Multi-Modal Sensor Fusion With CRNNs for Robust Object Detection and Simultaneous Localization and Mapping (SLAM) in Agile Industrial Drones DOI

Ujjwal Thakur,

Sunil K. Singh, Sudhakar Kumar

и другие.

Advances in computational intelligence and robotics book series, Год журнала: 2024, Номер unknown, С. 285 - 304

Опубликована: Дек. 13, 2024

The integration of multi-modal sensor fusion with CRNNs in agile industrial drones addresses the need for improved object detection and SLAM capabilities. This technology enhances drone's ability to navigate map complex environments greater accuracy reliability. It is crucial tasks such as inspection, monitoring, autonomous navigation dynamic challenging settings. By integrating visual, LiDAR, inertial measurement unit (IMU) information, approach situational awareness, facilitating safer intelligent interaction amidst conditions. IMU, optical sensors provides awareness environment, enabling drone adjust changing circumstances instantly. suggested method meets needs applications, which demand dependable durable solutions. achieves this by offering precision, dependability, flexibility that eventually expands potential a variety operational contexts.

Язык: Английский

Navigating the landscape: Safeguarding privacy and security in the era of ambient intelligence within healthcare settings DOI Creative Commons
Tarun Vats, Sudhakar Kumar, Sunil K. Singh

и другие.

Cyber Security and Applications, Год журнала: 2024, Номер 2, С. 100046 - 100046

Опубликована: Янв. 1, 2024

Ambient intelligence technologies have the potential to transform healthcare by providing personalized, context-aware, and proactive support for patients providers. However, use of these in settings raises important privacy security concerns that must be addressed ensure patient trust acceptance. This paper explores considerations related utilization ambient healthcare, aiming address associated risks establish a robust infrastructure. By reviewing inherent employing intelligence, discussing ethical legal considerations, proposing mitigation strategies, focus is on ensuring acceptance.The architecture being presented comprehensive one with interconnected layers guarantees data confidentiality, integrity, system. protects sensitive maintains its continuous availability. research helps safe environment supports transformational while putting protection first thoroughly addressing concerns.

Язык: Английский

Процитировано

18

Next Gen Security With Quantum-Safe Cryptography DOI

N.P. Singh,

Sunil K. Singh, Sudhakar Kumar

и другие.

Advances in information security, privacy, and ethics book series, Год журнала: 2024, Номер unknown, С. 131 - 164

Опубликована: Июль 12, 2024

With the rise and development of quantum computing, there is a high scope in encryption methods increasing security integrity data manyfolds. To safeguard user's data, safe cryptography needs to be implemented different aspects transmission data. This study takes algorithms into account that are being used for discusses how they can current industries systems. chapter examines algorithms—lattice-based, hash-based, code-based—assessing their pros cons against threats. It explores impact on finance, healthcare, government, implementation challenges such as performance compatibility. The need global standardization collaboration widespread adoption also explored.

Язык: Английский

Процитировано

11

IoT-enabled smart farming with Industry 5.0 DOI

Aishita Sharma,

Sunil K. Singh, Sudhakar Kumar

и другие.

Journal of High Speed Networks, Год журнала: 2024, Номер 30(3), С. 477 - 496

Опубликована: Май 17, 2024

Due to increasing advancements in the field of technology agricultural sector is experiencing a drastic change, this paradigm shift result integrating technologies like Industry 5.0, Society Internet Things (IoT), Artificial Intelligence (AI), and Remote Sensing. The integration these helps multiple aspects such as IoT sensors help real-time data monitoring which includes parameters soil conditions, meteorological aspects„the valuable insights about overall crop health, also promoting informed decision-making agriculture. Cognitive systems revolutionize manufacturing processes, enabling predictive maintenance, analyses, autonomous for increased production efficiency. Implementing digital twin further boosts transformation process by creating dynamic representations systems. Digital twins simplify complex interactions farmers obtained from diverse sources. This paper explores relationship between smart farming practices, implementation latest techniques IoT, twins, understanding their impact on precision agriculture, sustainable farming, In conclusion, study demonstrates how 5.0 technologies, including technology, possess potential operations, enhance yields, foster sustainability, prepare agriculture challenges rapidly changing global environment.

Язык: Английский

Процитировано

10

Homomorphic Encryption in Smart City Applications for Balancing Privacy and Utility DOI
Sudhakar Kumar, Sunil K. Singh, Brij B. Gupta

и другие.

Advances in information security, privacy, and ethics book series, Год журнала: 2024, Номер unknown, С. 241 - 269

Опубликована: Июль 12, 2024

Homomorphic encryption is like a secret code that allows us to do calculations on private information without actually seeing the details. This super important for keeping things while still getting useful insights. chapter discusses how homomorphic can be implemented into smart city infrastructure. Furthermore, research investigates potential of and blockchain technology integration make cities even more secure. explores impact privacy in cities. It examines legal technological factors at play, considering regulations both help hinder use this technology. Ultimately, it argues key balancing utility, essential success initiatives.

Язык: Английский

Процитировано

8

Enhancing Autonomous System Security With AI and Secure Computation Technologies DOI
Tushar Singh, Sudhakar Kumar, Sunil K. Singh

и другие.

Advances in computational intelligence and robotics book series, Год журнала: 2024, Номер unknown, С. 159 - 186

Опубликована: Дек. 13, 2024

Exploring the intersection of transparency and security in autonomous systems, this chapter examines dynamic landscape industrial robots intelligent drones. Advanced technologies such as machine learning, AI, robotics, deep learning shape intricate domain. As systems gain prominence across sectors, a focus lies on understanding decision-making frameworks. Methodologies for achieving algorithmic strengthening protocols are outlined, emphasizing fusion technological innovation with ethical considerations. Real-world case studies offer practical insights best practices. Ethical responsibilities AI robotics integration emphasized, alongside forward-looking view emerging trends technologies, providing tailored roadmap researchers, practitioners, enthusiasts navigating evolving realm systems. This provides thorough analysis challenges opportunities benefiting policymakers industry stakeholders.

Язык: Английский

Процитировано

7

Applying Visual Cryptography to Decrypt Data Using Human Senses DOI

Dikshant Rajput,

Sunil K. Singh, Sudhakar Kumar

и другие.

Advances in information security, privacy, and ethics book series, Год журнала: 2024, Номер unknown, С. 376 - 404

Опубликована: Июль 12, 2024

In the era of cryptographic advancement, integrating human workflow with technology is a natural progression. Traditionally, advancements have focused on mathematical robustness and computational security. This research delves into combining methods to explore foundations visual cryptography its practical implementation in decrypting sensitive information. Challenges related usability, such as complex concepts, key management, user authentication, cross-platform compatibility, social engineering attacks, balancing privacy functionality, are evaluated proposed solutions across various domains. Additionally, study suggests enhance accessibility tools, including iterative design processes, research, user-friendly interfaces, error handling. Visual cryptography, leveraging capabilities system, presents unique approach data decryption that circumvents traditional reliance algorithms.

Язык: Английский

Процитировано

6

Synergistic application of neuro-fuzzy mechanisms in advanced neural networks for real-time stream data flux mitigation DOI
Shivam Goyal, Sudhakar Kumar, Sunil K. Singh

и другие.

Soft Computing, Год журнала: 2024, Номер 28(20), С. 12425 - 12437

Опубликована: Авг. 8, 2024

Язык: Английский

Процитировано

5

Application of differential privacy to sensor data in water quality monitoring task DOI Creative Commons

Audris Arzovs,

Sergei Parshutin, Valts Urbanovičs

и другие.

Ecological Informatics, Год журнала: 2025, Номер unknown, С. 103019 - 103019

Опубликована: Янв. 1, 2025

Язык: Английский

Процитировано

0

Advanced Tools and Technologies for Phishing Prevention DOI

Kamaljit Kaur,

Sunil K. Singh, Sudhakar Kumar

и другие.

IGI Global eBooks, Год журнала: 2025, Номер unknown, С. 187 - 212

Опубликована: Фев. 14, 2025

Phishing attacks are a major cybersecurity threat, exploiting human vulnerabilities by manipulating trust to access sensitive information. As phishing tactics evolve, the demand for advanced anti-phishing technologies has surged. This paper examines key measures such as email filters, SSL/TLS certificates, DNS-based authentication, multi-factor and URL filtering protect against phishing. Advanced methods like machine learning, AI-driven analysis, real-time threat detection have improved prevention. It also discusses browser-based, cloud-based, security tools mitigating risks. The highlights challenges evolving tactics, limitations, user negligence, emphasizing need ongoing innovation in strategies. Future trends AI, biometrics, deep learning intelligence explored, showing potential enhance defense. A holistic approach integrating technology, protocols, awareness is advocated combat effectively at both individual organizational levels.

Язык: Английский

Процитировано

0

Foundations of Phishing Defense DOI

Kanwar Raj,

S.S. Bawa,

Sunil K. Singh

и другие.

IGI Global eBooks, Год журнала: 2025, Номер unknown, С. 1 - 24

Опубликована: Фев. 14, 2025

Phishing remains a significant cybersecurity threat, targeting individuals and organizations to access confidential data. As techniques evolve, innovative protective measures are essential. This paper offers detailed overview of phishing defense strategies, focusing on both technological solutions human-centered approaches. Multi-layered defenses, blending traditional security with user education, vital for mitigating risks. Simulated exercises ongoing training empower employees recognize respond threats, strengthening the human aspect cybersecurity. Leadership commitment open communication crucial cultivating strong culture, encouraging staff report suspicious activities. Continuous evaluation updates defenses necessary adapt evolving threats. Real-world case studies, such as 2020 Twitter breach SolarWinds attack, highlight severe impacts phishing, reinforcing need proactive that combines technology, risk management protect digital assets effectively.

Язык: Английский

Процитировано

0