National Seminar cum workshop on "Data Science and Information Security 2019"

Paper Type :: Research Paper
Title :: Smart Eye for Security System
Country :: India
Authors :: Vandana Dubey || Anushka Garg
Page No. :: 01-03
Nowadays home security systems are among the major areas for research. Here, in this paper we have discussed a method to incorporate PIR sensor with face recognition and verification approach. This concept is about Smart Eye, which describes the design and implementation of sensor camera with facility for verification of captured record. Moreover, this system provides the user with reliable and efficient home security system with warning indicator. This approach may be further utilized to enhance the speed and automation of security issues of home security systems.

Keyword :Smart Eye, PIR Sensor, Face Recognition, Home Security, Indicator.

[1]. Agbetuyi, A. F., Adewale, A. A., Ogunluyi, J. O., & Ogunleye, D. S. (2011). Design and Construction of an Automatic Transfer Switch for a Single Phase Power Generator. International Journal of Scientific and Engineering Research, 2(May), 1–8.(10)
[2]. Ahmed, M. S., Mohammed, A. S., & Agusiobo, O. B. (2006). Development of a Single Phase Automatic Change Over Switch. AU Journal of Technicial Report, 10(1), 68–74.
[3]. Amuzuvi, C. K., & Addo, E. (2015). A Microcontroller Based Automatic Transfer Switching System for a Standby Electric Generator. Ghana Mining Journal, 15(1), 85–92.
[4]. Brown, B., Guditis, J., Critical, S. D., & Competency, P. (2006). Critical-Power Automatic Transfer Systems – Design and Application. IEEE Central TN Section, 1(August), 1–18.
[5]. C, E. K., Uchenna, N., Henry, O. kelechi, & Amaka, E. (2015). Microcontroller Based Power Change-Over Switching System With Generator Shutdown. Journal of Multidisciplinary Engineering Science and Technology, 2(8), 2184–2189.

Paper Type :: Research Paper
Title :: Application of Fuzzy C-Means (FCM) Algorithm in Image Apportionment
Country :: India
Authors :: Anubhav Srivastava || Dr.Bramah Hazela || Dr.Pooja Khanna || Dr. Deepak Arora
Page No. :: 04-08

In this paper, we are proposing an analysis of images via the fuzzy c-means (FCM) algorithm by performing the apportionment procedure. In an image apportionment process, images can be treated as an object and divided into sub-images of same classes, labels, and characteristics that belong to the same cluster to investigate meaningful outcomes. There are various techniques for apportionment like thresholding, clustering, interactive segment analysis, compression based, histogram, edge finding, region extension, partial differentiation based, graph-based, multi-scale, watershed, semi-automatic analysis but among these fuzzy cmeans (FCM) algorithm is one of efficient technique.............

Keywords: Image apportionment, noise sensitivity, membership function, fuzzy, histogram.

[1]. Bezdek, J. C. (1981) Pattern Recognition with Fuzzy Objective Function Algorithms, Plenum Press, New York.
[2]. Honda, K., Ichihashi, H., Masulli, F., Rovetta, S. (2007) Linear Fuzzy Clustering With Selection Of Variables Using Graded Possibilistic Approach, IEEE Trans. on Fuzzy Systems 15 878-889.
[3]. Kevin Beyer, Jonathan Goldstein, Raghu Ramakrishnan, and Uri Shaft. When is nearest neighbour meaningful? In Database Theory - ICDT'99, volume 1540 of Lecture Notes in Computer Science, pages 217–235. Springer Berlin / Heidelberg, 1999.
[4]. James C. Bezdek. Pattern Recognition with Fuzzy Objective Function Algorithms. Plenum Press, New York, 1981.
[5]. J. S. Boreczky and L. A. Rowe, ―Comparison of video shot boundary detection techniques,‖ in Proc. Int. Conf. Storage Retr. Still Image Video Databases, 1996, pp. 170-179.

Paper Type :: Research Paper
Title :: Analytical Study of ANN Modelling Based Estimation of Solar Radiation
Country :: India
Authors :: Deepa Rani Yadav || Dr. Deependra Pandey
Page No. :: 09-12

Energy provided by the sun is solar energy which is in the form of solar radiation. It is advantageous because it is renewable and sustainable source of energy which never runs out since it is a natural power source[1].Solar energy system's potential is beyond imagination with limitless advantages and minor negative impacts as there is nothing completely risk free [1]. A rough calculation that is the estimation of solar technology is done. Number of expressions, estimation models are used for proper monitoring ,utilization and and record of solar radiation data[2]. ANN are the excellent and one of the main tools used in machine learning. Artificial intelligence is the emerging trend that is basically a intelligent machine that performs and behaves like humans. ANN based models have been successfully trained to have different solar radiation variables, so as to improve the existing empirical and statistical approaches.

Keywords: Artificial Neural Network (ANN), Machine Learning, Solar Radiation Estimation.

[1]. TheocharisTsoutsos , Niki Frantzeskaki, Vassilis Gekas (2003) . Environmental effects from solar energy technologies. Energy policy 33, 2003 Elsevier Ltd.
[2]. David B. Ampratwum, Atsu S.S. Dorvlo (1999). Estimation of solar radiation from the number of sunshine hours. Applied energy 63, Elsevier Science Ltd.
[3]. Estimation of global solar radiation using four sunshine based models from pelagia research library
[4]. M Jamil ahmed and G N Tiwari (2010). Solar radiation models -a review. International journal of energy research. john willey and sons Ltd.
[5]. C. K. Pandey and A. K. Katiyar. Solar radiation: Models and Measurement Techniques

Paper Type :: Research Paper
Title :: Survival of Biological Species under The Effect of Toxins: A Study Through Mathematical Models
Country :: India
Authors :: A.K. Agrawal || Piyush Kumar Tripathi || Anuj Kumar Agarwal
Page No. :: 13-17

In this paper, we have tried to study the effect of toxins on logistically growing biological species. We have proposed some non linear mathematical models to study the effect in various cases, such as:
(i) The toxin is being emitted in to the environment by some external source.
(ii) The toxin is being discharged by the species itself.
(iii) Simultaneous effect of two toxins.
These models involve system of non linear ordinary differential equations. The qualitative analysis has been done using stability theory. These models have been simulated using MATLAB.

Keywords: Biological species, Toxins, Mathematical models, Simulation

[1]. Agrawal, A.K. (1999): Effects of toxicants on biological species: some non-linear mathematical models and their analyses. Ph.D. thesis, Department of Mathematics, I.I.T. Kanpur, U.P., INDIA.
[2]. Agarwal, A.K, Khan, A.W. and Agrawal, A.K. (2016): The effect of an external toxicant on a biological species in case of deformity: A model, Modeling Earth System and Environment,2(3), 1-8.
[3]. Agrawal, A.K., Sinha, P., Dubey, B. and Shukla, J.B. (2000): Effects of two or more toxicants on a biological species: a non linear mathematical model and its analysis, Dwivedi AP (ed) Mathematical analysis and applications, Narosa Publishing House, New Delhi, 97–113.
[4]. Agarwal, A.K., Khan, A.W. and Agrawal A.K. (2015): A model for the adverse effect of two toxicants causing deformity in a subclass of a biological species, International Journal of Pure and Applied Mathematics, 110(3), 447-462.
[5]. Deluna JT, Hallam TG (1987): Effect of toxicants on population: aqualitative approach IV. Resource–consumer– toxicant models.Ecol Modell,35, 249–273.

Paper Type :: Research Paper
Title :: IOT Based Indoor Localization with LiFi in Smart Homes
Country :: India
Authors :: Huma Khan || O P Singh
Page No. :: 18-20

In present era, the information technology is increasing day by day across the world. There are various applications of the information technologies especially in the smart homes. Smart home technology means home automation. The smart home is a well connected internet based devices to empower the remote monitoring & management of appliances such as lighting and heating etc. Smart buildings to know the location of each resident and provide secure internet facility through LiFi technology. It is thousand times faster than WiFi and provides high security as visible light cannot penetrate through the walls of the home, which leads to a new generation of optical wireless communication. These locations are aware indoor services such as path finding, IoT and location based advertising etc. The LiFi receives visible light communication through LED to realise fully automated secure network for smart homes. This paper presents the IoT based indoor localization to improve the accuracy with LiFi technology.

Keywords: Smart home, WiFi, IoT, LiFi, Accuracy

[1]. A. Bhati, M. Hansen, and C. M. Chan, "Energy conservation through smart homes in a smart city: A lesson for Singapore households," Energy Policy, vol. 104, no. February, pp. 230–239, 2017.
[2]. I. Meena and D. Kumar, "A Review Paper on LiFi," in National Conference on Innovations in Micro-electronics, Signal Processing and Communication Technologies, 2016, no. February, pp. 9–11.
[3]. A. Jovicic, J. Li, and T. Richardson, "Visible light communication: opportunities, challenges and the path to market," IEEE Commun. Mag., vol. 51, no. 12, pp. 26–32, Dec. 2013.
[4]. P. Mishra, J. Poddar, and S. Priya, "A Review On LiFi : The Green WiFi," Int. Res. J. Eng. Technol., vol. 3, no. 3, pp. 99–103, 2016.
[5]. S. Wu, H. Wang, and C. Youn, "Visible Light Communications for 5G Wireless Networking Systems: From Fixed to Mobile Communications," IEEE Netw., vol. 28, no. 6, pp. 41–45, 2014.

Paper Type :: Research Paper
Title :: Strategy for The Development of Information Security Policy Document: A Systematic Liteature Review
Country :: India
Authors :: Rishab Dixit || Dr Pankaj Kumar
Page No. :: 21-28

The purpose of this research paper is tofocus on strategic development of information security policy document and itsmanagement within the organization. The research work also surveyedthe ways of information security policy development and itsfunctions, development methods, policy lifecycle and scope of policy. In order to study the issue related to information security policy document and its implementation in organizations, a research analysis based on literature review is also accomplished.Thissystematic review will help all, thesecurity specialists and senior management executive of any enterprise thatplans to start development of security policy document and its implementation to make a better decision for the security of their assets.

Keywords- Information Security Policy,Organization Management and Data &Business Security.

[1]. Abrams, M., & Bailey, D. (n.d.). Abstraction and Refinement of Layered Security Policy.
[2]. Albright, J. G. (2000). The Basics of an IT Security Policy. SANS Institutes. Anderson, R. (1996). A Security Policy Model for Clinical Information Systems. InProceedings of the IEEE Symposium on Security and Privacy, 30–43.
[3]. Antón, A. I., & Earp, J. B. (2000). Strategies for developing policies and requirements for secure electronic commerce systems. ECommerce Security and Privacy, 2, 29–46.
[4]. Avolio, F. M., Consulting, a., Fallin, S., & Pinzon, D. S. (2007). Producing Your Network Security Policy. Watchguard. Com. July, (July), 1–13.
[5]. Banks, S. (1990). Security Policy. Computer & Security, 9, 605–610.

Paper Type :: Research Paper
Title :: Modernization of Power Generation and Distribution System
Country :: India
Authors :: Kamlesh Kumar Singh || Amit Kumar
Page No. :: 29-32

Last two decade has seen lot of changes in power generation and distribution sector. The use of PLC and SCADA plays instrumental role in performing load flow analysis.Today the power plants are constructed with modern techniques. This paper discuss about the modern approaches used in power sector and gives the idea about the switchyard ,oil circuit breaker ,air blast circuit breaker, vacuum circuit breaker etc. It also discusses how the boiler works and briefly describes the components of boiler. This technical paper gives the brief idea of the NTPC vindhyanchal, some of the data of the turbo generator of vindhyanchal is also given in this paper. There is a brief discussion on the transformer and switchgear which are used in modern power plants.

[1]. V.K Mehta, Rohit Mehta, "Principles of Power System", S.CHAND,2000.
[2]. D. Das, "Electrical Power System", New Age Publisher, 2006.
[3]. J.B Gupta, "Switchgear and Protection" ,S.K KATARIA AND SONS,2008.
[4]. P.S.R, "Multy Power System Analysis", B.S,2007.
[5]. J Blackburn "Electrical Power System Protection",Willey-IEEE ,2000.

Paper Type :: Research Paper
Title :: Mathematical Morphology and Medical Image Processing
Country :: India
Authors :: Rajan Chaturvedi || Dr. Naresh Kumar Chaudhary
Page No. :: 33-40

In the medical images such as X-ray, CT, there may be some kind of abnormal entities like cancer cells, tumor in such close proximity it is difficult to find out contrast and resolution between two entities hence diagnosis and treatment highly depends upon reliable and accurate finding of Radiologist. The medical image processing plays a crucial role in artificial detection and diagnosis of diseases along with automation of medical industry. The aim of medical image processing is to enhance contrast and resolution between closely packed entities on the basis of features like intensity value, color, texture so that visual perception can be increased. This paper introduces mathematical model of morphological operation of erosion and dilation operation with real time CT scan images with various structuring element. The erosion and dilatation operation on brain tumor images is performed with various structuring element. The results shows that affected area with tumor can be prominently distinguished from the original images obtained using CT scan.

Keywords : Mathematical Morphology, dilation and erosion

[1]. Ahmed Kharrat, MH. Ben Messaoud, Nacera Benamrane, Mh. Abid, ―Detection of Brain Tumor in Medical images‖, IEEE Trans. 2009, Interaction Conference on signals. Circuit and system.
[2]. Serra, Image Analysis and Mathematical Morphology, London, U.K.: Academic, 1982.
[3]. R.C. Gonazlez, Richard E Woods, Digital Image Processing, Second edition, prentice Hall Publication 2002.
[4]. M. Sonka, J.M. Fitzpatrick : ―Handbook of Medical image processing and analysis‖, I.N. IEEE Trans. Med. Imaging 20(3): 249-250 (2001).
[5]. P. Soille, ―Morphological Image Analysis, Principle and Application‖, Springer, 1999.

Paper Type :: Research Paper
Title :: Indian It Cos Trying To De Bug 'Foreign Exchange' `Risk
Country :: India
Authors :: Mr. Nitin Shankar || Dr. Alka Singh || Dr. Amit kr Sinha
Page No. :: 41-47

Foreign Exchange Rate Fluctuations has been boon and bane for international business. It has been established and believed that foreign exchange rate fluctuation do affect the valuation of the firm over a period of time. Small businesses dealing in foreign exchange has been wiped out due to transgression in risk management of the foreign exchange. The Indian IT industry has been the harbinger of the world's outlook towards Indian talent and skill set. It has been an extraordinary journey considering that the India missed the manufacturing boom bus thus we leap frogged an entire set of stairs to an advanced stage of IT revolution. IT multinationals has been India's Foreign Exchange Rain Man and thus the perils of foreign exchange risk also came along with it.............

Keywords- Foreign Exchange Risk Management, IT, BSE.

[1]. Blanchard,Olivier, and Summers,Lawrence. (1984). Perspectiveson high world real interest rates. Brookings Papers on Economic Activity, no. 2, pp. 273-324.
[2]. Dumas, Bernard (1978).The theory of the trading firm revisited. Journalof Finance 33 (June): 1019-29.
[3]. Adler,Michael,andDumas,Bernard(1980).The exposureof long-termforeigncurrency bonds. Journal of Financial and Quantitative Analysis 15 (November): 973-95.
[4]. He, Jia, and Lilian Ng. (1998). Foreign exchange exposure of Japanese multinational corporations. Journal of Finance 53:733–753.
[5]. Jorion, Philippe. (1991).The pricing of exchange rate risk in the stock market. Journal of Financial and Quantitative Analysis 26:363–376.

Paper Type :: Research Paper
Title :: Secured Data Aggregation Techniques for Wireless Sensor Network
Country :: India
Authors :: Tiwari Priti Ramesh || Satish Kumar
Page No. :: 48-51

Wireless Sensor Network (WSN) is an arrangement of numerous sensing nodes that collects and process data from surroundings and sends them through wireless/ radio links. A sensor node may contain sensitive data especially if the network is dedicated to military applications where secured transmission of data is highly recommended. This secured transmission demand privacy which is very challenging in WSN as the network is vulnerable to attack. A security approach that can be utilized for wireless sensor network is cryptography. An efficient secret key encryption and decryption along with key management can preserve the integrity of data in transmission and reception..........

Keywords: WSN, Security, Attacks,Cryptography, RSA, ECC.

[1]. M. Welsh, D. Myung, M. Gaynor, and S. Moulton.(2013). Resuscitation monitoring with a wireless sensor network in Supplement to Circulation. Journal of the American Heart Association.
[2]. F. Akyildiz et al.(2002). A Survey on Sensor Setworks.IEEE Commun. Mag.40 (8), 102–114.
[3]. D. Carman, P. Krus, and B. Matt.(2010). Constraints and approaches for distributed sensor network security. Communications Magazine, 102-114.
[4]. A.K. Pathan, H. Lee, C. S. Hong. (2006). Security in Wireless Sensor Networks: Issues and Challenges. ICACT, 1043 – 1048.
[5]. K. Akkaya, and M. Younis. (2005). A survey on routing protocols for wireless sensor networks. Ad Hoc Networks,3(3),325-349.

Paper Type :: Research Paper
Title :: A Study of Named Entity Recognition Systems in Languages
Country :: India
Authors :: Puneet Sharma || Bramah Hazela || Deepak Arora || Richa Chaturvedi
Page No. :: 52-56

The overall meaning of any elaborated text can be known by identifying some entities present in text; hence Named Entity Recognition plays a very crucial role. Detection of named entities is one of the most crucial task so in the process of message understanding. This paper focuses on the encoding schemes used by NER and the languages that NER systems have been applied to. This paper also introduces a methodology that can be used to perform sequence labelling using Conditional Random Fields.

Keyword: BIO · HMM · MEMM ·CRF · NER ·LBFGS · Recall

[1]. Mozharova V.A., Loukachevitch N.V. (2017) Combining Knowledge and CRF-Based Approach to Named Entity Recognition in Russian. In: Ignatov D. et al. (eds) Analysis of Images, Social Networks and Texts. AIST 2016. Communications in Computer and Information Science, vol 661. Springer, Cham
[2]. Dredze, M., Talukdar, P., & Crammer, K. (2009). Sequence learning from data with multiple labels. In ECML-PKDD 2009 workshop on learning from multi-label data.
[3]. Chirag Patel and Karthik Gali, (2008)Part-Of-Speech Tagging for Gujarati Using Conditional Random Fields, In Proceedings of the IJCNLP-08 Workshop on NLP for Less Privileged Languages
[4]. Lev Ratinov and Dan Roth (2009), Design challenges and misconceptions in named entity recognition. In: Proc. of the Thirteenth Conference on Computational Natural Language Learning. CoNLL '09, Stroudsburg, PA, USA
[5]. John Lafferty, Andrew McCallum, and Fernando C.N (2001), Conditional Random Fields: Probabilistic Model

Paper Type :: Research Paper
Title :: Automatic Level Control of LPG Leakage
Country :: India
Authors :: Devika Chaudhary || Pallavi Asthana || Sumita Mishra
Page No. :: 57-60

Liquified Petroleum Gas is major fuel for cooking in India.It is a mixture of two gases; Propane and Butane. Even a miniscule leakage in LPG gas cylinders in unventilated area over a significant amount of time can create hazardous conditions to anyone comes in contact.In this paper, a feedback system has been devised that will sense the level of LPG and when the level is beyond a permissible limit, it will switch -on the exhaust fan for proper ventilation. System also consist of transmitter and receiver system to send warning to the local office .This is an energy efficient system as controlling of exhaust fan will be based on the Sensor signal . When the level of above mentioned gas will be more than 530 ppm, it will be switched ON.

Keyword: LPG monitoring, MQ-06 Sensor, Automatic level Control..

[1]. Shruthi Unnikrishnan et. al.,‟LPG Monitoring and Leakage Detection System‟,IEEE WiSPNET 2017 conference,22-24 March, Chennai, India,2017.
[2]. Zbigniew Krzysiak et al,‟ Analysis of tank safety with propane-butane on LPG distribution station‟, ,Polish Journal of Chemical Technology , Vol -19, Iss.4,pp 99-102,2017
[4]. Tamil Selvi a/p Sitan et al,‟Liquefied Petroleum Gas (LPG) Leakage Detection and Monitoring System‟,Journal of Science and Technology, Vol. 10 No. 3 ,2018, p. 46-53.
[5]. G. B. C. V. K. G. S. V. H., B. N. V. Abhishek, P. Bharath, "Automation of lpg cylinder booking and leakge monitoring system," International Journal of Combined Research and Development (IJCRD), pp. 693–695, 2016.

Paper Type :: Research Paper
Title :: Image Processing Based Implementation of Unmanned aerial vehicle (UAV) for crop monitoring Using Drone Technology
Country :: India
Authors :: Richa Srivastava || Anil Kumar || OP singh
Page No. :: 61-63

Increasing crop productivity is the most challenging issue in India so we usingDrone technology. Drone technology is the best device as compared to other devices. Drone is small in size and having the ability to fly without any pilot. Crops,soils and folded areas images are captured through drone camera.There are lots of advantages in different fields as like agriculture for better products in urban areas andsurveillance for highly security sensitive areas such as presidents house, nuclear plants,military areas, commercial areas and tracking for criminal activities in smuggling of illicit materials, vehicle tracking. To avoid human's health problems when they spray manually uses are help to spray pesticides. UAV drone technology isutilizing in domains and bodies that is aerial imaging armed forces, logistics, emergency services, and agriculture. In this paper we focused onthe Implementation of Unmanned aerial vehicle (UAV) for inspection, measuring in crop monitoring.

Keyword: Object tracking, Drone technology, Image processing, image analysis.

[1]. UM, Roo Mogili and B B V L Deepak(2018) "Review on the application of Drone Systems in Precision agriculture" Internation conference on Robotics and Smart manufacturing (ROSMA2018), pp. 502-509.
[2]. Marinello, F., Pezzuolo, A., Chiumenti, A., & Sartori, L. (2016). "Technical analysis of unmanned aerial vehicles (drones) for agricultural applications." Engineering for Rural Development, vol. 15.
[3]. Spoorthi, S., Shadaksharappa, B., Suraj, S., Manasa, V.K. (2017) "Freyr drone: Pesticide/fertilizers spraying drone-an agricultural approach." IEEE 2nd International Conference on In Computing and Communications Technologies (ICCCT - 2017), pp. 252-255
[4]. Morey, N. S., Mehere, P. N., & Hedaoo, K. (2017). "Agriculture Drone for Fertilizers and Pesticides Spraying." International Journal for engineering applications and Technology. Issue 5 Volume 3, ISSN: 2321-8134
[5]. Yallappa, D., Veerangouda, M., Maski, D., Palled, V., & Bheemanna, M. (2017, October) "Development and evaluation of dronemounted sprayer for pesticide applications to crops." IEEE Global Humanitarian Technology Conference (GHTC) 2017 IEEE (pp. 1-7).

Paper Type :: Research Paper
Title :: Real Time AI Intervention for Improving Disruptive Road Traffic Conditions
Country :: India
Authors :: Sanjay Devkishan Taneja
Page No. :: 64-69

The Simulation of computer's smart and intelligent behavior has already been observed and experienced by almost all of us. With the advent of the challenging concepts of Artificial Intelligence (AI), machines have become so far successful of imitating intelligent behavior of human beings. The revolution that has come because of the introduction of AI systems has been widely accepted and has truly spread lots of excitement in our society. AI enabled road traffic management is the topic to focus upon which still has huge scope of ground level improvement. First and foremost, commuters must obey the rules without which any system to control traffic would go in vain but as our country has risen in stature towards a more higher position in the world both technologically and economically, the moment has come to carefully steer the traffic conditions using best possible AI techniques to surpass the threats and challenges that it is likely to face along the way from daily commuters............

Keyword: AI Based Systems, Intelligent Transportation System, Automatic Transfer Switch (ATS), Traffic Jam, Signal, Road CongestionControl System.

[1]. Government to use Artificial Intelligence for Traffic Management In Delhi available in : intelligence-traffic-management.
[2]. Mirchandani Pitu, Head Larry , RHODES : A Real-Time Traffic Signal Control System, Architecture, Algorithms and Analysis, Issue 6, Volume-9 pp. 415-432, December 2001
[3]. Queen, Catriona M and Albers, Casper J (2008) Forecasting traffic flows in road networks: A graphical dynamic model approach, August 2008.
[4]. Hong DaHee , Uno Nobuhiro , Kurauchi Fumitaka (2009) Heterogeneity in multi-anticipative car following behavior by videoimage data. . International Journal of ITS Research, Volume 7, No.1,June 2009.
[5]. Gambardella Luca M. (2003) Ant colony Optimisation for Ad-Hoc Networks. The first MICS workshop on routing for Mobile AdHoc Networks, Zurich, February 13, 2003.

Paper Type :: Research Paper
Title :: Machine Learning and Enculturation: Perspective of International Human Rights in China
Country :: India
Authors :: Abhivardhan || Dr. Ritu Agarwal
Page No. :: 70-74

The primacy of ML algorithms has proved it way suffice that it entails due considerations and ontologies on the formation and normativity of the semantic possibilities and dimensionality that they possess. The advent of algorithmic policing, has indicated a special outset, which is seen in the province of Xinjiang, China, concerning with corporate-based CX measures employed towards the due recognition and endurance of multiplicity of identities to exist. It is human privacy issue, where ML algorithms are employed towards generic utilities by governments and corporates in the West and other states, with their semantic freedoms. However, with no answerable solutions in the realm of international cyber law, and lack of active considerations of data protection laws, the enculturation of machine learning entails............

Keyword: International Human Rights Law, Enculturation, Machine Learning, Cultural Rapprochement, Algorithmic Policing.

[1]. Adobe. (2018, July). The Business Impact of Investing In Experience. Retrieved from Adobe:
[2]. Carter, W. M. (2018, July 10). How to get culture right when embedding it into AI. Retrieved from
[3]. Cummings, M. L., Roff, H. M., Cukier, K., Parakilas, J., & Bryce, H. (2018). Artificial Intelligence and International Affairs: Disruption Anticipated. Chatham House. Retrieved from roff-cukier-parakilas-bryce.pdf
[4]. European Union. (2016, April 25). REGULATION (EU) 2016/679 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC. Official Journal of the European Union.
[5]. Google Spain v AEPD and Mario Costeja González, C-131/12 (Court of Justice of the European Union May 13, 2014).