This document summarizes and reviews several models for ubiquitous computing systems. It begins by defining ubiquitous computing and describing the need for context awareness, wireless networks, and mobility in ubiquitous environments. It then examines three specific models:
1) SenSay, a context-aware mobile phone that adapts its behavior based on the user's environment and state.
2) HOMEROS, a middleware architecture that allows flexibility for heterogeneous devices and users across three layers.
3) Mobile Gaia, a middleware for ad-hoc pervasive computing networks.
This project aims at achieving automation using the widely used mobile operating system ANDROID i.e. android operating system. The electrical and office appliances can be controlled using the android mobile phones and Internet of things (IoT) even if you are out of your house and you forgot to switch off the appliances. Many electrical and office appliances like light, fan, air conditioner etc., can be controlled using the android operating system. This proposed system is implemented in order to overcome the drawbacks of the previous methodologies. This can also be implemented at homes also. Office automation is the residential extension of building automation. Office automation may include centralized control of lighting, HVAC (heating, ventilation and air conditioning), appliances, to provide improved convenience, comfort, energy efficiency and security. Office automation for the elderly and disabled can provide increased quality of life for persons who might otherwise require caregivers or institutional care.
IRJET- Emergency Navigation System using Mobile ComputingIRJET Journal
This document describes a proposed emergency navigation system using mobile computing and wireless sensor networks. The system would detect emergency situations through sensors and provide navigation guidance to mobile users via their devices. When an emergency occurs, sensors would detect it and notify the network. The network would then determine the safest exit route while avoiding the hazardous area and provide turn-by-turn navigation instructions to users' mobile devices to guide them to safety. The proposed system aims to address issues with existing emergency navigation that do not consider congestion or provide alternative routes.
IRJET- Centralized Wireless Home Appliances Control SystemIRJET Journal
This document describes a centralized wireless home appliances control system that allows users to control home appliances remotely using a smartphone application. The system uses a NodeMCU microcontroller connected to appliances via relays to control devices based on signals from the smartphone app over WiFi. Sensors such as moisture, ultrasonic, and infrared sensors can also send data to the user. The system aims to provide convenient, easy to use, and affordable remote control of home appliances.
The interconnecting mechanism for monitoring regular domestic conditioneSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Wireless sensor network plays vital role in today’s life, it is a collection of sensors that are scattered in different directions which are further used to control and measure the physical conditions of environment as well as to organize to the data somewhere at centre location. As in context of greenhouse we can measure various parameters such as temperature, humidity, water level, insect monitoring and light intensity.
This document is a project report submitted by three students - M Manoj, S Parthiban, and R Raghav - for their Bachelor of Technology degree in Information Technology from Sri Venkateswara College of Engineering. The report proposes a Security Enhanced Distributed Reprogramming Protocol (SEDRP) to enhance security and mitigate impersonation attacks in the existing Secure Distributed Reprogramming Protocol (SDRP) for wireless sensor networks. The report includes an introduction to wireless sensor networks and distributed networking, a literature review of related work, a description of the proposed SEDRP system and its modules, system design details, implementation and results from simulating the system in NS2 network simulator.
IRJET- IoT based Classroom Automation SystemIRJET Journal
This document describes an IoT-based classroom automation system that allows teachers to remotely control devices in the classroom using a mobile application. The system uses NodeMCU microcontrollers connected to sensors and appliances via relays to enable on/off control. An ultrasonic sensor detects human presence. Commands sent from the mobile app via WiFi are received by the NodeMCU which controls the relays. This allows automation of lighting, A/C, and other devices for improved energy efficiency, convenience and security while providing remote classroom monitoring capabilities.
Security threats and detection technique in cognitive radio network with sens...eSAT Journals
This document discusses security threats and detection techniques in cognitive radio networks. It begins by providing background on cognitive radio networks and how secondary users can utilize unused spectrum bands of primary users. However, this can introduce security issues if malicious users emulate primary users. The document then discusses two main threats: primary user emulation attacks, where fake secondary users pretend to be primary users and disrupt communications, and jamming attacks. It proposes using energy spectrum sensing techniques for secondary users to detect unused spectrum bands while avoiding interfering with primary users. The document concludes that cognitive radio networks introduce practical wireless communication challenges, and future work is needed to improve security against identified threats.
This project aims at achieving automation using the widely used mobile operating system ANDROID i.e. android operating system. The electrical and office appliances can be controlled using the android mobile phones and Internet of things (IoT) even if you are out of your house and you forgot to switch off the appliances. Many electrical and office appliances like light, fan, air conditioner etc., can be controlled using the android operating system. This proposed system is implemented in order to overcome the drawbacks of the previous methodologies. This can also be implemented at homes also. Office automation is the residential extension of building automation. Office automation may include centralized control of lighting, HVAC (heating, ventilation and air conditioning), appliances, to provide improved convenience, comfort, energy efficiency and security. Office automation for the elderly and disabled can provide increased quality of life for persons who might otherwise require caregivers or institutional care.
IRJET- Emergency Navigation System using Mobile ComputingIRJET Journal
This document describes a proposed emergency navigation system using mobile computing and wireless sensor networks. The system would detect emergency situations through sensors and provide navigation guidance to mobile users via their devices. When an emergency occurs, sensors would detect it and notify the network. The network would then determine the safest exit route while avoiding the hazardous area and provide turn-by-turn navigation instructions to users' mobile devices to guide them to safety. The proposed system aims to address issues with existing emergency navigation that do not consider congestion or provide alternative routes.
IRJET- Centralized Wireless Home Appliances Control SystemIRJET Journal
This document describes a centralized wireless home appliances control system that allows users to control home appliances remotely using a smartphone application. The system uses a NodeMCU microcontroller connected to appliances via relays to control devices based on signals from the smartphone app over WiFi. Sensors such as moisture, ultrasonic, and infrared sensors can also send data to the user. The system aims to provide convenient, easy to use, and affordable remote control of home appliances.
The interconnecting mechanism for monitoring regular domestic conditioneSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Wireless sensor network plays vital role in today’s life, it is a collection of sensors that are scattered in different directions which are further used to control and measure the physical conditions of environment as well as to organize to the data somewhere at centre location. As in context of greenhouse we can measure various parameters such as temperature, humidity, water level, insect monitoring and light intensity.
This document is a project report submitted by three students - M Manoj, S Parthiban, and R Raghav - for their Bachelor of Technology degree in Information Technology from Sri Venkateswara College of Engineering. The report proposes a Security Enhanced Distributed Reprogramming Protocol (SEDRP) to enhance security and mitigate impersonation attacks in the existing Secure Distributed Reprogramming Protocol (SDRP) for wireless sensor networks. The report includes an introduction to wireless sensor networks and distributed networking, a literature review of related work, a description of the proposed SEDRP system and its modules, system design details, implementation and results from simulating the system in NS2 network simulator.
IRJET- IoT based Classroom Automation SystemIRJET Journal
This document describes an IoT-based classroom automation system that allows teachers to remotely control devices in the classroom using a mobile application. The system uses NodeMCU microcontrollers connected to sensors and appliances via relays to enable on/off control. An ultrasonic sensor detects human presence. Commands sent from the mobile app via WiFi are received by the NodeMCU which controls the relays. This allows automation of lighting, A/C, and other devices for improved energy efficiency, convenience and security while providing remote classroom monitoring capabilities.
Security threats and detection technique in cognitive radio network with sens...eSAT Journals
This document discusses security threats and detection techniques in cognitive radio networks. It begins by providing background on cognitive radio networks and how secondary users can utilize unused spectrum bands of primary users. However, this can introduce security issues if malicious users emulate primary users. The document then discusses two main threats: primary user emulation attacks, where fake secondary users pretend to be primary users and disrupt communications, and jamming attacks. It proposes using energy spectrum sensing techniques for secondary users to detect unused spectrum bands while avoiding interfering with primary users. The document concludes that cognitive radio networks introduce practical wireless communication challenges, and future work is needed to improve security against identified threats.
Our future battle field system will have more difficulties to maintain security, because of increasing military competitive. Ability to understand, predict and adopt the vast array of inter-networked things is very difficult. Unwanted fire, unauthorized human intervention and other object movement will play major important role for affecting military environment. This project aims to help our future military environment by introducing new technology LoRaWAN in IoT (Internet of Things). LoRaWAN (Long Range Wide Area Network) is a state -of- art commercial of the self (COTS) technology. This project consist of sensors, embedded microcontrollers equipped with LoRaWAN, embedded processors equipped with LoRaWAN and cloud technology. By introducing this new technology in our future military environment we can easily find out criminal activities and fire hazards.
IRJET- Home Automation using IoT: ReviewIRJET Journal
This document summarizes research on using Internet of Things (IoT) technology for home automation and security. It discusses how IoT allows devices in the home to be controlled remotely through a smartphone app and can automate tasks. The document also reviews different approaches others have taken to implement smart home security systems using sensors and microcontrollers connected to the Internet. It describes the typical architecture of an IoT system including sensor, network, and application layers. Finally, it summarizes several research papers on developing smart home and kitchen monitoring systems using technologies like Arduino, Raspberry Pi, and sensors for functions like detecting fires, gas leaks, and intruders.
Smart phone as a cloud server machine computing frameworkeSAT Journals
1. The document discusses developing a framework for turning a smartphone into a portable cloud server machine. It would allow hosting a cloud server environment and handling multiple requests simultaneously on a smartphone.
2. Key requirements for the smartphone cloud server machine include a high-end processor, OS support, storage configuration, open computing framework installation, and security measures like a portable firewall.
3. The framework would optimize battery usage and allow the smartphone to function like a personal computer or server through operations like start, stop, debugging and maintenance modes. Compatibility ensures access from other devices on the cloud network.
ABSTRACT The success of the cloud computing paradigm is due to its on-demand, self-service, and pay-by-use nature. Public key encryption with keyword search applies only to the certain circumstances that keyword cipher text can only be retrieved by a specific user and only supports single-keyword matching. In the existing searchable encryption schemes, either the communication mode is one-to-one, or only single-keyword search is supported. This paper proposes a searchable encryption that is based on attributes and supports multi-keyword search. Searchable encryption is a primitive, which not only protects data privacy of data owners but also enables data users to search over the encrypted data. Most existing searchable encryption schemes are in the single-user setting. There are only few schemes in the multiple data users setting, i.e., encrypted data sharing. Among these schemes, most of the early techniques depend on a trusted third party with interactive search protocols or need cumbersome key management. To remedy the defects, the most recent approaches borrow ideas from attribute-based encryption to enable attribute-based keyword search (ABKS
Technology is always evolves. To be able to design a product using the current technology that will be
beneficial to the lives of others is a huge contribution to the human community. This paper presents the design and
implementation of a low cost but yet flexible mechanism using a smartphone based home automation system. With
the rapid expansion of the Internet, the owners have been requesting remote control and monitoring of these inhome
appliances. This leads to networking these appliances to form a kind of home automation system. An
Android based home automation system allows users to control the appliances by an Android application or
through a website is presented.
Keywords: - Home automation; android; arduino; automation; smart phone.
IRJET- Review on IoT based Dual ARM Tele-Robotic SystemIRJET Journal
This document reviews an IoT-based dual arm tele-robotic system for pick and place operations and online video streaming. It discusses designing a robot gripper for precision pick and place applications. An IoT-embedded control system would allow remote control of the robotic arms as well as video surveillance of remote areas. The system aims to develop a dual arm tele-robot for pick and place operations and online video streaming to identify and retrieve objects from a distance.
IoT Based Water Management and Supervision SystemKaushik Gupta
Final Year Project
IoT Based Water Management and Supervision System -2019
Certification: Thakur Polytechnic
More Details on https://www.kaushikgupta.in
IRJET- A Remotely Controlled Home Automation System for Energy SavingIRJET Journal
This document describes a remotely controlled home automation system using GSM technology. The system allows a homeowner to control appliances in their home like fans, lights and air conditioners via SMS messages from their mobile phone. A microcontroller is used to receive SMS messages through a GSM module and control the appliances using sensors like temperature, smoke and light sensors. The system aims to automate home appliances and enable remote control for energy savings purposes. Key components include a microcontroller, sensors, relays, GSM module and appliances like fans that can be turned on/off remotely using SMS commands from the homeowner's mobile phone from anywhere.
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...IRJET Journal
This document discusses a survey on using a Raspberry Pi 3B and Google Assistance to create a smart system that can control non-smart devices. The system allows users to control devices like lights and fans using voice commands. It describes how the Raspberry Pi acts as a smart hub that connects to devices and is controlled by Google Assistance. The system aims to make traditional devices "smart" by enabling voice control of them through the Raspberry Pi and Google Assistance.
An enhanced method for human life rescue systemeSAT Journals
Abstract
In the Modern World, Traffic is one of the main problem in our daily life. During Emergency conditions Vehicles like Ambulances
and Fire Controllers are delayed to reach their destination due to the Traffic Jams. Every one minute there will be an accident in
India, which causes loss of lives. This is a wireless module system which generates information from the accident zone to the
ambulance facility very quickly. Traffic blocking and management of free movement of vehicles were recognized as major
problem in modern urban areas. The accidents in the city have been increased due to negligible of rules and rise in motor
vehicles leads to the loss of life. The main idea behind this system is to endow with a flow for the rescue vehicles to reach the
hospitals in moment. The novelty in this paper is to manage the traffic signals in the alleyway of the rescue vehicle. This scheme is
fully programmed, thus it finds the accident point, to be in command of traffic lights, helps to reach the hospital in instance.
Keywords: SMAC, HLRS, etc
Analysis and reporting of programming skills using mobile cloud based compilereSAT Journals
Abstract
Cloud Computing is a growing technology which enables on demand network access to resources . In mobile cloud computing
there is access to remote servers rather than local servers using portable devices and it is also shaping new environment for
computing where user is free to move while working and there is no need to work at a specific location . Installing compiler
manually is very crucial task because it consumes lot of space. In this paper mobile cloud based compiler is used to compile
and execute programs which is hosted on private cloud. We can use this compiler remotely through any network via smart
phone or any portable device which will help us to avoid installation of compilers on every machine.
Keywords: Mobile Cloud Computing, Cloud Serve ,Compiler, Private Cloud.
IRJET - Cryptographic Communication between Two ESP32 DevicesIRJET Journal
This document describes encrypting communication between two ESP32 IoT devices using RSA-256 cryptography. It begins with an introduction to RSA cryptography and its applications. It then discusses the ESP32 device and why it is well-suited for consumer IoT applications due to features like WiFi/Bluetooth connectivity, dual-core processing, and an integrated TCP/IP stack. The document presents the RSA encryption/decryption process at a high level and provides a simple numerical example. It then outlines the proposed system workflow where an ESP32 hub encrypts messages using RSA before transmitting to ESP32 nodes, which decrypt the messages. Flash encryption is also discussed to further improve security.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINOijccsa
Complex event processing systems have gained importance since recent developments in communication
and integrated circuits technologies. Developers can easily develop many smart space systems by
connecting various sensors to an Arduino as an internet of thing device. These systems are useful for many
places such as factories, greenhouses (plant house) and smart-homes. Especially in plant houses when the
desired humidity, temperature, light and soil moisture drops the certain level, the users should be notified
through their smartphones. The sensor information is sent to a central server over the internet via an
access point. The collected sensor data needs to be processed online to check whether an event is occurred
or not. The event processing system based on a complex event processing tool is created on the central
server. It is also an important issue to inform mobile users whenever an event occurs. A publish-subscribe
event based system is implemented on the central server. A mobile user is subscribed to the desired event
topic. When an event occurred, which is related with a specific topic, an alarm notification is sent to the
mobile users about the event information so as to take necessary precautions.
Gesture Human-Machine Interface (GHMI) in Home AutomationIRJET Journal
This document summarizes a system called Gesture Human-Machine Interface (GHMI) that allows for control of home automation devices using hand gestures. The system uses an accelerometer and flex sensor to detect hand gestures, which are transmitted wirelessly via Bluetooth to a Raspberry Pi. The Raspberry Pi then controls electronic devices by activating relays. For home security, the system uses a camera and image recognition algorithm to identify authorized individuals at the door and send notifications to the homeowner. The goal of the GHMI system is to provide remote control of home devices using hand gestures as an alternative to traditional button-based remotes.
Smart Sensor Network for Society Automation-A ReviewIRJET Journal
This document discusses the design and development of a smart sensor network for monitoring and controlling household electrical appliances in real time. It proposes using a wireless sensor network installed in the home to monitor and control regular appliances. This system allows appliances to be controlled in different ways, providing a cheap and flexible automation solution that can save consumers money on electricity costs. It then reviews several related works involving wireless sensor networks for applications like fire detection, home energy management, intelligent lighting control, and elderly monitoring.
DESIGN CHALLENGES IN WIRELESS FIRE SECURITY SENSOR NODES ijesajournal
A design of simple hardware circuit with different kind of fire sensors enables every user to use this wireless fire security system. The challenges in designing the nodes with various types of fire sensors are
discussed and the methods to overcome design problems are also analyzed. The circuit is interfaced with
the different types of sensor to sense different fire sources such as gas leakage, smoke, and heat. The cost,
circuit components, design requirements, power requirements of sensor node are minimized. The methods
to improve the quality of system to detect fire are analyzed. The system is fully controlled by the PIC
microcontroller. All the sensors and detectors are interconnected to PIC microcontroller by using various
types of interface circuits. The PIC microcontroller will continuously monitor all the sensors and if it senses
any security problem then the microcontroller will send the information to the PC central monitoring station wirelessly for a short distance of 300m indoor/1500m outdoor using zigbee technology. The gas
sensor, light sensor, smoke detector sensor, IR sensor, temperature & humidity sensor, fire sensor are interfaced with microcontroller to detect abnormal fire conditions in the environment in all possible ways.
Smart Home Management System Using Wireless Sensor Network (WSN)paperpublications3
Abstract: Nowadays, shortage of electricity is a very serious problem due to insufficient production. The wastage of electricity can be avoided by switching off the electrical appliances when not in use. This can be achieved by using Smart home system which automatically turns off loads when not in use, the system can save energy in homes and offices. The system will automatically switch off based on the presence of people at home. Another major issue is that there might be occurrence of theft when nobody is present at home. The theft can be avoided by using MEMS accelerometer which intimates the user through registered mobile number when there is an unexpected break of windows or door through the GSM modem. The system in addition also has a provision for the user to fix energy consumption reading and when the user consumption exceeds a fixed reading, a message would be sent to the users registered mobile number through the GSM modem. Applications for this system include workstations, open office cubicles, home offices, and home entertainment systems.
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSJournal For Research
This document discusses offline context aware computing for providing user-specific results on mobile devices. It defines context awareness and describes how offline context awareness can provide personalized results without internet by analyzing a user's local data, like call logs and app usage. The key aspects covered are:
1. It proposes an architecture for offline context aware applications consisting of four modules: an offline context engine, data collector, reminder database, and user interface.
2. It discusses challenges of offline context awareness like increased processing overhead, potential reduction in accuracy, and impact on battery life.
3. It provides examples of current mobile apps that use context awareness and discusses how offline context awareness can solve privacy and availability issues of internet-based approaches
This document discusses measuring complexity in component-based software systems through dependency analysis using the Unified Modeling Language (UML). It proposes modeling CBSs in UML using tools like ArgoUML to analyze dependencies and interactions between components. Metrics are defined to measure incoming/outgoing interaction densities and dependency levels for individual components. These metrics can help identify complex, critical, and isolated components. As an example, a simple CBS with 4 components and their dependencies is modeled in ArgoUML. Dependency metrics are calculated to show how they help predict component characteristics like criticality and change impact. The approach aims to facilitate complexity analysis and dependency issues in CBSs.
The document summarizes a study on the structural and morphological properties of thin Cd1-xSnxSe films deposited by thermal evaporation at different tin (Sn) concentrations (x=0.00, 0.25, 0.50, 0.75, 1.00) and annealing temperatures. X-ray diffraction analysis showed the films have a mix of cubic and hexagonal phases. Annealing increased grain size and peak intensity. Atomic force microscopy images showed the grains were spherical and uniformly distributed across the substrate, and annealing improved grain definition except for x=1. Increasing Sn concentration or annealing temperature generally increased grain size and crystallinity of the thin films based on XRD and AFM analysis.
This document summarizes research on using finite element analysis in time to model the nonlinear dynamic response of beams. It describes discretizing a beam into finite elements, with each node having two degrees of freedom for displacement and slope. Hermite shape functions are used to interpolate displacement within each element. The total potential energy of the system is derived and used to form the element stiffness matrix. The analysis shows this finite element approach can accurately model the bending behavior of beams under distributed loads.
Our future battle field system will have more difficulties to maintain security, because of increasing military competitive. Ability to understand, predict and adopt the vast array of inter-networked things is very difficult. Unwanted fire, unauthorized human intervention and other object movement will play major important role for affecting military environment. This project aims to help our future military environment by introducing new technology LoRaWAN in IoT (Internet of Things). LoRaWAN (Long Range Wide Area Network) is a state -of- art commercial of the self (COTS) technology. This project consist of sensors, embedded microcontrollers equipped with LoRaWAN, embedded processors equipped with LoRaWAN and cloud technology. By introducing this new technology in our future military environment we can easily find out criminal activities and fire hazards.
IRJET- Home Automation using IoT: ReviewIRJET Journal
This document summarizes research on using Internet of Things (IoT) technology for home automation and security. It discusses how IoT allows devices in the home to be controlled remotely through a smartphone app and can automate tasks. The document also reviews different approaches others have taken to implement smart home security systems using sensors and microcontrollers connected to the Internet. It describes the typical architecture of an IoT system including sensor, network, and application layers. Finally, it summarizes several research papers on developing smart home and kitchen monitoring systems using technologies like Arduino, Raspberry Pi, and sensors for functions like detecting fires, gas leaks, and intruders.
Smart phone as a cloud server machine computing frameworkeSAT Journals
1. The document discusses developing a framework for turning a smartphone into a portable cloud server machine. It would allow hosting a cloud server environment and handling multiple requests simultaneously on a smartphone.
2. Key requirements for the smartphone cloud server machine include a high-end processor, OS support, storage configuration, open computing framework installation, and security measures like a portable firewall.
3. The framework would optimize battery usage and allow the smartphone to function like a personal computer or server through operations like start, stop, debugging and maintenance modes. Compatibility ensures access from other devices on the cloud network.
ABSTRACT The success of the cloud computing paradigm is due to its on-demand, self-service, and pay-by-use nature. Public key encryption with keyword search applies only to the certain circumstances that keyword cipher text can only be retrieved by a specific user and only supports single-keyword matching. In the existing searchable encryption schemes, either the communication mode is one-to-one, or only single-keyword search is supported. This paper proposes a searchable encryption that is based on attributes and supports multi-keyword search. Searchable encryption is a primitive, which not only protects data privacy of data owners but also enables data users to search over the encrypted data. Most existing searchable encryption schemes are in the single-user setting. There are only few schemes in the multiple data users setting, i.e., encrypted data sharing. Among these schemes, most of the early techniques depend on a trusted third party with interactive search protocols or need cumbersome key management. To remedy the defects, the most recent approaches borrow ideas from attribute-based encryption to enable attribute-based keyword search (ABKS
Technology is always evolves. To be able to design a product using the current technology that will be
beneficial to the lives of others is a huge contribution to the human community. This paper presents the design and
implementation of a low cost but yet flexible mechanism using a smartphone based home automation system. With
the rapid expansion of the Internet, the owners have been requesting remote control and monitoring of these inhome
appliances. This leads to networking these appliances to form a kind of home automation system. An
Android based home automation system allows users to control the appliances by an Android application or
through a website is presented.
Keywords: - Home automation; android; arduino; automation; smart phone.
IRJET- Review on IoT based Dual ARM Tele-Robotic SystemIRJET Journal
This document reviews an IoT-based dual arm tele-robotic system for pick and place operations and online video streaming. It discusses designing a robot gripper for precision pick and place applications. An IoT-embedded control system would allow remote control of the robotic arms as well as video surveillance of remote areas. The system aims to develop a dual arm tele-robot for pick and place operations and online video streaming to identify and retrieve objects from a distance.
IoT Based Water Management and Supervision SystemKaushik Gupta
Final Year Project
IoT Based Water Management and Supervision System -2019
Certification: Thakur Polytechnic
More Details on https://www.kaushikgupta.in
IRJET- A Remotely Controlled Home Automation System for Energy SavingIRJET Journal
This document describes a remotely controlled home automation system using GSM technology. The system allows a homeowner to control appliances in their home like fans, lights and air conditioners via SMS messages from their mobile phone. A microcontroller is used to receive SMS messages through a GSM module and control the appliances using sensors like temperature, smoke and light sensors. The system aims to automate home appliances and enable remote control for energy savings purposes. Key components include a microcontroller, sensors, relays, GSM module and appliances like fans that can be turned on/off remotely using SMS commands from the homeowner's mobile phone from anywhere.
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...IRJET Journal
This document discusses a survey on using a Raspberry Pi 3B and Google Assistance to create a smart system that can control non-smart devices. The system allows users to control devices like lights and fans using voice commands. It describes how the Raspberry Pi acts as a smart hub that connects to devices and is controlled by Google Assistance. The system aims to make traditional devices "smart" by enabling voice control of them through the Raspberry Pi and Google Assistance.
An enhanced method for human life rescue systemeSAT Journals
Abstract
In the Modern World, Traffic is one of the main problem in our daily life. During Emergency conditions Vehicles like Ambulances
and Fire Controllers are delayed to reach their destination due to the Traffic Jams. Every one minute there will be an accident in
India, which causes loss of lives. This is a wireless module system which generates information from the accident zone to the
ambulance facility very quickly. Traffic blocking and management of free movement of vehicles were recognized as major
problem in modern urban areas. The accidents in the city have been increased due to negligible of rules and rise in motor
vehicles leads to the loss of life. The main idea behind this system is to endow with a flow for the rescue vehicles to reach the
hospitals in moment. The novelty in this paper is to manage the traffic signals in the alleyway of the rescue vehicle. This scheme is
fully programmed, thus it finds the accident point, to be in command of traffic lights, helps to reach the hospital in instance.
Keywords: SMAC, HLRS, etc
Analysis and reporting of programming skills using mobile cloud based compilereSAT Journals
Abstract
Cloud Computing is a growing technology which enables on demand network access to resources . In mobile cloud computing
there is access to remote servers rather than local servers using portable devices and it is also shaping new environment for
computing where user is free to move while working and there is no need to work at a specific location . Installing compiler
manually is very crucial task because it consumes lot of space. In this paper mobile cloud based compiler is used to compile
and execute programs which is hosted on private cloud. We can use this compiler remotely through any network via smart
phone or any portable device which will help us to avoid installation of compilers on every machine.
Keywords: Mobile Cloud Computing, Cloud Serve ,Compiler, Private Cloud.
IRJET - Cryptographic Communication between Two ESP32 DevicesIRJET Journal
This document describes encrypting communication between two ESP32 IoT devices using RSA-256 cryptography. It begins with an introduction to RSA cryptography and its applications. It then discusses the ESP32 device and why it is well-suited for consumer IoT applications due to features like WiFi/Bluetooth connectivity, dual-core processing, and an integrated TCP/IP stack. The document presents the RSA encryption/decryption process at a high level and provides a simple numerical example. It then outlines the proposed system workflow where an ESP32 hub encrypts messages using RSA before transmitting to ESP32 nodes, which decrypt the messages. Flash encryption is also discussed to further improve security.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINOijccsa
Complex event processing systems have gained importance since recent developments in communication
and integrated circuits technologies. Developers can easily develop many smart space systems by
connecting various sensors to an Arduino as an internet of thing device. These systems are useful for many
places such as factories, greenhouses (plant house) and smart-homes. Especially in plant houses when the
desired humidity, temperature, light and soil moisture drops the certain level, the users should be notified
through their smartphones. The sensor information is sent to a central server over the internet via an
access point. The collected sensor data needs to be processed online to check whether an event is occurred
or not. The event processing system based on a complex event processing tool is created on the central
server. It is also an important issue to inform mobile users whenever an event occurs. A publish-subscribe
event based system is implemented on the central server. A mobile user is subscribed to the desired event
topic. When an event occurred, which is related with a specific topic, an alarm notification is sent to the
mobile users about the event information so as to take necessary precautions.
Gesture Human-Machine Interface (GHMI) in Home AutomationIRJET Journal
This document summarizes a system called Gesture Human-Machine Interface (GHMI) that allows for control of home automation devices using hand gestures. The system uses an accelerometer and flex sensor to detect hand gestures, which are transmitted wirelessly via Bluetooth to a Raspberry Pi. The Raspberry Pi then controls electronic devices by activating relays. For home security, the system uses a camera and image recognition algorithm to identify authorized individuals at the door and send notifications to the homeowner. The goal of the GHMI system is to provide remote control of home devices using hand gestures as an alternative to traditional button-based remotes.
Smart Sensor Network for Society Automation-A ReviewIRJET Journal
This document discusses the design and development of a smart sensor network for monitoring and controlling household electrical appliances in real time. It proposes using a wireless sensor network installed in the home to monitor and control regular appliances. This system allows appliances to be controlled in different ways, providing a cheap and flexible automation solution that can save consumers money on electricity costs. It then reviews several related works involving wireless sensor networks for applications like fire detection, home energy management, intelligent lighting control, and elderly monitoring.
DESIGN CHALLENGES IN WIRELESS FIRE SECURITY SENSOR NODES ijesajournal
A design of simple hardware circuit with different kind of fire sensors enables every user to use this wireless fire security system. The challenges in designing the nodes with various types of fire sensors are
discussed and the methods to overcome design problems are also analyzed. The circuit is interfaced with
the different types of sensor to sense different fire sources such as gas leakage, smoke, and heat. The cost,
circuit components, design requirements, power requirements of sensor node are minimized. The methods
to improve the quality of system to detect fire are analyzed. The system is fully controlled by the PIC
microcontroller. All the sensors and detectors are interconnected to PIC microcontroller by using various
types of interface circuits. The PIC microcontroller will continuously monitor all the sensors and if it senses
any security problem then the microcontroller will send the information to the PC central monitoring station wirelessly for a short distance of 300m indoor/1500m outdoor using zigbee technology. The gas
sensor, light sensor, smoke detector sensor, IR sensor, temperature & humidity sensor, fire sensor are interfaced with microcontroller to detect abnormal fire conditions in the environment in all possible ways.
Smart Home Management System Using Wireless Sensor Network (WSN)paperpublications3
Abstract: Nowadays, shortage of electricity is a very serious problem due to insufficient production. The wastage of electricity can be avoided by switching off the electrical appliances when not in use. This can be achieved by using Smart home system which automatically turns off loads when not in use, the system can save energy in homes and offices. The system will automatically switch off based on the presence of people at home. Another major issue is that there might be occurrence of theft when nobody is present at home. The theft can be avoided by using MEMS accelerometer which intimates the user through registered mobile number when there is an unexpected break of windows or door through the GSM modem. The system in addition also has a provision for the user to fix energy consumption reading and when the user consumption exceeds a fixed reading, a message would be sent to the users registered mobile number through the GSM modem. Applications for this system include workstations, open office cubicles, home offices, and home entertainment systems.
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSJournal For Research
This document discusses offline context aware computing for providing user-specific results on mobile devices. It defines context awareness and describes how offline context awareness can provide personalized results without internet by analyzing a user's local data, like call logs and app usage. The key aspects covered are:
1. It proposes an architecture for offline context aware applications consisting of four modules: an offline context engine, data collector, reminder database, and user interface.
2. It discusses challenges of offline context awareness like increased processing overhead, potential reduction in accuracy, and impact on battery life.
3. It provides examples of current mobile apps that use context awareness and discusses how offline context awareness can solve privacy and availability issues of internet-based approaches
This document discusses measuring complexity in component-based software systems through dependency analysis using the Unified Modeling Language (UML). It proposes modeling CBSs in UML using tools like ArgoUML to analyze dependencies and interactions between components. Metrics are defined to measure incoming/outgoing interaction densities and dependency levels for individual components. These metrics can help identify complex, critical, and isolated components. As an example, a simple CBS with 4 components and their dependencies is modeled in ArgoUML. Dependency metrics are calculated to show how they help predict component characteristics like criticality and change impact. The approach aims to facilitate complexity analysis and dependency issues in CBSs.
The document summarizes a study on the structural and morphological properties of thin Cd1-xSnxSe films deposited by thermal evaporation at different tin (Sn) concentrations (x=0.00, 0.25, 0.50, 0.75, 1.00) and annealing temperatures. X-ray diffraction analysis showed the films have a mix of cubic and hexagonal phases. Annealing increased grain size and peak intensity. Atomic force microscopy images showed the grains were spherical and uniformly distributed across the substrate, and annealing improved grain definition except for x=1. Increasing Sn concentration or annealing temperature generally increased grain size and crystallinity of the thin films based on XRD and AFM analysis.
This document summarizes research on using finite element analysis in time to model the nonlinear dynamic response of beams. It describes discretizing a beam into finite elements, with each node having two degrees of freedom for displacement and slope. Hermite shape functions are used to interpolate displacement within each element. The total potential energy of the system is derived and used to form the element stiffness matrix. The analysis shows this finite element approach can accurately model the bending behavior of beams under distributed loads.
This document summarizes research on plasma disruptions in tokamak machines. It discusses three key topics:
1) The impact of runaway electrons during plasma disruptions, finding that they can damage internal components and convert significant magnetic field energy into kinetic energy.
2) Methods for detecting instabilities like MARFEs in real-time using video systems and the relationship between MARFEs and gas puffing.
3) Measurements of the electron temperature evolution during current quenches using diagnostic systems, finding an initial m/n=1/1 erosion pattern and that runaway electrons are generated.
This document summarizes a research study on impulse buying behavior of college students for branded apparel in Ahmedabad, India. The study used a questionnaire to collect data from 119 college students through convenience sampling. Descriptive and inferential statistics were used to analyze the data. Exploratory factor analysis identified three factors underlying buying behavior: pattern of purchase, spot purchases, and buying habits. Hypothesis tests found no significant differences in impulse buying based on gender, education level, family structure, or age. There was also no difference based on family income for fashion involvement or pre-decision process. The only significant difference was for post-purchase perception based on family income.
Este documento describe el Centro Nacional de Educación Tecnológica (CeNET) en Argentina y la serie de publicaciones "Educación Tecnológica". El CeNET se enfoca en la investigación, experimentación y desarrollo de nuevas propuestas para la enseñanza del área tecnológica en las escuelas. La serie "Educación Tecnológica" provee marcos teóricos y curriculares para caracterizar el área tecnológica y sus contenidos, enfoques y estrategias didácticas. Este document
Este documento presenta información sobre el aprendizaje cooperativo y dos técnicas utilizadas en una actividad sobre animales vertebrados y su distribución en el mundo. Incluye un plan de equipo, roles de los estudiantes, pasos para aplicar las técnicas del rompecabezas y grupos de investigación, y métodos de evaluación.
El documento describe a los personajes principales de la película Piratas de Silicon Valley: Bill Gates, quien fundó Microsoft y desarrolló el sistema operativo Windows; Paul Allen, quien cofundó Microsoft y ayudó a adquirir el sistema operativo DOS; y Steve Jobs, quien cofundó Apple Computers junto con Steve Wozniak en un garaje.
Este documento resume las 4 P's del marketing propuestas por Philip Kotler y las 4 C's como tendencias modernas. Las 4 P's son Producto, Precio, Plaza y Promoción. Las 4 C's son Cliente, Costo, Comunicación y Comercialización. El documento argumenta que las empresas deben enfocarse tanto en las necesidades del cliente a través de las 4 C's como en el producto y su distribución a través de las 4 P's para lograr el éxito.
El documento describe los conceptos básicos de la informática. Explica que la informática estudia los métodos para almacenar, procesar y transmitir datos digitales, y que se ha desarrollado rápidamente desde la segunda mitad del siglo XX. También resume las principales partes de una computadora, incluyendo la unidad central de procesamiento, la memoria RAM, la memoria de sólo lectura, la placa base y periféricos como el teclado y el mouse.
Emergence Detection And Rescue Using Wireless Sensor NetworksIRJET Journal
This document describes a system that uses wireless sensor networks to help guide people to safety during emergencies. When an emergency occurs, sensors detect hazardous conditions and notify people in the area through their mobile devices. The system then provides navigation instructions to safely guide people out of the hazardous area while avoiding congestion. It considers alternative routes and ways to temporarily replace parts of routes. The proposed system aims to more efficiently evacuate an area during an emergency compared to existing systems that only focus on finding the safest individual path and do not account for potential congestion issues.
The document describes a smart sensory furniture system that aims to monitor elderly individuals living alone. The system integrates sensors and actuators into furniture to capture interactions between people and their environment. Sensors can be placed in different parts of furniture or across multiple pieces. A communication structure allows sensors to send data wirelessly. Middleware is developed to manage the furniture and provide monitoring, control and autonomous capabilities. The system monitors factors like temperature, heartbeat and respiration rates to detect any changes from normal daily activities that could indicate issues with well-being or emergencies. If abnormalities are detected, alert messages are sent to caregivers. The goal is to provide virtual supervision for elderly safety and well-being without needing full-time care.
Review on operating systems and routing protocols for wireless sensorIAEME Publication
This document provides an overview of operating systems and routing protocols for wireless sensor networks. It discusses several popular operating systems used in wireless sensor networks, including TinyOS, MANTIS, Contiki, RetOS, and MagnetOS. It describes the key features and limitations of each operating system. The document also reviews common routing protocols for wireless sensor networks, and discusses flooding and its variants as a basic routing technique.
UBIQUITOUS COMPUTING Its Paradigm, Systems & Middlewarevivatechijri
This paper offers a survey of ubiquitous computing research which is the developing a scope that
gears communication technologies into routine life accomplishments. This study paper affords a types of the
studies that extents at the ubiquitous computing exemplar. In this paper, we present collective structure principles
of ubiquitous systems and scrutinize important developments in context-conscious ubiquitous structures. In toting,
this studies work affords a novel structure of ubiquitous computing system and an evaluation of sensors needed
for applications in ubiquitous computing. The goal of this studies work are 3-fold: i) help as a parameter for
researchers who're first-hand to ubiquitous computing and want to subsidize to this research expanse, ii) provide
a unique machine architecture for ubiquitous computing system, and iii) offer auxiliary studies ways necessary
for exceptional-of-provider assertion of ubiquitous computing..
A survey on context aware system & intelligent Middleware’sIOSR Journals
Abstract: Context aware system or Sentient system is the most profound concept in the ubiquitous computing.
In the cloud system or in distributed computing building a context aware system is difficult task and
programmer should use more generic programming framework. On the basis of layered conceptual design, we
introduce Context aware systems with Context aware middleware’s. On the basis of presented system we will
analyze different approaches of context aware computing. There are many components in the distributed system
and these components should interact with each other because it is the need of many applications. Plenty
Context middleware’s have been made but they are giving partial solutions. In this paper we are giving analysis
of different middleware’s and comprehensive application of it in context caching.
Keywords: Context aware system, Context aware Middleware’s, Context Cache
International Journal of Engineering (IJE) Volume (2) Issue (1)CSCJournals
The document summarizes an intelligent GIS-based road accident analysis and real-time monitoring system that uses WiMAX/GPRS. It discusses the motivation and need for such a system to better analyze accidents and identify accident-prone locations. It then describes the system architecture, which utilizes telegeoinformatics to enable interoperability across different components. It also discusses strategies for adapting the system to different client devices. Finally, it outlines the use of terminal-centric and network-centric positioning methods like A-GPS and CGI-TA for location services and monitoring within an open, IP-based telecommunications network.
Security Attacks And Solutions On Ubiquitous Computing NetworksAhmad Sharifi
This document discusses security challenges in ubiquitous computing environments. It begins by defining ubiquitous computing as involving the integration of computing technology into everyday objects and environments. This allows information access from any device at any time, but also increases security risks. The document then outlines some common ubiquitous applications like smart homes. It identifies key security issues like lack of authentication, unauthorized access, and privacy concerns. Finally, it discusses challenges in ubiquitous security including how the expanded computing environment impacts traditional security methods and introduces new privacy and trust issues.
IRJET- Smart Home Automation using IoT and Deep LearningIRJET Journal
This document summarizes a research paper that proposes a smart home system using IoT and deep learning to recognize human activities through smartphone sensor data and then automate tasks based on the recognized activity. The system uses an LSTM neural network trained on accelerometer data to classify human activities like walking, running, and jogging. When an activity is recognized, the system triggers predetermined tasks through a Raspberry Pi in the smart home for automation. The paper reviews other research on activity recognition using deep learning and discusses challenges in developing accurate smart home systems to help older adults live independently through automated task assistance based on recognized daily living activities.
Analysis of programming aspects of wireless sensor networksiaemedu
This document discusses programming aspects of wireless sensor networks and non-uniformity issues. It analyzes programming efforts for developing test cases using wireless sensor network solutions versus traditional tools. It also explores system performance based on metrics like overhead, energy usage, and resource utilization. Key frameworks discussed include WiSeKit for adaptive applications, Remora for component-based programming, and extensions that enable distributed sensor services, dynamic reconfiguration, and integration with Internet systems.
This document summarizes a study on existing wireless sensor networks that can be used for structural health monitoring. It discusses three main wireless sensor network platforms: Sensor Andrew Architecture, a structural health monitoring system using smart sensors, and Snowfort, a new wireless sensor network platform designed for infrastructure monitoring. The document outlines the key components, advantages, and limitations of each wireless sensor network platform for structural health monitoring applications.
Towards building a message retrieval facility via telephoneeSAT Journals
Abstract Email is one of the most popular services offered in the internet age. Therefore, providing service for all is a crucial competitive asset for any country. The objective of our research is to integrate technological innovation into a hybrid system, in order to build a more accessible system for weaker sections of society. This paper presents ‘Telemail’ system that enables a person to listen to the emails in her/his POP3 email account on a telephone thus replacing the conventional way of reading mails on the Internet. This software will serve the needs of people who don’t have access to internet, are computer illiterate or blind. Keywords—Telemail, Accessibility, Telephone, Deprived Users, ICT in rural India, voice based interfaces, Tool Prototype
The three papers discuss cloud-IoT architectures for remote health monitoring. Paper 1 proposes a platform using cloud computing to manage mobile and wearable healthcare sensors. Paper 2 builds an integrated sensor system connecting various sensors to the cloud for data collection and processing. Paper 3 proposes a sensing service scenario to improve sensor data accessibility and usage for health monitoring through interaction between medical staff and sensing service providers.
This document discusses a research paper on home automation systems using the Internet of Things (IoT). It begins with an introduction to IoT, defining it as a network of everyday objects that can share information and complete tasks. It then discusses how IoT is enabling home automation through technologies like smart lights, door sensors, and webcams. The paper also outlines the key components of an IoT system, including hardware, middleware, and interfaces. It describes several enabling technologies used in IoT, such as RFID, wireless sensor networks, and addressing schemes. Finally, it discusses reference architectures for IoT from standards bodies like ITU and WSO2.
This document proposes incorporating a control system into an existing ubiquitous computing environment (SEDINU system) to allow for manipulation of physical objects. It describes modifying the SEDINU system's database (RBACSoft) to include a control system entity with attributes linking it to autonomous areas and physical objects. A communication protocol is proposed using the USB 2.0 standard for the host services and control system to interact. The control system would allow changing the states of physical objects from mobile devices based on requests from the host services. Future work could include handling multiple concurrent mobile access and migrating to USB 3.0.
11.[106 118]design and implementation of a short message service based remote...Alexander Decker
The document describes the design and implementation of a Short Message Service (SMS) based remote controller. The system allows users to control home appliances remotely via SMS messages sent from a mobile phone.
The hardware components include a GSM modem to receive SMS messages, a microcontroller to decode messages and control appliances, an LCD display to show status updates, and relay modules to interface with home appliances. The software uses AT commands to communicate between the GSM modem and microcontroller. The microcontroller is programmed with flow code to control the system based on received SMS commands.
Testing showed the SMS remote controller could successfully receive messages, control connected appliances, and send status updates back to the user's phone. The low-cost system
Environmental Monitoring using Wireless Sensor Networks (WSN) based on IOT.IRJET Journal
This document describes a wireless sensor network system for environmental monitoring using Internet of Things (IoT) technology. Key points:
- Sensor nodes collect data from sensors and send it wirelessly to a Raspberry Pi base station using a Zigbee protocol. The base station sends the data to a cloud server.
- The system monitors parameters like temperature, humidity, CO2, and vibration. Real-time sensor data is fetched by a web server and displayed to users via the Internet.
- The Raspberry Pi acts as the base station, connecting to multiple sensor nodes. It contains a database and web server to store and display the sensor data remotely.
- Common sensor nodes used include MQ2 and
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Sign Language Detection for Deaf and Dumb Using Flex SensorsIRJET Journal
This document describes a sign language detection system for deaf and mute people using flex sensors. The system uses flex sensors attached to a glove to detect finger bending patterns representing different letters or words. The flex sensor data is fed to a microcontroller which converts it to digital signals. The signals are sent to a server which matches the patterns to letters/words stored in a database. If a match is found, the corresponding text or speech is output. The system allows deaf and mute people to communicate through electronic detection and translation of their sign language gestures. The goal is to provide an improved communication medium for those unable to communicate through spoken language.
SURVEY OF HEALTHCARE MANAGEMENT USING WIRELESS SENSOR NETWORKS (WSNS)AM Publications
This document discusses using wireless sensor networks (WSNs) for healthcare management. It proposes a smart gateway system that can bridge WSNs with public communication networks. The gateway is designed to perform some tasks like processing sensor data, determining patient health states, and sending emergency notifications to reduce the load on remote servers and networks. It integrates WSN, Wi-Fi, and GSM modules to communicate with sensor networks and send information to caregivers. The system aims to make healthcare management more proactive and cost-effective by enabling real-time patient monitoring using body-worn sensors and a gateway-based wireless network architecture.
IRJET- Human Activity Recognition using Flex SensorsIRJET Journal
This document discusses a system for human activity recognition using flex sensors. Flex sensors are attached to the body and can detect movements. The flex sensor data is fed into a neural network model to recognize activities. The model is trained using flex sensor data from various human activities. The trained model can then accurately recognize activities based on new flex sensor input data. The system is meant to help elderly people or those with disabilities by allowing them to control devices with body movements detected by flex sensors. It aims to provide a modular system that can adapt to new users and disabilities. Flex sensors make the system customizable while neural networks enable accurate activity recognition.
Submission Deadline: 30th September 2022
Acceptance Notification: Within Three Days’ time period
Online Publication: Within 24 Hrs. time Period
Expected Date of Dispatch of Printed Journal: 5th October 2022
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
White layer thickness (WLT) formed and surface roughness in wire electric discharge turning (WEDT) of tungsten carbide composite has been made to model through response surface methodology (RSM). A Taguchi’s standard Design of experiments involving five input variables with three levels has been employed to establish a mathematical model between input parameters and responses. Percentage of cobalt content, spindle speed, Pulse on-time, wire feed and pulse off-time were changed during the experimental tests based on the Taguchi’s orthogonal array L27 (3^13). Analysis of variance (ANOVA) revealed that the mathematical models obtained can adequately describe performance within the parameters of the factors considered. There was a good agreement between the experimental and predicted values in this study.
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
The study explores the reasons for a transgender to become entrepreneurs. In this study transgender entrepreneur was taken as independent variable and reasons to become as dependent variable. Data were collected through a structured questionnaire containing a five point Likert Scale. The study examined the data of 30 transgender entrepreneurs in Salem Municipal Corporation of Tamil Nadu State, India. Simple Random sampling technique was used. Garrett Ranking Technique (Percentile Position, Mean Scores) was used as the analysis for the present study to identify the top 13 stimulus factors for establishment of trans entrepreneurial venture. Economic advancement of a nation is governed upon the upshot of a resolute entrepreneurial doings. The conception of entrepreneurship has stretched and materialized to the socially deflated uncharted sections of transgender community. Presently transgenders have smashed their stereotypes and are making recent headlines of achievements in various fields of our Indian society. The trans-community is gradually being observed in a new light and has been trying to achieve prospective growth in entrepreneurship. The findings of the research revealed that the optimistic changes are taking place to change affirmative societal outlook of the transgender for entrepreneurial ventureship. It also laid emphasis on other transgenders to renovate their traditional living. The paper also highlights that legislators, supervisory body should endorse an impartial canons and reforms in Tamil Nadu Transgender Welfare Board Association.
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
Since ages gender difference is always a debatable theme whether caused by nature, evolution or environment. The birth of a transgender is dreadful not only for the child but also for their parents. The pain of living in the wrong physique and treated as second class victimized citizen is outrageous and fully harboured with vicious baseless negative scruples. For so long, social exclusion had perpetuated inequality and deprivation experiencing ingrained malign stigma and besieged victims of crime or violence across their life spans. They are pushed into the murky way of life with a source of eternal disgust, bereft sexual potency and perennial fear. Although they are highly visible but very little is known about them. The common public needs to comprehend the ravaged arrogance on these insensitive souls and assist in integrating them into the mainstream by offering equal opportunity, treat with humanity and respect their dignity. Entrepreneurship in the current age is endorsing the gender fairness movement. Unstable careers and economic inadequacy had inclined one of the gender variant people called Transgender to become entrepreneurs. These tiny budding entrepreneurs resulted in economic transition by means of employment, free from the clutches of stereotype jobs, raised standard of living and handful of financial empowerment. Besides all these inhibitions, they were able to witness a platform for skill set development that ignited them to enter into entrepreneurial domain. This paper epitomizes skill sets involved in trans-entrepreneurs of Thoothukudi Municipal Corporation of Tamil Nadu State and is a groundbreaking determination to sightsee various skills incorporated and the impact on entrepreneurship.
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
The banking and financial services industries are experiencing increased technology penetration. Among them, the banking industry has made technological advancements to better serve the general populace. The economy focused on transforming the banking sector's system into a cashless, paperless, and faceless one. The researcher wants to evaluate the user's intention for utilising a mobile banking application. The study also examines the variables affecting the user's behaviour intention when selecting specific applications for financial transactions. The researcher employed a well-structured questionnaire and a descriptive study methodology to gather the respondents' primary data utilising the snowball sampling technique. The study includes variables like performance expectations, effort expectations, social impact, enabling circumstances, and perceived risk. Each of the aforementioned variables has a major impact on how users utilise mobile banking applications. The outcome will assist the service provider in comprehending the user's history with mobile banking applications.
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
Technology upgradation in banking sector took the economy to view that payment mode towards online transactions using mobile applications. This system enabled connectivity between banks, Merchant and user in a convenient mode. there are various applications used for online transactions such as Google pay, Paytm, freecharge, mobikiwi, oxygen, phonepe and so on and it also includes mobile banking applications. The study aimed at evaluating the predilection of the user in adopting digital transaction. The study is descriptive in nature. The researcher used random sample techniques to collect the data. The findings reveal that mobile applications differ with the quality of service rendered by Gpay and Phonepe. The researcher suggest the Phonepe application should focus on implementing the application should be user friendly interface and Gpay on motivating the users to feel the importance of request for money and modes of payments in the application.
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
The prototype of a voice-based ATM for visually impaired using Arduino is to help people who are blind. This uses RFID cards which contain users fingerprint encrypted on it and interacts with the users through voice commands. ATM operates when sensor detects the presence of one person in the cabin. After scanning the RFID card, it will ask to select the mode like –normal or blind. User can select the respective mode through voice input, if blind mode is selected the balance check or cash withdraw can be done through voice input. Normal mode procedure is same as the existing ATM.
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
There is increasing acceptability of emotional intelligence as a major factor in personality assessment and effective human resource management. Emotional intelligence as the ability to build capacity, empathize, co-operate, motivate and develop others cannot be divorced from both effective performance and human resource management systems. The human person is crucial in defining organizational leadership and fortunes in terms of challenges and opportunities and walking across both multinational and bilateral relationships. The growing complexity of the business world requires a great deal of self-confidence, integrity, communication, conflict and diversity management to keep the global enterprise within the paths of productivity and sustainability. Using the exploratory research design and 255 participants the result of this original study indicates strong positive correlation between emotional intelligence and effective human resource management. The paper offers suggestions on further studies between emotional intelligence and human capital development and recommends for conflict management as an integral part of effective human resource management.
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
Our life journey, in general, is closely defined by the way we understand the meaning of why we coexist and deal with its challenges. As we develop the "inspiration economy", we could say that nearly all of the challenges we have faced are opportunities that help us to discover the rest of our journey. In this note paper, we explore how being faced with the opportunity of being a close carer for an aging parent with dementia brought intangible discoveries that changed our insight of the meaning of the rest of our life journey.
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
The main objective of this study is to analyze the impact of aspects of Organizational Culture on the Effectiveness of the Performance Management System (PMS) in the Health Care Organization at Thanjavur. Organizational Culture and PMS play a crucial role in present-day organizations in achieving their objectives. PMS needs employees’ cooperation to achieve its intended objectives. Employees' cooperation depends upon the organization’s culture. The present study uses exploratory research to examine the relationship between the Organization's culture and the Effectiveness of the Performance Management System. The study uses a Structured Questionnaire to collect the primary data. For this study, Thirty-six non-clinical employees were selected from twelve randomly selected Health Care organizations at Thanjavur. Thirty-two fully completed questionnaires were received.
Living in 21st century in itself reminds all of us the necessity of police and its administration. As more and more we are entering into the modern society and culture, the more we require the services of the so called ‘Khaki Worthy’ men i.e., the police personnel. Whether we talk of Indian police or the other nation’s police, they all have the same recognition as they have in India. But as already mentioned, their services and requirements are different after the like 26th November, 2008 incidents, where they without saving their own lives has sacrificed themselves without any hitch and without caring about their respective family members and wards. In other words, they are like our heroes and mentors who can guide us from the darkness of fear, militancy, corruption and other dark sides of life and so on. Now the question arises, if Gandhi would have been alive today, what would have been his reaction/opinion to the police and its functioning? Would he have some thing different in his mind now what he had been in his mind before the partition or would he be going to start some Satyagraha in the form of some improvement in the functioning of the police administration? Really these questions or rather night mares can come to any one’s mind, when there is too much confusion is prevailing in our minds, when there is too much corruption in the society and when the polices working is also in the questioning because of one or the other case throughout the India. It is matter of great concern that we have to thing over our administration and our practical approach because the police personals are also like us, they are part and parcel of our society and among one of us, so why we all are pin pointing towards them.
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
The goal of this study was to see how talent management affected employee retention in the selected IT organizations in Chennai. The fundamental issue was the difficulty to attract, hire, and retain talented personnel who perform well and the gap between supply and demand of talent acquisition and retaining them within the firms. The study's main goals were to determine the impact of talent management on employee retention in IT companies in Chennai, investigate talent management strategies that IT companies could use to improve talent acquisition, performance management, career planning and formulate retention strategies that the IT firms could use. The respondents were given a structured close-ended questionnaire with the 5 Point Likert Scale as part of the study's quantitative research design. The target population consisted of 289 IT professionals. The questionnaires were distributed and collected by the researcher directly. The Statistical Package for Social Sciences (SPSS) was used to collect and analyse the questionnaire responses. Hypotheses that were formulated for the various areas of the study were tested using a variety of statistical tests. The key findings of the study suggested that talent management had an impact on employee retention. The studies also found that there is a clear link between the implementation of talent management and retention measures. Management should provide enough training and development for employees, clarify job responsibilities, provide adequate remuneration packages, and recognise employees for exceptional performance.
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
Globally, Millions of dollars were spent by the organizations for employing skilled Information Technology (IT) professionals. It is costly to replace unskilled employees with IT professionals possessing technical skills and competencies that aid in interconnecting the business processes. The organization’s employment tactics were forced to alter by globalization along with technological innovations as they consistently diminish to remain lean, outsource to concentrate on core competencies along with restructuring/reallocate personnel to gather efficiency. As other jobs, organizations or professions have become reasonably more appropriate in a shifting employment landscape, the above alterations trigger both involuntary as well as voluntary turnover. The employee view on jobs is also afflicted by the COVID-19 pandemic along with the employee-driven labour market. So, having effective strategies is necessary to tackle the withdrawal rate of employees. By associating Emotional Intelligence (EI) along with Talent Management (TM) in the IT industry, the rise in attrition rate was analyzed in this study. Only 303 respondents were collected out of 350 participants to whom questionnaires were distributed. From the employees of IT organizations located in Bangalore (India), the data were congregated. A simple random sampling methodology was employed to congregate data as of the respondents. Generating the hypothesis along with testing is eventuated. The effect of EI and TM along with regression analysis between TM and EI was analyzed. The outcomes indicated that employee and Organizational Performance (OP) were elevated by effective EI along with TM.
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
By implementing talent management strategy, organizations would have the option to retain their skilled professionals while additionally working on their overall performance. It is the course of appropriately utilizing the ideal individuals, setting them up for future top positions, exploring and dealing with their performance, and holding them back from leaving the organization. It is employee performance that determines the success of every organization. The firm quickly obtains an upper hand over its rivals in the event that its employees having particular skills that cannot be duplicated by the competitors. Thus, firms are centred on creating successful talent management practices and processes to deal with the unique human resources. Firms are additionally endeavouring to keep their top/key staff since on the off chance that they leave; the whole store of information leaves the firm's hands. The study's objective was to determine the impact of talent management on organizational performance among the selected IT organizations in Chennai. The study recommends that talent management limitedly affects performance. On the off chance that this talent is appropriately management and implemented properly, organizations might benefit as much as possible from their maintained assets to support development and productivity, both monetarily and non-monetarily.
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
Banking regulations act of India, 1949 defines banking as “acceptance of deposits for the purpose of lending or investment from the public, repayment on demand or otherwise and withdrawable through cheques, drafts order or otherwise”, the major participants of the Indian financial system are commercial banks, the financial institution encompassing term lending institutions. Investments institutions, specialized financial institution and the state level development banks, non banking financial companies (NBFC) and other market intermediaries such has the stock brokers and money lenders are among the oldest of the certain variants of NBFC and the oldest market participants. The asset quality of banks is one of the most important indicators of their financial health. The Indian banking sector has been facing severe problems of increasing Non- Performing Assets (NPAs). The NPAs growth directly and indirectly affects the quality of assets and profitability of banks. It also shows the efficiency of banks credit risk management and the recovery effectiveness. NPA do not generate any income, whereas, the bank is required to make provisions for such as assets that why is a double edge weapon. This paper outlines the concept of quality of bank loans of different types like Housing, Agriculture and MSME loans in state Haryana of selected public and private sector banks. This study is highlighting problems associated with the role of commercial bank in financing Small and Medium Scale Enterprises (SME). The overall objective of the research was to assess the effect of the financing provisions existing for the setting up and operations of MSMEs in the country and to generate recommendations for more robust financing mechanisms for successful operation of the MSMEs, in turn understanding the impact of MSME loans on financial institutions due to NPA. There are many research conducted on the topic of Non- Performing Assets (NPA) Management, concerning particular bank, comparative study of public and private banks etc. In this paper the researcher is considering the aggregate data of selected public sector and private sector banks and attempts to compare the NPA of Housing, Agriculture and MSME loans in state Haryana of public and private sector banks. The tools used in the study are average and Anova test and variance. The findings reveal that NPA is common problem for both public and private sector banks and is associated with all types of loans either that is housing loans, agriculture loans and loans to SMES. NPAs of both public and private sector banks show the increasing trend. In 2010-11 GNPA of public and private sector were at same level it was 2% but after 2010-11 it increased in many fold and at present there is GNPA in some more than 15%. It shows the dark area of Indian banking sector.
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
An experiment conducted in this study found that BaSO4 changed Nylon 6's mechanical properties. By changing the weight ratios, BaSO4 was used to make Nylon 6. This Researcher looked into how hard Nylon-6/BaSO4 composites are and how well they wear. Experiments were done based on Taguchi design L9. Nylon-6/BaSO4 composites can be tested for their hardness number using a Rockwell hardness testing apparatus. On Nylon/BaSO4, the wear behavior was measured by a wear monitor, pinon-disc friction by varying reinforcement, sliding speed, and sliding distance, and the microstructure of the crack surfaces was observed by SEM. This study provides significant contributions to ultimate strength by increasing BaSO4 content up to 16% in the composites, and sliding speed contributes 72.45% to the wear rate
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
The majority of the population in India lives in villages. The village is the back bone of the country. Village or rural industries play an important role in the national economy, particularly in the rural development. Developing the rural economy is one of the key indicators towards a country’s success. Whether it be the need to look after the welfare of the farmers or invest in rural infrastructure, Governments have to ensure that rural development isn’t compromised. The economic development of our country largely depends on the progress of rural areas and the standard of living of rural masses. Village or rural industries play an important role in the national economy, particularly in the rural development. Rural entrepreneurship is based on stimulating local entrepreneurial talent and the subsequent growth of indigenous enterprises. It recognizes opportunity in the rural areas and accelerates a unique blend of resources either inside or outside of agriculture. Rural entrepreneurship brings an economic value to the rural sector by creating new methods of production, new markets, new products and generate employment opportunities thereby ensuring continuous rural development. Social Entrepreneurship has the direct and primary objective of serving the society along with the earning profits. So, social entrepreneurship is different from the economic entrepreneurship as its basic objective is not to earn profits but for providing innovative solutions to meet the society needs which are not taken care by majority of the entrepreneurs as they are in the business for profit making as a sole objective. So, the Social Entrepreneurs have the huge growth potential particularly in the developing countries like India where we have huge societal disparities in terms of the financial positions of the population. Still 22 percent of the Indian population is below the poverty line and also there is disparity among the rural & urban population in terms of families living under BPL. 25.7 percent of the rural population & 13.7 percent of the urban population is under BPL which clearly shows the disparity of the poor people in the rural and urban areas. The need to develop social entrepreneurship in agriculture is dictated by a large number of social problems. Such problems include low living standards, unemployment, and social tension. The reasons that led to the emergence of the practice of social entrepreneurship are the above factors. The research problem lays upon disclosing the importance of role of social entrepreneurship in rural development of India. The paper the tendencies of social entrepreneurship in India, to present successful examples of such business for providing recommendations how to improve situation in rural areas in terms of social entrepreneurship development. Indian government has made some steps towards development of social enterprises, social entrepreneurship, and social in- novation, but a lot remains to be improved.
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
Distribution system is a critical link between the electric power distributor and the consumers. Most of the distribution networks commonly used by the electric utility is the radial distribution network. However in this type of network, it has technical issues such as enormous power losses which affect the quality of the supply. Nowadays, the introduction of Distributed Generation (DG) units in the system help improve and support the voltage profile of the network as well as the performance of the system components through power loss mitigation. In this study network reconfiguration was done using two meta-heuristic algorithms Particle Swarm Optimization and Gravitational Search Algorithm (PSO-GSA) to enhance power quality and voltage profile in the system when simultaneously applied with the DG units. Backward/Forward Sweep Method was used in the load flow analysis and simulated using the MATLAB program. Five cases were considered in the Reconfiguration based on the contribution of DG units. The proposed method was tested using IEEE 33 bus system. Based on the results, there was a voltage profile improvement in the system from 0.9038 p.u. to 0.9594 p.u.. The integration of DG in the network also reduced power losses from 210.98 kW to 69.3963 kW. Simulated results are drawn to show the performance of each case.
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
Manufacturing industries have witnessed an outburst in productivity. For productivity improvement manufacturing industries are taking various initiatives by using lean tools and techniques. However, in different manufacturing industries, frugal approach is applied in product design and services as a tool for improvement. Frugal approach contributed to prove less is more and seems indirectly contributing to improve productivity. Hence, there is need to understand status of frugal approach application in manufacturing industries. All manufacturing industries are trying hard and putting continuous efforts for competitive existence. For productivity improvements, manufacturing industries are coming up with different effective and efficient solutions in manufacturing processes and operations. To overcome current challenges, manufacturing industries have started using frugal approach in product design and services. For this study, methodology adopted with both primary and secondary sources of data. For primary source interview and observation technique is used and for secondary source review has done based on available literatures in website, printed magazines, manual etc. An attempt has made for understanding application of frugal approach with the study of manufacturing industry project. Manufacturing industry selected for this project study is Mahindra and Mahindra Ltd. This paper will help researcher to find the connections between the two concepts productivity improvement and frugal approach. This paper will help to understand significance of frugal approach for productivity improvement in manufacturing industry. This will also help to understand current scenario of frugal approach in manufacturing industry. In manufacturing industries various process are involved to deliver the final product. In the process of converting input in to output through manufacturing process productivity plays very critical role. Hence this study will help to evolve status of frugal approach in productivity improvement programme. The notion of frugal can be viewed as an approach towards productivity improvement in manufacturing industries.
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
In this paper, we investigated a queuing model of fuzzy environment-based a multiple channel queuing model (M/M/C) ( /FCFS) and study its performance under realistic conditions. It applies a nonagonal fuzzy number to analyse the relevant performance of a multiple channel queuing model (M/M/C) ( /FCFS). Based on the sub interval average ranking method for nonagonal fuzzy number, we convert fuzzy number to crisp one. Numerical results reveal that the efficiency of this method. Intuitively, the fuzzy environment adapts well to a multiple channel queuing models (M/M/C) ( /FCFS) are very well.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.