information event
Recently Published Documents


TOTAL DOCUMENTS

39
(FIVE YEARS 17)

H-INDEX

6
(FIVE YEARS 1)

Author(s):  
Pradeep Nayak ◽  
Poornachandra S ◽  
Pawan J Acharya ◽  
Shravya ◽  
Shravani

Deduplication methods were designed to destroy copy information which bring about capacity of single duplicates of information as it were. Information Deduplication diminishes the circle space needed to store the back-ups in the extra room, tracks and kill the second duplicate of information inside the capacity unit. It permits as it were one case information event to be put away initially and afterward following occasions will be given reference pointer to the first information put away. In a Big information stockpiling climate, immense measure of information should be secure. For this legitimate administration, work, misrepresentation identification, investigation of information protection is an significant theme to be thought of. This paper inspects and assesses the common deduplication procedures and which are introduced in plain structure. In this review, it was seen that the secrecy and security of information has been undermined at numerous levels in common strategies for deduplication. Albeit much exploration is being done in different zones of distributed computing still work relating to this point is inadequate. To get rid of duplicate data which results in storage of single copies of data, data deduplication techniques were used. Data deduplication helps in decreasing storage capacity requirements and eliminates extra copies of same data inside storage unit. Proper management, work, fraud detection, analysis of data privacy are the topics to be considered in a big data storage environment, since, large amount of data needs to be secure. At many levels in general techniques for deduplication it is observed that safety of data and confidentiality has been compromised. Even though more research is being carried out in different areas of cloud computing still work related to this topic is little.


2021 ◽  
Author(s):  
hind ZAARAOUI

This work proposes a mathematical model about how a reaction is created in the human brain in responseto a particular incoming Information/Event using quantum mechanics and more precisely path integrals theory.The set of action potentials created in a particular neuron N2 is a result of temporal and spatial summationof the signals coming from different neighboring neurons Nx with different dendrite-paths. Each dendritepathof N2 is assumed to be determined by its respective synapse with its neurotransmitters and therefore tohave its particular action S due to its respective neurotransmitters types (excitatory or inhibitory) and etc. Anexternal incoming signal information being initially modulated by recepetor neurons (in eyes, ears...) travelsthrough the neighboring neurons that are linked to the excited receptor neurons. A potential reaction responsesare subsequently created thanks to a final deformed signal in the motor neurons by all the correlated neuralpaths. The total deformation at each neuron is created by different incoming dendrite-paths and their structures(inhibitory or excitatory neurotransmitters and their type), and of course the existence or not of the signal andits frequency coming from each path. Using path Integrals theory, we compute the probability of existence ofthe signal-Information or the potential reaction to the incoming information at each neuron. In this paper wecompute how much the signal-Information has been distorted between two neighboring linked neural pointsincluding if it arrives or not to the neigboring neurons. We propose an Information entropy similar to Shannonone and we demonstrate that this entropy is equivalent to timespace curvature in the Brain.


Security and Information Event Management (SIEM) systems require significant manual input; SIEM tools with machine learning minimizes this effort but are reactive and only effective if known attack patterns are captured by the configured rules and queries. Cyber threat hunting, a proactive method of detecting cyber threats without necessarily knowing the rules or pre-defined knowledge of threats, still requires significant manual effort and is largely missing the required machine intelligence to deploy autonomous analysis. This paper proposes a novel and interactive cognitive and predictive threat-hunting prototype tool to minimize manual configuration tasks by using machine intelligence and autonomous analytical capabilities. This tool adds proactive threat-hunting capabilities by extracting unique network communication behaviors from multiple endpoints autonomously while also providing an interactive UI with minimal configuration requirements and various cognitive visualization techniques to help cyber experts quickly spot events of cyber significance from high-dimensional data.


2021 ◽  
Vol 21 (S2) ◽  
Author(s):  
Nadia Gasbarrini ◽  
Davor Dubravić ◽  
Lauren Combs ◽  
Arian Dišković ◽  
Magdalena Ankiersztejn-Bartczak ◽  
...  

Abstract Background Maximising access to testing by targeting more than one infection is effective in identifying new infections in settings or populations. Within the EU funded Joint Action INTEGRATE, this paper examined the feasibility and impact of expanding integrated testing for HIV, hepatitis C (HCV), chlamydia, gonorrhoea and/or syphilis in four community-based pilots through targeted interventions in Croatia, Italy and Poland and the Spring European Testing Week since community settings are key in detecting new infections and reaching key populations. Methods Pilots led by local INTEGRATE partners prioritised testing for other infections or key populations. The Croatian pilot expanded testing for men who have sex with men to syphilis, chlamydia and gonorrhoea. Italian partners implemented a HIV and HCV testing/information event at a migrant centre. A second Italian pilot tested migrants for HIV and HCV through outreach and a low-threshold service for people who use drugs. Polish partners tested for HIV, HCV and syphilis among people who inject drugs in unstable housing via a mobile van. Pilots monitored the number of individuals tested for each infection and reactive results. The pilot Spring European Testing Week from 18 to 25 May 2018 was an INTEGRATE-driven initiative to create more testing awareness and opportunities throughout Europe. Results The Croatian pilot found a high prevalence for each syphilis, chlamydia and gonorrhoea respectively, 2.1%, 12.4% and 6.7%. The Italian migrant centre pilot found low proportions who were previously tested for HIV (24%) or HCV (11%) and the second Italian pilot found an HCV prevalence of 6.2%, with low proportions previously tested for HIV (33%) or HCV (31%). The Polish pilot found rates of being previously tested for HIV, HCV and syphilis at 39%, 37%, and 38%, respectively. Results from the Spring European Testing Week pilot showed it was acceptable with increased integrated testing, from 50% in 2018 to 71% in 2019 in participants. Conclusions Results show that integrated testing is feasible and effective in community settings, in reaching key populations and minimising missed testing opportunities, and the pilots made feasible because of the European collaboration and funding. For sustainability and expansion of integrated community testing across Europe, local government investment in legislation, financial and structural support are crucial.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Jinglin Jiang ◽  
Weiwei Wang

PurposeThis paper investigates individual investors' responses to stock underpricing and how their trading decisions are affected by analysts' forecasts and recommendations.Design/methodology/approachThis empirical study uses mutual fund fire sales as an exogenous source that causes stock underpricing and analysts' forecasts and recommendations as price-correcting information. The study further uses regression analysis to examine individual investors' responses to fire sales and how their responses vary with price-correcting information.FindingsThe authors first show that individual investors respond to mutual fund fire sales by significantly decreasing net buys, and this effect appears to be prolonged. Next, the authors find that the decrease of net buys diminishes following analysts' price-correcting earnings forecast revisions and stock recommendation changes. Hence, the authors suggest that individual investors are not “wise” enough to recognize flow-driven underpricing; however, this response is weakened by analysts' price-correcting information.Originality/valueThere is an ongoing debate in the literature about whether individual investors should be portrayed as unsophisticated traders or informed traders who can predict future returns. The authors study a unique information event and provide new evidence related to both perspectives. Overall, our evidence suggests that the “unsophisticated traders” perspective is predominant, whereas a better information environment significantly reduces individual investors' information disadvantage. This finding could be of interest to both academic researchers and regulators.


Author(s):  
G Ravi Kumar, Et. al.

Security and Privacy protection have been a public approach worry for quite a long time. Notwithstanding, quick innovative changes, the fast development of the internet and electronic business, and the improvement of more modern techniques for gathering, investigating, and utilizing individual information have made privacy a significant public and government issues. The field of data mining is acquiring importance acknowledgment to the accessibility of a lot of data, effortlessly gathered and put away through PC systems. Data mining procedures, while permitting the people to remove shrouded information on one hand, present various privacy dangers then again. In this paper, we concentrate a portion of these issues alongside an itemized conversation on the utilizations of different data mining strategies for giving security. This paper gives an outline of data mining field and security information event management system. We will perceive how different data


2021 ◽  
Vol 13 (4) ◽  
pp. 96
Author(s):  
Shawal Khan ◽  
Ishita Sharma ◽  
Mazzamal Aslam ◽  
Muhammad Zahid Khan ◽  
Shahzad Khan

A Vehicular Ad-hoc Network (VANET) comprises a group of moving or stationary vehicles connected by a wireless network. VANETs play a vital role in providing safety and comfort to drivers in vehicular environments. They provide smart traffic control and real-time information, event allocation. VANETs have received attention in support of safe driving, intelligent navigation, emergency and entertainment applications in vehicles. Nevertheless, these increasingly linked vehicles pose a range of new safety and security risks to both the host and its associated properties and may even have fatal consequences. Violations of national privacy and vehicle identities are a major obstacle to introducing forced contact protocols in vehicles. Location privacy refers to the privacy of the vehicle (driver) and the location of the vehicle. Whenever a vehicle sends a message, no one but authorized entities should know their real identity and location of the vehicle. All the messages sent by the vehicle must be authenticated before processing, hence location privacy is an important design aspect to be considered in VANETs operations. The novelty of this paper is that it specifically reviews location privacy in VANETs in terms of operational and safety concerns. Furthermore, it presents a critical analysis of various attacks, identity thefts, manipulation and other techniques in vogue for location privacy protection available in state-of-the-art solutions for VANETs. The efforts in this paper will help researchers to develop a great breadth of understanding pertaining to location privacy issues and various security threats encountered by VANETs and present the critical analysis of the available state-of-the- art solutions to maintain location privacy in VANETs.


2020 ◽  
Vol 2 (3) ◽  
pp. 205-210
Author(s):  
Herpan Syafii Harahap ◽  
Ario Danianto ◽  
Abdurrachim Abdurrachim ◽  
Baiq Dewi Sartika ◽  
Paniatul Hiwala ◽  
...  

Indonesia is the fourth most populous country in the world. In 2015, the population growth rate in West Nusa Tenggara is equal with national population growth rate, which is about 1.39%. The long-term contraceptive methods is one of the most effective family planning programs to succeed in controlling the population growth rate. The participation rate for the use of this contraceptive methods by fertile age couples in Bunut Baok village, Middle Lombok, is only about 10%. This was dissemination of information event aimed to disseminate the information regarding long-term contraceptive methods to Bunut Baok villagers, Middle of Lombok. This social event is part of the thematic Kuliah Kerja Nyata (KKN) programs of students of Universitas Mataram in the period of 2020 in Bunut Baok villagers attended by 59 Bunut Baok villagers as participants. In this event, pre-test and post-test were also conducted to evaluate the increase of their knowledge about long-term contraceptive methods. The participants had mean age of 36 years old, mostly female and had senior high school educational level. The mean of posttest scores was higher than the mean of pretest scores (88.54vs77.03; p = 0.000). These results indicated that this dissemination of information event increase the level of knowledge of Bunut Baok villagers related to the long-term contraceptive methods.


Sign in / Sign up

Export Citation Format

Share Document