Page 118 - tech fest 2025 אשדוד חוברת תקצירים
P. 118

 118
A Swarm Robotic System Using a ‘Hopfield Network’ for Locomotion Optimization
SE-C-11
Ran Derei; rande@ac.sce.ac.il Gal Derei; galde@ac.sce.ac.il
Advisors: Dr. Naomi Korem1, Dr. Chen Giladi1 1SCE - Shamoon College of Engineering, Ashdod
Coordinating physically connected robots for collective transport is challenging due to the risk of conflicting movements. This project introduces a centralized ‘Hopfield neural network’ approach to synchronize a swarm of robots rigidly attached beneath a shared object. Simulated in “CoppeliaSim”, the network encodes discrete movement modes (e.g., forward, backward, turn) and converges to a stable state that ensures unified, conflict-free actions through energy minimization. This system's robustness will be tested against sensor noise, actuator delays, and uneven payloads. Performance will be measured by convergence time, transport accuracy, and system coherence. Our research explores Hopfield networks as a scalable, delay-tolerant solution for coordinated multi-robot transport, with potential use in warehouse automation.
Keywords: artificial neural networks, energy function, multi-agent systems, robotics simulation, stable state, swarm intelligence
Design and Implementation of a ‘Zero-Trust Network Access’ (ZTNA) System
SE-C-12
Tamir Ben Eden; tamirbe2@ac.sce.ac.il Nir Avraham Agiv; nirag@ac.sce.ac.il
Advisor: Dr. Kiril Danilchenko
SCE - Shamoon College of Engineering, Ashdod
‘Zero trust network access’ (ZTNA) is a cybersecurity framework based on the principle “never trust, always verify.” Unlike traditional perimeter defenses, ZTNA continuously verifies users, devices, and contexts before and after access. This project presents a ZTNA solution designed for cloud-based, remote-first environments, incorporating ‘multi-factor authentication’ (MFA), device health checks,‘role-based access control’ (RBAC), and secure protocols like ‘mutual transport layer security’ (mTLS) and ‘virtual private network’ (VPN). Dynamic policies ensure adaptive access control, continuous monitoring, and real-time logging; alerting enhances security and reduces risk. This implementation draws on research regarding current threats, frameworks like ‘secure access server edge’ (SASE), and technologies, such as “WireGuard”. By merging theory with practice, solutions improve resilience and provide scalable, context-aware, secure access across modern digital environments.
Keywords: cybersecurity, network security, secure access, zero-trust, ZTNA





















































































   116   117   118   119   120