Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 4 of 4
Full-Text Articles in Computer Engineering
Effects Of A Wi-Fi Link On The Performance Of A Path Following Autonomous Ground Vehicle, Anthony Iwejuo, Austin Cagle, Billy Kihei, Ph.D.
Effects Of A Wi-Fi Link On The Performance Of A Path Following Autonomous Ground Vehicle, Anthony Iwejuo, Austin Cagle, Billy Kihei, Ph.D.
Symposium of Student Scholars
As vehicles become more automated and connected, the future of safe and efficient travel will be dependent on efficient wireless networks. Artificial intelligence (AI) demands high power resources and computing resources that can be resource-intensive for mobile robotic systems. A new paradigm involving the remote computing of A.I. can enable robotics that are built lighter and more power efficient. In this study, we compare a locally run artificial intelligence algorithm for autonomous ground vehicle navigation against remote computation through various wireless links to highlight the need for low-latency access to remote computing resources over Wi-Fi network calls. Our findings show …
A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka
A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka
Cybersecurity Undergraduate Research Showcase
The internet needs secure forms of identity authentication to function properly, but identity authentication is not a core part of the internet’s architecture. Instead, approaches to identity verification vary, often using centralized stores of identity information that are targets of cyber attacks. Decentralized identity is a secure way to manage identity online that puts users’ identities in their own hands and that has the potential to become a core part of cybersecurity. However, decentralized identity technology is new and continually evolving, which makes implementing this technology in an organizational setting challenging. This paper suggests that, in the future, decentralized identity …
Securing Edge Computing: A Hierarchical Iot Service Framework, Sajan Poudel, Nishar Miya, Rasib Khan
Securing Edge Computing: A Hierarchical Iot Service Framework, Sajan Poudel, Nishar Miya, Rasib Khan
Posters-at-the-Capitol
Title: Securing Edge Computing: A Hierarchical IoT Service Framework
Authors: Nishar Miya, Sajan Poudel, Faculty Advisor: Rasib Khan, Ph.D.
Department: School of Computing and Analytics, College of Informatics, Northern Kentucky University
Abstract:
Edge computing, a paradigm shift in data processing, faces a critical challenge: ensuring security in a landscape marked by decentralization, distributed nodes, and a myriad of devices. These factors make traditional security measures inadequate, as they cannot effectively address the unique vulnerabilities of edge environments. Our research introduces a hierarchical framework that excels in securing IoT-based edge services against these inherent risks.
Our secure by design approach prioritizes …
Motivations Driving Video Research Podcasts: Impact On Value And Creation Of Research Video Presentations, My Doan, Anh Tran, Na Le
Motivations Driving Video Research Podcasts: Impact On Value And Creation Of Research Video Presentations, My Doan, Anh Tran, Na Le
Posters-at-the-Capitol
Abstract
Purpose: The purpose of the study is to better understand the role and impact of video research podcasts in bridging the gap between academia and the general public, especially concerning the challenges of accessibility and comprehension of scholarly research.
Methods: A 10-question survey was administered to evaluate the effectiveness, utility, and acceptance of video recordings in research presentations. The survey also aimed to gather insights into the motivations, challenges, and benefits of using video podcasts for research dissemination. Results were then analyzed using the Unified Theory of Acceptance and Use of Technology (UTAUT) model.
Results: There were 102 respondents …