@apcmcollege.ac.in
Assistant Professor in Computer Science
A.P.C. Mahalaxmi College for Women
Network Security, Cryptography
Scopus Publications
Scholar Citations
Scholar h-index
R. Felista Sugirtha Lizy, Ibrahim M. H., and Chinnadurai Manthiramoorthy
IGI Global
This chapter gives a summary of the effects of Industry 4.0 (I 4.0) on various sectors, including manufacture, communication, transportation, and healthcare. A new wave of technical improvements called “Industry 4.0” focuses on automation, connectivity, and data exchange in manufacturing processes. The chapter highlights how I 4.0 is transforming manufacturing processes by improving productivity, efficiency, and reducing operational costs. Additionally, the chapter discusses I 4.0 adoption in the communications and transportation sectors, leading to better connectivity, safety, and improved customer experience. The healthcare sector is also benefiting from I 4.0 by enhancing patient care through personalized medicine, remote monitoring, and data analytics. The chapter concludes by addressing the possible advantages and difficulties of implementing I 4.0 in various industries, offering insightful information for academics, professionals, and decision-makers.
R. Felista Sugirtha Lizy
Springer Nature Singapore
G. Vennira Selvi, N. Rathna, R. Felista Sugirtha Lizy, S. Prabavathy, and P. Aurchana
AIP Publishing
R. Felista Sugirtha Lizy, V. Joseph Raj, and K. Balasubramanian
IEEE
In the Aadhaar Card security is a crucial aspect. Hence it should be kept as private as possible, we will require some data-handling strategies. This document would be useful for data security. The advantage of this technique is in terms of text encryption and decryption security. Asymmetric algorithms like RSA (Rivest, Adi Shamir, and Leonard Adleman) and ECC (Elliptic Curve Cryptography) are used. The RSA algorithm is used to create a pair of keys: one is a public key and another one is a private key. In both smart cards and Aadhaar cards, the RSA algorithm is the most secure algorithm for data protection. The performance of the ECC algorithm with GT (Game Theory) Methods is examined in this research paper. Combining ECC and GT approaches improves the speed and security of this paper. The GT-ECC algorithm's performance is recommended to be improved by increasing the Speed, Avalanche Effect, Speed, power consumption and Throughput. The experimental findings of the GT -ECC technique show improved performance. There is also a detailed mathematical justification for the GT -ECC algorithm.
R. Felista Sugirtha Lizy and V. Joseph Raj, “Performance Enhancement of RSA Using Runge-Kutta Technique”, Test Engineering and Management, 2020, pp. 11850-11857
R. Felista Sugirtha Lizy, V. Joseph Raj and K. Balasubramanian, “Performance of ECC Algorithm Using Game Theory for Aadhaar Card”, 2022 International Virtual Conference on Power Engineering Computing and Control: Developments in Electric Vehicles and Energy Sector for Sustainable Future (PECCON), 2022, pp. 1-6, doi: 10.1109/ (Scopus Indexed)
R. Felista Sugirtha Lizy and V. Joseph Raj, “Image Encryption Using RK-RSA Algorithm in Aadhaar Card”, Turkish Journal of Computer and Mathematics Education, 2021, pp. 4683-4693
R. Felista Sugirtha Lizy and V. Joseph Raj, “Improvement of RSA Algorithm Using Euclidean Technique”, Turkish Journal of Computer and Mathematics Education, 2021, pp. 4694-4700
R. Felista Sugirtha Lizy and V. Joseph Raj, “Image Encryption Using RK-ECC Algorithm in Aadhaar Card”, A.P.C. Proceedings in International Conference Advances in Science and Engineering (ICASE’22)
R. Felista Sugirtha Lizy and V. Joseph Raj, “Novel Approach to Security for Aadhaar Card Using RK and ECC Algorithm”, National Conference on “Current Trends and Future Perspectives In Computing and Information Technology (CTFSCIT’22)”
“Machine Learning Based Data Seclusion in Image and Audio Files” on 08.04.2022, Journal , pp. 21859.
“Construction of APP Using Augmented Reality and Virtual Reality” on 10.12.2021, Journal 50/2021, pp. 59938.