Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 4 of 4
Full-Text Articles in Robotics
Effects Of A Wi-Fi Link On The Performance Of A Path Following Autonomous Ground Vehicle, Anthony Iwejuo, Austin Cagle, Billy Kihei, Ph.D.
Effects Of A Wi-Fi Link On The Performance Of A Path Following Autonomous Ground Vehicle, Anthony Iwejuo, Austin Cagle, Billy Kihei, Ph.D.
Symposium of Student Scholars
As vehicles become more automated and connected, the future of safe and efficient travel will be dependent on efficient wireless networks. Artificial intelligence (AI) demands high power resources and computing resources that can be resource-intensive for mobile robotic systems. A new paradigm involving the remote computing of A.I. can enable robotics that are built lighter and more power efficient. In this study, we compare a locally run artificial intelligence algorithm for autonomous ground vehicle navigation against remote computation through various wireless links to highlight the need for low-latency access to remote computing resources over Wi-Fi network calls. Our findings show …
Securing Edge Computing: A Hierarchical Iot Service Framework, Sajan Poudel, Nishar Miya, Rasib Khan
Securing Edge Computing: A Hierarchical Iot Service Framework, Sajan Poudel, Nishar Miya, Rasib Khan
Posters-at-the-Capitol
Title: Securing Edge Computing: A Hierarchical IoT Service Framework
Authors: Nishar Miya, Sajan Poudel, Faculty Advisor: Rasib Khan, Ph.D.
Department: School of Computing and Analytics, College of Informatics, Northern Kentucky University
Abstract:
Edge computing, a paradigm shift in data processing, faces a critical challenge: ensuring security in a landscape marked by decentralization, distributed nodes, and a myriad of devices. These factors make traditional security measures inadequate, as they cannot effectively address the unique vulnerabilities of edge environments. Our research introduces a hierarchical framework that excels in securing IoT-based edge services against these inherent risks.
Our secure by design approach prioritizes …
Artificial Intelligence Towards Future Industrial Opportunities And Challenges, Gizealew Dagnaw
Artificial Intelligence Towards Future Industrial Opportunities And Challenges, Gizealew Dagnaw
African Conference on Information Systems and Technology
The industry 4.0 will bring reflective changes to our society, including an important digital shift in the manufacturing sector. At present, several manufacturing firms are trying to adopt the practices of industry 4.0 throughout their supply chain. The Fourth Industrial Revolution and the artificial intelligence at its core are fundamentally changing the way we live, work and interact as citizens. The complexity of this transformation may look overwhelming and to many threatening. Recently, the dramatic growth of new generation information technologies has prompted several countries to seek new strategies for industrial revolution. The globalization and the competitiveness are forcing companies …
Efficient Data Mining Algorithm Network Intrusion Detection System For Masked Feature Intrusions, Kassahun Admkie, Kassahun Admkie Tekle
Efficient Data Mining Algorithm Network Intrusion Detection System For Masked Feature Intrusions, Kassahun Admkie, Kassahun Admkie Tekle
African Conference on Information Systems and Technology
Most researches have been conducted to develop models, algorithms and systems to detect intrusions. However, they are not plausible as intruders began to attack systems by masking their features. While researches continued to various techniques to overcome these challenges, little attention was given to use data mining techniques, for development of intrusion detection. Recently there has been much interest in applying data mining to computer network intrusion detection, specifically as intruders began to cheat by masking some detection features to attack systems. This work is an attempt to propose a model that works based on semi-supervised collective classification algorithm. For …