Intrusion Detection using Machine Learning

Telecom operators are currently using Artificial Intelligence (AI) technologies to improve their services. Cloud providers are beginning to provide AI as a service, making the technology available to all customers. Compromising an operator is valuable to the attacker, and using AI to increase their success rate is considered a technique to do so. Telecommunications providers are also under attack from two directions: direct attacks from cybercriminals attempting to compromise their organization and network operations, and indirect attacks from those attempting to steal their subscribers’ data. Many classic attack vectors are present among the top threats now attacking each of these frontlines, but with new twists in terms of complexity or size that place new demands on telecoms businesses. The following are some of the threats:

  1. Distributed Denial of Service (DDoS) attacks
  2. The exploitation of vulnerabilities in network and consumer devices
  3. Compromising subscribers with social engineering, phishing or malware
  4. Insider threat
Continue reading Intrusion Detection using Machine Learning

Vector and Raster Graphics

In a simple sense, Vector graphics are not pixelated (not based on pixel) on the other hand Raster graphics is based on pixels. Vector graphics are the form of digital art that is rendered using a mathematical formula, while raster uses pixels or tiny dots that works with colors to form or create an image.

So what is Pixel??? The pixel (“picture element”) is the basic unit of programmable color on a computer display or image. The size of a pixel varies according to the resolutions for the screen. Basically, pixel used RGB colors and different forms of their blend for the specific indication. The bitmap is the file that marks the color for each pixel.

Continue reading Vector and Raster Graphics

Secret Image Sharing Based on Shamir’s Scheme

With thriving of Internet, we are fulfilled with enormous amount of
data. And security is one of the important aspect we need to tackle for
the data we send over internet. Sharing of digital contents like image
over internet in a secure fashion is a challenge with numerous attacks
present. So, storing data on a single space and transmitting over it
isn’t much more secure than it used to be. On distributed system, we
have as much space but when it come with time we are always limited.

Continue reading Secret Image Sharing Based on Shamir’s Scheme

Tha Sun

Only about 15% of stars of the entire galaxy host planetary system one of those stars is our Sun. Sun hosts our solar system. According to NASA, Our Sun is named Sol, after the Latin word for Sun, “Solis,” and anything related to the Sun we call “solar.” Sun is in the Orion Spur of the milky-way galaxy. It is believed that the sun was born when the cloud of dust and gaseous particles (solar nebula) collapsed and in the center certain mass condensed into a burning ball of gases resulting from the formation of the sun. Sun is the center of our planetary system and everything around the system revolves within the gravitational force of the sun. The Sun is almost 4.5 billion-year-old a hot glowing ball of hydrogen and helium. Without the energy of the sun, life on earth can’t be imagined. The Sun is the largest known object in our solar system with about 865,000 miles (about 1.4 million kilometers) in diameter.

Continue reading Tha Sun

Data Warehouse

Data warehousing, also known as enterprise data warehousing, is an e-method of shaping, analyzing, and reporting data that are collected periodically having similar in nature. The ability to integrate multiple sources of data is critical in modern companies to make better-informed decisions. Data warehousing, for example, enables data mining, which aids firms in identifying data patterns that might lead to increased sales and profitability.

A data warehouse is a collection of databases that aggregates data from various sources. Data that are retrieved from separate sources are checked and outliers and unnecessary data are deleted to make structured into a query-able format for the processing.

Different Tools for Data Warehouse:

Continue reading Data Warehouse

Big Data

The use of information and communication technologies (ICT) is increasing every day around the world. As a result, the volume of data is rapidly expanding. Big Data refers to large volumes of data that are quickly complicated in nature and challenging to handle and analyze in a traditional manner. Data can come from a variety of places and be kept for analytics to produce relevant and informed findings. Big data, it is now assumed, will not only be a significant component of the world in the future but will also be the future itself. Evolutions in how we store, move, analyze, and comprehend data will continue to change how businesses, organizations, and the IT professionals that support them approach their goals.

To put it another way, big data is simply a large amount of data that has been collected over time from many sources and processed to produce actionable results and knowledge for the advancement and achievement of the organization’s goals. 

Big Data is classified in the following 3 Ways:

Continue reading Big Data

Brief : SOLAR SYSTEM

The Solar System is the gravitationally bound system of the Sun and the planets or cosmic objects that orbit it. In simple words, it is the collection of eight planets and their moons, together with smaller bodies in the form of asteroids, meteoroids, and comets.

Our planetary system is located in an outer spiral arm of the Milky Way galaxy. Our planetary system is called as “solar system” because Sun hosts the solar system and Sun is the center of our planetary system and everything around the system revolves within the gravitational force of the sun. According to NASA, Our Sun is named Sol, after the Latin word for Sun, “Solis,” and anything related to the Sun we call “solar.”

Continue reading Brief : SOLAR SYSTEM

Basics of C and C++

C is a powerful general-purpose structured programming language. It is generally used to develop software like operating systems, databases, compilers, etc. C programming is a high-level programming language and is an efficient and a bit easy language for beginners. It was developed in 1972 by Dennis M. Ritchie at the Bell Telephone Laboratories to develop the UNIX operating system. C is the most widely used computer language. The entire UNIX OS was written in C. 

Continue reading Basics of C and C++

Business Intelligence (BI) in Telecom Sector

BI (Business Intelligence) convert raw data into meaningful information with the help of a set of process, structure, and technology for the betterment of the organization. In a Simple way, BI can be defined as the processing of historic data to make benchmarks and KPI to identify the market trends and business status in a visual way. BI impacts an organization’s strategic and operational business with the help of actionable intelligence and knowledge. BI supports fact-based real-time decisions by using real and historical data.

Continue reading Business Intelligence (BI) in Telecom Sector

GPON Technology

Passive optical networks (PON) technology was available in the middle of the 90s. Since the huge development of the network, various standards have been established and matured. PON developed from the first ATM PON (APON) and then evolved in Broadband PON (BPON) which is compatible with APON. Later, arisen Ethernet PON (EPON) and Gigabit PON (GPON) bring great improvement in data transmission distance and bandwidth. This tutorial will introduce GPON technology.

GPON Components

Continue reading GPON Technology