You are on page 1of 56

ABSTRACT:

This report describes the internship I had spent in Electronics Corporation of India
Limited,Hyderabad. They are a fledgling company dedicated to offerings service in the field of
IT consulting, Internet Of Things, application development. They strive to make a difference in
their offerings by ensuring that quality and punctuality are imbibed in anything and everything
they do. The ECIL also help the interns in training and also organizes internship programs for
those are interested to do. ECIL is an innovative hub providing career consultation and solution.
They passionate about creating solutions to the real life Problems .The incentive of this intern is
to help engineering Students to transform their technical ideas into reality by bridging the gap
between the theoretical and practical conception. ECIL guarantees fast, adaptable,
straightforward ,reliable, brilliant administration. I chose Android Application development.
An Android app is a software application running on the Android platform. Because the
Android platform is built for mobile devices, a typical Android app is designed for a smartphone
or a tablet PC running on the Android OS. Although an Android app can be made available by
developers through their websites, most Android apps are uploaded and published on the
Android Market, an online store dedicated to these applications. The Android Market features
both free and priced apps.
Android apps are written in the Java programming language and use Java core libraries.
They are first compiled to Dalvik executables to run on the Dalvik virtual machine, which is a
virtual machine specially designed for mobile devices.
Developers may download the Android software development kit (SDK) from the
Android website. The SDK includes tools, sample code and relevant documents for creating
Android apps.
Novice developers who simply want to play around with Android programming can make
use of the App Inventor. Using this online application, a user can construct an Android app as if
putting together pieces of a puzzle.

iii
LIST OF FIGURES

1.1 Internship Completion Certificate……………………………………………………..4

1.2 Feedback Activity……………………………………………………………………..15

1.3 Doctors Booking………………………………………………………………………16


1.4 Doctors Homepage Activity…………………………………………………………..17
3.1 Working of IoT………………………………………………………………………..36
3.2 Type definition for IoT………………………………………………………………..37
3.3 Process of connections………………………………………………………………..38
3.4 Figures of IoT…………………………………………………………………………40
3.5 CoAP Architecture……………………………………………………………………41
3.6 Design architecture of cyber physical system enabled
manufacturing system………………………………………………………………...45

iii
LIST OF ABBREVIATION

Ecil- Electronics Corporation of India Limited

IoT - Internet of Things

LED - Light Emitting Diode

GND - Ground

USB - Universal Serial Bus

Arduino IDE - Arduino Integrated development environment

ASR - Automatic Speech Recognize

NLU - Natural Language Understanding

API - Application Protocol Interface

NLP - Natural Language Processing

D2D - Device to Device

RFID - Radio Frequency Identification

Iaas - Infrastructure-as-a-service

Xaas- x as-a-service

P2P - People to People

M2M - Machine to Machine

CoAP - Constrained Application Protocol

XMPP - Extensible Messaging and Presence Protocol

v
TABLE OF CONTENT

CHAPTER NO TITLE PAGE NO

Abstract iii

List of figure iv

List of Abbreviation v

1 INTERNSHIP 1

1.1. Brief on Intern attended 1

1.2. Abstract on Intern Attended 3

1.3 Certificate by the Company 4

1.4 Introduction to Project 5

1.5 Tools & Technologies used 6

1.6 Implementation 14

1.7 Testing 18

1.8 Results 22

2 ANALYSIS 23

2.1 Survey on Dream Company 23

2.2 Survey on Current project in Dream Company 24


2.2.1 Amazon Lex

2.2.2 Amazon Rekognition

2.3 Identification of skill demand in Dream Company 32

3 PLATFORM / LANGUAGE / FRAMEWORK

TOOLS 34

3.1 History 35

3.2 Introduction 36

3.3 Features 37

3.4 Basic Concepts 41

3.5 Applications 48

3.6 Future Scope 47

4 CONCLUSION 50
CHAPTER – 1

INTERNSHIP

1.1 BRIEF ON INTERN ATTENDED :

An internship is a period of work experience offered by an organization for a limited


period of time. Once confined to graduates, the term is now used for a wide range of placements
within businesses, non-profit organizations and government agencies. They are typically
undertaken by students and graduates looking to gain relevant skills and experience in a
particular field. Employers benefit from these placements because they often recruit employees
from their best interns, who have known capabilities, thus saving time and money in the long
run. Internships are usually arranged by third-party organizations which recruit interns on behalf
of industry groups. Rules vary from country to country about when interns should be regarded as
employees. The system can be open to exploitation by unscrupulous employers.
Internships for professional careers are similar in some ways, but not as rigorous as
apprenticeships for professions, trade, and vocational jobs. The lack of standardization and
oversight leaves the term "internship" open to broad interpretation. Interns may be high school
students, college and university students, or post-graduate adults. These positions may be paid or
unpaid and are temporary. Typically, an internship consists of an exchange of services for
experience between the intern and the organization. Internships are used to determine if the
intern still has an interest in that field after the real-life experience. In addition, an internship can
be used to create a professional network that can assist with letters of recommendation or lead to
future employment opportunities. The benefit of bringing an intern into full-time employment is
that they are already familiar with the company, their position, and they typically need little to no
training. Internships provide current college students the ability to participate in a field of their
choice to receive hands on learning about a particular future career, preparing them for full-time
work following graduation.

Supervised Learning : The computer is presented with example inputs and their desired outputs,
given by a "teacher", and the goal is to learn a general rule that maps inputs to outputs. As
special cases, the input signal can be only partially available, or restricted to special feedback:

Semi-supervised learning: the computer is given only an incomplete training signal. a training set
with some (often many) of the target outputs missing.

Active learning: the computer can only obtain training labels for a limited set of instances (based
on a budget), and also has to optimize its choice of objects to acquire labels for. When used
interactively, these can be presented to the user for labelling.
1
Reinforcement learning: training data (in form of rewards and punishments) is given only as
feedback to the program's actions in a dynamic environment, such as driving a vehicle or playing
a game against an opponent.

Unsupervised learning: No labels are given to the learning algorithm, leaving it on its own to find
structure in its input. Unsupervised learning can be a goal in itself (discovering hidden patterns in
data) or a means towards an end (feature learning).

TYPES OF INTERNSHIPS :
Paid Internships: Paid internships are common in professional fields including medicine,
architecture, science, engineering, law, business (especially accounting and finance), technology,
and advertising. Work experience internships usually occur during the second or third year of
schooling. This type of internship is to expand an intern's knowledge both in their school studies
and also at the company. The intern is expected to bring ideas and knowledge from school into
the company.
Work research, virtual research (graduation) or dissertation: This is mostly done by students
who are in their final year of school. With this kind of internship, a student does research for a
particular company. The company can have something that they feel they need to improve, or the
student can choose a topic within the company themselves. The results of the research study will
be put in a report and often will have to be presented.
Unpaid internships:Unpaid internships are typically through non-profit charities and think tanks
which often have unpaid or volunteer positions.
Partially-paid internships: Partially-paid internships is when students are paid in the form of a
stipend. Stipends are typically a fixed amount of money that is paid out on a regular basis.
Usually, interns that are paid with stipends are paid on a set schedule associated with the
organization.
Another type of internship growing in popularity is the virtual internship, in which the intern
works remotely, and is not physically present at the job location. It provides the capacity to gain
job experience without the conventional requirement of being physically present in an office. The
internship is conducted via virtual means, such as phone, email, and web communication. Virtual
interns generally have the opportunity to work at their own pace.

2
1.2 ABSTRACT ON INTERNSHIP ATTENDED:
Patient Management System helps to maintain total patients in the Hospital. Patient
records management system is a comprehensive patient care related clinical information system
meant for doctors to enable quick review of previous medical history of patients and provide
better quality treatment to the patients.

To meet a solution to manage dental students records across hospital of government of India for
Hospital Management Information System in 29 state.To overcome existing problems occurring
in maintains of students information

It is very important to maintain efficient software to handle information of a Hospital.


This application Provides a way to record this information and to access these in a simple way.

The different areas where we can use this application are:

 The system will be used in any Hospital ,Clinic , Pathology labs in any Hospital clinic
.Pathology labs to get the information from the patients and then storing the data for future
usage
 The current system in use is a Paper based system .it is too slow and can’t provide updated
lists of patients with in a recommended timespan

3
1.3 CERTIFICATE BY THE COMPANY:

Fig 1.1 Internship Certificate

4
1.4 INTRODUCTION TO THE PROJECT

In literature survey we look into the details about the existing system and we
try to reduce the disadvantages of the existing system. We try to improve the
performance and the efficiency of the new system.

1.4.1 EXISTING SYSTEM

The Existing systems provide the basic functionalities needed to be handled


in a hospital management environment.
There is no intelligence of the software in such cases in the existing system
all the patient details ,doctor availability details and regarding the tests done to the
patients prescribed by the doctor is maintained manually by the receptionist
1.4.2 PROPOSED SYSTEM
In our proposed system we are going to provide solutions to all the above
mentioned problems by automating the whole hospital management system by
using and integrated software that handles the whole system.

The proposed provides one integrated view to patients for Billing ,


Discharge details ,patient medical history .

1.4.3 MODULES

Module Description:This application consists of following modules

1. Registration Module
2. Out Patient Scheduling Module
3. In patient Monitoring Module
4. Patient feedback
5. Admin Module

Module I: Registration module consists of sub modules namely:


 Maintains New Patient Registration.
5
 Advance Payments, Appointment Facility from Doctors,
Admission, Discharge (or) Transfer Details.
Module II: Outpatient scheduling module consists of sub modules namely:

 Maintains Daycare patient schedule and Referral patient schedule.

Module III: In-patient monitoring module consists of sub modules namely:


 Maintains Casualty patient schedule, patient health status.
Module IV: Patient Feedback module consists of sub modules namely:
 Maintains feedback from the patient.
Module V: Admin module consists of sub modules namely:
 Provide access rights.

1.4.4 ANALYSIS

In this phase the requirements are gathered and analysed. Users requirements are gathered
in this phase. This phase is the main focus of the administrators and registered
accounts. Meetings with users and registered people are held in order to determine the
requirements like: Who is going to use the system? How will they use the system? What data
should be input into the system? What data should be output by the system? These are general
questions that get answered during a requirements gathering phase. After requirement gathering
these requirements are analysed for their validity and the possibility of incorporating the
requirements in the system to be development is also studied.

Finally, a Requirement Specification document is created which serves the purpose of


guideline for the next phase of the model.

1.5. T OOLS & TECHNOLOGIES USED

1.5.1 SOFTWARE REQUIREMENTS SPECIFICATION

The software requirements specification specifies the functional requirements and non-
functional requirements. Functional requirements refers to how the system is going to react
according to the input provided and how it is going to behave in particular situations and non-
functional requirements refers to Usability, Reliability, Availability, Performance, Security,
Supportability, Interface.

6
1.5.2 USER INTERFACES:
This application include GUI standards or product family style guides that are to
be followed, screen layout constraints, buttons and functions that will appear on every
screen, error message display standards, and so on.

EXTERNAL INTERFACE REQUIREMENTS:

1.5.3 SOFTWARE REQUIREMENTS

 Android SDK

 Eclipse Ganymede IDE

 Operating System can be either of these- Windows XP, Windows 7, Windows 8


with different versions, Windows 10, etc.

1.5.4 HARDWARE REQUIREMENTS

1. PROCESSOR : (min) P4 processor

2. RAM : 1GB

3. Hard Disk : 20 GB
1.5.6 FEASIBILITYSTUDY
An important outcome of the preliminary investigation is the determination that system
requested is feasible. This is to identify the objectives of a new system. Before solving a problem
one must know what the problem is. The study is carried out by a small group of people who are
familiar with system analysis and design process. Fact finding techniques are used to gather the
required information.

The three major areas consider while determining the feasibility of the project are

1. Economic Feasibility
2. Operational Feasibility
3. Technical Feasibility

7
JAVA

Java is an object-oriented language, and is very similar to C++. Java is simplified to


eliminate language features that cause common programming errors. Java source code files are
compiled into a format called bytecode, which can then be executed by a Java
interpreter.Features being

1. PLATFORM INDEPENDENT

The programs written on one platform can run on any platform provided the platform
must have the JVM.

2. PORTABLE

The feature Write-once-run-anywhere makes the java language portable provided that the
system must have interpreter for the JVM.

3. SIMPLE

Programs are easy to write and debug because java does not use the pointers explicitly. It
also has the automatic memory allocation and deallocation system.

4. MULTITHREADED

Multithreading means a single program having different threads executing independently


at the same time.

5. ROBUST

Java has the strong memory allocation and automatic garbage collection mechanism. It
provides the powerful exception handling and type checking mechanism as compare to other
programming languages.

8
6. OBJECT ORIENTED

To be an Object Oriented language, any language must follow at least the four
characteristics.

 Inheritance
 Encapsulation
 Polymorphism
 Dynamic binding

7. DISTRIBUTED

The widely used protocols like HTTP and FTP are developed in java. Internet
programmers can call functions on these protocols and can get access to the files from any remote
machine on the internet rather than writing codes on their local system.

8. SECURE

All the programs in java run under an area known as the sand box. Security manager
determines the accessibility options of a class like reading and writing a file to the local disk.

9. HIGH PERFORMANCE

In the beginning interpretation of bytecode resulted in slow performance but the advance
version of JVM uses the adaptive and just in time compilation technique that improves the
performance.

10. INTEGRATED

Java is an interpreted language as well. Programs run directly from the source code.

9
PROJECT PERSPECTIVE

Android is a software stack for mobile devices that includes an operating system,
middleware and key applications. The Android SDK provides the tools and APIs necessary to
begin developing applications on the Android platform using the Java programming language.

The Android SDK includes a comprehensive set of development tools. Requirements


include Java Development Kit, the officially supported integrated development environment
(IDE) is Eclipse (3.2 or later) using the Android Development Tools (ADT) Plug in, though
developers may use any text editor to edit Java and XML

Files then use command line tools to create, build and debug Android applications. It
would be more cost effective if we can use normal phone numbers for receiving data from
customers via SMS. However it is a very tedious process if we don’t have backend automated
system to analyze the received data. We are proposing the below approach to make this process
cost effective as well as efficient.

ANDROID

Android is a software stack for mobile devices that includes an operating system,
middleware and key applications. The android SDK provides the tools and APIs necessary to
begin developing applications on the Android platform using the Java programming language.

The Android SDK includes a comprehensive set of development tools. These include a
debugger, libraries, a handset emulator (based on QEMU), documentation, sample code, and
tutorials. Currently supported development platforms include x86-architecture computers running
Linux (any modern desktop Linux distribution), Mac OS X 10.4.8 or later, Windows XP or Vista.
The officially supported integrated development environment (IDE) is Eclipse (3.2 or later) using
the Android Development Tools (ADT) Plugin, though developers may use any text editor to edit
Java and XML files then use command line tools to create, build and debug Android applications.

10
ABOUT NATIVE CODE:

Libraries written in C and other languages can be compiled to ARM native code and
installed, but the Native Development Kit is not yet officially supported by Google. Native
classes can be called from Java code running under the Dalvik VM using the System load Library
call, which is part of the standard Android Java classes.

USER DOCUMENTATION

In this user manual we are going to keep the information regarding our product, which
can be understandable by a new person who is going to use it. If a new person is using it, online
help will be provided in that. We are going to explain each and every step clearly about our
product so that any user can easily understand it.

CREATING AN ANDROID PROJECT

The ADT plug-in provides a New Project Wizard that you can use to quickly create a
new Android project (or a project from existing code). To create a new project:

 Select File > New > Project.

 Select Android > Android Project, and click Next.

 Select the contents for the project:

 Enter a Project Name. This will be the name of the folder where your project is
created.

 Under Contents, select Create new project in workspace. Select your project
workspace location.

11
 Under Target, select an Android target to be used as the project's Build Target.
The Build Target specifies which Android platform you'd like your application
built against.

 Unless you know that you'll be using new APIs introduced in the latest SDK,
you should select a target with the lowest platform version possible, such as
Android 1.1.

 Under Properties, fill in all necessary fields:

Enter an Application name. This is the human-readable title for your


application — the name that will appear on the Android device.

i. Enter a Package name. This is the package namespace (following the


same rules as for packages in the Java programming language) where all
your source code will reside.

ii. Select Create Activity (optional, of course, but common) and enter a
name for your main Activity class.

iii. Enter a minimum SDK Version. This is an integer that indicates the
minimum API Level required to properly run your application. Entering
this here automatically sets the minimum SDK Version attribute in the
<uses-sdk> of your Android Manifest file. If you're unsure of the
appropriate API Level to use, copy the API Level listed for the Build
Target you selected in the Target tab.

iv. Click Finish.

12
TO CREATE AN AVD WITH THE AVD MANAGER:

 Select Window > Android SDK and AVD Manager, or click the Android SDK
and AVD Manager icon (a black device) in the Eclipse toolbar.

 In the Virtual Devices panel, you'll see a list of existing AVDs. Click New to
create a new AVD.

 Fill in the details for the AVD.

 Give it a name, a platform target, an SD card image (optional), and a skin


(HVGA is default).

 Click Create AVD.

When you first run a project as an Android Application, ADT will automatically
create a run configuration. The default run configuration will launch the default project
Activity and use automatic target mode for device selection (with no preferred AVD).

TO CREATE OR MODIFY A LAUNCH CONFIGURATION

Follow these steps as appropriate for your Eclipse version:

 Open the run configuration manager.


 In Eclipse 3.3 ,select Run > Open Run Dialog (or Open Debug Dialog)
 In Eclipse 3.4 (Ganymede), select Run > Run Configurations (or Debug
Configurations)
 Expand the Android Application item and create a new configuration or open an
existing one.

SQLITE

SQLite is an ACID-compliant embeddedrelational database management system


contained in a relatively small C programming library. The source code for SQLite is in
the public domain.

13
DESIGN

Unlike client-server database management systems, the SQLite engine is not a


standalone process with which the application program communicates. Instead, the
SQLite library is linked in and thus becomes an integral part of the application program.
The library can also be called dynamically. The application program uses SQLite's
functionality through simple sms, which reduces latency in database access as function
sms within a single process are more efficient than inter-process communication.

FEATURES

SQLite implements most of the SQL-92 standard for SQL but it lacks some
features. A standalone program called sqlite3 is provided which can be used to create a
database, define tables within it, insert and change rows, run queries and manage a
SQLite database file. SQLite is a popular choice for local/client SQL storage within a web
browser and within a rich internet application framework. This may be because SQLite's
dynamically typed storage matches the web browser's core languages of JavaScript and
XML. SQLite uses an unusual type system for an SQL-compatible DBMS. Instead of
assigning a type to a column as in most SQL database systems, types are assigned to
individual values; in language terms it is dynamically typed.

1.6 IMPLEMENTATION
1.6.1.INTRODUCTION

Implementation is the most crucial stage in achieving a successful system and


giving the user’s confidence that the new system is workable and effective.
Implementation of the modified application to replace an existing one. This type of
conversation is relatively easy to handle, provide there are no major changes in the
system.

Each program is tested individually at the time of development using the data and has
verified that this program linked together in the way specified in the programs
specification, the computer system and its environment is tested to the satisfaction of the
user. The system that has been developed is accepted and proved to be satisfactory for the

14
user. And so the system is going to be implemented very soon. A simple operating
procedure is included so that the user can understand the different functions clearly and
quickly.

Initially as a first step the executable form of the application is to be created and loaded in
the common server machine which is accessible to all the user and the server is to be
connected to a network. The final stage is to document the entire system which provides
components and the operating procedures of the system.

1.6.2. DESIGN AND IMPLEMENTATION CONSTRAINTS

All modules are coded thoroughly based on requirements from software


organization. The software is designed in such a way that the user can easily interact with
the screen. Software is designed in such a way that it can be extended to the real time
business.

15
1.6.3 SCREEN SHOTS

Fig:1.2 Feedback Activity

16
Fig:1.3 Doctors Booking

17
Fig1.4 Doctors Homepage Activity

18
1.7 TESTING
1.7.1 SOFTWARE TESTING
Software testing is a critical element of software quality and assurance and represents
ultimate review of specifications, design and coding. Testing is an exposure of the system to trial
input to see whether it produces correct output.

1.7.2 TESTING PHASES


Software testing includes the following:

1. Test activities are determined and test data selected

2. The test is conducted and test results are compared with the expected results.

1.7.3. TESTING ACTIVITIES


1. INSPECTING COMPONENTS: This finds faults in the individual component through
the manual inspection of its source code.
2. UNIT TESTING: This find faults by isolating an individual component using test
stubs and drivers and by exercising the components using a test case.
3. INTEGRATION TESTING: This finds faults by integrating several components
together. System testing, which focuses on the complete system, its functional and
non-functional requirements and its target environment.
1.7.4 UNIT TESTING
Unit testing focuses on the building blocks of the software system, that is, objects and
subsystems. They are three motivations behind focusing on components. First, unit testing
reduces the complexity of the overall test activities, allowing us to focus on smaller units of the
system. Unit testing makes it easier to pinpoint and correct faults given that few computers are
involved in this test. Unit testing allows parallelism in the testing activities; that is each
component can be tested independently of one another

The specific candidates for unit testing are chosen from the object model and the
system decomposition of the system. In principle, all the objects developed during the
development process should be tested. Which is often not feasible because of time and budget?

19
1.7.5. EQUIALENCE TESTING
It is a black box testing technique that minimizes the number of test cases. The possible
inputs are partitioned into equivalence classes, and a test case is selected for each class. The
assumption of equivalence testing is that the system usually behaves in similar ways for all
members of a class. To test the behavior associated with an equivalence class, we only need to
test one member of the class. Equivalence testing consists of two steps: identification of the
equivalence classes and selection of the test inputs.

The following criteria are used for the equivalence testing:

1. COVERAGE:
Every possible input belongs to one of the equivalent classes.

2. DISJOINTEDNESS:
No input belongs to one of the equivalent classes.

3. REPRESENTATION:
If the execution demonstrates an error when a particular member of
an equivalence class is used as input, then the same error can be detected by
using any other member of the class as input.

1.7.5.1 BOUNDARY TESTING


Boundary testing is a special case of equivalence testing and focuses on the conditions at
the boundary of the equivalence classes. Rather than selecting any element in the equivalence
class, boundary testing requires that the element be selected from the “edges” of the equivalence
class.

A disadvantage of equivalence class and boundary testing is that these techniques do not
explore combination of test input data.

1.7.5.2. PATH TESTING


Path testing is a white box testing technique that identifies faults in the implementation of
the component. The assumption behind path is that, by exercising all possible paths through the
code at least once, most faults will trigger failures. The identification of paths requires
knowledge of the source code and data structures.

20
The path testing technique was developed for imperative languages. Object oriented
language introduce several difficulties when using path testing.

POLYMORPHISM:

Polymorphism enables messages to be bound to different methods bases on the class of


the target. Although this enables developers to reuse code across a large number of classes, it is
also introducing more cases to test.

1. SHORTER METHODS:
Methods in object-oriented language have the tendency to be shorter then procedures and
functions in imperative languages. This decreases the likelihood of control flow faults, which can
be uncovered using the path testing technique.

1.7.5.3. STATE BASED TESTING


Object oriented languages introduce the opportunity for new types of faults in object-
oriented systems.

State based testing is a recent testing technique, which focuses on object-oriented


systems. Most testing technique which focuses on selecting a number of test inputs for a given
state of the system, exercising a component or a system, and comparing the observed outputs
with java. State based testing focuses on comparing the resulting state of the system with the
expected state. In the context of a class, state-based testing consists of deriving test cases from
the UML state chart diagram for the class.

1.7.6. INTEGRATION TESTING


It detects faults that have not been detected during unit testing, by focusing on small
group of components.

1.7.7. TEST CASE DESIGN

The design of tests for software and other engineering products can be as challenging as
the initial design of the product. Test case methods provide the developer with a systematic
approach to testing. Moreover, these methods provide a mechanism that can help to ensure the
completeness of tests and provide the highest like hood for uncovering errors in software.

21
Any Engineered product can be tested in either of the two ways:

1. Knowing the specified function that a product has been designed to perform, tests
can be conducted. These tests demonstrate whether each function is fully
operational and at the same time searches for errors in each function.
2. Knowing the internal workings of a product, tests can be conducted to ensure that
internal operations are performed according to specifications and all internal
components hence been adequately exercised.
Test case design methods are divided into two types:

1. White-box testing
2. Black-box testing
1.7.7.1 WHITE-BOX TESTING
White –box testing, sometimes called glass-box testing is a test, case designed method
that uses the control structure of the procedural design to derive test cases. Using white-box
testing methods, the s/w engineer can derive test cases that guarantee that all independent paths
within a module have been exercised at least once. Exercise all logical decisions on their true and
false sides. Execute all loops at their boundaries and within their operational bounds. Exercise
internal data structures to ensure their validity.

Basis path testing is a white-box testing technique. The basis path method enables the test
case designer to derive a logical complexity measure of a procedural design and use this measure
as a guide for defining a basis set are guaranteed to exercise every statement in the program at
least one time during testing.

1.7.7.2. BLACK-BOX TESTING


Black-box testing ,also called behavioral testing, focuses on the functional requirements
of the s/w. Black-box testing enables the software engineer to derive sets of input conditions that
will fully exercise all functional requirements of a program. It is a complementary approach that
is likely to uncover a different class of errors that white-box methods could not.

Black-box testing attempted to find errors in the following categories.

 Incorrect or missing functions.


 Interface errors.
22
 Errors in data structures or external data base access.
 Behavior or performance errors.
 Initialization and termination errors.

Black-box testing purposely disregards control structure; attention is focused on


information domain. By applying black-box techniques, we derive a set of cases that satisfies the
criteria test cases that reduce, by a count that is greater than one, the number of additional test
cases that must be designed to achieve reasonable testing. Test cases that tell us something about
the presence or absence of classes of errors, rather than an error associated only with the
specified.

1.8 RESULTS:
At the end of this application it is a sophisticated approach for users to have a best selection
and gives better performance for Administrator so that he can easily add, update and view
packages details. This initiative of making travel plan in online made more enjoyable and easier
than the real world of making a travel plan. This is convenient to the customers to view their trip
details. There is also a facility for the customer to check the status of their selected package.

23
CHAPTER – 2

ANALYSIS

2.1 SURVEY ON DREAM COMPANY:


Amazon.com, Inc., doing business as Amazon is an American electronic commerce and
cloud computing company based in Seattle, Washington, that was founded by Jeff Bezos on July
5, 1994. The tech giant is the largest Internet retailer in the world as measured by revenue and
market capitalization, and second largest after Ali baba Group in terms of total sales. The
amazon.com website started as an online bookstore and later diversified to sell video
downloads/streaming, MP3 downloads/streaming, audio book downloads/streaming, software,
video games, electronics, apparel, furniture, food, toys, and jewelry. The company products
available at its website include several media (books, DVDs, music CDs, videotapes and
software), apparel, baby products, consumer electronics, beauty products, gourmet food,
groceries, health and personal-care items, industrial & scientific supplies, kitchen items, jewelry,
watches, lawn and garden items, musical instruments, sporting goods, tools, automotive items
and toys & games and it is the world's largest provider of cloud infrastructure services (IaaS and
PaaS). Amazon also sells certain low-end products under its in-house brand Amazon
Basics.some products and services available in amazon are Amazon Fresh,Amazon
prime,Amazon Web Services,Alexa,Amazon Drive,Echo,Kindle,Fire Tablets,Fire Tv,Kindle
Store,Amazon Studios.
Amazon has separate retail websites for the United States, the United Kingdom and
Ireland, France, Canada, Germany, Italy, Spain, Netherlands, Australia, Brazil, Japan, China,
India, Mexico, Singapore, and Turkey. In 2016, Dutch, Polish, and Turkish language versions of
the German Amazon website were also launched. Amazon also offers international shipping of
some of its products to certain other countries.
In 2015, Amazon surpassed Walmart as the most valuable retailer in the United States by
market capitalization. Amazon is the second most valuable public company in the world (behind
only Apple), the largest Internet company by revenue in the world, and after Walmart, the second
largest employer in the United States. In 2017, Amazon acquired Whole Foods Market for $13.4
billion, which vastly increased Amazon's presence as a brick-and-mortar retailer. The acquisition
was interpreted by some as a direct attempt to challenge Walmart's traditional retail stores. In
2018, for the first time, Jeff Bezos released in Amazon's shareholder letter the number of
Amazon Prime subscribers, which is 100 million worldwide. On September 4, 2018, Amazon
reached US$1 trillion in value, becoming the second publicly traded US company to do so after
Apple.

24
2.2 SURVEY ON CURRENT PROJECT IN DREAM COMPANY:

ARTIFICIAL INTELLIGENCE

2.2.1.Amazon Lex:

Amazon Lex is a service for building conversational interfaces into any application using
voice and text. Amazon Lex provides the advanced deep learning functionalities of automatic
speech recognition (ASR) for converting speech to text, and natural language understanding
(NLU) to recognize the intent of the text, to enable you to build applications with highly
engaging user experiences and lifelike conversational interactions. With Amazon Lex, the same
deep learning technologies that power Amazon Alexa are now available to any developer,
enabling you to quickly and easily build sophisticated, natural language, conversational bots
(“chatbots”).amazon Lex uses the same technology as Amazon Alexa to provide advanced deep
learning functionalities of automatic speech recognition (ASR) and natural language
understanding (NLU) to enable you to build applications with conversational interfaces,
commonly called chatbots.

Speech recognition and natural language understanding are some of the most challenging
problems to solve in computer science, requiring sophisticated deep learning algorithms to be
trained on massive amounts of data and infrastructure. Amazon Lex democratizes these deep
learning technologies by putting the power of Amazon Alexa within reach of all developers.
Harnessing these technologies, Amazon Lex enables you to define entirely new categories of
products made possible through conversational interfaces.As a fully managed service, Amazon
Lex scales automatically, so you don’t need to worry about managing infrastructure. With
Amazon Lex, you pay only for what you use. There are no upfront commitments or minimum
fees.

Benefits:

Easy to Use:

Amazon Lex provides an easy-to-use console to guide you through the process of
creating your own chatbot in minutes, building conversational interfaces into your applications.
You supply just a few example phrases and Amazon Lex builds a complete natural language
model through which your user can interact using voice and text, to ask questions, get answers,
and complete sophisticated tasks.
25
Seamlessly Deploy and Scale:

With Amazon Lex, you can build, test, and deploy your chatbots directly from the
Amazon Lex console. Amazon Lex enables you to easily publish your voice or text chatbots to
mobile devices, web apps, and chat services such as Facebook Messenger, Slack, Kik, and
Twilio SMS. Once published, your Amazon Lex bot processes voice or text input in conversation
with your end-users. Amazon Lex is a fully managed service so as your user engagement
increases, you don’t need to worry about provisioning hardware and managing infrastructure to
power your bot experience.

Built-in Integration with the AWS Platform:

Amazon Lex provides built-in integration with AWS Lambda, AWS MobileHub and
Amazon CloudWatch and you can easily integrate with many other services on the AWS
platform including Amazon Cognito, and Amazon DynamoDB. You can take advantage of the
power of the AWS platform for security, monitoring, user authentication, business logic, storage
and mobile app development.

Cost Effective:

With Amazon Lex, there are no upfront costs or minimum fees. You are only charged for
the text or speech requests that are made. Amazon Lex’ pay-as-you-go pricing and low cost per
request make it a cost-effective way to build conversational interfaces anywhere. With the
Amazon Lex free tier, you can easily try Amazon Lex without any initial investment.

Use Cases

Call Center Bots:

By using an Amazon Lex chatbot in your Amazon Connect call center, callers can
perform tasks such as changing a password, requesting a balance on an account, or scheduling an
appointment, without needing to speak to an agent. These chatbots use automatic speech
recognition and natural language understanding to recognize the intent of the caller. They are
able to recognize human speech at an optimal (8 kHz) telephony audio sampling rate, and
understand the caller’s intent without requiring the caller to speak in specific phrases. Amazon
Lex uses AWS Lambda functions to query your business applications, provide information back
26
to callers, and make updates as requested. Amazon Lex chatbots also maintain context and
manage the dialogue, dynamically adjusting responses based on the conversation.Use an
Amazon Lex chatbot for natural conversations in your Amazon Connect contact center diagram
Lex Connect appointment-reschedule.

Informational Bots:

You can use Amazon Lex to build chatbots for everyday consumer requests, such as
accessing the latest news updates, game scores, or weather. After you build your Amazon Lex
bot, you can deploy them on mobile devices, chat services, and IoT devices, with support for rich
message formatting.

OhioHealth:Excited about utilizing evolving speech recognition and natural language processing
technology to enhance the lives of our customers. Amazon Lex represents a great opportunity for
us to deliver a better experience to our patients. Everything we do at OhioHealth is ultimately
about providing the right care to our patients at the right time and in the right place. Amazon
Lex’s next generation technology and the innovative applications we are developing using it will
help provide an improved customer experience. We are just scratching the surface of what is
possible.

Application Bots:

Amazon Lex’s high-quality speech recognition and natural language understanding


capabilities make it possible to build powerful interfaces to mobile applications. You can add a
voice or text chat interface to create bots on mobile devices that can help customers with many
basic tasks, such as accessing their bank account, booking tickets, ordering food, or calling a cab.
Amazon Lex integrates with Amazon Cognito so you can control user management,
authentication, and sync across all devices.

Capital One:For Capital One as a heavy user of AWS, Amazon Lex’s seamless integration with
other AWS services like AWS Lambda and Amazon DynamoDB is really appealing. A highly
scalable solution, Amazon Lex also offers the potential to speed time to market for a new
generation of voice and text interactions such as our recently launched Capital One skill for
Alexa.

Enterprise Productivity Bots:

You can use Amazon Lex to build enterprise chatbots that streamline common work
activities and improve organizational efficiencies. For example, employees can check sales data
from Salesforce, marketing performance from HubSpot, and customer service status from

27
Zendesk, directly from their chatbots within minutes. With Amazon Lex, you can build your bots
to connect to a variety of enterprise productivity tools through AWS Lambda functions.

Hub Spot: HubSpot's GrowthBot is an all-in-one chatbot which helps marketers and sales
people be more productive by providing access to relevant data and services using a
conversational interface. With GrowthBot, marketers can get help creating content, researching
competitors, and monitoring their analytics. Through Amazon Lex, we're adding sophisticated
natural language processing capabilities that helps GrowthBot provide a more intuitive UI for
our users. Amazon Lex lets us take advantage of advanced AI and machine learning without
having to code the algorithms ourselves.

Internet of Things (IoT):

With Amazon Lex, you can build highly interactive and conversational user experiences
for connected devices in the rapidly growing segment of Internet of Things (IoT). This creates
opportunities for entirely new categories of conversational products in a variety of markets –
from cars and devices, to wearables and appliances.

Use Amazon Lex bots as a vehicle for teaching and exploration

NASA:To inspire the next generation of explorers, NASA reaches out to students in schools,
community organizations, and public events. A star robotic ambassador is “Rov-E,” a close
replica of real NASA Mars rovers. Through Amazon Lex, NASA staff can now easily navigate
Rov-E via voice commands -- an effective conversational interface when speaking with large
crowds. Multi-turn dialog management capability enables Rov-E "to talk,” answering students’
questions about Mars in an engaging way. Integration with AWS services allows Rov-E to
connect and scale with various data sources to retrieve NASA’s Mars exploration information.

2.2.2.Amazon Rekognition

Amazon Rekognition makes it easy to add image and video analysis to your applications.
You just provide an image or video to the Rekognition API, and the service can identify the
objects, people, text, scenes, and activities, as well as detect any inappropriate content. Amazon
Rekognition also provides highly accurate facial analysis and facial recognition on images and
video that you provide. You can detect, analyze, and compare faces for a wide variety of user
verification, people counting, and public safety use cases.

Amazon Rekognition is based on the same proven, highly scalable, deep learning
technology developed by Amazon’s computer vision scientists to analyze billions of images and
videos daily, and requires no machine learning expertise to use. Amazon Rekognition is a simple
and easy to use API that can quickly analyze any image or video file stored in Amazon S3.

28
Amazon Rekognition is always learning from new data, and we are continually adding new
labels and facial recognition features to the service.

Benefits:

Simple integration:

Amazon Rekognition makes it easy to add visual analysis features to your application
with easy to use APIs that don't require any machine learning expertise.

Continually learning:

The service is continually trained on new data to expand its ability to recognize objects,
scenes, and activities to improve its ability to accurately recognize.

Fully managed:

Amazon Rekognition provides consistent response times regardless of the volume of


requests you make. Your application latency remains consistent, even as your request volume
increases to tens of millions of requests.

Batch & real-time analysis:

You can run real-time analysis on video from Amazon Kinesis Video Streams, analyze
images as they are uploaded to Amazon S3. For large jobs, use AWS Batch to analyze thousands
of images or videos.

Low cost :

With Amazon Rekognition, you only pay for the number of images, or minutes of video, you
analyze and the face data you store for facial recognition. There are no minimum fees or upfront
commitments.

Security & identity:

You can easily integrate face-based user verification into new or existing applications. This is a
simple process that requires the use of just one API.

29
KEY FEATURES

Object, scene, and activity detection:

With Amazon Rekognition, you can identify thousands of objects (e.g. bike, telephone,
building) and scenes (e.g. parking lot, beach, city). When analyzing video, you can also identify
specific activities happening in the frame, such as "delivering a package" or "playing soccer".

Facial recognition:

Rekognition’s fast and accurate search capability allows you to identify a person in a
photo or video using your private repository of face images.

Facial analysis:

You can analyze the attributes of faces in images and videos you provide to determine
things like happiness, age range, eyes open, glasses, facial hair, etc. In video, you can also
measure how these things change over time, such as constructing a timeline of the emotions of
an actor.

Pathing:

You can capture the path of people in the scene when using Amazon Rekognition with
video files. For example, you can use the movement of athletes during a game to identify plays
for post-game analysis.

Celebrity recognition:

You can quickly identify well known people in your video and image libraries to catalog
footage and photos for marketing, advertising, and media industry use cases.

Unsafe content detection:

Amazon Rekognition helps you identify potentially unsafe or inappropriate content


across both image and video assets and provides you with detailed labels that allow you to
accurately control what you want to allow based on your needs.

Text in images:

Specifically built to work with real world images, Rekognition can detect and recognize
text from images, such as street names, captions, product names, and license plates.

30
Rekognition Video Use Cases

Immediate response for public safety and security:

Amazon Rekognition Video allows you to create applications that help find missing
persons in social media video content. By recognizing their faces against a database of missing
persons that you provide, you can accurately flag matches and speed up a rescue operation.

Example: Finding Missing Persons on Social Media

Searchable video library:

Amazon Rekognition Video automatically generates metadata from uploaded videos so


you can create a search index for names of celebrities and their time of appearance. You can
keep the index current by using AWS Lambda functions to automatically add new video labels to
the search index when a new video is uploaded in Amazon S3. Then you can use this index with
Amazon Elastic Search Service to quickly locate video content.

Example: Celebrity Detection in User Submitted Content

Detect unsafe video:

Amazon Rekognition Video allows organizations managing user-generated content, such


as social media or dating apps, to automatically detect explicit or suggestive content in videos
and create their own rules around what is appropriate for the culture and demographics of their
users.

Example: Filtering User Generated Content

Rekognition image use cases

Searchable image library:

Amazon Rekognition makes images searchable so you can discover objects and scenes
that appear within them. You can create an AWS Lambda function that automatically adds newly
detected image labels directly into an Elasticsearch search index when a new image is uploaded
into S3.

Example: Real Estate Property Search

31
Image moderation:

Amazon Rekognition allows you to automatically detect inappropriate content in images


using the Image Moderation API. The API returns a confidence score for a detailed set of content
categories, which allows you to create your own rules around what is appropriate for the culture
and demographics of your users.

Example: Moderating User Uploaded Images

Sentiment analysis:

Amazon Rekognition can detect emotions like happy, sad, or surprised from facial
images. Rekognition can analyze live images, and send the emotion attributes to Redshift for
periodic reporting on trends for each store location.

Example: Retail Store Sentiment Analysis

Facial recognition:

Amazon Rekognition makes it easy to search your image collection for similar faces by
storing face metadata, using the IndexFaces API function. You can then use the SearchFaces
function to return high confidence matches. A face collection is an index of faces, that you own
and manage.

Example: Find Images of Friends

Celebrity recognition:

Amazon Rekognition's Recognize Celebrities API uses neural network-based models to


allow you to search photo libraries to automatically identify thousands of individuals who are
famous, noteworthy, or prominent in their field with high scale and high accuracy. You can then
send the celebrity’s name, id, and image id, into an Amazon Elastic search search index to make
the images searchable for celebrities.

Example: Searching for Celebrity Images in Image Archives

.2.3 SKILL DEMAND IN DREAM COMPANY:

Artificial intelligence and machine learning as broader skills offer an opportunity to a


variety of tech talent is the current skill demand in Amazon. The e-commerce juggernaut draws
many of its staffers from the nearby University of Washington in Seattle, and 83% of its
employees hold bachelor’s degrees. More than half (57%) know Java, and 45% are skilled in
software development. Surprisingly for the company that powers so many websites with AWS,
less than a quarter (21%) are knowledgeable in web services and Artificial intelligence and
machine learning.
32
Amazon AI team is looking for a Machine Learning Engineer to join in science and data
engineering team in the area of speech and Natural Language Processing (NLP).Candidates
should also be very agile in developing flexible software with respect to scientific, experimental
methods and usage patterns. Additional responsibilities include:
 ·Designing, developing and maintaining core system features, services, and engines
 · Helping define product features, drive the system architecture, and spearhead the best
practices that enable a quality product
 · Working with scientists and other engineers to investigate design approaches, prototype
new technology, and evaluate the technical feasibility.

The Basic Qualifications:


 Degree in Computer Science, Computer Engineering, or related field
 · Solid background in algorithms, data structures, and object-oriented programming.
 · Basic understanding of machine learning fundamentals.
 · Solid knowledge in Natural Language Processing.
 · Strong programming skills in at least one object-oriented programming language (Python,
Java, Scala, C++, etc.)
 · Eager to learn new algorithms, new application areas, and new tools.

 Excellent communication and organizational skills.

33
CHAPTER-3

PLATFORM/LANGUAGE/FRAMEWORK/TOOLS

3.1. HISTORY

The term Internet of Things was first used by Kevin Ashton in 1999.Which Refers to
uniquely identifiable objects (things) and their virtual representations in an Internet-like structure.

Internet -The world wise network of interconnected computer networks.


Thing - An object not precisely identifiable.
Internet of Things -A world-wide network of interconnected objects uniquely addressable, based
on standard communication protocol.
The definition of the Internet of things has evolved due to convergence of multiple
technologies, real-time analytics, machine learning, commodity sensors, and embedded
systems,,wireless sensors networks,control systems,automation(including home and building
automation),and others all contribute to enabling the internet of things.The concept of a network
of smart devices was discussed as early as 1982, with a modified Coke machine at Carnegie
Mellon University becoming the first Internet-connected appliance, able to report its inventory
and whether newly loaded drinks were cold. Mark Weiser's 1991 paper on ubiquitous computing,
"The Computer of the 21st Century", as well as academic venues such as UbiComp and PerCom
produced the contemporary vision of IoT. In 1994, Reza Raji described the concept in IEEE
Spectrum as "[moving] small packets of data to a large set of nodes, so as to integrate and
automate everything from home appliances to entire factories". Between 1993 and 1997, several
companies proposed solutions like Microsoft's at Work or Novell's NEST. The field gained
momentum when Bill Joy envisioned Device to Device (D2D) communication as part of his "Six
Webs" framework, presented at the World Economic Forum at Davos in 1999.
The term "Internet of things" was likely coined by Kevin Ashton of Procter & Gamble,
later MIT's Auto-ID Center, in 1999, though he prefers the phrase "Internet for things". At that
point, he viewed Radio-frequency identification (RFID) as essential to the Internet of things,
which would allow computers to manage all individual things.
A research article mentioning the Internet of Things was submitted to the conference for
Nordic Researchers in Logistics, Norway, in June 2002,which was preceded by an article
published in Finnish in January 2002.The implementation described there was developed by
Kary Famling and his team at Helsinki University of Technology and more closely matches the
modern one, i.e. an information system infrastructure for implementing smart, connected objects.

34
Defining the Internet of Things as "simply the point in time when more 'things or objects' were
connected to the Internet than people", Cisco Systems estimated that IoT was "born" between
2008 and 2009, with the things/people ratio growing from 0.08 in 2003 to 1.84 in 2010.

The Internet of Things (IoT) has not been around for very long. However, there have
been visions of machines communicating with one another since the early 1800s. Machines have
been providing direct communications since the telegraph (the first landline) was developed in
the 1830s and 1840s. Described as “wireless telegraphy,” the first radio voice transmission took
place on June 3, 1900, providing another necessary component for developing the Internet of
Things. The development of computers began in the 1950s.The Internet, itself a significant
component of the IoT, started out as part of DARPA (Defense Advanced Research Projects
Agency) in 1962, and evolved into ARPANET in 1969. In the 1980s, commercial service
providers began supporting public use of ARPANET, allowing it to evolve into our modern
Internet. Global Positioning Satellites (GPS) became a reality in early 1993, with the Department
of Defense providing a stable, highly functional system of 24 satellites. This was quickly
followed by privately owned, commercial satellites being placed in orbit. Satellites and landlines
provide basic communications for much of the IoT.

3.2 INTRODUCTION

IoT is a network in which all physical objects are connected to the internet through
network devices or routers and exchange data. IoT allows objects to be controlled remotely
across existing network infrastructure. IoT is a very good and intelligent technique which
reduces human effort as well as easy access to physical devices. This technique also has
autonomous control feature by which any device can control without any human
interaction.Internet application development demand is very high. So IoT is a major
technology by which we can produce various useful internet applications.
“Things” in the IoT sense, is the mixture of hardware, software, data, and services.
“Things” can refer to a wide variety of devices such as DNA analysis devices for environmental
monitoring, electric clamps in coastal waters, Arduino chips in home automation and many
other. These devices gather useful data with the help of various existing technologies and share
that data between other devices. Examples include Home Automation System which uses Wi-Fi
or Bluetooth for exchange data between various devices of home.

35
Fig.3.1:working of IoT

WORKING OF IOT DEVICE:

 COLLECTION

Devices and Sensors are collecting data everywhere.

Eg:At your Home,In your car,At the office,In the manufacturing plant

 COMMUNICATION

Sending data and events through networks to some destination.

Eg: A cloud platform,Private data center,Home network

 ANALYSIS

Creating information from the data.

Eg: Visualizing the data,Building reports,Filtering data(pairing it down)

 ACTION

36
Taking action based on the information and data.

Eg:Communicate with another machine(m2m),Sent a notification (sms,email,text)

Talk to another system.

3.3. FEATURES

It’s a concept that not only has the potential to impact how we live but also how we work.
Say your car have access to your calendar and already know the best route to take for your
upcoming meeting? If the traffic is heavy the car might send a text to others notifying them that
you will be late. There are more than 12 billion connected devices in the world, smart ‘things’.
Innovative companies are adopting IoT strategy and technology to rethink their products and
services and redefine their relationships with customers, employees and partners.

The Internet started with a simple idea – connecting computers together to share data in
various ways. Since that humble beginning, people have started to connect more devices to the
Internet. That’s the basis of the term Internet of Things (IoT). The Internet of Things extends
internet connectivity beyond traditional devices like desktop and laptop computers, smartphones
and tablets to an ever-growing network of everyday things that utilize embedded technology to
communicate and interact with the external environment, all via the Internet. It’s the inter-
networking of physical devices (“connected devices” and “smart devices”) that enable these
objects to collect and exchange data.

Evolution of IoT:This diagram, which can be summarised as an "any time, anywhere, any
thing" type of definition for IoT.

Fig.3.2:Type of definition for IoT

37
Shortly afterwards, Amazon Web Services (AWS) was launched, and IaaS
(infrastructure-as-a-service) provided a convenient way to massively scale projects. With
maturing XaaS (X as-a-service) options it became clear that IoT can make use of cloud services
for more realisable solutions. IoE (Internet of Everything) treats IoT as one building block, and
combines it with additional data sources (such as mapping, public databases, search engines) and
uses this to provide higher quality information for decision making (i.e. a transformation from
raw sensor data to more intelligence). It also connects people more closely to the IoT; using
smartphones/tablets/wearables as an example. This allows for P2P (people-to-people) and P2M
(people-to-machine) communication that too can scale massively. Analytics, ways to manage
and monitor events or responses, databases and other middleware flesh out the architecture to
make it work together.

Fig.3.3:process of connection

Customer Privacy

As sensors and video cameras become more common place, especially in public spaces,
consumers have less and less knowledge about the information being collected, and no way to
avoid it.Many people are uncomfortable with the idea of companies collecting information about
them, and even more uncomfortable having that information sold to anyone and everyone.

38
Generally speaking, older people dislike having information about themselves collected more
than younger people, but according to one survey, about 45% of “all” respondents did not trust
companies to use the data they collected to protect their privacy.

Currently, choices regarding privacy are very black and white, or on/off. The customer is
forced to give up all privacy, (often in an agreement so convoluted people don’t bother to plow
through it) or the customer simply cannot access the service. This has led to continuing
discussions about consumer privacy and how to best educate consumers regarding privacy and
the accessibility of data.

Security

While there are steps to take to help ensure security, it should come as no surprise this
issue has become a significant concern with the growth of the IoT. Literally billions of devices
are being interconnected together, making it possible (eventually) for someone to hack into your
coffee maker, and then access your entire network. The Internet of Things also makes businesses
all around the world more open to security threats. Additionally, data sharing and privacy
becomes issues when using the Internet of Things. Consider how concerns will grow when
billions of devices are interconnected. Some businesses will be faced with storing the massive
amounts of information these devices will be producing. They will need to find a method of
securely storing the data, while still being able to access, track, and analyze the huge amounts of
it being generated.

James Lewis, who is a cybersecurity researcher for the Center for Strategic and
International Studies, has written a report describing how the Internet of Things’
interconnections will allow computer hackers to wreak havoc through interconnected devices.
The threat is so real, even the Federal Trade Commission has gotten involved, wanting to know
how to guarantee privacy, and how security safeguards are being installed in new Internet-
connected devices. For example, new cars can now be hijacked by way of their Wi-Fi
connections. Consider the threat of hackers when automated driving becomes popular. Security
and risk management should not be taken lightly when creating new ways to use the Internet of
Things.

39
Fig.3.4:Features of IoT

3.4 BASIC CONCEPTS

Application protocols

1. coAP:Constrained Application Protocol is specifically designed for constrained (limited)


Hardware. The hardware that doesn’t support HTTP or TCP/IP can use CoAP Protocol. So,
basically the designers of this protocol taking inspiration by the HTTP had designed the CoAP
protocol using UDP and IP protocol. It is a lightweight protocol that needs low power IOT
application like for communication between battery powered IOT devices. Like HTTP, it also
follows client-server model. The clients can GET, PUT, DELETE or POST informational
resources over the network.

40
Fig.3.5:CoAP Architecture

2. XMPP:

Extensible Messaging and Presence Protocol (XMPP) is an XML based messaging


protocol. XML is a mark up language for encoding documents which are both human readable as
well as machine readable. XML evolved to extend HTML and allow addition of custom tags and
elements to the web. As an extension of HTML, it allows structuring of data along with
extensionality. Traditionally, XMPP has been used for real time communication like instant
messaging, presence, multi-party chat, voice and video calls, collaboration, content syndication
etc.

3.5 APPLICATIONS OF IOT:

The extensive set of applications for IoT devices is often divided into consumer,
commercial, industrial, and infrastructure spaces.

41
Consumer applications

A growing portion of IoT devices are created for consumer use, including connected
vehicles, home automation/smart home, wearable technology, connected health, and appliances
with remote monitoring capabilities.

 Smart home

IoT devices are a part of the larger concept of home automation, which can include
lighting, heating and air conditioning, media and security systems. Long term benefits could
include energy savings by automatically ensuring lights and electronics are turned off.

A smart home or automated home could be based on a platform or hubs that control smart
devices and appliances. For instance, using Apple's HomeKit, manufacturers can get their home
products and accessories be controlled by an application in iOS devices such as the iPhone and
the Apple Watch. This could be a dedicated app or iOS native applications such as Siri. This can
be demonstrated in the case of Lenovo's Smart Home Essentials, which is a line of smart home
devices that are controlled through Apple's Home app or Siri without the need for a Wi-Fi
bridge. There are also dedicated smart home hubs that are offered as standalone platforms to
connect different smart home products and these include the Amazon Echo, Apple's HomePod,
and Samsung's SmartThings Hub.

 Elder care

One key application of smart home is to provide assistance for those with disabilities and
elderly individuals. These home systems utilize assistive technology to accommodate an owner's
specific disabilities. Voice control can assist users with sight and mobility limitations while alert
systems can be connected directly to Cochlear implants worn by hearing impaired users. They
can also be equipped with additional safety features. These features can include sensors that
monitor for medical emergencies such as falls or seizures. Smart home technology applied in this
way can provide users with more freedom and a higher quality of life. The term "Enterprise IoT"
refers to devices used in business and corporate settings. By 2019, it is estimated that IoT will
account for 9.1 billion devices.

Commercial applications

 Medical and healthcare

The futurologist’s vision seems to be that soon you will share your exercise levels, heart rate,
activity, and other essential data accumulated by your mobile device with your doctor. “More

42
and more care will be delivered outside hospitals and clinics”, “This means mobile devices –
from smart phones to monitoring devices – will become increasingly important as the number of
patients cared for at home or in sheltered accommodation or other community centers
increases.”[46] IoT devices can be used to enable remote health monitoring and emergency
notification systems. These health monitoring devices can range from blood pressure and heart
rate monitors to advanced devices capable of monitoring specialized implants, such as
pacemakers, Fit bit electronic wristbands, or advanced hearing aids. Some hospitals have begun
implementing "smart beds" that can detect when they are occupied and when a patient is
attempting to get up. It can also adjust itself to ensure appropriate pressure and support is applied
to the patient without the manual interaction of nurses. A 2015 Goldman Sachs report indicated
that health care IoT devices "can save the United States more than $300 billion in annual health
care expenditures by increasing revenue and decreasing cost." Recent contributions even refer to
IoT solutions for medicine as the Internet of Medical Things.

Sensors can also be equipped within living spaces to monitor the health and general well-
being of senior citizens, while also ensuring that proper treatment is being administered and
assisting people regain lost mobility via therapy as well. Other consumer devices to encourage
healthy living, such as connected scales or wearable heart monitors, are also a possibility with
the IoT. End-to-end health monitoring IoT platforms are also available for antenatal and chronic
patients, helping one manage health vitals and recurring medication requirements.

The Research & Development Corporation (DEKA), a company that creates prosthetic limbs,
has created a battery-powered arm that uses my electricity, a device that converts muscle group
sensations into motor control. The arm is nicknamed Luke Arm after Luke Skywalker (Star
Wars).

 Transportation

The IoT can assist in the integration of communications, control, and information
processing across various transportation systems. Application of the IoT extends to all aspects of
transportation systems (i.e. the vehicle, the infrastructure, and the driver or user). Dynamic
interaction between these components of a transport system enables inter and intra vehicular
communication, smart traffic control, smart parking, electronic toll collection systems, logistic
and fleet management, vehicle control, and safety and road assistance. In Logistics and Fleet
Management for example, The IoT platform can continuously monitor the location and
conditions of cargo and assets via wireless sensors and send specific alerts when management
exceptions occur (delays, damages, thefts, etc.). If combined with Machine Learning then it also
helps in reducing traffic accidents by introducing drowsiness alerts to drivers and providing self-
driven cars too.

43
 Building and home automation

IoT devices can be used to monitor and control the mechanical, electrical and electronic
systems used in various types of buildings (e.g., public and private, industrial, institutions, or
residential) in home automation and building automation systems. In this context, three main
areas are being covered in literature:

1.The integration of the Internet with building energy management systems in order to create
energy efficient and IOT driven “smart buildings”.

2. The possible means of real-time monitoring for reducing energy consumption and
monitoring occupant behaviours.

3.The integration of smart devices in the built environment and how they might to know who
to be used in future applications.

Industrial applications

 Manufacturing

The IoT can realize the seamless integration of various manufacturing devices equipped with
sensing, identification, processing, communication, actuation, and networking capabilities. Based
on such a highly integrated smart cyberphysical space, it opens the door to create whole new
business and market opportunities for manufacturing. Network control and management of
manufacturing equipment, asset and situation management, or manufacturing process control
bring the IoT within the realm of industrial applications and smart manufacturing as well. The
IoT intelligent systems enable rapid manufacturing of new products, dynamic response to
product demands, and real-time optimization of manufacturing production and supply chain
networks, by networking machinery, sensors and control systems together.

44
Fig.3.6:Design architecture of cyber-physical system-enabled manufacturing system

Digital control systems to automate process controls, operator tools and service
information systems to optimize plant safety and security are within the purview of the IoT. But
it also extends itself to asset management via predictive maintenance, statistical evaluation, and
measurements to maximize reliability. Smart industrial management systems can also be
integrated with the Smart Grid, thereby enabling real-time energy optimization. Measurements,
automated controls, plant optimization, health and safety management, and other functions are
provided by a large number of networked sensors.

The term industrial Internet of things (IIoT) is often encountered in the manufacturing
industries, referring to the industrial subset of the IoT. IIoT in manufacturing could generate so
much business value that it will eventually lead to the fourth industrial revolution, so the so-
called Industry 4.0. It is estimated that in the future, successful companies will be able to
increase their revenue through Internet of things by creating new business models and improve
productivity, exploit analytics for innovation, and transform workforce. The potential of growth
by implementing IIoT will generate $12 trillion of global GDP by 2030.

While connectivity and data acquisition are imperative for IIoT, they should not be the
purpose, rather the foundation and path to something bigger. Among all the technologies,
predictive maintenance is probably a relatively "easier win" since it is applicable to existing
assets and management systems. The objective of intelligent maintenance systems is to reduce
unexpected downtime and increase productivity. And to realize that alone would generate around
up to 30% over the total maintenance costs. Industrial big data analytics will play a vital role in
manufacturing asset predictive maintenance, although that is not the only capability of industrial
45
big data. Cyber-physical systems (CPS) is the core technology of industrial big data and it will
be an interface between human and the cyber world. Cyber-physical systems can be designed by
following the 5C (connection, conversion, cyber, cognition, configuration) architecture, and it
will transform the collected data into actionable information, and eventually interfere with the
physical assets to optimize processes.

An IoT-enabled intelligent system of such cases was proposed in 2001 and later
demonstrated in 2014 by the National Science Foundation Industry/University Collaborative
Research Center for Intelligent Maintenance Systems (IMS) at the University of Cincinnati on a
bandsaw machine in IMTS 2014 in Chicago. Bandsaw machines are not necessarily expensive,
but the bandsaw belt expenses are enormous since they degrade much faster. However, without
sensing and intelligent analytics, it can be only determined by experience when the band saw belt
will actually break. The developed prognostics system will be able to recognize and monitor the
degradation of band saw belts even if the condition is changing, advising users when is the best
time to replace the belt. This will significantly improve user experience and operator safety and
ultimately save on costs. Please see intelligent maintenance system for more reference.

 Agriculture

There are numerous IoT applications in farming such as collecting data on temperature,
rainfall, humidity, wind speed, pest infestation, and soil content. This data can be used to
automate farming techniques, take informed decisions to improve quality and quantity, minimize
risk and waste, and reduce effort required to manage crops. For example, farmers can now
monitor soil temperature and moisture from afar, and even apply IoT-acquired data to precision
fertilization programs.

In August 2018, Toyota Tsusho began a partnership with Microsoft to create fish farming
tools using the Microsoft Azure application suite for IoT technologies related to water
management. Developed in part by researchers from Kindai University, the water pump
mechanisms use artificial intelligence to count the number of fish on a conveyor belt, analyze the
number of fish, and deduce the effectiveness of water flow from the data the fish provide. The
specific computer programs used in the process fall under the Azure Machine Learning and the
Azure IoT Hub platforms.

Infrastructure applications

Monitoring and controlling operations of sustainable urban and rural infrastructures like
bridges, railway tracks, on- and offshore- wind-farms is a key application of the IoT. The IoT
infrastructure can be used for monitoring any events or changes in structural conditions that can
compromise safety and increase risk. IoT can benefit the construction industry by cost saving,
time reduction, better quality workday, paperless workflow and increase in productivity. It can
46
help in taking faster decisions and save money with Real-Time Data Analytics. It can also be
used for scheduling repair and maintenance activities in an efficient manner, by coordinating
tasks between different service providers and users of these facilities. IoT devices can also be
used to control critical infrastructure like bridges to provide access to ships. Usage of IoT
devices for monitoring and operating infrastructure is likely to improve incident management
and emergency response coordination, and quality of service, up-times and reduce costs of
operation in all infrastructure related areas. Even areas such as waste management can benefit
from automation and optimization that could be brought in by the IoT.

 Metropolitan scale deployments

There are several planned or ongoing large-scale deployments of the IoT, to enable better
management of cities and systems. For example, Songdo, South Korea, the first of its kind fully
equipped and wired smart city, is gradually being built, with approximately 70 percent of the
business district completed as of June 2018. Much of the city is planned to be wired and
automated, with little or no human intervention.

Another application is a currently undergoing project in Santander, Spain. For this


deployment, two approaches have been adopted. This city of 180,000 inhabitants has already
seen 18,000 downloads of its city smartphone app. The app is connected to 10,000 sensors that
enable services like parking search, environmental monitoring, digital city agenda, and more.
City context information is used in this deployment so as to benefit merchants through a spark
deals mechanism based on city behavior that aims at maximizing the impact of each notification.

Other examples of large-scale deployments underway include the Sino-Singapore


Guangzhou Knowledge City; work on improving air and water quality, reducing noise pollution,
and increasing transportation efficiency in San Jose, California; and smart traffic management in
western Singapore. French company, Sigfox, commenced building an ultra-narrowband wireless
data network in the San Francisco Bay Area in 2014, the first business to achieve such a
deployment in the U.S. It subsequently announced it would set up a total of 4000 base stations to
cover a total of 30 cities in the U.S. by the end of 2016, making it the largest IoT network
coverage provider in the country thus far.

Another example of a large deployment is the one completed by New York Waterways in
New York City to connect all the city's vessels and be able to monitor them live 24/7. The
network was designed and engineered by Fluidmesh Networks, a Chicago-based company
developing wireless networks for critical applications. The NYWW network is currently
providing coverage on the Hudson River, East River, and Upper New York Bay. With the
wireless network in place, NY Waterway is able to take control of its fleet and passengers in a
way that was not previously possible. New applications can include security, energy and fleet
management, digital signage, public Wi-Fi, paperless ticketing and others.

47
 Energy management

Significant numbers of energy-consuming devices (e.g. switches, power outlets, bulbs,


televisions, etc.) already integrate Internet connectivity, which can allow them to communicate
with utilities to balance power generation and energy usage and optimize energy consumption as
a whole. These devices allow for remote control by users, or central management via a cloud-
based interface, and enable functions like scheduling (e.g., remotely powering on or off heating
systems, controlling ovens, changing lighting conditions etc.). The Smart grid is a utility-side
IoT application; systems gather and act on energy and power-related information to improve the
efficiency of the production and distribution of electricity. Using advanced metering
infrastructure (AMI) Internet-connected devices, electric utilities not only collect data from end-
users, but also manage distribution automation devices like transformers.

 Environmental monitoring

Environmental monitoring applications of the IoT typically use sensors to assist in


environmental protection by monitoring air or water quality, atmospheric or soil conditions, and
can even include areas like monitoring the movements of wildlife and their habitats.
Development of resource-constrained devices connected to the Internet also means that other
applications like earthquake or tsunami early-warning systems can also be used by emergency
services to provide more effective aid. IoT devices in this application typically span a large
geographic area and can also be mobile. It has been argued that the standardization IoT brings to
wireless sensing will revolutionize this area.

3.6. FUTURE SCOPE

SCOPE AND BENEFITS OF IoT:

It’s the technology of today which is touching and transforming the every aspect of our
real life. IOT has given a concept of Machine to-Machine (M2M) communication. Companies
like Microsoft and SAP are implementing strategy to capitalize on the Internet of Things so that
you can just stop your business and starts making it thrive. IOT is going to have huge impact on
home automation and building automation system where every convenience will be taken care of
by the interconnected devices on IOT. It is also deployed on large scale for example in Song do ,
South Africa , the first of its own kind fully equipped and wired smart city is near to completion (
known as Ubiquitous City). With the personal electronics good connected to Internet will enable
us to “author” our lives. In medical science field, IOT has given a privilege to devices and
system to sense for coming disease and to prevent it ,for eg: It can make a person healthier with
wearables that can predict heart attack and cardiovascular strokes. As per a report of The suns
48
daily, consumers will start initiating the usage of IoT in a better way during 2015 and onwards
compared to past usage. It is expected that IoT products with interoperable capability will
dominate the market. Awareness of IoT products is also vital for market penetration along with
security features. Even very few Americans are aware of the usage of these products. As per a
study of Consumer Electronics Association and Parks Associates found only 10% of the
household in USA fully understood the usage of these products. Many interesting IoT products
like automatic door locks, Wi-Fi connected ceiling fans, light switches,LED bulbs, smart
watches,3-D printers and smart clothes will be popular among consumers. My Brain Technology
in France has developed "Melomind". This EEG Headset can measure a human's brain waves
and adjust music in a Smartphone app as they change. This product can be used as a digital
meditation aid. A smart baby pacifier can measure the temperature of a baby and transmit the
same to the Smartphone of parents.

IoT is proved to be an emerging technological innovation. In the current context, it is


now possible that an helmet of a two wheeler can interact with a car for avoiding collision.
Connected toothbrush can now monitor and make one's experience pleasurable .A three
dimensional senor of the electric brush can connect with Smartphone apps and provide real time
feedback to the person .

Many scopes will be created for technology companies to release offerings as per the
behaviour of consumers. It may so happen that Netflix can know when a person is sad and alone
by monitoring the smart watch, smart thermostat and in-home camera. Subsequently, Netflix
may offer a movie to change the mood[12]. In a consumer electronics show in Los Vegas,
Samsung informed that the company would invest 100 million dollar for progress of IoT. The
company will also promote an open technology ecosystem for facilitating the usage of IoT.

Future of the IoT:

IOT is believed to change the entire way people communicate, work and live. Now there
will be connectivity for everyone, everything and everywhere. It is going to have an influential
impact on how the businesses and government interact with the world.

According to NASSCOM, the global market size of IOT is expected to touch USD 3
trillion by 2020. In this landscape, startups are playing the biggest role in enabling IOT services
in the consumer as well as the industrial segment. In India, there are more than 60 percent start-
ups working on the lines of IOT with their highly technical and technological skills.

IOT proves to have a huge scope as it provides a unique opportunity for businesses to
turn data into insights. There are a number of contributing factors as well that drive the adoption
of IOT such as improved sensors, device connections, the evolution of lifestyle and mobility.
These factors alone will drive the adoption of IOT in India. By 2020, India’s IOT market is
49
expected to reach by USD 15 billion as per NASSCOM’s report. To provide an improved
internet experience, many companies and start-ups have emerged as big players in the IOT
market. In India, nearly 120 companies and 70 % start-ups are offering IOT enabled solutions.
From 2015 till now, around 60 USD million has been invested in IOT which has given birth to a
new way of working and living.

If we talk about IOT applications in an organized manner, these are broadly divided into
Industrial and Consumer segments. The industrial segment covers industrial and retail
automation which largely contributes to the development of smart cities. On the other hand, the
consumer segment is mainly driven by personal interest and covers smart lifestyle, home, health
& fitness automation. Likewise, enterprises and consumers using IOT solutions will be
complementing the IOT growth in our country.

The shift towards IOT will result in more improved and efficient businesses. Use of IOT
enabled devices will make enterprises adopt better technology in their businesses. Several
industry experts and analysts have predicted IOT as one of the essential strengths of every
business sector by 2020.

From Logistic industry to IT industry, IOT will have a crucial role to play in the
development of these sectors. Adoption of IOT will help businesses in saving costs at greater
margins. There will also be an exponential drop in the expenses of manufacturing,
administration, and selling of goods. All these factors contribute to an IOT enabled supply chain.
This will bring out more opportunities for retailers and wholesale giants to have simplified
business operations.

50
CHAPTER-4

CONCLUSION

During the internship period , a lot of experience , knowledge and exposure that I have
handy awakened me in a boast of self-confidence to face life more challenging now. Practical is
a complement to the science and theory learned. This is clearly the concept of science and
mcharity, where they have learned without practice will be lost and will not give anything-what
effect.so if we do without the knowledge ,of course, there will be problem in terms of grip and
stance ever-changing.

During my Industrial training, there are many changes from the point of learning
environments and discussion among colleagues.It can directly increase the dedication and
rational attitude towards myself.

IoT is going to dominate the next decade in the mobile ecosystem, with all the supporting
data access projects around it, is going to be the centre of all.

However there are still some weakness that can be improved in the future.Therefore I
conclude that the industrial training has provided many benefits to me even if there are minor
flaws that are somewhat disfiguring conditions so that this weakness can be rectified in the
future.

51

You might also like