Internet de las Cosas

Internet de las Cosas

Generating Simulated Spear Phishing Messages and Customized Cybersecurity Training Modules Using Machine Learning
- Aspects of the disclosure relate to spear phishing simulation using machine learning. A computing platform may send, to an enterprise user device, a spear phishing message. The computing platform...
INFRARED ABSORBING POLYMER, INFRARED ABSORBING/BLOCKING FILM, PHOTOELECTRIC DEVICE, ORGANIC SENSOR, AND ELECTRONIC DEVICE
04/11/2021 - Disclosed are an infrared absorbing polymer including a first structural unit represented by Chemical Formula 1 and a second structural unit including at least one of Chemical Formula 2A to...
SAFETY-RATED MULTI-CELL WORKSPACE MAPPING AND MONITORING
- Safety systems in distributed factory workcells intercommunicate or communicate with a central controller so that when a person, robot or vehicle passes from one workcell or space into another on...
DETERMINING AND EVALUATING DATA REPRESENTING AN ACTION TO BE PERFORMED BY A ROBOT
- In one embodiment, a processor accesses sensor input data received from one or more sensors. The sensor input data represents one or more gestures. The processor determines, based on the sensor...
5G CYBERSECURITY PROTECTION SYSTEM USING PERSONALIZED SIGNATURES
- The disclosed technology includes a method and system for preventing or reducing cyber-attacks in a 5G network. The system can register, by a computing device associated with the 5G network, a...
INTELLIGENT CYBERSECURITY PROTECTION SYSTEM, SUCH AS FOR USE IN 5G NETWORKS
- The disclosed technology includes a method and system for preventing or reducing cyber-attacks in telecommunications networks, such as 5G networks. For example, a first node in a 5G network can...
CYBERSECURITY RESILIENCE BY INTEGRATING ADVERSARY AND DEFENDER ACTIONS, DEEP LEARNING, AND GRAPH THINKING
- A technique for providing cyber resilience by integrating autonomous adversary and defender agents, deep learning, and graph thinking. An automated competitive environment of autonomous adversary...
AI-DRIVEN DEFENSIVE CYBERSECURITY STRATEGY ANALYSIS AND RECOMMENDATION SYSTEM
- A system and method for automated cybersecurity defensive strategy analysis that predicts the evolution of new cybersecurity attack strategies and makes recommendations for cybersecurity...
ONLINE MONITORING OF ADDITIVE MANUFACTURING USING ACOUSTIC EMISSION METHODS
- ABSTRACT Embodiments provide systems and methods for utilizing acoustic sensors to detect defects via online or in situ monitoring of additive manufacturing (AM) processes. Sensors may capture...
SELF-ORGANIZED AND ELECTRICALLY CONDUCTING PEDOT POLYMER MATRIX FOR APPLICATIONS IN SENSORS AND ENERGY GENERATION AND STORAGE
25/11/2021 - The present invention relates to a one-step process for preparation of “in-situ” or “ex-situ” self-organized and electrically conducting polymer nanocomposites using thermally initiated...
LOGIC CIRCUITRY PACKAGE
- A logic circuitry package includes an interface to communicate with a print apparatus logic circuit and at least one logic circuit including at least one heater and a temperature sensor. The at...
SIEVE ACTUATION
- Example implementations provide a control system to control a system for actuating a sieve, the system comprising an actuator mechanism to actuate the sieve to produce a sieving action to sieve a...
CYBERSECURITY MATURITY DETERMINATION
- An example operation may include one or more of receiving data from a plurality of sources associated with an entity, clustering the data into security-related topics, determining, via one or more...
Defect detection in three-dimensional printed constructs
- According to one or more embodiments, a system for detecting defects in a printed construct includes one or more processors, one or more image sensors, and one or more memory modules. The one or...
CHURN-AWARE MACHINE LEARNING FOR CYBERSECURITY THREAT DETECTION
- Churn-aware training of a classifier which reduces the difference between predictions of two different models, such as a prior generation of a classification model and a subsequent generation. A...
Artificial intelligence mandible occlusion and movement record device
- The device containing the inertial measurement element and the force resistor sensors are fixed to the teeth of the lower jaw, and then a microcomputer worn on the human head is connected by wire...
ROBOTIC SYSTEM AND METHOD FOR REORIENTING A SURGICAL INSTRUMENT
- A robotic system and methods are disclosed. A common axis is defined for an instrument and an energy applicator extending from the instrument. A manipulator has a plurality of links and actuators...
AUTONOMOUS FLOOR CLEANING WITH REMOVABLE PAD
- An autonomous floor cleaning robot includes a body, a controller supported by the body, a drive supporting the body to maneuver the robot across a floor surface in response to commands from the...
5G cybersecurity protection system
- The disclosed technology includes a method and system for preventing or reducing cyber-attacks in a 5G network. The system can register a connected device with the 5G network, monitor the...
IoT INTERNET OF THING BASED SMART SAFETY PROTECTION GEAR AND SYSTEM FOR PROVIDING CONSTRUCTION SITE MANAGEMENT SERVICE USING THEREOF
- IoT 기반 스마트 안전 보호 장치 및 이를 이용한 현장 관리 서비스 제공 시스템이 제공되며, 인체의 적어도 하나의 부위를 감싸도록 형성되는 적어도...