Professional Documents
Culture Documents
CYBER Threats in Social Networking Websites and Physical System Security
CYBER Threats in Social Networking Websites and Physical System Security
Indexed in:
Google Scholar, EBSCO Discovery, indianjournals.com & CNKI Scholar
(China National Knowledge Infrastructure Scholar)
Indexed in:
Google Scholar, EBSCO Discovery, indianjournals.com & CNKI Scholar (China
National Knowledge Infrastructure Scholar)
CONTENTS
Abstract– Monitoring water quality is critical to has an onboard radio that can be used to send the
human health, hence employing wireless sensor collected data to interested parties. Such
netwoks for such a task requires a system that is technological development has encouraged
robust, secure and has a reliable communication. practitioners to envision aggregating the limited
Water borne diseases have become a major challenge capabilities of the individual sensor in a large scale
to human health. Around 400 million cases of such network that can operate unattended. Numerous civil
diseases are reported annually, causing 6–12 million and military applications can be leveraged by
deaths world-wide. Access to safe drinking water is networked sensors. A network of sensors can be
important as a health and development issue at employed to gather meteorological variables such as
national, regional and local level. The population in temperature and pressure. One of the advantages of
rural India mainly dependent on the ground water as wireless sensor networks (WSNs) is their ability to
a source of drinking water. The main problems at the operate unattended in harsh environments in which
time to effectively implement sensors are that, on one contemporary human-in-the-loop monitoring
hand, there is a lack of standards for contamination schemes are risky, inefficient and sometimes
testing in drinking water on the other hand, there are infeasible. Therefore, sensors are expected to be
poor links between available sensor technologies and deployed randomly in the area of interest by a
water quality regulations. In this paper the relatively uncontrolled means, e.g. dropped by a
application of WSN in environmental monitoring, helicopter, and to collectively form a network in an
with particular emphasis on water quality. Various ad-hoc manner. Given the vast area to be covered, the
WSN based water quality monitoring methods short life span of the battery-operated sensors and the
suggested by other authors are studied and analyzed, possibility of having damaged nodes during
taking into account their coverage, energy and deployment, large population of sensors are expected
security concerns. in most WSNs applications.
Keywords-- Water quality monitoring, Remote, In most part of the world, ground water is the only
Wireless Sensor Network and important supply for production of drinking
water, particularly in areas where water supply is
I. INTRODUCTION
limited. Groundwater quality will directly affect
Recent advances in MEMS-based sensor technology, human health [3]. A sensor is the electronic device
low-power analog and digital electronics, and low- that can detects and responds to the external stimulus
power RF design have enabled the development of from the physical environment. The external stimulus
relatively in- expensive and low-power wireless can be temperature, heat, moisture, pressure in the
micro sensors that are capable of detecting ambient environment. The output of the sensors is generally a
conditions such as temperature and sound. Sensors signal which can be converted into human readable
are generally equipped with data processing and form. Sensors may be classified as analog sensors
communication capabilities [1][2]. The sensing and digital sensors. Analog sensor senses the external
circuitry measures parameters from the environment parameters (wind speed, solar radiation, light
surrounding the sensor and transforms them into an intensity etc.) and gives analog voltage as an output
electric signal. Processing such a signal reveals some [4]. A digital sensor is an electronic or
properties about objects located and/or events electrochemical sensor, where data is digitally
happening in the vicinity of the sensor. Each sensor converted and transmitted. A base station is
Fig 1. Conversion of Image to text using Optical With the tremendous growth in chunks of text data,
Character Recognition there is a need to effectively summarize it to be useful.
Automatic text summarization [4] is very demanding
Fig 1. Depicts various blocks responsible for detecting and non-trivial task. There have been methods
text from the image. Once the image is scanned, it is proposed which uses word and phrase frequency to
preprocessed to remove any noise and is further extract salient sentences from the text. Overall, there
divided into segments. Every segment has its own are two different approaches for text summarization:
unique feature which must be further extracted and extraction and abstraction. Extraction works by
classified to specific groups. selecting the sentences from original text whereas
Edge detection and image segmentation are important abstraction aim at modifying the original text using
aspects in image analysis. Edge detection advanced natural language techniques in order to
differentiates different regions of an image by generate a new brief summary. However, extractive
identifying the change in gray scale and texture. Image summarization yields better results as compared to
Segmentation is another technique which divide and abstractive summarization because abstraction face
decompose image for further processing. It categorizes issues such as semantic representation and natural
the pixels with similar gray scale values and organizes language generation. Here, we focus on graph based
it into higher level units so that the objects become TextRank algorithm to perform extractive
more meaningful. The proposed system will work in summarization. TextRank [5] is an autonomous
various phases. The input image will undergo pre- machine learning algorithm and is an extension of the
processing such as removing noise induced due to the PageRank algorithm.
technique applied for thresholding and improving the VI. PROPOSED APPROACH
quality. The image will undergo image segmentation
In our proposed approach to build this application,
to separate non-text part present in the next step. input can be taken in different modes such as editable,
Further, feature extraction is performed to extract text, image, audio and video also. After the input is
preliminary features and comparing the same which taken, TextRank Algorithm can be used to convert it
are stored in the database. Sometimes, there are often into summarized text. The summarized text will be
error in which characters might be blurred or broken. taken as output and convert into speech. Input
They are processed in post-processing stage. processing from different modes has been discussed
IV. AUDIO ANALYSIS above. The major concern is summarizing the content
efficiently and accurately. In further section we will
Conversion of real time speech to text requires special
discuss about improving the graph based technique i.e.
techniques as it must be quick and precise to be
TextRank Algorithm for accurate summarization.
For a given vertex Vi, let In(Vi) represent the set of We have evaluated our application by taking 3 sample
vertices pointing towards the former vertices and articles and evaluating the summary using ROUGE
Out(Vi) represents the set of vertices pointing to the evaluation. ROUGE [6] is the most widely used
next-inline vertices. The score can be calculated for method to evaluate the summary automatically by
each vertex using the formula: adding distinguishing correlating it to human summaries. There are various
information to elaborate meaning of the text. The variations of ROUGE such as ROUGE-n, ROUGE-L
similarity function can be improvised by computing and ROUGE-SU. In ROUGE-n, a series of n-grams is
the correlation between each individual sentence and elicited from the human summaries used as reference
title of article as well. and the candidate summary. ROUGE-L used the
longest common subsequence (LCS) approach i.e. the
So, the modified similarity function between two longer the LCS, more will be the similarity. The metric
Abstract- In present scenario, humans are at Factor, Units Consumed with little bit of information
outskirts of changing technology i.e. really helping of days from installation. Due to this less
oneself to explore new things going around and get transparency between government‘s Database and
familiar in short time and giving much output. In Customer‘s need we are hereby proposing idea of
these days, Indian Government is at extent to convert ―Aadhaar Smart Meter‖ which is nothing but the live
all money in digital banks/ wallets like BHIM App, example of details discussed in above section. This
UPI Payment etc. idea is purely made upon the Database Connectivity
and SMS Service provided to Customer for particular
With that, the technology of smart meters is emerging
Smart Meter they owned with. The complete
in every street of Indian Societies/Colonies. Perhaps
exploration of ASM will be discussed in coming
this change initially is little bit unfamiliar since
Methodology. But, for now instant let‘s discuss
citizens are facing problems in getting details
coming scenario which Indian Government is trying
correctly in their hands. So, there‘s comes a need of
to establish under these needs.
developing and inventing such innovative way that
government should become completely transparent to Actually, since all governmental services are now
public and long queues for submitting electricity tending to connect with Aadhaar Database (The huge
bills. Biometric Database in world). But, due to some
insecurity issue public is not ready to share their
For this kind of problem approach, we are here to
personal Aadhaar Credentials with Government
introduce a new way to interact with all
because many are thinking of leaking of details in
governmental services like one we discuss above. So,
some wrong hands.
here introducing ―Aadhaar Smart Meter: A Real-
Time Bill Generator‖ (ASM). This new way of For that, we have solved this issue just by connecting
connecting government services brings Aadhaar Server‘s database with simple mobile number and if
server to come in existence and customer Aadhaar Database is provided then the mobile
connectivity with Smart Meter via Electricity number and respective details can be retrieved easily
Department‘s Server. The whole scenario is and quickly irrespective of huge database
discussed in coming parts. connectivity.
Keywords: Database, Smart Meter, Aadhaar II. PROPOSED IDEA
Database, Cloud, Gateway.
Before digging in the actual methodology let‘s have a
I. INTRODUCTION look on the basic architecture of ASM which can be
used to manipulate the required electrical factors and
A Smart Meter is a Digital Meter for analyzing the
to calculate the bill as month wise and set to count
Power Factor, Units Used, Power Used to be
zero.
displayed on a LCD screen with connectivity to both
Electricity Department‘s Server as well to Customer Actually, smart meter consists of the readings
Database stored in Cloud Database with respect to available for providing real-time sensors, power
customer‘s provided details like: Aadhaar_Number, outage notification and power quality monitoring.
Customer_Name, Customer_Address, Due to availability of these extra features, the simple
Customer_Region etc. But nowadays government has Automatic meter Reading differs in greater extent.
implemented Smart Meters for just displaying Power With that, the following symbolic block diagram can
Here, Fig 1 makes clear of important parts that plays - Since, nowadays the trend of using android
crucial role in making smart meter liable and device is so much at high scale of popularity
beneficial for home connection. This consists of that every citizen is active online and has
following components as follows: tremendous amount of data consumption. So,
one can use this amazing trend as a use of
- Data Reader: This is the initial point where the government‘s service.
functioning of a simple meter reading starts
which helps to store and get the data like power - The basic idea can be used to generate
outage, power units consumed which it passes to manual bill and clear out the reading shown on
LCD Controller. Also, the Home Connection is particular customer‘s meter and help to print
connected wirelessly to Electricity Department that bill at same time.
Server which helps to fetch electricity account - So, from Fig 2 one can understand the flow
no. stored as Elect_Acc_No (say) and of information takes place when scanning of
corresponding customer‘s account details which Meter LCD takes place to generate the
indirectly fetched from connected Aadhaar required bill from Meter itself. The
Database. Functioning of each component is as follows:
- LCD Controller: This is the second phase which
consists of LCD Screen connected with Data
Reader which provides the data like Power
Factor, Units Consumed to the outside world.
With that, the details at real time are getting
updated over Database maintained under
Electricity Department Server.
- Automatic SMS Sender Block: This is the block
used for sending the data manipulated in 15 days
and shown over database with calculated
proposed bill amount to the user‘s registered
mobile number so that for next 15 days,
electricity can be consumed safely to ensure
green environment and this facility will too help Fig 2: Depiction of Flow of Information
one to alert the late bill submission. Plus, after - Android Application: There will be an android
Abstract--- Nowadays, using a keyboard for entering OCR in general is classified into two types: Off-line
data is the most common way but sometime it and On-line. This technique of Off-line recognition is
becomes more time consuming and need lots of used for automated conversion of text into codes of
energy. So, a technique was invented named Optical letter which are usable by computer and applications
Character Recognition abbreviated as OCR that developed for text processing. But, it is more
transfigures printed as well as handwritten text into difficult, as different people have different
machine encoded text by electronic means. OCR has handwriting font. Whereas, On-line recognition deals
been a topic for research for more than half a century. with a continuous input of data stream that comes
It electronically and mechanically converts the from a transducer when the user types or writes.
scanned images which can be handwritten,
typewritten or printed text. In general, to figure out
the characters of page, OCR compares each scanned
letter pixel by pixel to a known database of fonts and
decides onto the closest match.
Index Terms - optical character recognition,
processed, pixel, scanned document, machine
encoded text.
I. INTRODUCTION
Optical Character Recognition is a simple way of
digitizing machine-encoded text that can be searched
through and processed by a machine. It is amongst
the greatest topic of research in the field of Artificial Fig. 1. Types of Optical Character Recognition
Intelligence, Pattern Recognition, Machine Vision II. LITERATURE REVIEW
and Signal Processing. Character Recognition
techniques associate a symbolic identity within the Research Paper Statement: A technique named
image of character. It extracts the significant Optical Character Recognition abbreviated as OCR
information and directly enters it to the database which is in its development stage has proven to be
instead of using accustomed methods of manual data much beneficial for transfiguring any kind of
insertion. handwritten material to digitized form.
This technique was firstly introduced for two main This paper reviews the work done by various authors
reasons i.e., expanding telegraphy and helping blinds in the field of exploring Optical Character
to get education. Emanuel Goldberg and Edmund Recognition. Prior studies have identified various
Fourier d‘Albe were first to work on this technique in steps involved from pre-processing the image to give
1914. They built a machine that firstly scan the the final Digitized output. Also, the paper has
characters and later convert them into standard depicted various fields where this technology has
telegraph code and another device named Optophone been efficiently implemented. But as it is in its
that produced specific tone around specific letters or development stage, it also faces few challenges in
characters. These machines were patented in 1931 giving the best required output. Integrating the
and now they are acquired by IBM. concept and theories provided in paper to various
B. Character Extraction The use of OCR technology has also been increased
in Healthcare industry to process paperwork. In the
The pre-processed image of the previous step serves healthcare industry, they deal with the huge amount
as the input of the following step. In this step, each of forms like patient details, medical-history,
single character of the image is recognized. Also, the insurance forms, etc., so, in order to reduce energy
image is converted into the window size from the and time, this technology is used.
normalized form in this step.
C. Legal Industry
C. Segmentation
Documents are scanned; information is extracted and
This is the most important step of the whole process automatically entered into the database to save space.
as it removes most of the noises from the images for The time consuming task that requires the need to
more understandable form. It segments different search for information through boxes is also
characters into various zones i.e., upper, middle and eliminated. This helps in locating any of the specific
lower zone. text/document easily. It has also helped legal industry
Segmenting is difficult in offline recognition because to have easy, fast and readily available access to a
of variability in paragraph, words of line and huge library of documents.
Abstract- Cardiovascular diseases are one of the data and diagnose problems in the healthcare field.
biggest reasons for death of millions of people
A simplified explanation of what the machine
around the world only second to cancer. A heart
learning algorithms would do is, it will learn from
attack occurs when a blood clot blocks the blood flow
previously diagnosed cases of patients. A heart
to a part of the heart. In case this blood clot cuts off
Problem must be diagnosed quickly, efficiently and
the blood flow entirely, the part of the heart muscle
correctly in order to save lives. Due to this
begins to die as a result. Going by the statistics, a
Researchers are interested in predicting risk of heart
heart problem can gradually start between the age of
disease and they created different heart risk
40-50 for people with unhealthy diet and bad lifestyle
prediction systems using various machine learning
choices. So, an early prognosis can really make a
techniques. The presence of missing and outlier data
huge difference in their lives by motivating them
in the training set often hampers the performance of a
towards a healthy and active life. By changing their
model and leads to inaccurate predictions. So, it is
lifestyle and diet this risk can be controlled. This
critical to treat missing and outlier values before
Project intends to pinpoint the most relevant/risk
making a prediction.
factors of heart disease as well as predict the overall
risk using machine learning. The machine learning 1. Missing: For continuous variable, we can find
model predicts the likelihood of patients getting a the missing values using isnull() function. Mean
heart disease trained on dataset of other individuals. of the data can also help identify. We can also
As the result, the probability of getting a heart write an algorithm to predict the missing
disease based on current lifestyle and diet is variables.
calculated. The model was trained with Framingham 2. Outlier: We can use a scatter plot to identify and
heart study dataset. as per need, delete the data, perform
Keywords:-Heart Disease, Machine Learning, logistic transformation, binning, Imputation or any other
regression, Cross-validation method. Diagnosis of heart disease using K-fold
cross validation method will be used to evaluate
I. INTRODUCTION
the data and the result would be more accurate.
Machine Learning is one of the most rapidly evolving 80% data of the patients will be used for training
fields of AI which is used in many areas of life, and 20% for testing. Parameter tuning is also
primarily in the healthcare field. It has a great value necessary if accuracy is not close to 80 %.
in the healthcare field since it is an intelligent tool to Logistic regression is the suitable regression
analyse data, and the medical field is rich with data. analysis to perform when the dependent variable
In the past few years, numerous amounts of data were „y‟ is either 0 or 1. Like all regression models,
collected and stored because of the digital revolution. the logistic regression is a type of predictive
Monitoring and other data collection devices are analysis. Logistic regression is used to explain
available in modern hospitals and are being used the relationship between dependent variable
every day, and abundant amounts of data are being usually „y‟ and various nominal, ordinal,
gathered. It is very hard or even impossible for interval or ratio-level independent variables
humans to derive useful information from these (array of x features).
massive amounts of data that is why machine
3. Features have higher odds of explaining the
learning is widely used nowadays to analyse these
variance in the dataset. Thus, giving improved
Abstract- Wireless Sensor Network (WSN) has wide mechanisms is increasing day by day. Wireless
range of application areas such as health care, Sensor Networks may interact with sensitive data or
military and industry for real time event detection. usually these networks operate in hostile, unattended
The sensing capability of a Wireless Sensor Network environments, it is necessary to address these security
(WSN) requires sensor node as a network of it. But concerns. Security challenges of sensor networks are
these nodes are constrained in terms of size, energy, different from traditional networks due to many
memory, processing power. These nodes sense constraints of these networks. Moreover when we
environmental data perform limited processing and look at the applications of WSNs, there are many
communicate over short distances. As the applications areas, e.g., battlefield awareness, traffic
applications of wireless sensor networks are monitoring system etc. In which security of
continuously growing also the need for security information remains as an important issue. Providing
mechanisms is increasing day by day. It is very security to a WSN is a nontrivial problem. Security
essential to save WSNs from malevolent attacks in mechanisms which are applicable to wired or other
unfriendly situations. Such systems require security ad-hoc networks are not suitable for WSN. There are
design because of different restrictions of assets and many reasons behind it and we discuss those in the
the noticeable attributes of a remote sensor arrange subsequent sections. Though there are varieties of
which is a impressive test. This article is a broad challenges in sensor networks, here we focus on
survey about issues of WSNs security, which different security issues and possible remedies of
inspected as of late by analysts and a superior those.
comprehension of future bearings for WSN security.
A. Security Requirements in Wireless Sensor
Keywords- Mobile Ad hoc Network, Wireless Sensor Networks
Network, Denial of service.
The main security requirements that each WSN has
I. INTRODUCTION to fulfill are as follows.
Wireless sensor networks as a part of MANET Confidentiality: Secrecy of message transmitted
consist of large number of tiny sensor nodes that between nodes should be maintained properly. For
continuously monitors environmental conditions. that important segments of message should be
Wireless Sensor Networks are a collection of encrypted. In some cases even the two end points are
thousands of sensor nodes that are self-organized and also hidden. In some dynamic systems where nodes
are capable of wireless communication. But these keep on joining and leaving the network, forward and
nodes are constrained in terms of size, energy, backward secrecy needs to be maintained. Forward
memory, processing power [23]. These nodes sense Secrecy means that nodes leaving the network may
environmental data perform limited processing and not be able to access future transmissions on the
communicate over short distances. As the network after leaving the network and Backward
applications of wireless sensor networks are Secrecy means that new nodes may not be able to
continuously growing also the need for security access past transmissions before their joining the
Abstract—Pedestrian detection systems are image of size 256 x 256 pixels. The input image is
receiving increasing attention in both industry and divided into 256 cells with a cell size of 16 x 16
academia with the rapid development of autonomous pixels and each cell is divided into four sub-cells as
automobiles which employ artificial intelligence.This with a sub-cell size of 8 x 8 pixels.
article describes the approaches to Histogram of
The gradients Gx and Gy of a particular pixel
Oriented Gradient and support vector machine,
location is computed using 1D masks in X and Y
focusing on studying the HOG feature and
direction as:
application, detailing the process of HOG feature
extracted and the design of classifiers in pedestrian Gx = Mx• Ix
detection. Gy = My• Iy
I. INTRODUCTION whereMx = [-1 0 1] and My = [-1 0 1]T are the masks
Real-time human detection from videos is one of the used on Ix in X-direction and Iy in Y-direction
most active areas in computer vision due to its respectively. The gradient magnitude, Gmag and
widespread applications such as intelligent orientation angle, Gdir are computed.
surveillance and home security in [1], personal The gradient vector for each pixel location in the sub-
protection and kidnapping detection in [2], automatic cells are drawn using Gmag and Gdir values The
detection of crimes in [3] and human computer gradient vectors in each sub-cell are normalized to
interfaces in [4]. The successful progress towards obtain a key descriptor as shown. Similarly, key
design of autonomous vehicles such as autonomous descriptors are computed from each cell to obtain
cars [5,6], self-driven rider less bicycles [7], HOG features of input image.
autonomous robots [8] and drones [9,10] have
spearheaded research in the area of pedestrian
detection. Pedestrian detection using HOG and neural
networks is reported in [11], pedestrian detection for
advance driver assistance system using HOG and
Adaboost is reported in [12], pedestrian detection
using Bayesian and Edgelet detectors in [13], using
local binary patterns (LBP) in [14], using Motion and
Appearance patterns in [15], using Shapelet features
in [16] and using Deep Networks in [17].
II. DESIGN OF PROPOSED PEDESTRIAN
B. SVM Classifier
DETECTION SYSTEM
Support vector machine (SVM) is a new method of
In this section, the design of proposed real-time
machine learning based on statistic learning theory
pedestrian detection system is explained with feature
proposed by Vapnik et, the goal of which is to find
extraction and classifier being the two main stages of
the optimal classification surface [21].
the system
SVM is considered to be the simplest and fastest
A. HOG Feature Extraction classifier for both linear as well as non-linear
The sequence of steps followed to obtain these HOG Classification problems [18]. SVM learning aims at
features from an input image, considering an input
C. Gradient Boosting
Gradient boosting is a machine learning technique for Fig 7 Feature importance of Gradient Boosting
regression and classification problems, which
produces a prediction model in the form of an D. Support Vector Machine
ensemble of weak prediction models, typically A Support Vector Machine (SVM) is a
decision trees. Gradient Boosting Classifier is used to discriminative classifier formally defined by a
find out accurate prediction. When „random state‟ separating hyper plane in an N-dimensional space
argument of GB Classifier is zero (0) then accuracy (N — the number of features) that distinctly classifies
on training set is 1.000 and accuracy on test set is the data points either side. Support vector machine
0.944. As the training set accuracy is 100%, we are (SVM) is an emerging powerful machine learning
likely to be over fitting. To reduce over fitting, we technique to classify cases. SVM has been used in a
Due the actual fact that the quantity of social II. LITERATURE REVIEW
network users is increasing day by day, the number The popularity of the term social networking internet
of attacks disbursed by hackers to steal personal data sites has been hyperbolic, since 1997, and numerous
is additionally raised. Hacked data will be used for individuals currently square measure victimization
several functions like causing unauthorized messages social networking internet sites to speak with their
(spam), stealing cash from victim's accounts, etc. friends, perform business and lots of different usages
Section-1 gives the brief introduction about the need per the interest of the users.
of cyber security and Threat protection. Literature
The interest of social networking internet sites has
Review has been discussed in section-II. Section-III
describes the Applications of Cyber Security. cyber been hyperbolic and lots of analysis papers are
threats in social networking websites are discussed in revealed. A number of them mentioned the
protection problems with social networking,
section-IV. Anti-Threat strategies and various ways
analyzing the privacy and therefore the risks that
can be suggested for circumventing threats related to
threat the web social networking internet sites.
social website are discussed in Section-V. Risk
Assessment Methodology are discussed in section- The article [7] identifies the protection behavior and
VI. Section-VII describes the various cyber security attitudes for social network users from completing
Threats and Trends. The 5-Laws of cyber security different human ecology teams and assess, however
are describes in Section-VIII. Section-IX describes these behaviors map against privacy vulnerabilities
the Reasons cyber security is more important than inherent in social networking applications.
ever and Section-X gives the conclusion of the paper.
In the article [8], the scientific highlights the
industrial and social edges of safe and well wise use
of social networking internet sites.
It emphasizes the foremost vital threats of the users
and illustrates the basic factors behind those threats.
Moreover, it presents the policy and technical
recommendations to enhance privacy and security
Existing legislation has to be changed associated The initial step within the risk analysis method is that
with the new technology and new frauds and attacks. the infrastructure vulnerability analysis. Numerous
difficulties are encountered once crucial cyber
(d) Empowering the authentication: vulnerabilities among system environments thanks to
Access management and authentication should be the high accessibility needs and dependencies on
terribly sturdy in order that cyber crimes done by inheritance systems and protocols.
hackers, spammers and alternative cyber criminals A comprehensive vulnerability analysis ought to
might be reduce the maximum amount as doable. begin with the identification of cyber assets as well
(e) Mistreatment the foremost powerful antivirus as code, hardware, and communications protocols.
tools: Then, activities like penetration testing and
vulnerability scanning is utilized to see potential
Users should use the foremost powerful antivirus security considerations among the atmosphere. in
tools with regular updates and should keep the addition, continuing analysis of security advisories
suitable default setting, in order that the antivirus from vendors, system logs, and deployed intrusion
tools might work additional effectively. detection systems ought to be utilized to see extra
(f) Providing appropriate security tools: system vulnerabilities.
Abstract-Fuchsia is a fairly new Operating System both personal computers as well as low power
whose development was started back in 2016. running devices, particularly IOT devices.
Android supports various types of devices which is Initially, Android was developed for cameras and
having different types of screen size, Architecture, then it is extended to other electronic devices,
etc. But problem is that whenever google releases developing apps for these devices are still a complex
new updates due to a large variety of devices lots of task because of compatibility issues of native
devices doesn't receive updates that are the main devices.
issue with android.
Android operating system supports various types of
This review is about fuchsia and its current Status devices such as android wear devices, auto cars,
and how is it different from the Android operating tablets, smart phones, etc. so to develop an android
system. app for all these devices is a very tedious task.
Keywords: Internet Of Things( IOT ), Operating The Major problem with android is, not all the
System (OS), Microkernel, Little Kernel, Software devices receive updates on time.
Development Kit (SDK), GitHub
Fuchsia is developed to overcome these problems,
I INTRODUCTION with fuchsia we can develop apps for all these
devices and they can be implemented flawlessly.
Fuchsia is an open source Hybrid Real-time
Operating System which is under development. A. Architecture of Fuchsia
Prior to Fuchsia we already had android OS which is Fuchsia uses Microkernel which is an evolution of
used in almost all kinds of devices. Android little kernel (LK) named as Zircon. Zircon is a much
development was started in 2003 by android inc later segmented model and designed for smaller electronic
on google purchased them in 2005. Android‘s first devices, this is what makes Zircon different from
beta version was released in 2007 by Google and Android‘s Linux kernel [3]. The biggest problem
OHA, and then it was officially accepted by the most with Android Operating System its fragmentation,
of the companies which were in Open Handset there are nearly 840 million versions of android are
Alliance [1]. But android wasn‘t dedicatedly available which makes it complex for developers to
developed for IOT, so Google came up with an idea decide the targeted versions.
to develop an Operating system for Internet of
B. Languages supported in Fuchsia for
Things devices.
software development
In 2016 Google was uploading some of the
It supports almost all modern and trending languages
documentation[2] on the GitHub and at that time and
like Swift, C++, Go, Rust, python, which might
no-one was aware of this new operating system after
attract lots of developers on the environment.
some time google further uploaded some of the other
documents and made it clear that it is a new OS and C. Technologies Recommended by Fuchsia
its main focus is on IOT devices. Fuchsia runs on for Software Development
modern 64-bit Intel and ARM processors[1]. Flutter is Google's mobile UI framework for crafting
Purpose of development (Fuchsia) high-quality native experiences on iOS and Android
in record time[4].
Fuchsia is an Open source Operating System
Optimised and developed in a way that it supports It has lots of amazing features such as:
Abstract - Triple talaq is also known as talaq-e- in any form- spoken or written or by any electronic
biddat instant divorce. It is a kind of Islamic divorce means like by email, message or any other mean of
used by Muslims in India. It allows Muslims man to communication will be considered illegal and if any
divorce their wife legally by simply stating the word such practice found then there will be a three years
‗Talaq' three times in any form which can be in any imprisonment and will be fined. In Islam marriage is
way (verbal, written, or in electronic form). Now a considered as a contract between husband and wife
day, the huge amount of data is posted on daily basis and in that various procedures have been written on
on the social media platform. Twitter is a well known how to annul it. As per Islamic traditions, a woman
social networking platform where the user can post can ask divorce via "khula", whereas the husband can
their views, opinions, and thoughts freely. The end the marriage instantly by pronouncing talaq
sentimental analysis is a process of understanding thrice. But many have highlighted the misuse of
opinions, thoughts and feelings of people about a instant divorce by men as a reason to ban it. The man
given subject. This paper analyses tweets posted on will pay some maintenance and custody of the child
Twitter on the subject Triple from the year 2002 to to the mother. The bill passed should not be viewed
the year 2019. We have transformed unstructured from point of politics. The bill passed should not also
data into well-informed data for getting the insights be viewed from the point of religious motive or for
of people. The main focus of the work is to analyze vote bank. The bill is passed for the rights and
the feelings of people using two well-known API like respect of women. The sentimental analysis is a
TextBlob, and SpaCy. These APIs are based on process of analyzing views of people about a given
Lexicon approach. This paper predicts sentiment into subject or a topic which can be in the form of written
three classes positive, negative and neutral. or spoken language. Today in this world where a
huge amount of data generated every day,
Keywords: - Talaq, ApplicationProgramming
sentimental analysis has become a vital tool for
Interface(API),SpaCy,TextBlob,Parts-of-Speech
making sense of each processed data. This has
(POS),Natural Language Processing(NLP)
allowed companies to get the results of various
I. INTRODUCTION processes they are doing nowadays. It is a type of
text research or mining. In this paper, we are
Triple talaq also named as talaq-e-biddat instant
applying statistics, natural language processing
divorce. It is an Islamic divorce in the Muslim
(NLP), and machine learning to identify, analyze and
religion. It allows Muslims man to divorce their wife
extract some important information from tweets. The
legally by simply stating the word ‗Talaq‘ three
main objective is to observe the reviewer‘s feelings,
times in any form which can be in any way (verbal,
expressions, thoughts or judgments about a particular
written, or in electronic form).22nd August 2017 was
topic, events, or a company. This type of analysis is
the date when the Indian supreme court instantly
also known as opinion mining which has its main
deemed the triple talaq. Out of five judges, three
focus on extraction. The goal of this analysis is to get
judges have the same opinion that triple talaq is
the opinion of our audience on a particular subject by
illegal and the remaining two stated that the
analyzing a large amount of data from heterogeneous
government should ban this practice by simply
sources. Today sentimental analysis has a different
following the law. The Modi government made a bill
number of uses. With the increase in the use of social
known as the Muslim women bill, 2017 and it was
networking sites and the rise in feedbacks forms and
passed on 28th December 2017 by the Lok Sabha.
ranking sites, companies are becoming more
The bill stated that if a man gives instant triple talaq
Code Quality L3 -
Forks 805 2,214 [1] Taboada, M., Brooke, J., Tofiloski, M., Voll, K.,
& Stede, M. (2011). Lexicon-based methods for