It can be seen from literature survey that the majority of the research were carried out on high-density polyethylene reinforced with plant and mineral fibers for evaluating its mechanical and tribological characteristics. Our study mainly focuses on incorporation of natural fibers along with nanoclay by varying the percentage of high-density polyethylene matrix, prepared via melt mixing method. The blends prepared were then compressed to thin sheets of size 150 x 150 x 2 mm3 in the compression molding machine at pressure and temperature of 200 MPa and 160? respectively, for 120 min followed by water cooling for 30 min. The effect of variation in high-density polyethylene content on the mechanical and tribological properties of the composites were studied using tensilometer and pin-on-disc test setup, respectively. The composites were also characterized for density, hardness, surface roughness and functional group identification respectively. It is observed that with the addition of 20 wt% silk fiber along with 1 wt% nanoclay in the high-density polyethylene matrix yielded improved results in terms of higher strength and modulus as well as good slide wear resistance along with low friction characteristics as compared to other composites. The results obtained have been assessed with the tensile fractured and wear damage morphology using scanning electron microscopy.
Legacy systems have provided the backbone for many organizations’ digital operations for years, yet legacy systems lack the ability to be as agile to current cybersecurity challenges. Hybrid cloud environments, mobile workers, and increased sophistication of threat actors present challenges that legacy identity management technologies fail to provide adequate security and regulatory compliance. Organizations are looking for solutions that will evolve with the increasing challenges presented by the digital environment. This paper presents research focused on creating an identity ecosystem capable of adapting to future challenges which are to replace legacy identity management systems. The Identity and Access Management (IAM) system has scalable capabilities, is aligned with regulatory requirements, and includes built-in intelligence to identify and address cyber threats. The IAM system has capabilities such as multiple forms of advanced authentication, real-time monitoring and policy-based controls to ensure all users have secure access across all environments. This allows organizations to better manage their identities, protect sensitive information and respond quickly to potential threats. The overall result is to provide a robust, compliant and intelligent digital identity solution for organizations in a world of rapid change. Keywords: Identity and Access Management (IAM); Legacy Infrastructure Modernization; Zero Trust Security; Cloud-Based IAM; Automation and Robotic Process Automation (RPA); Artificial Intelligence (AI) and Machine Learning (ML); Governance; Risk; and Compliance (GRC); Privileged Access Management (PAM); Multi-Factor Authentication (MFA); Decentralized Identity (DID) and Blockchain; Policy-Based Access Control (PBAC); Quantum-Resistant Security; Edge and IoT Integration; Identity Intelligence and Trust Scoring