[PDF][PDF] An Overview on Robotics and Control Systems

R Kaushik, A Rawat, A Tiwari - … Journal of Technical Research & Science …, 2021 - ijtrs.com
A robot is a virtual or mechanical agent. In practice, it is often an electro-mechanical system,
which looks and speeds as if it were one of its own. The intent and its own agency. The term …

Cyber security challenges and trends on recent technologies

H Arora, T Manglani, G Bakshi… - 2022 6th International …, 2022 - ieeexplore.ieee.org
Protecting data and information systems (such as networking, computing systems, and cloud
services, as well as software) is the goal of cyber security. Protecting personal information …

Enhanced digital image and text data security using hybrid model of LSB steganography and AES cryptography technique

M Kumar, A Soni, ARS Shekhawat… - … conference on artificial …, 2022 - ieeexplore.ieee.org
In the present innovation, for the trading of information, the internet is the most well-known
and significant medium. With the progression of the web and data innovation, computerized …

A survey on AWS cloud computing security challenges & solutions

S Mishra, M Kumar, N Singh… - 2022 6th International …, 2022 - ieeexplore.ieee.org
Amazon offers a comprehensive range of IT solutions to let businesses construct their
private virtual clouds and maintain total control over their infrastructure. It is possible to use …

Smart agriculture monitoring system using internet of things (IoT)

T Manglani, A Vaishnav, AS Solanki… - … on Electronics and …, 2022 - ieeexplore.ieee.org
The New beginning of computing technology is arriving such as the Internet of Things (IoT).
It is a kind of Global Neural Network the cloud that interfaces various gadgets. Human life …

Protecting digital images using keys enhanced by 2D chaotic logistic maps

M Abu-Faraj, A Al-Hyari, C Obimbo, K Aldebei… - Cryptography, 2023 - mdpi.com
This research paper presents a novel digital color image encryption approach that ensures
high-level security while remaining simple and efficient. The proposed method utilizes a …

Secure data communication using information hiding and encryption algorithms

S Mishra, D Singh, D Pant… - 2022 Second international …, 2022 - ieeexplore.ieee.org
In today's innovation, for the information trade, the Internet is the best known and most
important medium. With the advancement of the web and data innovation, computerized …

House price prediction using machine learning algorithm

S Sharma, D Arora, G Shankar… - 2023 7th …, 2023 - ieeexplore.ieee.org
Houses are one of the fundamental needs in human society. Good and peaceful
surroundings where people feel comfortable are called houses. Hence, to have a good and …

IoT based air and sound pollution monitoring system for smart environment

T Manglani, A Srivastava, A Kumar… - … on Electronics and …, 2022 - ieeexplore.ieee.org
Air and noise pollution is a rapidly growing issue these days. Air quality monitoring is critical
for a bright future and a healthy life for all of us. In this paper present an air quality and noise …

Privacy and security of healthcare data in cloud based on the blockchain technology

A Agarwal, R Joshi, H Arora… - 2023 7th International …, 2023 - ieeexplore.ieee.org
Blockchain is basically a conveyed database that contains records and public record for all
exchanges or computerized occasions that have been performed and shared among …