SlideShare a Scribd company logo
1 of 15
By,
MOHAMMED SAQIB
1GC11EE018
Dept of EEE
GCE,Ramanagaram
AN OVERVIEW ON USE OF
ARTIFICIAL INTELLIGENCE
TECHNIQUES
IN
EFFECTIVE SECURITY MANAGEMENT
Under The Guidance of
Mr.Aejaz Ahmed KR
Asst. Professor
What is
Artificial Intelligence[AI]…???
 The artificial intelligence is the process in which
machine can act like a human
 AI techniques gives rise to important applications
where human processing ability weakens
 Some of the field where AI is massively used are
Military, Antiterrorism, Automobile Industry,
Internet Search Engines and Robotics, Speech
recognition, Expert & fuzzy system etc.,
 The central goals of AI research
include reasoning, knowledge, planning, learning,
natural language processing
(communication),perception and the ability to
move and manipulate objects.
 General intelligence is still among the field's long-
term goals.
Artificial Intelligence & Security
 Nowadays Security is the important issue for Human,
Company Environment, Organization, Community and
Country in accordance to maintain growth and stability
 Security threat gives rise to several problems such as
instability, economical setbacks, terror attacks causes loss of
human lives, creates Un-safety feelings.
 As a human being, the security is challenging task because
human has several restriction on analyzing and processing
several information at a time. This is big drawback is
identified in current security system.
 This drawback can overcome on more practical manner with
the help of artificial intelligence techniques integration. The
security system includes Homeland security, Intrusion
detection system, DOS attack, Cryptography, Video vigilance
System etc. Human Processing ability integrated with AI
certainly raise the security at high extend.
 Formal Security System
 Security System based on Artificial
Intelligence
Different AI techniques used in
Security Management System
 Artificial Neural Networks.
 Data Mining Tools.
 Pattern Recognition.
 Image Processing/Analysis.
 Fuzzy Logic.
 Expert System.
Artificial Neural Networks
 Artificial Neural Networks is an effective
technique which has the ability to implement
security using back-propagation algorithm.
Simple combinational logic and sequential
machine can be well implemented using back-
propagation algorithm.
 They are programs designed to solve any
problem by trying to mimic the structure and
the function of our nervous system
 They are based on simulated neurons which
are joined together in variety of ways to form
networks
A Simple Biological neuron
 The fundamental processing
element of a neural network is
a neuron. Basically, a
biological neuron receives
inputs from other sources,
combines them in some way,
performs a generally nonlinear
operation on the result, and
then outputs the final result
Inputs
w2
w1
w3
wn
wn-1
.
.
.
x1
x2
x3
…
xn-1
xn
y
)(;
1
zHyxwz
n
i
ii  
Artificial Neuron
ANN-Applications
 It involves Human like thinking
 They can handle noisy or missing data
 They can work with large number of variables
or parameters
 They deal with the non-linearity of the world
which we live in.
Fuzzy Rule Based Expert System
for Cyber Security
 Stage 1: Defining
Cyber Security Expert
System Variables
 Stage 2: Data
Collection for Cyber
Terrorism
 Stage 3: System
Design
 Stage 4:Fuzzy Rule
Based Model
 Implementation
Steps Involved
Advantages & Disadvantages of various AI
TechniquesAI Techniques Advantages Disadvantages
Artificial Neural Networks •Adapt to unknown
situations
•Robust, able to model complex
functions.
•Easy to use.
•Training of neural network
•Not exact
•Complexity of the network
structure
Data Mining •Help with decision
making
•find out exact information from
vast amount of data
•User privacy/security
is critical issue
•Misuse of information
•Accuracy of data
Pattern Recognition •Quick and Accurate
•Recognize & Classify
unfamiliar objects
•Reliability of result depends
on input
Fuzzy Logic •The algorithms can be
described with little data, so
little memory is required.
•Fuzzy algorithms are often
robust.
•They are not very sensitive
to changing environments
and erroneous or forgotten
rules
Expert System •Provides consistent
answers for repetitive decisions,
processes and tasks
•Can work round the clock
•Cannot adapt to
changing environments,
unless knowledge base is
changed
INTELLIGENT SYSTEM FOR
INFORMATION SECURITY
MANAGEMENT
ISISM ARCHITECTURE AI techniques can be used in building intelligent
models to improve the information security
management, intrusion detection and prevention
capabilities, efficiency of security event
management, and decision making
 Efficient information security management
requires an intelligent system that supports
security event management approach with
enhanced real-time capabilities, adaptation, and
generalization to predict possible attacks and to
support human’s actions.
 ISISM ARCHITECTURE IS USED FOR THIS
PURPOSE
ISISM Architecture
Proposed Meystel & Albus
 Intelligent system has 2 parts
 Internal or Computational
 Sensory processing
 world modeling
 Decision making module
 value judgment module
 External or Interfacing
Other Fields where AI is used
1. Engineering
2. Artificial life
3. Automated reasoning
4. Automation
5. Biologically inspired computing
6. Concept mining
7. Data mining
8. Knowledge representation
9. Semantic Web
10. E-mail spam filtering
11. Artificial Creativity
12. Game theory and Strategic planning
And Many more………..
Conclusion
 As Security is key important issues, the integration
Artificial Intelligence Techniques certainly improve the
performance of the existing security system
 System alerts the user before unwanted hazards are
yet to happen
 The system constructs an intelligent image processing
technology which can identify the license plate and
human face. This is the essential as far as the terror
attacks are concerned
 Reduces human effort
 Man power required for the security purpose can be
reduced, as once the successful security system with
AI is designed, it can be used for longer duration.
 Drawback-Some are Expensive
BE-EEE-8th sem-Presentation Artificial intelligence in security managenent

More Related Content

What's hot

artificial intelligence
artificial intelligenceartificial intelligence
artificial intelligencevallibhargavi
 
Every thing about Artificial Intelligence
Every thing about Artificial Intelligence Every thing about Artificial Intelligence
Every thing about Artificial Intelligence Vaibhav Mishra
 
From Narrow AI to Artificial General Intelligence (AGI)
From Narrow AI to Artificial General Intelligence (AGI)From Narrow AI to Artificial General Intelligence (AGI)
From Narrow AI to Artificial General Intelligence (AGI)Helgi Páll Helgason, PhD
 
#DIS2017 - How can A.I. Help us build a better world
#DIS2017 - How can A.I. Help us build a better world#DIS2017 - How can A.I. Help us build a better world
#DIS2017 - How can A.I. Help us build a better worldFaction XYZ
 
Artificial Intelligence Techniques In Power Systems Paper Presentation
Artificial Intelligence Techniques In Power Systems Paper PresentationArtificial Intelligence Techniques In Power Systems Paper Presentation
Artificial Intelligence Techniques In Power Systems Paper Presentationguestac67362
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligenceMayank Saxena
 
Paper sharing_deep learning for smart manufacturing methods and applications
Paper sharing_deep learning for smart manufacturing methods and applicationsPaper sharing_deep learning for smart manufacturing methods and applications
Paper sharing_deep learning for smart manufacturing methods and applicationsYOU SHENG CHEN
 
Artificial intelligence in software engineering ppt.
Artificial intelligence in software engineering ppt.Artificial intelligence in software engineering ppt.
Artificial intelligence in software engineering ppt.Pradeep Vishwakarma
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial IntelligenceBikas Sadashiv
 
Artificial Intelligence by Jayant
Artificial Intelligence by JayantArtificial Intelligence by Jayant
Artificial Intelligence by JayantJayant Jain
 
Artificial intellegence
Artificial intellegenceArtificial intellegence
Artificial intellegencegeetinsaa
 
Artificial intelligence- The science of intelligent programs
Artificial intelligence- The science of intelligent programsArtificial intelligence- The science of intelligent programs
Artificial intelligence- The science of intelligent programsDerak Davis
 
Introduction to Artificial Intelligence
Introduction to Artificial IntelligenceIntroduction to Artificial Intelligence
Introduction to Artificial IntelligenceAdri Jovin
 
Machine learning seminar presentation
Machine learning seminar presentationMachine learning seminar presentation
Machine learning seminar presentationsweety seth
 
Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...
Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...
Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...Paul Gilbreath
 
ARTIFICIAL INTELLIGENCE & NEURAL NETWORKS
ARTIFICIAL INTELLIGENCE & NEURAL NETWORKSARTIFICIAL INTELLIGENCE & NEURAL NETWORKS
ARTIFICIAL INTELLIGENCE & NEURAL NETWORKSEr Kaushal
 

What's hot (20)

artificial intelligence
artificial intelligenceartificial intelligence
artificial intelligence
 
Every thing about Artificial Intelligence
Every thing about Artificial Intelligence Every thing about Artificial Intelligence
Every thing about Artificial Intelligence
 
From Narrow AI to Artificial General Intelligence (AGI)
From Narrow AI to Artificial General Intelligence (AGI)From Narrow AI to Artificial General Intelligence (AGI)
From Narrow AI to Artificial General Intelligence (AGI)
 
(Ch#1) artificial intelligence
(Ch#1) artificial intelligence(Ch#1) artificial intelligence
(Ch#1) artificial intelligence
 
#DIS2017 - How can A.I. Help us build a better world
#DIS2017 - How can A.I. Help us build a better world#DIS2017 - How can A.I. Help us build a better world
#DIS2017 - How can A.I. Help us build a better world
 
Artificial Intelligence Techniques In Power Systems Paper Presentation
Artificial Intelligence Techniques In Power Systems Paper PresentationArtificial Intelligence Techniques In Power Systems Paper Presentation
Artificial Intelligence Techniques In Power Systems Paper Presentation
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
Paper sharing_deep learning for smart manufacturing methods and applications
Paper sharing_deep learning for smart manufacturing methods and applicationsPaper sharing_deep learning for smart manufacturing methods and applications
Paper sharing_deep learning for smart manufacturing methods and applications
 
Artificial intelligence in software engineering ppt.
Artificial intelligence in software engineering ppt.Artificial intelligence in software engineering ppt.
Artificial intelligence in software engineering ppt.
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
Artificial Intelligence by Jayant
Artificial Intelligence by JayantArtificial Intelligence by Jayant
Artificial Intelligence by Jayant
 
Artificial intellegence
Artificial intellegenceArtificial intellegence
Artificial intellegence
 
Artificial intelligence- The science of intelligent programs
Artificial intelligence- The science of intelligent programsArtificial intelligence- The science of intelligent programs
Artificial intelligence- The science of intelligent programs
 
Artificial intelligence in business
Artificial intelligence in businessArtificial intelligence in business
Artificial intelligence in business
 
Introduction to Artificial Intelligence
Introduction to Artificial IntelligenceIntroduction to Artificial Intelligence
Introduction to Artificial Intelligence
 
Machine learning seminar presentation
Machine learning seminar presentationMachine learning seminar presentation
Machine learning seminar presentation
 
An overview on ai
An overview on aiAn overview on ai
An overview on ai
 
Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...
Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...
Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...
 
ARTIFICIAL INTELLIGENCE & NEURAL NETWORKS
ARTIFICIAL INTELLIGENCE & NEURAL NETWORKSARTIFICIAL INTELLIGENCE & NEURAL NETWORKS
ARTIFICIAL INTELLIGENCE & NEURAL NETWORKS
 
Artificial intelligence : what it is
Artificial intelligence : what it isArtificial intelligence : what it is
Artificial intelligence : what it is
 

Similar to BE-EEE-8th sem-Presentation Artificial intelligence in security managenent

IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdfIRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdfIRJET Journal
 
Artificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber SecurityArtificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber SecurityIRJET Journal
 
Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016Janghyuck Choi
 
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Harsh Bhanushali
 
A review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber securityA review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber securitybijejournal
 
Optimizing cybersecurity incident response decisions using deep reinforcemen...
Optimizing cybersecurity incident response decisions using deep  reinforcemen...Optimizing cybersecurity incident response decisions using deep  reinforcemen...
Optimizing cybersecurity incident response decisions using deep reinforcemen...IJECEIAES
 
ARTIFICIAL INTELLIGENCE IN CYBER SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER SECURITYARTIFICIAL INTELLIGENCE IN CYBER SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER SECURITYCynthia King
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber securitySandip Juthani
 
The Role of Machine Learning in Cybersecurity.pptx
The Role of Machine Learning in Cybersecurity.pptxThe Role of Machine Learning in Cybersecurity.pptx
The Role of Machine Learning in Cybersecurity.pptxChristine Shepherd
 
IRJET- Intervention of Artificial Intelligence in Cyber Security
IRJET- Intervention of Artificial Intelligence in Cyber SecurityIRJET- Intervention of Artificial Intelligence in Cyber Security
IRJET- Intervention of Artificial Intelligence in Cyber SecurityIRJET Journal
 
A survey on artificial neural networks in cyber world
A survey on artificial neural networks in cyber world A survey on artificial neural networks in cyber world
A survey on artificial neural networks in cyber world Ashish Kumar Thakur
 
IRJET- Use of Artificial Intelligence in Cyber Defence
IRJET- Use of Artificial Intelligence in Cyber DefenceIRJET- Use of Artificial Intelligence in Cyber Defence
IRJET- Use of Artificial Intelligence in Cyber DefenceIRJET Journal
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with aiBurhan Ahmed
 
The Transformative Role of Artificial Intelligence in Cybersecurity
The Transformative Role of Artificial Intelligence in CybersecurityThe Transformative Role of Artificial Intelligence in Cybersecurity
The Transformative Role of Artificial Intelligence in Cybersecuritycyberprosocial
 
How Modern Cybersecurity Software Shields Against the Latest Threats.pdf
How Modern Cybersecurity Software Shields Against the Latest Threats.pdfHow Modern Cybersecurity Software Shields Against the Latest Threats.pdf
How Modern Cybersecurity Software Shields Against the Latest Threats.pdfWebtrills1
 
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Leslie McFarlin
 
Harnessing the Power of Machine Learning in Cybersecurity.pdf
Harnessing the Power of Machine Learning in Cybersecurity.pdfHarnessing the Power of Machine Learning in Cybersecurity.pdf
Harnessing the Power of Machine Learning in Cybersecurity.pdfCIOWomenMagazine
 
ARTIFICIAL INTELLIGENT ( ITS / TASK 6 ) done by Wael Saad Hameedi / P71062
ARTIFICIAL INTELLIGENT ( ITS / TASK 6 ) done by Wael Saad Hameedi / P71062ARTIFICIAL INTELLIGENT ( ITS / TASK 6 ) done by Wael Saad Hameedi / P71062
ARTIFICIAL INTELLIGENT ( ITS / TASK 6 ) done by Wael Saad Hameedi / P71062Wael Alawsey
 
Distributed network security management
Distributed network security managementDistributed network security management
Distributed network security managementSwati Sinha
 

Similar to BE-EEE-8th sem-Presentation Artificial intelligence in security managenent (20)

IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdfIRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
 
Artificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber SecurityArtificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber Security
 
Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016
 
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)
 
A review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber securityA review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber security
 
Optimizing cybersecurity incident response decisions using deep reinforcemen...
Optimizing cybersecurity incident response decisions using deep  reinforcemen...Optimizing cybersecurity incident response decisions using deep  reinforcemen...
Optimizing cybersecurity incident response decisions using deep reinforcemen...
 
ARTIFICIAL INTELLIGENCE IN CYBER SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER SECURITYARTIFICIAL INTELLIGENCE IN CYBER SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER SECURITY
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber security
 
The Role of Machine Learning in Cybersecurity.pptx
The Role of Machine Learning in Cybersecurity.pptxThe Role of Machine Learning in Cybersecurity.pptx
The Role of Machine Learning in Cybersecurity.pptx
 
IRJET- Intervention of Artificial Intelligence in Cyber Security
IRJET- Intervention of Artificial Intelligence in Cyber SecurityIRJET- Intervention of Artificial Intelligence in Cyber Security
IRJET- Intervention of Artificial Intelligence in Cyber Security
 
A survey on artificial neural networks in cyber world
A survey on artificial neural networks in cyber world A survey on artificial neural networks in cyber world
A survey on artificial neural networks in cyber world
 
IRJET- Use of Artificial Intelligence in Cyber Defence
IRJET- Use of Artificial Intelligence in Cyber DefenceIRJET- Use of Artificial Intelligence in Cyber Defence
IRJET- Use of Artificial Intelligence in Cyber Defence
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
Introduction to soft computing
 Introduction to soft computing Introduction to soft computing
Introduction to soft computing
 
The Transformative Role of Artificial Intelligence in Cybersecurity
The Transformative Role of Artificial Intelligence in CybersecurityThe Transformative Role of Artificial Intelligence in Cybersecurity
The Transformative Role of Artificial Intelligence in Cybersecurity
 
How Modern Cybersecurity Software Shields Against the Latest Threats.pdf
How Modern Cybersecurity Software Shields Against the Latest Threats.pdfHow Modern Cybersecurity Software Shields Against the Latest Threats.pdf
How Modern Cybersecurity Software Shields Against the Latest Threats.pdf
 
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018
 
Harnessing the Power of Machine Learning in Cybersecurity.pdf
Harnessing the Power of Machine Learning in Cybersecurity.pdfHarnessing the Power of Machine Learning in Cybersecurity.pdf
Harnessing the Power of Machine Learning in Cybersecurity.pdf
 
ARTIFICIAL INTELLIGENT ( ITS / TASK 6 ) done by Wael Saad Hameedi / P71062
ARTIFICIAL INTELLIGENT ( ITS / TASK 6 ) done by Wael Saad Hameedi / P71062ARTIFICIAL INTELLIGENT ( ITS / TASK 6 ) done by Wael Saad Hameedi / P71062
ARTIFICIAL INTELLIGENT ( ITS / TASK 6 ) done by Wael Saad Hameedi / P71062
 
Distributed network security management
Distributed network security managementDistributed network security management
Distributed network security management
 

More from MOHAMMED SAQIB

A STUDY ON WORKFORCE WELFARE IN THE CONTEXT OF DEVELOPMENT PROGRAMS AT ‘BEML ...
A STUDY ON WORKFORCE WELFARE IN THE CONTEXT OF DEVELOPMENT PROGRAMS AT ‘BEML ...A STUDY ON WORKFORCE WELFARE IN THE CONTEXT OF DEVELOPMENT PROGRAMS AT ‘BEML ...
A STUDY ON WORKFORCE WELFARE IN THE CONTEXT OF DEVELOPMENT PROGRAMS AT ‘BEML ...MOHAMMED SAQIB
 
Validity in performance appraisal
Validity in performance appraisalValidity in performance appraisal
Validity in performance appraisalMOHAMMED SAQIB
 
human capital management
human capital managementhuman capital management
human capital managementMOHAMMED SAQIB
 
Demonetization survey
Demonetization survey Demonetization survey
Demonetization survey MOHAMMED SAQIB
 
BE-EEE-8th sem project report for the project titled "Asymmetrical Multilevel...
BE-EEE-8th sem project report for the project titled "Asymmetrical Multilevel...BE-EEE-8th sem project report for the project titled "Asymmetrical Multilevel...
BE-EEE-8th sem project report for the project titled "Asymmetrical Multilevel...MOHAMMED SAQIB
 
Presentation - TATA group-Analysis-group ppt-By, Mohammed Saqib(16YACMD114) 1...
Presentation - TATA group-Analysis-group ppt-By, Mohammed Saqib(16YACMD114) 1...Presentation - TATA group-Analysis-group ppt-By, Mohammed Saqib(16YACMD114) 1...
Presentation - TATA group-Analysis-group ppt-By, Mohammed Saqib(16YACMD114) 1...MOHAMMED SAQIB
 
Milo-Product relaunch-SDC competition-Group ppt
Milo-Product relaunch-SDC competition-Group pptMilo-Product relaunch-SDC competition-Group ppt
Milo-Product relaunch-SDC competition-Group pptMOHAMMED SAQIB
 
Reliance industries analysis
Reliance industries analysisReliance industries analysis
Reliance industries analysisMOHAMMED SAQIB
 
case stude ppt on nike
case stude ppt on nikecase stude ppt on nike
case stude ppt on nikeMOHAMMED SAQIB
 
Final industrial policies
Final  industrial policiesFinal  industrial policies
Final industrial policiesMOHAMMED SAQIB
 
Business analysis of big bazaar - By, Mohammed Saqib(16YACMD114) 1st sem MBA(...
Business analysis of big bazaar - By, Mohammed Saqib(16YACMD114) 1st sem MBA(...Business analysis of big bazaar - By, Mohammed Saqib(16YACMD114) 1st sem MBA(...
Business analysis of big bazaar - By, Mohammed Saqib(16YACMD114) 1st sem MBA(...MOHAMMED SAQIB
 

More from MOHAMMED SAQIB (16)

A STUDY ON WORKFORCE WELFARE IN THE CONTEXT OF DEVELOPMENT PROGRAMS AT ‘BEML ...
A STUDY ON WORKFORCE WELFARE IN THE CONTEXT OF DEVELOPMENT PROGRAMS AT ‘BEML ...A STUDY ON WORKFORCE WELFARE IN THE CONTEXT OF DEVELOPMENT PROGRAMS AT ‘BEML ...
A STUDY ON WORKFORCE WELFARE IN THE CONTEXT OF DEVELOPMENT PROGRAMS AT ‘BEML ...
 
Validity in performance appraisal
Validity in performance appraisalValidity in performance appraisal
Validity in performance appraisal
 
Titan
TitanTitan
Titan
 
Long term financing
Long term financingLong term financing
Long term financing
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
6 thinking hats
6 thinking hats6 thinking hats
6 thinking hats
 
human capital management
human capital managementhuman capital management
human capital management
 
Demonetization survey
Demonetization survey Demonetization survey
Demonetization survey
 
BE-EEE-8th sem project report for the project titled "Asymmetrical Multilevel...
BE-EEE-8th sem project report for the project titled "Asymmetrical Multilevel...BE-EEE-8th sem project report for the project titled "Asymmetrical Multilevel...
BE-EEE-8th sem project report for the project titled "Asymmetrical Multilevel...
 
Presentation - TATA group-Analysis-group ppt-By, Mohammed Saqib(16YACMD114) 1...
Presentation - TATA group-Analysis-group ppt-By, Mohammed Saqib(16YACMD114) 1...Presentation - TATA group-Analysis-group ppt-By, Mohammed Saqib(16YACMD114) 1...
Presentation - TATA group-Analysis-group ppt-By, Mohammed Saqib(16YACMD114) 1...
 
Milo-Product relaunch-SDC competition-Group ppt
Milo-Product relaunch-SDC competition-Group pptMilo-Product relaunch-SDC competition-Group ppt
Milo-Product relaunch-SDC competition-Group ppt
 
Reliance industries analysis
Reliance industries analysisReliance industries analysis
Reliance industries analysis
 
Engineering products
Engineering productsEngineering products
Engineering products
 
case stude ppt on nike
case stude ppt on nikecase stude ppt on nike
case stude ppt on nike
 
Final industrial policies
Final  industrial policiesFinal  industrial policies
Final industrial policies
 
Business analysis of big bazaar - By, Mohammed Saqib(16YACMD114) 1st sem MBA(...
Business analysis of big bazaar - By, Mohammed Saqib(16YACMD114) 1st sem MBA(...Business analysis of big bazaar - By, Mohammed Saqib(16YACMD114) 1st sem MBA(...
Business analysis of big bazaar - By, Mohammed Saqib(16YACMD114) 1st sem MBA(...
 

Recently uploaded

Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 

Recently uploaded (20)

Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 

BE-EEE-8th sem-Presentation Artificial intelligence in security managenent

  • 1. By, MOHAMMED SAQIB 1GC11EE018 Dept of EEE GCE,Ramanagaram AN OVERVIEW ON USE OF ARTIFICIAL INTELLIGENCE TECHNIQUES IN EFFECTIVE SECURITY MANAGEMENT Under The Guidance of Mr.Aejaz Ahmed KR Asst. Professor
  • 2. What is Artificial Intelligence[AI]…???  The artificial intelligence is the process in which machine can act like a human  AI techniques gives rise to important applications where human processing ability weakens  Some of the field where AI is massively used are Military, Antiterrorism, Automobile Industry, Internet Search Engines and Robotics, Speech recognition, Expert & fuzzy system etc.,  The central goals of AI research include reasoning, knowledge, planning, learning, natural language processing (communication),perception and the ability to move and manipulate objects.  General intelligence is still among the field's long- term goals.
  • 3. Artificial Intelligence & Security  Nowadays Security is the important issue for Human, Company Environment, Organization, Community and Country in accordance to maintain growth and stability  Security threat gives rise to several problems such as instability, economical setbacks, terror attacks causes loss of human lives, creates Un-safety feelings.  As a human being, the security is challenging task because human has several restriction on analyzing and processing several information at a time. This is big drawback is identified in current security system.  This drawback can overcome on more practical manner with the help of artificial intelligence techniques integration. The security system includes Homeland security, Intrusion detection system, DOS attack, Cryptography, Video vigilance System etc. Human Processing ability integrated with AI certainly raise the security at high extend.
  • 4.  Formal Security System  Security System based on Artificial Intelligence
  • 5. Different AI techniques used in Security Management System  Artificial Neural Networks.  Data Mining Tools.  Pattern Recognition.  Image Processing/Analysis.  Fuzzy Logic.  Expert System.
  • 6. Artificial Neural Networks  Artificial Neural Networks is an effective technique which has the ability to implement security using back-propagation algorithm. Simple combinational logic and sequential machine can be well implemented using back- propagation algorithm.  They are programs designed to solve any problem by trying to mimic the structure and the function of our nervous system  They are based on simulated neurons which are joined together in variety of ways to form networks
  • 7. A Simple Biological neuron  The fundamental processing element of a neural network is a neuron. Basically, a biological neuron receives inputs from other sources, combines them in some way, performs a generally nonlinear operation on the result, and then outputs the final result Inputs w2 w1 w3 wn wn-1 . . . x1 x2 x3 … xn-1 xn y )(; 1 zHyxwz n i ii   Artificial Neuron
  • 8. ANN-Applications  It involves Human like thinking  They can handle noisy or missing data  They can work with large number of variables or parameters  They deal with the non-linearity of the world which we live in.
  • 9. Fuzzy Rule Based Expert System for Cyber Security  Stage 1: Defining Cyber Security Expert System Variables  Stage 2: Data Collection for Cyber Terrorism  Stage 3: System Design  Stage 4:Fuzzy Rule Based Model  Implementation Steps Involved
  • 10. Advantages & Disadvantages of various AI TechniquesAI Techniques Advantages Disadvantages Artificial Neural Networks •Adapt to unknown situations •Robust, able to model complex functions. •Easy to use. •Training of neural network •Not exact •Complexity of the network structure Data Mining •Help with decision making •find out exact information from vast amount of data •User privacy/security is critical issue •Misuse of information •Accuracy of data Pattern Recognition •Quick and Accurate •Recognize & Classify unfamiliar objects •Reliability of result depends on input Fuzzy Logic •The algorithms can be described with little data, so little memory is required. •Fuzzy algorithms are often robust. •They are not very sensitive to changing environments and erroneous or forgotten rules Expert System •Provides consistent answers for repetitive decisions, processes and tasks •Can work round the clock •Cannot adapt to changing environments, unless knowledge base is changed
  • 11. INTELLIGENT SYSTEM FOR INFORMATION SECURITY MANAGEMENT ISISM ARCHITECTURE AI techniques can be used in building intelligent models to improve the information security management, intrusion detection and prevention capabilities, efficiency of security event management, and decision making  Efficient information security management requires an intelligent system that supports security event management approach with enhanced real-time capabilities, adaptation, and generalization to predict possible attacks and to support human’s actions.  ISISM ARCHITECTURE IS USED FOR THIS PURPOSE
  • 12. ISISM Architecture Proposed Meystel & Albus  Intelligent system has 2 parts  Internal or Computational  Sensory processing  world modeling  Decision making module  value judgment module  External or Interfacing
  • 13. Other Fields where AI is used 1. Engineering 2. Artificial life 3. Automated reasoning 4. Automation 5. Biologically inspired computing 6. Concept mining 7. Data mining 8. Knowledge representation 9. Semantic Web 10. E-mail spam filtering 11. Artificial Creativity 12. Game theory and Strategic planning And Many more………..
  • 14. Conclusion  As Security is key important issues, the integration Artificial Intelligence Techniques certainly improve the performance of the existing security system  System alerts the user before unwanted hazards are yet to happen  The system constructs an intelligent image processing technology which can identify the license plate and human face. This is the essential as far as the terror attacks are concerned  Reduces human effort  Man power required for the security purpose can be reduced, as once the successful security system with AI is designed, it can be used for longer duration.  Drawback-Some are Expensive