SCADA systems are one of the most important part of industrial operations. Before SCADA, plant personnel had to monitor and control industrial process via selector switches, pushbuttons and dials for analog signals. As manufacturing grew and sites became more remote, relays and timers were used to assist supervision. With the onset of technology and advent of network based protocols, these systems became more reliable, fast and it became easy to troubleshoot problems. Indeed progress also brings vulnerabilities, which was no new for SCADA. The IP protocols brought threat to the security of these systems. The devastation that cyber predators on SCADA can inflict, could be illustrated by the Stuxnet virus attack. This paper discusses what SCADA systems are, their uses, protocols being used by these systems, vulnerabilities and ways to combat those vulnerabilities. It focusses on the use of Blockchain Technology as a step in security of such systems. Diksha Chhonkar | Garima Pandey "SCADA Systems: Vulnerabilities and Blockchain Technology" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-4 , June 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31586.pdf Paper Url :https://www.ijtsrd.com/computer-science/computer-security/31586/scada-systems-vulnerabilities-and-blockchain-technology/diksha-chhonkar
A Real-time Classroom Attendance System Utilizing Viola–Jones for Face Detect...Nischal Lal Shrestha
This document provides a minor project report on developing a real-time classroom attendance system using face detection and recognition. The system utilizes the Viola-Jones algorithm for face detection and Local Binary Patterns Histogram (LBPH) for face recognition. It was developed by 4 students as a partial fulfillment of their Bachelor of Software Engineering degree at Nepal College of Information Technology. The report describes the methodology, system implementation including image acquisition, preprocessing, detection, recognition, and GUI development, as well as the deliverables, schedule, and future work.
Project report for railway security monotorin systemASWATHY VG
The document discusses railway safety and proposes a railway security monitoring system using vibration sensors and ZigBee technology. It begins with background on railway accidents and the need to improve safety. The existing signaling system relies on human communication, leading to errors. The proposed system uses vibration sensors on trains to detect collisions or derailment. It uses ZigBee for two-way communication between trains and control centers to automatically control railway gates and avert accidents in real-time. The system is expected to improve safety at a low cost without replacing existing infrastructure.
Employee Management System UML Diagrams Use Case Diagram, Activity Diagram, S...Mohammad Karim Shahbaz
The system as such as it is designed is called Employee Management System (EMS). Employee Management System is documented using UML Diagrams very easy to understand. This Employee Management System is designed to Manage the Recruitment & new Employee Registration process and Manage each Employee data. Attendance Management System and Salary Management Systems are also embedded. UML Diagrams ( Use Case Diagram, Activity Diagram, State Chart Diagram or State Machine, Sequence Diagram, Class Diagram, Deployment Diagram, Component Diagram ) and text are for this documentation. NU,BCS
NOTE: this is total documentation, You can also find this Documentation Related Presentation (.ppt) here:
http://www.slideshare.net/mohammadkarim3785/employee-management-system-uml
This document describes an intelligent parking system called iPARK that uses IoT and AI technologies. iPARK aims to make parking more manageable by providing an available parking space list, automatically sensing vehicle movement, and allowing users to securely lock and unlock gates. It guides vehicles to the nearest available spot to reduce waiting times, fuel consumption, and carbon emissions. The system includes hardware components like Arduino Mega, Ethernet shield, LDR sensors and servo motors, along with software like PHP and MySQL. It uses techniques like registration, login, space selection, and gate locking/unlocking. Future work may include a distributed database to control spots nationwide, location-based parking searches, and automated payment services.
This document describes a proposed system for automatically detecting faults on railway tracks using wireless network systems. The proposed system uses ultrasonic sensors to monitor the tracks for cracks and obstacles. When a fault is detected, the sensor information is transmitted wirelessly through modules to authorities. This allows for easy, real-time surveying of tracks with less delay compared to existing systems. The goal is to avoid accidents and safeguard passengers by quickly detecting any track issues or problems.
Feedback is a dialogue between people which reflects back how another person sees someone’s behavior or performance.
Gathers a collection of informations.
Problem solving.
Getting reactions of receivers.
This document discusses the Hyperloop, a proposed new mode of transportation involving high-speed travel in low-pressure tubes. The Hyperloop was proposed by Elon Musk in 2013 and consists of capsules that carry passengers through a tube at speeds up to 700 mph, propelled by linear induction motors. Projects are underway to develop Hyperloop systems between Los Angeles and San Francisco, Chennai and Bengaluru, and in Dubai and the UK. Advantages include fast travel times, low costs, and environmental friendliness, while disadvantages include high initial investment costs and potential safety issues.
The document describes an Academic Management System (AMS) project presented by students. The AMS allows a college to maintain student, staff, fees, and exam information electronically. It aims to simplify information management and allow quick access to records. The project involved designing the system using tools like Rational Rose, writing code in Java/JSP, and testing the software. Key modules include administration, student, faculty, and department functions. The system uses a database, login authentication, and allows generating reports. The document outlines objectives, outcomes, schedule, architecture, and design diagrams for the AMS.
This document is a report on operating system tools created by students Manali, Vaishnavi, and Sanved for their Operating Systems course. It discusses the aims of understanding different OS tools and their functions. The methodology included selecting a topic, distributing work, collecting information from sources, creating a Word document, arranging the information, and getting teacher review. The literature reviewed included websites on Java, tutorials, and Guru99. The aims were to understand OS tools, their functions, and providing access to system resources.
The document discusses a pill camera, which is a capsule endoscopy device used to examine the small intestine. It consists of a pill-sized capsule containing a camera, light source, and transmitter. Patients swallow the capsule, which passes naturally through the digestive tract while transmitting thousands of images. These images are received by a sensor array worn by the patient and recorded for physicians to review on specialized software. The capsule does not require sedation and allows examination of the entire small intestine, providing a more complete evaluation than other endoscopic methods. Key advantages include it being non-invasive, comfortable for patients, and providing better imaging of hard to reach areas of the digestive tract.
The document discusses a student management system developed for Soran University's Faculty of Science Computer Department. The system aims to simplify managing large amounts of student data by automating registration, courses, exams, assignments, and other functions. It provides advantages like reduced time/budget, better student performance/motivation, simplified/collected tasks, and safe information storage. The document recommends an iterative development methodology and outlines functional requirements, resources needed, ERD and DFD diagrams, and examples of student management systems in Kurdistan including Soran University's system.
This document describes an automatic railway track crack detection system that uses IR sensors and a microcontroller. IR sensors transmit radiation patterns to detect cracks in railway tracks by comparing the received pattern to a threshold. When a crack is detected, a GPS system records the location and a GSM module sends an SMS alert with the coordinates to relevant authorities. The system aims to address derailments caused by undetected cracks that can result in loss of life and property.
Hyperloop is a proposed method of transportation that would transport people in pods or capsules traveling inside vacuum tubes at over 700 mph. The pods would be supported by air bearings and accelerated by linear induction motors inside the tubes. Key features include the tubes, which would be made of steel and supported by pylons; the capsules, which would be aerodynamically designed and hold up to 28 passengers; and the propulsion and levitation systems, which use compressors, air bearings, and linear induction motors to move the pods at high speeds while keeping them aloft. Proponents argue Hyperloop could provide fast, affordable, safe, and sustainable transportation between cities.
FOR FINDING THE RAILWAY TRACK FAULTS LIKE CRACK, INCLINATION, OBSTACLE. THE SYSTEM TRACK THE FAULT LOCATION AND SEND INFORMATION ABOUT FAULT TO THE AUTHORITY.
To Tracking the employee which is work under the company of the any market areas, to connected by the internet to show employee mobile phone detail and show location by the GPS server.
Session.Clear() removes all values from the current session but maintains the session, while Session.Abandon() destroys the entire session, triggering Session_End and creating a new session on the next request.
innovative railway track surveying with sensors and controlled by wireless co...kalaimathi mathiyazhagan
This document describes a proposed multi-sensor railway track geometry surveying system. The system uses MEMS, ultrasonic, and GPS sensors on a robot to detect cracks and obstacles on railway tracks and bridges in real-time. When issues are detected, the GPS location is recorded and an SMS is sent to authorities via GSM. Trains approaching will also receive a wireless message to slow down. A microcontroller controls gate closures to prevent accidents. The low-cost system aims to improve safety by allowing for faster response times over existing manual inspection methods.
This project represents a way of developing an
interface to detect driver drowsiness based on continuously
monitoring eyes and DIP algorithms. Micro sleeps that are short
period of sleeps lasting 2 to 3 seconds are good indicator of
fatigue state. Thus by continuously monitoring the eyes of the
driver by using camera one can detect the sleepy state of driver
and timely warning is issued.
Aim of the project is to develop the hardware which is very
advanced product related to driver safety on the roads using
controller and image processing. This product detects driver
drowsiness and gives warning in form of alarm and as well as
decreases the speed of vehicle.Along with the drowsiness
detection process there is continuous monitoring of the distance
done by the Ultrasonic sensor. The ultrasonic sensor detects the
obstacle and accordingly warns the driver as well as decreases
speed of vehicle.
College Management System can full fill the requirement of all the colleges , having all the functionality that a college require like fees management, finance management, Library Management, Message system.
This document describes a smart car parking system using IoT. The system uses sensors to detect available parking spots and sends the information to a display and mobile app. Cars enter and exit the parking area through automated gates controlled by IR sensors. Users can check the app to see available spots and navigate to empty ones indicated by green LED lights, while occupied spots have red lights. This optimized system reduces traffic and pollution compared to traditional parking methods.
This document discusses trends in threats to SCADA (Supervisory Control and Data Acquisition) systems. It notes that as SCADA systems increasingly use commercial off-the-shelf software and connect to the internet, they have become more vulnerable to cyber threats. The document outlines how SCADA systems work and components like RTUs, PLCs, and HMIs. It also discusses issues like the mistaken belief that SCADA systems are secure due to physical security or isolation from the internet. The conclusion suggests that as capabilities and opportunities for threats increase, the future operational environment will be more vulnerable if an actor emerges with the intent to cause harm.
Scada system architecture, types and applicationsUchi Pou
This document discusses the architecture, types, and applications of SCADA (Supervisory Control and Data Acquisition) systems. It describes the basic components of SCADA systems including human-machine interfaces, programmable logic controllers, remote terminal units, communication infrastructure, and SCADA programming. It outlines the four generations of SCADA systems from early monolithic to modern networked and internet-based systems. Finally, it provides examples of SCADA applications in manufacturing, wastewater treatment, power systems, and wireless SCADA systems.
Security Issues in SCADA based Industrial Control Systems aswanthmrajeev112
This document discusses security concerns in industrial control systems. It provides an overview of industrial control systems (ICS) and SCADA systems, which are widely used to control infrastructure systems. It outlines several vulnerabilities in ICS, including issues with legacy systems not being designed with modern cybersecurity threats in mind. Specific threats like zero-day vulnerabilities, non-prioritized tasks, and database/communication protocol issues are examined. The conclusion states that additional digital security techniques are needed to protect critical infrastructure control systems.
SCADA The Universal Remote for Industrial Control.pptxAnujMarskole
A SCADA system is a combination of hardware and software that enables the automation of industrial processes by capturing Operational Technology (OT) real-time data. By this presentation you can know more insides of SCADA.
Comparative analysis of traditional scada systems and io t implemented scadaIJARIIT
SCADA system stands as an abbreviation of Supervisory Control and Data Acquisition. It focuses on the supervisory
level and is not a full control system. It is a computer system which gathers and analyses real time data. They are useful in
monitoring and controlling a plant or industrial equipment like telecommunications, water, waste control, energy, oil-gas
refining, and transportation. It gathers information about a mishap, transfers it back to a central site and alerts the home station
about the mishap, carries out necessary analysis and control, like determining if the mishap occurred is critical, and display the
information in a logical and organized fashion. They can be relatively as simple as a system which monitors environmental
conditions of a small office building, or as complex as a system that monitors all the activity in a nuclear power plant.
IOT acts as a complementary setup to SCADA. SCADA system generates information which acts as one of the data sources for
IOT. While the focus of SCADA on monitoring and control, the focus of IOT is firmly on analyzing machine data to improve
productivity.
This document provides an overview of SCADA (Supervisory Control and Data Acquisition) systems. It discusses what SCADA is, its architecture and components, functionality, and how it is used to control industrial processes. Security issues are also covered, along with the evolution of SCADA systems from early monolithic designs to modern distributed and networked architectures. The future of SCADA is described as incorporating more sophisticated capabilities through artificial intelligence and greater network integration.
SCADA systems are used to monitor and control industrial processes remotely. They acquire data from sensors in the field through programmable logic controllers (PLCs) or remote terminal units (RTUs), transmit the data to centralized human-machine interfaces (HMIs) over telecommunication networks, and allow operators to send control commands back to the field devices. SCADA systems have evolved from monolithic first-generation systems with standalone computers to distributed second-generation and networked third-generation systems that use open standards and can connect over wide area networks. They provide features like dynamic representation of process data, database connectivity, device connectivity, alarms, trends, scripting, security, recipe management, and networking capabilities.
SCADA forensic tools open source. What are they What they doSo.pdfebrahimbadushata00
SCADA forensic tools open source. What are they? What they do?
Solution
SCADA stands for Supervisory Control and Data Acquisition.
This technology is used to mainly ensure the operations and functionality of the control systems
used in many industries.
It is a software application program which is used to gathering of the data in real time from
remote locations so as to control the equipment and conditions in such device environments.
SCADA is mainly used in Transportation, Telecommunications, power plants, Gas refining
industries and as well in water and waste control by government agencies too.
they include software and hardware components, which gather and inputs the data into a
computer machine and processes it.
It also records all the log events into a file and stores in the local hardisk/server.
These SCADA Systems/applications also warn when conditions become hazardous by sounding
alarams.
As these systems are operated in huge network environments there is a very high possibility of
attacks.
In recent years there has been an increasing number of attacks directly targeting these systems
including the well published networks.
Therefore , there is a need to have forensic analysis of these systems to determine, if breah has
occured and the extent to which the system is compromised and also the details of how the
functional operations and assets are affected.
Apart from normal threats there are many cyber threats against SCADA systmes with
sophisticated malware attacks, SQL Injection, cross-site scripting, and the buffer overflow
attacks being the most common type of vulnerability.
Digital forensic is an important part of an incident response strategy in an IT forensic
investigation following an incident and will provide an effective response in a forensic manner.
Investigative Steps:
1 Examination: Deals with the identitfy of potential sources of evidence, including the systems,
the network and connected devices.
2 Identification: identify the types of systems to be investigated, which includes OS, serail
numbers and model types of the PLC\'s, the network design and the implementation.
3 Collection: Collect the potential evidence from the memory systems that are suspected to be
part of the SCADA system which is being investigated.
4 Documentation: It is very critcial to keep accurate documentation of the investigation to ensure
chain of custody. Records need to be kept of the evidence.
The existing tools for SCADA Systems are:.
SCADA systems are used to monitor and control equipment and processes in industries like oil/gas, water treatment, and manufacturing. They gather data in real-time from remote locations and send control commands back. SCADA has evolved through 3 generations from standalone monolithic systems to distributed systems on local networks to today's networked systems using open standards and wide area networks. Security issues need to be addressed like encrypting communications, securing devices, auditing networks, and implementing threat protection. The future of SCADA involves more sophisticated systems that can handle huge data volumes and territories with some having artificial intelligence capabilities.
The document discusses cyber security challenges for industrial control systems (ICS) and SCADA networks. As ICS were connected to networks and the internet, it increased opportunities for remote hacking and destruction. The disconnect between traditional IT security practices and operational needs of ICS led to vulnerabilities. Common security strategies like network isolation are no longer effective due to widespread connectivity. Recent attacks have shown that hackers can compromise ICS equipment directly and cause physical damage. The document argues industry must adopt new security technologies and policies tailored for ICS in order to address growing threats.
This document provides information about SCADA (Supervisory Control and Data Acquisition) systems. It discusses what SCADA is, the advantages of SCADA over HMI, the system concept of SCADA including RTUs, and future trends in SCADA. Specific topics covered include the history and purpose of SCADA, where SCADA is used, alarm features in SCADA, and applications of RTUs in remote monitoring and control.
SCADA stands for Supervisory Control And Data Acquisition. SCADA software system is a device monitoring and controlling framework. The supervisory control includes, taking action and control through remote locations for various control mechanisms and processes.The front-end UI of Mobile App or Web dashboard along with backend business logic, database and a Gateway (as depicted in the above block diagram) manifests a SCADA solution for control and monitoring of devices in an IoT network.
https://www.embitel.com/blog/embedded-blog/what-is-scada-system-and-software-solution
The document discusses SCADA (Supervisory Control and Data Acquisition) systems. It provides definitions of key SCADA components and concepts, including RTUs, PLCs, HMIs, and protocols. It also outlines security challenges for SCADA systems given their critical infrastructure functions and discusses approaches to improving SCADA security.
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADAcsandit
Supervisory control and data acquisition (SCADA) systems have their own constrains and specifications. These systems control many of our critical industrial infrastructures, yet they are hardly secured. The biggest problem in securing these systems is the lack of cryptography support especially that most SCADA systems work in real-time which is not compatible with most cryptography algorithms. Additionally, a SCADA network may include a huge amount of embedded devices with little computational powers which adds to the cost of any security improvement. In this paper we present a new approach that would secure SCADA communications by coding information without the need of the complex cryptography algorithms. The reconfigurable information transmitter agent (RITA) protocol that we present does not need the already installed devices to be modified nor replaced, it only needs to add costless electrical chips to these devices. This approach can also be used to secure any type of communication that respects the protocol's constraints.
SCADA.pptx supervisory control and data aquasitionRapidAcademy
The document discusses the history and components of SCADA (Supervisory Control and Data Acquisition) systems. It describes how early SCADA systems involved direct connections between sensors and control panels, while modern systems involve remote terminal units, programmable logic controllers, telemetry, and computer software. The key components of a SCADA system include remote terminal units that interface with field sensors, communication systems to transfer data, master stations to display and control the system, and software for user interfaces, alarms, data storage and more.
Scada Industrial Control Systems Penetration Testing Yehia Mamdouh
Scada Industrial Control Systems Penetration Testing
Start from Types of Scada Networks, then Penetration testing, finally what Security should be follow
The document discusses penetration testing of SCADA industrial control systems. It begins with an overview of SCADA systems, including what they are, where they are used, benefits, and basic concepts like the communication between the SCADA server and RTUs/PLCs. It then covers SCADA protocols like Modbus and DNP3. The document outlines various attack vectors like denial of service attacks, unauthorized access, and vulnerabilities in common protocols. It proposes a penetration testing methodology that involves discovery, protocol analysis, data manipulation, and security recommendations like firewalls, IDS, and training to improve SCADA security.
This document provides an overview of SCADA (Supervisory Control and Data Acquisition) systems. It defines SCADA as a computer system that gathers and analyzes real-time data to monitor and control industrial plants and equipment. The document describes the typical hardware and software architecture of SCADA systems, including remote terminal units, central servers, and human-machine interfaces. It also discusses communication methods, interfacing standards, and the use of databases in SCADA systems.
This document provides an overview of supervisory control and data acquisition (SCADA) systems. It defines SCADA and describes its typical components, including field instrumentation, remote stations, communication networks, and central monitoring systems. It also discusses telemetry, data acquisition, differences between SCADA and distributed control systems, common system configurations, communication modes, example applications, benefits, and limitations of SCADA systems. The document provides details on human-machine interfaces and interaction techniques used in SCADA.
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
The manufacturing industries all over the world are facing tough challenges for growth, development and sustainability in today’s competitive environment. They have to achieve apex position by adapting with the global competitive environment by delivering goods and services at low cost, prime quality and better price to increase wealth and consumer satisfaction. Cost Management ensures profit, growth and sustainability of the business with implementation of Continuous Improvement Technique like Six Sigma. This leads to optimize Business performance. The method drives for customer satisfaction, low variation, reduction in waste and cycle time resulting into a competitive advantage over other industries which did not implement it. The main objective of this paper ‘Six Sigma Technique A Journey Through Its Implementation’ is to conceptualize the effectiveness of Six Sigma Technique through the journey of its implementation. Aditi Sunilkumar Ghosalkar "‘Six Sigma Technique’: A Journey Through its Implementation" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64546.pdf Paper Url: https://www.ijtsrd.com/other-scientific-research-area/other/64546/‘six-sigma-technique’-a-journey-through-its-implementation/aditi-sunilkumar-ghosalkar
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
Edge computing, a paradigm that involves processing data closer to its source, has gained significant attention for its potential to revolutionize data processing and communication in space missions. With the increasing complexity and data volume generated by modern space missions, traditional centralized computing approaches face challenges related to latency, bandwidth, and security. Edge computing in space, involving on board processing and analysis of data, offers promising solutions to these challenges. This paper explores the concept of edge computing in space, its benefits, applications, and future prospects in enhancing space missions. Manish Verma "Edge Computing in Space: Enhancing Data Processing and Communication for Space Missions" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64541.pdf Paper Url: https://www.ijtsrd.com/computer-science/artificial-intelligence/64541/edge-computing-in-space-enhancing-data-processing-and-communication-for-space-missions/manish-verma
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
Communal politics in India has evolved through centuries, weaving a complex tapestry shaped by historical legacies, colonial influences, and contemporary socio political transformations. This research comprehensively examines the dynamics of communal politics in 21st century India, emphasizing its historical roots, socio political dynamics, economic implications, challenges, and prospects for mitigation. The historical perspective unravels the intricate interplay of religious identities and power dynamics from ancient civilizations to the impact of colonial rule, providing insights into the evolution of communalism. The socio political dynamics section delves into the contemporary manifestations, exploring the roles of identity politics, socio economic disparities, and globalization. The economic implications section highlights how communal politics intersects with economic issues, perpetuating disparities and influencing resource allocation. Challenges posed by communal politics are scrutinized, revealing multifaceted issues ranging from social fragmentation to threats against democratic values. The prospects for mitigation present a multifaceted approach, incorporating policy interventions, community engagement, and educational initiatives. The paper conducts a comparative analysis with international examples, identifying common patterns such as identity politics and economic disparities. It also examines unique challenges, emphasizing Indias diverse religious landscape, historical legacy, and secular framework. Lessons for effective strategies are drawn from international experiences, offering insights into inclusive policies, interfaith dialogue, media regulation, and global cooperation. By scrutinizing historical epochs, contemporary dynamics, economic implications, and international comparisons, this research provides a comprehensive understanding of communal politics in India. The proposed strategies for mitigation underscore the importance of a holistic approach to foster social harmony, inclusivity, and democratic values. Rose Hossain "Dynamics of Communal Politics in 21st Century India: Challenges and Prospects" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64528.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/history/64528/dynamics-of-communal-politics-in-21st-century-india-challenges-and-prospects/rose-hossain
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
Background and Objective Telehealth has become a well known tool for the delivery of health care in Saudi Arabia, and the perspective and knowledge of healthcare providers are influential in the implementation, adoption and advancement of the method. This systematic review was conducted to examine the current literature base regarding telehealth and the related healthcare professional perspective and knowledge in the Kingdom of Saudi Arabia. Materials and Methods This systematic review was conducted by searching 7 databases including, MEDLINE, CINHAL, Web of Science, Scopus, PubMed, PsycINFO, and ProQuest Central. Studies on healthcare practitioners telehealth knowledge and perspectives published in English in Saudi Arabia from 2000 to 2023 were included. Boland directed this comprehensive review. The researchers examined each connected study using the AXIS tool, which evaluates cross sectional systematic reviews. Narrative synthesis was used to summarise and convey the data. Results Out of 1840 search results, 10 studies were included. Positive outlook and limited knowledge among providers were seen across trials. Healthcare professionals like telehealth for its ability to improve quality, access, and delivery, save time and money, and be successful. Age, gender, occupation, and work experience also affect health workers knowledge. In Saudi Arabia, healthcare professionals face inadequate expert assistance, patient privacy, internet connection concerns, lack of training courses, lack of telehealth understanding, and high costs while performing telemedicine. Conclusions Healthcare practitioners telehealth perceptions and knowledge were examined in this systematic study. Its collection of concerned experts different personal attitudes and expertise would help enhance telehealths implementation in Saudi Arabia, develop its healthcare delivery alternative, and eliminate frequent problems. Badriah Mousa I Mulayhi | Dr. Jomin George | Judy Jenkins "Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in Saudi Arabia: A Systematic Review" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64535.pdf Paper Url: https://www.ijtsrd.com/medicine/other/64535/assess-perspective-and-knowledge-of-healthcare-providers-towards-elehealth-in-saudi-arabia-a-systematic-review/badriah-mousa-i-mulayhi
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
The impact of digital media on the distribution of power and the weakening of traditional gatekeepers has gained considerable attention in recent years. The adoption of digital technologies and the internet has resulted in declining influence and power for traditional gatekeepers such as publishing houses and news organizations. Simultaneously, digital media has facilitated the emergence of new voices and players in the media industry. Digital medias impact on power decentralization and gatekeeper erosion is visible in several ways. One significant aspect is the democratization of information, which enables anyone with an internet connection to publish and share content globally, leading to citizen journalism and bypassing traditional gatekeepers. Another aspect is the disruption of conventional media industry business models, as traditional organizations struggle to adjust to the decrease in advertising revenue and the rise of digital platforms. Alternative business models, such as subscription models and crowdfunding, have become more prevalent, leading to the emergence of new players. Overall, the impact of digital media on the distribution of power and the weakening of traditional gatekeepers has brought about significant changes in the media landscape and the way information is shared. Further research is required to fully comprehend the implications of these changes and their impact on society. Dr. Kusum Lata "The Impact of Digital Media on the Decentralization of Power and the Erosion of Traditional Gatekeepers" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64544.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/political-science/64544/the-impact-of-digital-media-on-the-decentralization-of-power-and-the-erosion-of-traditional-gatekeepers/dr-kusum-lata
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
This research investigates the nexus between online discussions on Dr. B.R. Ambedkars ideals and their impact on social inclusion among college students in Gurugram, Haryana. Surveying 240 students from 12 government colleges, findings indicate that 65 actively engage in online discussions, with 80 demonstrating moderate to high awareness of Ambedkars ideals. Statistically significant correlations reveal that higher online engagement correlates with increased awareness p 0.05 and perceived social inclusion. Variations across colleges and a notable effect of college type on perceived social inclusion highlight the influence of contextual factors. Furthermore, the intersectional analysis underscores nuanced differences based on gender, caste, and socio economic status. Dr. Kusum Lata "Online Voices, Offline Impact: Ambedkar's Ideals and Socio-Political Inclusion - A Study of Gurugram District" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64543.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/political-science/64543/online-voices-offline-impact-ambedkars-ideals-and-sociopolitical-inclusion--a-study-of-gurugram-district/dr-kusum-lata
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
Noting calls for contextualizing Agro entrepreneurs problems and challenges of the agro entrepreneurs and for greater attention to the Role of entrepreneurs in agro entrepreneurship research, we conduct a systematic literature review of extent research in agriculture entrepreneurship to overcome the study objectives of complications of agro entrepreneurs through various factors, Development of agriculture products is a key factor for the overall economic growth of agro entrepreneurs Agro Entrepreneurs produces firsthand large scale employment, utilizes the labor and natural resources, This research outlines the problems of Weather and Soil Erosions, Market price fluctuation, stimulates labor cost problems, reduces concentration of Price volatility, Dependency on Intermediaries, induces Limited Bargaining Power, and Storage and Transportation Costs. This paper mainly devoted to highlight Problems and challenges faced for the sustainable of Agro Entrepreneurs in India. Vinay Prasad B "Problems and Challenges of Agro Entreprenurship - A Study" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64540.pdf Paper Url: https://www.ijtsrd.com/other-scientific-research-area/other/64540/problems-and-challenges-of-agro-entreprenurship--a-study/vinay-prasad-b
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
Disclosure is a process through which a business enterprise communicates with external parties. A corporate disclosure is communication of financial and non financial information of the activities of a business enterprise to the interested entities. Corporate disclosure is done through publishing annual reports. So corporate disclosure through annual reports plays a vital role in the life of all the companies and provides valuable information to investors. The basic objectives of corporate disclosure is to give a true and fair view of companies to the parties related either directly or indirectly like owner, government, creditors, shareholders etc. in the companies act, provisions have been made about mandatory and voluntary disclosure. The IT sector in India is rapidly growing, the trend to invest in the IT sector is rising and employment opportunities in IT sectors are also increasing. Therefore the IT sector is expected to have fair, full and adequate disclosure of all information. Unfair and incomplete disclosure may adversely affect the entire economy. A research study on disclosure practices of IT companies could play an important role in this regard. Hence, the present research study has been done to study and review comparative analysis of total corporate disclosure of selected IT companies of India and to put forward overall findings and suggestions with a view to increase disclosure score of these companies. The researcher hopes that the present research study will be helpful to all selected Companies for improving level of corporate disclosure through annual reports as well as the government, creditors, investors, all business organizations and upcoming researcher for comparative analyses of level of corporate disclosure with special reference to selected IT companies. Dr. Vaibhavi D. Thaker "Comparative Analysis of Total Corporate Disclosure of Selected IT Companies of India" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64539.pdf Paper Url: https://www.ijtsrd.com/other-scientific-research-area/other/64539/comparative-analysis-of-total-corporate-disclosure-of-selected-it-companies-of-india/dr-vaibhavi-d-thaker
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
This study investigated the impact of educational background and professional training on human rights awareness among secondary school teachers in the Marathwada region of Maharashtra, India. The key findings reveal that higher levels of education, particularly a master’s degree, and fields of study related to education, humanities, or social sciences are associated with greater human rights awareness among teachers. Additionally, both pre service teacher training and in service professional development programs focused on human rights education significantly enhance teacher’s knowledge, skills, and competencies in promoting human rights principles in their classrooms. Baig Ameer Bee Mirza Abdul Aziz | Dr. Syed Azaz Ali Amjad Ali "The Impact of Educational Background and Professional Training on Human Rights Awareness among Secondary School Teachers" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64529.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/education/64529/the-impact-of-educational-background-and-professional-training-on-human-rights-awareness-among-secondary-school-teachers/baig-ameer-bee-mirza-abdul-aziz
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
“One Language sets you in a corridor for life. Two languages open every door along the way” Frank Smith English as a foreign language or as a second language has been ruling in India since the period of Lord Macaulay. But the question is how much we teach or learn English properly in our culture. Is there any scope to use English as a language rather than a subject How much we learn or teach English without any interference of mother language specially in the classroom teaching learning scenario in West Bengal By considering all these issues the researcher has attempted in this article to focus on the effective teaching learning process comparing to other traditional strategies in the field of English curriculum at the secondary level to investigate whether they fulfill the present teaching learning requirements or not by examining the validity of the present curriculum of English. The purpose of this study is to focus on the effectiveness of the systematic, scientific, sequential and logical transaction of the course between the teachers and the learners in the perspective of the 5Es programme that is engage, explore, explain, extend and evaluate. Sanchali Mondal | Santinath Sarkar "A Study on the Effective Teaching Learning Process in English Curriculum at the Secondary Level of West Bengal" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd62412.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/education/62412/a-study-on-the-effective-teaching-learning-process-in-english-curriculum-at-the-secondary-level-of-west-bengal/sanchali-mondal
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
This paper reports on a study which was conducted to investigate the role of mentoring and its influence on the effectiveness of the teaching of Physics in secondary schools in the South West Region of Cameroon. The study adopted the convergent parallel mixed methods design, focusing on respondents in secondary schools in the South West Region of Cameroon. Both quantitative and qualitative data were collected, analysed separately, and the results were compared to see if the findings confirm or disconfirm each other. The quantitative analysis found that majority of the respondents 72 of Physics teachers affirmed that they had more experienced colleagues as mentors to help build their confidence, improve their teaching, and help them improve their effectiveness and efficiency in guiding learners’ achievements. Only 28 of the respondents disagreed with these statements. With majority respondents 72 agreeing with the statements, it implies that in most secondary schools, experienced Physics teachers act as mentors to build teachers’ confidence in teaching and improving students’ learning. The interview qualitative data analysis summarized how secondary school Principals use meetings with mentors and mentees to promote mentorship in the school milieu. This has helped strengthen teachers’ classroom practices in secondary schools in the South West Region of Cameroon. With the results confirming each other, the study recommends that mentoring should focus on helping teachers employ social interactions and instructional practices feedback and clarity in teaching that have direct measurable impact on students’ learning achievements. Andrew Ngeim Sumba | Frederick Ebot Ashu | Peter Agborbechem Tambi "The Role of Mentoring and Its Influence on the Effectiveness of the Teaching of Physics in Secondary Schools in the South West Region of Cameroon" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64524.pdf Paper Url: https://www.ijtsrd.com/management/management-development/64524/the-role-of-mentoring-and-its-influence-on-the-effectiveness-of-the-teaching-of-physics-in-secondary-schools-in-the-south-west-region-of-cameroon/andrew-ngeim-sumba
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
This study primarily focuses on the design of a high side buck converter using an Arduino microcontroller. The converter is specifically intended for use in DC DC applications, particularly in standalone solar PV systems where the PV output voltage exceeds the load or battery voltage. To evaluate the performance of the converter, simulation experiments are conducted using Proteus Software. These simulations provide insights into the input and output voltages, currents, powers, and efficiency under different state of charge SoC conditions of a 12V,70Ah rechargeable lead acid battery. Additionally, the hardware design of the converter is implemented, and practical data is collected through operation, monitoring, and recording. By comparing the simulation results with the practical results, the efficiency and performance of the designed converter are assessed. The findings indicate that while the buck converter is suitable for practical use in standalone PV systems, its efficiency is compromised due to a lower output current. Chan Myae Aung | Dr. Ei Mon "Design Simulation and Hardware Construction of an Arduino-Microcontroller Based DC-DC High-Side Buck Converter for Standalone PV System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64518.pdf Paper Url: https://www.ijtsrd.com/engineering/mechanical-engineering/64518/design-simulation-and-hardware-construction-of-an-arduinomicrocontroller-based-dcdc-highside-buck-converter-for-standalone-pv-system/chan-myae-aung
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
Energy becomes sustainable if it meets the needs of the present without compromising the ability of future generations to meet their own needs. Some of the definitions of sustainable energy include the considerations of environmental aspects such as greenhouse gas emissions, social, and economic aspects such as energy poverty. Generally far more sustainable than fossil fuel are renewable energy sources such as wind, hydroelectric power, solar, and geothermal energy sources. Worthy of note is that some renewable energy projects, like the clearing of forests to produce biofuels, can cause severe environmental damage. The sustainability of nuclear power which is a low carbon source is highly debated because of concerns about radioactive waste, nuclear proliferation, and accidents. The switching from coal to natural gas has environmental benefits, including a lower climate impact, but could lead to delay in switching to more sustainable options. “Carbon capture and storage” can be built into power plants to remove the carbon dioxide CO2 emissions, but this technology is expensive and has rarely been implemented. Leading non renewable energy sources around the world is fossil fuels, coal, petroleum, and natural gas. Nuclear energy is usually considered another non renewable energy source, although nuclear energy itself is a renewable energy source, but the material used in nuclear power plants is not. The paper addresses the issue of sustainable energy, its attendant benefits to the future generation, and humanity in general. Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku "Sustainable Energy" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64534.pdf Paper Url: https://www.ijtsrd.com/engineering/electrical-engineering/64534/sustainable-energy/paul-a-adekunte
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
This paper aims to outline the executive regulations, survey standards, and specifications required for the implementation of the Sudan Survey Act, and for regulating and organizing all surveying work activities in Sudan. The act has been discussed for more than 5 years. The Land Survey Act was initiated by the Sudan Survey Authority and all official legislations were headed by the Sudan Ministry of Justice till it was issued in 2022. The paper presents conceptual guidelines to be used for the Survey Act implementation and to regulate the survey work practice, standardizing the field surveys, processing, quality control, procedures, and the processes related to survey work carried out by the stakeholders and relevant authorities in Sudan. The conceptual guidelines are meant to improve the quality and harmonization of geospatial data and to aid decision making processes as well as geospatial information systems. The established comprehensive executive regulations will govern and regulate the implementation of the Sudan Survey Geomatics Act in all surveying and mapping practices undertaken by the Sudan Survey Authority SSA and state local survey departments for public or private sector organizations. The targeted standards and specifications include the reference frame, projection, coordinate systems, and the guidelines and specifications that must be followed in the field of survey work, processes, and mapping products. In the last few decades, there has been a growing awareness of the importance of geomatics activities and measurements on the Earths surface in space and time, together with observing and mapping the changes. In such cases, data must be captured promptly, standardized, and obtained with more accuracy and specified in much detail. The paper will also highlight the current situation in Sudan, the degree to which survey standards are used, the problems encountered, and the errors that arise from not using the standards and survey specifications. Kamal A. A. Sami "Concepts for Sudan Survey Act Implementations - Executive Regulations and Standards" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63484.pdf Paper Url: https://www.ijtsrd.com/engineering/civil-engineering/63484/concepts-for-sudan-survey-act-implementations--executive-regulations-and-standards/kamal-a-a-sami
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
The discussions between ellipsoid and geoid have invoked many researchers during the recent decades, especially during the GNSS technology era, which had witnessed a great deal of development but still geoid undulation requires more investigations. To figure out a solution for Sudans local geoid, this research has tried to intake the possibility of determining the geoid model by following two approaches, gravimetric and geometrical geoid model determination, by making use of GNSS leveling benchmarks at Khartoum state. The Benchmarks are well distributed in the study area, in which, the horizontal coordinates and the height above the ellipsoid have been observed by GNSS while orthometric heights were carried out using precise leveling. The Global Geopotential Model GGM represented in EGM2008 has been exploited to figure out the geoid undulation at the benchmarks in the study area. This is followed by a fitting process, that has been done to suit the geoid undulation data which has been computed using GNSS leveling data and geoid undulation inspired by the EGM2008. Two geoid surfaces were created after the fitting process to ensure that they are identical and both of them could be counted for getting the same geoid undulation with an acceptable accuracy. In this respect, statistical operation played an important role in ensuring the consistency and integrity of the model by applying cross validation techniques splitting the data into training and testing datasets for building the geoid model and testing its eligibility. The geometrical solution for geoid undulation computation has been utilized by applying straightforward equations that facilitate the calculation of the geoid undulation directly through applying statistical techniques for the GNSS leveling data of the study area to get the common equation parameters values that could be utilized to calculate geoid undulation of any position in the study area within the claimed accuracy. Both systems were checked and proved eligible to be used within the study area with acceptable accuracy which may contribute to solving the geoid undulation problem in the Khartoum area, and be further generalized to determine the geoid model over the entire country, and this could be considered in the future, for regional and continental geoid model. Ahmed M. A. Mohammed. | Kamal A. A. Sami "Towards the Implementation of the Sudan Interpolated Geoid Model (Khartoum State Case Study)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63483.pdf Paper Url: https://www.ijtsrd.com/engineering/civil-engineering/63483/towards-the-implementation-of-the-sudan-interpolated-geoid-model-khartoum-state-case-study/ahmed-m-a-mohammed
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
Sudan is witnessing an acceleration in the processes of development and transformation in the performance of government institutions to raise the productivity and investment efficiency of the government sector. The development plans and investment opportunities have focused on achieving national goals in various sectors. This paper aims to illuminate the path to the future and provide geospatial data and information to develop the investment climate and environment for all sized businesses, and to bridge the development gap between the Sudan states. The Sudan Survey Authority SSA is the main advisor to the Sudan Government in conducting surveying, mappings, designing, and developing systems related to geospatial data and information. In recent years, SSA made a strategic partnership with the Ministry of Investment to activate Geospatial Information for Sudans Sustainable Investment and in particular, for the preparation and implementation of the Sudan investment map, based on the directives and objectives of the Ministry of Investment MI in Sudan. This paper comes within the framework of activating the efforts of the Ministry of Investment to develop technical investment services by applying techniques adopted by the Ministry and its strategic partners for advancing investment processes in the country. Kamal A. A. Sami "Activating Geospatial Information for Sudan's Sustainable Investment Map" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63482.pdf Paper Url: https://www.ijtsrd.com/engineering/information-technology/63482/activating-geospatial-information-for-sudans-sustainable-investment-map/kamal-a-a-sami
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
In a rapidly changing global landscape, the importance of education as a unifying force cannot be overstated. This paper explores the crucial role of educational unity in fostering a stronger and more inclusive society through the embrace of diversity. By examining the benefits of diverse learning environments, the paper aims to highlight the positive impact on societal strength. The discussion encompasses various dimensions, from curriculum design to classroom dynamics, and emphasizes the need for educational institutions to become catalysts for unity in diversity. It highlights the need for a paradigm shift in educational policies, curricula, and pedagogical approaches to ensure that they are reflective of the diverse fabric of society. This paper also addresses the challenges associated with implementing inclusive educational practices and offers practical strategies for overcoming barriers. It advocates for collaborative efforts between educational institutions, policymakers, and communities to create a supportive ecosystem that promotes diversity and unity. Mr. Amit Adhikari | Madhumita Teli | Gopal Adhikari "Educational Unity: Embracing Diversity for a Stronger Society" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64525.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/education/64525/educational-unity-embracing-diversity-for-a-stronger-society/mr-amit-adhikari
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
The diversity of indigenous knowledge systems in India is vast and can vary significantly between different communities and regions. Preserving and respecting these knowledge systems is crucial for maintaining cultural heritage, promoting sustainable practices, and fostering cross cultural understanding. In this paper, an overview of the prospects and challenges associated with incorporating Indian indigenous knowledge into management is explored. It is found that IIKS helps in management in many areas like sustainable development, tourism, food security, natural resource management, cultural preservation and innovation, etc. However, IIKS integration with management faces some challenges in the form of a lack of documentation, cultural sensitivity, language barriers legal framework, etc. Savita Lathwal "Integration of Indian Indigenous Knowledge System in Management: Prospects and Challenges" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63500.pdf Paper Url: https://www.ijtsrd.com/management/accounting-and-finance/63500/integration-of-indian-indigenous-knowledge-system-in-management-prospects-and-challenges/savita-lathwal
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
The COVID 19 pandemic has highlighted the crucial need of preventive measures, with widespread use of face masks being a key method for slowing the viruss spread. This research investigates face mask identification using deep learning as a technological solution to be reducing the risk of coronavirus transmission. The proposed method uses state of the art convolutional neural networks CNNs and transfer learning to automatically recognize persons who are not wearing masks in a variety of circumstances. We discuss how this strategy improves public health and safety by providing an efficient manner of enforcing mask wearing standards. The report also discusses the obstacles, ethical concerns, and prospective applications of face mask detection systems in the ongoing fight against the pandemic. Dilip Kumar Sharma | Aaditya Yadav "DeepMask: Transforming Face Mask Identification for Better Pandemic Control in the COVID-19 Era" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64522.pdf Paper Url: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/64522/deepmask-transforming-face-mask-identification-for-better-pandemic-control-in-the-covid19-era/dilip-kumar-sharma
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
Efficient and accurate data collection is paramount in clinical trials, and the design of Electronic Case Report Forms eCRFs plays a pivotal role in streamlining this process. This paper explores the integration of machine learning techniques in the design and implementation of eCRFs to enhance data collection efficiency. We delve into the synergies between eCRF design principles and machine learning algorithms, aiming to optimize data quality, reduce errors, and expedite the overall data collection process. The application of machine learning in eCRF design brings forth innovative approaches to data validation, anomaly detection, and real time adaptability. This paper discusses the benefits, challenges, and future prospects of leveraging machine learning in eCRF design for streamlined and advanced data collection in clinical trials. Dhanalakshmi D | Vijaya Lakshmi Kannareddy "Streamlining Data Collection: eCRF Design and Machine Learning" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63515.pdf Paper Url: https://www.ijtsrd.com/biological-science/biotechnology/63515/streamlining-data-collection-ecrf-design-and-machine-learning/dhanalakshmi-d
Join educators from the US and worldwide at this year’s conference, themed “Strategies for Proficiency & Acquisition,” to learn from top experts in world language teaching.
Credit limit improvement system in odoo 17Celine George
In Odoo 17, confirmed and uninvoiced sales orders are now factored into a partner's total receivables. As a result, the credit limit warning system now considers this updated calculation, leading to more accurate and effective credit management.
How to Show Sample Data in Tree and Kanban View in Odoo 17Celine George
In Odoo 17, sample data serves as a valuable resource for users seeking to familiarize themselves with the functionalities and capabilities of the software prior to integrating their own information. In this slide we are going to discuss about how to show sample data to a tree view and a kanban view.
How to Install Theme in the Odoo 17 ERPCeline George
With Odoo, we can select from a wide selection of attractive themes. Many excellent ones are free to use, while some require payment. Putting an Odoo theme in the Odoo module directory on our server, downloading the theme, and then installing it is a simple process.
How to Add Colour Kanban Records in Odoo 17 NotebookCeline George
In Odoo 17, you can enhance the visual appearance of your Kanban view by adding color-coded records using the Notebook feature. This allows you to categorize and distinguish between different types of records based on specific criteria. By adding colors, you can quickly identify and prioritize tasks or items, improving organization and efficiency within your workflow.
Ardra Nakshatra (आर्द्रा): Understanding its Effects and RemediesAstro Pathshala
Ardra Nakshatra, the sixth Nakshatra in Vedic astrology, spans from 6°40' to 20° in the Gemini zodiac sign. Governed by Rahu, the north lunar node, Ardra translates to "the moist one" or "the star of sorrow." Symbolized by a teardrop, it represents the transformational power of storms, bringing both destruction and renewal.
About Astro Pathshala
Astro Pathshala is a renowned astrology institute offering comprehensive astrology courses and personalized astrological consultations for over 20 years. Founded by Gurudev Sunil Vashist ji, Astro Pathshala has been a beacon of knowledge and guidance in the field of Vedic astrology. With a team of experienced astrologers, the institute provides in-depth courses that cover various aspects of astrology, including Nakshatras, planetary influences, and remedies. Whether you are a beginner seeking to learn astrology or someone looking for expert astrological advice, Astro Pathshala is dedicated to helping you navigate life's challenges and unlock your full potential through the ancient wisdom of Vedic astrology.
For more information about their courses and consultations, visit Astro Pathshala.
How to Handle the Separate Discount Account on Invoice in Odoo 17Celine George
In Odoo, separate discount account can be set up to accurately track and manage discounts applied on various transaction and ensure precise financial reporting and analysis
Delegation Inheritance in Odoo 17 and Its Use CasesCeline George
There are 3 types of inheritance in odoo Classical, Extension, and Delegation. Delegation inheritance is used to sink other models to our custom model. And there is no change in the views. This slide will discuss delegation inheritance and its use cases in odoo 17.
Front Desk Management in the Odoo 17 ERPCeline George
Front desk officers are responsible for taking care of guests and customers. Their work mainly involves interacting with customers and business partners, either in person or through phone calls.
Understanding and Interpreting Teachers’ TPACK for Teaching Multimodalities i...Neny Isharyanti
Presented as a plenary session in iTELL 2024 in Salatiga on 4 July 2024.
The plenary focuses on understanding and intepreting relevant TPACK competence for teachers to be adept in teaching multimodality in the digital age. It juxtaposes the results of research on multimodality with its contextual implementation in the teaching of English subject in the Indonesian Emancipated Curriculum.
2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD31586 | Volume – 4 | Issue – 4 | May-June 2020 Page 1549
a packet oriented protocol. The packets are generated
irrespective of the incoming data protocols. TCP/IP
networks have the same packet characteristics as Ethernet
and frame relay network.It mustestablishconnectionbefore
transferring data as it is connection oriented. Once the
connection is established, the server then responds to the
queries from the client until the client closes the connection.
Vulnerabilities of a SCADA System:
Many Vulnerabilities can pose as a threat for such systems
like hackers, security-unaware employees, Malware,Lack of
Software and Hardware maintenance. Critical infrastructure
threats include equipment failure, terrorist attacks,
accidents, crimes and natural disasters. These may be
reasons for failure of such systems. Hence these systems
need to be made robust and should be maintained on a
timely basis. Apart from Hardware loses and attacks, the
more vulnerable part is the software as the hackers and
other cyber predators are onestepahead.Accordingtoa risk
report, around 60 % of such sites aren’t using anti-virus
protections throwing a risk of updating signatures
automatically. Around 70% sites use easily crack able
passwords which could lead to denial of service,
manipulation and data interception.
There may be hackers who gain access to the SCADA
network may make some unauthorized changes to
instructions and commands by compromising the servers.
This could be an act of outsider or insider where different
information to operators and control systems could be
presented. Majority of SCADA network have MasterStations
which can control the systems and if these stations are not
protected by firewalls, antivirus or other methods can lead
to undesirable conditions. Equipment protection systems
could be messed up and can lead to destruction in costlyand
irreplaceable equipment. Interferenceinsafetysystemcanal
so endanger human life.
Combating SCADA Vulnerabilities:
With the usage of client–server basedprotocols,theproblem
of security of the network is encountered. The prominent
challenge is to restrict the unauthorized access. Then comes
the question of enhancing security inside the SCADA
network and to develop security monitoring tools. Focus
should also be diverted to cryptography and key
management along with the device and operating system
security management. There is very little emphasis on
standard security methods like encryption and
authentication. A robust protection strategy is the need of
the hour for such systems. It is high time to realize the
importance of implementing security programs. Some
strategic steps may include removing of unnecessary
functionalities and mapping ofcurrentsystemsandknowing
all points of entry and exit which pose as threats are much
easier to monitor. Secondly, early detection of potential
attacks can limit the amount of damage done. Constant
security checks and risk assessments should be conducted
timely. Many techniques like encryption and firewalls can
protect such systems.Clevertechniqueslike“honeypots”can
deal in some manner to counteract unauthorized access
attempts. As many SCADA Systems use master control
systems which become an easy prey for the cyber predators
to attack. These systems can also be decentralizedandmade
more reliable and safe.
Blockchain: A solution for cyber threats
One way to make SCADA secure is by making t h e s y s t e m
decentralised because decentralisation will reduce
dependence on a particular master station for controlling
and monitoring operations. Blockchain is a distributed
database which maintains records of all device transactions
data on a SCADA blockchain network. Basically, blockchain
comprises of two words where block means digital
information and chain means storageinpublicdatabase. The
blocks have three main parts of information that is
information about transaction for example duration and
amount of purchase from any e-commerce site. Secondly, it
contains information about end user who is participating in
transaction and also the information to differentiate it from
other blocks. The data is stored in blocks forming a linear
sequence where each block references the hash of the
previous block. A hash is a unique ID of a block. Anybody
who tries to temper with the hash needs to change all the
hashes of successive blocks which makes it a tedious task
and therefore the data becomes temper proof. The working
of this technology combines three leading technologies that
are cryptographic keys which could be private as well as
public, a peer-to-peer network containing a shared ledger
and a machine which is used tostoretransactionandrecords
of the network. The cryptographic keys produce a secure
digital reference and play an important role in successful
transaction between two partiesremovingtheneedforthird
party. This secure identity is called digital signature in case
of crypto currency. The digital signature is combined with
peer-to-peer network where large amount of individualsact
as authors and transactions are carried out efficiently.
Advantage of the Blockchain is the greater throughputofthe
database technology,fasterdata Communicationtechnology,
efficient consensus mechanism to make sure the security of
SCADA. These transactionsdata aretimestampedandcanbe
checked whether the sender’s data and the receiver’s is
validated. Also blockchain use efficient consensus
mechanisms and algorithms which ensures that legitimate
transactions are added and synchronizes and audits them.
These consensus protocols are necessary for correct
functioning of blockchains. Some of these mechanisms are
Proof of Work (POW), Proof of stake (POS), Proof of capacity
(POC) and Proof of Elapsed Time (POET) etc. POW is also
known as mining and requires solving of complex and
asymmetric mathematical puzzles. These puzzles aresolved
on a hit and trial basis and depends upon good
computational power. The difficulty of the puzzles depends
upon how fast the blocks are mined. POS is a randomized
process in which producer of next block is determined. This
method is energy efficient and validators actually maintain
the network as they hold the coins of blockchain they are
validating on. In a delegated proof of stake methoduserscan
vote for a particular delegate. A person or organisation that
wishes to add blocks to a network refers to a delegate. This
method is also called digital democracy. POC is another
method which uses plotting whoever having the fastest
solution of puzzle creates a new block. POET is a protocol in
which assignment of random wait time to each node isdone.
Hence blockchainhasverycrucial featuresliketransparency,
encryption and accountability. This means that no single
node or group of nodes can take up majority of the set and
no one can change entire SCADA network software system
without the majority of theentirenetwork ofusersaccepting
the change, thus ensuring no harm to the system.
3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD31586 | Volume – 4 | Issue – 4 | May-June 2020 Page 1550
Conclusion:
Use of network protocols in SCADA systems make them
vulnerable to cyber attacks. Hence a robust protection
strategy is the need of the hour. Blockchaintechnologybeing
a distributed, encrypted and secure mechanism can be used
to ensure security of the system. As blockchain use
consensus mechanism to add new transactions, it wouldnot
be easy for attackers to change data and present wrong logs
thus reducing risks of scada systems.
References:
[1] John D. McDonald and Mini S. Thomas: Power System
SCADA and Smart Grids, 2015.
[2] Ronald L Krutz: Securing SCADA systems, 2005.
[3] http://www.bayshorenetworks.com
[4] Daniel Drescher: Blockchain Basics: A Non-Technical
Introduction in 25 Steps, 2017.
[5] www.hackernoon.com