2015 11th International Conference on Information Assurance and Security (IAS) 2015
DOI: 10.1109/isias.2015.7492744
|View full text |Cite
|
Sign up to set email alerts
|

Improved secure navigation of wheelchairs using multi-robot system and cloud computing technologies

Abstract: This paper introduces a novel approach for secure navigation of wheelchairs. The approach is based on a combination of robotic road train based navigation and Cloud Computing technologies. The navigation strategy is inspired from elephants. Marching trunk to tail, each wheelchair in a platoon takes cues from the wheelchair just in front of it. The wheelchair also communicates directly with the leader in order to anticipate any turns or braking action. The cloud computing technologies are used to perform shared… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 12 publications
(7 reference statements)
0
3
0
Order By: Relevance
“…Several solutions, summarized in Table 1, have been proposed to improve the security of a neural interface [16][17][18][19][20][21][22][23][24][25][26][27][28][29][30]. The proposed methods typically use one or more solutions to supervise the BCI session [17,18], authenticate the user [19][20][21][22][23], encrypt the data [24][25][26][27], and ultimately detect cyberattacks [28][29][30].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Several solutions, summarized in Table 1, have been proposed to improve the security of a neural interface [16][17][18][19][20][21][22][23][24][25][26][27][28][29][30]. The proposed methods typically use one or more solutions to supervise the BCI session [17,18], authenticate the user [19][20][21][22][23], encrypt the data [24][25][26][27], and ultimately detect cyberattacks [28][29][30].…”
Section: Related Workmentioning
confidence: 99%
“…Supervised BCI systems identify cyberattacks by means of additional sensors and artificial intelligence monitoring the user's choices. For instance, the use of cameras [17], sensors, and actuators [23] in BCI navigation systems can prevent decisions that are dangerous or the result of hacking. However, additional hardware usually increases the cost and the complexity of the BCI system.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation