The existence of quantum computers and Shor's algorithm poses an imminent threat to classical public-key cryptosystems. These cryptosystems are currently used for the exchange of keys between servers and clients over the Internet. The Internet of Things (IoT) is the next step in the evolution of the Internet, and it involves the connection of millions of low-powered and resource-constrained devices to the network.
View Article and Find Full Text PDFAnnu Int Conf IEEE Eng Med Biol Soc
July 2019
In this work we combine computer vision and a machine learning algorithm, Convolutional Neural Networks (CNNs), to identify obstacles that powered prosthetic leg users might encounter during walking. Our motivation is that powered prosthetic legs could react in synchronicity with their users by recognizing and anticipating the terrain in front of them. We focus on identifying stairs and doors that are within the visual field of a person.
View Article and Find Full Text PDFOne of the essential abilities in animals is to detect novelties within their environment. From the computational point of view, novelty detection consists of finding data that are different in some aspect to the known data. In robotics, researchers have incorporated novelty modules in robots to develop automatic exploration and inspection tasks.
View Article and Find Full Text PDFTracking multiple targets using a single estimator is a problem that is commonly approached within a trusted framework. There are many weaknesses that an adversary can exploit if it gains control over the sensors. Because the number of targets that the estimator has to track is not known with anticipation, an adversary could cause a loss of information or a degradation in the tracking precision.
View Article and Find Full Text PDF