Friday, January 31, 2020

BIOMETRICS


Lakshmi N

2nd Year BCA, NCMS



No matter how many innovations  are taking place in technology, authentication and security measures, plays an important role. Those days many of them fails to protect their Private data by security measures like passwords and pins. Remembering many passwords is quite difficult. Passwords ,pins or any other security measures can provide limited security. To overcome these demerits, here comes BIOMETRICS, biometrics are physical or behavioural human characteristics to that can be used to digitally identify a person to grant access to systems, devices or data. Where each and every user will have unique measurements and behaviours so this helps Systems to easily identify whether the person is authorized. Biometric provides an efficient way of security to data. We can protect our data easily with the help of Biometric security measures like finger print Technique, face recognition technique and some other. Passwords or pins can easily be stolen or noted by an unauthorized person while Biometric traits can't be stolen by others.

Wednesday, January 29, 2020

ADVANCED FACIAL RECOGNITION USING ARTIFICIAL INTELLIGENCE

Puneetha.DS
2 nd year BCA NCMS 


Security plays an important role in all sectors. Security can be provided by using biometric
system such as fingerprint, palmprint etc. But when compared to other biometric facial
recognition has distinct pros because of its noncontact process. Even human face is unique with
their own facial features so we can use human face as key to security.
Over the years there were many methods to implement facial recognition model but thanks to
artificial intelligence. It made our life easier using deep learning. In this paper we are going to
use local binary pattern histogram (LBPH) algorithm. Facial algorithm is a cable of uniquely
identifying a person by comparing and analyzing patterns based on persons facial contours. It
contains some pros like improved security and fully automated. It is used in the fields like voter
verification, government use etc. Recently it is used in Facebook in order to tag photos with
friends. It contains some cons like it cannot find difference between identical twins.
Facial recognition is an emerging technology that can provide many benefits. It can save
resources and time and even generate new income streams for companies.

Tuesday, January 28, 2020

Analog Mode – Interfacing Soil Moisture Sensor and Arduino

Rakshith S
6th Sem BCA, NCMS



Working of Sensor
The soil moisture sensor consists of two probes which are used to measure the volumetric content of water. The two probes allow the current to pass through the soil and then it gets the resistance value to measure the moisture value.
When there is more water, the soil will conduct more electricity which means that there will be less resistance. Therefore, the moisture level will be higher. Dry soil conducts electricity poorly, so when there will be less water, then the soil will conduct less electricity which means that there will be more resistance. Therefore, the moisture level will be lower.
This sensor can be connected in two modes; Analog mode and digital mode. First, we will connect it in Analog mode and then we will use it in Digital mode.
Analog Mode – Interfacing Soil Moisture Sensor and Arduino
To connect the sensor in the analog mode, we will need to use the analog output of the sensor. When taking the analog output from the soil moisture sensor FC-28, the sensor gives us the value from 0-1023. The moisture is measured in percentage, so we will map these values from 0 -100 and then we will show these values on the serial monitor.
You can further set different ranges of the moisture values and turn on or off the water pump according to it.
Circuit Diagram
The connections for connecting the soil moisture sensor FC-28 to the Arduino are as follows.
  • VCC of FC-28 to 5V of Arduino
  • GND of FC-28 to GND of Arduino
  • A0 of FC-28 to A0 of Arduino
CIRCUIT DIAGRAM

Arduino Code
int sensor_pin = A0; // Soil Sensor input at Analog PIN A0


int output_value ;

void setup() {

   Serial.begin(9600);

   Serial.println("Reading From the Sensor ...");

   delay(2000);

   }

void loop() {

   output_value= analogRead(sensor_pin);

   output_value = map(output_value,550,0,0,100);

   Serial.print("Mositure : ");

   Serial.print(output_value);

   Serial.println("%");

   delay(1000);

   }
Code Explanation
In the loop function, we will read from the sensor analog pin and will store the values in the “output_ value” variable. Then, we will map the output values to 0-100, because the moisture is measured in percentage. When we took the readings from the dry soil, then the sensor value was 550 and in the wet soil, the sensor value was 10. So, we mapped these values to get the moisture. After that, we printed these values on the serial monitor.In the setup function, the “Serial.begin(9600)” command will help in communication between the Arduino and serial monitor. Then, we will print the “Reading from the Sensor …” on the serial monitor.

Usage of arduino with soil moisture


Arduino Ide serial monitor output readings




Saturday, January 25, 2020

Codding Question for the Week -3

Program to print following character pyramid
x




Note:

  • Write a code in any programming language.
  • Solution should be submitted on or before 29/01/2020 with explanation
  • First 5 students who will submit the solution earlier  will be considered as winners.
  • Name of the winners will be displayed on NOTICE board by next Wednesday.

Android Mobile Operating System

Rukba Firdose

BCA 2nd Year E2




Android is a software stack for mobile devices that includes an operating system the Android
open source project (AOSP) is tasked with the maintenance and further development of
android. The android operating system is the world’s best-selling smart phone platform.
Android has a large community of developers writing applications (“apps”) that extend the
functionality of the devices. There are currently over 2,50,000 apps available for android.
Android market is the online app store run by google. The unveiling of the android distribution
on 5 th November 2007 was announced with the founding of the open handset. The android
open-source software stark consists of java applications running on a java based object
oriented applications framework on top of java core, libraries written in C include the surface
manager, SQlite relational database management system, the android operating system
includes the linux kernel 2.8 millon lines of C, 2.1 million lines of java and 1.75 million lines of
C++.

Wednesday, January 22, 2020

CYBER CRIME

BRAJITH KUMAR H C

2nd Year BCA, NCMS









Nowadays computer technology is growing drastically along with millions of users also getting benefited. People are using many devices or gadgets to make life simple. Developing in technology helps in connecting people to the world, but misuse of technology in cyber world causes cybercrimes. Basically cybercrime defined as criminal activities which happen over the internet by the people for their personal benefits. Following examples are some of the cyber-attacks such as malware, fraud, virus scripts, remote access Trojan’s etc. The only secured computer is in the world that is powered off. The intention of my paper is not to blame this growing technology rather to create awareness among people which helps to reduce cybercrimes. With AI, systems can be developed to search for security flaws and detect solutions in real time. AI can help cyber security analysts to detect and analyse high risk incidents and to investigate threats. There are many corporations uses block chain security based applications to prevent data from several cyber-attacks. Cybercrimes has become big threat to cyber security which means protecting programs, data and information from unauthorized access.

Wireless communication under the water.

Pallavi.S.
2nd Year BCA
NCMS


Under water wireless communication (UOWC). It is very inexpensive submarine
communications it presents numerous similarities compare to free space opitical(FSO).
Satellite links mainly due to the fact that they provide optical wavelengths to transfer secure
information between dedicated point to point links in this networks are feasible and it is easy
to operate at high data rates for medium distance upto a 100mts. information transfer is of
great interest to the military, industry, and the scientific community, as it plays an important
role in tactical surveillance, pollution monitoring, oil control and maintenance, off shore
explorations, climate change monitoring, oceanography research. In order to facilitate all
these activities, there is an increase in number of unmanned vehicles or devices deployed
under water, which requires band width and high capacity for information transfer
underwater. Although tremendous progress as been made in the field of acoustic
communication underwater, however it is limited by bandwidth. All these has led to the
proliferation of underwater optical wireless communication(UOWC), As it provides higher
data rates than the traditional acoustic communication systems with significantly lower power
and consumption and simpler computational complexities for short range wireless links. In
this paper, the main focus is to understand the feasibility and the reliability to high data rate
underwater optical links due to various propagation phenomena that impact the performance
of the system.


Do it yourself-1

Reading Temperature- Humidity DHT-11 Sensor using Arduino Uno

by
Likith. R - BCA 2nd YEAR, NCMS

Components Required 

  • Arduino UNO & Genuino UNO
  • DHT11 Temperature & Humidity Sensor (3 pins)
  • Jumper wires (generic)
  • Breadboard (generic)
  • Arduino UNO USB 2.0 Cable 2.0

Circuit

Steps 
Step 1: place the DHT11 sensor on the bread board.
• Step 2: connect the DHT11 sensor by using jumper wires as follows to the Arduino uno board.
• i> connect the 5v to the +ve pin of sensor using male to male jumper wire.
• ii> connect the A0 to the OUT pin of Sensor by male to male jumper wire.
• iii> leave the 3rd pin free.
• iv> connect the -ve pin to the ground using male to male jumper wire.
• Step 3: upload the code to the Arduino uno board.
• step 4: you will be able to view the temperature and humidity in tools > serial monitor or press ctrl+shift+M.

Code:

#include <dht.h>
#define dht_apin A0 // Analog Pin sensor is connected to
dht DHT;
void setup(){
  Serial.begin(9600);
  delay(500);//Delay to let system boot
  Serial.println("DHT11 Humidity & temperature Sensor\n\n");
  delay(1000);//Wait before accessing Sensor
}//end "setup()"
void loop(){
  //Start of Program 
    DHT.read11(dht_apin);
    
    Serial.print("Current humidity = ");
    Serial.print(DHT.humidity);
    Serial.print("%  ");
    Serial.print("temperature = ");
    Serial.print(DHT.temperature); 
    Serial.println("C  ");
    
    delay(5000);//Wait 5 seconds before accessing sensor again.
  //Fastest should be once every two seconds.
}// end loop()

Link to download dht library - https://www.brainy-bits.com/dht11-tutorial/


Result



Puzzle-2

Puzzle question for the week


Five friends have their gardens next to one another, where they grow three kinds of crops: fruits (apple, pear, nut, cherry), vegetables (carrot, parsley, gourd, onion) and flowers (aster, rose, tulip, lily).
1. They grow 12 different varieties.
2. Everybody grows exactly 4 different varieties
3. Each variety is at least in one garden.
4. Only one variety is in 4 gardens.
5. Only in one garden are all 3 kinds of crops.
6. Only in one garden are all 4 varieties of one kind of crops.
7. Pear is only in the two border gardens.
8. Paul's garden is in the middle with no lily.
9. Aster grower doesn't grow vegetables.
10. Rose growers don't grow parsley.
11. Nuts grower has also gourd and parsley.
12. In the first garden are apples and cherries.
13. Only in two gardens are cherries.
14. Sam has onions and cherries.
15. Luke grows exactly two kinds of fruit.
16. Tulip is only in two gardens.
17. Apple is in a single garden.
18. Only in one garden next to Zick's is parsley.
19. Sam's garden is not on the border.
20. Hank grows neither vegetables nor asters.
21. Paul has exactly three kinds of vegetable.
               Who has which garden and what is grown where?

Note:


  •   Solution should be submitted on or before 28/01/2020
  •   First 5 students who submit the solution earlier with explanation will be considered as winners.
  • Name of the winners will be displayed on NOTICE board by next Wednesday.


Tuesday, January 21, 2020

Winners of Answer this if you can-1

Winners Names:

  • Anand SD- 2nd Year B.Sc(P.M.E)
  • Nagendra GN -2nd Year B.Sc(P.M.E)

Rakshith S-Certified Ethical Hacker

BCA 3rd Year Student Rakshith S has successfully completed all requirements and criteria for Certified Ethical Hacker certification through examination administrated by EC-Council    

Winners of Puzzle-1

Winners Name:


  • Varshini(BCA, E2)
  • Puneetha (BCA, E2)
  • Sneha (1st BSc-P.M.E)
  • Sushmita (1st BSc-E.M.Cs)

Answer to the Puzzle 1:
1. 3 digit number-: any three digit number
2. Odd number: so the last digit must be 1,3,5,7 or 9
3. Divisible by 5: so last digit must be 5 (odd number)
4. Each digit different:
5. Digits add up to 8: as the last digit is 5, the hundreds and  tens must add up to 3.
    They  could  be 3 and 0 or 2 and 1.
6. Tens digit smaller than hundreds digit: so it must be 305 or 215.
7. Less than 300: the number must be 215

Winners of the Week-2: Coding Question

Winners Name:


  • Lakshmi N-BCA 3rd sem E1  
  • Vaishnavi M R- BCA 3rd sem E2.

Thursday, January 16, 2020

Answer this if you can!!!


Question for the week

Question 1: When you shake up a bucket with apples of different size the largest apple will appear on the top.
Why?
Question 2: The flame of a candle is sharp at the top.
Why?

NOTE:



 
  •      Solution should be submitted on or before 21/01/2020
  •      First 5 students who submit the solution earlier with explanation will be considered as winners.
  •      Name of the winners will be displayed on NOTICE board by next Wednesday.

Puzzle-1


Puzzle question for the week


Puzzle1:  

  • How many am I?
  • I am a three digit number.
  •  I am an odd number.
  •   I am divisible by 5.
  •    Each of my digits is different.
  •    My digits add up to 8.
  •  The tens digit is smaller than the hundreds digit.
  •      I am less than 300.
  •     I have only one even digit.

Note:

  •   Solution should be submitted on or before 21/01/2020
  •   First 5 students who submit the solution earlier with explanation will be considered as winners.
  • Name of the winners will be displayed on NOTICE board by next Wednesday.


Tuesday, January 14, 2020

Winners of the Week-1: Coding Question

Winners Name:

  • Saba Afreen - BCA 2nd Sem(D2)
  • Lakshmi - BCA 4th Sem(E1)
  • Nandhini D- BCA 4th Sem(E2)

Coding Question for the Week

Coding Question for the Week

Problem Statement 2: To toogle all the characters in a string


Note:

  • Write a code in any programming language.
  • Solution should be submitted on or before 21/01/2020 with explanation
  • First 5 students who will submit the solution earlier  will be considered as winners.
  • Name of the winners will be displayed on NOTICE board by next Wednesday.

Thursday, January 9, 2020

Guest Talk On Artificial Intelligence

Department of Science Under NCMS Science forum-"Pragyan" organised a guest talk on 
 "How Applied Mathematics is Used In Artificial Intelligence"

Resource Person
Mr. Thamme Gowda
Research Scholar
UNiversity of California, USA



Tuesday, January 7, 2020

Coding Question for the Week

Coding Question for the Week

Problem Statement 1: To check if two numbers are equal, (without using arithmetic operators or comparison operators).



Note:

  • Write a code in any programming language.
  • Solution should be submitted on or before 14/01/2020 with explanation
  • First 5 students who will submit the solution earlier  will be considered as winners.
  • Name of the winners will be displayed on NOTICE board by next Wednesday.



AI IN CRYPTOGRAPHY

Written by: PALLAVI V (Final year BCA) 1.     ABSTRACT: The integration of AI in Cryptography represents a significant advancement in ...