Abstract We propose several variants of a secure multiparty computation protocol for AES encryption. The best variant requires 2200 + 400 255 expected elementary operations in expe...
Intelligent Tutoring Systems (ITS) typically contain elements of instruction, assessment, feedback and guidance for the trainee. Most of the time, the ITS is controlling the dialo...
This paper presents a new vision-based obstacle detection method for mobile robots. Each individual image pixel is classified as belonging either to an obstacle or the ground base...
This paper presents a new approach including passive and actriveprocesses to deal with the image segmentation and pattern recognition to a color blindness plate (CBP). The CBP is ...
Camera systems with zoom lenses are inherently more useful than those with passive lenses due to their flexibility and controllability. However, their calibration raises several c...