{"id":1266,"date":"2024-06-20T16:56:18","date_gmt":"2024-06-20T11:26:18","guid":{"rendered":"https:\/\/www.techandtrain.com\/blog\/?p=1266"},"modified":"2025-10-22T14:51:32","modified_gmt":"2025-10-22T09:21:32","slug":"keywords-from-day-3-4-of-online-workshop-on-development-and-deployment-of-aiot-based-solution-for-industrial-applications-by-nsut-delhi","status":"publish","type":"post","link":"https:\/\/www.techandtrain.com\/blog\/2024\/06\/keywords-from-day-3-4-of-online-workshop-on-development-and-deployment-of-aiot-based-solution-for-industrial-applications-by-nsut-delhi\/","title":{"rendered":"Keywords from Day 3 &amp; 4 of Online Workshop on Development and Deployment of AIoT based solution for Industrial Applications by NSUT, Delhi"},"content":{"rendered":"\n<p id=\"ember810\">Further to Day 1 &amp; 2 keywords given here: <a href=\"https:\/\/www.linkedin.com\/pulse\/keywords-from-day-1-2-online-workshop-development-aiot-neil-harwani-vengf\/\">Keywords from Day 1 &amp; 2 of Online Workshop on Development and Deployment of AIoT based solution for Industrial Applications by NSUT, Delhi | LinkedIn<\/a>, here are the keywords and details for Day 3 &amp; 4 below:<\/p>\n\n\n\n<p id=\"ember811\"><strong>Day 3:<\/strong><\/p>\n\n\n\n<p id=\"ember812\"><strong>Speakers:<\/strong><\/p>\n\n\n\n<p id=\"ember813\"><a href=\"https:\/\/www.linkedin.com\/in\/swagatam-das-b26a186\/\">Swagatam Das | LinkedIn<\/a><\/p>\n\n\n\n<p id=\"ember814\"><a href=\"https:\/\/www.linkedin.com\/in\/faizanuddinansari\/\">Faizanuddin Ansari | LinkedIn<\/a><\/p>\n\n\n\n<p id=\"ember815\"><a href=\"https:\/\/nitkkr.ac.in\/?author=257\">Yogita \u2013 National Institute of Technology, Kurukshetra (<\/a><a href=\"http:\/\/nitkkr.ac.in\/\">nitkkr.ac.in<\/a><a href=\"https:\/\/nitkkr.ac.in\/?author=257\">)<\/a><\/p>\n\n\n\n<p id=\"ember816\"><strong>Topics:<\/strong><\/p>\n\n\n\n<p id=\"ember817\">Data analysis from IoT &#8211; when to use traditional statistics from sensors instead of ML\/AI<\/p>\n\n\n\n<p id=\"ember818\">Data in motion &#8211; Streaming AIoT, how to handle it and related techniques like clustering, windows and so on<\/p>\n\n\n\n<p id=\"ember819\">How to generate your own GAN<\/p>\n\n\n\n<p id=\"ember820\">Parts of GANs<\/p>\n\n\n\n<p id=\"ember821\">Basics of GAN<\/p>\n\n\n\n<p id=\"ember822\">CIFAR10 dataset<\/p>\n\n\n\n<p id=\"ember823\">Diffusion model<\/p>\n\n\n\n<p id=\"ember824\">GAN code<\/p>\n\n\n\n<p id=\"ember825\">Deep Learning &#8211; GAN \/ Diffusion \/ CNN<\/p>\n\n\n\n<p id=\"ember826\">Explainability &amp; interpretability in AI\/ML and libraries associated with it<\/p>\n\n\n\n<p id=\"ember828\"><strong>Day 4:<\/strong><\/p>\n\n\n\n<p id=\"ember829\"><strong>Speakers:<\/strong><\/p>\n\n\n\n<p id=\"ember830\"><a href=\"https:\/\/www.linkedin.com\/in\/dr-dinesh-k-vishwakarma-a5b98814\/\">Dr. Dinesh K. Vishwakarma | LinkedIn<\/a><\/p>\n\n\n\n<p id=\"ember831\"><a href=\"https:\/\/www.linkedin.com\/in\/manu-narula-876267164\/\">Manu Narula | LinkedIn<\/a><\/p>\n\n\n\n<p id=\"ember832\"><a href=\"https:\/\/www.linkedin.com\/in\/vinodp21\/\">VINOD P | LinkedIn<\/a><\/p>\n\n\n\n<p id=\"ember833\"><strong>Topics:<\/strong><\/p>\n\n\n\n<p id=\"ember834\">Smart Farming use case with IoT and AI &#8211; Types of sensors, uses, etc.<\/p>\n\n\n\n<p id=\"ember835\">Detecting diseases from leaf pictures in smart farming<\/p>\n\n\n\n<p id=\"ember836\">Distributed, Federated and Active learning in IoT plus techniques related to it like quantization<\/p>\n\n\n\n<p id=\"ember837\">Machine Unlearning<\/p>\n\n\n\n<p id=\"ember838\">Types of Machine Unlearning<\/p>\n\n\n\n<p id=\"ember839\">Tiny LLM<\/p>\n\n\n\n<p id=\"ember840\">Knowledge distillation<\/p>\n\n\n\n<p id=\"ember841\">Machine Unlearning in LLM<\/p>\n\n\n\n<p id=\"ember842\">Natural language processing in cyber security in Cyber Threat Intelligence<\/p>\n\n\n\n<p id=\"ember843\">Definition of Cyber Threat Intelligence<\/p>\n\n\n\n<p id=\"ember844\">Diamond model in Cyber Security<\/p>\n\n\n\n<p id=\"ember845\">MITRE<\/p>\n\n\n\n<p id=\"ember846\">Vulnerability databases<\/p>\n\n\n\n<p id=\"ember847\">Named entity recognition, tagging and annotations<\/p>\n\n\n\n<p id=\"ember848\">Web scraping<\/p>\n\n\n\n<p id=\"ember849\">Building a cyber security dictionary<\/p>\n\n\n\n<p id=\"ember850\">Natural language graphs and algorithms to process entities<\/p>\n\n\n\n<p id=\"ember851\">STIX 2 (<a href=\"http:\/\/oasis-open.org\/\">OASIS-OPEN.ORG<\/a>)<\/p>\n\n\n\n<p id=\"ember852\">Self-attention and semantic embedding<\/p>\n\n\n\n<p id=\"ember853\">BERT<\/p>\n\n\n\n<p id=\"ember854\">Fine tune BERT<\/p>\n\n\n\n<p>VX Underground <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Email me: <a href=\"mailto:Neil@HarwaniSytems.in\">Neil@HarwaniSytems.in<\/a><\/li>\n\n\n\n<li>Website: <a href=\"http:\/\/www.harwanisystems.in\/\">www.HarwaniSystems.in<\/a><\/li>\n\n\n\n<li>Blog: <a href=\"http:\/\/www.techandtrain.com\/blog\">www.TechAndTrain.com\/blog<\/a><\/li>\n\n\n\n<li>LinkedIn: <a href=\"https:\/\/www.linkedin.com\/in\/neil27\/\">Neil Harwani | LinkedIn<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Further to Day 1 &amp; 2 keywords given here: Keywords from Day 1 &amp; 2 of Online Workshop on Development [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[372,40],"tags":[373,375,377,376],"class_list":["post-1266","post","type-post","status-publish","format-standard","hentry","category-aiot","category-cyber-security","tag-aiot","tag-cyber-threat-intelligence","tag-natural-language-processing","tag-nlp"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7do02-kq","jetpack-related-posts":[{"id":1268,"url":"https:\/\/www.techandtrain.com\/blog\/2024\/06\/keywords-from-day-5-of-online-workshop-on-development-and-deployment-of-aiot-based-solution-for-industrial-applications-by-nsut-delhi\/","url_meta":{"origin":1266,"position":0},"title":"Keywords from Day 5 of Online Workshop on Development and Deployment of AIoT based solution for Industrial Applications by NSUT, Delhi","author":"Neil Harwani","date":"June 21, 2024","format":false,"excerpt":"Further to Day 1 & 2 \/ Day 3 & 4 keywords posted in the past as per the links here, below are the keywords for Day 5: Keywords from Day 1 & 2 of Online Workshop on Development and Deployment of AIoT based solution for Industrial Applications by NSUT,\u2026","rel":"","context":"In &quot;AIoT&quot;","block_context":{"text":"AIoT","link":"https:\/\/www.techandtrain.com\/blog\/category\/aiot\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/06\/AIoT.png?fit=1200%2C675&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/06\/AIoT.png?fit=1200%2C675&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/06\/AIoT.png?fit=1200%2C675&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/06\/AIoT.png?fit=1200%2C675&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/06\/AIoT.png?fit=1200%2C675&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1263,"url":"https:\/\/www.techandtrain.com\/blog\/2024\/06\/keywords-from-day-1-2-of-online-workshop-on-development-and-deployment-of-aiot-based-solution-for-industrial-applications-by-nsut-delhi\/","url_meta":{"origin":1266,"position":1},"title":"Keywords from Day 1 &amp; 2 of Online Workshop on Development and Deployment of AIoT based solution for Industrial Applications by NSUT, Delhi","author":"Neil Harwani","date":"June 18, 2024","format":false,"excerpt":"Attending online \"Five Days SERB sponsored Workshop on Development and Deployment of AIoT based solution for Industrial Applications\" from 17th-21st June 2024 Organized by: Dept. of Computer Science & Engineering Netaji Subhas University of Technology, Delhi 110078, India www.nsut.ac.in Following Topics will be covered during the program. \u2022 Introduction to\u2026","rel":"","context":"In &quot;AIoT&quot;","block_context":{"text":"AIoT","link":"https:\/\/www.techandtrain.com\/blog\/category\/aiot\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/06\/AIoT.png?fit=1200%2C675&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/06\/AIoT.png?fit=1200%2C675&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/06\/AIoT.png?fit=1200%2C675&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/06\/AIoT.png?fit=1200%2C675&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/06\/AIoT.png?fit=1200%2C675&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1494,"url":"https:\/\/www.techandtrain.com\/blog\/2025\/10\/cyber-security-notes-for-2025-part-4\/","url_meta":{"origin":1266,"position":2},"title":"Cyber Security notes for 2025 &#8211; Part 4","author":"Neil Harwani","date":"October 22, 2025","format":false,"excerpt":"Further to my four Cyber Security notes here: Information security tips while working with digital sources and internet | LinkedIn Security tips for Google Drive & Android | LinkedIn Facebook Privacy & Security tips | LinkedIn Post on patterns, anti-patterns & randomness in Cyber Security | LinkedIn Below I am\u2026","rel":"","context":"In &quot;Cyber Security&quot;","block_context":{"text":"Cyber Security","link":"https:\/\/www.techandtrain.com\/blog\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/10\/CyberSecurity5.jpg?fit=1200%2C1200&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/10\/CyberSecurity5.jpg?fit=1200%2C1200&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/10\/CyberSecurity5.jpg?fit=1200%2C1200&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/10\/CyberSecurity5.jpg?fit=1200%2C1200&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/10\/CyberSecurity5.jpg?fit=1200%2C1200&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":950,"url":"https:\/\/www.techandtrain.com\/blog\/2022\/08\/cyber-security-keywords-concepts-part-1\/","url_meta":{"origin":1266,"position":3},"title":"Cyber Security Keywords &#038; Concepts &#8211; Part 1","author":"Neil Harwani","date":"August 28, 2022","format":false,"excerpt":"Here is a list of keywords & concepts in Cyber Security that technology professionals should be aware of. This is part 1 of the series. CSPXSSISO 27001OWASPEncoding \/ decodingEncryption and it's typesCSRFCORSHashingAuthenticationAuthorizationIAMSSOSAMLOAuthTokensHTTPS \/ SSLDOS \/ DDOSBackdoorMalwareSecure codingThreats, Vulnerabilities, Controls & MitigationVAPTSocial EngineeringSpoofingProxy serversPhishingSQL injectionBuffer overflowViruses, Worms, Keyloggers, SpywaresIdentity theftRootKitsZero DayVPN\u2026","rel":"","context":"In &quot;Cyber Security&quot;","block_context":{"text":"Cyber Security","link":"https:\/\/www.techandtrain.com\/blog\/category\/cyber-security\/"},"img":{"alt_text":"Credit: www.Pixabay.com","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2022\/08\/CyberSecurity.jpg?fit=1200%2C675&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2022\/08\/CyberSecurity.jpg?fit=1200%2C675&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2022\/08\/CyberSecurity.jpg?fit=1200%2C675&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2022\/08\/CyberSecurity.jpg?fit=1200%2C675&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2022\/08\/CyberSecurity.jpg?fit=1200%2C675&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1227,"url":"https:\/\/www.techandtrain.com\/blog\/2024\/02\/keywords-from-my-fpm-journey-part-1\/","url_meta":{"origin":1266,"position":4},"title":"Keywords from my FPM journey &#8211; Part 1","author":"Neil Harwani","date":"February 18, 2024","format":false,"excerpt":"Some keywords from my FPM journey till now - Part 1 below (in no particular order): Regression Structural equation modelling Research design & methodology Questionnaire design Statistics Factor analysis Exploratory vs. confirmatory Formative vs. reflective constructs Latent variables Measurement scales Types of data Entrepreneurship theories Literature review HR & OB\u2026","rel":"","context":"In &quot;FPM&quot;","block_context":{"text":"FPM","link":"https:\/\/www.techandtrain.com\/blog\/category\/fpm\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/02\/FPM_Journey.png?fit=1200%2C675&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/02\/FPM_Journey.png?fit=1200%2C675&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/02\/FPM_Journey.png?fit=1200%2C675&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/02\/FPM_Journey.png?fit=1200%2C675&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/02\/FPM_Journey.png?fit=1200%2C675&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1292,"url":"https:\/\/www.techandtrain.com\/blog\/2024\/08\/keywords-from-my-fpm-journey-part-2\/","url_meta":{"origin":1266,"position":5},"title":"Keywords from my FPM journey &#8211; Part 2","author":"Neil Harwani","date":"August 18, 2024","format":false,"excerpt":"Some of the keywords from my FPM journey - Part 2: Qualitative Comparative Analysis (QCA) Mixed method design with QCA Adanco PLSEM using R - free book ISLR - free book QCA types Proposal making for thesis Steps of QCA Necessity and sufficiency QCA focus & level Uses of QCA\u2026","rel":"","context":"In &quot;FPM&quot;","block_context":{"text":"FPM","link":"https:\/\/www.techandtrain.com\/blog\/category\/fpm\/"},"img":{"alt_text":"Credit: www.pixabay.com","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/08\/Keywords.png?fit=1200%2C812&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/08\/Keywords.png?fit=1200%2C812&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/08\/Keywords.png?fit=1200%2C812&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/08\/Keywords.png?fit=1200%2C812&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/08\/Keywords.png?fit=1200%2C812&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts\/1266","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/comments?post=1266"}],"version-history":[{"count":1,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts\/1266\/revisions"}],"predecessor-version":[{"id":1267,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts\/1266\/revisions\/1267"}],"wp:attachment":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/media?parent=1266"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/categories?post=1266"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/tags?post=1266"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}