Tuesday, December 31, 2019

What is Success - 822 Words

Success is defined as the accomplishments of one’s goals. Winning is defined as gaining the victory of something. 1 out of 14,000 people become professional athletes. 58% of students become successful after leaving college and pursuing a job. Often times, winning as a professional athlete isn’t as fulfilling as being successful in everyday life. While only few may win in any competitive environment, success is available to everyone. It is not determined by how well one does against another, but rather is measured only against oneself. Success can be understood as a product of many essential factors. Success comes from taking whatever abilities we have and using them to our greatest power. There are characteristics that are related to being an impressive individual, therefore supporting and relating to becoming successful coaches and athletes. Being successful doesn’t always mean having a nice house, job, etc. Success is not an accident. It was always the result o f our best actions. It doesn’t necessarily come from being the best but from our best efforts. It is the result from taking action, getting started, making mistakes, learning from them and looking at ways to improve them. In Jefrey Frost’s article on Characteristics contributing to the success of a sports coach, he states that â€Å"success is not guaranteed if [one] does not feel a need to improve. Successful [people] continually look for ways to improve† (Frost). The old expression â€Å"It’s not whether you win orShow MoreRelatedWhat Does Success Mean For Success?941 Words   |  4 PagesWhat Does Success Mean To You? Albert Schweitzer once stated, â€Å"Success is not the key to happiness. Happiness is the key to success. If you love what you are doing, you will be successful†. If you ask different people what success is to them, you would most likely get a variety of definitions. Some might say that success has commenced when one has finally gotten that $200,000 dream car in one’s garage. Others might say that their belief of success has established when one has found true happinessRead MoreWhat Is The Secret To Success?939 Words   |  4 PagesSuccess is everything. However you choose to define the word, there is no denying that is in great demand. If any of those dollar keychains sold at museums are to be believed, once you have success, almost everything else too – fame, wealth, even happiness – is yours. Yet despite all the hype this gateway to all things desirable remains elusive, and how to achieve it is still a mystery to most. However this ad for The Journal Collection of notebooks, which appeared in the Wall Street Journal, wouldRead MoreWhat Makes A Success?1157 Words   |  5 Pages What is Success? In today’s society, people have different views or opinions about success. It could be wealth, fame, power, or respect. My parents, I feel, are very successful people. They go to work everyday to support me and pay bills. They make sure that I have everything I need and not my wants. In that case, I asked both of my parents what their definition of success is. My dad gave me a great example, high school. He said that finishing high school can be my success. He said success isRead MoreWhat Are They Key For Success?1650 Words   |  7 PagesPauciello Period 1 May 4th, 2015 WHAT IS THEY KEY TO SUCCESS? Standing on One Microsoft Way, Redmond, Washington, one is simply flabbergasted at the nearby mountainous office towers, studded with immaculate windows, hazily reflecting the sun. How did one man, Bill Gates, establish these headquarters and virtually mold this 370$ billion company from so little? Many would argue that his intrinsic genius, inherited traits, and sheer brilliance are to blame for his success; after all, he is the wealthiestRead MoreWhat Is Amazons Success?1080 Words   |  5 Pagespeople who are new to amazon is that they sell 90% of almost everything. Reason to that is due to the fact they don’t sell any cars or houses. I would not be surprised if in the future they start to sell some. Next, I want to talk about Amazon’s success. This part is more about their strong communication with customers. I went on the app a couple weeks ago to speak with someone in customer service. Before, they had two options. You can either request a call from them or email them and get a responseRead MoreWhat Success Means to Me727 Words   |  3 PagesWhat Success Means to Me Being successful can be viewed in many different ways, such as being happy, having a nice house, being rich, being a good mother, or having something to make someone envy you. Many people only look at success in two ways: popularity and money. To me, success means to set a goal for myself, plan the steps to achieve it, carry through with the plan, and finally to achieve my goal. There is no better feeling than when you have finally accomplished your goal that you’ve setRead MoreWhat is Success Without Failure?1234 Words   |  5 Pageswonder how success is achieved and maintained. Some people argue that success is dependent on failure, because without values, a sense of character, and identifying problems, neither failure or success would exist. People change due to the problems in life. A person accomplishes success by communication to other people and the presentation of themselves. Some people argue that failures prohibit success. People misunderstand effort, or amount of energy, because it does not guarantee success. They believeRead MoreWhat Determines Success And Greatness?858 Words   |  4 PagesLife presents all with triumphs, challenges, and tragedies; it rains on the blameless as well as the corrupt, I have read. What determines success and greatness is not the experiences themselves, but how one chooses to internalize and use those experiences. When asked if I believe where I come from has influenced where I am going and the unique way I see the world, I emphatically respond, â€Å"Yes!† I wholeheartedly believe my life’s background and up-bringing, family, and experiences, have all playedRead MoreWhat Success Will Look Like755 Words   |  4 PagesWhat success will look like: - Trade waste customers are compliant with permits - Frequency of service interruptions attended within target timeframes - Attendance, restoration of service interruptions are within target timeframes - Extensions and connections to the two services are within target timeframes - All relevant operations are compliant with Environment Protection Authority licenses - Renewable energy targets are in line with the Climate Change Sector Agreement Key initiatives that supportRead MoreWhat Really Matters For Success1090 Words   |  5 PagesAccording to psychologist Dr Daniel Goleman, â€Å"what really matters for success, character, happiness and life long achievements is a definite set of emotional skills† (Goleman). Observations indicate that organizations seek the same set of competencies; emotional intelligence, good judgement, integrity, global mindset, resilience and learning agility (Chamorro-Premuzic, 2015). These competencies, are an intrinsic aspect with regard to workplace performance and success in business. Having an in-depth understanding

Monday, December 23, 2019

Essay about Violence in the Media - 813 Words

Some believe that violence in the media is to blame for violence in people, but that argument is undermined by the realization that violence existed long before video games and television. In fact, violence has actually been steadily decreasing since these things have been growing in popularity. Critics of violent media seem to long for the â€Å"good old days†; a time before there was violence in the media. These critics fail to acknowledge that those â€Å"good old days† were actually far more violent than today. While violence is still present in modern society, it pales in comparison to the violence that was once a part of daily life. For most of human history, people have lived lives dominated by violence. From primitive hunters†¦show more content†¦Ã¢â‚¬Å"Homicide rates in France, Germany, Italy and Japan either failed to change with increasing television ownership in the same period or actually declined, and American homicide rates have more rec ently been sharply declining†(30). Despite the growth of violent movies, video games, and television shows, or perhaps because of it, society as a whole has become a far less violent place than it has ever been before. Proponents of censorship assert that violence in the media causes violent behavior in children and young adults. As evidence, they point to things like the Littleton shooters’ history of playing violent video games and movies and the similarity of the shootings to certain games. A study conducted by two psychologists at the University of Michigan is often cited as having â€Å"shown that children exposed to violent programming at a young age have a higher tendency for violent and aggressive behavior later in life than children not so exposed† (31). More in depth studies have contradicted these findings. Another group did a study which followed 875 children from age eight through eighteen in upstate New York. The group concluded that â€Å"th e correlation-0.31-would mean television accounted for 10 percent of the influence that lead to this behavior† (31). It should also be known that this â€Å"only turned up in one of three measures of aggression; theShow MoreRelatedMedia Violence And The Media Essay864 Words   |  4 PagesExposure to the media violence may be especially problematic in late adolescence. Television and other media play a major role in adolescent socialization and identity development by providing perspectives, values, ideologies, and behavior models (Arnett G., Roberts D. et al.). The socializing role of television in particular may be ampliï ¬ ed by the large amount of time young people spend with this medium. Speciï ¬ cally, 18- to 24-year-olds spend more time watching television and movies than youngerRead MoreMedia, Violence, And Violence Essay1892 Words   |  8 Pageswould be the media. Media and violence are both very wide and broad concepts that have massive impacts in our societ y, and it is important to distinguish their relationship with each other. The types of media are things such as violent video games, films, newspapers, magazines and television. One particular type of media that is often very problematized is violent video games. Different studies have shown convincing and unconvincing correlational in regards to the media and violence, but to whomRead MoreMedia, Violence, And Violence Essay1949 Words   |  8 Pageswould be the media. Media and violence are both very wide and broad concepts that have massive impacts in our society, and it is important to distinguish their relationship with each other. The types of media are things such as violent video games, films, newspapers, magazines and television. One particular type of media that is often very problematized is violent video games. Different studies have shown convincing and unconvincing correlational in regards to the media and violence, but to whomRead MoreViolence in the Media1047 Words à ‚  |  5 Pagesa law that bans violence in the media: in movies, on TV, in video games, and on the Internet? Adi Shimony Golden Gate University Today, media take a major part of our lives, shape our society and create reality.  The Banning violence in the media is an efficient approach the government should take to handle the growing violence in our society. I argue that the US Government should make a law that bans violence in the media. The law needs to limit broadcasting of violence content at timesRead MoreMedia Violence1105 Words   |  5 Pages Censorship of Violence in Popular Entertainment is NOT Justified â€Å"When I was at church they taught me something else/ If you preach hate at the service those words arent anointed/ That holy water that you soak in has been poisoned/ When everyone else is more comfortable remaining voiceless/ Rather than fighting for humans that have had their rights stolen/ I might not be the same, but thats not important/ No freedom till were equal, damn right I support it.† These are lyrics from a songRead MoreMedia Violence1535 Words   |  7 Pagesat looking at the potentially harmful effects of the consumption of violent media and the impact it has on psychological factors. Two psychological factors that have been researched are empathy and aggression and how violent media influences these two emotions. Theories that have tried explaining the pathway from the viewing of violence in media and the impact on aggression have generally focused on the role of violent media being used by consumers as observational learning and promoting the developmentRead MoreMedia Violence1142 Words   |  5 Pagesbeen calculated that American kids see about 200,000 acts of violence and 25,000 murders on television by the time they reach age eighteen. (Schleifer 18) Arrests of people under the age of eighteen for violent crimes rose forty-seven percent from 1988 to 1992. (Miller 174) The American Medical Associ ation conducted a study that found a direct relationship between viewing and homicide. (Miller 176) Does this kind of overexposure to violence have a significant effect on children and teenagers? The answerRead MoreMedia Violence9754 Words   |  40 Pagesare among the greatest of imitatorsÂ… The debate over media violence has eluded definitive answers for more then three decades. At first glance, the debate is dominated by one question. Whether or not media violence causes real life violence and whether or not it has a negative effect of the modern day Canadian family. Closer examination reveals a political battle. On one hand, there are those who blame media violence for societal violence and want to censor violent content to protect our childrenRead MoreThe Violence Of The Media2018 Words   |  9 Pagesit was intended. With so many media outlets present in everyday life, it is not hard to imagine there being many concerns regarding violence in the media. This essay looks to explore why there is concerns regarding violence in the media, focusing on the glorification of violence. The essay will also look at the different types of media outlets, i.e. the music industry, film, television, internet and gaming, and how each of them may present a glorification of violence. The essay will look at the caseRead MoreMedia Violence And Crime Violence1168 Words   |  5 PagesMedia Violence and Crimes There are few debates that have been contentious for so long as the debate of whether violent medias contribute meaningfully to crimes. Because of the majority of shooting events committed by younger shooters, many politicians regard cultural effects as a potential contributing factor, while others dismiss media as a contributing factor. Within the social science community, a similar division exists (Ferguson, 2015). For example, some professional supporting groups, like

Sunday, December 15, 2019

How is data mining applied to decision making Free Essays

Introduction Data mining is not actually a new concept to man it is as old as man’s existence. It is just that the name it has, and the method of data acquisition was crude in practice to man over the years. As man shifted from the use of crude tools and a traditional means of data acquisition, to the advent of technological devices. We will write a custom essay sample on How is data mining applied to decision making? or any similar topic only for you Order Now This had made it possible for the creation of Data mining tools and softwares in order to get the required data from an existing databank, mart or warehouse. The subject matter Data mining is a very important tool that has helped in further creating new ideas and right decision making in business organization, government and also in the advancement of technology. And a review of how data mining is applied to decision making is an important focus of this research work. HISTORICAL BACKGROUND OF DATA MINING The foundation of today’s data mining techniques can be traced or dated back to the 1950’s when the work of mathematicians, logicians, and computer scientists combined to create artificial intelligence and machine learning(Buchanan,2006). During the 60’s Artificial Intelligence and statistics practitioners created new algorithms like regression analysis, maximum likelihood estimates,neural networks,liner models of classification and bias reduction(Dunham,2003:p.13). Throughout the 1970’s,1980’s and 1990’s the confluence of disciplines(Artificial Intelligence,Information Retrieval,Statistics,and Database Systems) with the availability of fast micro computers opened up a new world for retrieving and analyzing data.(Dunham,2003:Ibid) In the 90’s the term Knowledge Discovery in Databases(KDD) had been coined with the first workshop held(Fayyad,Piatetsky-Shapiro and Smyth, 1996:p.40).This huge data volume as postulated by Fayyad et al gave rise to the need for new technique for handling massive quantities of information ,many of which was located in huge databases. Also in the 90’s the concept database warehouses,a term used to describe a large database alongside came Online analytical processing(OLAP) and association rule algorithms(Han.J. et al,2001:p.3). Finally data mining became part of standard business practice.Business began using data mining to help manage all areas of the customer life cycle,including acquiring new customers,retaining good customers,increasing revenue from existing customers(Two Crows,1999:p.5). DEFINITION OF TERMS Information: This is described as a processed fact and this information got from data is analysed from a large existing data makes it possible for decision to be made rightly following the gathered important information. Data processes: Data which is handled formally in any business or organization may undergo rigid,complex processing due to the required information that is to be derived for organizations use. Due to the rigid,complex processing nature it still can be broken down into simple steps. These steps are : Classification Sorting and rearranging of data Summarizing/aggregating data Performing calculations on data Selection of data. Decisions: Information got is what is transmuted to decisions. Decisions are taken by decision takers who have certain organizational objectives in mind with a certain way of processing and appreciating information. That is why the right information has to be supplied to decision takers in an organization. According to(Kilman and Mitroff,1976),they regard individuals as falling into one of two categories in the way that they absorb information. Some people take in information best if it highly detailed and specific. The various elements of information need not to be linked as a whole.The other group absorbs information in a holistic way, that is in a less concrete way, preferring general facts, and softdata linked as a whole. They further postulated that the group that absorbs the information in totality will be involved in a high degree of analytic thought in providing adequate and detailed justifications involving quantitative reasons in support of final decisions. While the other group will rely more on intuition,experience,rules of thumb and judgement making it difficult for this group to provide justification for recommended decisions.(Ibid). DATA MINING It is important to understand what Data mining is, not only from a single perspective but from a broad one. This will entail looking at various scholastic definitions that expounds data mining as a subject. Hand(1998) Opined that data mining is the process of secondary analysis of large databases aimed at finding unsuspected relationships which are of interest or value to the database owners. Hand’s definition is questioned in the area of database owners who owners database. Is it or should it be collective or individualisticThese questions should have been discussed in Hand’s definition. Weiss And Indurkhya,(1998) Opined that Data mining is the search for valuable information in large volumes of data. This definition does not state the importance of data mining. The definition should include the importance or the relevance of the information to the individual, group or organization. Haskett(2000) narrows his definition of data mining as set of techniques used in an automated approach to exhaustively explore and surface complex relationships in every large datasets. Hand(Ibid) further postulated that data mining and statistical analysis are different from each other. In statistics he said data is collected with predefined set of questions in mind. Again according to Witten et al(2005:p.xxiii) Data mining refers to the process of finding interesting patterns in the data that are not explicitly part of the data. The idea from the scholastic definitions is that data mining can be defined as the extraction of the required data from a large volume of data (Data warehouse) which is to be analysed using data mining tools or techniques to provide the right information for an individual or a group of individuals in business organisations or institutions so that their decisions taken based on their futuristic predictions might become a positive reality. Data mining can be on the following data: Relational database Data warehouses Transactional databases Political database e.t.c DATA MINING TECHNIQUES According to Thearling(2002) the most widely used techniques in data mining are: Decision Trees: This he described as a tree-shaped structures that rules for the classification of a data set. Examples of a decision tree methods are Chisquare Automatic Interaction Detection(CHAID) and Classification And Regression Trees(CART). Rule Induction: The extraction of useful if-then rules from data based or statistical significance. Genetic Algorithms: He explained this to mean optimization techniques that use processes such as genetic combination, mutation, and natural selection in a design based on the concepts of evolution. Artificial Neural Networks: Non-linear predictive models that learn through training and resemble biological neural networks in structure. BUSINESS INTELLIGENCE Business intelligence can be defined as the intelligence got from an available data bank using data mining tools or techniques to further aid decision making after analysis. Furthermore business intelligence can also be referred to as computer based techniques used in identifying and extracting important business data and analysing the data, such as sales or by associated costs and income(Business Dictionary,2010). With the right business intelligence the right decisions are made to bring about organizational achievements, or profit maximization. Having the right business from data analysis using data mining technique or tools can help to create new ideas in business or any co-operation that seeks to introduce new products or improve on existing products that would be of important benefit to the user or consumer. TOOLS AND TECHNIQUES FOR GENERATING BUSINESS INTELLIGENCE There are a number of tools and techniques for generating business intelligence. These include: Document management system Decision support system Digital dashboards Data mining Group decision support Data warehousing Online analytical processing(OLAP) IMPORTANT FEATURES OF BUSINESS INTELLIGENCE Organizational structure is based on one important reason to meet up organization’s aims and objectives. And for this reason having the right business intelligence and its tool application holds the key to organizational achievement. It is then very paramount to discuss some of these important features of business intelligence. Improved Business Strategy Support: The objectives and aims of any business is based upon right and accurate information. With the right and accurate information on ground there can be an improved business strategy. Gaining Competitive Advantage: An organization’s deep understanding about environment, self and competitors can make use of the intelligence got to gain competitive advantage. Structured And Unstructured :This entails how data is retrieved. It can be got from other or outer sources not only from the formal or structured outputs of business transactions. DATA MINING AND ITS IMPACT ON BUSINESS The impact of data mining on business is explained by Simbarashe .Chikonyora. Simbarashe Chikonyora (2011) opined that Data mining which is the process of taking large amount of information and analysing it from a variety of angles and putting into a format that makes it a useful information to help a business improve operations, reduce costs, boost revenue ,and make better business decisions, with the help of effective data mining soft wares. He further explained that data mining is mostly used by business with a strong emphasis on consumer information such as shopping habits, financial analysis, marketing assessments†¦.etc which allows a business to determine key factors such as product ,positioning, competition, customer satisfaction, sales and business expenditures. The result according to him is that business is able to streamline its operations, develop effective marketing plans and generate sales with an impact resulting to an increase in revenue and increase in revenue and increased profitability. A REVIEW OF HOW DATA MINING IS APPLIED TO DECISION MAKING: SELECTED CASE STUDY REFERENCES. Jennifer Paddock et al (2011) took a study of about 65 companies and discovered that the mean return on a business intelligence investment, was over 400% over 2.5 years. Why was this and what could have been the resultThe following few case studies according to Jennifer pointed out the importance of Data mining as applied to decision making. Seibel: A leading company supplier of front line office system offers an entirely web –based architecture provides enterprise –wide support for internal sales, marketing, and customer service organisations and extends that support throughout the entire enterprise, uniting third-party resellers and service providers, business partners, and customers into a single information system. Chase Case Study: According to the case study by Jennifer. Chase decided to use Seibel’s front office solution as the cornerstone of its effort to unite customer relationship activities across department boundaries. Chase Manhattan is already experiencing increased communication and availability of information that enables the bank to treat its customers like people, not like account numbers. This suggests that Chase’s organization had a problem of adequate data information in relating with customers. The use of Seibel’s web-based architecture was the was last resort in solving the problem enabling all personnel in the organization to be able to work and access information in an integrated systemic order which had improved better customer relations, uniting third-party resellers and service providers, and business partners. Boise Incorporated: This corporation had major challenges which was based on three main components: Asset availability Asset operating rate The ability of the asset to produce a quality product. But the data that was needed to measure the above components came from a variety of different system of different locations. This was taken care of when Monty Bryant, maintenance service manager at Boise Inc said â€Å"right out of the box†. Corda centre view dash boards software was able to receive data from all over different systems, aggregate data, normalize it and present it in the graphical formats that was needed(Corda,2011). Further more the Boise case study was able to itemize the following: Save 520 man-hours annually through the automation of data collection and reporting process. Avoid 150,000 dollars a year in infrastructure and resource costs. Improve decisions by making business intelligence more accessible and visible Respond to performance issue faster with less energy and less resource time. Increase overall manufacturing productivity by at least 5% through asset and resource. PROBLEMS OR CHALLENGES OF DATA MINING Data mining applications makes use of database to supply the raw data for input.This can also pose as a challenge and the challenges according to(Kamelsh Mhashilkar,2011) are: Uncertainty: This refers to the error and degree of noise in the data.Data has got to be precise for consideration in a discovery system Databases usually has the challenge of noise. Noise is defined as errors in either the values or attributes or class. According to(Kamelsh 2011:Ibid) missing data can be treated by discovery systems in a number of ways such as: Simply disregard missing values. Infer missing values from known values Omit the corresponding records. LIMITATION TO THE STUDY This research work limitation was the accessibility to important topical data relevant to the subject under review,due to bureaucratic bottleneck. But the available resources used for this research solved the problem. CONCLUSION Data mining tools or techniques have brought about a change in business. Decisions in any organization or business can not be based on experience alone, now in this day and age of wide range information and competition. The further development of data mining tools and software has also made it possible for private business owners to predictively forecast making the right decisions by maximizing profits. Data mining techniques is applied on or used by various sectors which is a blessing. Though data mining has got its challenges but one can say that data mining tools and techniques would only be improved upon based on futuristic challenges that might occur due to data complications. REFERENCES Bunchanan,B.G(2006) Brief History Of Artificial Intelligence.Retrieved March 22,2006 From http://www.aaai.org/AITopics/b bhist.html Business Dictionary(2010) Definition Of Business Intelligence,Retrieved 17 March 2010:www.business dictionary.com Corda (2011) The Boise Case Study:From www.corda.com Dunham,M.H (2003) Data mining Introductory And Advanced Topics:Upper Saddle River,NJ: Pearson Education,Inc Fayyad,U.M et al(1996,Fall) From Data Mining To Knowledge Discovery In Databases.AI Magazine,17(3),pp.37-54 Hand.D.J(1998) Data Mining: Statistics And MoreThe American Statistician.2. 112-118 Han,J.And Kamber,M(2001) Data Mining:Concepts And Techniques(Morgan-Kaufman series Of Data Management System).SanDiego:Academic Press Haskett Mitch(2000) An Introduction To Data Mining.Part 1.Understanding The Critical Data Relationship In The Corporate Data Warehouse.Enterprise System Journal.V.15:32-34 Kilman R.H And Mitroff.I.I(1976) Quantitative Versus Qualitative Analysis For Management Science:Different Forms For Different Psychological Types.Tims Interfaces,Februrary. Simbarashe,C.(2011) Data Mining: From http://www.courses.co.za/users/admin Thearling,K.(2002) â€Å"Data Mining Techniques†:Retrieved From http://www.3 shore.net/zkut/text/dmwhite/dm white.htm Two crows(1999) About Data Mining(Third Edition).Retrieved February 7,2006 From http://www.two crows.com/about.dm.htm Weiss.S.H And Indurkhya.N(1998) Predictive Data Mining:A practical Guide:Morgan Kaufman Publishers San Francisco CA. Witten,I.H et al(2005) Data Mining:Practical Machine Learning Tools And Techniques(2nd ed,Morgan-Kaufman Series Of Data Management Systems)San Francisco:Elsevier. How to cite How is data mining applied to decision making?, Essay examples

Saturday, December 7, 2019

Maker and Internet of Things Application †Free Samples to Students

Question: Discuss about the Maker and Internet of Things Application. Answer: Introduction The IoT is the concept for allowing the objects to be sensed or controlled in the network infrastructure. It can create better opportunities for the direct integration into the computer based systems. The improved efficiency with economic benefits is mainly to reduce the human intervention. IoT is mainly to offer the advancement in the connectivity of the devices, systems and then working over the machineto-machine communication and covering the different variety of protocols. The interconnection of the protocols, domains and the applications is set with enabling the advancement of the application. The strategy is clear and clever since it is backed with functions that will help in heating in remote manner and set it to completely turn down the temperature when not required or no one is using. Some can also tell the latter with the help of the technology like motion sensing cameras or by tracking it on smartphone. [2] The concept of IoT is not limited to this because it has the capacity to scale up and consist of many kinds of smart towns where connected traffic signals that can supervise the use based on utility. There are smart bins as well which says that they should be emptied and the industry with all kind of connected machinery for things cover tracking the part to monitoring the crops. There is a fact where the government is motivating energy based companies to handle smart meters and all the functions along with automated usage is more effective which means there is usage of less energy. [3] There are number of areas of IoT that shows such advantages with the help of advanced gadgets which are more based one whizz impact than the effectiveness and it may also be the reason of more smart gadgets around. It is very important to understand that every new and shiny thing has some disadvantages as well and there is existence of security as well as privacy that are some of the biggest challenges for IoT. All the machines as well as systems can collect a lot of personal based data related to people and have smart kind of meter that understands the presence of people at home or usage of electronic items in the presence of people and it is also shared with other machines as well and held based on databases as and when provided by the companies. There are number of security experts that claims that there are not all the possible actions are taken to build the security system along with privacy into it usually at the early stages. To prove this, some experts hacked the number of devices from a connected monitor to automate the lights as well as smart devices along with many city-wide systems like traffic signals. The hackers have not for many part put a lot of attention on the concept of IoT and there are many people who connected their devices against any kind of attack. But it is obvious with time hackers or cyber-criminals will find a way for it as well. The framework of IoT is further susceptible to any kind of attack with every layer and thus, there are many challenges associated with security and need that must be addresses. The present state of research in the concept of IoT is mainly aimed on authenticating and with access based control protocols. However, with rise in level of advancement of present technology it is important to also incorporate new networking based protocols like 5G to accomplish the mashup of IoT based topology. Another crucial method for the authentication of ID at sensor nodes of the system. It is also considered as a one time and one of its kind of cipher based on request related methods. There are dynamic elements cipher is executed by usage based pre-shared matrix that exist between the interaction related parties. The parties can create a randomly coordinated effort that will help as the main coordinate. The important coordinate which can get transferred between the two parties not the important stuff. The key in other words is also called as password and is also generated from the present coordinate. All the messages are then sent with the help of encryption with the help of the key along with important coordinate, timestamp and device IDs. Therefore, there are two devices that can interact by properly validating the timestamps and therefore can also cancel the session associated with it. A mutual authentication scheme was presented by IoT since the platform and because of terminal nodes. The scheme also based on hashing and the nature of extraction. The characteristics of extraction was also combined with hash activity to ignore any kind of collision attack. The scheme also provides a desirable solution for gaining authentication in the system. The used process of extraction has all the important properties that are completely irreversible and needed to make sure the security level and it is also light weight which can be desired in the process. The scheme also aims on many auth entication processes especially when the platform is trying to send information to the nodes of terminal. However, the scheme will also improve the security by comfortably keeping the information sent is decreased and it work only based on theory and there is no other proof of the concept that can support it. Current and Future Security issues in IoT The issues are related to data confidentiality: it is significant to make sure that the data is safe and only present to provide authority to people. In IoT the work user consists of human as well as devices and services. It also consists of many internal objects as well that are specifically part of the network and there are external objects as well where the devices that are not part of the current network. For instance, it is important to ensure that the sensors do not reveal the current collected data for many neighbourhood nodes. There is one more problem that should be addresses in the IoT based security is how data will be managed. It is crucial for the users of IoT to stay more aware of data based management as well as mechanism that will be applied along with the process or employees accountable for the management and to make sure that the data is protected in the complete process. Authentication in every object in the concept must be able to clearly recognize as well as authenticate many other kinds of objects. At the same time, the process can create problems since it is based on the nature of IoT and there are number of entities that are part of the process. Moreover, there are times when the object can need to communicate with many other objects from the starting. Integrity is the process of IoT primarily based on overall exchange of data and information that exist between different kind of devices and it is also crucial to make sure the overall accuracy of the current data and data is being received from the right kind of sender as well as also make sure that the data is not meddled with in the process of transmission because of unintended interference. Solutions for the Threats The implementation of the mobile device management program will help in taking control of the policies which has access to the different profiles and the development. The specifications are on how the devices are secured, tracked and managed. This is important to analyze the restrictions with the attack vendor associated with the IoT data to make sure that the attacks are not introduced in the network. The overall integrity based features also imposed by maintenance of end to end security in the communication. The overall traffic associated with data can be managed typically by the usage of the firewalls as well as protocols. However, these processes do not always guarantee the overall integrity of the finish line in this concept. Conclusion The concept can also be executed in many diverse domains which consist of transportation, healthcare, agriculture, production of energy as well as distribution and many other connected areas. IoT need things to interact over the Internet to conduct business functions in an intelligent manner without any active involvement of human beings. References Chahid Y, Benabdellah M, Azizi A. Internet of things security. InWireless Technologies, Embedded and Intelligent Systems (WITS), 2017 International Conference on 2017 Apr 19 (pp. 1-6). IEEE. Svigals J, inventor. Internet of things security. United States patent US 9,432,378. 2016 Aug 30. Li S, Da Xu L. Securing the Internet of Things. Syngress; 2017 Jan 11. Dawson M, Dawson M, Eltayeb M, Omar M. Security Solutions for Hyperconnectivity and the Internet of Things. Cheng KM, Tseng CE, Tseng CH. Maker and Internet of Things application in the intelligent security by example of power extension cord. InApplied System Innovation (ICASI), 2017 International Conference on 2017 May 13 (pp. 239-241). IEEE. Li S, Tryfonas T, Li H. The internet of things: a security point of view. Internet Research. 2016 Apr 4;26(2):337-59. Bughin J, Chui M. The Internet of Things: Assessing Its Potential and Identifying the Enablers Needed to Capture the Opportunity. InThe Internet of Things in the Modern Business Environment 2017 (pp. 111-125). IGI Global.