WHAT IS THE RIGHT SERVICE? A MULTI-CRITERIA DECISION MODEL BASED ON ‘STEP’

Keyword(s):  
Author(s):  
Xian-wei Xin ◽  
Ji-hua Song ◽  
Zhan-ao Xue ◽  
Jing-bo Sun ◽  
Wei-ming Peng

Sensors ◽  
2021 ◽  
Vol 21 (12) ◽  
pp. 4141
Author(s):  
Wouter Houtman ◽  
Gosse Bijlenga ◽  
Elena Torta ◽  
René van de Molengraft

For robots to execute their navigation tasks both fast and safely in the presence of humans, it is necessary to make predictions about the route those humans intend to follow. Within this work, a model-based method is proposed that relates human motion behavior perceived from RGBD input to the constraints imposed by the environment by considering typical human routing alternatives. Multiple hypotheses about routing options of a human towards local semantic goal locations are created and validated, including explicit collision avoidance routes. It is demonstrated, with real-time, real-life experiments, that a coarse discretization based on the semantics of the environment suffices to make a proper distinction between a person going, for example, to the left or the right on an intersection. As such, a scalable and explainable solution is presented, which is suitable for incorporation within navigation algorithms.


2011 ◽  
Vol 121-126 ◽  
pp. 867-871 ◽  
Author(s):  
Jie Li ◽  
Wei Wei Shan ◽  
Chao Xuan Tian

In order to evaluate the security of Application Specific Integrated Circuit (ASIC) implemented cryptographic algorithms at an early design stage, a Hamming distance model based power analysis is proposed. The Data Encryption Standard (DES) algorithm is taken as an example to illustrate the threats of differential power analysis (DPA) attack against the security of ASIC chip. A DPA attack against the ASIC implementation of a DES algorithm is realized based on hamming distance power model (HD model), and it realized the attack by successfully guessing the right 48-bit subkey. This result indicates that the power analysis attack based on the HD model is simple, rapid and effective for the design and evaluation of security chips.


Sign in / Sign up

Export Citation Format

Share Document