34 research outputs found

    An Organizational Level Advancement Ofmis and Its Security Milestones Intechnological Era

    Get PDF
    Today the most vital asset of any enterprise is its data and to maintain its security. In order to make your business successful in this era of modern economy and to compete with the advancing world, one must have to understand the importance of data management. Management Information System is a source of managing large amount of data of any firm and it has a powerful influence on the performance of an organization by maintaining its data electronically. This paper discusses the impact of MIS on performing various functions of an organization and how this software can increase the profitability, growth and innovation of an organization. In short, a positive relationship between an organization and MIS is discussed. With the increasing complexity in technology, there arise some serious issues of security which includes hacking, spoofing, cybercrime etc that needs to be catered. This research therefore covers possible solutions to such security threats along with some techniques and also discusses various types of information systems. The need therefore is to produce a way that encourages operating a secure information system for an organization

    An Overview on Cyber Attacks and its Types for Enhancing Data Security in Business World

    Get PDF
    For sensitive data of organizations there arises a need of ensuring privacy and protection measures in systems especially at various high-tech firms. Cyber attacks are a wide form of threat confronted on web by several users on daily basis. These attacks are fundamentally used to challenge system security of others yet there are likewise some moral programmers who get into other people frameworks' to aware them about their vulnerabilities and get paid in return for securing their systems. In any case, these assaults have caused a great deal of concern for businessmen. The research covers the major types of cyber attacks that can affect the business world in an immense manner along with an overview that how these threats work and how they can be possibly prevented from. The hacking procedures are showing signs of improvement step by step and so should our frameworks to remain safe from all sorts of latest attacks on our data in various forms

    Multimodal Interaction Recognition Mechanism by Using Midas Featured By Data-Level and Decision-Level Fusion

    Get PDF
    Natural User Interfaces (NUI's) dealing with gestures is an alternative of traditional input devices on multi-touch panels. Rate of growth in the Sensor technology has increased the use of multiple sensors to deal with various monitoring and compatibility issues of machines. Research on data-level fusion models requires more focus on the fusion of multiple degradation-based sensor data. Midas, a novel declarative language to express multimodal interaction patterns has come up with the idea of developers required patterns description by employing multi-model interaction mechanism. The language as a base interface deals with minimum complexity issues like controlling inversion and intermediary states by means of data fusion, data processing and data selection provisioning high-level programming abstractions

    Review on Huawei Fusion Sphere Security

    Get PDF
    The cloud computing virtualization stage is another method for giving computing resources that give clients available and financially savvy benefits, and bring hazards in meantime. In this way, ensuring the privacy, trustworthiness and accessibility of client information turns out to be significantly more basic to distributed computing frameworks. Huawei gives the virtualization stage security answers for confronting the dangers and difficulties postured to the distributed computing framework. This article portrays the techniques and measures received by Huawei cloud computing virtualization stage to react to the security dangers and alsodangerous to distributed computing frameworks. Huawei cloud computing virtualization stage is intended to give secure and solid server virtualization solutions for clients

    AN OVERVIEW ON CYBER ATTACKS AND ITS TYPES FOR ENHANCING DATA SECURITY IN BUSINESS WORLD

    Get PDF
    For sensitive data of organizations there is a compelling need of ensuring privacy in several aspects and to inculcate protective measures in systems especially in various high-tech firms. Cyber-attacks are a wide form of threat confronted globally on the web by several users on daily basis. These attacks are fundamentally used to challenge system security of others, there are likewise some moral programmers who get into other people frameworks to make them aware about their vulnerabilities and they also get paid in return for securing such systems. In any case, these assaults have caused a great deal of concern for businessmen. Thisresearch covers the major types of cyber-attacks that can affect the business world in an immense manner along with an overview that how these threats work and how they can be possibly prevented. As the hacking mechanisms are showing signs of increased danger in a step by step manner, our frameworks should also take preventive measures to remain safe from all sorts of latest attacks on our data that can possibly attack in various forms

    Biallelic variants in CHST3 cause Spondyloepiphyseal dysplasia with joint dislocations in three Pakistani kindreds

    Get PDF
    Background Skeletal dysplasia is a heterogeneous group of disorders. Spondyloepiphyseal dysplasias comprise one subgroup. Deficiency of carbohydrate sulfotransferase 3 has been reported in a small number of patients with recessively inherited spondyloepiphyseal dysplasia with joint dislocation, short stature and scoliosis. We report here molecular and clinical findings of affected individuals in three consanguineous Pakistani families. Affected individuals in all three families had a uniform phenotype including severe short stature, multiple dislocated joints, progressive scoliosis and facial dysmorphism. Methods Clinical evaluation was done for three unrelated families. Radiological survey of bones was completed for patients from two of the families. Whole exome sequencing index patients from each family was performed followed by Sanger sequencing for validation of segregation of identified variants in respective families. In-silico analysis for determining pathogenicity of identified variants and conservation was done. Results Whole-exome sequencing revealed biallelic variants c.590 T > C;p.(Leu197Pro), c.603C > A;p.(Tyr201Ter) and c.661C > T;p.(Arg221Cys) in CHST3 (NM_004273.5) in the three families with eight, five and two affected individuals, respectively. Contrary to previous reports, affected individuals in none of the families exhibited a hearing loss. Conclusion We describe genotypic and phenotypic findings of three unrelated families with spondyloepiphyseal dysplasia. Our study confirms phenotypic variability and adds to the genotypic spectrum of spondyloepiphyseal dysplasia.Peer reviewe

    Cloud Information Security Challenges and Accountable Solutions

    No full text
    Cloud computing model is an advanced framework which utilizes consolidated idea of “utilitycomputing” and “software-as-a-service”, providing convenient and on-demand services torequested end users. Security in cloud figuring is a basic angle confronting a few issues that must bemulled over. Safety from any sort of external threats must be taken into care by the cloud serviceprovider and consumer so that any data theft issue is not faced by the customer afterwards. Aprobability emerges that a noxious customer can invade the cloud by having honest customers,therefore defiling the entire cloud and affecting various customers who are sharing the tainted cloudin the meantime. This exploration covers the parameters that impact the security of the cloud and itin this way it also examines cloud security issues looked by cloud expert centres and purchasers ofcloud, for instance, data integrity and other security issues

    Bivariate Extension of the Quadrature Method of Moments for Batch Crystallization Models

    No full text
    This Article presents a bivariate extension of the quadrature method of moments for solving two-dimensional batch crystallization models involving crystals nucleation, size-dependent growths, aggregation, and dissolution of small nuclei below certain critical size in a dissolution unit. In this technique, orthogonal polynomials of lower order moments are used to find the quadrature abscissas (points) and weights. Several benchmark problems with different combinations of processes are considered in this Article. The accuracy and efficiency of the proposed method are validated against the analytical solutions and the high-resolution finite volume scheme. Excellent agreements were observed in all test problems. It was found that the current method is very efficient and accurate as compared to the high-resolution finite volume scheme. copyright 2010 American Chemical Society [accessed November 18th, 2010

    Accuracy of CT chest without oral contrast for ruling out esophageal perforation using fluoroscopic esophagography as reference standard: a retrospective study

    No full text
    Purpose: Esophageal perforation has a high mortality rate. Fluoroscopic esophagography (FE) is the procedure of choice for diagnosing esophageal perforation. However, FE can be difficult to perform in seriously ill patients. Methods: We retrospectively reviewed charts and scans of all patients who had undergone thoracic CT (TCT) without oral contrast and FE for suspicion of esophageal perforation at our hospital between October, 2010 and December, 2015. Scans were interpreted by a single consultant radiologist having \u3e 5 years of relevant experience. Statistical analysis was performed using SPSS version 20. Sensitivity, specificity, positive predictive value (PPV) and negative predictive value (NPV) of TCT were computed using FE as reference standard. Results: Of 122 subjects, 106 (83%) were male and their median age was 42 [inter-quartile range (IQR) 29-53] years. Esophageal perforation was evident on FE in 15 (8%) cases. Sensitivity, specificity, PPV and NPV of TCT for detecting esophageal perforation were 100, 54.6, 23.4 and 100%, respectively. When TCT was negative (n = 107), an alternative diagnosis was evident in 65 cases. Conclusion: Thoracic computed tomography (TCT) had 100% sensitivity and negative predictive value for excluding esophageal perforation. FE may be omitted in patients who have no evidence of mediastinal collection, pneumomediastinum or esophageal wall defect on TCT. However, in the presence of any of these features, FE is still necessary to confirm or exclude the presence of an esophageal perforation

    Influence of background concentration induced field on the emission rate signatures of an electron trap in zinc oxide Schottky devices

    No full text
    Various well-known research groups have reported points defects in bulk zinc oxide (ZnO) [N-D (intrinsic): 10(14)-10(17) cm(-3)] naming oxygen vacancy, zinc interstitial, and/or zinc antisite having activation energy in the range of 0.32-0.22 eV below conduction band. The attribution is probably based on activation energy of the level which seems not to be plausible in accordance with Vincent et al., [J. Appl. Phys. 50, 5484 (1979)] who suggested that it was necessary to become vigilant before interpreting the data attained for a carrier trap using capacitance transient measurement of diodes having ND greater than 10(15) cm(-3). Accordingly the influence of background free-carrier concentration, ND induced field on the emission rate signatures of an electron point defect in ZnO Schottky devices has been investigated by means of deep level transient spectroscopy. A number of theoretical models were tried to correlate with the experimental data to ascertain the mechanism. Consequently Poole-Frenkel model based on Coulomb potential was found consistent. Based on these investigations the electron trap was attributed to Zn-related charged impurity. Qualitative measurements like current-voltage and capacitance-voltage measurements were also performed to support the results.Original Publication:Hadia Noor, P Klason, Sadia Muniza Faraz, Omer Nour, Qamar Ul Wahab, Magnus Willander and M Asghar, Influence of background concentration induced field on the emission rate signatures of an electron trap in zinc oxide Schottky devices, 2010, JOURNAL OF APPLIED PHYSICS, (107), 10, 103717.http://dx.doi.org/10.1063/1.3428426Copyright: American Institute of Physicshttp://www.aip.org
    corecore