Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Digital Communications and Networking (7)
- Robotics (5)
- Electrical and Computer Engineering (4)
- Hardware Systems (4)
- Computer and Systems Architecture (3)
-
- Data Storage Systems (2)
- Electrical and Electronics (2)
- Mechanical Engineering (2)
- Other Computer Engineering (2)
- Physical Sciences and Mathematics (2)
- Risk Analysis (2)
- Signal Processing (2)
- Artificial Intelligence and Robotics (1)
- Biomedical Devices and Instrumentation (1)
- Biomedical Engineering and Bioengineering (1)
- Broadcast and Video Studies (1)
- Communication (1)
- Communication Technology and New Media (1)
- Computer Sciences (1)
- Digital Circuits (1)
- Education (1)
- Educational Methods (1)
- Electro-Mechanical Systems (1)
- Engineering Science and Materials (1)
- Graphics and Human Computer Interfaces (1)
- Higher Education (1)
- Mechanics of Materials (1)
- Other Mechanical Engineering (1)
- Publication
- Publication Type
- File Type
Articles 1 - 15 of 15
Full-Text Articles in Computer Engineering
Securing Edge Computing: A Hierarchical Iot Service Framework, Sajan Poudel, Nishar Miya, Rasib Khan
Securing Edge Computing: A Hierarchical Iot Service Framework, Sajan Poudel, Nishar Miya, Rasib Khan
Posters-at-the-Capitol
Title: Securing Edge Computing: A Hierarchical IoT Service Framework
Authors: Nishar Miya, Sajan Poudel, Faculty Advisor: Rasib Khan, Ph.D.
Department: School of Computing and Analytics, College of Informatics, Northern Kentucky University
Abstract:
Edge computing, a paradigm shift in data processing, faces a critical challenge: ensuring security in a landscape marked by decentralization, distributed nodes, and a myriad of devices. These factors make traditional security measures inadequate, as they cannot effectively address the unique vulnerabilities of edge environments. Our research introduces a hierarchical framework that excels in securing IoT-based edge services against these inherent risks.
Our secure by design approach prioritizes …
Motivations Driving Video Research Podcasts: Impact On Value And Creation Of Research Video Presentations, My Doan, Anh Tran, Na Le
Motivations Driving Video Research Podcasts: Impact On Value And Creation Of Research Video Presentations, My Doan, Anh Tran, Na Le
Posters-at-the-Capitol
Abstract
Purpose: The purpose of the study is to better understand the role and impact of video research podcasts in bridging the gap between academia and the general public, especially concerning the challenges of accessibility and comprehension of scholarly research.
Methods: A 10-question survey was administered to evaluate the effectiveness, utility, and acceptance of video recordings in research presentations. The survey also aimed to gather insights into the motivations, challenges, and benefits of using video podcasts for research dissemination. Results were then analyzed using the Unified Theory of Acceptance and Use of Technology (UTAUT) model.
Results: There were 102 respondents …
"Semiclassical Mastermind", Curtis Bair, Alexa S. Cunningham, Joshua Qualls
"Semiclassical Mastermind", Curtis Bair, Alexa S. Cunningham, Joshua Qualls
Posters-at-the-Capitol
Games are often used in the classroom to teach mathematical and physical concepts. Yet the available activities used to introduce quantum mechanics are often overwhelming even to upper-level students. Further, the "games" in question range in focus and complexity from superficial introductions to games where quantum strategies result in decidedly nonclassical advantages, making it nearly impossible for people interested in quantum mechanics to have a simple introduction to the topic. In this talk, we introduce a straightforward and newly developed "Semiclassical Mastermind" based on the original version of mastermind but replace the colored pegs with 6 possible qubits (x+, x-, …
Disaster Area Lora Mesh Communications, Joel Bulkley
Disaster Area Lora Mesh Communications, Joel Bulkley
Posters-at-the-Capitol
In the aftermath of the December 2021 tornado disaster that swept through Western Kentucky causing 57 fatalities, 500+ critical injuries, and millions of dollars’ worth in damages, one of the first things that became apparent was the lack of communications and underlying power infrastructure. The goal of this project is to create a highly resilient LoRa mesh communications network utilizing low power, low cost, and easy to deploy radios to enable first responders in a disaster area to communicate their location and send critical information in a situation where traditional communications infrastructure has been destroyed or is otherwise unavailable. Through …
Gesture-Based American Sign Language (Asl) Translation System, Kayleigh Moore, Stefano Pecile, Mahdi Yazdanpour
Gesture-Based American Sign Language (Asl) Translation System, Kayleigh Moore, Stefano Pecile, Mahdi Yazdanpour
Posters-at-the-Capitol
According to the World Health Organization (WHO), over 5% of the world's population experiences severe hearing loss. Approximately 9 million people in the U.S. are either functionally deaf or have mild-to-severe hearing loss. In this research, we designed and implemented a translation interface which turns American Sign Language (ASL) gestures captured from a pair of soft robotic gloves into text and speech instantaneously.
We used a combination of flex sensors, tactile sensors, and accelerometers to recognize hand gestures and to record hand and fingers positions, movements, and orientations. The digitized captured gestures were then sent to our proposed translation interface …
Physiological Signal Analysis For Emotion Estimation Of Children With Autism Spectrum Disorder, Janet Pulgares Soriano, Karla Conn Welch Phd
Physiological Signal Analysis For Emotion Estimation Of Children With Autism Spectrum Disorder, Janet Pulgares Soriano, Karla Conn Welch Phd
Posters-at-the-Capitol
The diagnosis of Autism Spectrum Disorder (ASD) in children is based on human observations by a clinician. The medical evaluation assesses deficits in social communication, social interaction, and restricted, repetitive behaviors. Robotic technology can assist in quantitatively measuring the observations to be used as a future tool for autism diagnosis and intervention. The project explores this technology to produce robotic partners that can adapt to the needs of the ASD population. This way, such robots could serve as instructors or learning peers. A friendly, partner robot, specifically designed for children with ASD could be used to investigate the effect of …
Comparative Analysis Of Rgb-Based Eye-Tracking For Large-Scale Human-Machine Applications, Brett Thaman, Trung Cao
Comparative Analysis Of Rgb-Based Eye-Tracking For Large-Scale Human-Machine Applications, Brett Thaman, Trung Cao
Posters-at-the-Capitol
Gaze tracking has become an established technology that enables using an individual’s gaze as an input signal to support a variety of applications in the context of Human-Computer Interaction. Gaze tracking primarily relies on sensing devices such as infrared (IR) cameras. Nevertheless, in the recent years, several attempts have been realized at detecting gaze by acquiring and processing images acquired from standard RGB cameras. Nowadays, there are only a few publicly available open-source libraries and they have not been tested extensively. In this paper, we present the result of a comparative analysis that studied a commercial eye-tracking device using IR …
Assessing The Alignment Of Social Robots With Trustworthy Ai Design Guidelines: A Preliminary Research Study, Abdikadar Ali, Danielle Thaxton, Ankur Chattopadhyay
Assessing The Alignment Of Social Robots With Trustworthy Ai Design Guidelines: A Preliminary Research Study, Abdikadar Ali, Danielle Thaxton, Ankur Chattopadhyay
Posters-at-the-Capitol
The last couple of years have seen a strong movement supporting the need of having intelligent consumer products align with specific design guidelines for trustworthy artificial intelligence (AI). This global movement has led to multiple institutional recommendations for ethically aligned trustworthy design of the AI driven technologies, like consumer robots and autonomous vehicles. There has been prior research towards finding security and privacy related vulnerabilities within various types of social robots. However, none of these previous works has studied the implications of these vulnerabilities in terms of the robot design aligning with trustworthy AI. In an attempt to address this …
Autonomous Control And Signal Acquisition System, Rion Cadell Krampe
Autonomous Control And Signal Acquisition System, Rion Cadell Krampe
Honors College Theses
Our goal is to continue a previous teams project to build a NDE autonomous control and signal acquisition system that is more precise, more customizable with both code and mechanical parts, and cheaper than a similar system bought by the school. This goal has two stages to it. First, to repair the system from considerable damage it received during transportation. Secondly, to continue designing and developing the system to make considerable progress towards the goal of a fully functional NDE system. Along with making progress we must consider the team after us and create an easy stepping off point for …
Ransomware Education: Availability, Accessibility, And Ease Of Use, Judson Gager, Judson Gager
Ransomware Education: Availability, Accessibility, And Ease Of Use, Judson Gager, Judson Gager
Honors College Theses
With cybersecurity constantly in the media outlets with breaches, cybercrime, and cyberwarfare, it has become a significant concern for all. One of the most recent breaches in the summer of 2021 was the Colonial Pipeline breach, which has proven the country's reliance on these industrial control systems and networking. The systems were taken for ransom by a new type of ransomware written in a different programming language. Although the Colonial Pipeline breach was quickly addressed, the impact of the gas shortage and the response time were alarming at triaging the breach. However, this attack showed the public how dangerous ransomware …
Autonomous Control And Signal Acquisition System, Rion Krampe
Autonomous Control And Signal Acquisition System, Rion Krampe
Scholars Week
Dr. Bunget has an autonomous control and signal acquisition system that he wants to be repaired and improved upon. This requires that we identify the current issues with the system and repair them as well as make innovations to the system to meet customer needs. The position control needs to be autonomous, and the acquisition of the oscilloscope signal and the transducer position needs to be synchronous. The user should be able to control the position, speed, and how often the signals are captured. The waveform of the scan should be appended into a spreadsheet. The system code also needs …
Automated Bottling Station - Packaging System, Lauren Nicole Zinzilieta
Automated Bottling Station - Packaging System, Lauren Nicole Zinzilieta
Honors College Theses
This report focuses on the packaging system used at the end of the FESTO bottling station that is located in EP 2355. The system will be made up of an x-y 300 mm x 300 mm gantry system, an Arduino, two micro-stepping stepper drivers, and two 152.4 mm (6 in) single acting cylinders with a 3D printed bracket attached to both. The gantry system will be located at the end of the conveyor belt and will be programmed to pick up three bottles at a time and then will move a specified number of steps in both the x and …
Performance Of Lambda@Edge Vs. Lambda Environment, Sam Dotson, Wei Hao
Performance Of Lambda@Edge Vs. Lambda Environment, Sam Dotson, Wei Hao
Posters-at-the-Capitol
Abstract
The purpose of this research has been to observe how performance of the Lambda@EDGE environment compares to the base Lambda environment. This is in an effort to determine viability of the EDGE environment. 15 tests were conducted over a matter of days in each environment whereby the Fibonacci sequence was calculated to 20 terms. Performance metrics including RAM usage and response time were measured. Lambda@EDGE was determined to have not only a slightly higher average response time but also an average RAM usage of 1MB more in the aggregate tests.
Asap: A Source Code Authorship Program, Matthew F. Tennyson Phd
Asap: A Source Code Authorship Program, Matthew F. Tennyson Phd
Faculty & Staff Research and Creative Activity
Source code authorship attribution is the task of determining who wrote a computer program, based on its source code, usually when the author is either unknown or under dispute. Areas where this can be applied include software forensics, cases of software copyright infringement, and detecting plagiarism. Numerous methods of source code authorship attribution have been proposed and studied. However, there are no known easily accessible and user-friendly programs that perform this task. Instead, researchers typically develop software in an ad hoc manner for use in their studies, and the software is rarely made publicly available. In this paper, we present …
3d Wi-Fi Campus Coverage: Flying A Drone, Richard Thompson, Tyler Williams, Seth Pritchett, Tracy Whitlock
3d Wi-Fi Campus Coverage: Flying A Drone, Richard Thompson, Tyler Williams, Seth Pritchett, Tracy Whitlock
Posters-at-the-Capitol
Everyone in a college environment is immersed in their electronic devices. Whether it be in the quad, the classroom, the library or their favorite nook by the windows, they all need a reliable Wi-Fi signal to get their work done. In this era most of the tasks that has to be completed require some sort of connection between electronic devices especially if the individuals require information located on the internet. The main method of accessing the internet is using Wifi technology which uses electromagnetic waves to propagate information across a certain area. Considering the properties of these electromagnetic frequencies it …