbon Encapsulated Core-Shell Fe@ CoFe2O4 Particles Through the Kirkendall Effect and Application as Advanced Anode Materials for Lithium-Ion Batteries, Chaoyu Duan, Fuliang Zhu, Mengqi Du, Yanshuang Meng, and Yue Zhang
A Simple Synthesis of Nitrogen-Sulfur Co-Doped Porous Carbon Using Ionic Liquids as Dopant for High Rate Performance Li-Ion Batteries, Mengqi Duan, Yanshuang Meng, Chen Wang, Chaoyu Duan, Fuliang Zhu, and Yue Zhang
Hour of Code: A Study of Gender Differences in Computing, Jei Du and Hayden Wimmer
Impact of Hour of Code: A Five Year Study, Jei Du and Hayden Wimmer
Examining a Deep Learning Network System for Image Identification and Classification for Preventing Unauthorized Access for a Smart Home Security System, Beloved Egbedion, Hayden Wimmer, Carl Rebman, and Loreen Marie Powell