Professional Documents
Culture Documents
On
at
1STOP
SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENT FOR THE AWARD
OF THE DEGREE OF
BACHELOR OF TECHNOLOGY
SUBMITTED BY:
JUNE, 2021
DEPARTMENT OFELECCTRONICS AND COMMUNICATION ENGINEREING
1. I “HARSHIT YADAV” hereby declare that I have undertaken Six Weeks Industrial Training at “1STOP”
during a period from 10/07/2021 to 10/09/2021 . The project entitled “Artificial Intelligence from Beat The Virus”
submitted by HARSHIT YADAV, 1915170 in partial fulfillment of the requirement for the award of degree of the B.
Tech. (Electronics and Communication Engineering) submitted in Chandigarh Engineering College Jhanjeri, Mohali is
an authentic record of my own work carried out during Six Weeks Industrial Training. The matter presented in this
project has not formed the basis for the award of any other degree, diploma, fellowship or any other similar titles.
i
CERTIFICATE OF TRAINING COMPLETION
CERTIFICATE OF TRAINING PARTICIPATION
ACKNOWLEDGEMENT
I express my sincere gratitude to the I. K. Gujral Punjab Technical University, Jalandhar, Kapurthala for
giving me the opportunity to undergo Six Weeks Industrial Training after my 4th Semester of B.Tech.
(ECE)
I would like to thank Mr. Rajnesh Talwar , Director and Mr.SAJJAN SINGH Head of Department, ECE
at Chandigarh Engineering College Jhanjeri, Mohali for their kind support.
I also owe my sincere gratitude towards Ms.Malika Arora for his/her valuable advice and healthy
criticism throughout my training which helped me immensely to complete my work successfully.
I would also like to thank everyone who has knowingly and unknowingly helped me throughout my work.
Last but not least, a word of thanks for the authors of all those books and papers which I have consulted
during my training as well as for preparing the report.
Harshit Yadav
ABSTRACT
iv
Table of Contents
1. INTRODUCTION 2-9
1.1 Organization/website Profile
1.2 Introduction of Project
1.3 Problem Definition
1.4 Limitation of Existing System
1.5 Objective of Project
1.6 Introduction of the technology
2. PROJECTS UNDERTAKEN 10-13
2.1 Objectives
2.2 Feasible study
2.3. Software Requirement Specification
2.4 Hardware Specification
2.5 Software Specification
1
4.7 Snapshots
5. IMPLEMENTATION AND TESTING 24-35
5.1 Testing 6
5.2 Implementation and running project Screenshot CONCLUS
IONS
7. REF
ERE
NCE
S
8. APP
ENDI
CES
2
INTRODUCTION
1stop is a strong platform with immense potential for students from anywhere and anytime to
access cutting-edge Mentorship and Certification Program widespread with a larger number of
domains and niches to explore learning. E-learning has been the fastest growing way for an
aspirant to start their journey into pursuing their Dream Career.
Our Vision lies to bring in a technology-oriented career-driven Industrial Experience into the
aspirant’s career with Great Value.
3
2 Introduction of The Project
The MNIST handwritten digit classification problem is a standard dataset used in computer
vision and deep learning.
Although the dataset is effectively solved, it can be used as the basis for learning and practicing
how to develop, evaluate, and use convolutional deep learning neural networks for image
classification from scratch. This includes how to develop a robust test harness for estimating the
performance of the model, how to explore improvements to the model, and how to save the
model and later load it to make predictions on new data.
3
WHAT IS UN-SUPERVISED LEARNING ?▪
The goal for unsupervised learning is to model the underlying structure or distribution
in the data in order to learn more about the data and all this is done without any
supervision or direction unlike supervised learning▪The model is given a dataset
which is neither labelled nor classified. The model explores the data and draws
inferences from datasets to define hidden structures from unlabelled dataGOAL OF
USING UN-SUPERVISED LEARNING
3
1.1
2 EXAMPLE OF UN-SUPERVISED LEARNING
3 we can see that even without labels, the algorithm was able to sort the data based
on the structures it identified this is achieved by unsupervised learning
4 APPLICATIONS OF UN-SUPERVISED LEARNING
•Customer Segmentation
5 •Search Engines
6 •identification of cancer cells
7 •Handwritten digit recognition
8 •Clustering used in Search engines
4
WHAT IS TENSORFLOW?TensorFlow is an
open source machine learning platform developed by Google.
It has a JavaScript library for deploying machine learning
models in the browser, a lite version for mobile and IoT
devices, and an extended version for large production
environments.
6
8.2 OBJECTIVE OF THE PROJECT
7
8.3 INTRODUCTION OF THE TECHNOLOGY
LANGUAGE:- Python
Tkinter
Tkinter is a Python binding to the Tk GUI toolkit. It is the standard Python interface to
the Tk GUI toolkit, and is Python's de facto standard GUI.Tkinter is included with
standard Linux, Microsoft Windows and Mac OS X installs of Python.
The name Tkinter comes from Tk interface. Tkinter was written by Fredrik Lundh.
XAMMP:
XAMPP is a cross-platform web server that is free and open-source. XAMPP is a short
form for Cross-Platform, Apache, MySQL, PHP, and Perl. XAMPP is a popular
cross- platform web server that allows programmers to write and test their code on
a local web server. It was created by Apache Friends, and the public can revise or
modify its native source code. It includes MariaDB, Apache HTTP Server, and
interpreters for PHP and Perl, among other computer languages. Because of XAMPP’s
simplicity of deployment, a developer can quickly and easily install a WAMP or
LAMP stack on an operating system, with the added benefit that common add-in
apps like WordPress and Joomla can also be loaded.
8
Database
MySQL
MySQL is a powerful, open source object-relational database system with over 30
years of active development that has earned it a strong reputation for reliability,
feature robustness, and performance.
MySQL is an advanced, enterprise class open source relational database that supports
both SQL (relational) and JSON (non-relational) querying. It is a highly stable
database management system, backed by more than 20 years of community
development which has contributed to its high levels of resilience, integrity, and
correctness. MySQL is used as the primary data store or data warehouse for many
web, mobile, geospatial, and analytics applications.
MySQL has a rich history for support of advanced data types, and supports a level of
performance optimization that is common across its commercial database counterparts,
like Oracle and SQL Server. AWS supports MySQL through a fully managed
database service with Amazon Relational Database Service (RDS). Amazon
Aurora with MySQL compatibility is also built using MySQL.
MySQL comes with many features aimed to help developers build applications,
administrators to protect data integrity and build fault-tolerant environments, and help
you manage your data no matter how big or small the dataset. In addition to being free
and open source, MySQL is highly extensible. For example, you can define your own
data types, build out custom functions, even write code from different programming
languages without recompiling your database.
9
2. PROJECT OVERVEIW
Student management systems serve academic institutions in a variety of ways, the
most important of which is centralized data administration and accessibility. Teachers
will be able to input, maintain, and access student data more simply. Parents and
guardians have a better understanding of how their children perform in class.
Teacher and other school or college professionals must enhance their student
management skills over time. It is defined as a collection of skills that every teacher
develops through time in order to properly manage their students. Getting into the
student’s heart is one of the most important aspects of management.
2.1 Objectives
Our product is a student management system that gives all the services
that must be provided to a student over the internet to find fee details
provided by that administrator of the college.
This product contains each and every data regarding student, payment etc.,
personal details which can be updated by the student and viewed by the
administrator. It provides detailed information about the fee details and
the location (place) of college. Our product is a subpart of the university
management system.
Our Student Management System product usage makes work done at the
faster way the software is applicable to view the fee details provided by
the administrator of the organization and student can edit his personal
details which can be viewed by the administrator.
10
2.2 FEASIBILITY ANALYSIS
Whatever we think need not be feasible. It is wise to think about the feasibility of any
problem we undertaken, feasibility is the study of impact, which happens in the
organization by the development of a system. The impact can be either positive or
negative. Then the positives nominate the negatives, then the system is considered
feasible. The feasibility study can be performed in two ways such as technical
feasibility and economical feasibility.
Technical Feasibility:
We can strongly says that it is technically feasible, since there will not be much
difficulty in getting required resources for the development and
maintaining the system as well. All the resources needed for the development of the
software as well as the maintenance of the same is available in the organization here
we are utilizing the resources which are available already.
Economical Feasibility:
Operational Feasibility:
Operational feasibility is the measure of how well a proposed system solves the
problems, and takes advantage of the opportunities identified during scope definition
and how it satisfies the requirements identified in the requirements analysis phase of
system development.
The operational feasibility assessment focuses on the degree to which the proposed
development project fits in with the existing business environment and objectives
with regard to development schedule, delivery date, corporate culture and existing
business processes.
11
2.3 SOFTWARE REQUIREMENT SEPCIFICATION
2.3.1 FUNCTIONAL REQUIREMENTS OF STUDENT
MANAGEMENT SYSTEM.
● Register new students.
● Record the attendance of students.
● Record the internal marks of students.
● Record the feed details of students.
● Register a new teacher/employee.
● Register a new user for the system.
● Record the salary details of employees.
● Record the course details and subject information.
● Record the scholarship details and information.
● Generate various reports for all transactions in the system.
Performance Requirements
The proposed system that we are going to develop will be used as the
Chief performance system for providing help to the organization in
managing the whole database of the students studying in the organization.
Therefore, it is expected that the database would perform functionally all
the requirements that are specified.
Safety Requirements
12
Security Requirements
Security systems need database storage just like many other applications.
However, the special requirements of the security market mean that vendors
must choose their database partner carefully.
OS-Windows 7/8/10
Python Interpreter
Pycharm IDE or VS code
Xampp (For Mysql) or Mysql Workbench
13
3. DEVELOPMENT ENVIOURMENT
14
4. SYSTEM DESIGN
Fig:- SDLC
15
16
4.3 DESCRIPTION OF USED MODEL
The Waterfall Model
17
should make sure that each phase is 100% complete and absolutely correct before
proceeding to the next phase of program creation. Program requirements should be set
in stone before design is started (otherwise work put into a design based on incorrect
requirements is wasted); the program's design should be perfect before people begin
work on implementing the design (otherwise they are implementing the wrong design
and their work is wasted), etc.
18
4.4 DATA FLOW DIAGRAM
The data flow diagram enables the software engineer to develop models
of the information domain and functional domain at the same time. As the
DFD is refined into levels of greater detail, the analysts perform an
implicit functional decomposition of the system. Also DFD refinement
results in a corresponding
refinement of data as it moves through the processes that embody the
application.
19
Fig:- Zero (0) Level
20
4.5 ER DIAGRAM
Fig: ER DIAGRAM
21
4.6 USE CASE DIAGRAM
22
4.7 SNAPSHOTS
23
5. IMPLEMENTATION AND TESTING
5.1 TESTING
Testing is more than just debugging. The purpose of testing can be quality
assurance, verification and validation, or reliability estimation. Correctness
testing and reliability testing are two major areas of testing. Software testing
is a trade-off between budget, time and quality.
Software Testing
To improve quality
Black-box testing
The black-box approach is a testing method in which test data are derived
from the specified functional requirements without regard to the final program
structure. It is also termed data-driven, input/output driven or requirements-
based testing. A testing method emphasized on executing the functions and
24
examination of their input and output data.
White-box testing
Unit testing
System testing
Entire system is tested as per the requirements. Black-box type testing that is
based on overall requirements specifications, covers all combined parts of
a system.
End-to-end testing
Usability testing
Install/uninstall testing
Tested for full, partial, or upgrade install/uninstall processes on different
operating systems under different hardware, software environment.
25
Recovery testing
Testing how well a system recovers from crashes, hardware failures, or other
catastrophic problems.
Security testing
Can system be penetrated by any hacking way. Testing how well the system
protects against unauthorized internal or external access. Checked if system,
database is safe from external attacks.
Compatibility testing
Comparison testing
Alpha testing
In house virtual user environment can be created for this type of testing.
Testing is done at the end of development. Still minor design changes may be
made as a result of such testing.
Beta testing
26
5.2 Implementation and running project
Screenshots…
SOURCE CODE 1
{
"nbformat": 4,
"nbformat_minor": 0,
"metadata": {
"colab": {
"name": "cnn classificatoin.ipynb",
"provenance": []
},
"kernelspec": {
"name": "python3",
"display_name": "Python 3"
}
},
"cells": [
{
"cell_type": "code",
"metadata": {
"colab": {
"base_uri": "https://localhost:8080/"
},
"id": "A6uqMFX-QHFl",
"outputId": "dc216cd8-9423-4583-bb2f-c6813ffdc910"
},
"source": [
"import tensorflow as tf\r\n",
"(x_train, y_train), (x_test, y_test) = tf.keras.datasets.mnist.load_data()\r\n",
"x_train.shape"
],
"execution_count": 3,
"outputs": [
{
"output_type": "execute_result",
"data": {
"text/plain": [
"(60000, 28, 28)"
]
},
"metadata": {
"tags": []
},
"execution_count": 3
}
]
34
},
{
"cell_type": "code",
"metadata": {
"colab": {
"base_uri": "https://localhost:8080/",
"height": 1000
},
"id": "w62pBB6WT7Op",
"outputId": "03de3995-a41f-4da2-e9fd-581efe19f829"
},
"source": [
"import matplotlib.pyplot as plt\r\n",
"%matplotlib inline\r\n",
"fig, axs = plt.subplots(4, 4, figsize = (20, 20))\r\n",
"plt.gray()\r\n",
"for i, ax in enumerate(axs.flat):\r\n",
" ax.matshow(x_train[i])\r\n",
" ax.axis('off')\r\n",
" ax.set_title('Number {}'.format(y_train[i]))\r\n",
"fig.show()\r\n",
"\r\n"
],
"execution_count": 9,
"outputs": [
{
"output_type": "display_data",
"data": {
"image/png": "text/plain": [
"<Figure size 1440x1440 with 16 Axes>"
]
},
"metadata": {
"tags": [],
"needs_background": "light"
}
}
]
},
{
"cell_type": "markdown",
"metadata": {
"id": "sOwf-Bau6KdV"
},
"source": [
""
]
},
{
34
"cell_type": "code",
"metadata": {
"id": "jVbanpv2Qnrt"
},
"source": [
"x_train = x_train.reshape(x_train.shape[0], 28, 28, 1)\r\n",
"x_test = x_test.reshape(x_test.shape[0], 28, 28, 1)\r\n",
"input_shape = (28, 28, 1)\r\n"
],
"execution_count": 10,
"outputs": []
},
{
"cell_type": "code",
"metadata": {
"colab": {
"base_uri": "https://localhost:8080/"
},
"id": "hi31ZKC214FZ",
"outputId": "20b84fe9-4f17-4a52-d5d9-d29f4986b8ea"
},
"source": [
"x_train = x_train.astype('float32')\r\n",
"x_test = x_test.astype('float32')\r\n",
"x_train /= 255\r\n",
"x_test /= 255\r\n",
"print('x_train shape:', x_train.shape)\r\n",
"print('Number of images in x_train', x_train.shape[0])\r\n",
"print('Number of images in x_test', x_test.shape[0])"
],
"execution_count": 11,
"outputs": [
{
"output_type": "stream",
"text": [
"x_train shape: (60000, 28, 28, 1)\n",
"Number of images in x_train 60000\n",
"Number of images in x_test 10000\n"
],
"name": "stdout"
}
]
},
{
"cell_type": "code",
"metadata": {
"id": "xGTpAYoZQvh_"
},
"source": [
34
"from tensorflow.keras.models import Sequential\r\n",
"from tensorflow.keras.layers import Dense, Conv2D, Dropout, Flatten, MaxPooling2D\r\n",
"model = Sequential()\r\n",
"model.add(Conv2D(28, kernel_size=(3,3), input_shape=input_shape))\r\n",
"model.add(MaxPooling2D(pool_size=(2, 2)))\r\n",
"model.add(Flatten()) \r\n",
"model.add(Dense(128, activation=tf.nn.relu))\r\n",
"model.add(Dropout(0.2))\r\n",
"model.add(Dense(10,activation=tf.nn.softmax))"
],
"execution_count": 12,
"outputs": []
},
{
"cell_type": "code",
"metadata": {
"colab": {
"base_uri": "https://localhost:8080/"
},
"id": "PJ-V1KPdQ1W7",
"outputId": "3cbec4e7-9a4e-463d-a433-2aa3a75f52ca"
},
"source": [
"model.compile(optimizer='adam', \r\n",
" loss='sparse_categorical_crossentropy', \r\n",
" metrics=['accuracy'])\r\n",
"model.fit(x=x_train,y=y_train, epochs=1)"
],
"execution_count": 16,
"outputs": [
{
"output_type": "stream",
"text": [
"1875/1875 [==============================] - 30s 16ms/step - loss: 0.0550 - accuracy:
0.9827\n"
],
"name": "stdout"
},
{
"output_type": "execute_result",
"data": {
"text/plain": [
"<tensorflow.python.keras.callbacks.History at 0x7fb9b426ea90>"
]
},
"metadata": {
"tags": []
},
"execution_count": 16
34
}
]
},
{
"cell_type": "code",
"metadata": {
"colab": {
"base_uri": "https://localhost:8080/"
},
"id": "QwYRSf0vRKWd",
"outputId": "89eef82e-5d71-47e9-cd3e-fa06ad0079a1"
},
"source": [
"model.evaluate(x_test, y_test)"
],
"execution_count": 19,
"outputs": [
{
"output_type": "stream",
"text": [
"313/313 [==============================] - 2s 6ms/step - loss: 0.0544 - accuracy:
0.9831\n"
],
"name": "stdout"
},
{
"output_type": "execute_result",
"data": {
"text/plain": [
"[0.05435193330049515, 0.9830999970436096]"
]
},
"metadata": {
"tags": []
},
"execution_count": 19
}
]
}
]
}
34
35
6. CONCLUSION
7. REFERENCES
Wikipedia
https://www.geeksforgeeks.org/python-gui-tkinter/
https://www.javatpoint.com/python-tkinter
https://www.1stop.ai/projects
36
8. APPENDICES
37