Drones and Unmanned Aerial Vehicles Automation Using Reinforcement Learning DOI

Jaskirat Kaur,

Sudhakar Kumar, Sunil K. Singh

et al.

Advances in computational intelligence and robotics book series, Journal Year: 2024, Volume and Issue: unknown, P. 257 - 284

Published: Dec. 13, 2024

This chapter provides an in-depth study at the latest developments in deep reinforcement learning (DRL) as applied to drones and unmanned aerial vehicles (UAVs), with a focus on safety standards overcoming challenges like object detection cybersecurity. Real-world instances across sectors demonstrate how DRL significantly improves efficiency adaptability autonomous systems. By contrasting various techniques, highlights their effectiveness potential advance drone UAV capabilities. The practical implications advantages of applications are emphasized, showcasing transformative influence industries. Moreover, explores future research paths stimulate innovation enhance self-piloting vehicle technology. In essence, it thorough overview DRL's role operations, underscoring importance standards, capacity boost systems, its contribution evolving technology landscape.

Language: Английский

Navigating the landscape: Safeguarding privacy and security in the era of ambient intelligence within healthcare settings DOI Creative Commons
Tarun Vats, Sudhakar Kumar, Sunil K. Singh

et al.

Cyber Security and Applications, Journal Year: 2024, Volume and Issue: 2, P. 100046 - 100046

Published: Jan. 1, 2024

Ambient intelligence technologies have the potential to transform healthcare by providing personalized, context-aware, and proactive support for patients providers. However, use of these in settings raises important privacy security concerns that must be addressed ensure patient trust acceptance. This paper explores considerations related utilization ambient healthcare, aiming address associated risks establish a robust infrastructure. By reviewing inherent employing intelligence, discussing ethical legal considerations, proposing mitigation strategies, focus is on ensuring acceptance.The architecture being presented comprehensive one with interconnected layers guarantees data confidentiality, integrity, system. protects sensitive maintains its continuous availability. research helps safe environment supports transformational while putting protection first thoroughly addressing concerns.

Language: Английский

Citations

14

Next Gen Security With Quantum-Safe Cryptography DOI

N.P. Singh,

Sunil K. Singh, Sudhakar Kumar

et al.

Advances in information security, privacy, and ethics book series, Journal Year: 2024, Volume and Issue: unknown, P. 131 - 164

Published: July 12, 2024

With the rise and development of quantum computing, there is a high scope in encryption methods increasing security integrity data manyfolds. To safeguard user's data, safe cryptography needs to be implemented different aspects transmission data. This study takes algorithms into account that are being used for discusses how they can current industries systems. chapter examines algorithms—lattice-based, hash-based, code-based—assessing their pros cons against threats. It explores impact on finance, healthcare, government, implementation challenges such as performance compatibility. The need global standardization collaboration widespread adoption also explored.

Language: Английский

Citations

9

IoT-enabled smart farming with Industry 5.0 DOI

Aishita Sharma,

Sunil K. Singh, Sudhakar Kumar

et al.

Journal of High Speed Networks, Journal Year: 2024, Volume and Issue: 30(3), P. 477 - 496

Published: May 17, 2024

Due to increasing advancements in the field of technology agricultural sector is experiencing a drastic change, this paradigm shift result integrating technologies like Industry 5.0, Society Internet Things (IoT), Artificial Intelligence (AI), and Remote Sensing. The integration these helps multiple aspects such as IoT sensors help real-time data monitoring which includes parameters soil conditions, meteorological aspects„the valuable insights about overall crop health, also promoting informed decision-making agriculture. Cognitive systems revolutionize manufacturing processes, enabling predictive maintenance, analyses, autonomous for increased production efficiency. Implementing digital twin further boosts transformation process by creating dynamic representations systems. Digital twins simplify complex interactions farmers obtained from diverse sources. This paper explores relationship between smart farming practices, implementation latest techniques IoT, twins, understanding their impact on precision agriculture, sustainable farming, In conclusion, study demonstrates how 5.0 technologies, including technology, possess potential operations, enhance yields, foster sustainability, prepare agriculture challenges rapidly changing global environment.

Language: Английский

Citations

6

Synergistic application of neuro-fuzzy mechanisms in advanced neural networks for real-time stream data flux mitigation DOI
Shivam Goyal, Sudhakar Kumar, Sunil K. Singh

et al.

Soft Computing, Journal Year: 2024, Volume and Issue: 28(20), P. 12425 - 12437

Published: Aug. 8, 2024

Language: Английский

Citations

4

Homomorphic Encryption in Smart City Applications for Balancing Privacy and Utility DOI
Sudhakar Kumar, Sunil K. Singh, Brij B. Gupta

et al.

Advances in information security, privacy, and ethics book series, Journal Year: 2024, Volume and Issue: unknown, P. 241 - 269

Published: July 12, 2024

Homomorphic encryption is like a secret code that allows us to do calculations on private information without actually seeing the details. This super important for keeping things while still getting useful insights. chapter discusses how homomorphic can be implemented into smart city infrastructure. Furthermore, research investigates potential of and blockchain technology integration make cities even more secure. explores impact privacy in cities. It examines legal technological factors at play, considering regulations both help hinder use this technology. Ultimately, it argues key balancing utility, essential success initiatives.

Language: Английский

Citations

4

Applying Visual Cryptography to Decrypt Data Using Human Senses DOI

Dikshant Rajput,

Sunil K. Singh, Sudhakar Kumar

et al.

Advances in information security, privacy, and ethics book series, Journal Year: 2024, Volume and Issue: unknown, P. 376 - 404

Published: July 12, 2024

In the era of cryptographic advancement, integrating human workflow with technology is a natural progression. Traditionally, advancements have focused on mathematical robustness and computational security. This research delves into combining methods to explore foundations visual cryptography its practical implementation in decrypting sensitive information. Challenges related usability, such as complex concepts, key management, user authentication, cross-platform compatibility, social engineering attacks, balancing privacy functionality, are evaluated proposed solutions across various domains. Additionally, study suggests enhance accessibility tools, including iterative design processes, research, user-friendly interfaces, error handling. Visual cryptography, leveraging capabilities system, presents unique approach data decryption that circumvents traditional reliance algorithms.

Language: Английский

Citations

4

Enhancing Autonomous System Security With AI and Secure Computation Technologies DOI
Tushar Singh, Sudhakar Kumar, Sunil K. Singh

et al.

Advances in computational intelligence and robotics book series, Journal Year: 2024, Volume and Issue: unknown, P. 159 - 186

Published: Dec. 13, 2024

Exploring the intersection of transparency and security in autonomous systems, this chapter examines dynamic landscape industrial robots intelligent drones. Advanced technologies such as machine learning, AI, robotics, deep learning shape intricate domain. As systems gain prominence across sectors, a focus lies on understanding decision-making frameworks. Methodologies for achieving algorithmic strengthening protocols are outlined, emphasizing fusion technological innovation with ethical considerations. Real-world case studies offer practical insights best practices. Ethical responsibilities AI robotics integration emphasized, alongside forward-looking view emerging trends technologies, providing tailored roadmap researchers, practitioners, enthusiasts navigating evolving realm systems. This provides thorough analysis challenges opportunities benefiting policymakers industry stakeholders.

Language: Английский

Citations

4

Application of differential privacy to sensor data in water quality monitoring task DOI Creative Commons

Audris Arzovs,

Sergei Parshutin, Valts Urbanovičs

et al.

Ecological Informatics, Journal Year: 2025, Volume and Issue: unknown, P. 103019 - 103019

Published: Jan. 1, 2025

Language: Английский

Citations

0

Advanced Tools and Technologies for Phishing Prevention DOI

Kamaljit Kaur,

Sunil K. Singh, Sudhakar Kumar

et al.

IGI Global eBooks, Journal Year: 2025, Volume and Issue: unknown, P. 187 - 212

Published: Feb. 14, 2025

Phishing attacks are a major cybersecurity threat, exploiting human vulnerabilities by manipulating trust to access sensitive information. As phishing tactics evolve, the demand for advanced anti-phishing technologies has surged. This paper examines key measures such as email filters, SSL/TLS certificates, DNS-based authentication, multi-factor and URL filtering protect against phishing. Advanced methods like machine learning, AI-driven analysis, real-time threat detection have improved prevention. It also discusses browser-based, cloud-based, security tools mitigating risks. The highlights challenges evolving tactics, limitations, user negligence, emphasizing need ongoing innovation in strategies. Future trends AI, biometrics, deep learning intelligence explored, showing potential enhance defense. A holistic approach integrating technology, protocols, awareness is advocated combat effectively at both individual organizational levels.

Language: Английский

Citations

0

Foundations of Phishing Defense DOI

Kanwar Raj,

S.S. Bawa,

Sunil K. Singh

et al.

IGI Global eBooks, Journal Year: 2025, Volume and Issue: unknown, P. 1 - 24

Published: Feb. 14, 2025

Phishing remains a significant cybersecurity threat, targeting individuals and organizations to access confidential data. As techniques evolve, innovative protective measures are essential. This paper offers detailed overview of phishing defense strategies, focusing on both technological solutions human-centered approaches. Multi-layered defenses, blending traditional security with user education, vital for mitigating risks. Simulated exercises ongoing training empower employees recognize respond threats, strengthening the human aspect cybersecurity. Leadership commitment open communication crucial cultivating strong culture, encouraging staff report suspicious activities. Continuous evaluation updates defenses necessary adapt evolving threats. Real-world case studies, such as 2020 Twitter breach SolarWinds attack, highlight severe impacts phishing, reinforcing need proactive that combines technology, risk management protect digital assets effectively.

Language: Английский

Citations

0