This document summarizes a research paper that proposes a rule-based entity resolution approach for handling e-grievances more efficiently. The existing e-grievance system relies on timestamps, which can cause delays. The proposed system uses rule-based entity resolution to automatically allocate complaints to departments based on rules. This addresses issues like handling data currency changes over time. Experiments on real and synthetic data show the proposed approach achieves high accuracy and efficiency in entity resolution, even without timestamps. The system provides a more effective way to transmit and track the status of e-grievances.
The project “Passport Automation System” is used in the effective dispatch of passport to all of the applicants. This system adopts a comprehensive approach to minimize the manual work and schedule resources, time in a cogent manner. The core of the system is to get the online registration form (with details such as name, address etc.,) filled by the applicant whose testament is verified for its genuineness by the Passport Automation System with respect to the already existing information in the database.
It aims at improving the efficiency in the Issue of Passport and reduces the complexities involved in it to the maximum possible extent.
Abstraction and Automation: A Software Design Approach for Developing Secure ...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
The project “Passport Automation System” is used in the effective dispatch of passport to all of the applicants. This system adopts a comprehensive approach to minimize the manual work and schedule resources, time in a cogent manner. The core of the system is to get the online registration form (with details such as name, address etc.,) filled by the applicant whose testament is verified for its genuineness by the Passport Automation System with respect to the already existing information in the database.
It aims at improving the efficiency in the Issue of Passport and reduces the complexities involved in it to the maximum possible extent.
Abstraction and Automation: A Software Design Approach for Developing Secure ...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Socio-technical system: Essential characteristics of socio technical systems,
Emergent System Properties, Systems Engineering, Components of system such 9
as organization, people and computers.
Critical system: Types of critical system, A simple safety critical system, Availability and Reliability, Safety and Security of Software systems.
Requirements Engineering Processes: Feasibility study, Requirements elicitation and analysis, Requirements Validations.
System Models: Models and its types, Context Models, Behavioural Models,
Data Models, Object Models, Structured Methods.
Feature Analysis of Estimated Causes of Failures in Medical Device Software a...Yoshio SAKAI
Background/Objectives
<research>
•383 medical device software failures from 1983 to 1997 are analyzed in “FAILURE MODES IN MEDICAL DEVICE SOFTWARE:AN ANALYSIS OF 15 YEARS OF RECALL DATA” (DOLORES R. WALLACE1 and D. RICHARD KUHN, 2001)
•Medical devices are getting more and more relying on software.
<objectives>
•Analyze 86 medical device software failures in FY 2010 and identify the change of the trend of failure causes from the former analysis
•Confirm whether the International standard issued in 2006, IEC 62304 (Medical device software - Software life cycle processes), is effective to new failure causes or not.
An Extended Notation of FTA for Risk Assessment of Software-intensive Medical...Yoshio SAKAI
An extended notation of FTA for risk assessment of software-intensive medical devices
Yoshio Sakai, Seiko Shirasaka and Yasuharu Nishi
It is difficult to assess the risk of software-intensive medical devices. An extended notation of FTA recognizes the risk class before and after the risk control measure and the software in the system affects the top event of FTA.
You can see this content as 6-pages paper from IEEE Website.
Remote administration of bms through android applicationeSAT Journals
Abstract SAN (Storage Area Network) is a committed high-speed network that interconnects data storage devices and multiple servers. It allows the device to appear like locally attached device to the operating system by enhancing storage devices which are accessible to server and consequently secures the manner in which the database connects with the server. Thus enabling design of portable devices that allow the user to control the building constants from remote places.[1][2][3] By gaining the access to control of building constants application like BMS (Building Management System) can be easily configured. BMS in actual is a microprocessor based electronic module or device which can be installed in a building to allow the user to operate, manage and measure real time data of various parameters. Data of the building can be accessed and modified through android app. The protocol used for communication between the app and web server is GPRS.[4][5] BMS is used to securely store and configure rules and parameters of an intelligent building like secured access-control, lighting and temperature etc. Key Words: GPRS, SAN, Microcontroller, Industrial Appliance, Android, Smart building.
ASPECTUAL PATTERNS FOR WEB SERVICES ADAPTATIONijwscjournal
The security policies of an application can change at runtime for some reasons such as the changes on the
user preferences, the performance reasons or the negotiation of security levels between the interacting
parties. If these security policies are embedded in the services, their modifications require to modify the
services, stop and deploy new version. Aspect oriented paradigm provides the possibility to define
separated components that is named aspect. In this paper, in order to fulfill security requirements, we will
classify required changes of services and for each classifications, how aspects injection will be described.
Finally, we will present a pattern for each aspect of each classification.
Its a documentation part for of an Employee Management System designed in Visual C++. The entire documentation is a description for the application made. And, the application is entirely based on OOP (Object Oriented Programming) concepts. Further, If anybody wants the application (entire program) of the same, here's the link - https://github.com/jayantgope/Employee-Management-System.git
Socio-technical system: Essential characteristics of socio technical systems,
Emergent System Properties, Systems Engineering, Components of system such 9
as organization, people and computers.
Critical system: Types of critical system, A simple safety critical system, Availability and Reliability, Safety and Security of Software systems.
Requirements Engineering Processes: Feasibility study, Requirements elicitation and analysis, Requirements Validations.
System Models: Models and its types, Context Models, Behavioural Models,
Data Models, Object Models, Structured Methods.
Feature Analysis of Estimated Causes of Failures in Medical Device Software a...Yoshio SAKAI
Background/Objectives
<research>
•383 medical device software failures from 1983 to 1997 are analyzed in “FAILURE MODES IN MEDICAL DEVICE SOFTWARE:AN ANALYSIS OF 15 YEARS OF RECALL DATA” (DOLORES R. WALLACE1 and D. RICHARD KUHN, 2001)
•Medical devices are getting more and more relying on software.
<objectives>
•Analyze 86 medical device software failures in FY 2010 and identify the change of the trend of failure causes from the former analysis
•Confirm whether the International standard issued in 2006, IEC 62304 (Medical device software - Software life cycle processes), is effective to new failure causes or not.
An Extended Notation of FTA for Risk Assessment of Software-intensive Medical...Yoshio SAKAI
An extended notation of FTA for risk assessment of software-intensive medical devices
Yoshio Sakai, Seiko Shirasaka and Yasuharu Nishi
It is difficult to assess the risk of software-intensive medical devices. An extended notation of FTA recognizes the risk class before and after the risk control measure and the software in the system affects the top event of FTA.
You can see this content as 6-pages paper from IEEE Website.
Remote administration of bms through android applicationeSAT Journals
Abstract SAN (Storage Area Network) is a committed high-speed network that interconnects data storage devices and multiple servers. It allows the device to appear like locally attached device to the operating system by enhancing storage devices which are accessible to server and consequently secures the manner in which the database connects with the server. Thus enabling design of portable devices that allow the user to control the building constants from remote places.[1][2][3] By gaining the access to control of building constants application like BMS (Building Management System) can be easily configured. BMS in actual is a microprocessor based electronic module or device which can be installed in a building to allow the user to operate, manage and measure real time data of various parameters. Data of the building can be accessed and modified through android app. The protocol used for communication between the app and web server is GPRS.[4][5] BMS is used to securely store and configure rules and parameters of an intelligent building like secured access-control, lighting and temperature etc. Key Words: GPRS, SAN, Microcontroller, Industrial Appliance, Android, Smart building.
ASPECTUAL PATTERNS FOR WEB SERVICES ADAPTATIONijwscjournal
The security policies of an application can change at runtime for some reasons such as the changes on the
user preferences, the performance reasons or the negotiation of security levels between the interacting
parties. If these security policies are embedded in the services, their modifications require to modify the
services, stop and deploy new version. Aspect oriented paradigm provides the possibility to define
separated components that is named aspect. In this paper, in order to fulfill security requirements, we will
classify required changes of services and for each classifications, how aspects injection will be described.
Finally, we will present a pattern for each aspect of each classification.
Its a documentation part for of an Employee Management System designed in Visual C++. The entire documentation is a description for the application made. And, the application is entirely based on OOP (Object Oriented Programming) concepts. Further, If anybody wants the application (entire program) of the same, here's the link - https://github.com/jayantgope/Employee-Management-System.git
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.