"If you think that the internet has changed your life, think again. The IoT is about to change it all over again!” – — Brendan O’Brien, Aria systems Can you imagine a computing concept where everyday objects have network connectivity? Is it possible for ordinary devices to communicate among themselves?
Yes!!!! And the answer is ‘the Internet of Things’. It’s a global network infrastructure, linking physical and virtual objects using cloud computing, data capture, and network communications.
|1. What “the Internet of Things” means and how it relates to Cloud computing concepts|
|2. How open platforms allow you to store your sensor data in the Cloud|
|3. The basic usage of the Arduino environment for creating your own embedded projects at low cost.|
|4. How to connect your Arduino with your Android phone|
|5. How to send data to the Internet and talk to the Cloud.|
|6. How to update sensor readings on Twitter (Social Networking Sites).|
Topics to be covered in workshop
a. Introduction to the Internet of Things
|The Internet of Things|
|The Basics of Sensors & Actuators|
|Introduction to Cloud Computing|
b. The Arduino Platform
|The Arduino Open-Microcontroller Platform|
|Arduino Board Layout & Architecture|
|Reading from Sensors|
c. Programming fundamentals ( C language )
d. Arduino Programming & Interface of Sensors
|Interfacing sensors with Arduino|
|Reading from Sensors|
Project 1: Simple LED Program for Arduino
Project 2: Integrating Sensors & Reading Environmental Physical Values.
Project 3: Reading Environmental Values on Android Smartphone.
|Talking to your Android Phone with Arduino|
|Connecting Arduino with Mobile Device.|
|The Android Mobile OS.|
|Using the Bluetooth Module|
Project 4: Voice Controlled Mini Home Automation using Android Smartphone
Project 5: Control Devices using Localhost Web Server for Home Automation
|Integrating Ethernet Module & Testing DHCP Connection|
|Creating Program for Localhost Web Server for controlling devices|
Project 6: Creating own Android App using MIT App Inventor & controlling Arduino connected devices.
Project 7: Being Social on Twitter & update status on Twitter through Arduino.
|Make Electronics Gadget Talk to Internet|
|Integrating Ethernet Module|
|Creating App on Twitter|
Project 8: Send Voltage & Analog Data on Cloud Server
|Communicating with the Cloud using Web Services|
|Cloud Computing & IoT.|
|Popular Cloud Computing Services for Sensor Management.|
Project 9: Use Arduino to Upload free data from Environmental Sensors to Cloud Server.
Project 10: Automatically Tweet Sensor Data on Twitter.
Project 11: Receive Automatic Call Notification on Mobile Phone for Burglar Alarm using IoT Platform
Project 12: Control Electronic Devices from anywhere across the world using Internet & Mobile App.
Competition is inevitable. When you talk about Business, it won’t be a success without a powerful strategies and strong decision. But every decision involve risk and you cannot take unlimited risk in this competitive market. So how so we calculate the risk? How can we make strategies that make us unbeatable in the market?
Data mining, the extraction of hidden predictive information from large databases, is a powerful new technology with great potential to help companies focus on the most important information in their data warehouses. Data mining tools predict future trends and behaviours, allowing businesses to make proactive, knowledge-driven decisions.
1. Introduction to Data Mining
|1.1 What is data mining?|
|1.2 Related technologies - Machine Learning, DBMS, OLAP, Statistics|
|1.3 Data Mining Goals|
|1.4 Stages of the Data Mining Process|
|1.5 Data Mining Techniques|
|1.6 Knowledge Representation Methods|
|1.8 Example: weather data|
2. Data Warehouse and OLAP
|2.1 Data Warehouse and DBMS|
|2.2 Multidimensional data model|
|2.3 OLAP operations|
|2.4 Example: loan data set|
3. Data pre-processing
|3.1 Data cleaning|
|3.2 Data transformation|
|3.3 Data reduction|
|3.4 Discretization and generating concept hierarchies|
|3.5 Installing Weka 3 Data Mining System|
|3.6 Experiments with Weka - filters, discretization|
4. Data mining knowledge representation
|4.1 Task relevant data|
|4.2 Background knowledge|
|4.3 Interestingness measures|
|4.4 Representing input data and output knowledge|
|4.5 Visualization techniques|
|4.6 Experiments with Weka – visualization|
5. Attribute-oriented analysis
|5.1 Attribute generalization|
|5.2 Attribute relevance|
|5.3 Class comparison|
|5.4 Statistical measures|
|5.5 Experiments with Weka - using filters and statistics|
6. Data mining algorithms: Association rules
|6.1 Motivation and terminology|
|6.2 Example: mining weather data|
|6.3 Basic idea: item sets|
|6.4 Generating item sets and rules efficiently|
|6.5 Correlation analysis|
|6.6 Experiments with Weka - mining association rules|
7. Data mining algorithms: Classification
|7.1 Basic learning/mining tasks|
|7.2 Inferring rudimentary rules: 1R algorithm|
|7.3 Decision trees|
|7.4 Covering rules|
|7.5 Experiments with Weka - decision trees, rules|
8. Data mining algorithms: Prediction
|8.1 The prediction task|
|8.2 Statistical (Bayesian) classification|
|8.3 Bayesian networks|
|8.4 Instance-based methods (nearest neighbour)|
|8.5 Linear models|
|8.6 Experiments with Weka - Prediction|
9. Evaluating what\'s been learned
|9.1 Basic issues|
|9.2 Training and testing|
|9.3 Estimating classifier accuracy (holdout, cross-validation, leave-one-out)|
|9.4 Combining multiple models (bagging, boosting, stacking)|
|9.5 Minimum Description Length Principle (MLD)|
|9.6 Experiments with Weka - training and testing|
10. Mining real data
|10.1 Pre-processing data from a real medical domain (310 patients with Hepatitis C).|
|10.2 Applying various data mining techniques to create a comprehensive and accurate model of the data.|
|11.1 Basic issues in clustering|
|11.2 First conceptual clustering system: Cluster/2|
|11.3 Partitioning methods: k-means, expectation maximization (EM)|
|11.4 Hierarchical methods: distance-based agglomerative and divisible clustering|
|11.5 Conceptual clustering: Cobweb|
12. Advanced techniques, Data Mining software and applications
|12.1 Text mining: extracting attributes (keywords), structural approaches (parsing, soft parsing).|
|12.2 Bayesian approach to classifying text|
|12.3 Web mining: classifying web pages, extracting knowledge from the web|
|12.4 Data Mining software and applications|
In last few years the idea of buying and selling has tremendously changed over online. Today, companies, brands and personalities are using social media techniques to reach out people. Such techniques are used by social media and digital marketing agencies to gain website traffic or attention through various social media sites. Social media platform is not only effective but is also relatively inexpensive than other media. Here one gets a chance to interact, build relationship and reputation for their brands. However, choosing the best social media agency in India can be a daunting task.
1. Definition, purpose and scope of digital marketing
|1.1 Introduction to Internet Marketing|
|1.2 Websites and their impact in Market|
|1.3 Understanding the impact of digital marketing on business|
|1.4 Definitions, history and development of digital marketing|
|1.5 Building customer relationships online and permission marketing|
2. Planning, Strategy and Testing
|2.1 Best practice approaches to online campaign planning|
|2.2 How to determine the optimum mix of digital marketing tools|
|2.3 Campaign, offer and messaging strategy Integration and multi-channel marketing|
|2.4 When to test, and what to test Learning by doing (better and better)|
3. Search Engine Marketing (SEO and PPC)
|3.1 How search engines work|
|3.2 Keyword research analysis and tools|
|3.3 SEO: Link building techniques and how they help your rankings|
|3.4 Pay-Per-Click advertising: the essentials|
|3.5 Optimizing your Adwords campaign (keywords, bid strategy, ad copy and creative) for maximum ROI|
|3.6 Improving landing page conversion rates.|
4. Email Marketing
|4.1 An overview of the email marketplace|
|4.2 The role of ESPs (email service providers)|
|4.3 Threats and challenges for email marketers|
|4.4 Segmenting your database: eCRM Increasing your open and click-through rates|
|4.5 Email design & development do’s and don’ts|
|4.6 Staying within the Law|
5. Social Media
|5.1 The ‘Big Four’: Facebook, Twitter, LinkedIn, YouTube Social listening and sentiment analysis Getting hands-on: Organizing Social Media: internal structures/ responsibilities, work-flows|
|5.2 A strategic approach to social media|
6. Mobile Marketing and Apps
|6.1 A look at the mobile landscape and its huge growth|
|6.2 Running Ads on Mobile devices HTML5 and the mobile web|
|6.3 Location-based services: why, what and how|
7. Usability & UX
|7.1 Copy and Design: creating information architecture that delivers|
|7.2 Principles of the Customer Experience|
|7.3 What is User-Centered Design? Best practice methodologies|
|7.4 The importance of User Testing|
8. Web Analytics and Metrics
|8.1 Launching your website is just the beginning|
|8.2 Onsite analytics : the main platforms The analytics dashboard|
|8.3 Setting up your conversion funnels|
|8.4 What to test and how to test|
|8.5 An iterative approach to optimization|
9. Online Display Advertising
|9.1 The display ecosystem: media agencies, publishers and ad networks|
|9.2 Ad formats: from traditional to new|
|9.3 Creative considerations: interruptive or permission-based?|
|9.4 Latest display advertising trends|
3D Printing is an Additive Manufacturing technique that creates a physical object from a virtual 3D CAD model by depositing successive layers of material. They work like the traditional inkjet printers, but instead of ink, a 3D printer deposits desired material to manufacture an object from its digital format. 3D printing and rapid prototyping, in general, are widely claimed to have revolutionized not only the manufacturing industry but also many other walks of life like medicine, aerospace and automotive industry. This Workshop on 3D Printing helps the participants understand the design, functioning and operation of a basic 3D Printer.
Swarm Robotics deals with the Artificial Swarm Intelligence and involves the usage of multiple Robots which coordinate among themselves to complete a mission. The Swarm robots communicate with each other wirelessly and take decisions. This workshop involves development of autonomous swarm robots enabled with master-slave communication. The master robot controls the slave robot while performing its own task and the slave robot functions based on the signal received from the master robot (both being autonomous).
|A. Understanding Swarm Intelligence, Interfacing Sensors, Wireless Communication and Micro controller Programming|
|B. Understanding Machine to Machine Communication|
|C. Development of Autonomous Robots which send signals to communicate with each other|
|D. Micro controller Programming to receive signals from other Robots and behave accordingly|
|E. Introduction to structure and programming of micro controllers|
|F. Practical experience for participants with DC motors, Radio Frequency Modules, Micro controllers, Infrared Sensors, etc|
Course Structure & Topics covered
|1. Lecture by Expert on Swarm Intelligence, Wireless Communication and Autonomous Robotics - 4 hours|
|2. Designing the Swarm Robot - 1 hour|
|3. Fabricating the Swarm Robot - 2 hours|
|4. Programming the Swarm Robot - 6 hours|
|5. Testing of Swarm Robots and Competition - 2 hours|
|6. Awards and Certificates - 0.5 hours|
|a. DC motors|
|b. Embedded Development board|
|c. 9V Battery|
|d. IR Sensors|
|e. Radio Frequency Modules(Encoder & Decoder)|
|f. Nose plier*|
|g. Wire stripper*|
|h. Screw driver*|
|* Software will be provided to program and calibrate the embedded system.|
|* Study material (e book) will be provided.|
Bridge Design is a vital topic of study in Civil Engineering. In the Bridge Design Workshop, participants will design and fabricate their own bridge. The bridge model made by participants can take up to 1000 times the self-weight.The workshop includes instruction on the key structural components of Structural engineering and bridge construction – beams, arches, trusses, suspensions, and test for maximum load.
A. Design, Fabricate and Test your own Bridge
B. Exposure to new technologies involved in Bridge Engineering
C. Understanding the concepts of different Bridges with case studies
D. Competition to measure efficiency of the fabricated Bridge
1. Lecture - 4 Hrs
2. Design - 5 Hrs
3. Fabrication - 4 Hrs
4. Testing and Competition - 2.5 Hrs
5. Certificate Distribution - 0.5 Hr
a. Bridge Engineering
b. An Introduction
c. Design concepts involved in different types of Bridges
d. Modeling and Analysis of sample Bridges using Industry grade software
e. Structural responses due to different loads
f. Case studies for better understanding of Bridge Design concepts
|1. Introduction to Android Technology||2. Getting started with the Android|
|3. Android Architecture||4. Java SDK|
|5. Introduction to Android SDK||6. First Look at Android Interface|
|7. How to install Android Plug in||8. Platform|
|9. Advantages & Disadvantages||10. Application Fundamental|
|11. Framework||12. Components|
|13. Activity||14. Services|
|15. Content Providers||16. Broadcast Receivers|
|17. Publishing||18. Target Devices|
|1. Android Installation||2. Tools & S/w Required|
|3. Emulator creation||4. Hello program|
|5. Activity??||6. Life cycle of Activity|
|7. Android Manifest File.||8. What is view??|
|9. Ä XML for GUI design||10. lUnderstanding Layouts|
|11. Feature of view advantage|
|1. Concepts of Bundle, Cursor, toast & inflator||2. Coding for some|
|3. simple widgets||4. simple widgets|
|5. Text View||6. Button|
|7. Edit Text||8. Checkbox|
|9. Radio Button||10. Spinner|
|11. List view||12. Progress Bar|
|13. Seek Bar||14. Concept of INTENT|
|15. Moving from one activity to another activity||16. Some advance topic|
|17. Message sending||18. Call simulation|
|19. Toast message||20. Wi-Fi Control|
|21. Alert Box||22. Tailor made Alert Box|
|23. Database designing||23. fundamentals|
Day 2: - Session 2
First Application: - Phone Call (Application Building, Hands-on)
Second Application: - Simple registration and login app like as Facebook (Application Building, Hands-on)
Third Application: - Audio recorder app (Application Building, Hands-on)
Fourth Application: - Music player app (Application Building, Hands-on)
Fifth Application: - Flash light torch app (Application • Building, Hands-on)
Session 7: Latest Technology Session
1.2 Introduction to sixth sense technology.
1.3 Introduction to Robotics.
1.4 Future aspects and career in the field of Robotics.
1.5 Parts of a Robot.
1.6 Introduction to Embedded systems.
1.8 Input & Output peripherals interfacings.
1.9 Pin outs of ATmega8 Microcontroller.
1.10 Introduction to programming in embedded.
1.11 Basic practical exposure with interfacing peripherals.
1.12 Interfacing of LEDs and Buzzer.
1.13 Writing first program in Embedded C.
Practical 2: Burning the program on Hardware with some different LED patterns.
Practical 3: Turn ON/OFF Buzzer at desired delay
2.3 Working principle of Motors and its types.
2.5 Interfacing Motors with microcontrollers.
2.6 Differential drive mechanism of Robot.
Practical 4: Rotate the motor in backward and forward Direction.
2.7 Chassis Assembling.
2.8 Serial communication.
2.9 UART in microcontrollers.
2.10 Accessing internal UART.
Practical 5: Transferring data serially from PC to microcontroller.
Project 2: PC controlled Bot.
3.2 Wide description about Bluetooth devices.
Practical 6: Glowing of LED wirelessly using Bluetooth of Laptop.
Practical 7: Motor controlling wirelessly using Bluetooth of Laptop.
3.3 Virtual serial port in android phones.
Project 3:Bluetooth/Mobile controlled Robot.
3.4 Introduction to MATLAB.
3.5 Software installation.
3.6 Relations & logical operators.
3.8 Cell arrays.
3.9 The m-files generation.
Practical 8:Numbers & arithmetic operations in MATLAB.
3.10 Image Processing Using MATLAB.
3.11 Introduction to image/vision/eye to the Robot.
3.12 Image processing through MATLAB.
3.13 Interfacing cameras (more than one) in MATLAB.
3.14 Identifying area of interest (color) in the image.
3.15 Calculation of color pixels in the image.
Practical 10: Taking snapshot from camera.
Practical 11: Conversion into different formats.
Practical 12: Blinking of LEDs using colors.
Project 4:Wearable colored gesture controlled Robot.
Project 5:Wearable colored gesture controlled P.C. applications.
Project 6:Wearable colored gesture controlled web browsing.
Project 7:Ball follower Robot.
Knowledge of C or Embedded C languages.
- Hacking history : How it all begin
- Why is security needed?
- What is ethical hacking?
- Ethical Hacker Vs Malicious hacker
- Types of Hackers
- Building an approach for ethical hacking
- Steps in Ethical hacking
Basics of Internet, Networking & Hacking - What is a Network?
- Types of network – LANs, WANs & WLANs
- What is Internet?
- History of the Internet
- Basic Structure
- What is a Server?
- What is an IP Address?
- What is a domain name?
- IP-Domain Relation
- Client-Server Relationship Model
- Internet networking
- What is a port?
- What is Programming?
- Types of programming languages.
- What is a Programming loophole or error?
Session 2: - Information gathering & Google Hacking (Practical)
- Whois access (Demo)
- Maltego (Demo)
- 123people.com (Demo)
- Ip scaning (Demo)
- Port scaning (Demo)
- Network scaning & its tools (Demo)
- What is Google and how does it work?
- Google tricks (Demo)
- Basic hacks (Demo)
- How can Google hacking help an Ethical Hacker? (Demo)
- Accesing online remote cameras
Windows security (Practical)
- Windows security (Demo)
- Registry (Demo)
- Port & Services (Demo)
- Introduction of SQL
- What is SQL injection
- Checking SQL injection vulnerability (demo)
- Basic strategy of SQL injection (Demo)
- Getting login credientials using SQL injections (Live Demo)
- Using SQL to login via middleware language (Demo)
- URL and Forms (Demo)
- SQL Query SELECT, DROP etc. (Demo)
- SQL cheat sheets (Demo)
- Using source changes to bypass client side validation (Demo)
- Live demonstration of the attack (Demo)
- Using SQL injection tools (Demo)
- Importance of server side validation (Demo)
- How to protect your system from SQL Injections (Demo)
Man-in-the-middle attack (MITM Attack) (Practical)
- What is Man-in-the-middle attack?
- What is Backtrack linux (Most common unix system for ethical hacking)?
- Preparation for Man-in-the-middle attack (Demo)
- Setting ettercap tool for the attack (demo)
Identifying victim (Demo)
- Cache poisining (Demo)
- Routing table modification (Demo)
- Eveasdroping (Demo)
- Countermeasures against MITM attack (Demo)
Session 4: -Phishing, Trojan & Viruses
- What is phishing?
- Social engineering used in phishing (Demo)
- Phishing attack (Demo)
- Phishing sites (Demo)
- Protection against phishing (Demo)
- Viruses: Trojans, Worms, Malware, Spyware
- Modes of spreading
- Different Ways a Trojan can Get into a System (Demo)
- Creation of Trojan using cybergate (Demo)
- Attacking a system using our created trojan (Demo)
- Indications of a Trojan Attack (Demo)
- Some Famous Trojans and Ports They Use (Demo)
- How to Detect Trojans? (Demo)
- How to Determine which Ports are Listening (Demo)
- What are cookies? (Demo)
- Reading and writing cookies (Demo)
- Passive Vs Active session hijack (demo)
- TCP sessions and HTTP sessions (Demo)
- TCP session hijacking: Telnet (Demo)
- Stealing Cookies to hijack session using: XSS (Demo)
- Sniffers (Demo) - Spoofing (Demo)
- Spoofing Vs Hijacking
- Types of Hijacking
- Protection against session Hijacking (Demo)
Session 5: - Social Network Attacks (Facebook, WhatsApp & Gmail)
- Overview of Social Engineering - Case Study
- Example of Social Engineering Attack
- Java Applet Attack (Demo) -WhatsApp Security -Facebook Security -Gmail Security
Call & SMS Spoofing
- What is Fake SMS & Call?
- Method of generating fake SMS & Calls (Demo)
- Actions to be taken for fake SMS and Calls (Demo) Indian IT Act & Cybercrime
- IT ACT 2000
- Cyber crime/terrorism and its type
- Sections in the Indian constitution Sec. 65, 66 A,B,C, D , 67, 69 etc.
- Penalty in all sections of Indian constitution
- What is DNS Spoofing?
- How does it work?
- How to secure yourself?
- DNS Spoofing (Demo)
- How does an email work?
- Tracing an email (Demo)
Firewalls & Keyloggers (Demo)
- Detecting fake emails (Demo)
- What is a firewall? & How can it help you
- How a firewall works
- What are key loggers? (Demo)
- Types of key loggers? (Demo)
Automation is basically the delegation of human control function to technical equipment. It is the use of control systems such as computers, PLCs, Microcontrollers to control machinery and processes to reduce the need for human sensory and mental requirements as well. Industrial Automation i.e. to "Automate Industry" is the basic need of almost every type of manufacturing and production unit today.
The most used guiding force behind an Automated Industrial Plant as a “Programmable Logic Controller” generally known as a PLC. PLCs along with certain other necessary ingredients like Sensors, Motors, Actuators, Valves, Conveyors, Boilers, SCADA Systems, Computers & many more, makes a real automated manufacturing plant.
Topics to be covered in Workshop
Module I: Presentation on Recent Trends in Industrial Automation & PLC-SCADA (Duration 2 Hours)
|a. Introduction To Automation|
|b. Why We Need Automation|
|c. Where Automation?|
|d. Evolution In Industrial Automation (A Brief History)|
|e. Different Type Of Industrial Control Mechanisms|
|f. Introduction To PLCs|
|g. PLC Advantages Over Microcontrollers|
|h. Area Of Applications|
|i. DATA Flow During Automation|
|j. Motor Drives Introduction & Their Need|
|k. Sensors Introduction & Their Need|
|l. HMI Introduction & Its Need|
|m. SCADA Introduction& Its Need|
Module II- Detail study of PLC & SCADA (Duration 3 Hours- Hands On)
Module III- PLC I/Os Basics, Burning & Interfacing Concepts (Duration 1 Hours- Hands On)
|a. Allen Bradley & Rockwell Automation’s Details|
|b. Brief Description To Input/ Output Pins Of Micrologix-1000|
|c. Ladder Diagram Basics|
|d. Introduction To RSLogix|
|e. Downloading A Ladder Program In PLC Using RSLinx.|
|f. How To Take Input From Panel|
|g. How To Give Output To Panel|
|h. Running First PLC Application|
Module IV- SCADA Programming on Wonderware InTouch (Duration 3 Hours- Hands On)
Module V- Hands on Session on PLC Training Kit which contains Allen Bradley Micrologix 1000 PLC (Duration 3 Hours- Hands On)
Software Used: RsLogix, RsLinx, RsLogix Simulator, Wonderware InTouch SCADA.
Module VI- Quiz & Competition. By the end of this workshop the students will become aware about the basic Knowledge of Industrial Automation, PLCs and their relevant module. Workshop is based on 20% theory & 80% practical hands-on session.