The mobile device is one of the fasted growing technologies that is widely used in a diversifying sector.
Mobile devices are used for everyday life, such as personal information exchange – chatting, email,
shopping, and mobile banking, contributing to information security threats. Users' behavior can influence
information security threats. More research is needed to understand users' threat avoidance behavior and
motivation. Using Technology threat avoidance theory (TTAT), this study assessed factors that influenced
mobile device users' threat avoidance motivations and behaviors as it relates to phishing attacks.
oT applications usually rely on cloud computing services to perform data analysis such as filtering,
aggregation, classification, pattern detection, and prediction. When applied to specific domains, the IoT
needs to deal with unique constraints. Besides the hostile environment such as vibration and electric-
magnetic interference, resulting in malfunction, noise, and data loss, industrial plants often have Internet
access restricted or unavailable, forcing us to design stand-alone fog and edge computing solutions.
There are essential security considerations in the systems used by semiconductor companies like TI. Along
with other semiconductor companies, TI has recognized that IT security is highly crucial during web
application developers' system development life cycle (SDLC). The challenges faced by TI web developers
were consolidated via questionnaires starting with how risk management and secure coding can be
reinforced in SDLC; and how to achieve IT Security, PM and SDLC initiatives by developing a prototype
which was evaluated considering the aforementioned goals. This study aimed to practice NIST strategies
by integrating risk management checkpoints in the SDLC; enforce secure coding using static code analysis
tool by developing a prototype application mapped with IT Security goals, project management and SDLC
initiatives and evaluation of the impact of the proposed solution. This paper discussed how SecureTI was
able to satisfy IT Security requirements in the SDLC and PM phases.
VPN usage across the world has increased due to the COVID-19 pandemic. With companies trying to lay
the course through this unfamiliar state, corporations had to implement a Business Continuity Plan which
included several elements to maintain a scalable and robust VPN connection. During this time of
uncertainty, best practices need to be deployed by corporations and government entities more than ever.
The purpose of this study is to highlight the necessary path SD Telecom would take to ensure a secure,
reliable network during global traffic surge. Specific VPN solutions, access needs, and eligibility
requirements vary based on the end user.
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGEijcsit
This paper proposes an encryption-based image watermarking scheme for medical images using a customized quantization of wavelet coefficient and a crypto system based on the chaotic cipher of Singular Value Decomposition (SVD). In order to spread the robustness of our algorithm and provide extra security, an improved SVD-CHAOS embedding and extraction procedure has been used to scramble the watermark logo in the preprocessing step of the proposed method. In the process of watermark embedding, an R-level discrete wavelet transform was applied to the host image. The high frequency wavelet coefficients are selected to carry these scrambled-watermarks by using adaptive quantization low bit modulation (LBM). The proposed image watermarking method endures entirety attacks and rightly extracts the hidden watermark without significant degradation in the image quality, Thus, when the Peak Signal to Noise Ratio (PSNR) and Normalized Correlation (NC) performance of the proposed algorithm is compared with other related techniques.
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)ijasuc
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) is a bi monthly open access peer-reviewed journal provides excellent international forum for sharing knowledge and results in theory, methodology and applications of Ad Hoc & Ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ad hoc, Sensor & Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life.
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEYijcsit
Protection has become one of the biggest fields of study for several years, however the demand for this is growing exponentially mostly with rise in sensitive data. The quality of the research can differ slightly from any workstation to cloud, and though protection must be incredibly important all over. Throughout the past two decades, sufficient focus has been given to substantiation along with validation in the technology model. Identifying a legal person is increasingly become the difficult activity with the progression of time. Some attempts are introduced in that same respect, in particular by utilizing human movements such as fingerprints, facial recognition, palm scanning, retinal identification, DNA checking, breathing, speech checker, and so on. A number of methods for effective iris detection have indeed been suggested and researched. A general overview of current and state-of-the-art approaches to iris recognition is presented in this paper. In addition, significant advances in techniques, algorithms, qualified classifiers, datasets and methodologies for the extraction of features are also discussed.
Survey on Digital Video Watermarking Techniques, Attacks and ApplicationsYogeshIJTSRD
Digital watermarking is a method of identifying the rightful owner of digital data by embedding a known message in the data. These methods can be applied to a wide range of digital material, including still images, videos, and music. To safeguard the copyright of digital media, digital watermarking techniques have been created. This study seeks to provide a comprehensive overview and background on the definition, idea, and major accomplishments in the subject of watermarking. It starts with a broad review of digital watermarking, then moves on to assaults, applications, and eventually a detailed examination of existing and new watermarking systems. We classify the techniques according various categories such as host signal, perceptivity, and robustness, and watermark type, necessary data for extraction, processing domain, and applications. Preeti Sondhi | Soufia Gull "Survey on Digital Video Watermarking Techniques, Attacks and Applications" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd43776.pdf Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/43776/survey-on-digital-video-watermarking-techniques-attacks-and-applications/preeti-sondhi
The mobile device is one of the fasted growing technologies that is widely used in a diversifying sector.
Mobile devices are used for everyday life, such as personal information exchange – chatting, email,
shopping, and mobile banking, contributing to information security threats. Users' behavior can influence
information security threats. More research is needed to understand users' threat avoidance behavior and
motivation. Using Technology threat avoidance theory (TTAT), this study assessed factors that influenced
mobile device users' threat avoidance motivations and behaviors as it relates to phishing attacks.
oT applications usually rely on cloud computing services to perform data analysis such as filtering,
aggregation, classification, pattern detection, and prediction. When applied to specific domains, the IoT
needs to deal with unique constraints. Besides the hostile environment such as vibration and electric-
magnetic interference, resulting in malfunction, noise, and data loss, industrial plants often have Internet
access restricted or unavailable, forcing us to design stand-alone fog and edge computing solutions.
There are essential security considerations in the systems used by semiconductor companies like TI. Along
with other semiconductor companies, TI has recognized that IT security is highly crucial during web
application developers' system development life cycle (SDLC). The challenges faced by TI web developers
were consolidated via questionnaires starting with how risk management and secure coding can be
reinforced in SDLC; and how to achieve IT Security, PM and SDLC initiatives by developing a prototype
which was evaluated considering the aforementioned goals. This study aimed to practice NIST strategies
by integrating risk management checkpoints in the SDLC; enforce secure coding using static code analysis
tool by developing a prototype application mapped with IT Security goals, project management and SDLC
initiatives and evaluation of the impact of the proposed solution. This paper discussed how SecureTI was
able to satisfy IT Security requirements in the SDLC and PM phases.
VPN usage across the world has increased due to the COVID-19 pandemic. With companies trying to lay
the course through this unfamiliar state, corporations had to implement a Business Continuity Plan which
included several elements to maintain a scalable and robust VPN connection. During this time of
uncertainty, best practices need to be deployed by corporations and government entities more than ever.
The purpose of this study is to highlight the necessary path SD Telecom would take to ensure a secure,
reliable network during global traffic surge. Specific VPN solutions, access needs, and eligibility
requirements vary based on the end user.
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGEijcsit
This paper proposes an encryption-based image watermarking scheme for medical images using a customized quantization of wavelet coefficient and a crypto system based on the chaotic cipher of Singular Value Decomposition (SVD). In order to spread the robustness of our algorithm and provide extra security, an improved SVD-CHAOS embedding and extraction procedure has been used to scramble the watermark logo in the preprocessing step of the proposed method. In the process of watermark embedding, an R-level discrete wavelet transform was applied to the host image. The high frequency wavelet coefficients are selected to carry these scrambled-watermarks by using adaptive quantization low bit modulation (LBM). The proposed image watermarking method endures entirety attacks and rightly extracts the hidden watermark without significant degradation in the image quality, Thus, when the Peak Signal to Noise Ratio (PSNR) and Normalized Correlation (NC) performance of the proposed algorithm is compared with other related techniques.
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)ijasuc
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) is a bi monthly open access peer-reviewed journal provides excellent international forum for sharing knowledge and results in theory, methodology and applications of Ad Hoc & Ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ad hoc, Sensor & Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life.
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEYijcsit
Protection has become one of the biggest fields of study for several years, however the demand for this is growing exponentially mostly with rise in sensitive data. The quality of the research can differ slightly from any workstation to cloud, and though protection must be incredibly important all over. Throughout the past two decades, sufficient focus has been given to substantiation along with validation in the technology model. Identifying a legal person is increasingly become the difficult activity with the progression of time. Some attempts are introduced in that same respect, in particular by utilizing human movements such as fingerprints, facial recognition, palm scanning, retinal identification, DNA checking, breathing, speech checker, and so on. A number of methods for effective iris detection have indeed been suggested and researched. A general overview of current and state-of-the-art approaches to iris recognition is presented in this paper. In addition, significant advances in techniques, algorithms, qualified classifiers, datasets and methodologies for the extraction of features are also discussed.
Survey on Digital Video Watermarking Techniques, Attacks and ApplicationsYogeshIJTSRD
Digital watermarking is a method of identifying the rightful owner of digital data by embedding a known message in the data. These methods can be applied to a wide range of digital material, including still images, videos, and music. To safeguard the copyright of digital media, digital watermarking techniques have been created. This study seeks to provide a comprehensive overview and background on the definition, idea, and major accomplishments in the subject of watermarking. It starts with a broad review of digital watermarking, then moves on to assaults, applications, and eventually a detailed examination of existing and new watermarking systems. We classify the techniques according various categories such as host signal, perceptivity, and robustness, and watermark type, necessary data for extraction, processing domain, and applications. Preeti Sondhi | Soufia Gull "Survey on Digital Video Watermarking Techniques, Attacks and Applications" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd43776.pdf Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/43776/survey-on-digital-video-watermarking-techniques-attacks-and-applications/preeti-sondhi
A Smart Receptionist Implementing Facial Recognition and Voice InteractionCSCJournals
The purpose of this research is to implement a smart receptionist system with facial recognition and voice interaction using deep learning. The facial recognition component is implemented using real time image processing techniques, and it can be used to learn new faces as well as detect and recognize existing faces. The first time a customer uses this system, it will take the person’s facial data to create a unique user facial model, and this model will be triggered if the person comes the second time. The recognition is done in real time and after which voice interaction will be applied. Voice interaction is used to provide a life-like human communication and improve user experience. Our proposed smart receptionist system could be integrated into the self check-in kiosks deployed in hospitals or smart buildings to streamline the user recognition process and provide customized user interactions. This system could also be used in smart home environment where smart cameras have been deployed and voice assistants are in place.
A GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTSIJNSA Journal
Recently secure device pairing has had significant attention from a wide community of academic as well as industrial researchers and a plethora of schemes and protocols have been proposed, which use various forms of out-of-band exchange to form an association between two unassociated devices. These protocols and schemes have different strengths and weaknesses – often in hardware requirements, strength against various attacks or usability in particular scenarios. From ordinary user’s point of view, the problem then becomes which to choose or which is the best possible scheme in a particular scenario. We advocate that in a world of modern heterogeneous devices and requirements, there is a need for mechanisms that allow automated selection of the best protocols without requiring the user to have an in-depth knowledge of the minutiae of the underlying technologies. Towards this, the main argument forming the basis of this research work is that the integration of a discovery mechanism and several pairing schemes into a single system is more efficient from a usability point of view as well as security point of view in terms of dynamic choice of pairing schemes. In pursuit of this, we have proposed a generic system for secure device pairing by demonstration of physical proximity. The contributions presented in this paper include the design and prototype implementation of the proposed framework along with a novel Co-Location protocol.
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...Damir Delija
One of draft versios of "Concepts and Methodology in Mobile Devices Digital Forensics Education and Training",
Abstract - This paper presents various issues in digital forensics of mobile devices and how to address these issues in the related education and training process. Mobile devices forensics is a new, very fast developing field which lacks standardization, compatibility, tools, methods and skills. All this drawbacks have impact on the results of forensic process and also have deep influence in training and education process. In this paper real life experience in training is presented, with tools, devices, procedures and organization with purpose to improve process of mobile devices forensics and mobile forensic training and education
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...YogeshIJTSRD
Cloud Analytics is another area in the IT field where different services like Software, Infrastructure, storage etc. are offered as services online. Users of cloud services are under constant fear of data loss, security threats, and availability issues. However, the major challenge in these methods is obtaining real time and unbiased datasets. Many datasets are internal and cannot be shared due to privacy issues or may lack certain statistical characteristics. As a result of this, researchers prefer to generate datasets for training and testing purposes in simulated or closed experimental environments which may lack comprehensiveness. Advances in sensor technology, the Internet of things IoT , social networking, wireless communications, and huge collection of data from years have all contributed to a new field of study Big Data is discussed in this paper. Through this analysis and investigation, we provide recommendations for the research public on future directions on providing data based decisions for cloud supported Big Data computing and analytic solutions. This paper concentrates upon the recent trends in Big Data storage and analysing, in the clouds, and also points out the security limitations. Rajan Ramvilas Saroj "Cloud Analytics: Ability to Design, Build, Secure, and Maintain Analytics Solutions on the Cloud" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd43728.pdf Paper URL: https://www.ijtsrd.com/other-scientific-research-area/other/43728/cloud-analytics-ability-to-design-build-secure-and-maintain-analytics-solutions-on-the-cloud/rajan-ramvilas-saroj
Describe some of the major impacts of information technology on individuals, organizations, and society.
Discuss the positive and negative effects associated with the abundance of information made available by IT.
The Internet of Things, Productivity, and Employment Alex Krause
Presentation by Bob Cohen of the Economic Strategy Institute. Cohen's presentation discusses how technology changes and the internet of things will impact productivity, jobs and employment.
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...PacificResearchPlatform
Securing Research Data: A Workshop on Emerging Practices in Computation and
Storage for Sensitive Data - August 22, 2019
Florence Hudson, Founder and CEO, FDHint LLC
NSF Cybersecurity Center of Excellence, Indiana University - Special Advisor
Northeast Big Data Innovation Hub, Columbia University – Special Advisor
IEEE Engineering in Medicine and Biology Society – Standards Committee
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Eswar Publications
The Internet of Things (IoT), is a concept that describes how objects that we are used in daily life will interact and negotiate with other objects over the internet. The amount of devices with Wi-Fi capabilities and built-in sensors keeps on increasing. IoT combines smart devices to provide smart services and applications like smart cities, smart healthcare, smart home, and digital farm etc. But it is very crucial to secure connected IoT devices and networks because of the nature of IoT system. In this paper, the existing works are analyzed and an IoT based
healthcare system architecture is proposed. An authentication scheme to enhance the security of the proposed healthcare system is also present.
Proposed T-Model to cover 4S quality metrics based on empirical study of root...IJECEIAES
There are various root causes of software failures. Few years ago, software used to fail mainly due to functionality related bugs. That used to happen due to requirement misunderstanding, code issues and lack of functional testing. A lot of work has been done in past on this and software engineering has matured over time, due to which software’s hardly fail due to functionality related bugs. To understand the most recent failures, we had to understand the recent software development methodologies and technologies. In this paper we have discussed background of technologies and testing progression over time. A survey of more than 50 senior IT professionals was done to understand root cause of their software project failures. It was found that most of the softwares fail due to lack of testing of non-functional parameters these days. A lot of research was also done to find most recent and most severe software failures. Our study reveals that main reason of software failures these days is lack of testing of non-functional requirements. Security and Performance parameters mainly constitute non-functional requirements of software. It has become more challenging these days due to lots of development in the field of new technologies like Internet of things (IoT), Cloud of things (CoT), Artificial Intelligence, Machine learning, robotics and excessive use of mobile and technology in everything by masses. Finally, we proposed a software development model called as T-model to ensure breadth and depth of software is considered while designing and testing of software.
The use of digital devices in day to day life has increased tremendously. Mobile devices have become an vital part of our day to day routine and they are prone to facilitating illegal activity or otherwise being involved when crimes occur. Whereas computers, laptops, servers, and gaming devices might have many users, in the vast majority of cases, mobile devices generally belong to an individual. The science behind recovering digital evidence from mobile phones is called mobile forensics. Digital evidence is defined as data and information that is stored on, received, or transmitted by an electronic device that is used for investigations. Digital evidence encompasses any and all digital data that can be used as evidence in a case. Mobile devices present many challenges from a forensic viewpoint. With new models being developed each day, it is extremely difficult to develop a single process or tool to address all the possibilities an investigator may face. Court cases also need to be taken into consideration as mobile devices are being seized and analyzed. Mr. I. A. Attar | Mr. M. M. Kapale "Conceptual Study of Mobile Forensics" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-1 , December 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29476.pdfPaper URL: https://www.ijtsrd.com/computer-science/world-wide-web/29476/conceptual-study-of-mobile-forensics/mr-i-a-attar
Internet of Things IoT Anytime Anywhere Anything ConnectivityYogeshIJTSRD
This paper presents the key challenges in the domain of IoT. The key challenges associated with the development of IoT, industry as well as government, Industrial IoT systems, the related security and privacy challenges has been reviewed and presented. Vulnerability of Internet of Things systems have been improved with the advent of new computational systems for IoT. However, the current design of IoT does not effectively address the higher security requirements posed by those vulnerabilities. Many recent attacks on IoT systems have shown that novel security solutions are needed to protect this emerging system. Nidhi Chadha | Ramandeep Kaur "Internet of Things (IoT): Anytime-Anywhere-Anything Connectivity" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd40008.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-network/40008/internet-of-things-iot-anytimeanywhereanything-connectivity/nidhi-chadha
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
Today with advancement in Information Communication Technology (ICT) the way the education is being delivered is seeing a paradigm shift from boring classroom lectures to interactive applications such as 2-D and 3-D learning content, animations, live videos, response systems, interactive panels, education games, virtual laboratories and collaborative research (data gathering and analysis) etc. Engineering is emerging with more innovative solutions in the field of education and bringing out their innovative products to improve education delivery. The academic institutes which were once hesitant to use such technology are now looking forward to such innovations. They are adopting the new ways as they are realizing the vast benefits of using such methods and technology. The benefits are better comprehensibility, improved learning efficiency of students, and access to vast knowledge resources, geographical reach, quick feedback, accountability and quality research. This paper focuses on how engineering can leverage the latest technology and build a collaborative learning environment which can then be integrated with the national e-learning grid.
A Smart Receptionist Implementing Facial Recognition and Voice InteractionCSCJournals
The purpose of this research is to implement a smart receptionist system with facial recognition and voice interaction using deep learning. The facial recognition component is implemented using real time image processing techniques, and it can be used to learn new faces as well as detect and recognize existing faces. The first time a customer uses this system, it will take the person’s facial data to create a unique user facial model, and this model will be triggered if the person comes the second time. The recognition is done in real time and after which voice interaction will be applied. Voice interaction is used to provide a life-like human communication and improve user experience. Our proposed smart receptionist system could be integrated into the self check-in kiosks deployed in hospitals or smart buildings to streamline the user recognition process and provide customized user interactions. This system could also be used in smart home environment where smart cameras have been deployed and voice assistants are in place.
A GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTSIJNSA Journal
Recently secure device pairing has had significant attention from a wide community of academic as well as industrial researchers and a plethora of schemes and protocols have been proposed, which use various forms of out-of-band exchange to form an association between two unassociated devices. These protocols and schemes have different strengths and weaknesses – often in hardware requirements, strength against various attacks or usability in particular scenarios. From ordinary user’s point of view, the problem then becomes which to choose or which is the best possible scheme in a particular scenario. We advocate that in a world of modern heterogeneous devices and requirements, there is a need for mechanisms that allow automated selection of the best protocols without requiring the user to have an in-depth knowledge of the minutiae of the underlying technologies. Towards this, the main argument forming the basis of this research work is that the integration of a discovery mechanism and several pairing schemes into a single system is more efficient from a usability point of view as well as security point of view in terms of dynamic choice of pairing schemes. In pursuit of this, we have proposed a generic system for secure device pairing by demonstration of physical proximity. The contributions presented in this paper include the design and prototype implementation of the proposed framework along with a novel Co-Location protocol.
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...Damir Delija
One of draft versios of "Concepts and Methodology in Mobile Devices Digital Forensics Education and Training",
Abstract - This paper presents various issues in digital forensics of mobile devices and how to address these issues in the related education and training process. Mobile devices forensics is a new, very fast developing field which lacks standardization, compatibility, tools, methods and skills. All this drawbacks have impact on the results of forensic process and also have deep influence in training and education process. In this paper real life experience in training is presented, with tools, devices, procedures and organization with purpose to improve process of mobile devices forensics and mobile forensic training and education
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...YogeshIJTSRD
Cloud Analytics is another area in the IT field where different services like Software, Infrastructure, storage etc. are offered as services online. Users of cloud services are under constant fear of data loss, security threats, and availability issues. However, the major challenge in these methods is obtaining real time and unbiased datasets. Many datasets are internal and cannot be shared due to privacy issues or may lack certain statistical characteristics. As a result of this, researchers prefer to generate datasets for training and testing purposes in simulated or closed experimental environments which may lack comprehensiveness. Advances in sensor technology, the Internet of things IoT , social networking, wireless communications, and huge collection of data from years have all contributed to a new field of study Big Data is discussed in this paper. Through this analysis and investigation, we provide recommendations for the research public on future directions on providing data based decisions for cloud supported Big Data computing and analytic solutions. This paper concentrates upon the recent trends in Big Data storage and analysing, in the clouds, and also points out the security limitations. Rajan Ramvilas Saroj "Cloud Analytics: Ability to Design, Build, Secure, and Maintain Analytics Solutions on the Cloud" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd43728.pdf Paper URL: https://www.ijtsrd.com/other-scientific-research-area/other/43728/cloud-analytics-ability-to-design-build-secure-and-maintain-analytics-solutions-on-the-cloud/rajan-ramvilas-saroj
Describe some of the major impacts of information technology on individuals, organizations, and society.
Discuss the positive and negative effects associated with the abundance of information made available by IT.
The Internet of Things, Productivity, and Employment Alex Krause
Presentation by Bob Cohen of the Economic Strategy Institute. Cohen's presentation discusses how technology changes and the internet of things will impact productivity, jobs and employment.
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...PacificResearchPlatform
Securing Research Data: A Workshop on Emerging Practices in Computation and
Storage for Sensitive Data - August 22, 2019
Florence Hudson, Founder and CEO, FDHint LLC
NSF Cybersecurity Center of Excellence, Indiana University - Special Advisor
Northeast Big Data Innovation Hub, Columbia University – Special Advisor
IEEE Engineering in Medicine and Biology Society – Standards Committee
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Eswar Publications
The Internet of Things (IoT), is a concept that describes how objects that we are used in daily life will interact and negotiate with other objects over the internet. The amount of devices with Wi-Fi capabilities and built-in sensors keeps on increasing. IoT combines smart devices to provide smart services and applications like smart cities, smart healthcare, smart home, and digital farm etc. But it is very crucial to secure connected IoT devices and networks because of the nature of IoT system. In this paper, the existing works are analyzed and an IoT based
healthcare system architecture is proposed. An authentication scheme to enhance the security of the proposed healthcare system is also present.
Proposed T-Model to cover 4S quality metrics based on empirical study of root...IJECEIAES
There are various root causes of software failures. Few years ago, software used to fail mainly due to functionality related bugs. That used to happen due to requirement misunderstanding, code issues and lack of functional testing. A lot of work has been done in past on this and software engineering has matured over time, due to which software’s hardly fail due to functionality related bugs. To understand the most recent failures, we had to understand the recent software development methodologies and technologies. In this paper we have discussed background of technologies and testing progression over time. A survey of more than 50 senior IT professionals was done to understand root cause of their software project failures. It was found that most of the softwares fail due to lack of testing of non-functional parameters these days. A lot of research was also done to find most recent and most severe software failures. Our study reveals that main reason of software failures these days is lack of testing of non-functional requirements. Security and Performance parameters mainly constitute non-functional requirements of software. It has become more challenging these days due to lots of development in the field of new technologies like Internet of things (IoT), Cloud of things (CoT), Artificial Intelligence, Machine learning, robotics and excessive use of mobile and technology in everything by masses. Finally, we proposed a software development model called as T-model to ensure breadth and depth of software is considered while designing and testing of software.
The use of digital devices in day to day life has increased tremendously. Mobile devices have become an vital part of our day to day routine and they are prone to facilitating illegal activity or otherwise being involved when crimes occur. Whereas computers, laptops, servers, and gaming devices might have many users, in the vast majority of cases, mobile devices generally belong to an individual. The science behind recovering digital evidence from mobile phones is called mobile forensics. Digital evidence is defined as data and information that is stored on, received, or transmitted by an electronic device that is used for investigations. Digital evidence encompasses any and all digital data that can be used as evidence in a case. Mobile devices present many challenges from a forensic viewpoint. With new models being developed each day, it is extremely difficult to develop a single process or tool to address all the possibilities an investigator may face. Court cases also need to be taken into consideration as mobile devices are being seized and analyzed. Mr. I. A. Attar | Mr. M. M. Kapale "Conceptual Study of Mobile Forensics" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-1 , December 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29476.pdfPaper URL: https://www.ijtsrd.com/computer-science/world-wide-web/29476/conceptual-study-of-mobile-forensics/mr-i-a-attar
Internet of Things IoT Anytime Anywhere Anything ConnectivityYogeshIJTSRD
This paper presents the key challenges in the domain of IoT. The key challenges associated with the development of IoT, industry as well as government, Industrial IoT systems, the related security and privacy challenges has been reviewed and presented. Vulnerability of Internet of Things systems have been improved with the advent of new computational systems for IoT. However, the current design of IoT does not effectively address the higher security requirements posed by those vulnerabilities. Many recent attacks on IoT systems have shown that novel security solutions are needed to protect this emerging system. Nidhi Chadha | Ramandeep Kaur "Internet of Things (IoT): Anytime-Anywhere-Anything Connectivity" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd40008.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-network/40008/internet-of-things-iot-anytimeanywhereanything-connectivity/nidhi-chadha
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
Today with advancement in Information Communication Technology (ICT) the way the education is being delivered is seeing a paradigm shift from boring classroom lectures to interactive applications such as 2-D and 3-D learning content, animations, live videos, response systems, interactive panels, education games, virtual laboratories and collaborative research (data gathering and analysis) etc. Engineering is emerging with more innovative solutions in the field of education and bringing out their innovative products to improve education delivery. The academic institutes which were once hesitant to use such technology are now looking forward to such innovations. They are adopting the new ways as they are realizing the vast benefits of using such methods and technology. The benefits are better comprehensibility, improved learning efficiency of students, and access to vast knowledge resources, geographical reach, quick feedback, accountability and quality research. This paper focuses on how engineering can leverage the latest technology and build a collaborative learning environment which can then be integrated with the national e-learning grid.
Architecting the Enterprise Internet of ThingsDell World
While business leaders might drive enterprise Internet of Things (IoT) initiatives, responsibility for managing connected devices and equipment, building infrastructure capacity, and securing data and applications usually falls on IT. Choosing the right IoT ecosystem architecture and technology enables you to minimize cost while ensuring security and dynamic, analytics-driven action. While some vendors advocate a one-size-fits-all approach, Dell uses a holistic, objective methodology to determine the right IoT ecosystem for your unique environment. Learn how Dell's IoT-specific gateways, edge analytics software and infrastructure solutions provide flexible architecture options for multiple IoT use cases.
Implications of GDPR for IoT Big Data Security and Privacy FabricMark Underwood
Discussion of ways in which GDPR has, and will continue to influence the SDLC and deployment of IoT, especially as it impacts the privacy and security fabric.
Industry pundits are predicting up to 50 billion connected devices by 2020, generating more data than in all of human history to date and connected via ubiquitous, connectivity such as 5G, Sigfox and NBIoT. With this comes the promise of business opportunities to deploy your Internet of Things solution. Ganga will walk you through the trends in computing that you need to be aware of, how you can get started and how working with Intel can accelerate your development and time to market.
Speaker: Ganga Varatharajan, IoT & New Technologies Manager, Intel
Mobile Enterprise Dashboards by RapidValue SolutionsRapidValue
Enterprise Dashboards from RapidValue is for executives and management team to enable fast decision making. Executives can access the corporate information, pull out reports from anytime and from anywhere.
DSS and Security Intelligence @IBM_Connect_2014_AprilAndris Soroka
DSS participated in this year's "IBM Connect" event organized by regional IBM's VAD - ALSO Baltics. DSS spoke about importance of IT Security in new - digital world that is developing. New technologies bring new business opportunities but as well bring also new security threats and risks that have to be considered in first place.
International Conference on Soft Computing, Data mining and Data Science (SCD...ijscai
International Conference on Soft Computing, Data mining and Data Science (SCDD
2023) will provide an excellent international forum for sharing knowledge and results in
theory, methodology and applications of Soft Computing, Data mining, and Data
Science. The Conference looks for significant contributions to all major fields of the Soft
Computing, Data mining, and Data Science in theoretical and practical aspects.
Get exclusive insights on IoT technology that has the potential to accelerate your business and give you the necessary agility to keep up with the pace of business. Join us and learn about the current and future state of the IoT landscape and what it takes to be successful in IoT. Gain insights from customer stories and discover how to get started building successful IoT solutions with Microsoft Azure.
Discover the webcast: https://bit.ly/2U1N8iI
2023 GEOINT Tutorial - Synthetic Data Tools for Computer Vision-Based AI - Re...Chris Andrews
The acquisition of labeled, unbiased, high quality remote sensing information for training AI systems is expensive, error prone, and sometimes impossible or dangerous. The efficacy of Remote Sensing and Imagery Analysis tools that use AI depends directly on the data used for training and validation, meaning that the cost and availability of data limits the application of AI for imagery exploitation. Synthetic Computer Vision (CV) data has become a strategy to reduce the cost and limitations of using real-world data in detection problems in data sparse domains. Focusing on remote sensing data including visible and invisible electromagnetic spectra, attendees will learn about the expanding options for generating synthetic data that are being used in commercial and academic domains, the technology options available for users who want to create CV content of a variety of types, and patterns of creating synthetic data to support
Learning Objectives
- Describe synthetic data including different types such as Generative AI and physics-based data
- Identify the opportunities for applying synthetic data in place of real sensor data
Will be able to describe the steps required to generate synthetic data for computer vision workflows from concept to production for training and validating AI.
- The intent of this class is to introduce the concepts and mechanisms behind the creation of synthetic data and to expose students to approaches for generating synthetic data using tools currently on the market.
- Familiarity with concepts around AI training and validation using remotely sensed data will be helpful for attendees.
The world we live in right now is getting more and more digital. All possible things we were reading in sci-fi books or watching in fantasy movies are becoming a reality. Internet of things, drones, e-world, mobility, applications, cloud, digital prototyping, e-voting, quantum computing, 3D printing like in Terminator movies and much more is a reality. On average auditory of this room can agree that it is ok to say that we live in the future. As what has happened to technology for personal use and business in last 25 years is impressive. And we can experience that. We are unique generation and live in unique times.
The digital world gives huge opportunities to any business entering it. There are soon close to 4 billion of potential customers out there in 2015 that are. Digital world introduces new products every day and technology creators are extremely working on to get new products to market as soon as possible.
But like in every book, movie, story, historical reality when there are good forces also there are bad forces. Cyber crime is growing and various things are happening everywhere. New technologies also introduce new risks and those risks are with different configuration. Countries attack countries and we call that a cyber wars, citizens are attacking countries and we call that hacktivism, professionals are attacking everyone for financial gains and we call that organized digital crime. And the methods are getting more and more sophisticated so in the end doesn’t matter how great are technologies of defense every day we have new articles of new indicents, data breeches, companies who have huge financial loses and damages of reputation, lost marketplace, stock market positions, customers, employees or even lives. I won’t touch each different method of attacks but I will simply try to share how we as a system integrator of complex cyber security protection technology solutions look at things and protect our customers.
Functionalities in AI Applications and Use Cases (OECD)AnandSRao1962
This presentation was given at the OECD Network of AI Specialists (ONE) held in Paris on February 26 and 27. It covers the methodology for assessing AI use cases by technology, value chain, use, business impact, business value, and effort required.
Similar to Artificial Intelligence at the Edge - الذكاء الاصطناعي على الأجهزة الطرفية (20)
Deep convolutional neural networks and their many uses for computer visionFares Al-Qunaieer
A talk at Google Workshops in Ai Everything conference
https://events.withgoogle.com/google-ai-everything/
About the talk:
This talk will give an overview of deep convolutional neural networks (ConvNets). We will describe the general architecture and its different types of layers. Then, we will discuss several applications of ConvNets for computer vision. At the end, a practical demo will be presented using Tensorflow/Keras libraries.
محاضرة التعرف على الأشخاص عن طريق القزحية
ألقيت في النادي السعودي في واترلوو كندا، في مركز فيكتوريا لخدمة المجتمع يوم الجمعة 23 ربيع الأول 1435هـ الموافق 24 يناير 2014م
محاضرة ألقيت بتنظيم من مجموعة برمج @parmg_sa
https://www.meetup.com/parmg_sa/events/238339639/
في الرياض، مقر حاضنة بادر. بتاريخ 20 جمادى الآخر 1438هـ، الموافق 18 مارس 2017
محاضرة ألقيت بتنظيم من مجموعة رياض داتا قيكس @DataRiyadh
https://www.meetup.com/DataGeeks/events/236648798/
في الرياض، مقر حاضنة بادر. بتاريخ 19 ربيع الثاني 1438هـ، الموافق 17 فبراير 2017
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Welocme to ViralQR, your best QR code generator.ViralQR
Welcome to ViralQR, your best QR code generator available on the market!
At ViralQR, we design static and dynamic QR codes. Our mission is to make business operations easier and customer engagement more powerful through the use of QR technology. Be it a small-scale business or a huge enterprise, our easy-to-use platform provides multiple choices that can be tailored according to your company's branding and marketing strategies.
Our Vision
We are here to make the process of creating QR codes easy and smooth, thus enhancing customer interaction and making business more fluid. We very strongly believe in the ability of QR codes to change the world for businesses in their interaction with customers and are set on making that technology accessible and usable far and wide.
Our Achievements
Ever since its inception, we have successfully served many clients by offering QR codes in their marketing, service delivery, and collection of feedback across various industries. Our platform has been recognized for its ease of use and amazing features, which helped a business to make QR codes.
Our Services
At ViralQR, here is a comprehensive suite of services that caters to your very needs:
Static QR Codes: Create free static QR codes. These QR codes are able to store significant information such as URLs, vCards, plain text, emails and SMS, Wi-Fi credentials, and Bitcoin addresses.
Dynamic QR codes: These also have all the advanced features but are subscription-based. They can directly link to PDF files, images, micro-landing pages, social accounts, review forms, business pages, and applications. In addition, they can be branded with CTAs, frames, patterns, colors, and logos to enhance your branding.
Pricing and Packages
Additionally, there is a 14-day free offer to ViralQR, which is an exceptional opportunity for new users to take a feel of this platform. One can easily subscribe from there and experience the full dynamic of using QR codes. The subscription plans are not only meant for business; they are priced very flexibly so that literally every business could afford to benefit from our service.
Why choose us?
ViralQR will provide services for marketing, advertising, catering, retail, and the like. The QR codes can be posted on fliers, packaging, merchandise, and banners, as well as to substitute for cash and cards in a restaurant or coffee shop. With QR codes integrated into your business, improve customer engagement and streamline operations.
Comprehensive Analytics
Subscribers of ViralQR receive detailed analytics and tracking tools in light of having a view of the core values of QR code performance. Our analytics dashboard shows aggregate views and unique views, as well as detailed information about each impression, including time, device, browser, and estimated location by city and country.
So, thank you for choosing ViralQR; we have an offer of nothing but the best in terms of QR code services to meet business diversity!
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
37. Graphics Processing
Unit (GPU)
Tensor Processing
Unit (TPU)
AI Accelerators
Field Programmable
Gate Array (FPGA)
Application Specific
Integrated Circuit (ASIC)