Data Analysis of Cyber Security for Women in Haryana

Author(s):  
Priyanka Datta ◽  
Surya Narayan Panda ◽  
Simi Bajaj
Keyword(s):  
Author(s):  
Rafid Abdulwahid Mhawi ◽  
Prof. Dr. Ali Hasson Fandi

The main objective of the research is to investigate the correlation and influence between cyber security management and the technology acceptance model in the Iraqi Ministry of Interior. The data was collected from (150) respondents represented by an intentional sample of the Directorate of Systems and Informatics and the Information Technology Department in the General Directorate of Human Resources Management and for data analysis, statistical programs (AMOS, SPSS) were employed. By adopting appropriate statistical methods, the results of the research showed that the Ministry of Interior, whenever it tries to pay attention to cyber security management, the more it is reflected in the level of technology acceptance. In other words, cyber security management has a fundamental and influential role in the extent of acceptance of the technology that will be adopted within the ministry.


Author(s):  
Meenakshi Bhrugubanda ◽  
A.V. L. Prasuna

Cyber security alludes to an assemblage of advancements, procedures and practices intended to forestall an assault, harm or unapproved access to systems, gadgets, projects and information. It is likewise can be alluded to as Information security. Clients must comprehend and follow the essential standards of information security, for example, email connections watchfulness, solid passwords, and information reinforcement. Today is particularly testing to implement fruitful cyber security activities since a greater number of gadgets than individuals are available and more imaginative attackers. Data science is a subset of AI, and it alludes more to the covering regions of statistics, scientific methods, and data analysis—which are all used to remove significance and bits of knowledge from information. This paper analyses the role of Data science in Cyber Security.


10.1142/p919 ◽  
2013 ◽  
Author(s):  
Niall Adams ◽  
Nicholas Heard
Keyword(s):  

2019 ◽  
Author(s):  
Tian Yan ◽  
Hao Hu ◽  
Dehai An ◽  
Fazhi Qi ◽  
Chen Jiang

Author(s):  
Saša D Milić

This chapter provides a complex data analysis of critical infrastructure SCADA vulnerabilities and exploits using fuzzy-decision algorithms. These algorithms are presented in two case studies describing possible scenarios of the cyber attack on two vital multi-parameter remote monitoring systems. The main objects of the cyber attack analysis are data obtained from their common SCADA system. The main focus is on multiparameter remote monitoring systems for monitoring electricity production and water traffic processes in the lock of hydropower plant. Newly developed fuzzy decision algorithms for comprehensive data analysis are presented to recognize the cyber attack. The results of the fuzzy modeling are directly dependent on the complex choice of the if-then rules on the basis of which decisions are made. In addition, two fuzzy logic systems (FLS-T1 and FLS-T2) are used for modeling several cyber attack scenarios.


Author(s):  
P. Ingram

It is well established that unique physiological information can be obtained by rapidly freezing cells in various functional states and analyzing the cell element content and distribution by electron probe x-ray microanalysis. (The other techniques of microanalysis that are amenable to imaging, such as electron energy loss spectroscopy, secondary ion mass spectroscopy, particle induced x-ray emission etc., are not addressed in this tutorial.) However, the usual processes of data acquisition are labor intensive and lengthy, requiring that x-ray counts be collected from individually selected regions of each cell in question and that data analysis be performed subsequent to data collection. A judicious combination of quantitative elemental maps and static raster probes adds not only an additional overall perception of what is occurring during a particular biological manipulation or event, but substantially increases data productivity. Recent advances in microcomputer instrumentation and software have made readily feasible the acquisition and processing of digital quantitative x-ray maps of one to several cells.


2020 ◽  
Vol 5 (1) ◽  
pp. 290-303
Author(s):  
P. Charlie Buckley ◽  
Kimberly A. Murza ◽  
Tami Cassel

Purpose The purpose of this study was to explore the perceptions of special education practitioners (i.e., speech-language pathologists, special educators, para-educators, and other related service providers) on their role as communication partners after participation in the Social Communication and Engagement Triad (Buckley et al., 2015 ) yearlong professional learning program. Method A qualitative approach using interviews and purposeful sampling was used. A total of 22 participants who completed participation in either Year 1 or Year 2 of the program were interviewed. Participants were speech-language pathologists, special educators, para-educators, and other related service providers. Using a grounded theory approach (Glaser & Strauss, 1967 ) to data analysis, open, axial, and selective coding procedures were followed. Results Three themes emerged from the data analysis and included engagement as the goal, role as a communication partner, and importance of collaboration. Conclusions Findings supported the notion that educators see the value of an integrative approach to service delivery, supporting students' social communication and engagement across the school day but also recognizing the challenges they face in making this a reality.


1989 ◽  
Vol 54 (3) ◽  
pp. 403-421 ◽  
Author(s):  
Beth M. Dalton ◽  
Jan L. Bedrosian

The communicative performance of 4 preoperational-level adolescents, using limited speech, gestures, and communication board techniques, was examined in a two-part investigation. In Part 1, each subject participated in an academic interaction with a teacher in a therapy room. Data were transcribed and coded for communication mode, function, and role. Two subjects were found to predominantly use the speech mode, while the remaining 2 predominantly used board and one other mode. The majority of productions consisted of responses to requests, and the initiator role was infrequently occupied. These findings were similar to those reported in previous investigations conducted in classroom settings. In Part 2, another examination of the communicative performance of these subjects was conducted in spontaneous interactions involving speaking and nonspeaking peers in a therapy room. Using the same data analysis procedures, gesture and speech modes predominated for 3 of the subjects in the nonspeaking peer interactions. The remaining subject exhibited minimal interaction. No consistent pattern of mode usage was exhibited across the speaking peer interactions. In the nonspeaking peer interactions, requests predominated. In contrast, a variety of communication functions was exhibited in the speaking peer interactions. Both the initiator and the maintainer roles were occupied in the majority of interactions. Pertinent variables and clinical implications are discussed.


Sign in / Sign up

Export Citation Format

Share Document