SlideShare a Scribd company logo
1 of 53
ALEXANDER
LAURENCE
Project Showcase
2
3
IoT in Paedriatric Research
4
5
Denoising fMRI
6
7
Cortical Cryptography
8
IoT in Paedriatric Research
IOT IN PAEDRIATRIC
RESEARCH
• Qualitative research is cumbersome for both the participant and the researcher
• People do not like doing questionaires
• Most of the time, participants must be physically present to complete research psychometrics,
scales, and questions so that researchers recieve their responses
• Online questionnaires exist, but they are equally boring
9
IOT IN PAEDRIATRIC
RESEARCH
• Worked with the a lab at the UCL Great Ormond Street Institute of Child Health to develop 2
smartphone apps
• Collects responses from patients remotely and securely on my server
• Saves responses to a cloud database (mySQL) through a 256-bit SSL connection
• User data is anonymised and encrypted on the server
• Researchers can collect responses in one safe, secure, and GDPR-compliant location
10
IOT IN PAEDRIATRIC
RESEARCH
11
IOT IN PAEDRIATRIC
RESEARCH
12
cryptographic architectureweb request architecture
IOT IN PAEDRIATRIC
RESEARCH
13
IOT IN PAEDRIATRIC
RESEARCH
14
IOT IN PAEDRIATRIC
RESEARCH
15
16
Denoising fMRI
DENOISING MEDICAL
IMAGES
• Model for experimenting awake rodents animals in fear conditioning paradigm was proposed
for preclinical research (Brydges et al., 2013).
• Animals were scanned through an MRI whilst conscious during fear expression
• Why conscious? Conducted to better understand memory and emotion by accurately
observing the network level haemodynamic changes
• However, this model is highly susceptible to motion-related artifacts
17
DENOISING MEDICAL
IMAGES
• Problem 1: Anomalous BOLD Activation
18
Stimuli > Baseline Fearful > Neutral
Neutral > Fearful
DENOISING MEDICAL
IMAGES
• Problem 2: Non-Uniformity in Signal Intensity
19
DENOISING MEDICAL
IMAGES
• Problem 3: Gibbs Ringing Artifact
20
DENOISING MEDICAL
IMAGES
• Framework
21
Identify signal
dropout at
specific data
point to train
DL model
DENOISING MEDICAL
IMAGES
• Data was too noisy to rely on intensity-analysis alone (combine with observed data)
• Subjective + Objective => Meaninful Training Data
22
Visual
Inspection
Voxel Data
subjective objective
training
inference
OK
BAD
DENOISING MEDICAL
IMAGES
• Framework
23
Identify signal
dropout at
specific data
point to train
DL model
Feed results
into BOLD
analysis
pipeline
DENOISING MEDICAL
IMAGES
• Narrowing the focus on specific datapoint range (brain extraction, remove first slice, remove
first 3 volumes)
• Motion Correction
• Slice Time Correction
• Sinebell filtering
• Timepoint repair: Deweighting/Despiking
• Signal Denoising
24
DENOISING MEDICAL
IMAGES
• Framework
25
Identify signal
dropout at
specific data
point to train
DL model
Feed results
into BOLD
analysis
pipeline
Improved
statistical
robustness
Improved
translational
validity
Minimise
impact to
statistical
power
DENOISING MEDICAL
IMAGES
26
p < 0.05 p < 0.5
DENOISING MEDICAL
IMAGES
27
DENOISING MEDICAL
IMAGES
28
Medical Image Understanding and Analysis (MIUA) 2017
DENOISING MEDICAL
IMAGES
29
Edinburgh (UK)-ChangGung (Taiwan) Research Collaboration
30
Cortical Cryptography
CORTICAL CRYPTOGRAPHY
• The rubber hose cryptanalysis problem describes most computer security protocols as
inherently susceptible to coercion (via explicit knowledge).
• Although, implicit sensorimotor learning may provide a solution as the consolidation process
can be non-salient to the user.
• This has also been hypothesised to proceed in a bottom-up fashion, such that sequence
knowledge can be identified by enhanced performance on statistically predictable bigrams and
trigrams at test (Bojinov et al, 2012).
31
CORTICAL CRYPTOGRAPHY
• Embed a payload (target sequence) into a user’s implicit memory
• Tacitly express the sequence (through enhanced motor performance) on cue
• Prevent rubber hose attacks
32
CORTICAL CRYPTOGRAPHY
• An array of 32 keyboard keys discriminated by left/right hand
• Uniformly distributed and paired through an Euler circuit for optimal motor performance and
enhanced security.
• 3 keys per hand are selected on a pseudorandom basis using a software number generator
• 313,600 possible combinations ((16C3)2), which greatly improves upon Bojinov et al (2012)’s
setup, (4C3)2 = 16.
33
CORTICAL CRYPTOGRAPHY
34
Target Sequence
CORTICAL CRYPTOGRAPHY
35
Target Sequence
Foil Sequence
CORTICAL CRYPTOGRAPHY
36
Target Sequence
Foil Sequence
Target Sequence
Target Sequence
CORTICAL CRYPTOGRAPHY
37
Target Sequence
Foil Sequence
Target Sequence
Target Sequence
Cluster
CORTICAL CRYPTOGRAPHY
38
Target Sequence
Foil Sequence
Target Sequence
Target Sequence
Target Sequence
Foil Sequence
Target Sequence
Target Sequence
CORTICAL CRYPTOGRAPHY
39
Run each cluster through the training phase until the participant is unconciously primed
CORTICAL CRYPTOGRAPHY
40
Target Sequence occurs more frequently than the Foil Sequence
So, users should perform better (typing reaction time) on target sequence when tested
CORTICAL CRYPTOGRAPHY
41
?
Learning Phase Test Phase
Time
(2s intervals)
Item n
CORTICAL CRYPTOGRAPHY
42
CORTICAL CRYPTOGRAPHY
43
CORTICAL CRYPTOGRAPHY
44
Main point?
CORTICAL CRYPTOGRAPHY
45
They had no idea what they were typing or what they just learnt
CORTICAL CRYPTOGRAPHY
46
Therefore this information cannot be breached, stolen, or revealed
CORTICAL CRYPTOGRAPHY
47 Source: https://xkcd.com/538/
CORTICAL CRYPTOGRAPHY
48
Even if someone was aware of the password,
they would not be able to authenticate due to motor performance
CORTICAL CRYPTOGRAPHY
• Introduces the idea of “psycho-biometric authentication”
• High-level banking security
• Military research
• Something for the future
49
CORTICAL CRYPTOGRAPHY
50
2016 British Psychological Society Cognitive Section Annual Conference (Barcelona, Spain)
51
Cortical CryptographyDenoising fMRIIoT in Paedriatric Research
52
CryptographyAIIoT Alexander
53
ABOUT ME
• MScR Integrative Neuroscience - Edinburgh
• BSc Cognitive Neuroscience - London
• Research presented in Barcelona, Edinburgh, Oxford,
London, (and at 35,000ft!)
• Recieved scholarship from Facebook Artificial Intelligence
and IBM to study Data Science (Deep Learning with
PyTorch + IoT)
• Started IT consultancy freelance to fund my studies (Clients
include Institute of Child Health at UCL)
• Stayed in Japan (1 month), Taiwan (1 month for research)
www.alexanderlaurence.co.uk

More Related Content

Similar to 2019 Project Showcase - Alexander Adam Laurence

SAFE: Policy Aware SPARQL Query Federation Over RDF Data Cubes
SAFE: Policy Aware SPARQL Query Federation Over RDF Data CubesSAFE: Policy Aware SPARQL Query Federation Over RDF Data Cubes
SAFE: Policy Aware SPARQL Query Federation Over RDF Data CubesRatnesh Sahay
 
CDD: Vault, CDD: Vision and CDD: Models software for biologists and chemists ...
CDD: Vault, CDD: Vision and CDD: Models software for biologists and chemists ...CDD: Vault, CDD: Vision and CDD: Models software for biologists and chemists ...
CDD: Vault, CDD: Vision and CDD: Models software for biologists and chemists ...Sean Ekins
 
Building a Knowledge Graph with Spark and NLP: How We Recommend Novel Drugs t...
Building a Knowledge Graph with Spark and NLP: How We Recommend Novel Drugs t...Building a Knowledge Graph with Spark and NLP: How We Recommend Novel Drugs t...
Building a Knowledge Graph with Spark and NLP: How We Recommend Novel Drugs t...Databricks
 
Deep Conditional Adversarial learning for polyp Segmentation
Deep Conditional Adversarial learning for polyp SegmentationDeep Conditional Adversarial learning for polyp Segmentation
Deep Conditional Adversarial learning for polyp Segmentationmultimediaeval
 
On how to efficiently implement Deep Learning algorithms on PYNQ platform
On how to efficiently implement Deep Learning algorithms on PYNQ platformOn how to efficiently implement Deep Learning algorithms on PYNQ platform
On how to efficiently implement Deep Learning algorithms on PYNQ platformNECST Lab @ Politecnico di Milano
 
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...adil raja
 
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...adil raja
 
Deep Learning-based Diagnosis of Pneumonia using X-Ray Scans
Deep Learning-based Diagnosis of Pneumonia using X-Ray ScansDeep Learning-based Diagnosis of Pneumonia using X-Ray Scans
Deep Learning-based Diagnosis of Pneumonia using X-Ray ScansIRJET Journal
 
Diabetes prediciton model ppt.ppt
Diabetes prediciton model ppt.pptDiabetes prediciton model ppt.ppt
Diabetes prediciton model ppt.pptsatvikpatil5
 
Is424 g1 t9_proposal_slides
Is424 g1 t9_proposal_slidesIs424 g1 t9_proposal_slides
Is424 g1 t9_proposal_slidesJing WANG
 
Efficiency gains in inversion based interpretation through computer
Efficiency gains in inversion based interpretation through computerEfficiency gains in inversion based interpretation through computer
Efficiency gains in inversion based interpretation through computerDustin Dewett
 
Contrast and resolution improvement of pocus using self consistent cycle gan
Contrast and resolution improvement of pocus using self consistent cycle ganContrast and resolution improvement of pocus using self consistent cycle gan
Contrast and resolution improvement of pocus using self consistent cycle ganShujaat Khan
 
An Empirical Study on the Adequacy of Testing in Open Source Projects
An Empirical Study on the Adequacy of Testing in Open Source ProjectsAn Empirical Study on the Adequacy of Testing in Open Source Projects
An Empirical Study on the Adequacy of Testing in Open Source ProjectsPavneet Singh Kochhar
 
Enhancing image based data hiding method using reduced difference expansion a...
Enhancing image based data hiding method using reduced difference expansion a...Enhancing image based data hiding method using reduced difference expansion a...
Enhancing image based data hiding method using reduced difference expansion a...MAURICE NTAHOBARI
 
How to Scale from Workstation through Cloud to HPC in Cryo-EM Processing
How to Scale from Workstation through Cloud to HPC in Cryo-EM ProcessingHow to Scale from Workstation through Cloud to HPC in Cryo-EM Processing
How to Scale from Workstation through Cloud to HPC in Cryo-EM Processinginside-BigData.com
 
Unsupervised Deep Learning for Accelerated High Quality Echocardiography
Unsupervised Deep Learning for Accelerated High Quality EchocardiographyUnsupervised Deep Learning for Accelerated High Quality Echocardiography
Unsupervised Deep Learning for Accelerated High Quality EchocardiographyShujaat Khan
 
Digitalization Capacity for Knowledge Acquisition-Learning from Health Monito...
Digitalization Capacity for Knowledge Acquisition-Learning from Health Monito...Digitalization Capacity for Knowledge Acquisition-Learning from Health Monito...
Digitalization Capacity for Knowledge Acquisition-Learning from Health Monito...shengjing 孙胜晶
 

Similar to 2019 Project Showcase - Alexander Adam Laurence (20)

SAFE: Policy Aware SPARQL Query Federation Over RDF Data Cubes
SAFE: Policy Aware SPARQL Query Federation Over RDF Data CubesSAFE: Policy Aware SPARQL Query Federation Over RDF Data Cubes
SAFE: Policy Aware SPARQL Query Federation Over RDF Data Cubes
 
CDD: Vault, CDD: Vision and CDD: Models software for biologists and chemists ...
CDD: Vault, CDD: Vision and CDD: Models software for biologists and chemists ...CDD: Vault, CDD: Vision and CDD: Models software for biologists and chemists ...
CDD: Vault, CDD: Vision and CDD: Models software for biologists and chemists ...
 
Building a Knowledge Graph with Spark and NLP: How We Recommend Novel Drugs t...
Building a Knowledge Graph with Spark and NLP: How We Recommend Novel Drugs t...Building a Knowledge Graph with Spark and NLP: How We Recommend Novel Drugs t...
Building a Knowledge Graph with Spark and NLP: How We Recommend Novel Drugs t...
 
Deep Conditional Adversarial learning for polyp Segmentation
Deep Conditional Adversarial learning for polyp SegmentationDeep Conditional Adversarial learning for polyp Segmentation
Deep Conditional Adversarial learning for polyp Segmentation
 
On how to efficiently implement Deep Learning algorithms on PYNQ platform
On how to efficiently implement Deep Learning algorithms on PYNQ platformOn how to efficiently implement Deep Learning algorithms on PYNQ platform
On how to efficiently implement Deep Learning algorithms on PYNQ platform
 
B.Tech Thesis
B.Tech ThesisB.Tech Thesis
B.Tech Thesis
 
01-pengantar.pdf
01-pengantar.pdf01-pengantar.pdf
01-pengantar.pdf
 
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
 
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
 
Deep Learning-based Diagnosis of Pneumonia using X-Ray Scans
Deep Learning-based Diagnosis of Pneumonia using X-Ray ScansDeep Learning-based Diagnosis of Pneumonia using X-Ray Scans
Deep Learning-based Diagnosis of Pneumonia using X-Ray Scans
 
Deep Learning Initiative @ NECSTLab
Deep Learning Initiative @ NECSTLabDeep Learning Initiative @ NECSTLab
Deep Learning Initiative @ NECSTLab
 
Diabetes prediciton model ppt.ppt
Diabetes prediciton model ppt.pptDiabetes prediciton model ppt.ppt
Diabetes prediciton model ppt.ppt
 
Is424 g1 t9_proposal_slides
Is424 g1 t9_proposal_slidesIs424 g1 t9_proposal_slides
Is424 g1 t9_proposal_slides
 
Efficiency gains in inversion based interpretation through computer
Efficiency gains in inversion based interpretation through computerEfficiency gains in inversion based interpretation through computer
Efficiency gains in inversion based interpretation through computer
 
Contrast and resolution improvement of pocus using self consistent cycle gan
Contrast and resolution improvement of pocus using self consistent cycle ganContrast and resolution improvement of pocus using self consistent cycle gan
Contrast and resolution improvement of pocus using self consistent cycle gan
 
An Empirical Study on the Adequacy of Testing in Open Source Projects
An Empirical Study on the Adequacy of Testing in Open Source ProjectsAn Empirical Study on the Adequacy of Testing in Open Source Projects
An Empirical Study on the Adequacy of Testing in Open Source Projects
 
Enhancing image based data hiding method using reduced difference expansion a...
Enhancing image based data hiding method using reduced difference expansion a...Enhancing image based data hiding method using reduced difference expansion a...
Enhancing image based data hiding method using reduced difference expansion a...
 
How to Scale from Workstation through Cloud to HPC in Cryo-EM Processing
How to Scale from Workstation through Cloud to HPC in Cryo-EM ProcessingHow to Scale from Workstation through Cloud to HPC in Cryo-EM Processing
How to Scale from Workstation through Cloud to HPC in Cryo-EM Processing
 
Unsupervised Deep Learning for Accelerated High Quality Echocardiography
Unsupervised Deep Learning for Accelerated High Quality EchocardiographyUnsupervised Deep Learning for Accelerated High Quality Echocardiography
Unsupervised Deep Learning for Accelerated High Quality Echocardiography
 
Digitalization Capacity for Knowledge Acquisition-Learning from Health Monito...
Digitalization Capacity for Knowledge Acquisition-Learning from Health Monito...Digitalization Capacity for Knowledge Acquisition-Learning from Health Monito...
Digitalization Capacity for Knowledge Acquisition-Learning from Health Monito...
 

Recently uploaded

Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 

Recently uploaded (20)

Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 

2019 Project Showcase - Alexander Adam Laurence

Editor's Notes

  1. SECURITY: - RSA 2048 bits and AES 256 bits keys automatically generated on the fly! (Different keys every time for every client session) - Password salt added automatically - Password hash: SHA256 - Every information encrypted both sides automatically - Full data encryption RSA + AES protocols - Database SHA256 data encryption - Restricted server access - IP surveillance - Anti-injection system - Protection against brute force attacks - Protection against hijacking - Protection against network eavesdropping