ROS-based architecture for fast digital twin development of smart manufacturing robotized systems

C Saavedra Sueldo, I Perez Colo, M De Paula… - Annals of Operations …, 2023 - Springer
In the current era of Industry 4.0, smart manufacturing systems seek to achieve a high level
of flexibility and efficiency. This can be achieved by means of incorporating a high degree of …

CDPS-IoT: cardiovascular disease prediction system based on IoT using machine learning

J Ahamed, A Manan Koli, K Ahmad, A Jamal, BB Gupta - 2022 - reunir.unir.net
Internet of Things, Machine learning, and Cloud computing are the emerging domains of
information communication and technology. These techniques can help to save the life of …

Predictive machine learning-based integrated approach for DDoS detection and prevention

SD Kebede, B Tiwari, V Tiwari… - Multimedia Tools and …, 2022 - Springer
Abstract Distributed Denial of Service attack has been a huge threat to the Internet and may
carry extreme losses to systems, companies, and national security. The invader can …

An intelligent edge enabled 6G‐flying ad‐hoc network ecosystem for precision agriculture

A Mukherjee, AK Panja, N Dey, RG Crespo - Expert Systems, 2023 - Wiley Online Library
Unmanned aerial vehicle based precision agriculture is a predominant research area. The
modern flying ad‐hoc network leverages the advanced low latency vehicular communication …

[HTML][HTML] Secure and efficient transmission of data based on Caesar Cipher Algorithm for Sybil attack in IoT

ASS Thuluva, MS Somanathan, R Somula… - EURASIP Journal on …, 2021 - Springer
Abstract The Internet of Things (IoT) is an emerging concept in the field of information
technology. IoT can integrate any real-time entity with another, using sensing, computing …

Managing data security in fog computing in IoT devices using noise framework encryption with power probabilistic clustering algorithm

M Jalasri, L Lakshmanan - Cluster Computing, 2023 - Springer
With the development of cloud computing and its technologies, most institutions and users
are interested in storing their sensitive information on third-party servers. Most of the data …

A Study of Elliptic Curve Cryptography and Its Applications

U Vijay Nikhil, Z Stamenkovic… - International Journal of …, 2024 - World Scientific
This paper aims to provide a comprehensive review on Elliptic Curve Cryptography (ECC), a
public key cryptographic system and its applications. The paper discusses important …

Integration of ROS and Tecnomatix for the development of digital twins based decision-making systems for smart factories

CS Sueldo, SA Villar, M De Paula… - IEEE Latin America …, 2021 - ieeexplore.ieee.org
Digital twins employs simulation in conjunction with virtual environments and a variety of
data coming from different plant equipment and physical systems to continuously update the …

[PDF][PDF] Methodology for Computer Security Incident Response Teams into IoT Strategy.

AE Bernal, SMM Monterrubio, RG Crespo… - KSII Transactions on …, 2021 - researchgate.net
At present, the Colombian government shares information on threats or vulnerabilities in the
area of cybersecurity and cyberdefense, from other government agencies or departments …

Health care data analysis and visualization using interactive data exploration for sportsperson

H Liu, Y Zhang, K Lian, Y Zhang, OS Martínez… - Science China …, 2022 - Springer
Sports have scored significant attention among the public in this multifaceted world. Diverse
training strategies are followed by many athletics and even flexible to adapt comfortable and …