Posts

Research Outlet: Industry Academia Collaboration Program

Image
In this era of new technologies emerging at an unprecedented fast pace, there is a binding need for collaboration between industry and academia. This article discusses the aspects of such alliance. Role of Academic I nstitut ions Academic I nstitut ions  serve both the industry and academia by providing a workforce, as well as furnishing innovative ideas to start new businesses. Therefore, the two are analogous to two banks of a river with their own independent sides. The two banks can be connected through bridges of science and engineering disciplines to contribute to the betterment of both—the industry and institutes. Therefore, institutes have to keep the curriculum in line with the changing needs of industry. Although it is not a quick and easy process but a continuous update in the syllabus shall keep the students and teachers at par with the demand in the market. The students learn the topics like testing, project leadership, management, professionalism and other skills withi...

What is Cybersecurity?

Cybersecurity is a term with diverse definitions through multiple perspectives. The diversity in its definition satisfies the need of academia, industry and government and non-governmental organizations to manage the cybersecurity challenges. Simple said, cybersecurity is the practice of organizing and collecting resources, structures and processes to protect cyberspace and cyberspace-enabled systems for preventing occurrences of misalignment of true property rights. Cybersecurity is the protection of computer systems and networks from digital attacks, data theft and breach. Cybersecurity or IT security protects critical systems and sensitive information from cyberattacks. It is designed to fight threats against networked systems and applications. The threats may originate from inside or outside of an organization. Cybersecurity management is critical for small, medium and large organizations. In the current era of a plethora of technologies, it is crucial for organizations to hire...

AI in Banking Industry

Artificial Intelligence has played a disruptive role in traditional banking channels with exponential growth of technology. It has influenced the perception of people about banking and comfort of accomplishing banking activities. AI has emerged as an unavoidable and pioneering technology of the business world and AI applications are rigorously utilized in banking and financial services. This article discusses the transformation of banking system from traditional banking to modern digitized banking. It describes how financially excluded people are included into banking through AI-enabled operations. Lastly, the benefits of using AI in banking industry are outlined. Banking System Transformation Banking has evolved from traditional brick and mortar system to a completely transformed way of banking. The industry uses AI-enabled techniques like mobile banking, chatbots for customer service, robots for self-service in banking operations and customized services for customers. Banks use chatb...

IoT: Device Vulnerability & Security Concerns in Wearable Devices

Wearable IoT have broaden and improved the perspective of individuals about their surroundings. A successful IoT device has to be affordable as well as reliable. It should not interfere with other devices and should incorporate mechanisms to remain immune from interferences. It should further ensure effective battery life with perfect functionality and energy efficiency. However, the risks involved in attaining this ideal scenario are many. IoT include a plethora of devices or things like vehicles, smartphones, televisions, wearable devices like fitness tracking devices, smartwatch and Google Glass, etc. These devices are embedded with software applications, sensors and other components for receiving and sending data. A colossus of connected devices is created by inter-connectivity of those devices. This connectivity offers magnificent benefits to people’s lives but it entails certain security and privacy concerns. The most conspicuous among them are the wearable devices which are gain...

IoT and LoRaWAN

The internet of things in the current world needs a wide network to handle a great many nodes well connected to each other and accessing the internet. This requires a network which is capable of handling the huge interconnectivity. The sensors on wireless networks are dependent upon devices with limited energy. This has led the network industry to explore methods with which energy could be saved. Considering the plethora of nodes connected over the internet LoRaWAN is an optimum solution. LoRaWAN is a low range-low power wide area network protocol for internet of things. The Low range-low power technology is being adopted all over the world as it is a licensed, free, low power WAN ecosystem. This protocol can provide smooth connectivity among large numbers of nodes interconnected on the internet. It helps to address problems of bandwidth latency and coverage over large range. It is a feasible technology which allows communication for long-range apps. This review report illustrates th...

Cloud Migration using AWS Cloud-based Services

Image
 Cloud computing is the most trending technology that provides access to computing services over the internet which is mostly based on pay per use model. The characteristics of cloud computing offer elasticity and cost efficiency to the adopting business sectors such as healthcare, supply chain, etc.  This paper discusses Cloud based services offered by Amazon Web Services. The functional and non-functional requirements that a company generally needs are documented. A scalable cloud solution from AWS [3] supporting those requirements is described along with its benefits and disadvantages. A.      Functional Requirements The system requires access to company records whenever needed irrespective of the location of the user. It should allow the users to access, update and manage records. The unique requirements of an organization for using cloud services are enlisted below. AWS Cloud services and resources are capable of fulfilling each of them. Intercloud Connecti...

Wireless Sensor Network Protocol: Directed Diffusion

This protocol for WSN is a data centric query-based protocol where sink floods a query into the network through several routes between the sink and source. The sink supports one of those routes and receives data from that path within shorter time interval. Therefore, multipath delivery can be realized and significant achievement can be attained by adapting subset of network.  The four features of directed diffusion routing protocol include Interests, data, gradients and reinforcement. The query that determines the user’s requirements is the Interest. Processed information is the data. The direction state of node that gets the Interest is the gradient. Multiple gradient paths are used to transmit events from originators of interest. The attribute value pairs that are used to name task descriptions are  example:             type=wheeled vehicle                     //vehicle...