Tuesday, January 28, 2020

Multitouch Gesture Generation and Recognition Techniques

Multitouch Gesture Generation and Recognition Techniques Abstract: A huge number of users are using smart phones to communicate with each other. A smart phone user is exposed to various threats when they use their phone for communication. These threats can disorganization the operation of the smart phone, and transmit or modify user data rather than original [1]. So applications must guarantee privacy and integrity of the information. Single touch mobile security is unable to give efficient performance for confidential data. Hence we are moving towards multitouch mobile security for high security. In computing, multi-touch is authentication technology that enables a surface to recognize the presence of more than one touch points of contact with the touch screen [2]. By using multiple touch points to authenticate user for access confidential data in mobile phones. we are presenting our study about biometric gestures to authenticate user through multitouch finger points for more security [1]. Keywords: Multitouch, biometric gesture, authentication, security, smart phone Finger-tracking, Android Operating system. Introduction Todays IT admins face the troublesome task of managing the unnumberable amounts of mobile devices that connect with enterprise networks a day for communication through network. Securing mobile devices has become increasingly important now days as the numbers of the devices in operation and the uses to which they are put have expanded in world wide. The problem is compounded within the enterprise as the ongoing trend toward IT users or organizations is resulting in more and many more employee-owned devices connecting to the corporate internet. Authentication is a nothing but process in which the credentials provided are compared to those on file in a database of valid users information on a operating system. If the credentials match, the process is completed and the user is granted authorization for access to the system. The permissions and folders came back outline each the surroundings the user sees and also the method he will move with it, as well as the amount of access and differ ent rights comparable to the number of allotted cupboard space and different services [1]. The generally a computer authentication process is to use alphanumerical usernames or text based and passwords. This method has been shown to have some  disadvantages. For example, users tend to pick passwords that can be easily guessed and recognized by other hard to remember. To device this problem, some researchers have  developed authentication techniques that use multitouch biometric gesture as passwords for authentication. Multi-touch, in a computing environment, is an interface technology that enables input gestures on multiple points on the surface of a device. Although most generally used with touch screen devices on handheld devices, such as smart phones and tablets, and other multi-touch has been used for other surfaces as well, including touch pads and whiteboards, tables and walls [2]. In other words, multi-touch refers to the capability of a touch screen (or a touchpad) to recognize two or more points of contact on the surface simultaneously. The constant following of the multiple points permits the portable interface to acknowledge gestures, that modify advanced practicality similar to pinch-to-zoom, pinch. wherever gesture recognition is much of deciphering human gestures via mathematical algorithms. Gestures will originate from any bodily motion however normally originate from the face or hand and alternative human biometric gestures but the identification and recognition of posture, and human behaviours is additionally the topic of gesture recognition techniques. We used Equal Error Rate (EER) to measure accuracy. This is the rate at which False Acceptance Rate (FAR) and False Rejection Rate (FRR). To find out whether using multiple gestures would improve the systems performance, we combined scores of 2 different gestures from the same user in the same order and evaluated the EER of the combined gestures as: FAR= FRR= Developing a Gesture Authentication Technique Biometric systems are an effective way to authenticate valid users generally based on the something they are property [2] in mobile authentication. The goal of biometric identification is that the automatic verification of identity of a living person by proving over some distinctive gestures that solely he possesses in authentication method. Figure1: Multitouch behavior The biometric authentication system has two phases: enrollment phase and authentication phase. If new user must first record his secret hand signs at the first enrollment phase to the system. The process is performing the hand signs at the users discreet choice with sufficient space for hand movement during registration phase. Gesture Taxonomy [1] 1. Parallel: All fingertips are moving in the same direction during the gesture. For example, a bush swipe, during which all 5 fingers move from left to right the screen. 2. Closed: If all fingertips are moving inward toward the center of the hand. For example, a pinch gesture. 3. Opened: All fingertips are moving outward from the center of the hand. For example, a reverse pinch gesture. 4. Circular: All fingertips are rotating around the center of  the hand. For example, a clockwise or counterclockwise  rotation [1]. Figure1: Single touch Matching Touch Sequences to Specific Fingers: Hidden Markov Models [3] Hidden Markov Models (HMMs) are statistical models and simplest versions of dynamic Bayesian Networks, where the system being modelled is a Markov process with an unobserved state. It is a collection of finite states connected by transitions, much like Bayesian Networks. Each state has two probabilities: a transition probability, and an output probability distribution. Parameters of the model are determined by training data [4][5]. Figure2: Hidden Markov Models hidden states, as well as N dimensional observable symbols. Figure3: Multitouch Movement The conventional HMM is expressed as the following [4]. HMM is the mathematical tool to model signals, objects à ¢Ã¢â€š ¬Ã‚ ¦ that have the temporal structure and follow the Markov process. HMM can be described compactly as ÃŽÂ » = (A, B, à Ã¢â€š ¬) (Figure 4b) where, Figure 4: Conventional Hidden Markov Model A = {aij}: the state transition matrix aij=P[qt+1=sj|qt=si], 1à ¢Ã¢â‚¬ °Ã‚ ¤ià ¢Ã¢â‚¬ °Ã‚ ¤Naij=P[qt+1=sj|qt=si], 1à ¢Ã¢â‚¬ °Ã‚ ¤ià ¢Ã¢â‚¬ °Ã‚ ¤N B = {bj (k)}: the observation symbol probability distribution bj(k)=P[Ot=vk|qt=sj], 1à ¢Ã¢â‚¬ °Ã‚ ¤jà ¢Ã¢â‚¬ °Ã‚ ¤N, 1à ¢Ã¢â‚¬ °Ã‚ ¤kà ¢Ã¢â‚¬ °Ã‚ ¤Mbj(k)=P[Ot=vk|qt=sj], 1à ¢Ã¢â‚¬ °Ã‚ ¤jà ¢Ã¢â‚¬ °Ã‚ ¤N,1à ¢Ã¢â‚¬ °Ã‚ ¤kà ¢Ã¢â‚¬ °Ã‚ ¤M à Ã¢â€š ¬ = {à Ã¢â€š ¬i}: the initial state distribution à Ã¢â€š ¬i=P[q1=si]à Ã¢â€š ¬i=P[q1=si] Set of states: S = {s1s2, à ¢Ã¢â€š ¬Ã‚ ¦, sN} State at time t: qt Set of symbols: V = {v1, v2, à ¢Ã¢â€š ¬Ã‚ ¦, vM} Given the observation sequence OT1=O1O2OTO1T=O1O2OT and a model ÃŽÂ » = (A,B,à Ã¢â€š ¬), how do we efficiently compute P(O | ÃŽÂ »), i.e., the probability of the observation sequence given the model. Now let us consider following two states: Training: based on the input data sequences {O}, we calculate and adjust ÃŽÂ »=ÃŽÂ »ÃƒÅ'„ ÃŽÂ »=ÃŽÂ »ÃƒÅ'„ to maximize likelihood P(O | ÃŽÂ ») Recognizing: based on ÃŽÂ »ÃƒÅ'„ =(AÃÅ'„ ,BÃÅ'„ ,à Ã¢â€š ¬ÃƒÅ'„ )ÃŽÂ »ÃƒÅ'„=(AÃÅ'„,BÃÅ'„,à Ã¢â€š ¬ÃƒÅ'„) for each class, we can then assign the class in which the likelihood P(O | ÃŽÂ ») is maximized. The observation symbol probability distribution P[Ot = vk | qt = sj] can be discrete symbols or continuous variables. If the observations are different symbols. B(i,k)=P(Ot=k|qt=si) B(i,k)=P(Ot=k|qt=si) If the observations are vectors in RL, it is common to represent P[Ot | qt] as a Gaussian: P[Ot=y|qt=si]=N(y;ÃŽÂ ¼i,ÃŽÂ £i) P[Ot=y|qt=si]=ÃŽÂ (y;ÃŽÂ ¼i,ÃŽÂ £i) N(y;ÃŽÂ ¼,ÃŽÂ £)=1(2à Ã¢â€š ¬)L/2|ÃŽÂ £|1/2exp[à ¢Ã‹â€ Ã¢â‚¬â„¢12(yà ¢Ã‹â€ Ã¢â‚¬â„¢ÃƒÅ½Ã‚ ¼)TÃŽÂ £Ãƒ ¢Ã‹â€ Ã¢â‚¬â„¢1(yà ¢Ã‹â€ Ã¢â‚¬â„¢ÃƒÅ½Ã‚ ¼)] ÃŽÂ (y;ÃŽÂ ¼,ÃŽÂ £)=1(2à Ã¢â€š ¬)L/2|ÃŽÂ £|1/2exp[à ¢Ã‹â€ Ã¢â‚¬â„¢12(yà ¢Ã‹â€ Ã¢â‚¬â„¢ÃƒÅ½Ã‚ ¼)TÃŽÂ £Ãƒ ¢Ã‹â€ Ã¢â‚¬â„¢1(yà ¢Ã‹â€ Ã¢â‚¬â„¢ÃƒÅ½Ã‚ ¼)] A more flexible representation is a mixture of M Gaussians: P[Ot=y|qt=si]=à ¢Ã‹â€ Ã¢â‚¬Ëœm=1MP(Mt=m|qt=si)ÃÆ'-ÃÆ'-N(y;ÃŽÂ ¼m,i,ÃŽÂ £m,i) P[Ot=y|qt=si]=à ¢Ã‹â€ Ã¢â‚¬Ëœm=1MP(Mt=m|qt=si)ÃÆ'-ÃÆ'-ÃŽÂ (y;ÃŽÂ ¼m,i,ÃŽÂ £m,i) where Mt is a hidden variable that specifies which mixture component to use and P(Mt=m|qt=si) =C(i,m) is the conditional prior weight of each mixture component. In our approach, we both implement continuous and discrete output variable distribution for 1st and 2nd HMM stages respectively [3][6]. Dynamic Time Warping Dynamic Time Warping (DTW), introduced by Sakoe and Chiba in 1978, is an algorithm that compares two different sequences that may possibly vary in time. For example, if two video clips of different people walking a particular path were compared, the DTW algorithm would detect the similarities in the walking pattern, despite walking speed differences, accelerations or decelerations. [3][7] Figure 4: Dynamic time warping The algorithm begins with a set of template streams, describing each gesture available in the system database. This results in high computation time, and hence, limitations in recognition speed. Additionally, the storing of many templates for each gesture results in costly space usage on a resource-constrained device. Consider a training set of N sequences fS1; S2; : : : ; SNg, where each Sg represents sample of the same gesture class. Then, each sequence Sg composed by a set of feature vectors at each time t, Sg = fsg1; : : : ; sgLgg for a certain gesture category, where Lg is the length in frames of sequence Sg. Let us assume that sequences are ordered according to their length, so that Lgt1 _ Lg _ Lg+1; 8g 2 [2; ::;N ], the median length sequence is _ S = SdN2 e. This sequence _ S is used as a reference and the rest of sequences are aligned with it using the classical Dynamic Time Warping with Euclidean distance [4], in order to avoid the temporal deformations of various samples from an equivalent gesture class. Therefore, once the alignment method, all sequences have lengthLdN2 e. We define the set of warped sequences as ~ S = f ~ S1; ~ S2; : : : ; ~ SNg. Consider a training set of N sequences fS1; S2; : : : ; SNg, where each Sg represents a sample of the same gesture class. Then, each sequence Sg composed by a set of feature vectors at each time t, Sg = fsg1; : : : ; sgLgg for a certain gesture category, where Lg is the length in frames of sequence Sg. Let us consider that sequences are ordered according to their length, so that Lgt1 _ Lg _ Lg+1; 8g 2 [2; ::;N1], the median length sequence is _ S =SdN2 e[4]. This sequence _ S is used as a reference, and the remaining of sequences are assigned with it using the classical Dynamic Time Warping with Euclidean distance [3], in order to remove the temporal deformations of different samples from the same gesture category. Hence, after the alignment process, all sequences have lengthLdN2 e. We define the set of warped sequences as ~ S = f ~ S1; ~ S2; : : : ; ~ SNg [3]. Input: A gesture C={c1,..cn} with corresponding GMM model ÃŽÂ »={ÃŽÂ »1,..ÃŽÂ »m}, its similarly threshold value  µ, and the testing seprate Q={q1,..qn}, Cost Matrix M is defined,where N(x), x =(i,t) is the set of three upper-left location of x in M. Output:Working path of the dected gesture, if any. //Initialization for i=1:m do for j=1:à ¢Ã‹â€ Ã… ¾ do M(i,j)=v end end for j=1:v do M(0,j)=0 end for t=0:v do for i=1:m do x=(i,j) M(x)=D(qi,ÃŽÂ »i)+minà ¡Ã‚ µÃ‚ ªÃƒ ªÃ… ¾Ã…’à Ã‚ µ N(à ¡Ã‚ µÃ‚ ª)M(à ¡Ã‚ µÃ‚ ªÃƒ ªÃ… ¾Ã…’) End end if m(m,t) W={argminà ¡Ã‚ µÃ‚ ªÃƒ ªÃ… ¾Ã…’ à Ã‚ µ N(à ¡Ã‚ µÃ‚ ª)M(à ¡Ã‚ µÃ‚ ªÃƒ ªÃ… ¾Ã…’)} Return End end [4] Artificial Neural Networks Artificial Neural Networks (ANNs) are networks of weighted, directed graphs where the nodes are artificial neurons, and the directed edges are connections between them. The most common ANN structure is the feed forward Multi-Layer Perceptron. Feed forward means that the signals only travels one way through the net [4][8]. For input pattern p, the i-th input layer node holds xp,i. Net input to j-th node in hidden layer: Now Output of j-th node in hidden layer: Then Net input to k-th node in output layer: Finally Output of k-th node in output layer: Network error for p: Neurons are arranged in layer wise, with the outputs of each neuron in the same layer being connected to the inputs of the neurons in that layer . Finally, the output layer neurons are assigned a value. Each output layer neuron show the particular class of gesture, and the record is assigned to however classs neuron has the highest value During training, the gesture class for each neuron in the output layer is known, and the nodes can be assigned the correct value. Critical Analysis A critical analysis based on the results achieved by is shown in this section. ANNs, HMMs, and DTW algorithms were implemented on a mobile phone, and measured in performance according to recognition speed, accuracy and time needed to train [3]. Since Bayesian Networks are a super class of HMMs which have been tweaked towards gesture classification, they are not considered. Thus according to recognition, accuracy and training time we can say that DTW gives better performance as compare to HMM and ANN. These results are summarized below: Table 1: Comparison between different algorithms [3] No. Algorithm Recognition Speed Accuracy Training Time 1 HMMs 10.5ms 95.25% Long 2 ANNs 23ms 90% Medium 3 DTW 8ms 95.25% No Training Finger Tracking: Firstly we need adjust finger tracking parameters, thats why we need to activate the calibration in the tab in on-screen display [5][9]. a. Projection Signatures: Projection signatures are performed directly on the resulting threshold binary image of the hand [5]. The core process of this algorithm is consists of adding the binary pixels row by row along a diagonal (the vertical in this case). Previous knowledge of the hand angle is therefore required. A low-pass filter is applied on the signature (row sums) in order to reduce low frequency variations that create many local maxima and cause the problem of multiple positives (more than one detection per fingertip). The five maxima thereby obtained correspond to the position of the five fingers. b. Geometric Properties: The second algorithm is based on the geometric properties and, as shown on line 3 of figure 5, uses a contour image of the hand on which a reference point is set. This point can be determined either by finding the centre of mass of the contour (barycenter or centroid) or by fixing a point on the wrist [6]. Figure 5: Hand Movement Euclidean distances from that point to every contour point are then computed, with the five resulting maxima assumed to correspond to the finger ends [5]. The minima can be used to determine the intersections between fingers (finger valleys). The geometric algorithm also required filtering in order to reduce the problem of multiple positives. c. Circular Hough Transform: The circular Hough transform is applied on the contour image of the hand but could as well be performed on an edge image with complex background if no elements of the image exhibit the circular shape of the fingertip radius. This can be done efficiently for finger ends by eliminating points that are found outside the contour image. The inconvenient is that the set of discard points contains a mix of finger valleys and false positive that cannot be sorted easily [5]. d. Color Markers: While the three previous algorithms rely only on the hand characteristics to find and track the fingers, the marker algorithm tracks color markers attached to the main joints of the fingers. Each color is tracked individually using colour segmentation and filtering [5]. This permits the identification of the different hand segments. The marker colors should therefore be easy to track and should not affect the threshold, edge or contour image of the hand. Respecting these constraints makes it possible to apply all algorithms to the same video images and therefore to compare each algorithm degree of accuracy and precision with respect to the markers [5]. Comparisons: Properties Projection Signature Geometric Properties Circular Hough Transform Color Makers Locates fingers Good Good Good Good Locates fingertips Poor Normal Normal Good Locates finger ends and valleys Poor Good Good Good Work with complex background Poor Good Normal Good Precision Good Good Good Good Accuracy Poor Good Good Good Table 2: Comparison between different techniques [5] All the presented algorithms have succeeded, in various degrees, in detecting each finger. The projection signatures algorithm can only roughly identify a finger, but the circular Hough transform and geometric properties algorithms can find both finger intersections and finger end points, it is important to note that in the case where finger are folded, the end points dont correspond to the fingertips [5]. Conclusion: We have plot three prominent strategies that comprehensively characterize the signal acknowledgment that should be possible on advanced mobile phones Artificial Neural Networks, Dynamic Time Warping and Hidden Markov Models were optimized, and tested on resource constrained devices (in this instance, cellular phones), and compared against each other in terms of accuracy, and computational performance. ANNs proved to have the slowest computation performance due to the large size of the neural network. HMMs performed better, but the DTW algorithm proved to be the fastest, with comparable recognition accuracy. DTWs also did not require training, as is the case with HMMs and ANNs. References [1] Kalyani Devidas: Deshmane Android Software based Multi-touch Gestures Recognition for Secure Biometric Modality [2] Memon, K. Isbister, N. Sae-Bae, N. and K. Ahmed, Multitouch gesture based authentication, IEEE Trans. Inf. Forensics Security, vol. 9, no. 4, pp. 568-582, Apr. 2014 [3] Methods for Multi-touch Gesture Recognition:Daniel Wood [4] http://journals.sagepub.com/doi/full/10.5772/50204 [5] Finger Tracking Methods Using EyesWeb Anne-Marie Burns1 and Barbara Mazzarino2 [6]https://www.cse.buffalo.edu/~jcorso/t/CSE555/files/lecture_hmm.pdf [7]DWT: Probability-based Dynamic Time Warping and Bag-of-Visual -and-Depth-Words for Human Gesture Recognition [8]https://en.wikipedia.org/wiki/Artificial_neural_network [9]http://whatis.techtarget.com/definition/gesture-recognition Prof. Ramdas Pandurang Bagawade, Miss Pournima Akash Chavan, BE Computer Pursuing degree in PESs College of Engineering Phaltan. Miss Kajal Kantilal Jadhav, BE Computer Pursuing degree in PESs College of Engineering Phaltan

Sunday, January 19, 2020

Graduation Speech :: Graduation Speech, Commencement Address

Betty Lou is right -- Our achievements of the past four years have been an honor. And so I offer my congratulations to each of you for achieving the honor that comes with high school graduation. Up to this point, high school may be the most exciting and difficult experience of our lives. We've enjoyed the carefree and happy times with WWF-style pep assemblies, dances, Junior T-P nights, and classes with friends. We've had our bad days too, though. The days when we forgot our semester project for C.I. at home, or when we couldn't stop falling asleep and Mr. Gnome made us get up to "open a window." But far worse were the times when we felt alone. We've all had days of personal crisis when we've felt rejected by those around us or alienated from them. Hopefully, we were fortunate enough to have had a friend come rescue us from isolation, but perhaps not. As senior year comes to an end and we walk away from high school into a much bigger and more complicated world, we should not leave our years at Tree without reflecting on time spent here together and remembering what we have observed across the country, especially in the last year. There is certainly no simple answer to the tragic events that have occurred at other high schools recently. We look at the tragedies of Jonesboro, Pearl, Fayetteville, Springfield, Edinboro, West Paducah, Moses Lake, Jacksonville, and Littleton and question the reason behind the violence that occurred. While finding an answer may be impossible, it is still wise for us to look for causes and most appropriate, to search for solutions. Many of the contributing factors are likely beyond our control and there is no way for us to prevent them. There are, however, plenty of little things that we do or can do that affect others more than we realize. For example, all of us should be quick to distinguish between what is friendly teasing and what teasing torments our peers. It may have lost some significance, having been repeated so often on the news and in health classes, but it is important to treat others with respect. We never know when we may cross the line and, though not meaning to, be a source of torment to someone else. We all need to become more sensitive to what crosses the line when interacting with others. It is for our benefit, as well as others, that we do this.

Saturday, January 11, 2020

Current Issues in Law and HR Course Work Essay

Organizations are considered to be the most incentive, social arrangement of today. It’s considered a marvel to know that thousands of people with individual backgrounds, skills and interests are coordinated into various organizations, so that they can pursue their common institutionalized goals and objectives. The historians of the future see today’s organizations as the greatest achievement of our time and era. For example biogenetic engineering have had some breakthroughs. The Apollo mission to the moon was made possible by the organization called NASA. Even on day to day basis organizations play an important role in our lives. The water we drink to the food we eat or the clothes we wear all comes from different kinds of organizations Human resource is defined by many companies as a combination of the administrative functions with the performance of the company’s employees and their relations along with the company’s planning. Human resource basically develops mostly from industrial and organizational behaviour. The major function that are included in HRM are recruitment, selection, training and development, orientation, placement, separation, career planning, performance appraisal, salaries and wages, incentives and gain-sharing, benefits, services and security and employee relations and assessment. The term human resource basically refers to the people of the company. The manager of the company engages in HR because the HR activities and tasks are considered to be an important part of the company. It basically helps the company to achieve the goals and the objectives that are set for them by the management. As you all know that human resource activities also make a large contribution to the company’s success in many ways but the HR activities mostly support the strategies of the organization. The HR department basically exists to support the managers and the employees of the company and to pursue the company’s goal or objectives (Werther & Davis 1996). The major challenges that would be faced by the organization are as follows: – †¢ Population-growth challenges †¢ Global Competitive Challenges †¢ Unemployment Challenges †¢ Social Responsibility Challenges †¢ Medical, Food, Housing Challenges †¢ Unknown Challenges †¢ Ethical Challenges †¢ Workforce Diversity Challenges The objectives of the HR department are based on societal, organizational, functional and personal goals. It is known that the objectives of the company are not formally stated that is they are not in the written form. The objective of the human resource management not only reflects the intention of the middle and top management but also balances the challenges that are faced by the HR department. Objectives are basically considered as benchmarks against which the actions can be evaluated. The human resource objectives not only reflect the intention of the management but also balance the organizational challenges, the HR function and the people who are affected by it. If the company fails to succeed in its objectives it would harm the company’s profits, performance and even the survival of the firm. As we know that there are four objectives that are common to the HR management. The objectives are as follows: 1. Organizational Objective: which basically recognizes that the HR management exists and it contributes to the organizational effectiveness. The HR department basically exists so that it can help managers of the company to achieve the objectives and goals of the company. HR management only supports the managers with the human resource issues. If we put is simply the HR department only exist solely to help assist the rest of the company. 2. Functional Objective: which basically states that this objective solely exists to maintain the department’s input at a level that is considered relevant to company’s needs. A relation exists between the objectives and the HR activities and they are appraisal of the employee, placement and assessment of the employee. 3. Societal Objective: this objective shows that the company has to be ethically and socially responsive to the needs and challenges of the society while the company minimizes the negative impacts of such demands on the organization 4. Personal Objective: shows that the HR management helps assisting the employees in achieving their goals and objectives. And these goals enhance the individual’s contribution towards the organization. To achieve these goals the HR department help the managers of the company to obtain, maintain, utilize and retain the right amount and types of workers. The objectives of the employees must be met otherwise the employees would not be motivated, retained and maintained by the HR department of the company. And the employees would neglect their jobs, voice their complaints or maybe leave the organization for a better opportunity (Werther & Davis 1996). It is not necessary that all the organization can meet the HR objectives every time. Some sort of trade-offs do occur that stops the company in achieving the stated goals and objectives. When the objectives are net by the department, they make a huge contribution towards the organization’s and employees needs. And with the help of these objectives the managers are able to see the kinds of activities that are needed to be carried out and why. There is a relationship that exists between the objectives and the activities of the HR. For example, for the societal objective the supporting activities would be legal compliance, union and management relations and benefits of the employees. For the organizational objective the supporting activities would be HR planning, employee relations, selection, training and development, appraisal, placement and assessment. For functional objective the supporting activities would be performance appraisal, placement, assessment and development of the employees. And for personal objective the supporting activities would be training and development, performance appraisal, placement, assessment and compensation of the employees. The HR activities are considered as actions that are taken by the department to maintain a workforce balance that is considered as appropriate to the organization’s needs. For example, small companies who do have the HR department have small budgets and small staffs therefore the HR department of such companies only focus on the activities that they consider are important for the company. The functions or activities that are considered important for such companies would be planning, recruitment, and wages and salaries of the employees. The functions that are performed by the HR department of the organization are as follows: – Planning is the first activity that is conducted by the department. Planning can be defined as the systematic forecast that determines the company’s future and the demand and supply of the employees that would be needed by the organization. HR planning is also known as employees planning which helps the HR department and other managers of the company to develop staffing plans so that they would go along with the strategy of the company. it is important that the company is staffed with the right amount of people so that the strategic operational and functional goals of the company can be met. It has been realized by a lot companies that the HR plans are very important if the organization wants to have strategic success. For example, companies like Nokia and Apple it is important to have strategic plans because it would help the companies by developing new products and introducing them as quickly as possible in the market. It is only possible when the company is staffed with the right kind of people. Without the right people strategy based opportunities would be lost to a better staffed organization like Motorola and IBM (Werther & Davis 1996). Recruitment is one of the important activities of the HR department. Recruitment is mostly concerned with attracting and finding individuals who are capable for employment. The recruitment process begins s when the new recruits are sought and this process ends when the applicant submits and application. People who find new recruits are called recruiters. The process of hiring is faced with some limitations like costs, incentives, job requirements, policies of the company, environment conditions, insufficient and scarce resources and EEO legislation etc. Recruitment is done in two ways 1) internal channel which includes job posting program and departing employees 2) External channel which includes advertising, walk-in and write-ins, employee referrals, state employment agencies, open house, international recruiting, temporary help agencies and leased employees etc (Recruitment Process) Selection is one of the activities of the HR department. Selection is defined as a process that is based on specific steps that are used to describe that which individual should be hired. This process starts when the individual applies for the job and it ends when the final decision is made by the management of the company. the selection process is also faced with some limitations like EEO legislation, Workforce diversity and external prohibitions etc. ( The Selection Process). The selection process is based on eight steps and these steps are as follows:- †¢ Preliminary reception of applications †¢ Employment tests †¢ Selection interview †¢ Preference and background checks †¢ Medical tests †¢ Supervisory interview †¢ Realistic job preview †¢ Hiring decision Orientation, Placement and Separation is considered to be an activity of HRM. Orientation can be defined as when the new recruits are given an overview of the company on the first day of work. The orientation program of the company is based on the following goals 1) the pride of belonging to the company 2) creates awareness about the company’s business 3) emphasize on customer focus and service 4) helps to reduce the concerns that are related to the job 5) helps with development of a team member and 6) helps to establish personal growth etc. Placement can be defined as the work activities that are assigned to a new employee. The role of HR department here is that to advice the managers of the company about the rules and the regulations and it also provide counseling to the employees. Placement is based on 3 classes 1) promotion, transfer and demotion. Separation can be defined as a decision where the individual and the company must part. Separation process starts either the employer or the employee. The role of HR department is to find a method which is satisfactory for conducting a separation in such a way that it reduces the harmful factors that might affect the company. Training & Development is concerned with that placing the employees in a job does not give the company the surety that the individual would be successful in his or her job. Training and development programs are considered important for all the employees. The distinction between training and development is that training is for now and development is for the future. For example at Corning Glass there are a lot of learning opportunities that range from skilled orientation training to seminars that deal with development issues, they basically help the managers to face the issues that might arise in the future. The employees of the company are not bothered that the class is intended for training or development. It is only concerned with whether the program has helped the employees and the organization or not (Training and Development). Training and development are based on the following steps: – †¢ Need assessment †¢ Learning principles †¢ Program content †¢ Training and development objectives There are some challenges that are faced by HR department due to training and development. For example cost effectiveness, desired program content, learning principles and appropriateness of the facilities etc. The role of HR department over here is that it helps to prepare the individuals for future job responsibilities. And it also attempts stops the employees from obsolesce, work force diversity, technological changes, affirmation action and employee turnover etc. (Werther & Davis 1996) Career planning is one of the activities of the HRM. When the department is doing career planning it is mostly concerned with whether the company’s training and development programs has helped the employees with promotion chances or not. A couple of decades ago career planning was seen as an individual’s problem but now career planning is seen as the HR department’s problem. The HR managers and specialist see career planning as a way to meet the internal staffing needs. The involvement of the HR department in career planning is increasing everyday due to its benefits like low turnover, satisfies the needs of the employees, personal growth, helps with workforce diversity and decrease hoarding etc. Performance appraisal is one of the major activities of HRM. Performance appraisal can be defined as evaluating an employee’s current or past performances relative to his or her performance standard. In this competitive world companies require a high performance so that they can become dominant leaders in their perspective markets. And at the same time employees also need feedback on their performance so that it can act as a guide for their future behavior and responsibilities. There are some challenges that are faced by the HR department regarding the performance appraisal like legal constraints, rater’s biases regarding the employee based on halo effect or personal prejudice or even cross cultural biases etc. It has been vied been viewed by the experts that when there is poor performance throughout the company it creates huge problems with the human resource management activities(Grote &Grote 1996). Wages and Salaries are concerned with compensation. Compensation can be defined as something the employees receive in their return of their input to the organization. Without proper compensation the employees of the company would leave and it would be difficult for the company to hire new recruits. The result of pay dissatisfaction can harm the productivity of the company and can also harm the quality of work life as well. There are some challenges that affect the compensation plan like wage rates, union, constraints by the government and equal pay etc. ( Salary and Wages) Security, Safety and Health is considered a challenge for the HR experts that how to comply proactively with the minimum costs for the organization and to provide with the minimum of costs for the organization and to provide the greatest of benefits to its employees, whereas in the area of employee security and health companies have taken a proactive action. It is the role of the HR department to face the challenges that arise overtime. The HR is usually faced with 2 kinds of challenges: 1) Internal challenges which are also the organizational challenges. Internal challenges for example would include union, information systems, organizational conflicts between the company and the employees. 2) External challenges are those problems that exist due to the changing environment and the management has no control over it. Change in the company’s environment actually evolves at different kinds of rates. External challenges would include workforce diversity, technology, economics and government. The HR department has to follow 4 steps so that they can overcome the external challenges. They are as follows: – †¢ Monitor the environment †¢ Evaluate the impact of the challenges on the company †¢ Take proactive measures that is implement approaches that would help the company to achieve its goals †¢ Obtain and analyze the feedback. It is the role of the HR department to achieve a balance between the trade-offs of efficiency and effectiveness. For example when jobs are under specialized the job design may be simplified by decreasing the number of tasks and if the job is over specialized the number of job tasks can be enriched and expanded by the human resource department.

Friday, January 3, 2020

Security Issues Of Hadoop Services - 3238 Words

SECURITY ISSUES IN HADOOP SERVICES 10 Security Issues in Hadoop Services Jogendra Chowdari Achanta Adv Web App Using Web Services - CS 525 Professor Kihyun Kim 04/10/2016 Running head: SECURITY ISSUES IN HADOOP SERVICES 1 Abstract Big Data is creating great opportunities for businesses, companies and many large scale and small scale industries. Hadoop is an open-source cloud computing and big data framework, is increasingly used in the IT world. The rapid growth of Hadoop and Cloud Computing clearly indicates its importance as a Big Data enabling technology. Due to the loopholes of security mechanism, the security issues introduced through adaptation of this technology are also increasing. Hadoop services do not authenticate†¦show more content†¦With the use of more sophisticated pattern analysis and with the use of multiple data sources it is easy to detect the threats in early stages of the project itself. Many organizations are fighting with the remaining issues like private issues with the usage of big data. Data privacy is a liability; thus companies must be on privacy defensive. When compared to security, Privacy should consider as a profit making asset because it results in the selling o f unique product to customers which results in making money. We need to maintain balance between data privacy and national security. Visualization, controlling and inspection of the network links and ports are required to ensure security. Thus, there is a need to put the ones in insight the loop holes, conflicts, and the contents ready for attacks with respect to cloud computing, and we need to develop a platform and infrastructure which are less protected in attacks. Literature Work Hadoop is one of the open source frameworks, is used as extension to big data analytics framework which are used by a large group of vendors. This type of framework makes work easy for the companies how they?re going to store and can use the data within the digital products as well as physical products (James, M. et al. 2011). We can analyze data using Hadoop, which is emerging as solution toShow MoreRelatedSecurity Issues Of Hadoop Services3239 Words   |  13 PagesSECURITY ISSUES IN HADOOP SERVICES 11 Security Issues in Hadoop Services Jogendra Chowdari Achanta Adv Web App Using Web Services - CS 525 Professor Kihyun Kim 04/10/2016 Running head: SECURITY ISSUES IN HADOOP SERVICES 1 Abstract Big Data is creating great opportunities for businesses, companies and many large scale and small scale industries. Hadoop is an open-source cloud computing and big data framework, is increasingly used in the IT world. The rapid growth of Hadoop and CloudRead MoreCloud Computing : Services, Security, And Resilience1587 Words   |  7 Pages Cloud Computing: Services, Security and, Resilience Sai Prasad Setty  Department of Computer Science, Florida State University, Tallahassee E-mail: ss14ak@my.fsu.edu Abstract Eciency is one of the essential metrics that determines the acceptability of an operational system. In computing too experts have had to tackle the issue of eciency in terms of space and time; and striking a balance between the two. With the rapid advancement in technology over the past few decades, this exchange has evolvedRead MoreThe Development And Support Of Apache Hadoop1684 Words   |  7 Pagessupport of Apache Hadoop, a framework that allows for the distributed processing of large data sets across clusters of computers. Architected, developed, and built completely in the open, Hortonworks Data Platform (HDP) provides Hadoop designed to meet the needs of enterprise data processing.HDP is a platform for multi-workload data processing across an array of processing methods from batch through interactive to real-time - all supported with solutions for governance, integration, security and operationsRead MoreA Analysis On The Computer Services1078 Words   |  5 PagesNumerous users can utilize the modern computer services which require the identity of the users to be checked precisely. Authentication is the procedure of checking the identity of the users and it produces a critical information that can be used in securing the PC frameworks. In conventional frameworks, secret word based validation was utilized for confirmation, yet these passwords can be intercepted by hackers when sent across the PC systems. Kerberos is a solid validation strategy where verificationRead MoreChallenges Faced With Big Data1731 Words   |  7 PagesAlready some success is achieved from big data in some fields like Sloan digital sky survey so it’s mean there is some potential in big data and benefits are also real but still some challenges like scalability, heterogeneity, integration, privacy, security etc. need to be addressed for realizing full potential of big data. One of the major challenge is transformation of unstructured data to structured form for accurate and timely processing. Challenges with big data starts with very first phase ofRead MoreHow Big Data Impact On Enterprise Data Governance And Security1726 Words   |  7 PagesHow does Big Data impact on Enterprise Data Governance and Security Introduction: Big data is nothing but collecting of datasets. Organizations in current world demands data to be broken down which can used to get more high effectiveness and benefit. Big data refers to the large amounts of data which collected from various devices such as mobiles, sensors and social media etc. Generally, large amount of data have been regenerating by IT industry such as satellite data, mobile devices and etc. Read MoreA Study On Big Data1643 Words   |  7 Pagesdata and good solutions also been proposed by the researchers by developing new techniques and efficient algorithms. In this paper, a detailed study about big data, its basic concepts, history, technique, tools and cloud services are discussed. In addition to this, research issues in big data also discussed. Keywords: Big data INTRODUCTION Big data refers to large data sets whose size is beyond the ability of typical database software tools to capture, store, manage and analyze. Big data is usedRead MoreNotes On Hadoop And Mark Logic1638 Words   |  7 PagesJyoti rana Professor Savidrath By IT 440/540 4/26/2016 How To: Hadoop and Mark logic Before talking about Hadoop and Mark Logic, it is very important to understand Big Data. What is big data, what’s the consequence and how it is linked with Hadoop and Mark Logic? â€Å"Large set of data, unstructured and structured which is created everyday over the internet via different devices is known as Big Data†. For example: â€Å"if the user has 7 accounts and creates multipleRead MoreA Database Problem Before Recommending Sql, Nosql Or Bigdata838 Words   |  4 Pagesoffers better performance in data collection. †¢ SQL offers data compression techniques so that data size can be reduced. †¢ SQL offers strong authentication and access protection and has better password management too. †¢ SQL automatically updates security patches to reduce maintenance costs. 3. Describe in a few sentences a business or computational problem you would want to solve with a NoSQL database, and what makes NoSQL a better choice in this case? Ans) NoSQL database are better choice whenRead MoreBenefits Of Using Predictive Analytics Software1098 Words   |  5 Pages†¢ Enhanced use of freely available data. †¢ Building new products and services supplemented with Big Data analytics and privacy by design, developing products adapted to European privacy standards . The power and opportunity of big data applications used well, big data analysis can improve economic productivity, drive improved consumer and government services, prevent terrorists, and save lives. Examples include: †¢ Big data and the rising â€Å"Internet of Things† have made it possible to merge the manufacturing