Professional Documents
Culture Documents
This report describes the internship I had spent in Electronics Corporation of India
Limited,Hyderabad. They are a fledgling company dedicated to offerings service in the field of
IT consulting, Internet Of Things, application development. They strive to make a difference in
their offerings by ensuring that quality and punctuality are imbibed in anything and everything
they do. The ECIL also help the interns in training and also organizes internship programs for
those are interested to do. ECIL is an innovative hub providing career consultation and solution.
They passionate about creating solutions to the real life Problems .The incentive of this intern is
to help engineering Students to transform their technical ideas into reality by bridging the gap
between the theoretical and practical conception. ECIL guarantees fast, adaptable,
straightforward ,reliable, brilliant administration. I chose Android Application development.
An Android app is a software application running on the Android platform. Because the
Android platform is built for mobile devices, a typical Android app is designed for a smartphone
or a tablet PC running on the Android OS. Although an Android app can be made available by
developers through their websites, most Android apps are uploaded and published on the
Android Market, an online store dedicated to these applications. The Android Market features
both free and priced apps.
Android apps are written in the Java programming language and use Java core libraries.
They are first compiled to Dalvik executables to run on the Dalvik virtual machine, which is a
virtual machine specially designed for mobile devices.
Developers may download the Android software development kit (SDK) from the
Android website. The SDK includes tools, sample code and relevant documents for creating
Android apps.
Novice developers who simply want to play around with Android programming can make
use of the App Inventor. Using this online application, a user can construct an Android app as if
putting together pieces of a puzzle.
iii
LIST OF FIGURES
iii
LIST OF ABBREVIATION
GND - Ground
Iaas - Infrastructure-as-a-service
Xaas- x as-a-service
v
TABLE OF CONTENT
Abstract iii
List of figure iv
List of Abbreviation v
1 INTERNSHIP 1
1.6 Implementation 14
1.7 Testing 18
1.8 Results 22
2 ANALYSIS 23
TOOLS 34
3.1 History 35
3.2 Introduction 36
3.3 Features 37
3.5 Applications 48
4 CONCLUSION 50
CHAPTER – 1
INTERNSHIP
Supervised Learning : The computer is presented with example inputs and their desired outputs,
given by a "teacher", and the goal is to learn a general rule that maps inputs to outputs. As
special cases, the input signal can be only partially available, or restricted to special feedback:
Semi-supervised learning: the computer is given only an incomplete training signal. a training set
with some (often many) of the target outputs missing.
Active learning: the computer can only obtain training labels for a limited set of instances (based
on a budget), and also has to optimize its choice of objects to acquire labels for. When used
interactively, these can be presented to the user for labelling.
1
Reinforcement learning: training data (in form of rewards and punishments) is given only as
feedback to the program's actions in a dynamic environment, such as driving a vehicle or playing
a game against an opponent.
Unsupervised learning: No labels are given to the learning algorithm, leaving it on its own to find
structure in its input. Unsupervised learning can be a goal in itself (discovering hidden patterns in
data) or a means towards an end (feature learning).
TYPES OF INTERNSHIPS :
Paid Internships: Paid internships are common in professional fields including medicine,
architecture, science, engineering, law, business (especially accounting and finance), technology,
and advertising. Work experience internships usually occur during the second or third year of
schooling. This type of internship is to expand an intern's knowledge both in their school studies
and also at the company. The intern is expected to bring ideas and knowledge from school into
the company.
Work research, virtual research (graduation) or dissertation: This is mostly done by students
who are in their final year of school. With this kind of internship, a student does research for a
particular company. The company can have something that they feel they need to improve, or the
student can choose a topic within the company themselves. The results of the research study will
be put in a report and often will have to be presented.
Unpaid internships:Unpaid internships are typically through non-profit charities and think tanks
which often have unpaid or volunteer positions.
Partially-paid internships: Partially-paid internships is when students are paid in the form of a
stipend. Stipends are typically a fixed amount of money that is paid out on a regular basis.
Usually, interns that are paid with stipends are paid on a set schedule associated with the
organization.
Another type of internship growing in popularity is the virtual internship, in which the intern
works remotely, and is not physically present at the job location. It provides the capacity to gain
job experience without the conventional requirement of being physically present in an office. The
internship is conducted via virtual means, such as phone, email, and web communication. Virtual
interns generally have the opportunity to work at their own pace.
2
1.2 ABSTRACT ON INTERNSHIP ATTENDED:
Patient Management System helps to maintain total patients in the Hospital. Patient
records management system is a comprehensive patient care related clinical information system
meant for doctors to enable quick review of previous medical history of patients and provide
better quality treatment to the patients.
To meet a solution to manage dental students records across hospital of government of India for
Hospital Management Information System in 29 state.To overcome existing problems occurring
in maintains of students information
The system will be used in any Hospital ,Clinic , Pathology labs in any Hospital clinic
.Pathology labs to get the information from the patients and then storing the data for future
usage
The current system in use is a Paper based system .it is too slow and can’t provide updated
lists of patients with in a recommended timespan
3
1.3 CERTIFICATE BY THE COMPANY:
4
1.4 INTRODUCTION TO THE PROJECT
In literature survey we look into the details about the existing system and we
try to reduce the disadvantages of the existing system. We try to improve the
performance and the efficiency of the new system.
1.4.3 MODULES
1. Registration Module
2. Out Patient Scheduling Module
3. In patient Monitoring Module
4. Patient feedback
5. Admin Module
1.4.4 ANALYSIS
In this phase the requirements are gathered and analysed. Users requirements are gathered
in this phase. This phase is the main focus of the administrators and registered
accounts. Meetings with users and registered people are held in order to determine the
requirements like: Who is going to use the system? How will they use the system? What data
should be input into the system? What data should be output by the system? These are general
questions that get answered during a requirements gathering phase. After requirement gathering
these requirements are analysed for their validity and the possibility of incorporating the
requirements in the system to be development is also studied.
The software requirements specification specifies the functional requirements and non-
functional requirements. Functional requirements refers to how the system is going to react
according to the input provided and how it is going to behave in particular situations and non-
functional requirements refers to Usability, Reliability, Availability, Performance, Security,
Supportability, Interface.
6
1.5.2 USER INTERFACES:
This application include GUI standards or product family style guides that are to
be followed, screen layout constraints, buttons and functions that will appear on every
screen, error message display standards, and so on.
Android SDK
2. RAM : 1GB
3. Hard Disk : 20 GB
1.5.6 FEASIBILITYSTUDY
An important outcome of the preliminary investigation is the determination that system
requested is feasible. This is to identify the objectives of a new system. Before solving a problem
one must know what the problem is. The study is carried out by a small group of people who are
familiar with system analysis and design process. Fact finding techniques are used to gather the
required information.
The three major areas consider while determining the feasibility of the project are
1. Economic Feasibility
2. Operational Feasibility
3. Technical Feasibility
7
JAVA
1. PLATFORM INDEPENDENT
The programs written on one platform can run on any platform provided the platform
must have the JVM.
2. PORTABLE
The feature Write-once-run-anywhere makes the java language portable provided that the
system must have interpreter for the JVM.
3. SIMPLE
Programs are easy to write and debug because java does not use the pointers explicitly. It
also has the automatic memory allocation and deallocation system.
4. MULTITHREADED
5. ROBUST
Java has the strong memory allocation and automatic garbage collection mechanism. It
provides the powerful exception handling and type checking mechanism as compare to other
programming languages.
8
6. OBJECT ORIENTED
To be an Object Oriented language, any language must follow at least the four
characteristics.
Inheritance
Encapsulation
Polymorphism
Dynamic binding
7. DISTRIBUTED
The widely used protocols like HTTP and FTP are developed in java. Internet
programmers can call functions on these protocols and can get access to the files from any remote
machine on the internet rather than writing codes on their local system.
8. SECURE
All the programs in java run under an area known as the sand box. Security manager
determines the accessibility options of a class like reading and writing a file to the local disk.
9. HIGH PERFORMANCE
In the beginning interpretation of bytecode resulted in slow performance but the advance
version of JVM uses the adaptive and just in time compilation technique that improves the
performance.
10. INTEGRATED
Java is an interpreted language as well. Programs run directly from the source code.
9
PROJECT PERSPECTIVE
Android is a software stack for mobile devices that includes an operating system,
middleware and key applications. The Android SDK provides the tools and APIs necessary to
begin developing applications on the Android platform using the Java programming language.
Files then use command line tools to create, build and debug Android applications. It
would be more cost effective if we can use normal phone numbers for receiving data from
customers via SMS. However it is a very tedious process if we don’t have backend automated
system to analyze the received data. We are proposing the below approach to make this process
cost effective as well as efficient.
ANDROID
Android is a software stack for mobile devices that includes an operating system,
middleware and key applications. The android SDK provides the tools and APIs necessary to
begin developing applications on the Android platform using the Java programming language.
The Android SDK includes a comprehensive set of development tools. These include a
debugger, libraries, a handset emulator (based on QEMU), documentation, sample code, and
tutorials. Currently supported development platforms include x86-architecture computers running
Linux (any modern desktop Linux distribution), Mac OS X 10.4.8 or later, Windows XP or Vista.
The officially supported integrated development environment (IDE) is Eclipse (3.2 or later) using
the Android Development Tools (ADT) Plugin, though developers may use any text editor to edit
Java and XML files then use command line tools to create, build and debug Android applications.
10
ABOUT NATIVE CODE:
Libraries written in C and other languages can be compiled to ARM native code and
installed, but the Native Development Kit is not yet officially supported by Google. Native
classes can be called from Java code running under the Dalvik VM using the System load Library
call, which is part of the standard Android Java classes.
USER DOCUMENTATION
In this user manual we are going to keep the information regarding our product, which
can be understandable by a new person who is going to use it. If a new person is using it, online
help will be provided in that. We are going to explain each and every step clearly about our
product so that any user can easily understand it.
The ADT plug-in provides a New Project Wizard that you can use to quickly create a
new Android project (or a project from existing code). To create a new project:
Enter a Project Name. This will be the name of the folder where your project is
created.
Under Contents, select Create new project in workspace. Select your project
workspace location.
11
Under Target, select an Android target to be used as the project's Build Target.
The Build Target specifies which Android platform you'd like your application
built against.
Unless you know that you'll be using new APIs introduced in the latest SDK,
you should select a target with the lowest platform version possible, such as
Android 1.1.
ii. Select Create Activity (optional, of course, but common) and enter a
name for your main Activity class.
iii. Enter a minimum SDK Version. This is an integer that indicates the
minimum API Level required to properly run your application. Entering
this here automatically sets the minimum SDK Version attribute in the
<uses-sdk> of your Android Manifest file. If you're unsure of the
appropriate API Level to use, copy the API Level listed for the Build
Target you selected in the Target tab.
12
TO CREATE AN AVD WITH THE AVD MANAGER:
Select Window > Android SDK and AVD Manager, or click the Android SDK
and AVD Manager icon (a black device) in the Eclipse toolbar.
In the Virtual Devices panel, you'll see a list of existing AVDs. Click New to
create a new AVD.
When you first run a project as an Android Application, ADT will automatically
create a run configuration. The default run configuration will launch the default project
Activity and use automatic target mode for device selection (with no preferred AVD).
SQLITE
13
DESIGN
FEATURES
SQLite implements most of the SQL-92 standard for SQL but it lacks some
features. A standalone program called sqlite3 is provided which can be used to create a
database, define tables within it, insert and change rows, run queries and manage a
SQLite database file. SQLite is a popular choice for local/client SQL storage within a web
browser and within a rich internet application framework. This may be because SQLite's
dynamically typed storage matches the web browser's core languages of JavaScript and
XML. SQLite uses an unusual type system for an SQL-compatible DBMS. Instead of
assigning a type to a column as in most SQL database systems, types are assigned to
individual values; in language terms it is dynamically typed.
1.6 IMPLEMENTATION
1.6.1.INTRODUCTION
Each program is tested individually at the time of development using the data and has
verified that this program linked together in the way specified in the programs
specification, the computer system and its environment is tested to the satisfaction of the
user. The system that has been developed is accepted and proved to be satisfactory for the
14
user. And so the system is going to be implemented very soon. A simple operating
procedure is included so that the user can understand the different functions clearly and
quickly.
Initially as a first step the executable form of the application is to be created and loaded in
the common server machine which is accessible to all the user and the server is to be
connected to a network. The final stage is to document the entire system which provides
components and the operating procedures of the system.
15
1.6.3 SCREEN SHOTS
16
Fig:1.3 Doctors Booking
17
Fig1.4 Doctors Homepage Activity
18
1.7 TESTING
1.7.1 SOFTWARE TESTING
Software testing is a critical element of software quality and assurance and represents
ultimate review of specifications, design and coding. Testing is an exposure of the system to trial
input to see whether it produces correct output.
2. The test is conducted and test results are compared with the expected results.
The specific candidates for unit testing are chosen from the object model and the
system decomposition of the system. In principle, all the objects developed during the
development process should be tested. Which is often not feasible because of time and budget?
19
1.7.5. EQUIALENCE TESTING
It is a black box testing technique that minimizes the number of test cases. The possible
inputs are partitioned into equivalence classes, and a test case is selected for each class. The
assumption of equivalence testing is that the system usually behaves in similar ways for all
members of a class. To test the behavior associated with an equivalence class, we only need to
test one member of the class. Equivalence testing consists of two steps: identification of the
equivalence classes and selection of the test inputs.
1. COVERAGE:
Every possible input belongs to one of the equivalent classes.
2. DISJOINTEDNESS:
No input belongs to one of the equivalent classes.
3. REPRESENTATION:
If the execution demonstrates an error when a particular member of
an equivalence class is used as input, then the same error can be detected by
using any other member of the class as input.
A disadvantage of equivalence class and boundary testing is that these techniques do not
explore combination of test input data.
20
The path testing technique was developed for imperative languages. Object oriented
language introduce several difficulties when using path testing.
POLYMORPHISM:
1. SHORTER METHODS:
Methods in object-oriented language have the tendency to be shorter then procedures and
functions in imperative languages. This decreases the likelihood of control flow faults, which can
be uncovered using the path testing technique.
The design of tests for software and other engineering products can be as challenging as
the initial design of the product. Test case methods provide the developer with a systematic
approach to testing. Moreover, these methods provide a mechanism that can help to ensure the
completeness of tests and provide the highest like hood for uncovering errors in software.
21
Any Engineered product can be tested in either of the two ways:
1. Knowing the specified function that a product has been designed to perform, tests
can be conducted. These tests demonstrate whether each function is fully
operational and at the same time searches for errors in each function.
2. Knowing the internal workings of a product, tests can be conducted to ensure that
internal operations are performed according to specifications and all internal
components hence been adequately exercised.
Test case design methods are divided into two types:
1. White-box testing
2. Black-box testing
1.7.7.1 WHITE-BOX TESTING
White –box testing, sometimes called glass-box testing is a test, case designed method
that uses the control structure of the procedural design to derive test cases. Using white-box
testing methods, the s/w engineer can derive test cases that guarantee that all independent paths
within a module have been exercised at least once. Exercise all logical decisions on their true and
false sides. Execute all loops at their boundaries and within their operational bounds. Exercise
internal data structures to ensure their validity.
Basis path testing is a white-box testing technique. The basis path method enables the test
case designer to derive a logical complexity measure of a procedural design and use this measure
as a guide for defining a basis set are guaranteed to exercise every statement in the program at
least one time during testing.
1.8 RESULTS:
At the end of this application it is a sophisticated approach for users to have a best selection
and gives better performance for Administrator so that he can easily add, update and view
packages details. This initiative of making travel plan in online made more enjoyable and easier
than the real world of making a travel plan. This is convenient to the customers to view their trip
details. There is also a facility for the customer to check the status of their selected package.
23
CHAPTER – 2
ANALYSIS
24
2.2 SURVEY ON CURRENT PROJECT IN DREAM COMPANY:
ARTIFICIAL INTELLIGENCE
2.2.1.Amazon Lex:
Amazon Lex is a service for building conversational interfaces into any application using
voice and text. Amazon Lex provides the advanced deep learning functionalities of automatic
speech recognition (ASR) for converting speech to text, and natural language understanding
(NLU) to recognize the intent of the text, to enable you to build applications with highly
engaging user experiences and lifelike conversational interactions. With Amazon Lex, the same
deep learning technologies that power Amazon Alexa are now available to any developer,
enabling you to quickly and easily build sophisticated, natural language, conversational bots
(“chatbots”).amazon Lex uses the same technology as Amazon Alexa to provide advanced deep
learning functionalities of automatic speech recognition (ASR) and natural language
understanding (NLU) to enable you to build applications with conversational interfaces,
commonly called chatbots.
Speech recognition and natural language understanding are some of the most challenging
problems to solve in computer science, requiring sophisticated deep learning algorithms to be
trained on massive amounts of data and infrastructure. Amazon Lex democratizes these deep
learning technologies by putting the power of Amazon Alexa within reach of all developers.
Harnessing these technologies, Amazon Lex enables you to define entirely new categories of
products made possible through conversational interfaces.As a fully managed service, Amazon
Lex scales automatically, so you don’t need to worry about managing infrastructure. With
Amazon Lex, you pay only for what you use. There are no upfront commitments or minimum
fees.
Benefits:
Easy to Use:
Amazon Lex provides an easy-to-use console to guide you through the process of
creating your own chatbot in minutes, building conversational interfaces into your applications.
You supply just a few example phrases and Amazon Lex builds a complete natural language
model through which your user can interact using voice and text, to ask questions, get answers,
and complete sophisticated tasks.
25
Seamlessly Deploy and Scale:
With Amazon Lex, you can build, test, and deploy your chatbots directly from the
Amazon Lex console. Amazon Lex enables you to easily publish your voice or text chatbots to
mobile devices, web apps, and chat services such as Facebook Messenger, Slack, Kik, and
Twilio SMS. Once published, your Amazon Lex bot processes voice or text input in conversation
with your end-users. Amazon Lex is a fully managed service so as your user engagement
increases, you don’t need to worry about provisioning hardware and managing infrastructure to
power your bot experience.
Amazon Lex provides built-in integration with AWS Lambda, AWS MobileHub and
Amazon CloudWatch and you can easily integrate with many other services on the AWS
platform including Amazon Cognito, and Amazon DynamoDB. You can take advantage of the
power of the AWS platform for security, monitoring, user authentication, business logic, storage
and mobile app development.
Cost Effective:
With Amazon Lex, there are no upfront costs or minimum fees. You are only charged for
the text or speech requests that are made. Amazon Lex’ pay-as-you-go pricing and low cost per
request make it a cost-effective way to build conversational interfaces anywhere. With the
Amazon Lex free tier, you can easily try Amazon Lex without any initial investment.
Use Cases
By using an Amazon Lex chatbot in your Amazon Connect call center, callers can
perform tasks such as changing a password, requesting a balance on an account, or scheduling an
appointment, without needing to speak to an agent. These chatbots use automatic speech
recognition and natural language understanding to recognize the intent of the caller. They are
able to recognize human speech at an optimal (8 kHz) telephony audio sampling rate, and
understand the caller’s intent without requiring the caller to speak in specific phrases. Amazon
Lex uses AWS Lambda functions to query your business applications, provide information back
26
to callers, and make updates as requested. Amazon Lex chatbots also maintain context and
manage the dialogue, dynamically adjusting responses based on the conversation.Use an
Amazon Lex chatbot for natural conversations in your Amazon Connect contact center diagram
Lex Connect appointment-reschedule.
Informational Bots:
You can use Amazon Lex to build chatbots for everyday consumer requests, such as
accessing the latest news updates, game scores, or weather. After you build your Amazon Lex
bot, you can deploy them on mobile devices, chat services, and IoT devices, with support for rich
message formatting.
OhioHealth:Excited about utilizing evolving speech recognition and natural language processing
technology to enhance the lives of our customers. Amazon Lex represents a great opportunity for
us to deliver a better experience to our patients. Everything we do at OhioHealth is ultimately
about providing the right care to our patients at the right time and in the right place. Amazon
Lex’s next generation technology and the innovative applications we are developing using it will
help provide an improved customer experience. We are just scratching the surface of what is
possible.
Application Bots:
Capital One:For Capital One as a heavy user of AWS, Amazon Lex’s seamless integration with
other AWS services like AWS Lambda and Amazon DynamoDB is really appealing. A highly
scalable solution, Amazon Lex also offers the potential to speed time to market for a new
generation of voice and text interactions such as our recently launched Capital One skill for
Alexa.
You can use Amazon Lex to build enterprise chatbots that streamline common work
activities and improve organizational efficiencies. For example, employees can check sales data
from Salesforce, marketing performance from HubSpot, and customer service status from
27
Zendesk, directly from their chatbots within minutes. With Amazon Lex, you can build your bots
to connect to a variety of enterprise productivity tools through AWS Lambda functions.
Hub Spot: HubSpot's GrowthBot is an all-in-one chatbot which helps marketers and sales
people be more productive by providing access to relevant data and services using a
conversational interface. With GrowthBot, marketers can get help creating content, researching
competitors, and monitoring their analytics. Through Amazon Lex, we're adding sophisticated
natural language processing capabilities that helps GrowthBot provide a more intuitive UI for
our users. Amazon Lex lets us take advantage of advanced AI and machine learning without
having to code the algorithms ourselves.
With Amazon Lex, you can build highly interactive and conversational user experiences
for connected devices in the rapidly growing segment of Internet of Things (IoT). This creates
opportunities for entirely new categories of conversational products in a variety of markets –
from cars and devices, to wearables and appliances.
NASA:To inspire the next generation of explorers, NASA reaches out to students in schools,
community organizations, and public events. A star robotic ambassador is “Rov-E,” a close
replica of real NASA Mars rovers. Through Amazon Lex, NASA staff can now easily navigate
Rov-E via voice commands -- an effective conversational interface when speaking with large
crowds. Multi-turn dialog management capability enables Rov-E "to talk,” answering students’
questions about Mars in an engaging way. Integration with AWS services allows Rov-E to
connect and scale with various data sources to retrieve NASA’s Mars exploration information.
2.2.2.Amazon Rekognition
Amazon Rekognition makes it easy to add image and video analysis to your applications.
You just provide an image or video to the Rekognition API, and the service can identify the
objects, people, text, scenes, and activities, as well as detect any inappropriate content. Amazon
Rekognition also provides highly accurate facial analysis and facial recognition on images and
video that you provide. You can detect, analyze, and compare faces for a wide variety of user
verification, people counting, and public safety use cases.
Amazon Rekognition is based on the same proven, highly scalable, deep learning
technology developed by Amazon’s computer vision scientists to analyze billions of images and
videos daily, and requires no machine learning expertise to use. Amazon Rekognition is a simple
and easy to use API that can quickly analyze any image or video file stored in Amazon S3.
28
Amazon Rekognition is always learning from new data, and we are continually adding new
labels and facial recognition features to the service.
Benefits:
Simple integration:
Amazon Rekognition makes it easy to add visual analysis features to your application
with easy to use APIs that don't require any machine learning expertise.
Continually learning:
The service is continually trained on new data to expand its ability to recognize objects,
scenes, and activities to improve its ability to accurately recognize.
Fully managed:
You can run real-time analysis on video from Amazon Kinesis Video Streams, analyze
images as they are uploaded to Amazon S3. For large jobs, use AWS Batch to analyze thousands
of images or videos.
Low cost :
With Amazon Rekognition, you only pay for the number of images, or minutes of video, you
analyze and the face data you store for facial recognition. There are no minimum fees or upfront
commitments.
You can easily integrate face-based user verification into new or existing applications. This is a
simple process that requires the use of just one API.
29
KEY FEATURES
With Amazon Rekognition, you can identify thousands of objects (e.g. bike, telephone,
building) and scenes (e.g. parking lot, beach, city). When analyzing video, you can also identify
specific activities happening in the frame, such as "delivering a package" or "playing soccer".
Facial recognition:
Rekognition’s fast and accurate search capability allows you to identify a person in a
photo or video using your private repository of face images.
Facial analysis:
You can analyze the attributes of faces in images and videos you provide to determine
things like happiness, age range, eyes open, glasses, facial hair, etc. In video, you can also
measure how these things change over time, such as constructing a timeline of the emotions of
an actor.
Pathing:
You can capture the path of people in the scene when using Amazon Rekognition with
video files. For example, you can use the movement of athletes during a game to identify plays
for post-game analysis.
Celebrity recognition:
You can quickly identify well known people in your video and image libraries to catalog
footage and photos for marketing, advertising, and media industry use cases.
Text in images:
Specifically built to work with real world images, Rekognition can detect and recognize
text from images, such as street names, captions, product names, and license plates.
30
Rekognition Video Use Cases
Amazon Rekognition Video allows you to create applications that help find missing
persons in social media video content. By recognizing their faces against a database of missing
persons that you provide, you can accurately flag matches and speed up a rescue operation.
Amazon Rekognition makes images searchable so you can discover objects and scenes
that appear within them. You can create an AWS Lambda function that automatically adds newly
detected image labels directly into an Elasticsearch search index when a new image is uploaded
into S3.
31
Image moderation:
Sentiment analysis:
Amazon Rekognition can detect emotions like happy, sad, or surprised from facial
images. Rekognition can analyze live images, and send the emotion attributes to Redshift for
periodic reporting on trends for each store location.
Facial recognition:
Amazon Rekognition makes it easy to search your image collection for similar faces by
storing face metadata, using the IndexFaces API function. You can then use the SearchFaces
function to return high confidence matches. A face collection is an index of faces, that you own
and manage.
Celebrity recognition:
33
CHAPTER-3
PLATFORM/LANGUAGE/FRAMEWORK/TOOLS
3.1. HISTORY
The term Internet of Things was first used by Kevin Ashton in 1999.Which Refers to
uniquely identifiable objects (things) and their virtual representations in an Internet-like structure.
34
Defining the Internet of Things as "simply the point in time when more 'things or objects' were
connected to the Internet than people", Cisco Systems estimated that IoT was "born" between
2008 and 2009, with the things/people ratio growing from 0.08 in 2003 to 1.84 in 2010.
The Internet of Things (IoT) has not been around for very long. However, there have
been visions of machines communicating with one another since the early 1800s. Machines have
been providing direct communications since the telegraph (the first landline) was developed in
the 1830s and 1840s. Described as “wireless telegraphy,” the first radio voice transmission took
place on June 3, 1900, providing another necessary component for developing the Internet of
Things. The development of computers began in the 1950s.The Internet, itself a significant
component of the IoT, started out as part of DARPA (Defense Advanced Research Projects
Agency) in 1962, and evolved into ARPANET in 1969. In the 1980s, commercial service
providers began supporting public use of ARPANET, allowing it to evolve into our modern
Internet. Global Positioning Satellites (GPS) became a reality in early 1993, with the Department
of Defense providing a stable, highly functional system of 24 satellites. This was quickly
followed by privately owned, commercial satellites being placed in orbit. Satellites and landlines
provide basic communications for much of the IoT.
3.2 INTRODUCTION
IoT is a network in which all physical objects are connected to the internet through
network devices or routers and exchange data. IoT allows objects to be controlled remotely
across existing network infrastructure. IoT is a very good and intelligent technique which
reduces human effort as well as easy access to physical devices. This technique also has
autonomous control feature by which any device can control without any human
interaction.Internet application development demand is very high. So IoT is a major
technology by which we can produce various useful internet applications.
“Things” in the IoT sense, is the mixture of hardware, software, data, and services.
“Things” can refer to a wide variety of devices such as DNA analysis devices for environmental
monitoring, electric clamps in coastal waters, Arduino chips in home automation and many
other. These devices gather useful data with the help of various existing technologies and share
that data between other devices. Examples include Home Automation System which uses Wi-Fi
or Bluetooth for exchange data between various devices of home.
35
Fig.3.1:working of IoT
COLLECTION
Eg:At your Home,In your car,At the office,In the manufacturing plant
COMMUNICATION
ANALYSIS
ACTION
36
Taking action based on the information and data.
3.3. FEATURES
It’s a concept that not only has the potential to impact how we live but also how we work.
Say your car have access to your calendar and already know the best route to take for your
upcoming meeting? If the traffic is heavy the car might send a text to others notifying them that
you will be late. There are more than 12 billion connected devices in the world, smart ‘things’.
Innovative companies are adopting IoT strategy and technology to rethink their products and
services and redefine their relationships with customers, employees and partners.
The Internet started with a simple idea – connecting computers together to share data in
various ways. Since that humble beginning, people have started to connect more devices to the
Internet. That’s the basis of the term Internet of Things (IoT). The Internet of Things extends
internet connectivity beyond traditional devices like desktop and laptop computers, smartphones
and tablets to an ever-growing network of everyday things that utilize embedded technology to
communicate and interact with the external environment, all via the Internet. It’s the inter-
networking of physical devices (“connected devices” and “smart devices”) that enable these
objects to collect and exchange data.
Evolution of IoT:This diagram, which can be summarised as an "any time, anywhere, any
thing" type of definition for IoT.
37
Shortly afterwards, Amazon Web Services (AWS) was launched, and IaaS
(infrastructure-as-a-service) provided a convenient way to massively scale projects. With
maturing XaaS (X as-a-service) options it became clear that IoT can make use of cloud services
for more realisable solutions. IoE (Internet of Everything) treats IoT as one building block, and
combines it with additional data sources (such as mapping, public databases, search engines) and
uses this to provide higher quality information for decision making (i.e. a transformation from
raw sensor data to more intelligence). It also connects people more closely to the IoT; using
smartphones/tablets/wearables as an example. This allows for P2P (people-to-people) and P2M
(people-to-machine) communication that too can scale massively. Analytics, ways to manage
and monitor events or responses, databases and other middleware flesh out the architecture to
make it work together.
Fig.3.3:process of connection
Customer Privacy
As sensors and video cameras become more common place, especially in public spaces,
consumers have less and less knowledge about the information being collected, and no way to
avoid it.Many people are uncomfortable with the idea of companies collecting information about
them, and even more uncomfortable having that information sold to anyone and everyone.
38
Generally speaking, older people dislike having information about themselves collected more
than younger people, but according to one survey, about 45% of “all” respondents did not trust
companies to use the data they collected to protect their privacy.
Currently, choices regarding privacy are very black and white, or on/off. The customer is
forced to give up all privacy, (often in an agreement so convoluted people don’t bother to plow
through it) or the customer simply cannot access the service. This has led to continuing
discussions about consumer privacy and how to best educate consumers regarding privacy and
the accessibility of data.
Security
While there are steps to take to help ensure security, it should come as no surprise this
issue has become a significant concern with the growth of the IoT. Literally billions of devices
are being interconnected together, making it possible (eventually) for someone to hack into your
coffee maker, and then access your entire network. The Internet of Things also makes businesses
all around the world more open to security threats. Additionally, data sharing and privacy
becomes issues when using the Internet of Things. Consider how concerns will grow when
billions of devices are interconnected. Some businesses will be faced with storing the massive
amounts of information these devices will be producing. They will need to find a method of
securely storing the data, while still being able to access, track, and analyze the huge amounts of
it being generated.
James Lewis, who is a cybersecurity researcher for the Center for Strategic and
International Studies, has written a report describing how the Internet of Things’
interconnections will allow computer hackers to wreak havoc through interconnected devices.
The threat is so real, even the Federal Trade Commission has gotten involved, wanting to know
how to guarantee privacy, and how security safeguards are being installed in new Internet-
connected devices. For example, new cars can now be hijacked by way of their Wi-Fi
connections. Consider the threat of hackers when automated driving becomes popular. Security
and risk management should not be taken lightly when creating new ways to use the Internet of
Things.
39
Fig.3.4:Features of IoT
Application protocols
40
Fig.3.5:CoAP Architecture
2. XMPP:
The extensive set of applications for IoT devices is often divided into consumer,
commercial, industrial, and infrastructure spaces.
41
Consumer applications
A growing portion of IoT devices are created for consumer use, including connected
vehicles, home automation/smart home, wearable technology, connected health, and appliances
with remote monitoring capabilities.
Smart home
IoT devices are a part of the larger concept of home automation, which can include
lighting, heating and air conditioning, media and security systems. Long term benefits could
include energy savings by automatically ensuring lights and electronics are turned off.
A smart home or automated home could be based on a platform or hubs that control smart
devices and appliances. For instance, using Apple's HomeKit, manufacturers can get their home
products and accessories be controlled by an application in iOS devices such as the iPhone and
the Apple Watch. This could be a dedicated app or iOS native applications such as Siri. This can
be demonstrated in the case of Lenovo's Smart Home Essentials, which is a line of smart home
devices that are controlled through Apple's Home app or Siri without the need for a Wi-Fi
bridge. There are also dedicated smart home hubs that are offered as standalone platforms to
connect different smart home products and these include the Amazon Echo, Apple's HomePod,
and Samsung's SmartThings Hub.
Elder care
One key application of smart home is to provide assistance for those with disabilities and
elderly individuals. These home systems utilize assistive technology to accommodate an owner's
specific disabilities. Voice control can assist users with sight and mobility limitations while alert
systems can be connected directly to Cochlear implants worn by hearing impaired users. They
can also be equipped with additional safety features. These features can include sensors that
monitor for medical emergencies such as falls or seizures. Smart home technology applied in this
way can provide users with more freedom and a higher quality of life. The term "Enterprise IoT"
refers to devices used in business and corporate settings. By 2019, it is estimated that IoT will
account for 9.1 billion devices.
Commercial applications
The futurologist’s vision seems to be that soon you will share your exercise levels, heart rate,
activity, and other essential data accumulated by your mobile device with your doctor. “More
42
and more care will be delivered outside hospitals and clinics”, “This means mobile devices –
from smart phones to monitoring devices – will become increasingly important as the number of
patients cared for at home or in sheltered accommodation or other community centers
increases.”[46] IoT devices can be used to enable remote health monitoring and emergency
notification systems. These health monitoring devices can range from blood pressure and heart
rate monitors to advanced devices capable of monitoring specialized implants, such as
pacemakers, Fit bit electronic wristbands, or advanced hearing aids. Some hospitals have begun
implementing "smart beds" that can detect when they are occupied and when a patient is
attempting to get up. It can also adjust itself to ensure appropriate pressure and support is applied
to the patient without the manual interaction of nurses. A 2015 Goldman Sachs report indicated
that health care IoT devices "can save the United States more than $300 billion in annual health
care expenditures by increasing revenue and decreasing cost." Recent contributions even refer to
IoT solutions for medicine as the Internet of Medical Things.
Sensors can also be equipped within living spaces to monitor the health and general well-
being of senior citizens, while also ensuring that proper treatment is being administered and
assisting people regain lost mobility via therapy as well. Other consumer devices to encourage
healthy living, such as connected scales or wearable heart monitors, are also a possibility with
the IoT. End-to-end health monitoring IoT platforms are also available for antenatal and chronic
patients, helping one manage health vitals and recurring medication requirements.
The Research & Development Corporation (DEKA), a company that creates prosthetic limbs,
has created a battery-powered arm that uses my electricity, a device that converts muscle group
sensations into motor control. The arm is nicknamed Luke Arm after Luke Skywalker (Star
Wars).
Transportation
The IoT can assist in the integration of communications, control, and information
processing across various transportation systems. Application of the IoT extends to all aspects of
transportation systems (i.e. the vehicle, the infrastructure, and the driver or user). Dynamic
interaction between these components of a transport system enables inter and intra vehicular
communication, smart traffic control, smart parking, electronic toll collection systems, logistic
and fleet management, vehicle control, and safety and road assistance. In Logistics and Fleet
Management for example, The IoT platform can continuously monitor the location and
conditions of cargo and assets via wireless sensors and send specific alerts when management
exceptions occur (delays, damages, thefts, etc.). If combined with Machine Learning then it also
helps in reducing traffic accidents by introducing drowsiness alerts to drivers and providing self-
driven cars too.
43
Building and home automation
IoT devices can be used to monitor and control the mechanical, electrical and electronic
systems used in various types of buildings (e.g., public and private, industrial, institutions, or
residential) in home automation and building automation systems. In this context, three main
areas are being covered in literature:
1.The integration of the Internet with building energy management systems in order to create
energy efficient and IOT driven “smart buildings”.
2. The possible means of real-time monitoring for reducing energy consumption and
monitoring occupant behaviours.
3.The integration of smart devices in the built environment and how they might to know who
to be used in future applications.
Industrial applications
Manufacturing
The IoT can realize the seamless integration of various manufacturing devices equipped with
sensing, identification, processing, communication, actuation, and networking capabilities. Based
on such a highly integrated smart cyberphysical space, it opens the door to create whole new
business and market opportunities for manufacturing. Network control and management of
manufacturing equipment, asset and situation management, or manufacturing process control
bring the IoT within the realm of industrial applications and smart manufacturing as well. The
IoT intelligent systems enable rapid manufacturing of new products, dynamic response to
product demands, and real-time optimization of manufacturing production and supply chain
networks, by networking machinery, sensors and control systems together.
44
Fig.3.6:Design architecture of cyber-physical system-enabled manufacturing system
Digital control systems to automate process controls, operator tools and service
information systems to optimize plant safety and security are within the purview of the IoT. But
it also extends itself to asset management via predictive maintenance, statistical evaluation, and
measurements to maximize reliability. Smart industrial management systems can also be
integrated with the Smart Grid, thereby enabling real-time energy optimization. Measurements,
automated controls, plant optimization, health and safety management, and other functions are
provided by a large number of networked sensors.
The term industrial Internet of things (IIoT) is often encountered in the manufacturing
industries, referring to the industrial subset of the IoT. IIoT in manufacturing could generate so
much business value that it will eventually lead to the fourth industrial revolution, so the so-
called Industry 4.0. It is estimated that in the future, successful companies will be able to
increase their revenue through Internet of things by creating new business models and improve
productivity, exploit analytics for innovation, and transform workforce. The potential of growth
by implementing IIoT will generate $12 trillion of global GDP by 2030.
While connectivity and data acquisition are imperative for IIoT, they should not be the
purpose, rather the foundation and path to something bigger. Among all the technologies,
predictive maintenance is probably a relatively "easier win" since it is applicable to existing
assets and management systems. The objective of intelligent maintenance systems is to reduce
unexpected downtime and increase productivity. And to realize that alone would generate around
up to 30% over the total maintenance costs. Industrial big data analytics will play a vital role in
manufacturing asset predictive maintenance, although that is not the only capability of industrial
45
big data. Cyber-physical systems (CPS) is the core technology of industrial big data and it will
be an interface between human and the cyber world. Cyber-physical systems can be designed by
following the 5C (connection, conversion, cyber, cognition, configuration) architecture, and it
will transform the collected data into actionable information, and eventually interfere with the
physical assets to optimize processes.
An IoT-enabled intelligent system of such cases was proposed in 2001 and later
demonstrated in 2014 by the National Science Foundation Industry/University Collaborative
Research Center for Intelligent Maintenance Systems (IMS) at the University of Cincinnati on a
bandsaw machine in IMTS 2014 in Chicago. Bandsaw machines are not necessarily expensive,
but the bandsaw belt expenses are enormous since they degrade much faster. However, without
sensing and intelligent analytics, it can be only determined by experience when the band saw belt
will actually break. The developed prognostics system will be able to recognize and monitor the
degradation of band saw belts even if the condition is changing, advising users when is the best
time to replace the belt. This will significantly improve user experience and operator safety and
ultimately save on costs. Please see intelligent maintenance system for more reference.
Agriculture
There are numerous IoT applications in farming such as collecting data on temperature,
rainfall, humidity, wind speed, pest infestation, and soil content. This data can be used to
automate farming techniques, take informed decisions to improve quality and quantity, minimize
risk and waste, and reduce effort required to manage crops. For example, farmers can now
monitor soil temperature and moisture from afar, and even apply IoT-acquired data to precision
fertilization programs.
In August 2018, Toyota Tsusho began a partnership with Microsoft to create fish farming
tools using the Microsoft Azure application suite for IoT technologies related to water
management. Developed in part by researchers from Kindai University, the water pump
mechanisms use artificial intelligence to count the number of fish on a conveyor belt, analyze the
number of fish, and deduce the effectiveness of water flow from the data the fish provide. The
specific computer programs used in the process fall under the Azure Machine Learning and the
Azure IoT Hub platforms.
Infrastructure applications
Monitoring and controlling operations of sustainable urban and rural infrastructures like
bridges, railway tracks, on- and offshore- wind-farms is a key application of the IoT. The IoT
infrastructure can be used for monitoring any events or changes in structural conditions that can
compromise safety and increase risk. IoT can benefit the construction industry by cost saving,
time reduction, better quality workday, paperless workflow and increase in productivity. It can
46
help in taking faster decisions and save money with Real-Time Data Analytics. It can also be
used for scheduling repair and maintenance activities in an efficient manner, by coordinating
tasks between different service providers and users of these facilities. IoT devices can also be
used to control critical infrastructure like bridges to provide access to ships. Usage of IoT
devices for monitoring and operating infrastructure is likely to improve incident management
and emergency response coordination, and quality of service, up-times and reduce costs of
operation in all infrastructure related areas. Even areas such as waste management can benefit
from automation and optimization that could be brought in by the IoT.
There are several planned or ongoing large-scale deployments of the IoT, to enable better
management of cities and systems. For example, Songdo, South Korea, the first of its kind fully
equipped and wired smart city, is gradually being built, with approximately 70 percent of the
business district completed as of June 2018. Much of the city is planned to be wired and
automated, with little or no human intervention.
Another example of a large deployment is the one completed by New York Waterways in
New York City to connect all the city's vessels and be able to monitor them live 24/7. The
network was designed and engineered by Fluidmesh Networks, a Chicago-based company
developing wireless networks for critical applications. The NYWW network is currently
providing coverage on the Hudson River, East River, and Upper New York Bay. With the
wireless network in place, NY Waterway is able to take control of its fleet and passengers in a
way that was not previously possible. New applications can include security, energy and fleet
management, digital signage, public Wi-Fi, paperless ticketing and others.
47
Energy management
Environmental monitoring
It’s the technology of today which is touching and transforming the every aspect of our
real life. IOT has given a concept of Machine to-Machine (M2M) communication. Companies
like Microsoft and SAP are implementing strategy to capitalize on the Internet of Things so that
you can just stop your business and starts making it thrive. IOT is going to have huge impact on
home automation and building automation system where every convenience will be taken care of
by the interconnected devices on IOT. It is also deployed on large scale for example in Song do ,
South Africa , the first of its own kind fully equipped and wired smart city is near to completion (
known as Ubiquitous City). With the personal electronics good connected to Internet will enable
us to “author” our lives. In medical science field, IOT has given a privilege to devices and
system to sense for coming disease and to prevent it ,for eg: It can make a person healthier with
wearables that can predict heart attack and cardiovascular strokes. As per a report of The suns
48
daily, consumers will start initiating the usage of IoT in a better way during 2015 and onwards
compared to past usage. It is expected that IoT products with interoperable capability will
dominate the market. Awareness of IoT products is also vital for market penetration along with
security features. Even very few Americans are aware of the usage of these products. As per a
study of Consumer Electronics Association and Parks Associates found only 10% of the
household in USA fully understood the usage of these products. Many interesting IoT products
like automatic door locks, Wi-Fi connected ceiling fans, light switches,LED bulbs, smart
watches,3-D printers and smart clothes will be popular among consumers. My Brain Technology
in France has developed "Melomind". This EEG Headset can measure a human's brain waves
and adjust music in a Smartphone app as they change. This product can be used as a digital
meditation aid. A smart baby pacifier can measure the temperature of a baby and transmit the
same to the Smartphone of parents.
Many scopes will be created for technology companies to release offerings as per the
behaviour of consumers. It may so happen that Netflix can know when a person is sad and alone
by monitoring the smart watch, smart thermostat and in-home camera. Subsequently, Netflix
may offer a movie to change the mood[12]. In a consumer electronics show in Los Vegas,
Samsung informed that the company would invest 100 million dollar for progress of IoT. The
company will also promote an open technology ecosystem for facilitating the usage of IoT.
IOT is believed to change the entire way people communicate, work and live. Now there
will be connectivity for everyone, everything and everywhere. It is going to have an influential
impact on how the businesses and government interact with the world.
According to NASSCOM, the global market size of IOT is expected to touch USD 3
trillion by 2020. In this landscape, startups are playing the biggest role in enabling IOT services
in the consumer as well as the industrial segment. In India, there are more than 60 percent start-
ups working on the lines of IOT with their highly technical and technological skills.
IOT proves to have a huge scope as it provides a unique opportunity for businesses to
turn data into insights. There are a number of contributing factors as well that drive the adoption
of IOT such as improved sensors, device connections, the evolution of lifestyle and mobility.
These factors alone will drive the adoption of IOT in India. By 2020, India’s IOT market is
49
expected to reach by USD 15 billion as per NASSCOM’s report. To provide an improved
internet experience, many companies and start-ups have emerged as big players in the IOT
market. In India, nearly 120 companies and 70 % start-ups are offering IOT enabled solutions.
From 2015 till now, around 60 USD million has been invested in IOT which has given birth to a
new way of working and living.
If we talk about IOT applications in an organized manner, these are broadly divided into
Industrial and Consumer segments. The industrial segment covers industrial and retail
automation which largely contributes to the development of smart cities. On the other hand, the
consumer segment is mainly driven by personal interest and covers smart lifestyle, home, health
& fitness automation. Likewise, enterprises and consumers using IOT solutions will be
complementing the IOT growth in our country.
The shift towards IOT will result in more improved and efficient businesses. Use of IOT
enabled devices will make enterprises adopt better technology in their businesses. Several
industry experts and analysts have predicted IOT as one of the essential strengths of every
business sector by 2020.
From Logistic industry to IT industry, IOT will have a crucial role to play in the
development of these sectors. Adoption of IOT will help businesses in saving costs at greater
margins. There will also be an exponential drop in the expenses of manufacturing,
administration, and selling of goods. All these factors contribute to an IOT enabled supply chain.
This will bring out more opportunities for retailers and wholesale giants to have simplified
business operations.
50
CHAPTER-4
CONCLUSION
During the internship period , a lot of experience , knowledge and exposure that I have
handy awakened me in a boast of self-confidence to face life more challenging now. Practical is
a complement to the science and theory learned. This is clearly the concept of science and
mcharity, where they have learned without practice will be lost and will not give anything-what
effect.so if we do without the knowledge ,of course, there will be problem in terms of grip and
stance ever-changing.
During my Industrial training, there are many changes from the point of learning
environments and discussion among colleagues.It can directly increase the dedication and
rational attitude towards myself.
IoT is going to dominate the next decade in the mobile ecosystem, with all the supporting
data access projects around it, is going to be the centre of all.
However there are still some weakness that can be improved in the future.Therefore I
conclude that the industrial training has provided many benefits to me even if there are minor
flaws that are somewhat disfiguring conditions so that this weakness can be rectified in the
future.
51