+ All Categories
Home > Documents > Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses...

Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses...

Date post: 22-Apr-2018
Category:
Upload: lekhanh
View: 213 times
Download: 1 times
Share this document with a friend
53
Transcript
Page 1: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain
Page 2: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain

Computer Engineering Department

VISION“To become a department of na�onal relevance in the field of Computer Engineering.”

MISSION The Department of Computer Engineering is commi�ed to nurture students with sound engineering knowledge in the field of compu�ng through the effec�ve use of modern tools with a focus on global employability by imbibing leadership quali�es, ethical a�tude, lifelong learning and social sensi�vity.

PROGRAMME EDUCATIONAL OBJECTIVES (PEOs)

PEO 1: To a�ract and prepare learners to a�ain sound knowledge in the field of Computer Engineering.

1.1 To a�ract students by providing conducive academic environment and to enhance quality of students by rigorous monitoring and control.

1.2 To prepare learners with a sound founda�on in mathema�cal, scien�fic and engineering fundamentals.

1.3 To prepare learners to use modern tools effec�vely for solving real life problems.

1.4 To equip learners with broad educa�on relevant to field of compu�ng in the global and social context.

PEO 2: To prepare learners to a�ain need-based skills and competencies with a focus on futuris�c needs at the na�onal and interna�onal level.

2.1 To ensure employability through need-based training spread over the en�re course and meet contemporary local and global requirements.

2.2 To prepare learners for higher studies and life-long learning through ac�ve involvement in research oriented and industry-based projects.

PEO 3: To prepare learners to become valued professionals and responsible ci�zens.

3.1 To encourage and mo�vate students through well planned co-curricular and extra curricular ac�vi�es for all-round personality development.

3.2 To inculcate professional and ethical a�tude, leadership quali�es and commitment to social responsibili�es.

PROGRAMME OUTCOMES (POs)

PO 1: Engineering knowledge: Apply knowledge of mathema�cs, science, engineering fundamentals

and an engineering specializa�on to the solu�on of complex engineering problems.

PO 2: Problem analysis: Iden�fy, formulate, research literature and analyze complex engineering problems

reaching substan�ated conclusions using first principles of mathema�cs, natural sciences and engineering

sciences.

Page 3: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain

PO 3: Design & Development of Solu�ons: Design solu�ons for complex engineering problems and design

system components or processes that meet specified needs with appropriate considera�on for

public health and safety, cultural, societal and environmental considera�ons.

Po4: Inves�ga�on of Complex Problem: using research-based knowledge and research methods

including design of experiments, analysis and interpreta�on of data and synthesis of informa�on to

provide valid conclusions.

PO5: Modern tool usage: Create, select and apply appropriate techniques, resources and modern

engineering and IT tools including predic�on and modelling to complex engineering ac�vi�es with an

under- standing of the limita�ons.

PO6: Engineer and society: Apply reasoning informed by contextual knowledge to assess societal, health,

safety, legal and cultural issues and the consequent responsibili�es relevant to professional

engineering prac�ce.

Po7: Environment & sustainability: Understand the impact of professional engineering solu�ons in

societal and environmental contexts and demonstrate knowledge of and need for sustainable

development.

PO8: Ethics: Apply ethical principles and commit to professional ethics and responsibili�es and norms of

engineering prac�ce.

PO9: Individual & team work: Func�on effec�vely as an individual, and as a member or leader in diverse

teams and in mul� disciplinary se�ngs.

PO10: Communica�on: Communicate effec�vely on complex engineering ac�vi�es with the engineering

community and with society at large, such as being able to comprehend and write effec�ve reports

and design documenta�on, make effec�ve presenta�ons and give and receive clear instruc�ons.

PO11: Lifelong learning: Recognize the need for and have the prepara�on and ability to engage in

independent and life- long learning in the broadest context of technological change.

Po12: Project management & finance: Demonstrate knowledge and understanding of engineering and

management principles and apply these to one’s own work, as a member and leader in a team, to

manage projects and in mul� disciplinary environments.

PROGRAM SPECIFIC OUTCOMES (PSO)

PSO 1: Ability to develop academic ap�tude and apply knowledge of compu�ng and mathema�cs to

computer science problems and thereby design and develop so�ware and hardware systems.

PSO 2: Ability to enhance research skills and u�lize advanced compu�ng tools for analysis, design and

implementa�on of compu�ng systems for resolving real life and social problems.

PSO 3: Ability to u�lize mul�-disciplinary knowledge required for sa�sfying industry / global

requirements and hence develop an a�tude for life-long learning.

PSO 4: Ability to have all round personality with skills like leadership, verbal & wri�en communica�on,

team work, sensi�vity towards society in order to become valued and responsible professionals.

Page 4: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain

Editorial Committee

Edi�ngMrinal Bageshwari (TE CMPN A)

Tejas Gupta (TE CMPN A)Athashree Vartak(SE CMPN B)

Saurabh Jha(SE CMPN A)

Art DesignSagar Pathare(TE CMPN B)

Adit Rathi(SE CMPN B)

Faculty MembersDr. Sheetal Rathi, HOD CMPNMrs. Ashwini Pa�l, A.P. CMPN

Page 5: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain

Technology is ever changing and ever expanding. To cope with the constant progress in this field,

today's engineers must possess an ever improving skill set. With that in mind this edition of

Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the

latest progress and trends in the field of Computer Technology to the reader.

Nimbus aims to inspire the budding engineers to bring a revolution in this ever evolving world of

technology. It is a step towards technical awareness which in turn will develop communication

skills and is designed exclusively for churning out the technical writing skills among students. It

moves in the direction of making all the stakeholders of the Department of Computer

Engineering to exhibit national relevance through their practices.

I would like to congratulate the students and faculty members of the editorial team for their

commendable performance in publishing this edition of Nimbus.

Wishing everyone good luck and all the success in their future endeavours.

Dean’s Message

Dr. R. R. Sedamkar

Page 6: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain

The Department of Computer Engineering focuses on prevailing the learning attitude in all of it's

stakeholders so as to contribute in the betterment of the society. Nimbus has proven to be flint to

fire the enthusiasm and excite the minds of the faculty and the students for many intrusive

innovations. I wish that this edition helps the department in working towards the vision of

achieving national relevance.

Nimbus is all about the technology that inspires students to do something, that leaves an

everlasting mark on the world of technology. This issue of the magazine, with its theme

“Emerging Trends of the 21st Century” has brought all the ideas about the emerging

technologies on one platform.

Someone has rightly said ”Teamwork is the ability to work together towards a common vision”. It

is the zeal and enthusiasm of the students & faculty members in cooperation with the industry

experts which has resulted in sculpting of such a beautiful magazine. I would like to thank

everyone who has contributed towards the magazine.

Wishing everyone good luck and hope that you all achieve milestones in life.

HOD’s Message

Dr. Sheetal Rathi

Page 7: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain

“Technology can't be described just as a revolution. It is a tsunami-like phenomenon, slowly

progressing and gradually engulfing everything along its way by the force of its progression.”

Exploring the unexplored, 7th edition of Nimbus brings into the limelight, budding technologies

of 21st century.

In this edition, we have focused on the aspects that transformed the traditional functioning of

advanced systems and brought profound change in everyone's lives. We have conferred

distinctive concepts ranging from blockchain to cryptography.

Thanks to all our well wishers and contributors. Let me present to you with our seventh edition of

NIMBUS – “Emerging Trends of 21st century”.

Ms. Ashwini Patil

Faculty Incharge’s message

Page 8: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain

At the very beginning we would like to extend our unfeigned gratitude to our Principal Dr. B K

Mishra, our Dean-Academics Dr. R R Sedamkar and our Head of Department Dr. Sheetal Rathi

for their inspiration and prolific motivation towards the working of this issue of Nimbus.

Being a part of Team Nimbus for the last 4 editions we have seen the journey of this magazine

from being a collection of some articles to a magazine that involves all the stakeholders of the

course. In this pursuit of knowledge, we have covered many aspects of the field of computer

sciences which have proven to be helpful to our readers to understand new concepts and think in

a new direction with positive intent altogether.

This edition is aimed at educating engineers about the growing field of CYBER SECURITY, and

how technology is being used for its implementation, thus developing insights in those areas

that are not extensively taught in constraint to the syllabus. Topics like Cyber Terrorism, Data

Breach, Cryptography, Mobile Protection and many case studies of potential threats and recent

attacks are being addressed in this edition.

On a closing note I would give special thanks to the faculty in-charge of this issue Ms. Harshala

Yadav for her easy-going support and motivation and our team of editors and designers for their

motivated and eager attitude to their work and in making sure, that Nimbus maintains its

standard it has set through the previous issues, by bringing in phenomenal content. Without

them, this issue would have remained what we dreamt it to be.

FROM THE EDITORS’ DESK

Tejas Gupta & Mrinal BageshwariCo-Editors

Sagar PathareHead Designer

Page 9: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain

Student Applica�on of Blockhain in Manufacturing Industries BITCOIN – A BLOCKCHAIN PARADIGM BLOCKCHAIN IN AGRICULTURE BLOCKCHAIN FOR IOT NETRIDERS: Mul� Touchscreen Table BLOCKCHAIN – A MOVE TOWARDS SECURE FUTURE RedTacton BLOCKCHAINS IN IOT Troubleshoo�ng using Cost Effec�ve Algorithms and Bayesian Networks Smart India Hackathon - Report ENIGMA 2.0 MACHINE LEARNING ALGORITHM ANALYSIS

Industry INTERVIEW : System Analyst

Achievements

Student Editorial Commi�ee

Acknowledgments

Index

Page 10: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain

Blockchain technologies have the poten�al to transform the face of producing, consistent with Syncron.

Blockchain, most commonly related to cryptocurrencies like Bitcoin, could be a digital ledger technology which may be used to store and record transac�ons.

As records on the chain are keep and distributed across nodes within the network, it's very difficult to falsify records, crea�ng the blockchain a safer and clear way to record transac�ons and service records. This, in turn, provides blockchain applica�ons outside of cryptocurrency exchanges.

The enterprise is exploring ways in which to u�lize blockchain technologies in everything from finance to producing.

IBM Blockchain is offered to refine the provision chain and improve iden�ty and informa�on management, Blockchain manufacturing plant focuses on blockchain-based services for prototypes and produc�on in producing applica�ons, Bigchain DB offers ascendible blockchain services and Chain touts a blockchain pla�orm for monetary services, among others.

These are solely many of the choices on the market to the enterprise and totally different industries, and despite the technology being compara�vely unknown, the poten�al of blockchain is probably going to draw in even a lot of interest within the future.

Application of Blockhain in Manufacturing Industries

STUDENT

Page 11: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain

In an interview with ZDNet, urban center Brooks, Chief selling Officer of worldwide producing and provide chain technology company Syncron aforesaid blockchain is of explicit interest to the producing trade because of its advantages rela�ng to verifica�on and transparency.

"Manufacturers' offer chains are subtle, complicated organiza�ons with variety of nuances w h i c h w i l l c r e a t e t r a n s p a r e n c y a n d answerableness difficult -- par�cularly once it involves the provision of building and shipping new instrumentality and repair components," Brooks aforesaid. "This is especially true as makers shi� from a transac�onal, break-fix model of when sale service -- wherever a service half is replaced when it's already failing -- to a subscrip�on-based model that focuses on increasing product �me period."

"In this case, makers leverage IoT and prophe�c analy�cs in their service components offer chain to proac�vely repair instrumentality before it ever breaks down," the chief more. "Blockchain will give AN inflated level of visibility into this method, because it would enable a complete interna�onal service offer chain to envision once and wherever components ar moving to confirm the repair is created simply in �me."

As informa�on command inside a blockchain is localized and shared across nodes, the technology will be accustomed produce and maintain a shared and con�nually-reconciled informa�on.

Whether AN enterprise or SMB, corpora�ons will use this to extend transparency, acknowledge problems at intervals a offer chain, and contour industrial processes.

As AN example, AN car manufacturer that releases a vehicle containing faulty components -- leading to expensive recollects and repairs -- will use the blockchain to trace the provider of the faulty components a lot of expedi�ously, containing the problem and reducing �me and labor prices.

"With a blockchain resolu�on, makers currently have a living wri�en record of ac�vity logs and a

lot of in order that they will keep tabs on the flow of products between corpora�ons," Brooks aforesaid. "This provides an addi�onal level of transparency and management -- and can change massive makers to contend and win against the compe��on."

When jalapeno pepper had AN E. coli erup�on in 2015, the organic phenomenon had serious bother tracing the supply of the microorganism through suppliers. As finding the supply was implausibly tough, jalapeno pepper was unable to right away stop the unfold of contamina�on.

According to Brooks, blockchain may hold the key for similar problems to be resolved and eradicated quickly.

"For makers specifically, blockchain might facilitate mi�gate similar risks," the chief noted. "Mul�ple components and items comprise massive items of apparatus, and with networks and suppliers round the world, blockchain provides some way to envision each half within the offer chain in period -- and determine issues before they become widespread."

However, running headlong into this technology contains risk. makers and corpora�ons at massive need to decide whether or not overhauling exis�ng infrastructure and inheritance systems to u�lize blockchain can end in worth and a comeback on investment; otherwise, blockchain solu�ons might be a expensive endeavor.

When it involves makers, par�cularly, they typically have long upgrade cycles and in somecases, would possibly ought to modernize exis�ng IT processes before even considering such a replacement technology -- that con�nues to be at intervals its infancy and being developed for industrial applica�ons.

Page 12: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain

"Although blockchain is definitely changing into a lot of thought in business, it's s�ll a compara�vely emergent technology," Brooks aforesaid. "This means several IT groups ar having to analysis the technology so as to realize the informa�on and knowledge necessary to deploy it with success."According to the chief, client expecta�on goes to be one amongst the catalysts for blockchain adop�on. When quick, reliable service is predicted and needed to retain client loyalty, makers ought to invest in new technologies to remain ahead -- or with -- the compe��on.

Blockchain technologies have the poten�al to seriously change producing offer chains, and with them, cut out the middleman, contour processes, and improve security on the total -- furthermore as alter informa�on management.

“Blockchain is one amongst several rising technologies that is redefining the approach corpora�ons do business," Brooks aforesaid. "The technology itself, in terms of development, regula�on, and governance, and adop�on con�nues to be evolving."According to the chief, client expecta�on goes to be one amongst the catalysts for blockchain adop�on. When quick, reliable service is predicted and needed to retain client loyalty, makers ought to invest in new technologies to remain ahead -- or with -- the compe��on.

Blockchain technologies have the poten�al to seriously change producing offer chains, and with them, cut out the middleman, contour processes, and improve security on the total -- furthermore as alter informa�on management.

“Blockchain is one amongst several rising technologies that is redefining the approach corpora�ons do business," Brooks aforesaid. "The technology itself, in terms of development, regula�on, and governance, and adop�on con�nues to be evolving."

Saurabh Jha S.E CMPN A

Page 13: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain

In the present digital economy, all online transac�ons have entrusted the power of verifica�on of the status of transac�on to a third trusted en�ty. For e.g. it can be email service provider ensuring us that our mail is delivered or a social network like Facebook telling us that our posts regarding life events have been shared as per our privacy se�ngs, or instant messengers like Whatsapp telling us that our profile photo, status, about etc. is viewable only as chosen by our privacy se�ngs or a bank telling us our money is delivered to our rela�ves. Everything of this is based on the fact that we live our life precariously in the digital world by relying on a third en�ty for security and privacy of our digital assets and that, these trusted en��es can be hacked, manipulated and compromised. A certain percentage of fraud is avoidable if the trust-in-third-party mechanism is eliminated. The Blockchain technology is secure, vigilant and resilient to fraudulent prac�ces.

BITCOIN – A BLOCKCHAIN PARADIGM

STUDENT

What is bitcoin?

Bitcoin is a cryptocurrency and worldwide payment system. It is a decentralized digital currency working without a central bank or single administrator. The network is peer-to-peer and transac�ons take place between users directly, without an intermediary. These transac�ons are verified by network nodes through the use of cryptography and recorded in a public distributed ledger called a blockchain.

Page 14: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain

How is a transac�on carried out?Bitcoin uses cryptographic proof mechanism for two par�es to execute an online transac�on. Each transac�on is protected by a digital signature. The transac�on is digitally signed using the private key of the sender and sent to the public key of the receiver. The sender needs to prove his/her ownership of cryptocurrency by proving ownership over his/her private key. The receiver then verifies the digital signature, which shows ownership of corresponding private key by using public key of the sender on the transac�on. Each transac�on is broadcasted to every node in Bitcoin network and recorded in a public ledger a�er verifica�on for its validity.

The verifying nodes need to ensure:Ÿ Sender owns the cryptocurrency through

digital signature verifica�on.Ÿ Sender has sufficient cryptocurrency in his/her

account before enabling transac�on. As transac�ons do not come in the order they are generated, hence, there arises a need for the system to make sure double-spending of cryptocurrency does not occur. So, Bitcoin implemented a mechanism which is now popularly referred to as Blockchain Technology to avoid this problem. In this, Bitcoin orders transac�ons by placing them in groups called as blocks and then linking these blocks to each other in a proper linear and chronological order called chains, with every block containing the hash of the previous block. The transac�ons of one block are considered to have happened at the

same �me. Further in order to avoid crea�on and broadcast of block containing collec�on of unconfirmed transac�ons (from a node) to the rest of the network and in order to provide a sugges�on as to which block should be the next one in blockchain, Proof of Work mechanism was used.

Proof of Work mechanism:This mechanism introduces a mathema�cal puzzle and each block containing the answer to the puzzle is accepted in the blockchain. So, a node genera�ng a block needs to prove that it has enough compu�ng resources to solve the puzzle. The nodes which solve this puzzle are called as miner nodes and these nodes are financially awarded for their efforts.Occasionally, however, more than one block will be solved at the same �me leading to various branches in blockchain. However, the math puzzle to be solved is very complicated and hence the blockchain stabilizes quickly, a�er which every node is in agreement with the ordering of the blocks. The network only accepts the longest blockchain as the valid one. Hence, making it nearly impossible for an intruder to introduce a fraudulent transac�on, as the node has to not only generate a block of this transac�on by solving the very special complicated mathema�cal puzzle, but also race mathema�cally against the good nodes to generate all subsequent blocks to enable the other nodes in the network to accept its transac�on and thereby its block.

Page 15: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain

SRUTHI HARISHSE CMPN B

Page 16: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain

The blockchain is a distributed ledger technology that allows all members to record transac�ons in a decentralized data log maintained on a network of computers, rather than a physical ledger or a single database. Transac�ons must be approved through consensus, and everything is secured through cryptography.

In simpler terms think of blockchain as google sheets versus excel sheet sent through emails. In google sheets, all members have live access to the data being entered into the sheets and can independently record/track the updates of every entry being made. Add another layer on top of this, where entry once made is recorded permanently and cannot be edited or erased by any member. What makes blockchain so unique is that data stored on its networks is transparent and incorrup�ble.

One of the most logical applica�ons of blockchain is in agriculture which is plagued with several challenges. With rising consumer consciousness towards food safety, blockchain applica�on can play a vital role in solving many agriculture-related problems.

Some of its prac�cal applica�ons in agriculture are listed below:

Food SafetyConsumers have become conscious about the food that they consume. Recent experiencers have not been great for the big food chains. Nowadays, food related allergies and diseases have become a lot more common which makes the consumers demand for the informa�on related to the food they are consuming. As this trend con�nues to rise, big food chains will have no choice but to use blockchain for ensuring accountability, traceability and quality of the food. Blockchain will in fact become compe��ve edge for brands compe�ng in the compe��ve FMCG space.

BLOCKCHAIN IN AGRICULTURE

STUDENT

Page 17: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain

Food Supply ChainFood supply chains in most developing na�ons are inefficient due to informa�on asymmetry. This directly results in low farmer income as farmers do not receive their due share, even though they are the most important part of the chain (the food producers). With blockchain the food supply chain gets simplified as the data management across a complex network that includes farmers, brokers, distributors, processors, retailers, regulators, and c o n s u m e r s g e t s s i m p l i fi e d a n d transparent.Farmers and all members of the supply chain can access all the informa�on throughout the chain. This will make the en�re supply chain more democra�c and efficient resul�ng in lesser food wastage and higher remunera�on being paid to the stakeholder adding the greater amount of value.

Disbursement Of Subsidies – Is The Benefit Really Reaching The Farmer?Across the globe, farm sector is heavily dependent on government subsidies. For example, in India 2017-18 budget, $4.9 Billion (INR 32,000 Cr) were allocated for agriculture-related subsidies to farmers. How much of this amount actually reaches the farmers is always a ques�on.However, with blockchain the distribu�on and del ivery of subsidies can become more transparent resul�ng in targeted disbursement of subsidies plugging pilferages in the exis�ng system. Even though the process to establish this network will be very complexed as mul�ple stakeholders would need to come together, it is no longer impossible.

The days of blockchain applica�on have just begun and as with any new technology, blockchain will hit a few roadblocks especially with the government's regulators across the globe. As the true essence of blockchain applica�on is to take the power away from the hands of the powerful by decentralizing informa�on and handing it over to the people, democracy in the true sense.Nonetheless as with any movement, if people see value the technology brings into their lives they will rally behind it and blockchain applica�on will become mainstream in most industries including agriculture in the coming years.

Yogesh BharambeSE CMPN B

Page 18: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain

Introduc�on:In the digital age, technology is everywhere. Many different industries u�lize touch screen tables in their opera�ons, providing an intui�ve interface with which to complete both simple and complex tasks. Some even u�lize mul� touch display walls to create unique interac�ons and experiences, or to offer new workflow choices to employees and enhance produc�vity.

Hardware/so�ware required: Projector, IR led lights, IR camera, mirror, CPU having mul�touch applica�on and tracking applica�on so�ware.

Working: Once the blobs or touch is recognized by the so�ware through the IR camera , we can use the por�on of the table for touch. However touch may not be recognised easily because of the errors and noises crested between the projector and the screen . Thus we use IR LED Sensors so that it gets recognized through the IR camera.

Applica�ons:Ÿ A recep�on desk at a hotel or spa might allow guests to check in using a touch screen table, and offer

interac�ve tutorials or other entertainment for guests to use while they wait for service.Ÿ The tables are used even in the medical industry, offering 3D visualiza�ons of medical scans such that

doctors and other medical professionals can prepare for surgeries and procedures.Ÿ These tables can also assist architectural firms with dra�ing and visualizing their projects, giving a real

sense of how measurements and materials will come together to form a completed project.

Conclusion: Digital games, simula�ons and their entertainment counter parts will also be good candidates for mul� touch interfaces as they are mature. Developers of the technology have suggested a variety of ways that mul� touch can be used including:Ÿ Order foods, ask for refills, split check, pay bills, entertainment while dinning.Ÿ Locate landmarks, plan day uplink info to cellular phone famingŸ Government use.Ÿ Concept Mapping.

NETRIDERS:Multi Touchscreen Table

TE CMPN ASwas�k ChavanSalonee AmeriaMeher DodhiaMahima Jain

STUDENT

Page 19: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain

BLOCKCHAIN – A MOVE TOWARDS SECURE FUTURE

Most people automa�cally associate Blockchain with Bitcoin. Actually, Bitcoin is just a subset of Blockchain, that is, Blockchain is the pla�orm that allows exchanging Bitcoin and other cryptocurrencies.Blockchain can be used not only to send digital money but also to track physical goods in a supply chain, helping companies to monitor their suppliers in real �me. In its elementary form, Blockchain is a decentralized database system. The ledgers that store transac�on data are distributed in many nodes.

Func�oning of Centralized approach: Think of a bank branch as a node. When you visit your local bank and deposit a sum of money, a transac�on occurs. The bank verifies the authen�city of the payment, registers the transac�on and updates your account. The bank is the only (centralized) database that stores your account informa�on; it is a necessary third party for exchanges to take place. Since only banks keep a complete track of transac�ons, it is difficult and expensive to audit and prevent manipula�on from occurring. In addi�on, the current system is slow, prone to errors and suscep�ble to system altera�on.

How Blockchain func�ons?Blockchain eliminates the need for an external intermediary (third party) to facilitate value transac�ons. In blockchain, unlike the tradi�onal method, the transac�on informa�on is stored in several nodes instead of in a single node (bank) as shown in image above. When a transac�on is carried out, it is first verified by all the nodes whether it is valid or not. If it is valid, a series of mathema�cal principles cryptographically sign the data, providing a seal of permanent approval. Once the transac�on is approved, changes are made to all nodes.If we try to get involved in a fraud or transfer money that we do not have, the other nodes will instantly recognize it and stop the transac�on. Therefore, here unlike the tradi�onal way, the chances of chea�ng are much lower since there are many nodes. Even if we pirated a node and tried any illegal transac�on, the remaining nodes disapprove this and we will know the fraud.

STUDENT

Page 20: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain

How do the nodes verify transac�ons?When an individual node confirms a transac�on, it no�fies each other node in the Blockchain system, which leads to the database of each node being updated to account for the most recent transac�on. This is why Blockchain is o�en referred to as a distributed ledger system; each node contains the most updated transac�on history. When all the nodes in a system agree with each other, there is only one source of truth.

Why blockchain?Blockchain is essen�ally impervious to fraud and corrup�on. If you tried to hack into a specific node and change the details of a transac�on (redirect payments to another account, double your money or increase the amount of money transferred etc), you will find that the task is almost impossible to achieve. No ma�er the technical complexi�es of hacking a node. The reason why you cannot change a transac�on once it has been hashed, is that all decentralized nodes contain the same version of the ledger (public). If there are 1000 nodes in a Blockchain system, and you managed to hack a node, any revision you make would automa�cally be at variance with the ledger informa�on stored in the other 999 nodes. If the nodes do not reach a consensus, the proposed transac�on automa�cally stops, which dras�cally reduces the risk of fraud.

So far, we have focused exclusively on money transac�ons. This is an important subset, yet a small one, of what Blockchain can achieve. Any transac�on that involves an exchange can theore�cally use Blockchain; From capital markets to healthcare and vo�ng , the possibili�es are unlimited.

Atharva Tendulkar SE CMPN B

Page 21: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain

Redtacton is a Human Area Networking technology, which is under development that uses the surface of the human body as a safe, high speed network transmission path. It is completely dis�nct from wireless and infrared technologies as it uses the minute electric field emi�ed on the surface of the human body. NTT LAB which is research and development wing of Nippon telegraph and telephone Corpora�on from Japan started REDTACTON Technology. REDTACTON Uses the naturally occurring electric fields of human skin to transmit data. According to NTT LAB our hole body is the perfect conductor for electric data. RED TACTON was developed on 30 August 2005 by a seven-person research teamed by Yuichi Kado, execu�ve manager of the Smart Devices Laboratory at NTT's Microsystems Integra�on Laboratories, in Atsugi, west of Tokyo.

RedTacton Technology has three main func�onal features: Ÿ Touch: Touching, si�ng, walking, stepping, gripping and other human movements can

be the used as triggers for unlocking or locking, star�ng or stopping the equipment, or obtaining data.

Ÿ Broadband & Interac�ve: Bandwidth does not deteriorate even with duplex opera�ons and also simultaneous access by many users. Duplex, interac�ve communica�on is possible at a maximum speed of 10Mbps. This is because the transmission path is on the surface of the body; transmission speed of red tacton does not deteriorate in congested areas where many people can communicate at the same �me.

Ÿ Any media: In addi�on to the human body, there are various conductors and dielectrics can also be used as transmission media. Conductors and dielectrics may also be used in combina�on.

1. The RedTacton transmi�er induces a weak electric field on the surface of the body. 2. The RedTacton receiver senses changes in the weak electric field on the surface of the body caused by the transmi�er. 3. RedTacton relies upon the principle that the op�cal proper�es of an electro-op�c crystal can vary according to the changes of a weak electric field. 4. RedTacton detects changes in the op�cal proper�es of an electro-op�c crystal using a laser and converts the result to an electrical signal in a op�cal receiver circuit.

RedTacton

STUDENT

Page 22: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain

Applica�ons:RedTacton has wide range of applica�ons, in those some of the applica�ons are as follows: Ÿ One to One Services Ÿ Marke�ng applica�ons Ÿ Data sharing Ÿ User authen�ca�on Ÿ Conferencing system Ÿ If you want to listen to music from your MP3

player, you will have to adjust the headphone to your ears and then switch on the player that is kept in your pocket. But, with this technology, since there are no wires, the digital signals can be passed from your player to the headphone through your body, clothes, and shoes and so on. To play the next song or to adjust the se�ngs you can do it by selec�ng one of the touching features as explained above.

Ÿ If you want to send the photos that are stored in your camera to a laptop, all you have to do is make a contact between the laptop and the camera.

Ÿ Other amazing applica�ons also includes the sending of business cards to each other just by a shake hand, exchange telephone numbers while you are dancing, sending e-mails with a touch and so on.

Comparison with other network technologies:Ÿ RedTacton actually is helpful in short distance

communica�on. When compared with a wi-fi communica�on, this technology seems advantageous. In wi-fi, there is no need of any

physical connec�ons. Thus communica�on is established as soon as the signals arrive. But, when it comes to security reasons, wi-fi is a problem. As the signals can be easily hacked by others, extra security measures have to be included.

Ÿ Also, when compared with wired transmission, RedTacton is more advantageous. Here physical connec�on is required at a high rate for data transmission. With more and more users trying to retrieve data from a single source, the physical connec�ons become a problem. But, there will not be many problems with security.

Ÿ So, we can confirm that RedTacton technology comes right in between wireless and wired connec�on. It can provide maximum security as well as data transfer without the use of physical connec�ons. The security will be maximum as the data transfers can occur only between two contact points. Take a look at the figure below to know the exact comparison between all the technologies.

Page 23: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain

The technical concept behind the blockchain is similar to that of a database, except that the way you interact with that database is different. The Blockchain concept represents a paradigm shi� in how so�ware engineers will write so�ware applica�ons in the future. The blockchain concept comprises of five key concepts: the blockchain, decentralized consensus, trusted compu�ng, smart contracts, and proof of work/stake. This compu�ng paradigm is important because it is a catalyst for the crea�on of decentralized applica�ons, a next-step evolu�on from distributed compu�ng architectural constructs.

This decentraliza�on phenomenon is not only being implemented in the computer domain but also in the societal , legal, governance and business levels, because there is a race to decentralize everything.

This decentraliza�on concept of the blockchain system is going to affect one's life from the way one carries out business or manages assets, to the way one uses machines, vote, rent a car, and even prove one's iden�ty. Along the way, it will transform banks and other financial ins�tu�ons including hospitals, companies, and governments. Blockchains have many benefits. They are not the answer to all challenges of the digital economy as some�mes is said but it's certain that they will play an increasing role in the Internet of Things. The rapid advance of blockchain technology and the Internet of Things (IoT) are felt throughout our daily lives.

These applica�ons will disturb exis�ng processes across a myriad of industries including manufacturing, trading, shipping, the financial sector and healthcare. In spite of these advancements security remains a topmost concern for the IoT network as it exposes mul�ple devices, huge amounts of data, supply chain partners and the community as a whole to security breaches. in healthcare the privacy integrity and control over access to data is predominant and cri�cally important.

STUDENT

Page 24: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain

With IoT devices growing at a rapid rate, these devices o�en lack the authen�ca�on standards necessary to keep user data safe. Cri�cal infrastructure will be damaged if hackers penetrate through the broad range of IoT devices. To p r o v i d e t r u s t , a u t h e n � c a � o n a n d standardiza�on across all elements of IoT are essen�al for widespread adop�on. Here are some ways the distributed architecture of blockchain can help solve many of these security and trust challenges:Ÿ Blockchain can be used to track the sensor data

measurements and prevent duplica�on with any another malicious data.

Ÿ Distribu�on of IoT devices can be complex, and a distributed ledger is well suited to p r o v i d e I o T d e v i c e i d e n � fi c a � o n , authen�ca�on and seamless secure data transfer.

Ÿ Instead of going through a third party for building trust, IoT sensors can exchange data though a blockchain.

Ÿ A distributed ledger eliminates a single source of failure within the network, protec�ng a IOT device's data from tampering.

Ÿ Blockchain promotes device autonomy (smart contract), individual iden�ty, integrity of data and supports peer to peer communica�on by re m o v i n g te c h n i c a l b o � l e n e c ks a n d inefficiencies.

Ÿ The deployment and opera�on costs of IoT can

be reduced through blockchain since there is no intermediary.

Ÿ IoT devices are directly accessible with blockchain, providing a history of connected devices for troubleshoo�ng purposes.

Ÿ Blockchain-based IOT solu�ons are well suited for simplifying business processes, improving customer experience and achieving significant cost efficiencies.

IOT solu�ons using blockchain can be built to maintain a con�nuously growing l ist of cryptographically secured data records protected against modifica�on and altera�on. It can build trust , accountability , transparency while consolida�ng business processes. Blockchain can help manage and reduce expenses and unpredic�bility of working edge devices and connected servers.

Blockchain offerings empower IOT Devices to par�cipate in data exchanges. Companies can use Blockchain offerings to manage data from edge devices-RFID based assets, Barcode , QR code scan events or device informa�on. IOT edge devices will have the capacity to communicate to blockchain based records to update or validate communica�on contracts. This permits all involved par�es to share data and status of the package as it moves among different gatherings to guarantee the terms of an agreement are met.

Page 25: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain

Another instance where IoT meets blockchain is Telstra, the Australian telecommunica�on giant. Last year, it �ptoed its way into the Internet of Things and is leveraging blockchain technology to secure its smart home ecosystem.

The cryptographic hashes of the device firmware are stored on a private blockchain. This minimizes the verifica�on �me, does away with tamper resistance, and helps in tamper detec�on. At present, most of the smart home devices are controlled by using mobile apps. Telstra takes a step ahead and adds user biometric informa�on to the blockchain hashes. This is an addi�onal layer of security, using blockchain to verify the iden�ty of the devices and the people interac�ng with those devices.

Both IoT and blockchain are prospering, with the promise of a future where machine-to-machine communica�on will be effortless. Currently, companies are pu�ng efforts into merging the two technology powers together. Once combined, IoT and blockchain technology will let several industries thrive by easily monitoring, tracking and securing data.

Page 26: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain

Troubleshoo�ng using Cost Effec�ve Algorithms and Bayesian Networks

What is a network?A network is defined as a group of two or more computer systems linked together. The computers in a network are called nodes. The computers and devices that allocate resources for a network are called Servers. The geometric arrangement of nodes in the network is referred to a topology of the network. The common set of rules and signals that the nodes use to communicate in the network are termed as protocols.

What is a Bayesian network?Bayesian networks are a type of Probabilis�c Graphical Model that can be used to build models from data and/or expert opinion. They can be used for a wide range of tasks including predic�on, anomaly detec�on, diagnos�cs, automated insight, reasoning, �me series predic�on and decision making under uncertainty. These capabili�es are categorized in terms of the four major analy�cs disciplines,Ÿ Descrip�ve analy�csŸ Diagnos�c analy�csŸ Predic�ve analy�csŸ Prescrip�ve analy�cs.

What is Troubleshoo�ng?Troubleshoo�ng is a general term and is used in many different contexts. To avoid misunderstandings and to be able to have a construc�ve discussion, a framework for troubleshoo�ng is required. If we want to troubleshoot a device (assuming that the device is malfunc�oning) we need to determine a strategy for how to perform ac�ons. An ideal troubleshoo�ng algorithm considers possibili�es of component failures and repair/replace costs as well as other issues such as component accessibility, to determine an op�mal troubleshoo�ng strategy (TS-strategy). In reality, it is generally very hard to find an op�mal TS-strategy. Therefore, one usually se�les for sub op�mal strategies i.e. strategies that are op�mal under certain condi�ons. A TS-strategy will usually finish before all suggested ac�ons have been performed since we will usually find the fault before we have performed all ac�ons suggested by the strategy. It is therefore useful to introduce the TS-sequence. A TS-sequence should be considered as the realiza�on of a TS-strategy.

STUDENT

Page 27: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain

How to achieve cost effec�ve TS? This sec�on will introduce the cost distribu�on and the expected cost of repair, ECR. The ECR is used as a measure of how cost effec�ve a TS-strategy is. In this situa�on it is reasonable to shi� your troubleshoo�ng approach to the L3 Switch v and the segments beyond, toward the server along the best path. The follow-the-path approach can quickly lead you to the problem area. You can then try and pinpoint the problem to a device, and ul�mately to a par�cular physical or logical component that is either broken, misconfigured, or has a bug. What we are looking for in a TS-process is to repair a malfunc�oning device. This can be done by performing tests, observa�ons and repair ac�ons un�l the device is working properly. But we are not only interested in repairing the device by following some TS-strategy but rather to follow the best TS-strategy.

In this context, the best TS-strategy will not only repair the device but will also do this by arranging ac�ons in such a way that they make the average TS-cost as low as possible.

The total cost of a TS-sequence is simply the cost

of all performed observa�ons together with the cost of performed tests and the cost of the final repair. There is also considera�on of indirect costs such as logis�cs costs, costs of not be able to use the malfunc�oning device, costs of developing more accurate diagnos�c systems and so forth. It is also important to no�ce that the total cost does not only consist of monetary values but also the cost of poten�ally losing a customer's loyalty and business due to prolonged repair �mes.

A L G O R I T H M S F O R C O S T E F F E C T I V E TROUBLESHOOTINGOne step horizon Algorithm:The one step horizon TS-algorithm is based on the greedy approach but incorporates the possibility to perform tests during troubleshoo�ng. Using the ECRT defini�on given by Equa�on 5.1 the algorithm compares the value of observing the component suggested by the greedy approach with the value of performing a test. This comparison is done by calcula�ng the greedy ECR and the ECRT for all available test and choosing the ac�on which corresponds to the lowest value of ECR or ECRT.

Page 28: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain

The one step horizon algorithm compares the ECRT with the ECR for each ac�on. The comparison makes the algorithm decide which test if any is best to perform as the next ac�on. If the one step horizon algorithm has access to well discrimina�ng test it should isolate the faulty component faster and cheaper that the greedy approach. The flowchart for the one step horizon algorithm is given below. However, the one step algorithm is biased towards performing tests. This bias arises from the comparison between ECR and ECRT. When the algorithm compares the ECR with the ECRT it actually compares the possibility of performing the test now or never, thus making more reasonable to choose the test. This should not be confused with the actual possibility of performing the test later but rather as how the algorithm values the test at the current ac�on.

Two step horizon Algorithm: The one step horizon algorithm is biased towards performing tests since the evalua�on criterion compares the possibility of performing the test now or newer. To even out this bias the test should not only be evaluated at the current ac�on but

also a�er the next observa�on. In the two steps algorithm, the comparison for making a test is made with respect to the current ac�on and to the next ac�on, hence the name two step.

This two-step horizon should compensate for the bias since the algorithm compares the possibility of performing the test now or later. To evaluate the test a�er the next observa�on the ECROT (Expected cost of repair a�er observa�on and test) is introduced and calculated according to The algorithm calculates ECR, ECRT and ECROT and suggests the ac�on corresponding to the lowest value. The flowchart for the two step horizon algorithm are given in below:

Since the troubleshoo�ng problem is proven to be NP-hard there is a concern of algorithm complexity. The evalua�on calcula�on in the two-step horizon algorithm becomes more demanding for larger systems and in par�cular systems connected to many tests with a large number of possible outcomes.

Page 29: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain

Inferences: The approach of using Bayesian networks serves as a possible solu�on to the problems of tradi�onal troubleshoo�ng. The proper�es of the Bayesian network makes it possible to quickly modify models and thereby overcoming the problem with the variety of component configura�ons in modern trucks. To model the different truck systems as a Bayesian network is a huge task and requires informa�on that is usually not available. A possible solu�on is to consider the Bayesian approach early in the development of new systems.

References:Ÿ “ Troubleshoo�ng using Cost Effec�ve

Algorithms and Bayesian Networks” by THOMAS GUSTAVSSON

Ÿ Koos Rommelse David Heckerman, John S. Breese. Decision theore�c troubleshoo�ng. 1995.

Yash Keshan TE CMPN A

Page 30: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain

Name of Team: Technical DaasDetails of Team member: Ÿ Shivam Singh BE CMPN B 34Ÿ Amit Tiwari TE CMPNB 52Ÿ Dineshkumar, BE CMPN B 42Ÿ Aman Singh, BE CMPN B 27Ministry: Council of Scien�fic & Industrial Research (CSIR), Pune.Problem Statement: Cost effec�ve on cloud (private own by government) solu�on for zero day a�ack protec�on for advanced persistent threat/advance threat preven�on for government sectors.No. of Team selected: 5(In same problem statement for grand finale)

Our Solu�on:Our solu�on provide Cloud based Security against both Signature and anomaly based a�acks i.e. Top Ten Vulnerabili�es(DDos A�ack, SQL injec�on a�ack etc.), sophis�cated malware and zero-day threats to all the government Websites without sharing any data to any public cloud(AWS, Microso� Azure).There will be a virtual machines in the Government owned Private Cloud.Ÿ In first Case, virtual machine will act as a reverse proxy or a shield to the en�re world. It

prevents Top OWASP Vulnerabili�es such as DDoS A�ack, SQL injec�on a�ack, network threat etc. Here the Virtual Machine will acts as a Shield in front of web server where the user/hacker is unaware that the request is directed to VM first and then directed to Web Server. In Case of data that can have malware the sandbox system comes into existence.

Ÿ In Second Case, machine will contain Sandbox to separate out harmful Malware that can harm government Organisa�on's network .If any file format for example( pdf, docs, jpg) detected having malware or zero day a�ack that file will be discarded . If that file found safe then this virtual machine will automa�cally send that file to data center.

Report

STUDENT

Page 31: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain

How had you displayed your solu�on?Ÿ We displayed en�re flow of our idea through

two animated videos.Ÿ And also we proposed our architecture solu�on

through an block diagram as shown above diagram and prac�cal demonstra�on on real web applica�ons.

Any Challenges you find during implementa�on?Every step of implementa�on was a challenge but the hardest one is implement of nested virtualisa�on in EC2 AWS. Even read AWS documenta�on and different blogs have clearly said that nested virtualiza�on is not possible. But at the end we have successfully implemented nested virtualisa�on in cloud.

What all learning you done?We worked on different programming language in which we haven't worked before but all members were truly passionate who learned and worked in team which helped us lot.

Different language and technology we worked:Perl, Python, Php, Rest API, Json, Linux Environment setup with many tools.

Which all engineering subjects is used? Which new technology helps?Our solu�on is based on Ethical Hacking, Cloud Compu�ng and Network Security.Subject:Ÿ Programming(C,java,python)Ÿ Computer NetworkingŸ Linux and Cloud Compu�ng(R&D incuba�on

Training Courses)

Which Co-curricular ac�vity helps?Par�cipa�on in different events which help in improving your presenta�on and communica�on skills.Training courses in Research Cell [Incuba�on Center] in technology such as Linux,cloud Compu�ng,blockchain and networking.

Page 32: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain

Sugges�on from our side:Ÿ An SIH hackathon ini�a�ve by GOI is become

very popular events and well accepted across all colleges from India.

Ÿ 2nd SIH has 100 % rise in students' par�cipants and same exponen�al par�cipants will be expected in next hackathon

Ÿ Hence, to get selected in SIH finale is going to be tougher.

Ÿ We need to prepare ahead of actual SIH events (at least six-month plan) may be star�ng of odd semester.

Ÿ Project ideas should be selected based on social relevance. As Government ministries are working for the peoples.

Ÿ The project will be based on open source technology and ML, AI and Mobile development should be a unique feature.

Ÿ Important is created of the Dashboard or UX of the project. So special training needs to be given for UX.

Ÿ Students are coming out with their choice of group, and in that group, all are not confident in coding. Hence, the college needs to involve in valida�ng the members of the group.

Ÿ Pools of industry mentors, who are good in coding need to be iden�fied.

Page 33: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain

Technical Papers

Page 34: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain
Page 35: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain
Page 36: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain
Page 37: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain
Page 38: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain
Page 39: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain
Page 40: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain
Page 41: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain
Page 42: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain
Page 43: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain
Page 44: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain
Page 45: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain
Page 46: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain
Page 47: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain
Page 48: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain

INTERVIEW : System Analyst

INDUSTRY

What characteris�cs should a system analyst possess to be good at his job?System Analyst is a professional who is responsible to use his analy�cal skills and technological knowledge to help organiza�on make profitable business decisions. Therefore, a System Analyst should possess a unique blend of knowledge from technological and business arena.

Would you consider analyzing data or informa�on a strength? How so?Informa�on per-se cannot be analyzed. Informa�on is the result of analysis of data.For example, Recently Costco implemented a product placement strategy of keeping diapers and beer near each other in their stores. The strategy was a huge hit.In this case, some analyst analyzed the company’s sales report(data) and figured out that people who purchased diapers also purchased beers(informa�on).

What you would do if you realize that business requirement is not technically feasible?During the requirement gathering phase of SDLC if a business requirement is not technically feasible, I will approach this problem in 2 stages:Ÿ I will first try to find a work around this problem and will try sugges�ng it to the client.Ÿ If that is not possible then, I will explain with integrity that the business requirement is not

technically feasible as it is never a good strategy to over-commit and under perform. Being honest upfront will prevent the possibility of not delivering a par�cular deliverable and sabotaging a good rela�onship with the client.

Which So�ware Development methodology is being used in your current job?Agile methodology or more specific form of agile methodology called as “The momentum methodology” is used currently at Deloi�e consul�ng.

What is your role in current posi�on?I am a Workday Consultant. Workday is a cloud based Human Capital Management So�ware-as-a-Service. I help the clients implement this HRMS so�ware by tailoring and configuring the product as per their unique business needs.

Page 49: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain

Describe your ongoing project.I am currently working with one of the largest banking/financial instruc�ons in the world. The client operates in over 100 coun�es and employs a work force of more than 200,000 employees. I am helping them implement Workday according to their business requirements. I am part of data conversion module where-in at an abstract level, I extract data from their current legacy systems, transform it into a form suitable for workday, and then load the data into Workday's cloud storage infrastructure. So, at an abstract level I perform ETL(Extract/Transform/Load) on their data.

How do you connect clients with the right IT solu�ons? How do you assess their needs?Key is to listen carefully. Listening to the client needs carefully then conver�ng those needs into a technological document called as “Statement Of Work” and then conveying it to the client in its simplest form helps successful consultants all over the world to design customized IT solu�ons that best meet client needs.Your advice to students who wish to take up System Analysis further in their CareerStudent should be well read and should be aware of the most recent and latest tools to thrive in the highly compe��ve IT world.

How would you manage frequent changes in user requirements?Frequent changes in user requirements are managed by adap�ng agile methodology and running the project in itera�ve phases.

How do you persuade a doub�ul manager to get on board with your sugges�ons?I persuade him/her by presen�ng clear and concise facts, data or even prototypes. Presen�ng your thoughts and point of view in a clear and cogent manner goes a long way in persuading an individual even a skep�cal one.Describe a �me when you had to deliver a presenta�on. How did you explain technical details to a non-technical audience?I will answer the ques�on in two sec�ons.Ÿ My method for preparing for a presenta�on is

20% slide prepara�on,20% script prepara�on and remaining 60% is rehearsing the presenta�on. Presenta�on should be well choreographed.

Ÿ Explaining technical concepts to a non-technical audience can be achieved through analogies but once the presenta�on is done it is necessary to educate the audience/client about the actual technical concept as every single concept cannot be explained through analogies.

Pradnesh AdurkarSystem AnalystDeloi�e, USA.

Page 50: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain

ACHIEVEMENTS

ROHAN GANDHI 9.68 SHASHANK MISHRA 9.52YASMIN ANSARI 9.52ANUJA SHINDE 9.52SHRADDHA DHUMALE 9.52JUHI PATIL 9.52

B.E. TOPPERS

T.E. TOPPERS

VISHWAKARMA SHUBHAM 9.60 SAYYED SHAHEEN 9.36RAJPUROHIT VIKRAM 9.24CHOUDHARY GARIMA 9.20AWASTHI KALINDI 9.12TANWAR DINESHKUMAR 9.12

ANKIT GUPTA 9.96JOSHI HIRESH 9.92 PARAB GAURAJA 9.67 SINGH SAURABH 9.67 JADHAV SMRITI 9.50PANDYA KEYUR 9.50PATHARE SAGAR 9.50RANE MIHIR 9.50SINGH SHREYA 9.50

S.E. TOPPERS

GADE SANDESH 9.54GUPTA AISHWAIRYA 9.54 SHRUTHI HARISH 9.54KAPRI PRASHANT 9.38OZA YASHISH 9.38 PANDEY ABHAY 9.38SINGH SMRITI 9.38TENDULKAR ATHARVA 9.38AGARALWAL AYUSH 9.35

Page 51: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain

ACHIEVEMENTS

SMART INDIA HACKATHON (FINALIST) NOOPUR THANVISHREYASH KADSAURABH JHA

SEED INFOTECH

TOP 10MITTAL JETHVA

TOP 50SHREYASH KADADARSH DUBEYTUSHAR RAJDEVSAKSHI PANDEY

BRIJ PAREKH

THINKTANK,(NMIMS COLLEGE) INCEPTION, 1ST PRIZE

CO-CURRICULAR

CO-CURRICULAR

CO-CURRICULAR

Page 52: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain

Student Editorial Committee

(L-R): Tejas Gupta, Sagar Pathare, Mrinal Bageshwari, Adit Rathi, Athashree Vartak & Saurabh Jha

Page 53: Computer Engineering - tcetmumbai.in · PO 3: Design & Development of Soluons: ... Nimbus focuses on the Emerging Trends of the 21st Century. Thereby envisioned to bring the ... Blockchain

Success is the result of perfec�on, hard work and determina�on. Team Nimbus has always been dedicated in bringing the best Nimbus every semester. With the same determina�on, we have worked hard to bring this edi�on.

We would like to extend our deepest gra�tude to the Chairman, Trustees and CEOs of Thakur Educa�onal group. Also, we are deeply thankful to our Principal, Dr. B.K. Mishra and Mentor Dean, Dr. R.R. Sedamkar for their constant encouragement and support.

Hear�est accolades for our HOD Dr. Sheetal Rathi and Faculty In-charge Mrs. Harshala Yadav, without them Nimbus wouldn’t have been what is today.

At the end we would like to express our sincere thanks to all the students, teachers and industry experts for providing us with their valuable inputs through ar�cles and interviews.

-Team Nimbus 7.0

Acknowledgements


Recommended