This document summarizes a research paper on protecting private information in online social networks. The paper proposes a Protected Online Social Network (POSN) system that uses cryptographic techniques like RC4, AES and RSA to encrypt user data. The POSN system provides different privacy levels for user profiles and sharing that control who can access information. It encrypts sensitive user data with symmetric and asymmetric encryption and redistributes encryption keys when privacy settings or friends lists change to strengthen security. The POSN aims to offer the functionality of online social networks while enhancing privacy through encryption methods and access controls.
My Privacy My decision: Control of Photo Sharing on Online Social NetworksIRJET Journal
This document summarizes a research paper that proposes a facial recognition system to help users control photo sharing on social networks while protecting privacy. It discusses how photo sharing on social networks can unintentionally reveal private user information through tags, comments or metadata. The proposed system would recognize faces in photos and allow users to choose privacy settings during the photo posting process. It would also use private user photos to train the facial recognition model while preserving privacy through a distributed consensus method. The goal is to give users more awareness and control over how their photos are shared and help prevent unintended disclosure of personal information.
Threats and Anti-threats Strategies for Social Networking WebsitesIJCNCJournal
The document discusses threats and anti-threat strategies for social networking websites. It describes several types of cyber threats to social networks, including malware, phishing, trojan horses, and leakage of confidential information. The document also analyzes privacy-related threats and traditional network threats that users may face. It recommends anti-threat strategies like restricting private information sharing, examining potential privacy leaks, and developing privacy-preserving technologies.
Detecting and Resolving Privacy Conflicts in Online Social NetworksIRJET Journal
This document discusses privacy issues with sharing data on online social networks. It proposes an approach to enable collaborative privacy management of shared data between multiple users. The key issues are that current social networks only allow individual users to control privacy of their own data, but not over data involving multiple users. The proposed approach aims to provide a system and mechanisms for managing privacy of data associated with groups of users on social networks in a collaborative way.
Online Social Network (OSN) sites act as a medium to spread their own views, activities and their thoughts to some camaraderie. Contents of this network are spread over web, so it was hard to determine by a human decision. Currently, they do not provide any mechanism to ensure privacy concerns towards data associated with each user. Due to this problem, number of users lacks from their ownership control. In this paper, we proposed AC2P (Activity Control-Access Control Protocol) for information control on the web. Alternatively, Tag Refinement strategy determines illegal tagging over images and send notification about particular image spread within different communities/groups. These techniques reduce risk of information flow and avoid unwanted tagging toward images.
IRJET- Secure Social Network using Text MiningIRJET Journal
This document proposes a secure social network that uses text mining techniques. It discusses authenticating users with Aadhar numbers to allow only one account per user. It aims to restrict improper words and vulgar images/videos by maintaining dictionaries of abusive terms and notifying users about tagged inappropriate content. The proposed system focuses on privacy, restricting multiple accounts and abusive content through authentication, keyword detection, and notification processes to make user profiles and posts more secure.
Security techniques for intelligent spam sensing and anomaly detection in onl...IJECEIAES
The recent advances in communication and mobile technologies made it easier to access and share information for most people worldwide. Among the most powerful information spreading platforms are the Online Social Networks (OSN)s that allow Internet-connected users to share different information such as instant messages, tweets, photos, and videos. Adding to that many governmental and private institutions use the OSNs such as Twitter for official announcements. Consequently, there is a tremendous need to provide the required level of security for OSN users. However, there are many challenges due to the different protocols and variety of mobile apps used to access OSNs. Therefore, traditional security techniques fail to provide the needed security and privacy, and more intelligence is required. Computational intelligence adds high-speed computation, fault tolerance, adaptability, and error resilience when used to ensure security in OSN apps. This research provides a comprehensive related work survey and investigates the application of artificial neural networks for intrusion detection systems and spam filtering for OSNs. In addition, we use the concept of social graphs and weighted cliques in the detection of suspicious behavior of certain online groups and to prevent further planned actions such as cyber/terrorist attacks before they happen.
Social Networking Sites have become the means of the communication and have
experienced growth in the recent years. As these sites offer services for free of costs are
attracting the people all around the world. Some technologies are emerging in the field of
Internet but still the users are facing the security leakages by unauthorized users. Many of
the Social Sites are managed by the Third Party Domains which keep track of all the user
information along with the access details. Most Online Social Networking (OSN) Sites
provide an “accept all or nothing” mechanism for managing permission from Third Party
Access (TPA) to access user’s private data [3]. The Social Media sites do not provide any
mechanism for privacy on the shared data among the multiple users. Many users share their
personal information without knowing about the cyber thefts and risks associated with it.
From the survey it has been found that the teenagers are least concerned about the
navigating privacy. Privacy associated with the Social media is the very crucial thing.
Different methods are discussed regarding sharing of the personal information and leakage
of this information through different mediums. Different models are also proposed in this
paper regarding the privacy control of third party access of the personal information. An
approach is proposed which allows users to share their access control configuration for TPA
s with their friends who can reuse and rate such configurations [3]
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...Maurice Dawson
Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have preinstalled security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunityfor malicious cyber attackers to hack into the various popular devices. Traditional security software found in desktop computing platforms, such as firewalls, antivirus, and encryption, is widely used by the general public in mobile devices. Moreover, mobile devices are even more vulnerable than personal desktop computers because more people are using mobile devices to do personal tasks. This review attempts to display the importance of developing a national security policy created for mobile devices in order to protect sensitive and confidential data. Results of this review provide methods to address security related issues in mobile devices.
My Privacy My decision: Control of Photo Sharing on Online Social NetworksIRJET Journal
This document summarizes a research paper that proposes a facial recognition system to help users control photo sharing on social networks while protecting privacy. It discusses how photo sharing on social networks can unintentionally reveal private user information through tags, comments or metadata. The proposed system would recognize faces in photos and allow users to choose privacy settings during the photo posting process. It would also use private user photos to train the facial recognition model while preserving privacy through a distributed consensus method. The goal is to give users more awareness and control over how their photos are shared and help prevent unintended disclosure of personal information.
Threats and Anti-threats Strategies for Social Networking WebsitesIJCNCJournal
The document discusses threats and anti-threat strategies for social networking websites. It describes several types of cyber threats to social networks, including malware, phishing, trojan horses, and leakage of confidential information. The document also analyzes privacy-related threats and traditional network threats that users may face. It recommends anti-threat strategies like restricting private information sharing, examining potential privacy leaks, and developing privacy-preserving technologies.
Detecting and Resolving Privacy Conflicts in Online Social NetworksIRJET Journal
This document discusses privacy issues with sharing data on online social networks. It proposes an approach to enable collaborative privacy management of shared data between multiple users. The key issues are that current social networks only allow individual users to control privacy of their own data, but not over data involving multiple users. The proposed approach aims to provide a system and mechanisms for managing privacy of data associated with groups of users on social networks in a collaborative way.
Online Social Network (OSN) sites act as a medium to spread their own views, activities and their thoughts to some camaraderie. Contents of this network are spread over web, so it was hard to determine by a human decision. Currently, they do not provide any mechanism to ensure privacy concerns towards data associated with each user. Due to this problem, number of users lacks from their ownership control. In this paper, we proposed AC2P (Activity Control-Access Control Protocol) for information control on the web. Alternatively, Tag Refinement strategy determines illegal tagging over images and send notification about particular image spread within different communities/groups. These techniques reduce risk of information flow and avoid unwanted tagging toward images.
IRJET- Secure Social Network using Text MiningIRJET Journal
This document proposes a secure social network that uses text mining techniques. It discusses authenticating users with Aadhar numbers to allow only one account per user. It aims to restrict improper words and vulgar images/videos by maintaining dictionaries of abusive terms and notifying users about tagged inappropriate content. The proposed system focuses on privacy, restricting multiple accounts and abusive content through authentication, keyword detection, and notification processes to make user profiles and posts more secure.
Security techniques for intelligent spam sensing and anomaly detection in onl...IJECEIAES
The recent advances in communication and mobile technologies made it easier to access and share information for most people worldwide. Among the most powerful information spreading platforms are the Online Social Networks (OSN)s that allow Internet-connected users to share different information such as instant messages, tweets, photos, and videos. Adding to that many governmental and private institutions use the OSNs such as Twitter for official announcements. Consequently, there is a tremendous need to provide the required level of security for OSN users. However, there are many challenges due to the different protocols and variety of mobile apps used to access OSNs. Therefore, traditional security techniques fail to provide the needed security and privacy, and more intelligence is required. Computational intelligence adds high-speed computation, fault tolerance, adaptability, and error resilience when used to ensure security in OSN apps. This research provides a comprehensive related work survey and investigates the application of artificial neural networks for intrusion detection systems and spam filtering for OSNs. In addition, we use the concept of social graphs and weighted cliques in the detection of suspicious behavior of certain online groups and to prevent further planned actions such as cyber/terrorist attacks before they happen.
Social Networking Sites have become the means of the communication and have
experienced growth in the recent years. As these sites offer services for free of costs are
attracting the people all around the world. Some technologies are emerging in the field of
Internet but still the users are facing the security leakages by unauthorized users. Many of
the Social Sites are managed by the Third Party Domains which keep track of all the user
information along with the access details. Most Online Social Networking (OSN) Sites
provide an “accept all or nothing” mechanism for managing permission from Third Party
Access (TPA) to access user’s private data [3]. The Social Media sites do not provide any
mechanism for privacy on the shared data among the multiple users. Many users share their
personal information without knowing about the cyber thefts and risks associated with it.
From the survey it has been found that the teenagers are least concerned about the
navigating privacy. Privacy associated with the Social media is the very crucial thing.
Different methods are discussed regarding sharing of the personal information and leakage
of this information through different mediums. Different models are also proposed in this
paper regarding the privacy control of third party access of the personal information. An
approach is proposed which allows users to share their access control configuration for TPA
s with their friends who can reuse and rate such configurations [3]
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...Maurice Dawson
Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have preinstalled security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunityfor malicious cyber attackers to hack into the various popular devices. Traditional security software found in desktop computing platforms, such as firewalls, antivirus, and encryption, is widely used by the general public in mobile devices. Moreover, mobile devices are even more vulnerable than personal desktop computers because more people are using mobile devices to do personal tasks. This review attempts to display the importance of developing a national security policy created for mobile devices in order to protect sensitive and confidential data. Results of this review provide methods to address security related issues in mobile devices.
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...IOSR Journals
This document discusses an automated model for detecting fake profiles and botnets in online social networks. It begins with background on the prevalence of fake accounts, which can compromise user privacy and security. Next, it reviews related work on using data hiding techniques like steganography and watermarking to embed information in profile pictures in order to identify suspicious accounts. The proposed model aims to automatically detect fake profiles and botnets to replace current manual methods that are costly and labor-intensive.
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...IJMIT JOURNAL
This document discusses the need for a critical cyber defense strategy and privacy policy in Bangladesh. It summarizes the current state of cybersecurity in Bangladesh, including common vulnerabilities like malware infections and a lack of proper cybersecurity policies. It recommends that Bangladesh develop a strong national cybersecurity strategy to protect critical infrastructure from increasing cyber threats, and suggests implementing blockchain technology to create a decentralized and secure network architecture.
This document summarizes four different privacy preserving policies for online social networks: Safebook, Lockr, flyByNight, and Persona. Safebook is a decentralized social network that leverages real-life trust between users, with users' data stored and routed by trusted peers. Lockr improves privacy in centralized and decentralized content sharing systems. flyByNight aims to mitigate privacy risks through encrypting information on Facebook. Persona allows users to control who accesses their information. The policies differ in their trust models, ability to form flexible groups, and architectural approaches. Persona is identified as the relatively best method based on these parameters.
Computer viruses are a nightmare for the computer world. It is a threat to any user who uses a computer network. The computer will not be infected by a virus if the computer is not connected to the outside world. In this case, this is the internet. The Internet can be used as a medium for the spread of the virus to the fullest. There are many types of viruses that are spread through the internet. Some of them are aimed at making money, and there are only as a disrupt activity and computer performance. Some techniques are done to prevent the spread of the virus. Here will be explained how to tackle the virus optimally. The benefit is that the computer used will be free from virus attacks and safe to exchange data publicly. Techniques used include the prevention and prevention of viruses against computer networks are to know the characteristics and workings of the virus.
This series of articles about security trips how to make social networking is more secure on the top social networks. Part I. Facebook.
http://hakin9.org/hakin9-042012-cyber-warfare/
This approach mainly based on examines how many differences do exist between BlackBerry OS and new BlackBerry OS based on QNX OS. It highlights whether one techniques provide more easy implementation, investigation and handling or not, what common differences examiners may encounter and what they should as concept be involved to forensic handling with these platforms because a Playbook OS is completely a new approach.
http://hakin9.org/dont-be-mocked-secure-your-system-0512-2/
With the rise of Web 2.0, Twitter has become a tool of choice for universities looking to increase their digital footprint. However there is not much guidance given into the protections of these tweets or the secure integration of Twitter into other Web 2.0 applications. As the debate for cyber threat continue to increase, these tweets must be protected and delivered in a manner that protects the sender. Explored in this report are the methods in which Twitter and its data can be exploited for nefarious use.
There is no argument about the popularity of the social platforms such as Facebook, YouTube, twitter, etc. These platforms can be used to stay in touch with your friends, increase sales revenues for organizations and as a collaboration tool to stay connected with the public. However, each of these benefits comes at a cost, putting your private information at a risk/ exposed. We aim to discuss the common security risks associated with usage of these platforms including risk mitigation strategies.
Intro Video : https://www.youtube.com/watch?v=zxpa4dNVd3c
Presentation for Computer Society of Sri Lanka on 24 Feb 2015
Online Social Networks: 5 threats and 5 ways to use them safelyTom Eston
This document discusses online social networks and some of the threats associated with using them. It defines online social networks as online communities where users can share interests and interact through chat, messaging, and other features. The most popular networks are used most by Generation Y and teens. Some key threats include cyberbullying, stalking, sexual predators, vulnerabilities in applications that can compromise privacy settings, spear phishing spam, and the aggregation of personal data by networks. It provides five ways to safely use social networks such as setting private defaults, being wary of applications, limiting personal information shared, only accepting friend requests from known people, and only posting information one is comfortable with others seeing.
IRJET- ESBA based Privacy Protection in OSCSIRJET Journal
This document proposes a novel method called ESBA (Encryption Scheme Based on Attributes) to address privacy and security issues in online social communication systems (OSCS). It first discusses existing problems with OSCS privacy protection methods. It then describes the proposed approach, which uses ESBA encryption along with hierarchy genetic algorithm and radial based administration to preprocess and encrypt user information in the OSCS. The document outlines the initialization, encryption, key generation and decryption processes used in the ESBA method. It also provides results from implementing and analyzing the proposed approach, showing improvements over existing methods in terms of encryption accuracy, data loss and secret key generation time.
The document discusses various security threats that exist on social networks, including phishing attacks, vulnerabilities in third-party applications, weak password security, cross-site scripting attacks, clickjacking, insecure frameworks, SQL injections, and DDOS attacks. It provides examples of each type of attack, such as phishing links that install malware, apps that access too much user data if hacked, passwords being easily guessed, malicious JavaScript that can be installed through photo tags, and privacy settings being exploited to view other profiles. The document emphasizes that with over a billion users exchanging personal information, social networks face many potential threats but that Facebook focuses heavily on security to prevent hacks of its own system.
Cyber crimes are on the rise as companies and individuals connect to the internet. While connectivity provides benefits, it also increases vulnerabilities to threats like hacking, viruses, and data theft. The document outlines the history of computer crimes and defines different types like fraud, forgery, and unauthorized access. It discusses hacking techniques such as using trapdoors, decoys, and call forwarding to intercept systems. The conclusion emphasizes the importance of security measures like passwords, antivirus software, and incident response teams to help prevent and address cyber crimes.
Improving Cyber Security with VMware NSXDavid Hopland
Cyber security breaches have been increasing significantly in recent years across both public and private sectors. The average cost per breach in 2014 was $5.85 million according to the Ponemon Institute. Traditional perimeter security methods are no longer effective as attackers can now move laterally inside networks once gaining initial access. VMware's NSX platform enables microsegmentation by automating firewall provisioning and policies for individual workloads and virtual machines. This isolates applications and prevents lateral movement inside the network, potentially mitigating breaches like those seen at the USPS, DOS and NOAA. NSX provides security through virtual network isolation, segmentation of multitier networks, and advanced services across segments.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology
How to Like Social Media Network SecurityBrian Honan
This is my presentation from Source Dublin 2014 on cyber crime and social media.
Social media networks provide individuals and businesses with exciting opportunities to communicate and collaborate with others throughout the world. But with these opportunities come a number of security challenges and risks. This talk will outline how social media networks can pose various threats to businesses, from information leakage, reputational damage, to social engineering profiling, and vectors for enabling compromise of corporate systems. Social media networks also enable the rapid dissemination of news which in the event of an information security breach could either save or destroy an organisations reputation. Understanding and dealing with these challenges will enable companies to like and favourite social media networks in a secure way.
Instant Messaging is both boon and bane in the corporate world, where security professionals alternately lock users out or throw up their hands helplessly -- finding the middle ground begins with solid user education.
This document summarizes a study that used finite element analysis to analyze the micromechanical behavior of fiber-reinforced polymer composites with different fiber materials (Hexply Im7-8552, Kelvar, and Carbon T300) embedded in an epoxy resin matrix. A unit cell model was developed and analyzed under tensile loading to evaluate engineering properties like modulus and Poisson's ratio for various fiber volume fractions. Interfacial stresses at the fiber-matrix interface were also estimated. Results from the finite element analysis were validated against theoretical models. The study aims to predict the mechanical behavior and properties of unidirectional fiber composites subjected to longitudinal tensile loading.
Customer experience management a new dimension to customer retentionIAEME Publication
This document discusses customer experience management (CEM) as a new dimension for customer retention. CEM involves strategically managing customer experiences across all touchpoints. It focuses on evaluating gaps between customer expectations and the product/service offering in order to improve the marketing strategy. CEM takes a more holistic approach than CRM by considering qualitative perceptions and feelings in addition to quantitative data. Effective CEM requires leadership involvement, cross-functional collaboration, focusing on strategic customers, understanding what they value, delivering on brand promises, training employees, and measuring customer experiences.
Static analysis of thin beams by interpolation method approachIAEME Publication
The document summarizes static analysis of thin beams using the interpolation method approach in MATLAB. It discusses Euler-Bernoulli beam theory, defines slope, deflection and radius of curvature of bending beams. It reviews literature on thin plate analysis and beam bending formulations. The objective is to develop a MATLAB program to calculate slope and deflection at any point between intervals for isotropic materials. Examples are given for cantilever beams with different load cases and the equations to solve for slope and deflection are shown.
Relevance of ethics in business a study on public transport systemIAEME Publication
This document summarizes a study on ethics in the public transport system of Karnataka State Road Transport Corporation (KSRTC) buses in India. The study found that KSRTC has maintained customer loyalty despite poor service quality through adhering to business ethics. Key ethical practices included collecting accurate fares, avoiding conductor cheating, guaranteed bus arrival times, providing alternate buses during breakdowns, and destination-based routes. While customer attitudes toward enquiry staff and timetables needed improvement, most saw conductor behavior as acceptable and driver behavior as good. Overall, the majority of customers viewed KSRTC's adherence to business ethics positively and felt it distinguished the service from competitors.
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...IOSR Journals
This document discusses an automated model for detecting fake profiles and botnets in online social networks. It begins with background on the prevalence of fake accounts, which can compromise user privacy and security. Next, it reviews related work on using data hiding techniques like steganography and watermarking to embed information in profile pictures in order to identify suspicious accounts. The proposed model aims to automatically detect fake profiles and botnets to replace current manual methods that are costly and labor-intensive.
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...IJMIT JOURNAL
This document discusses the need for a critical cyber defense strategy and privacy policy in Bangladesh. It summarizes the current state of cybersecurity in Bangladesh, including common vulnerabilities like malware infections and a lack of proper cybersecurity policies. It recommends that Bangladesh develop a strong national cybersecurity strategy to protect critical infrastructure from increasing cyber threats, and suggests implementing blockchain technology to create a decentralized and secure network architecture.
This document summarizes four different privacy preserving policies for online social networks: Safebook, Lockr, flyByNight, and Persona. Safebook is a decentralized social network that leverages real-life trust between users, with users' data stored and routed by trusted peers. Lockr improves privacy in centralized and decentralized content sharing systems. flyByNight aims to mitigate privacy risks through encrypting information on Facebook. Persona allows users to control who accesses their information. The policies differ in their trust models, ability to form flexible groups, and architectural approaches. Persona is identified as the relatively best method based on these parameters.
Computer viruses are a nightmare for the computer world. It is a threat to any user who uses a computer network. The computer will not be infected by a virus if the computer is not connected to the outside world. In this case, this is the internet. The Internet can be used as a medium for the spread of the virus to the fullest. There are many types of viruses that are spread through the internet. Some of them are aimed at making money, and there are only as a disrupt activity and computer performance. Some techniques are done to prevent the spread of the virus. Here will be explained how to tackle the virus optimally. The benefit is that the computer used will be free from virus attacks and safe to exchange data publicly. Techniques used include the prevention and prevention of viruses against computer networks are to know the characteristics and workings of the virus.
This series of articles about security trips how to make social networking is more secure on the top social networks. Part I. Facebook.
http://hakin9.org/hakin9-042012-cyber-warfare/
This approach mainly based on examines how many differences do exist between BlackBerry OS and new BlackBerry OS based on QNX OS. It highlights whether one techniques provide more easy implementation, investigation and handling or not, what common differences examiners may encounter and what they should as concept be involved to forensic handling with these platforms because a Playbook OS is completely a new approach.
http://hakin9.org/dont-be-mocked-secure-your-system-0512-2/
With the rise of Web 2.0, Twitter has become a tool of choice for universities looking to increase their digital footprint. However there is not much guidance given into the protections of these tweets or the secure integration of Twitter into other Web 2.0 applications. As the debate for cyber threat continue to increase, these tweets must be protected and delivered in a manner that protects the sender. Explored in this report are the methods in which Twitter and its data can be exploited for nefarious use.
There is no argument about the popularity of the social platforms such as Facebook, YouTube, twitter, etc. These platforms can be used to stay in touch with your friends, increase sales revenues for organizations and as a collaboration tool to stay connected with the public. However, each of these benefits comes at a cost, putting your private information at a risk/ exposed. We aim to discuss the common security risks associated with usage of these platforms including risk mitigation strategies.
Intro Video : https://www.youtube.com/watch?v=zxpa4dNVd3c
Presentation for Computer Society of Sri Lanka on 24 Feb 2015
Online Social Networks: 5 threats and 5 ways to use them safelyTom Eston
This document discusses online social networks and some of the threats associated with using them. It defines online social networks as online communities where users can share interests and interact through chat, messaging, and other features. The most popular networks are used most by Generation Y and teens. Some key threats include cyberbullying, stalking, sexual predators, vulnerabilities in applications that can compromise privacy settings, spear phishing spam, and the aggregation of personal data by networks. It provides five ways to safely use social networks such as setting private defaults, being wary of applications, limiting personal information shared, only accepting friend requests from known people, and only posting information one is comfortable with others seeing.
IRJET- ESBA based Privacy Protection in OSCSIRJET Journal
This document proposes a novel method called ESBA (Encryption Scheme Based on Attributes) to address privacy and security issues in online social communication systems (OSCS). It first discusses existing problems with OSCS privacy protection methods. It then describes the proposed approach, which uses ESBA encryption along with hierarchy genetic algorithm and radial based administration to preprocess and encrypt user information in the OSCS. The document outlines the initialization, encryption, key generation and decryption processes used in the ESBA method. It also provides results from implementing and analyzing the proposed approach, showing improvements over existing methods in terms of encryption accuracy, data loss and secret key generation time.
The document discusses various security threats that exist on social networks, including phishing attacks, vulnerabilities in third-party applications, weak password security, cross-site scripting attacks, clickjacking, insecure frameworks, SQL injections, and DDOS attacks. It provides examples of each type of attack, such as phishing links that install malware, apps that access too much user data if hacked, passwords being easily guessed, malicious JavaScript that can be installed through photo tags, and privacy settings being exploited to view other profiles. The document emphasizes that with over a billion users exchanging personal information, social networks face many potential threats but that Facebook focuses heavily on security to prevent hacks of its own system.
Cyber crimes are on the rise as companies and individuals connect to the internet. While connectivity provides benefits, it also increases vulnerabilities to threats like hacking, viruses, and data theft. The document outlines the history of computer crimes and defines different types like fraud, forgery, and unauthorized access. It discusses hacking techniques such as using trapdoors, decoys, and call forwarding to intercept systems. The conclusion emphasizes the importance of security measures like passwords, antivirus software, and incident response teams to help prevent and address cyber crimes.
Improving Cyber Security with VMware NSXDavid Hopland
Cyber security breaches have been increasing significantly in recent years across both public and private sectors. The average cost per breach in 2014 was $5.85 million according to the Ponemon Institute. Traditional perimeter security methods are no longer effective as attackers can now move laterally inside networks once gaining initial access. VMware's NSX platform enables microsegmentation by automating firewall provisioning and policies for individual workloads and virtual machines. This isolates applications and prevents lateral movement inside the network, potentially mitigating breaches like those seen at the USPS, DOS and NOAA. NSX provides security through virtual network isolation, segmentation of multitier networks, and advanced services across segments.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology
How to Like Social Media Network SecurityBrian Honan
This is my presentation from Source Dublin 2014 on cyber crime and social media.
Social media networks provide individuals and businesses with exciting opportunities to communicate and collaborate with others throughout the world. But with these opportunities come a number of security challenges and risks. This talk will outline how social media networks can pose various threats to businesses, from information leakage, reputational damage, to social engineering profiling, and vectors for enabling compromise of corporate systems. Social media networks also enable the rapid dissemination of news which in the event of an information security breach could either save or destroy an organisations reputation. Understanding and dealing with these challenges will enable companies to like and favourite social media networks in a secure way.
Instant Messaging is both boon and bane in the corporate world, where security professionals alternately lock users out or throw up their hands helplessly -- finding the middle ground begins with solid user education.
This document summarizes a study that used finite element analysis to analyze the micromechanical behavior of fiber-reinforced polymer composites with different fiber materials (Hexply Im7-8552, Kelvar, and Carbon T300) embedded in an epoxy resin matrix. A unit cell model was developed and analyzed under tensile loading to evaluate engineering properties like modulus and Poisson's ratio for various fiber volume fractions. Interfacial stresses at the fiber-matrix interface were also estimated. Results from the finite element analysis were validated against theoretical models. The study aims to predict the mechanical behavior and properties of unidirectional fiber composites subjected to longitudinal tensile loading.
Customer experience management a new dimension to customer retentionIAEME Publication
This document discusses customer experience management (CEM) as a new dimension for customer retention. CEM involves strategically managing customer experiences across all touchpoints. It focuses on evaluating gaps between customer expectations and the product/service offering in order to improve the marketing strategy. CEM takes a more holistic approach than CRM by considering qualitative perceptions and feelings in addition to quantitative data. Effective CEM requires leadership involvement, cross-functional collaboration, focusing on strategic customers, understanding what they value, delivering on brand promises, training employees, and measuring customer experiences.
Static analysis of thin beams by interpolation method approachIAEME Publication
The document summarizes static analysis of thin beams using the interpolation method approach in MATLAB. It discusses Euler-Bernoulli beam theory, defines slope, deflection and radius of curvature of bending beams. It reviews literature on thin plate analysis and beam bending formulations. The objective is to develop a MATLAB program to calculate slope and deflection at any point between intervals for isotropic materials. Examples are given for cantilever beams with different load cases and the equations to solve for slope and deflection are shown.
Relevance of ethics in business a study on public transport systemIAEME Publication
This document summarizes a study on ethics in the public transport system of Karnataka State Road Transport Corporation (KSRTC) buses in India. The study found that KSRTC has maintained customer loyalty despite poor service quality through adhering to business ethics. Key ethical practices included collecting accurate fares, avoiding conductor cheating, guaranteed bus arrival times, providing alternate buses during breakdowns, and destination-based routes. While customer attitudes toward enquiry staff and timetables needed improvement, most saw conductor behavior as acceptable and driver behavior as good. Overall, the majority of customers viewed KSRTC's adherence to business ethics positively and felt it distinguished the service from competitors.
This document reports on a study of reference services in college libraries in Coimbatore City, India. It begins with an introduction that describes the importance of reference services and the role of college libraries. It then discusses the objectives and methodology of the study. The study examined reference services and facilities across engineering and arts/science college libraries through a survey of 120 students. Key findings included that over 65% of respondents were satisfied with reference services. While there was no significant difference in satisfaction between engineering and arts/science colleges for services, a significant difference was found for reference facilities. Over 80% were satisfied with availability of reference books. The study provides insights into college library reference services in Coimbatore City.
A location based least-cost scheduling for data-intensive applicationsIAEME Publication
This document summarizes a research paper that proposes a location-based least-cost scheduling algorithm for transferring multiple data-intensive files simultaneously to multiple compute nodes in a grid environment. The proposed model includes an optimized meta-scheduler that receives multiple files, predicts the optimal number of parallel TCP streams to use for each file transfer based on sampling, and schedules the files to compute nodes using a greedy algorithm that considers location and cost. Experimental results showed the optimized model achieved better transfer times and throughput compared to non-optimized transfers.
Delineation of irrigation infrastructural, potential and land useIAEME Publication
This study assessed irrigation infrastructure in Muzaffarnagar district, India using satellite imagery. The main canals are Tikri Branch, Nirpura Branch, and Kurthal Branch, with several minor canals branching off. Satellite imagery was used to measure canal lengths and compare to official data. Most canal lengths matched well, but Gadidbra minor was found to be shorter than officially reported. Irrigation potentials were also estimated and found to match closely with official data, except for Gadidbra minor which had lower potential than expected due to its shorter length. Land use/land cover of the study area was classified, finding agricultural land covers 48.64% of the total area.
A new parameter proposed for route selection in routing protocolIAEME Publication
This document proposes a new parameter called Route Selection Parameter (RSP) to improve quality of service in mobile ad hoc network routing. RSP is calculated for each node based on its packet forwarding ratio, mobility, bandwidth, and number of neighbors. The best route is selected as the one with the maximum total RSP value. Conventional routing protocols like AODV and DSR usually use hop count as the only metric, but RSP aims to provide a more comprehensive metric based on multiple node characteristics. The document outlines the RSP calculation and discusses how it could be used to select routes, then lists some quantitative performance metrics for evaluating routing protocols.
This document discusses an OFDM-based wireless LAN transmitter architecture. It begins with an abstract that describes OFDM signals used in 802.11 wireless LAN systems and the need for high data rate wireless communication. It then provides background on OFDM and orthogonal frequency division multiplexing. The document describes the proposed OFDM-based wireless LAN architecture, which includes modules for time and frequency recovery, channel estimation, and channel coding to protect data from noise and interference during transmission.
Self compacting mortars of binary and ternary cementitious blendingIAEME Publication
This document discusses experimental research on self-compacting mortars with binary and ternary cementitious blends containing metakaolin and fly ash. Fifteen self-compacting mortar mixes were prepared with varying percentages of cement replacement using metakaolin and fly ash, along with water-to-binder ratios of 0.32, 0.36, and 0.40. The fresh properties of the mortar mixes such as mini-slump flow and setting time were evaluated. Test results showed that ternary blends containing both metakaolin and fly ash improved the fresh properties and rheology of the mortar mixes compared to those with only binary blends. The mini-slump cone test was
Hydrodynamic study of anadjustableheightpacked column operatingIAEME Publication
This document summarizes a study on the hydrodynamic performance of an adjustable height packed column operating on the principle of an air lift pump. The column is packed with glass rings and operates in a closed water loop with air injection at the base. Water flow rates, pressure drop, gas holdup, and efficiency were measured for different air flow rates and submersion depths. The results show that water flow rate increases with air flow rate and submersion depth. Pressure drop follows a second order polynomial relationship with submersion depth. Gas holdup also increases with air flow rate and decreases with water flow rate. The system provides good mixing with low power consumption and could be used for applications involving heat and mass transfer.
A slotted e shaped stacked layers patch antenna forIAEME Publication
This document summarizes the design and performance of a slotted E-shaped stacked patch antenna intended for applications in the 5.15-5.85 GHz frequency band, such as WiMax and WLAN. The antenna design involves adding slots to an E-shaped rectangular patch and using a stacked layers technique with an air gap to achieve wideband operation. Simulation results show the antenna achieves a return loss between -10 dB from 5.15-5.85 GHz, with omnidirectional radiation patterns and a maximum gain of 4.7 dB across the band. A parametric study is presented analyzing the effects of varying different slot and patch dimensions on the return loss performance.
Service quality measurement and customers perception about the services of su...IAEME Publication
This document summarizes a research study on measuring customer perceptions of service quality at supermarkets. The study uses the SERVQUAL model to assess customer expectations and perceptions across five dimensions of service quality: tangibles, reliability, responsiveness, assurance, and empathy. The researchers administered SERVQUAL surveys to customers of a supermarket called XYZ to analyze gaps between customer expectations and perceptions of service quality. The goal was to identify areas of weak service quality that require improvement in order to increase customer satisfaction.
Modelling & simulation of active shunt filter for compensation of system harmIAEME Publication
This document summarizes a research paper on modeling and simulating an active shunt filter to compensate for power system harmonics. The paper describes the topology of the active filter, which uses a single-phase voltage source inverter with four IGBT switches. Simple time-domain techniques are used to extract harmonic components from the load current. A pulse-width modulation technique generates gate signals to control the inverter. The active filter injects compensating harmonic currents to cancel harmonics from nonlinear loads, making the source current sinusoidal. Simulation results are presented to verify the active filter's performance.
A comparative study of the effect of infill walls on seismic performance of reiIAEME Publication
This document discusses a comparative study on the effect of infill walls on the seismic performance of reinforced concrete buildings. It summarizes different approaches to modeling infill walls as equivalent diagonal struts, including elastic analysis, ultimate load, plastic analysis, and finite element analysis approaches. The key findings are that infill walls reduce displacements and time period while increasing base shear. Modeling the strength and stiffness of infill walls is important for accurately analyzing seismic behavior, as ignoring infill walls can lead to unconservative design of soft-story buildings.
Este documento presenta información sobre el sector circular en trigonometría. Define el sector circular como la porción de círculo limitada por dos radios y un arco de circunferencia. Explica cómo calcular la longitud de arco, el área del sector circular, y el número de vueltas de una rueda al desplazarse sobre una superficie curva. También cubre conceptos como el área del trapecio circular.
El documento describe las tres etapas por las que ha pasado la sociedad debido a los cambios tecnológicos: la era del fordismo se caracterizó por la producción en cadena y el trabajo rígido, dando paso al postfordismo con mayor diversidad de productos, consumo e importancia de las ideas; finalmente, la sociedad del conocimiento trajo la falta de barreras de tiempo y espacio para la información, el individualismo y los cambios en las relaciones sociales debido a la globalización.
El documento resume la historia de la incorporación de la informática en la educación en Argentina desde comienzos del siglo XX hasta la actualidad. Algunos hitos incluyen el desarrollo de las primeras máquinas de enseñar en la década de 1920, la introducción de computadoras en las escuelas argentinas en la década de 1980 para enseñar informática, y programas recientes como Educ.ar y Conectar Igualdad para brindar acceso a la tecnología a todas las escuelas.
Este documento es el catálogo 2011-2012 de Decoplantas Montesclaros S.L.S., una empresa situada en Reinosa, Cantabria, que vende plantas artificiales y naturales. El catálogo incluye precios y descripciones de varios tipos de plantas artificiales, plantas naturales grandes, plantas de mesa y plantas navideñas. También proporciona información sobre las condiciones comerciales como forma de pago, IVA, gastos de transporte, fecha de entrega y devoluciones.
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...IRJET Journal
This document discusses privacy and security issues related to social media. It begins by introducing how social media has become integral to modern life but also presents privacy risks if users share personal information publicly. Some key privacy threats on social media mentioned include data breaches, passive attacks like unauthorized data collection, and active attacks trying to access other user accounts. The document then reviews literature around social media security and privacy concerns. It outlines common security risks like unmonitored accounts, human error, and vulnerabilities in third-party apps linked to social media profiles. Potential threats to social networks are categorized as data breaches, passive attacks, and active attacks. The document concludes that social networks pose significant security and privacy risks and all users should take steps to protect
This document discusses methods for measuring privacy in online social networks. It first introduces the concept of the Privacy Index (PIDX), which quantifies a user's privacy exposure based on their visible attributes. It then describes calculating a user's Privacy Quotient (PQ) using a naive approach, which considers the sensitivity and visibility of shared profile items. Finally, it proposes a new model called Privacy Armor that would measure privacy leaks in unstructured data like posts and messages using an Item Response Theory model to calculate sensitivity, visibility, and privacy quotient. The goal is to warn users about unintended sharing of private information online.
This document summarizes four different privacy preserving policies for online social networks: Safebook, Lockr, flyByNight, and Persona. Safebook is a decentralized social network that leverages real-life trust between users, with users' data stored and routed by trusted peers. Lockr improves privacy in centralized and decentralized content sharing systems. flyByNight aims to mitigate privacy risks through encrypting information on Facebook. Persona allows users to control who accesses their information. The policies differ in their trust models, ability to form flexible groups, and architectural approaches. Persona is identified as the relatively best method based on these parameters.
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSZac Darcy
This document summarizes a research paper that proposes a framework called SecureWall to implement fine-grained access controls on online social networks to mitigate privacy leaks. The framework combines multiple security models - Chinese Wall policy for community privacy, Biba model for integrity, and Bell-LaPadula (BLP) model for confidentiality. It was implemented on a prototype social network and evaluated based on information flow metrics and user surveys. Results found the framework reduced information leakage compared to popular social networks while maintaining usability and sociability according to majority of user feedback.
The document discusses security issues related to social networks. It notes that social networks store large amounts of private user data, making personal information vulnerable to malicious actors like hackers. It emphasizes the importance of using strong, unique passwords for each account and limiting personal details shared publicly. The document also examines privacy controls, identity theft, malware, social engineering and other fraud risks associated with using social media platforms. Protecting privacy and being aware of potential threats are key to staying secure in social networks.
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...IJITE
The data mining figures out accurate information for requesting user after the raw data is analyzed. Among
lots of developments, data mining face hot issues on security, privacy and integrity. Data mining use one of the latest technique called privacy preserving data publishing (PPDP), which enforces security for the digital information provided by governments, corporations, companies and individuals in social networks. People become embarrassed when adversary tries to know the sensitive information shared. Sensitive information is gathered through the vertex and multi community identities of the user. Vertex identity denotes the self-information of user like name, address, mobile number, etc. Multi community identity denotes the community group in which the user participates. To prevent such identity disclosures, this paper proposes KW -structural diversity anonymity technique, for the protection of vertex and multi community identity disclosure. In KW -structural diversity anonymity technique, k is privacy level applied for users and W is an adversary monitoring time.
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...ijtsrd
Online Social Networks OSNs are providing a diversity of application for human users to network through families, friends and even strangers. One of such application, friend search engine, allows the universal public to inquiry individual client friend lists and has been gaining popularity recently. Proper design, this application may incorrectly disclose client private relationship information. Existing work has a privacy perpetuation clarification that can effectively boost OSNs' sociability while protecting users' friendship privacy against attacks launched by individual malicious requestors. In this project proposed an advanced collusion attack, where a victim user's friendship privacy can be compromise from side to side a series of cautiously designed queries coordinately launched by multiple malicious requestors. The result of the proposed collusion attack is validate through synthetic and real world social network data sets. The project on the advanced collusion attacks will help us design a more vigorous and securer friend search engine on OSNs in the near future. R. Brintha | H. Parveen Bagum "Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Search Engine" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-4 , June 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31687.pdf Paper Url :https://www.ijtsrd.com/computer-science/world-wide-web/31687/retrieving-hidden-friends-a-collusion-privacy-attack-against-online-friend-search-engine/r-brintha
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...ijsptm
Protecting personal information privacy has become a controversial issue among online social network
providers and users. Most social network providers have developed several techniques to decrease threats
and risks to the users’ privacy. These risks include the misuse of personal information which may lead to
illegal acts such as identity theft. This study aims to measure the awareness of users on protecting their
personal information privacy, as well as the suitability of the privacy systems which they use to modify
privacy settings. Survey results show high percentage of the use of smart phones for web services but the
current privacy settings for online social networks need to be improved to support different type of mobile
phones screens. Because most users use their mobilephones for Internet services, privacy settings that are
compatible with mobile phones need to be developed. The method of selecting privacy settings should also
be simplified to provide users with a clear picture of the data that will be shared with others. Results of this
study can be used to develop a new privacy system which will help users control their personal information
easily from different devices, including mobile Internet devices and computers.
Protecting Facebook Account From Malicious Attacking ApplicationsIRJET Journal
This document discusses techniques for protecting Facebook accounts from malicious attacking applications. It proposes a novel rank-based image watermarking strategy that embeds a secret message into images using digital watermarking and encryption. The strategy splits images into pieces, embeds watermarks into DCT coefficients of blocks, and encrypts the secret message before combining it with the watermarks. This provides high security for secret messages shared through image watermarking while maintaining imperceptibility and robustness against attacks. The system can detect hackers who try to decrypt images with the wrong secret key by notifying an administrator.
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...Eswar Publications
In recent time the use of communication gadgets (mobile phones, laptop, desktop etc.) and service for online communication between two parties over a long distance has become sine-qua-non. Some criminal minded people are using this online communication method to deceive their prey via proxy communication where individual claiming to be discussing is not really the one. In this paper, we focus on prevention of identity impersonation attacks in an Online Communication System. Peer-peer Audio Visual Communication System is design to enhance security through online communication system by revealing the identity of the communicators and records the communication if necessary. Embedded application system was design for mobile and desktop devices for audio
visual charting using modern IT devices.
Terrorism Analysis through Social Media using Data MiningIRJET Journal
This document presents a study that uses deep learning models like Deep Neural Networks (DNN) and Convolutional Neural Networks (CNN) to analyze terrorism through detecting toxicity in social media text data. The study aims to classify text data into categories like toxicity, severe toxicity, obscenity, threat, insult or identity hate. It provides an overview of DNN and CNN models for text classification and compares their methodology, architecture and performance. The models are trained on preprocessed social media data related to terrorist activities and aim to accurately predict the toxicity level and classify tweets for concerned authorities to make informed decisions.
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...IRJET Journal
This document proposes a framework called PrivRank that enables privacy-preserving social recommendations. PrivRank aims to protect users' private data from inference attacks while still allowing personalized ranking-based recommendations. It does this by obfuscating users' public data before publishing it to third parties. This allows third parties to provide accurate recommendations without accessing sensitive private user information. The framework is designed to efficiently provide continuous privacy protection for users' data streams over time as new data is published.
Collusion-resistant multiparty data sharing in social networksIJECEIAES
The number of users on online social networks (OSNs) has grown tremendously over the past few years, with sites like Facebook amassing over a billion users. With the popularity of OSNs, the increase in privacy risk from the large volume of sensitive and private data is inevitable. While there are many features for access control for an individual user, most OSNs still need concrete mechanisms to preserve the privacy of data shared between multiple users. The proposed method uses metrics such as identity leakage (IL) and strength of interaction (SoI) to fine-tune the scenarios that use privacy risk and sharing loss to identify and resolve conflicts. In addition to conflict resolution, bot detection is also done to mitigate collusion attacks. The final decision to share the data item is then ascertained based on whether it passes the threshold condition for the above metrics.
Exploring machine learning techniques for fake profile detection in online so...IJECEIAES
The online social network is the largest network, more than 4 billion users use social media and with its rapid growth, the risk of maintaining the integrity of data has tremendously increased. There are several kinds of security challenges in online social networks (OSNs). Many abominable behaviors try to hack social sites and misuse the data available on these sites. Therefore, protection against such behaviors has become an essential requirement. Though there are many types of security threats in online social networks but, one of the significant threats is the fake profile. Fake profiles are created intentionally with certain motives, and such profiles may be targeted to steal or acquire sensitive information and/or spread rumors on online social networks with specific motives. Fake profiles are primarily used to steal or extract information by means of friendly interaction online and/or misusing online data available on social sites. Thus, fake profile detection in social media networks is attracting the attention of researchers. This paper aims to discuss various machine learning (ML) methods used by researchers for fake profile detection to explore the further possibility of improvising the machine learning models for speedy results.
A Survey On Privacy Policy Inference for Social ImagesIRJET Journal
This document summarizes research on privacy issues related to sharing photos and content on social networks. It discusses how improved technology has led to increased privacy violations as users share large volumes of images with many people. The document reviews existing approaches to automating privacy settings for shared content, but notes that these may be insufficient for addressing unique privacy needs of images. It proposes generating user profiles and maintaining privacy inference policies based on user profiles, image content and metadata. The goal is to develop better systems to help users easily configure privacy settings for images shared on social networks.
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSIJCI JOURNAL
Recommender systems have become an important tool for personalization of online services. Generating
recommendations in online services depends on privacy-sensitive data collected from the users. Traditional
data protection mechanisms focus on access control and secure transmission, which provide security only
against malicious third parties, but not the service provider. This creates a serious privacy risk for the
users. This paper aims to protect the private data against the service provider while preserving the
functionality of the system. This paper provides a general framework that, with the help of a preprocessing
phase that is independent of the inputs of the users, allows an arbitrary number of users to securely
outsource a computation to two non-colluding external servers. This paper use these techniques to
implement a secure recommender system based on collaborative filtering that becomes more secure, and
significantly more efficient than previously known implementations of such systems.
IRJET- Security from Threats of Computer SystemIRJET Journal
Governments are finding cyber security to be a major challenge as they store far more data than the private sector, often in older and more vulnerable systems, and are regularly targeted by hackers and sophisticated malware. The document discusses various threats to computer systems like malware, viruses, phishing, and zero-day attacks. It proposes solutions like usernames and passwords, firewalls, email encryption, updated anti-virus software, and regular backups to provide security from these threats. Analysis of existing security solutions can help determine weaknesses in data security.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...CSEIJJournal
In machine learning, the intelligence of a developed model is greatly influenced by the dataset used for the
target domain on which the developed model will be deployed. Social media platform has experienced
more of hackers’ attacks on the platform in recent time. To identify a hacker on the platform, there are two
possible ways. The first is to use the activities of the user while the second is to use the supplied details the
user registered the account with. To adequately identify a social media user as hacker proactively, there
are relevant user details called features that can be used to determine whether a social media user is a
hacker or not. In this paper, an exploratory data analysis was carried out to determine the best features
that can be used by a predictive model to proactively identify hackers on the social media platform. A web
crawler was developed to mine the user dataset on which exploratory data analysis was carried out to
select the best features for the dataset which could be used to correctly identify a hacker on a social media
platform.
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...CSEIJJournal
In machine learning, the intelligence of a developed model is greatly influenced by the dataset used for the
target domain on which the developed model will be deployed. Social media platform has experienced
more of hackers’ attacks on the platform in recent time. To identify a hacker on the platform, there are two
possible ways. The first is to use the activities of the user while the second is to use the supplied details the
user registered the account with. To adequately identify a social media user as hacker proactively, there
are relevant user details called features that can be used to determine whether a social media user is a
hacker or not. In this paper, an exploratory data analysis was carried out to determine the best features
that can be used by a predictive model to proactively identify hackers on the social media platform. A web
crawler was developed to mine the user dataset on which exploratory data analysis was carried out to
select the best features for the dataset which could be used to correctly identify a hacker on a social media
platform.
Similar to Posn private information protection in online social networks 2 (20)
Submission Deadline: 30th September 2022
Acceptance Notification: Within Three Days’ time period
Online Publication: Within 24 Hrs. time Period
Expected Date of Dispatch of Printed Journal: 5th October 2022
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
White layer thickness (WLT) formed and surface roughness in wire electric discharge turning (WEDT) of tungsten carbide composite has been made to model through response surface methodology (RSM). A Taguchi’s standard Design of experiments involving five input variables with three levels has been employed to establish a mathematical model between input parameters and responses. Percentage of cobalt content, spindle speed, Pulse on-time, wire feed and pulse off-time were changed during the experimental tests based on the Taguchi’s orthogonal array L27 (3^13). Analysis of variance (ANOVA) revealed that the mathematical models obtained can adequately describe performance within the parameters of the factors considered. There was a good agreement between the experimental and predicted values in this study.
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
The study explores the reasons for a transgender to become entrepreneurs. In this study transgender entrepreneur was taken as independent variable and reasons to become as dependent variable. Data were collected through a structured questionnaire containing a five point Likert Scale. The study examined the data of 30 transgender entrepreneurs in Salem Municipal Corporation of Tamil Nadu State, India. Simple Random sampling technique was used. Garrett Ranking Technique (Percentile Position, Mean Scores) was used as the analysis for the present study to identify the top 13 stimulus factors for establishment of trans entrepreneurial venture. Economic advancement of a nation is governed upon the upshot of a resolute entrepreneurial doings. The conception of entrepreneurship has stretched and materialized to the socially deflated uncharted sections of transgender community. Presently transgenders have smashed their stereotypes and are making recent headlines of achievements in various fields of our Indian society. The trans-community is gradually being observed in a new light and has been trying to achieve prospective growth in entrepreneurship. The findings of the research revealed that the optimistic changes are taking place to change affirmative societal outlook of the transgender for entrepreneurial ventureship. It also laid emphasis on other transgenders to renovate their traditional living. The paper also highlights that legislators, supervisory body should endorse an impartial canons and reforms in Tamil Nadu Transgender Welfare Board Association.
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
Since ages gender difference is always a debatable theme whether caused by nature, evolution or environment. The birth of a transgender is dreadful not only for the child but also for their parents. The pain of living in the wrong physique and treated as second class victimized citizen is outrageous and fully harboured with vicious baseless negative scruples. For so long, social exclusion had perpetuated inequality and deprivation experiencing ingrained malign stigma and besieged victims of crime or violence across their life spans. They are pushed into the murky way of life with a source of eternal disgust, bereft sexual potency and perennial fear. Although they are highly visible but very little is known about them. The common public needs to comprehend the ravaged arrogance on these insensitive souls and assist in integrating them into the mainstream by offering equal opportunity, treat with humanity and respect their dignity. Entrepreneurship in the current age is endorsing the gender fairness movement. Unstable careers and economic inadequacy had inclined one of the gender variant people called Transgender to become entrepreneurs. These tiny budding entrepreneurs resulted in economic transition by means of employment, free from the clutches of stereotype jobs, raised standard of living and handful of financial empowerment. Besides all these inhibitions, they were able to witness a platform for skill set development that ignited them to enter into entrepreneurial domain. This paper epitomizes skill sets involved in trans-entrepreneurs of Thoothukudi Municipal Corporation of Tamil Nadu State and is a groundbreaking determination to sightsee various skills incorporated and the impact on entrepreneurship.
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
The banking and financial services industries are experiencing increased technology penetration. Among them, the banking industry has made technological advancements to better serve the general populace. The economy focused on transforming the banking sector's system into a cashless, paperless, and faceless one. The researcher wants to evaluate the user's intention for utilising a mobile banking application. The study also examines the variables affecting the user's behaviour intention when selecting specific applications for financial transactions. The researcher employed a well-structured questionnaire and a descriptive study methodology to gather the respondents' primary data utilising the snowball sampling technique. The study includes variables like performance expectations, effort expectations, social impact, enabling circumstances, and perceived risk. Each of the aforementioned variables has a major impact on how users utilise mobile banking applications. The outcome will assist the service provider in comprehending the user's history with mobile banking applications.
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
Technology upgradation in banking sector took the economy to view that payment mode towards online transactions using mobile applications. This system enabled connectivity between banks, Merchant and user in a convenient mode. there are various applications used for online transactions such as Google pay, Paytm, freecharge, mobikiwi, oxygen, phonepe and so on and it also includes mobile banking applications. The study aimed at evaluating the predilection of the user in adopting digital transaction. The study is descriptive in nature. The researcher used random sample techniques to collect the data. The findings reveal that mobile applications differ with the quality of service rendered by Gpay and Phonepe. The researcher suggest the Phonepe application should focus on implementing the application should be user friendly interface and Gpay on motivating the users to feel the importance of request for money and modes of payments in the application.
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
The prototype of a voice-based ATM for visually impaired using Arduino is to help people who are blind. This uses RFID cards which contain users fingerprint encrypted on it and interacts with the users through voice commands. ATM operates when sensor detects the presence of one person in the cabin. After scanning the RFID card, it will ask to select the mode like –normal or blind. User can select the respective mode through voice input, if blind mode is selected the balance check or cash withdraw can be done through voice input. Normal mode procedure is same as the existing ATM.
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
There is increasing acceptability of emotional intelligence as a major factor in personality assessment and effective human resource management. Emotional intelligence as the ability to build capacity, empathize, co-operate, motivate and develop others cannot be divorced from both effective performance and human resource management systems. The human person is crucial in defining organizational leadership and fortunes in terms of challenges and opportunities and walking across both multinational and bilateral relationships. The growing complexity of the business world requires a great deal of self-confidence, integrity, communication, conflict and diversity management to keep the global enterprise within the paths of productivity and sustainability. Using the exploratory research design and 255 participants the result of this original study indicates strong positive correlation between emotional intelligence and effective human resource management. The paper offers suggestions on further studies between emotional intelligence and human capital development and recommends for conflict management as an integral part of effective human resource management.
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
Our life journey, in general, is closely defined by the way we understand the meaning of why we coexist and deal with its challenges. As we develop the "inspiration economy", we could say that nearly all of the challenges we have faced are opportunities that help us to discover the rest of our journey. In this note paper, we explore how being faced with the opportunity of being a close carer for an aging parent with dementia brought intangible discoveries that changed our insight of the meaning of the rest of our life journey.
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
The main objective of this study is to analyze the impact of aspects of Organizational Culture on the Effectiveness of the Performance Management System (PMS) in the Health Care Organization at Thanjavur. Organizational Culture and PMS play a crucial role in present-day organizations in achieving their objectives. PMS needs employees’ cooperation to achieve its intended objectives. Employees' cooperation depends upon the organization’s culture. The present study uses exploratory research to examine the relationship between the Organization's culture and the Effectiveness of the Performance Management System. The study uses a Structured Questionnaire to collect the primary data. For this study, Thirty-six non-clinical employees were selected from twelve randomly selected Health Care organizations at Thanjavur. Thirty-two fully completed questionnaires were received.
Living in 21st century in itself reminds all of us the necessity of police and its administration. As more and more we are entering into the modern society and culture, the more we require the services of the so called ‘Khaki Worthy’ men i.e., the police personnel. Whether we talk of Indian police or the other nation’s police, they all have the same recognition as they have in India. But as already mentioned, their services and requirements are different after the like 26th November, 2008 incidents, where they without saving their own lives has sacrificed themselves without any hitch and without caring about their respective family members and wards. In other words, they are like our heroes and mentors who can guide us from the darkness of fear, militancy, corruption and other dark sides of life and so on. Now the question arises, if Gandhi would have been alive today, what would have been his reaction/opinion to the police and its functioning? Would he have some thing different in his mind now what he had been in his mind before the partition or would he be going to start some Satyagraha in the form of some improvement in the functioning of the police administration? Really these questions or rather night mares can come to any one’s mind, when there is too much confusion is prevailing in our minds, when there is too much corruption in the society and when the polices working is also in the questioning because of one or the other case throughout the India. It is matter of great concern that we have to thing over our administration and our practical approach because the police personals are also like us, they are part and parcel of our society and among one of us, so why we all are pin pointing towards them.
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
The goal of this study was to see how talent management affected employee retention in the selected IT organizations in Chennai. The fundamental issue was the difficulty to attract, hire, and retain talented personnel who perform well and the gap between supply and demand of talent acquisition and retaining them within the firms. The study's main goals were to determine the impact of talent management on employee retention in IT companies in Chennai, investigate talent management strategies that IT companies could use to improve talent acquisition, performance management, career planning and formulate retention strategies that the IT firms could use. The respondents were given a structured close-ended questionnaire with the 5 Point Likert Scale as part of the study's quantitative research design. The target population consisted of 289 IT professionals. The questionnaires were distributed and collected by the researcher directly. The Statistical Package for Social Sciences (SPSS) was used to collect and analyse the questionnaire responses. Hypotheses that were formulated for the various areas of the study were tested using a variety of statistical tests. The key findings of the study suggested that talent management had an impact on employee retention. The studies also found that there is a clear link between the implementation of talent management and retention measures. Management should provide enough training and development for employees, clarify job responsibilities, provide adequate remuneration packages, and recognise employees for exceptional performance.
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
Globally, Millions of dollars were spent by the organizations for employing skilled Information Technology (IT) professionals. It is costly to replace unskilled employees with IT professionals possessing technical skills and competencies that aid in interconnecting the business processes. The organization’s employment tactics were forced to alter by globalization along with technological innovations as they consistently diminish to remain lean, outsource to concentrate on core competencies along with restructuring/reallocate personnel to gather efficiency. As other jobs, organizations or professions have become reasonably more appropriate in a shifting employment landscape, the above alterations trigger both involuntary as well as voluntary turnover. The employee view on jobs is also afflicted by the COVID-19 pandemic along with the employee-driven labour market. So, having effective strategies is necessary to tackle the withdrawal rate of employees. By associating Emotional Intelligence (EI) along with Talent Management (TM) in the IT industry, the rise in attrition rate was analyzed in this study. Only 303 respondents were collected out of 350 participants to whom questionnaires were distributed. From the employees of IT organizations located in Bangalore (India), the data were congregated. A simple random sampling methodology was employed to congregate data as of the respondents. Generating the hypothesis along with testing is eventuated. The effect of EI and TM along with regression analysis between TM and EI was analyzed. The outcomes indicated that employee and Organizational Performance (OP) were elevated by effective EI along with TM.
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
By implementing talent management strategy, organizations would have the option to retain their skilled professionals while additionally working on their overall performance. It is the course of appropriately utilizing the ideal individuals, setting them up for future top positions, exploring and dealing with their performance, and holding them back from leaving the organization. It is employee performance that determines the success of every organization. The firm quickly obtains an upper hand over its rivals in the event that its employees having particular skills that cannot be duplicated by the competitors. Thus, firms are centred on creating successful talent management practices and processes to deal with the unique human resources. Firms are additionally endeavouring to keep their top/key staff since on the off chance that they leave; the whole store of information leaves the firm's hands. The study's objective was to determine the impact of talent management on organizational performance among the selected IT organizations in Chennai. The study recommends that talent management limitedly affects performance. On the off chance that this talent is appropriately management and implemented properly, organizations might benefit as much as possible from their maintained assets to support development and productivity, both monetarily and non-monetarily.
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
Banking regulations act of India, 1949 defines banking as “acceptance of deposits for the purpose of lending or investment from the public, repayment on demand or otherwise and withdrawable through cheques, drafts order or otherwise”, the major participants of the Indian financial system are commercial banks, the financial institution encompassing term lending institutions. Investments institutions, specialized financial institution and the state level development banks, non banking financial companies (NBFC) and other market intermediaries such has the stock brokers and money lenders are among the oldest of the certain variants of NBFC and the oldest market participants. The asset quality of banks is one of the most important indicators of their financial health. The Indian banking sector has been facing severe problems of increasing Non- Performing Assets (NPAs). The NPAs growth directly and indirectly affects the quality of assets and profitability of banks. It also shows the efficiency of banks credit risk management and the recovery effectiveness. NPA do not generate any income, whereas, the bank is required to make provisions for such as assets that why is a double edge weapon. This paper outlines the concept of quality of bank loans of different types like Housing, Agriculture and MSME loans in state Haryana of selected public and private sector banks. This study is highlighting problems associated with the role of commercial bank in financing Small and Medium Scale Enterprises (SME). The overall objective of the research was to assess the effect of the financing provisions existing for the setting up and operations of MSMEs in the country and to generate recommendations for more robust financing mechanisms for successful operation of the MSMEs, in turn understanding the impact of MSME loans on financial institutions due to NPA. There are many research conducted on the topic of Non- Performing Assets (NPA) Management, concerning particular bank, comparative study of public and private banks etc. In this paper the researcher is considering the aggregate data of selected public sector and private sector banks and attempts to compare the NPA of Housing, Agriculture and MSME loans in state Haryana of public and private sector banks. The tools used in the study are average and Anova test and variance. The findings reveal that NPA is common problem for both public and private sector banks and is associated with all types of loans either that is housing loans, agriculture loans and loans to SMES. NPAs of both public and private sector banks show the increasing trend. In 2010-11 GNPA of public and private sector were at same level it was 2% but after 2010-11 it increased in many fold and at present there is GNPA in some more than 15%. It shows the dark area of Indian banking sector.
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
An experiment conducted in this study found that BaSO4 changed Nylon 6's mechanical properties. By changing the weight ratios, BaSO4 was used to make Nylon 6. This Researcher looked into how hard Nylon-6/BaSO4 composites are and how well they wear. Experiments were done based on Taguchi design L9. Nylon-6/BaSO4 composites can be tested for their hardness number using a Rockwell hardness testing apparatus. On Nylon/BaSO4, the wear behavior was measured by a wear monitor, pinon-disc friction by varying reinforcement, sliding speed, and sliding distance, and the microstructure of the crack surfaces was observed by SEM. This study provides significant contributions to ultimate strength by increasing BaSO4 content up to 16% in the composites, and sliding speed contributes 72.45% to the wear rate
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
The majority of the population in India lives in villages. The village is the back bone of the country. Village or rural industries play an important role in the national economy, particularly in the rural development. Developing the rural economy is one of the key indicators towards a country’s success. Whether it be the need to look after the welfare of the farmers or invest in rural infrastructure, Governments have to ensure that rural development isn’t compromised. The economic development of our country largely depends on the progress of rural areas and the standard of living of rural masses. Village or rural industries play an important role in the national economy, particularly in the rural development. Rural entrepreneurship is based on stimulating local entrepreneurial talent and the subsequent growth of indigenous enterprises. It recognizes opportunity in the rural areas and accelerates a unique blend of resources either inside or outside of agriculture. Rural entrepreneurship brings an economic value to the rural sector by creating new methods of production, new markets, new products and generate employment opportunities thereby ensuring continuous rural development. Social Entrepreneurship has the direct and primary objective of serving the society along with the earning profits. So, social entrepreneurship is different from the economic entrepreneurship as its basic objective is not to earn profits but for providing innovative solutions to meet the society needs which are not taken care by majority of the entrepreneurs as they are in the business for profit making as a sole objective. So, the Social Entrepreneurs have the huge growth potential particularly in the developing countries like India where we have huge societal disparities in terms of the financial positions of the population. Still 22 percent of the Indian population is below the poverty line and also there is disparity among the rural & urban population in terms of families living under BPL. 25.7 percent of the rural population & 13.7 percent of the urban population is under BPL which clearly shows the disparity of the poor people in the rural and urban areas. The need to develop social entrepreneurship in agriculture is dictated by a large number of social problems. Such problems include low living standards, unemployment, and social tension. The reasons that led to the emergence of the practice of social entrepreneurship are the above factors. The research problem lays upon disclosing the importance of role of social entrepreneurship in rural development of India. The paper the tendencies of social entrepreneurship in India, to present successful examples of such business for providing recommendations how to improve situation in rural areas in terms of social entrepreneurship development. Indian government has made some steps towards development of social enterprises, social entrepreneurship, and social in- novation, but a lot remains to be improved.
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
Distribution system is a critical link between the electric power distributor and the consumers. Most of the distribution networks commonly used by the electric utility is the radial distribution network. However in this type of network, it has technical issues such as enormous power losses which affect the quality of the supply. Nowadays, the introduction of Distributed Generation (DG) units in the system help improve and support the voltage profile of the network as well as the performance of the system components through power loss mitigation. In this study network reconfiguration was done using two meta-heuristic algorithms Particle Swarm Optimization and Gravitational Search Algorithm (PSO-GSA) to enhance power quality and voltage profile in the system when simultaneously applied with the DG units. Backward/Forward Sweep Method was used in the load flow analysis and simulated using the MATLAB program. Five cases were considered in the Reconfiguration based on the contribution of DG units. The proposed method was tested using IEEE 33 bus system. Based on the results, there was a voltage profile improvement in the system from 0.9038 p.u. to 0.9594 p.u.. The integration of DG in the network also reduced power losses from 210.98 kW to 69.3963 kW. Simulated results are drawn to show the performance of each case.
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
Manufacturing industries have witnessed an outburst in productivity. For productivity improvement manufacturing industries are taking various initiatives by using lean tools and techniques. However, in different manufacturing industries, frugal approach is applied in product design and services as a tool for improvement. Frugal approach contributed to prove less is more and seems indirectly contributing to improve productivity. Hence, there is need to understand status of frugal approach application in manufacturing industries. All manufacturing industries are trying hard and putting continuous efforts for competitive existence. For productivity improvements, manufacturing industries are coming up with different effective and efficient solutions in manufacturing processes and operations. To overcome current challenges, manufacturing industries have started using frugal approach in product design and services. For this study, methodology adopted with both primary and secondary sources of data. For primary source interview and observation technique is used and for secondary source review has done based on available literatures in website, printed magazines, manual etc. An attempt has made for understanding application of frugal approach with the study of manufacturing industry project. Manufacturing industry selected for this project study is Mahindra and Mahindra Ltd. This paper will help researcher to find the connections between the two concepts productivity improvement and frugal approach. This paper will help to understand significance of frugal approach for productivity improvement in manufacturing industry. This will also help to understand current scenario of frugal approach in manufacturing industry. In manufacturing industries various process are involved to deliver the final product. In the process of converting input in to output through manufacturing process productivity plays very critical role. Hence this study will help to evolve status of frugal approach in productivity improvement programme. The notion of frugal can be viewed as an approach towards productivity improvement in manufacturing industries.
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
In this paper, we investigated a queuing model of fuzzy environment-based a multiple channel queuing model (M/M/C) ( /FCFS) and study its performance under realistic conditions. It applies a nonagonal fuzzy number to analyse the relevant performance of a multiple channel queuing model (M/M/C) ( /FCFS). Based on the sub interval average ranking method for nonagonal fuzzy number, we convert fuzzy number to crisp one. Numerical results reveal that the efficiency of this method. Intuitively, the fuzzy environment adapts well to a multiple channel queuing models (M/M/C) ( /FCFS) are very well.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Tatiana Kojar
Skybuffer AI, built on the robust SAP Business Technology Platform (SAP BTP), is the latest and most advanced version of our AI development, reaffirming our commitment to delivering top-tier AI solutions. Skybuffer AI harnesses all the innovative capabilities of the SAP BTP in the AI domain, from Conversational AI to cutting-edge Generative AI and Retrieval-Augmented Generation (RAG). It also helps SAP customers safeguard their investments into SAP Conversational AI and ensure a seamless, one-click transition to SAP Business AI.
With Skybuffer AI, various AI models can be integrated into a single communication channel such as Microsoft Teams. This integration empowers business users with insights drawn from SAP backend systems, enterprise documents, and the expansive knowledge of Generative AI. And the best part of it is that it is all managed through our intuitive no-code Action Server interface, requiring no extensive coding knowledge and making the advanced AI accessible to more users.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.