Just Under Trial: A Study of Pre-trial Detention in IndiaAmnesty India
India has one of the highest undertrial populations in the world. As of December 2015, 67% of prisoners in India’s
prisons were ‘undertrials’ – people who were awaiting trial or whose trials were still ongoing, and who have not been convicted.1 In other words, there are twice as many undertrials in India’s prisons as there are convicts. Figure 1 below shows the state-wise population of undertrials and prison occupancy rates.
Mobile_Forensics- General Introduction & Software.pptxgouriuplenchwar63
This ppt is related with mobile forensic science where there is general introduction mobile forensics and associated terms. Some information regarding software used in mobile forensics.
Just Under Trial: A Study of Pre-trial Detention in IndiaAmnesty India
India has one of the highest undertrial populations in the world. As of December 2015, 67% of prisoners in India’s
prisons were ‘undertrials’ – people who were awaiting trial or whose trials were still ongoing, and who have not been convicted.1 In other words, there are twice as many undertrials in India’s prisons as there are convicts. Figure 1 below shows the state-wise population of undertrials and prison occupancy rates.
Mobile_Forensics- General Introduction & Software.pptxgouriuplenchwar63
This ppt is related with mobile forensic science where there is general introduction mobile forensics and associated terms. Some information regarding software used in mobile forensics.
Statement of suspects need to be recorded by the law enforcement agencies at the stage of investigation. This presentation gives an overview of Indian Law in thi sregard while also recommending areas for improvement.
Internship at office of regional police and dpo office sargodha final report ...hanzil fatima
this report helps other criminology students in sargodha ..in this report mention all working method of police in different place..i hope so its very helpful for students
CBI ,a professional Investigating Agency has done commendable job but still has always been under controversy of being aligned to the ruling party which must be corrected.
Кроз ову презентацију, јасно је истакнут процес акционог потенцијала и самог тока, шта су синапсе и коју улогу имају, канали који се убрајају и спомињу у сврхе акционог пптенцијала.
Зашто је битан акциони потенцијал као и сврха !
Надам се да ће Вам се допасти 😊 !
Statement of suspects need to be recorded by the law enforcement agencies at the stage of investigation. This presentation gives an overview of Indian Law in thi sregard while also recommending areas for improvement.
Internship at office of regional police and dpo office sargodha final report ...hanzil fatima
this report helps other criminology students in sargodha ..in this report mention all working method of police in different place..i hope so its very helpful for students
CBI ,a professional Investigating Agency has done commendable job but still has always been under controversy of being aligned to the ruling party which must be corrected.
Кроз ову презентацију, јасно је истакнут процес акционог потенцијала и самог тока, шта су синапсе и коју улогу имају, канали који се убрајају и спомињу у сврхе акционог пптенцијала.
Зашто је битан акциони потенцијал као и сврха !
Надам се да ће Вам се допасти 😊 !
If you know the enemy and know yourself, you need not fear the result of a hundred battles- Sun Tzu
Sharing some pointers wrt some trends and tactics in the cyber domain and threat intel.
Thanks to CRCIDF team.
National Education Policy: A Complete Guide. The National Education Policy 2020 (NEP 2020) was approved by the Union Cabinet on July 29, 2020. The policy aims to bring equity and inclusiveness to the education system.
The NEP 2020 replaces the 10+2 school system with a new 5+3+3+4 system. The new system corresponds to the following age groups:
Foundational stage: 3–8 years
Preparatory stage: 8–11 years
Middle stage: 11–14 years
Secondary stage: 14–18 years
The NEP 2020 curriculum includes:
Proficiency in languages
Scientific temper and evidence-based thinking
Creativity and innovativeness
Sense of aesthetics and art
Oral and written communication
Health and nutrition
Physical education, fitness, wellness, and sports
Collaboration and teamwork
Problem solving
Slides are 30% of a presentation, 70% are Knowledge, Experience, Verbal and Nonverbal Communication. Knowledge with enough practice can make a long-lasting mark on your audience
National Education Policy is a game-changer with equal stress on our Indian Knowledge System and International Education System. Freedom to chose subjects amongst 'Streams' with 'No Silos', multiple entries & multiple exit and flexibility in completion of Higher studies as different learners have different capabilities... are some salient points. The policy is very original, Indic and strong but it all depends now on Implementation. I understand we will get our first batch of freshers in Engineering colleges in 2024. I welcome any more observations.
India is the best case study of digitization to nano level. The demographic divide is a wonderful subject matter for anthropologists. Using Data Science and Artificial Intelligence in such a huge population and area is noteworth.
Course Flow of Engineering Subjects, finding the important and redundant courses and ooptimising the time-effort duo for your own students will give any Engineering faculty a strength as mentor.
Finding the right fit from your mentees for the industry is the most satisfying job for any Engineering Faculty.
This presentation is part of FDP being held in Rajkiya Engineering College, kannauj
Capstone Projects are intense final task as part of completion of Professional Studies. This slide show is focussed on Capstone Project for Engineering Studies. The target audience are Engineering Faculty.
Design Thinking is an iterative exercise on Inspiration, Insight, Ideation & Implementation.
Fail early, Test Often and be creative about your mistakes... never a repeated one!
The effort in this webinar is to make the Civil, Mechanical, and Sanitation Engineers understand, that, DSAI is there to make the best use of the understanding of knowledge they have
Deep Learning was constrained with two key factors for practical applicability. One was the availability of Big Data. With the explosion of Big Data with Internet growth solving the Data problem, the second issue was that even with Big Data availability, to get the compute power required to harvest valuable knowledge from Big Data.
Here is my perspective
Today, During a Management Development Program at Radisson Hotel, Noida.
Participant from PSUs like NTPC, GAIL and HR Personnel from Corporate with more than 20 years of experience.
A grand Teaching Learning Experience
My presentation on Big Data in Defence and National Security, Presented at Geo Intelligence Asia 2017, dated 21nd-24th August 2017, with the address on ‘Big Data Analytics for Defence and National Security’ at Putrajaya International Convention Centre, Malaysia.
This PPT contains entire content in short. My book on ANN under the title "SOFT COMPUTING" with Watson Publication and my classmates can be referred together.
State of Artificial intelligence Report 2023kuntobimo2016
Artificial intelligence (AI) is a multidisciplinary field of science and engineering whose goal is to create intelligent machines.
We believe that AI will be a force multiplier on technological progress in our increasingly digital, data-driven world. This is because everything around us today, ranging from culture to consumer products, is a product of intelligence.
The State of AI Report is now in its sixth year. Consider this report as a compilation of the most interesting things we’ve seen with a goal of triggering an informed conversation about the state of AI and its implication for the future.
We consider the following key dimensions in our report:
Research: Technology breakthroughs and their capabilities.
Industry: Areas of commercial application for AI and its business impact.
Politics: Regulation of AI, its economic implications and the evolving geopolitics of AI.
Safety: Identifying and mitigating catastrophic risks that highly-capable future AI systems could pose to us.
Predictions: What we believe will happen in the next 12 months and a 2022 performance review to keep us honest.
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdfGetInData
Recently we have observed the rise of open-source Large Language Models (LLMs) that are community-driven or developed by the AI market leaders, such as Meta (Llama3), Databricks (DBRX) and Snowflake (Arctic). On the other hand, there is a growth in interest in specialized, carefully fine-tuned yet relatively small models that can efficiently assist programmers in day-to-day tasks. Finally, Retrieval-Augmented Generation (RAG) architectures have gained a lot of traction as the preferred approach for LLMs context and prompt augmentation for building conversational SQL data copilots, code copilots and chatbots.
In this presentation, we will show how we built upon these three concepts a robust Data Copilot that can help to democratize access to company data assets and boost performance of everyone working with data platforms.
Why do we need yet another (open-source ) Copilot?
How can we build one?
Architecture and evaluation
Analysis insight about a Flyball dog competition team's performanceroli9797
Insight of my analysis about a Flyball dog competition team's last year performance. Find more: https://github.com/rolandnagy-ds/flyball_race_analysis/tree/main
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeWalaa Eldin Moustafa
Dynamic policy enforcement is becoming an increasingly important topic in today’s world where data privacy and compliance is a top priority for companies, individuals, and regulators alike. In these slides, we discuss how LinkedIn implements a powerful dynamic policy enforcement engine, called ViewShift, and integrates it within its data lake. We show the query engine architecture and how catalog implementations can automatically route table resolutions to compliance-enforcing SQL views. Such views have a set of very interesting properties: (1) They are auto-generated from declarative data annotations. (2) They respect user-level consent and preferences (3) They are context-aware, encoding a different set of transformations for different use cases (4) They are portable; while the SQL logic is only implemented in one SQL dialect, it is accessible in all engines.
#SQL #Views #Privacy #Compliance #DataLake
Global Situational Awareness of A.I. and where its headedvikram sood
You can see the future first in San Francisco.
Over the past year, the talk of the town has shifted from $10 billion compute clusters to $100 billion clusters to trillion-dollar clusters. Every six months another zero is added to the boardroom plans. Behind the scenes, there’s a fierce scramble to secure every power contract still available for the rest of the decade, every voltage transformer that can possibly be procured. American big business is gearing up to pour trillions of dollars into a long-unseen mobilization of American industrial might. By the end of the decade, American electricity production will have grown tens of percent; from the shale fields of Pennsylvania to the solar farms of Nevada, hundreds of millions of GPUs will hum.
The AGI race has begun. We are building machines that can think and reason. By 2025/26, these machines will outpace college graduates. By the end of the decade, they will be smarter than you or I; we will have superintelligence, in the true sense of the word. Along the way, national security forces not seen in half a century will be un-leashed, and before long, The Project will be on. If we’re lucky, we’ll be in an all-out race with the CCP; if we’re unlucky, an all-out war.
Everyone is now talking about AI, but few have the faintest glimmer of what is about to hit them. Nvidia analysts still think 2024 might be close to the peak. Mainstream pundits are stuck on the wilful blindness of “it’s just predicting the next word”. They see only hype and business-as-usual; at most they entertain another internet-scale technological change.
Before long, the world will wake up. But right now, there are perhaps a few hundred people, most of them in San Francisco and the AI labs, that have situational awareness. Through whatever peculiar forces of fate, I have found myself amongst them. A few years ago, these people were derided as crazy—but they trusted the trendlines, which allowed them to correctly predict the AI advances of the past few years. Whether these people are also right about the next few years remains to be seen. But these are very smart people—the smartest people I have ever met—and they are the ones building this technology. Perhaps they will be an odd footnote in history, or perhaps they will go down in history like Szilard and Oppenheimer and Teller. If they are seeing the future even close to correctly, we are in for a wild ride.
Let me tell you what we see.
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Data and AI
Round table discussion of vector databases, unstructured data, ai, big data, real-time, robots and Milvus.
A lively discussion with NJ Gen AI Meetup Lead, Prasad and Procure.FYI's Co-Found
1. Cyber Crimes in India:
Present Status & Proposed Reforms
drneetaa@gmail.com
2. Cyber Crimes
• Combination of Crime and Computer is ‘Cyber Crime’.They are of two types:
• Computer as aWeapon
• Credit Card Frauds
• IPRViolations
• Pornography
• DrugTrafficking
• HumanTrafficking
• Computer as aTarget
• Phishing
• Hacking
• Virus/Worm Attacks
3. Common Cyber-crimes
• Common Cyber-crime scenarios
• Harassment via fake public profile on social networking site
• Online Hate Community
• Email Account Hacking
• Credit Card Fraud
• Web Defacement
• IntroducingViruses,Worms, Backdoors, Rootkits,Trojans, Bugs
• CyberTerrorism
• Online sale of illegal Articles
• Cyber Pornography
• Phishing and Email Scams
• Theft of Confidential Information
• Source CodeTheft
• Tax Evasion and Money Laundering
• Online ShareTrading Fraud
7. Hypothesis
• All the cyber crimes are NOT intimated to the cyber police in India.
• All cyber crimes are NOT properly investigated (and charge sheeted) by cyber police.
• All cyber cases brought before the court are NOT properly handled by court.
• All cyber criminals are NOT prosecuted by court because of technical problems.
• The general public is NOT aware of types of cyber crimes and how to protect themselves from
cyber crimes.
• The Indian cyber police are NOT trained to handle cyber crimes effectively.
• The Indian cyber police are NOT equipped to handle cyber crimes effectively.
• The Indian law courts (and its officials) are NOT trained to handle cyber crimes effectively.
• The Indian law courts (and it’s officials) are NOT equipped to handle cyber crimes effectively.
• The Indian government has NOT been able to effectively handle and control
9. IT Act 2000
IT Legation deals with :
Legal Regal Recognition of Electronic Documentation
Legal Recognition of Digital Signature
Offenses and Contraventions
Justice Dispensation Systems forCyber Crimes
10. Provisions of IT Act 2000
• Email would now be a valid and legal form of communication
• Companies shall now be able to carry out electronic commerce using the legal
infrastructure
• Digital signatures have been given legal validity and sanction in the Act.
• Corporate companies will be in the business of being Certifying Authorities for
issuing Digital Signatures Certificates.
• Allows Government to issue notification on the web thus heralding e- governance.
• Companies can file any form, application or any other document with any office,
authority, body or agency owned or controlled by the appropriate Government in
electronic form
• A monetary damage, not exceeding Rs.1 crore; if anyone breaks into the computer
systems or network and cause loss.The damages or copies data.
11. Specific Exclusion(s)
• In the following cases, the IT Act is not applicable.:
• Negotiable instrument (other than a cheque) as per section 13 of Negotiable
Instruments Act 1881
• A power-of attorney as defined in section 1A of the Powers-of-AttorneyAct, 18882
• A trust as defined in section 3 of IndianTrusts Act, 1882
• A will as defined in clause (h) of section 2 of the Indian SuccessionAct 1925 including
any other testamentary disposition
12. Amendments as per IT Act 2008
• The following departments were included :
• Telecom Services
• Network Services
• Internet Services
• Web Hosting Services
13. Salient Features of IT Act 2008
• Focus of Data Privacy
• Focus on Information Security
• Defining Cyber Cafe
• Making digital signature technology neutral
• Defining reasonable security practices to be followed by Corporate
• Redefining the role of intermediaries
• Recognizing the role of Indian Computer Emergency ResponseTeam
• Inclusion of some additional cyber crimes like child pornography and cyber
terrorism
• Authorizing an inspector to investigate cyber offenses
14. LIMITATIONS
• While enough teeth have been given by the Law, yet, due to lack of intent,
meticulous planning and knowledge of Hi-tech intricacies, the offenders
slip away from the clutches of Law.To overcome a HiTech Intelligent Task
Force (HTITF)is required.
• There is a lot of scope for automation and Artificial Intelligence, who can
scan the 24 hr, 365 day video captured data?We need Big Data Analytics
and AI based algorithms to assist us.
18. • Preparing a data Bank with photographs, descriptions and relevant important
information about anti-national elements.
• Keeping strict vigil on printing /distribution of literature pamphlets,
magazines and propaganda on electronic media to prevent anti-national
designs of ISI.
• Preparing updated information system, incorporating the latest details about
membership, foreign linkages, weapons, transport, bank accounts, lockers,
passports, associates in the bureaucracy, e- mail accounts, mobile phone
numbers, fax and other phone numbers, etc.
• Movement pattern Identification
General Strategy
19. • Having constant interaction with chartered accountants, I.T. department,
brokers of the stock exchange, property dealers etc. to keep a close watch on
the financial activities of the key players.
• Keeping a close watch on the activities of the hardcore gangsters, public
servants, politicians, support groups, by effective physical surveillance and
telephone & mail interception.
• Identification of financial transactions that appear to launder funds. Havala
and trans border financial activity, foreign funding put to a closer scrutiny.
General Strategy
20. TECHNICAL INTELLIGENCE
Technology at the state level and experts to intercept terrorist e-mails, satellite phone calls and monitor
banking channels
WHAT NEEDS TO BE DONE
21. Challenges of Big Data Analytics
• Format variation of data
• Fast moving streaming data
• Highly distributed Input source
• High dimensionally of data
• Trust worthiness of data analytics
• Noisy or Poor quality of data
• Scalability of algorithm
• Feature extraction
• Imbalance input data
• Inadequate data storage
• Unsummarized & uncategorized data
• Data indexing & classification
• Fast information retrieval.
22. Challenges Ahead of Cyber Crime
• Can we balance data collection for the purpose of national security with
privacy concerns?
• How can we stop the crime to happen?
• What can be done to mitigate the risks of false positives?
• How do we translate the insights into operational relevance?
24. Finally….
• We need very intelligent, passionate and committed cyber workforce.
• Rate Cyber policing very coveted
• Admire them
25. Bibliography
• www.terrorism.com
• www.siteinstitute.org
• www.counterterrorismblog.org
• www.e-prism.org
• www.jamestown.org
• www.alemarah.org
• Deep learning applications and challenges in big data analytics Najafabadi et.al., Journal of
Big Data, Springer, 2016
• Big data classification: Problems and challenges in network intrusion prediction with machine
learning, Suthaharan, Pittsburg, 2013
• Training products of Experts by minimizing contrastive divergence, Hinton G, Neural
Compute, 2002