Posts

Showing posts from February, 2021

Wireless Sensor Network Protocol: Sensor Protocol for Information via Negotiation (SPIN)

Image
 A wireless sensor network is formed using multiple small sensors. Such a network is a self- organized infrastructure-less wireless network that monitors environmental conditions on its own and transmit data in a synchronized manner to main location called sink which analyses the data. Sink addresses the queries generated by users by collecting results and providing required information. Routing protocols play an important role in producing efficient and interruption less communication within the nodes of the WSN. Applications using WSN demand quick data transmission with minimum interruption. The service, performance and reliability of the WSN depends on the choice of its routing protocol. This article discusses Sensor protocol for information via negotiation (SPIN) which allow exchange of data effectively over a WSN. Sensor Protocol for Information via Negotiation (SPIN) This routing protocol is basically for exchanging data about the sensor data in network operation. It is a negotia

Machine Learning in Education Sector

 Machine Learning is the next trending concept in various fields related to education. It involves the study of learning processes and computer modelling in different contexts. The authors in (Carbonell, 1983) rightly stated that ML can be used in task-oriented studies, theoretical analysis and cognitive simulation. Machine Learning in Education field falls in the category of task-oriented studies since it involves developing and analyzing learning systems to improve performance of education institutions through predetermined set of actions. Classification Techniques in Education The main classification techniques used in education include Artificial Neural Networks, Decision Trees, Logical Regression and Support Vector Machine. As stated by Nieto et. al. in the paper, the decision making model offers support in decision making on various aspects in educational industry. ML can be useful in increasing student retention and mitigating dropout rate, strategic planning using the knowled

Impact of AI on Cyber Security

Cyberattacks are growing in volume as well as complexity. Firewalls and access controls can be bypassed in much intelligent ways by attackers to enter highly secured networks. The level of complexity surpasses the human capability to handle the attacks themselves. AI offers solutions to tackle such security risks at present and for future. Security analysts use AI to identify and counteract complex criminal activity and intentions without human intervention. Cyberattack vectors are better explored using AI and machine learning. They provide improved responses to incidents related to security by learning and updating algorithms on the basis of data received. They can predict threats and observe any inconsistency or discrepancy with high accuracy beyond the capacity of humans.  Certain advantages of AI in cybersecurity are discussed here. AI detects malicious activities from the beginning and prevent full-fledged attack on network or business. It removes zero-day vulnerabilities, identif

Cyber Threats to Organizations from Rival Organizations

This article discusses the threats and vulnerabilities researched over the internet related to information security in business operations. Sources of information for vulnerabilities and threats have been included with a clear description on which threats are prevalent and how they affect the business, organizations and governments. Security threat is a malicious act that targets an organization’s systems or the whole organization to steal or corrupt data and disrupt the operations. Cyber security attack may be aimed by one organization to breach the systems of another organization with motivations of information theft, espionage, sabotage or financial gain, all with malicious intentions. Company data or its network may get exposed resulting in network or data breach. The threats have been classified into internal and external threats by Loch et. al (1992). The first category includes employee activities, administrative procedures, software problems and mechanical and electrical fail