Wednesday, August 11, 2021

Code of ethics

  

Software Engineering Code of Ethics

 

Software engineers shall commit themselves to making the analysis, specification, design, development, testing and maintenance of software a beneficial and respected profession. In accordance with their commitment to the health, safety and welfare of the public, software engineers shall adhere to the following Eight Principles:

1. PUBLIC – Software engineers shall act consistently with the public interest.

2. CLIENT AND EMPLOYER – Software engineers shall act in a manner that is in the best interests of their client and employer consistent with the public interest.

3. PRODUCT – Software engineers shall ensure that their products and related modifications meet the highest professional standards possible.

4. JUDGMENT – Software engineers shall maintain integrity and independence in their professional judgment.

5. MANAGEMENT – Software engineering managers and leaders shall subscribe to and promote an ethical approach to the management of software development and maintenance.

6. PROFESSION – Software engineers shall advance the integrity and reputation of the profession consistent with the public interest.

7. COLLEAGUES – Software engineers shall be fair to and supportive of their colleagues.

8. SELF – Software engineers shall participate in lifelong learning regarding the practice of their profession and shall promote an ethical approach to the practice of the profession.

 

 

Software Engineering Code of Ethics

 

Software engineers shall commit themselves to making the analysis, specification, design, development, testing and maintenance of software a beneficial and respected profession. In accordance with their commitment to the health, safety and welfare of the public, software engineers shall adhere to the following Eight Principles:

PUBLIC

Software engineers shall act consistently with the public interest.

CLIENT AND EMPLOYER

Software engineers shall act in a manner that is in the best interests of their client and employer consistent with the public interest.

PRODUCT

Software engineers shall ensure that their products and related modifications meet the highest professional standards possible

JUDGMENT

Software engineers shall maintain integrity and independence in their professional judgment.

MANAGEMENT

Software engineering managers and leaders shall subscribe to and promote an ethical approach to the management of software development and maintenance.

PROFESSION

Software engineers shall advance the integrity and reputation of the profession consistent with the public interest

COLLEAGUES

Software engineers shall be fair to and supportive of their colleagues.

SELF

– Software engineers shall participate in lifelong learning regarding the practice of their profession and shall promote an ethical approach to the practice of the profession.

 

Sunday, May 9, 2021

Quiz 1 on Module1 of IoT 17CS81

 Before you start solving quiz, make sure that you have gone through the notes of module 1. You have prepared a scanned copy of case study on IoT. 

click the following link to solve quiz

  Link for quiz

 or copy and paste the URL in your browser

https://docs.google.com/forms/d/19G8RXQz7OdkDekFB6QUsqkRSGG5Wp4A_C3rwyt-iZA8/edit?usp=sharing

Case study: IoT impact

Prepare a Case study using Internet Source. The case study shall reflect how IoT has an Impact on the process/operational management and control. Keep it ready befor you attempt Quiz for IOT.

According to a Covid-19 impact in Indian IoT research by Goldstein Market Intelligence, the Indian IoT market is expected to reach USD 1 Trillion in the next 5-7 years, growing at the Compound Annual Growth Rate (CARG) of 17.1%.

With the help of IoT, India has been converting the nation into a digitized state-of-the-art nation, assisting it in improving efficiencies and economies of scale.

Organizations are taking on this investment of smart video surveillance systems to keep a constant check on their enterprise, even if it involves a high price.

Source: https://www.iotforall.com

Few area where they are being used successfully are mentioned below:

  • Inventory management
  • Tracking
  • Internal and external security
  • Efficient environment
  • Monitor multiple branches and ATM units
  • Crime deterrence
  • Asset management
  • Data analytic
  • Remote Access Contro

 

 


Saturday, May 8, 2021

IoT 17CS71 Module 1 Question Bank

Module 1

  1. Define IOT. Explain evolution phase of IOT

  2. Compare IT and OT ? How IoT can play vital role in bridging the gap.

  3. How IoT can impact the society. Explain using a case study of India.

  4. What aspects are important to build an IoT based network architecture.

  5. Explain Architecture of IOT Network with its comparison.

  6. Difference Between IT and IOT also list the challenges of IOT.

  7. With neat diagram explain simplified IOT Architecture.

  8. Explain Concept of IOT data management with diagram.

  9. What is the role of things and Internet in IoT?

  10. What is IoT? Explain components in IoT.

  11. What are the differences between machines in M2M and Things in IoT?

  12. Explain evolutionary phases of the internet.

  13. Illustrate the challenges of IoT and their impact, with any example.

  14. List and explain the challenges and problems that IoT is currently facing.

  15. Explain oneM2M IoT Standardized Architecture with a neat diagram.

  16. Explain the IoT architectural drivers.

  17. With a neat diagram explain the IoTWF standardized architecture.

  18. Explain in detail the expanded simplified IoT architecture.

  19. Explain in detail the communication network layer. Illustrate the various access technologies with respect to distances.

  20. Explain the 2 types of gateway and backhaul sublayers.

  21. With a neat diagram explain the fog computing model along with its defining characteristics.

  22. What is edge computing? Explain with example.

  23. Illustrate the hierarchy of edge, fog and cloud with a neat diagram.


Friday, April 23, 2021

 

ALGORITHMS AND DATABASE MANAGEMENT SYSTEMS LABORATORY    

Course Code:  20SCSL16

 

1.       Program to implement Ford-Fulkerson method

2.       Program to implement Naive algorithm.

3.       Program to implement Rabin - Karp algorithm.

4.       Program to implement Boyer – Moore algorithm.

5.       Program to implement Monte Carlo algorithm.

 

1.       Develop a database application to demonstrate storing and retrieving of BLOB and CLOB objects.

a. Write a binary large object (BLOB) to a database as either binary or character (CLOB) data, depending on the type of the field in your data source. To write a BLOB value to the database, issue the appropriate INSERT or UPDATE statement and pass the BLOB value as an input parameter. If your BLOB is stored as text, such as a SQL Server text field, pass the BLOB as a string parameter. If the BLOB is stored in binary format, such as a SQL Server image field, pass an array of type byte as a binary parameter.

 b. Once storing of BLOB and CLOB objects is done, retrieve them and display the results accordingly

program uses MySQL PHP. (installed through XAMPP)

Start Apache and Mysql using XAMPP control

store PHP files in XAMPP/htdocs

Store image file in htdoc folder

db.php

insert.php

listimage.php

Open php file in local browser

database output_images(

imageIdtinyint(3)
imageTypevarchar(25)
imageDatamediumblob
 )

 2.       Develop a database application to demonstrate the representation of multi valued attributes, and the use of nested tables to represent complex objects. Write suitable queries to demonstrate their use. Consider Purchase Order Example: This example is based on a typical business activity: managing customer orders. Need to demonstrate how the application might evolve from relational to object-relational, and how you could write it from scratch using a pure object-oriented approach.

 a. Show how to implement the schema -- Implementing the Application under the Relational Model -- using only Oracle's built-in data types. Build an object-oriented application on top of this relational schema using object views

Solution using Oracle 11g Express edition 

 

 

3.        Design and develop a suitable Student Database application by considering appropriate attributes. Couple of attributes to be maintained is the Attendance of a student in each subject for which he/she has enrolled and Internal Assessment Using TRIGGERS, write active rules to do the following:

a.         Whenever the attendance is updated, check if the attendance is less than 85%; if so, notify   

the Head of the Department concerned.

b.        Whenever, the marks in an Internal Assessment Test are entered, check if the marks are

less than 40%; if so, notify the Head of the Department concerned.

 

Thursday, April 22, 2021

  

INTERNET OF THINGS TECHNOLOGY

[As per Choice Based Credit System (CBCS) scheme]

(Effective from the academic year 2017 - 2018)

SEMESTER – VIII                                        IA Marks 40                                        Exam Marks 60

Subject Code  17CS81                                                                       Number of Lecture Hours/Week 04

Total Number of Lecture Hours 50                 Exam Hours 03                       CREDITS – 04

Module – 1                                                                                                                              10 Hours

What is IoT, Genesis of IoT, IoT and Digitization, IoT Impact, Convergence of IT and IoT, IoT Challenges, IoT Network Architecture and Design, Drivers Behind New Network Architectures, Comparing IoT Architectures, A Simplified IoT Architecture, The Core IoT Functional Stack, IoT Data Management and Compute Stack.

 

Module – 2                                                                                                                              10 Hours

Smart Objects: The “Things” in IoT, Sensors, Actuators, and Smart Objects, Sensor  Networks, Connecting Smart Objects, Communications Criteria, IoT Access Technologies.

 

Module – 3                                                                                                                              10 Hours

IP as the IoT Network Layer, The Business Case for IP, The need for Optimization, Optimizing IP for IoT, Profiles and Compliances, Application Protocols for IoT, The Transport Layer, IoT Application Transport Methods.

 

Module – 4                                                                                                                              10 Hours

Data and Analytics for IoT, An Introduction to Data Analytics for IoT, Machine Learning, Big Data Analytics Tools and Technology, Edge Streaming Analytics, Network Analytics, Securing IoT, A Brief History of OT Security, Common Challenges in OT Security, How IT and OT Security Practices and Systems Vary, Formal Risk  Analysis Structures: OCTAVE and FAIR, The Phased Application of Security in an Operational Environment

 

Module – 5

IoT Physical Devices and Endpoints - Arduino UNO: Introduction to Arduino, Arduino UNO, Installing the Software, Fundamentals of Arduino Programming.  IoT Physical Devices and Endpoints - RaspberryPi: Introduction to RaspberryPi, About the RaspberryPi Board: Hardware Layout, Operating Systems on RaspberryPi, Configuring RaspberryPi, Programming RaspberryPi with Python, Wireless Temperature Monitoring System Using Pi, DS18B20 Temperature Sensor, Connecting Raspberry Pi via SSH, Accessing Temperature from DS18B20 sensors, Remote access to RaspberryPi, Smart and Connected Cities, An IoT Strategy for Smarter Cities, Smart City IoT Architecture, Smart City Security Architecture, Smart City Use-Case Examples

 

Course Outcomes: After studying this course, students will be able to:

·          Interpret the impact and challenges posed by IoT networks leading to new architectural

  models.

·          Compare and contrast the deployment of smart objects and the technologies to connect them

  to network.

·          Appraise the role of IoT protocols for efficient network communication.

·          Elaborate the need for Data Analytics and Security in IoT.

·          Illustrate different sensor technologies for sensing real world entities and identify the

      applications of IoT in Industry.

Text Books:

 

1. David Hanes, Gonzalo Salgueiro, Patrick Grossetete, Robert Barton, Jerome Henry,"IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things”, 1 st Edition, Pearson Education (Cisco Press Indian Reprint). (ISBN: 978-9386873743)

2. Srinivasa K G,Internet of Things,CENGAGE Leaning India, 2017

Reference Books:

 

1. Vijay Madisetti and ArshdeepBahga, “Internet of Things (A Hands-on-Approach)”,  1 st      

     Edition, VPT, 2014. (ISBN: 978-8173719547) (good illustration with examples for practical IoT approach) 

2. Raj Kamal, “Internet of Things: Architecture and Design Principles”, 1 st Edition,McGraw

    Hill Education, 2017. (ISBN: 978-9352605224)

Tuesday, February 2, 2021

 Final  marks after 3 test and assignment evaluated for 10 marks

If you find any discrepancy contact dhananjay.maktedar@gmail.com

mbno 9448754514

check your marks do not edit 

 Code of ethics