Miscellaneous

Administrator

Administrator
Staff member

Wireless Smart Home Automation System Egypt GSM Security Alarm Systems

Published on Oct 10, 2012

BDCEGYPT provide wireless home automation solutions in Egypt Smart Home Automation System Egypt , GSM Security Alarm Systems, video door
you control your system using your WIFI with your IPAD, IPHONE or android or galaxy phone
 

JingTeng monitoring security robot

Published on Nov 8, 2016

JingTeng shows their little robot that turns its head with a security IP camera inside. They also have a Cloud Companion little remote video broadcasting car.
 

Unique unmanned 'Guard Robot' passes military trials in Russia

Published on Nov 12, 2016

A unique unmanned robotic guardian has successfully passed Russian military trials. The system was developed to boost the security of stationary military sites and is set to be deployed to guard the underground silos of the Strategic Missile Forces.
 

EV3 desk guardian

Published on Jul 14, 2017

A simple EV3 robot built in 2012 (yes, before release) with the Education core set 45544 to test the capabilities of the Brick Program App being developed for the EV3 Brick at that time.
 

AI and security

Published on Jul 28, 2017

In the future, every company will be using AI, which means that every company will need a secure infrastructure that addresses AI security concerns. At the same time, the domain of computer security has been revolutionized by AI techniques, including machine learning, planning, and automatic reasoning. What are the opportunities for researchers in both fields—security infrastructure and AI—to learn from each other and continue this fruitful collaboration? This session will cover two main topics. In the first half, we will discuss how AI techniques have changed security, using a case study of the DARPA Cyber Grand Challenge, where teams built systems that can reason about security in real time. In the second half, we will talk about security issues inherent in AI. How can we ensure the integrity of decisions from the AI that drives a business? How can we defend against adversarial control of training data? Together, we will identify common problems for future research.
 
Back
Top