Internship Report
Internship Report
Internship Report
on
(5 weeks)
(July 2022-August 2022)
I’ve got this golden opportunity to express my kind gratitude and sincere thanks to my Head
of Institution, KIET Group of Institutions of Engineering and Technology, and Head of
Department of “Information Technology” for their kind support and necessary counselling in
the preparation of this project report. I’m also indebted to each and every person responsible
for the making up of this project directly or indirectly.
I must also acknowledge or deep debt of gratitude to each one of my colleague who led this
project come out in the way it is. It’s my hard work and untiring sincere efforts and mutual
cooperation to bring out the project work. Last but not the least, I would like to thank my
parents for their sound counselling and cheerful support. They have always inspired us and
kept our spirit up.
This is to certify that the internship project report entitled "Placement Preparation"
submitted by Mr.Yash Prakash Mishra in the Department of Information Technology of KIET
Group of Institutions, Ghaziabad, affiliated to Dr. A. P. J. Abdul Kalam Technical University,
Lucknow, Uttar Pradesh, India, is a record of candidate summer internship. He/She has
successfully completeted his/her internship under my supervision and guidance and is worthy
of consideration for the same.
Signature of Supervisor:
Supervisor’s Name:
Date:
ABSTRACT
For making the students placement ready, a comprehensive program for aptitude & technical
skills was designed and planned to be executed for pre-final year students in Offline and Online
mode from 21st June 2022. The Departments jointly conducted the program during this time.
Ultimate objective was to brush up on the important and necessary technical skills which are
highly in demand for placement purpose.
The above said program is divided into three phases carrying a total weightage of 1000
marks.
Introduction of Project Internship
A thorough curriculum for aptitude and technical skills was created and was scheduled to
start on June 21, 2022, for pre-final year students, in order to prepare them for placement.
During this time, the program was jointly run by the Departments. The main goal was to
review the critical technical abilities that are crucial for job placement and are in great
demand.
The aforementioned program is broken down into three parts, each of which carries a 1000-
point weighting.
Details of tasks assigned
The aforementioned program is broken down into three parts, each of which carries a 1000-
point weighting.
• Aptitude – 18 Hours
• DSA – 18 Hours
• Java/Python: 10 Hours
· DBMS – 6 Hours
Phase 2. Online Self-Paced DSA Preparation (5 Weeks, from July 4 to August 6, 2022):
Learned about the data structures and using the various data structures knowledge solved the
problem on leetcode and enhanced my learning ability and improved my problem solving
skills.
Conclusion
In conclusion this Internship has been a very wonderful experience for me. I can safely say
that my understanding in field of data structures has increased. Knowledge of data structures
and aptitude could help us to get good placements and solve real world problems .It has also
helped to improve my problem solving skills.
This internship helped me to improve my data structure knowledge and solve various
problems on leetcode.It also greatly helped me with time management.
LITERATURE REVIEW REPORT
INTERNET OF THINGS
(IOT):SECURITY PERSPECTIVE
SUMMARY
ABSTRACT : In the past decade ,internet of things(IoT)has been a focus of research.
It makes more intelligent to core element of modern world such as hospitals ,cities,
organizations,and buildings.Usually,IoT has four major components including
sensing,information processing,application sandservices,heterogeneous access
and additional components e.g.Security and privacy.In this paper,we are presenting
security perspective from the perspective of layers that comprises IOT.In this we
focus on the overview of IoT security perspective.
REVIEW: Most times people are often unaware of sensors in their life, so we need to
setup regulations to preserve the privacy of people. Cryptographic Algorithms: So
far there is a well-known and widely trusted suite of cryptographic algorithms applied to internet
security protocols such as table. Usually the symmetric encryption algorithm isused to encrypt data for
confidentiality such as the advanced encryption standard(AES) blockcipher; the asymmetric algorithm
is often used to digital signatures and key transport, frequently-used algorithm is the rivest Shamir
Adelman (RSA); the diffie-hellman (DH) asymmetric key agreement algorithm is used to key
agreement; and the SHA-1 and SHA-256 secure has algorithms will be applied for integrality. Another
significant asymmetric algorithm is known as elliptic curve
cryptography(ECC) ,ECC can provide equal safety by use of shorter length key,the
adoption of ECC has been slowed and may be been courage recently .To implement
The secryptographic algorithms available resources are necessary such as processor
speed and memory .So how to apply the secryptographic techniques to the IoT is not
clear ,we have to make more effort to further research to ensure that algorithm scan
be successfully implemented using of constrained memory and low-speed
processor in the IoT.
CONCLUSION: In the last few years, this emerging domain for the IoT has been
attracting the significant interest, and will continue for the years to come. Inspite of
rapid evolution, we are still facing new difficulties and severe challenges. In this
literature, we concisely reviewed security in the IoT, and analyzed security
characteristics and requirements from four layers including perceptual layer, network layer, support
layer and application layer. Then, we discussed the research status in this field from encryption
mechanism, communication security, protecting sensor data,and encryption algorithm. At last we
summarize several challenges . All in all the development of the IoT will bring more serious security
problems, which are always the focus and the primary task of the research.
A STUDY OF CYBER SECURITY CHALLENGES
AND IT EMERGNING TRENDS ON LATEST
TECHNOLOGIES
SUMMARY
ABSTRACT-Cyber Security plays an important role in the field of information technology .Securing
the information have become one of the biggest challenges in the present day. When ever we think
about the cyber security the first thing that comes to our mind is ‘cyber crimes’ which are increasing
immensely day by day. Various Governments and companies are taking many measures in order to
prevent these cyber crimes. Besides various measures cyber security is still a very big concern to many.
This paper mainly focuses on challenges faced by cyber security on the latest technologies .It also
focuses on latest about the cyber security techniques, ethics and the trends changing the face of cyber
security.
LITERATURE-Cyber crime is a term for any illegal activity that uses a computer as its primary
means of commission and theft. The U.S. Department of Justice expands the definition of cyber crime
to include any illegal activity that uses a computer for the storage of evidence. Usually in common
man’s language cyber crime may be defined as crime committed using a computer and the internet to
steal a person’s identity or sell contraband or stalk victims or disrupt operations. Today man is able to
send and receive any form of data may be an e-mail or an audio or video just by the click of a button
but did he ever think how securely his data id being transmitted or sent to the other person safely without
any leakage of information? The answer lies in cyber security. In today’s technical environment many
latest technologies are changing the face of the mankind. But due to these emerging technologies we
are unable to safeguard our private information in a very effective way and hence these days cyber
crimes are increasing day by day. Today most of the commercial transactions are done online, so this
field requires a high quality of security. Hence cyber security has become a latest issue. The scope of
cyber security is not just limited to securing the information in IT industry but also to various other
fields like cyber space etc. Even the latest technologies like cloud computing, mobile computing, E-
commerce, net banking etc also needs high level of security. Since these technologies hold some
important information regarding a person their security has become a must thing. Making the Internet
safer (and protecting Internet users) has become an important to the development of new services as
well as governmental policy. Every individual must also be trained on this cyber security and save
themselves from these increasing cyber crimes.
REVIEW- 98% of companies are maintaining or increasing their cyber security resources and of those,
half are increasing resources devoted to online attacks this year. The majority of companies are
preparing for when, not if, cyber attacks occur. Only one-third are completely confident in the security
of their information and even less confident about the security measures of their business partners.
There will be new attacks on Android operating system based devices, but it will not be on massive
scale. The fact tablets share the same operating system as smart phones means they will be soon targeted
by the same malware as those platforms. The number of malware specimens for Macs -are Web servers,
Cloud computing and its services, Encryption of the code ,APT’s and targeted attacks, Mobile networks,
IPv6:New internet protocol .
CONCLUSION- Computer security is a vast topic that is becoming more important because the world
is becoming highly interconnected, with networks being used to carry out critical transactions. The
latest and disruptive technologies, along with the new cyber tools and threats that come to light each
day, are challenging organizations with not only how they secure their infrastructure, but how they
require new platforms and intelligence to do so. There is no perfect solution for cyber crimes but we
should try our level best to minimize them in order to have a safe and secure future in cyber space.
LITERATURE- In the “deep learning” methodology, the term “deep” enumerates the concept of
numerous layers through which the data is transformed. These systems consist of very special credit
assignment path (CAP) depth which means the steps of conversions from input to output and represents
the impulsive connection between the input layer and the output layer. Deep learning techniques are
purely such kind of learning methods that have multiple levels of representation and at more abstract
level. Deep learning techniques use nonlinear transformations and model abstractions at a high level in
large databases. It also describes that a machine transforms its internal attributes, which are required to
enumerate the descriptions in each layer, by accepting the abstractions and representations from the
previous layer. This novel learning approach is widely used in the fields of adaptive testing, big data,
cancer detection, data flow, document analysis and recognition, health care, object detection, speech
recognition, image classification, pedestrian detection, natural language processing and voice activity
detection. Deep learning paradigm uses a massive ground truth designated data to find the unique
features, combinations of features and then constructs an integrated feature extraction and classification
model to figure out a variety of applications.
REVIEW-The target approach of deep learning is to resolve the sophisticated aspects of the input by
using multiple levels of representation. This new approach to machine learning has already been doing
wonders in the applications like face, speech, images, handwriting recognition system, natural
language processing, medical sciences, and many more. Its latest researches involve revealing the
optimization and fine tuning of the model by using gradient descent and evolutionary
algorithms. Some major challenges that the deep learning technology is facing undoubtedly are the
scaling of computations, optimization of the parameters of deep neural network, designing and learning
approaches. A detailed investigation in various complex deep neural network models is also a big
challenge to this potential research area. The combination of fuzzy logic with deep neural network is
another provoking and demanding area which needs to be explored.
CONCLUSION- Deep learning is indeed a fast growing application of machine learning. The rapid
use of the algorithms of deep learning in different fields really shows its success and versatility.
Achievements and improved accuracy rates with the deep learning clearly exhibits the relevance of this
technology, clearly emphasize the growth of deep learning and the tendency for the future advancement
and research. At last, we conclude here, that if we follow the wave of success, we will find that with
the increased availability of data and computational resources, the use of deep learning in many
applications is genuinely taking off towards the acceptance. The technology is really ephebic, young
and specific and in the next few years, it is expected that the rapid advancement of deep learning in
more and more applications with a great boom and prosperity e.g. natural language processing, remote
sensing and healthcare will certainly achieve targets and height of triumph and satisfaction.
LITERATURE- The term “5G” is just a shorthand for the fifth generation of cellular mobile
communications in 1998 and 4G networks in 2008, a new set of mobile network technologies is overdue.
Initial benchmarks indicate 5G being 20 times faster than 4G, but that could scale to 40 times or higher, said
Rob Topol, general manager of 5G Advanced Technologies at Intel, which is providing 5G circuitry and
infrastructure equipment. The blazing speed is achieved by exploiting wireless spectrum above 30 GHz, also
called millimeter wave, which was previously not available for cellular communications. The higher
operating frequency enables more information to be carried per second of transmission time. A key 5G
reliability feature, called “network slicing,” guar-antees reception so connections don’t break down. Slicing
can guarantee a wireless connection to an autonomous car driving through an area with network congestion,
Topol said.Compared to 4G, 5G handles smaller packets of data efficiently for machine-to-machine
communication with real-time exchange of data between devices and sensors. For instance, VTT researchers
estimated 5G time lag at 1 millisecond, compared to 10 to 20 milliseconds for 4G.
REVIEW- New radio heads, base stations, and diverse access points to sup-port additional 5G frequencies.
As the 5G buildout continues, it could take years for networks to fully mature. Base stations in and outside
cell towers are being loaded with faster electronics and algorithms to handle AI, network management, and
other edge tasks, that eases the network load and provides intelligent services as data moves from one point
to another along the network. Unlike the lower frequencies used for 4G and Wi-Fi, signals on the 5G
millimeter-wave spectrum above 30 GHz have trouble penetrating obstructions. That’s where additional
technologies like beam forming step in, creating a sort of last-mile reach to retain the resilience of signal
beams. There will be shorter connections through repeaters, which are smaller and simpler access points that
operate like a distributed relay providing deeper coverage needed inside factories. Small 5G boxes could be
embedded into the existing infrastructure, such as street lamps, utility poles, or bus shelters, much the way
Wi-Fi access points are mounted into buildings and other places, said Rob Topol, general manager of 5G
Advanced Technologies at Intel. For signals to reliably reach devices, 5G will have a quicker handoff with
other widely deployed wireless networks such as 4G.
CONCLUSION- 5G’s potential is yet to be fully realized, but one thing is certain: It makes IoT devices
and sensors in robots, machines, cars, and drones matter unlike any other past technology.“We think of 5G
as a communication platform because for the first time we can combine communication and control theory.
When you have a control loop you need feedback to control your systems. Emerging 5G networks feature
lower latency, higher capacity, and increased bandwidth compared to 4G. These network improvements will
have far-reaching impacts on how people live, work, and play all over the world. Emerging 5G networks
feature lower latency, higher capacity, and increased bandwidth compared to 4G.
LITERATURE-Artificial Intelligence began with the “… conjecture that every aspect of learning or
any other feature of intelligence can in principle be so precisely described that a machine can be made
to simulate it.” (McCarthy, Minsky, Rochester, & Shannon, 1955) and moved swiftly from this vision
to grand promises for general human-level AI within a few decades. This vision of general AI has now
become merely a long-term guiding idea for most current AI research, which focuses on specific
scientific and engineering problems and maintains a distance to the cognitive sciences. A small minority
believe the moment has come to pursue general AI directly as a technical aim with the traditional
methods – these typically use the label ‘artificial general intelligence’.
REVIEW- Let us stress, however, that the aim was to ‘gauge the perception’, not to get well-founded
predictions. These results should be taken with some grains of salt, but we think it is fair to say that the
results reveal a view among experts that AI systems will probably (over 50%) reach overall human
ability by 2040-50, and very likely (with 90% probability) by 2075. From reaching human ability, it
will move on to superintelligence in 2 years (10%) to 30 years (75%). Future Progress in Artificial
Intelligence: A Poll Among Experts 15/19 thereafter. The experts say the probability is 31% that this
development turns out to be ‘bad’ or ‘extremely bad’ for humanity.So, the experts think that
superintelligence is likely to come in a few decades and quite possibly bad for humanity – this should
be reason enough to do research into the possible impact of superintelligence before it is too late. We
could also put this more modestly and still come to an alarming conclusion: We know of no compelling
reason to say that progress in AI will grind to a halt (though deep new insights might be needed) and
we know of no compelling reason that super intelligent systems will be good for humanity. So, we
should better investigate the future of super intelligence and the risks it poses for humanity.
CONCLUSION- Artificial Intelligence and the technology are one side of the life that always interest
and surprise us with the new ideas, topics, innovations, products …etc. AI is still not implemented as
the films representing it(i.e. intelligent robots), however there are many important tries to reach the
level and to compete in market, like sometimes the robots that they show in TV. Nevertheless, the
hidden projects and the development in industrial companies. This is not the end of AI, there is more to
come from it, who knows what the AI can do for us in the future, maybe it will be a whole society of
robots.
DAILY LOG
NAME Ayushee Gupta
COURSE BTECH
S. Topic Date
No.