Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Software Development: Exposys Data Labs - (Project Sheet)

Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

EXPOSYS DATA LABS-(PROJECT SHEET)

Software Development
DESCRIPTION
Let us consider a case where the user sends a text or file from his phone to his
friend. The risk of the data being accessed by a third party is high when the data
enters the cloud platform. Hence a new method to secure the messages/file is to
be done either by building a new algorithm or by modifying the existing one
which can give more security and consume less time. The identity of the user
must also be verified by using the authentication, verification and validation
methodologies.

Tasks:
1. Try to build or change an existing algorithm to secure message send by the user
based on efficiency.
2. Confirm the identity of the user by entity authentication using verification and
validation.
Contestants should use python and ML to perform this Task.

IOT Projects:
DESCRIPTION
Morse code has been employed as an assistive technology, helping people with
a variety of disabilities to communicate. Morse can be sent by persons with
severe motion disabilities, as long as they have some minimal motor control. An
original solution to the problem that caretakers have to learn to decode has been
an electronic typewriter with the codes written on the keys.
Morse code can also be translated by computer and used in a speaking
communication aid. An important advantage of Morse code over row column
scanning is that once learned, it does not require looking at a display. Also, it
appears faster than scanning.
Task:
Encryption and Decryption between users in Morse using a Flashlight.
Steps:
1. Write a code to encrypt text to Morse.
2. Create a link (program or interface (no external components)) between Morse
and a flashlight and that should blink with respective to Morse.
3. Create another program to record the flash and that flash-toggling should be
again reconverted into Morse and then decrypted into text.

Contestants can use python (or) Java languages to perform this Task.

Full-Stack Developer
DESCRIPTION
The Distributed Denial of Service (DDoS) attack is an attack poses a server threat
to the internet. It is difficult to find the exact sign of attacking. Moreover, it occurs
when a huge number of users occasionally access the target at the same time.
Using the entropy computing you should find the accuracy of an attack.

TASK
Write a program using entropy computing to detect DDOS attack.
Steps:
1.Create a algorithm for sending data packets to the server.
2.Find Accuracy.
Data Science:
DESCRIPTION
Diabetes is a type of chronic disease which is more common among the
people of all age groups. Predicting this disease at an early stage can help
a person to take the necessary precautions and change his/her lifestyle
accordingly to eitherprevent the occ
occurrence
urrence of this disease or control the
disease(For people who already have the disease).

Task:
1. Prepare the data-set
set using several methods to train the model.
2. Build a model which can give high accuracy of predicting the disease.

Android app Developer:

- An App based on the common interests

Let’s assume if you like Football or Cricket so much and you can find
some unknown having the same interests.

You can send Hello to him/her and can chat as well. Fantastic. Let’s
Jump into the Project Ideas
 You can Select the Interest from the menu
 Find the person with the common interests and send him Hello request
 You can get so much information about your interests.
 Chat with Friends

You can build this App using Android Studio.


Cyber Security:
1) Encryption of Image Using Triple DES
In today’s world almost all digital services like internet communication, medical
and military imaging systems, multimedia system needs a high level security.
There is a need for security level in order to safely store and transmit
digital images containing critical information. This is because of the faster
growth in multimedia technology, internet and cell phones. Therefore there is a
need for image encryption techniques in order to hide images from such aattacks.
In this system we use Triple DES (Data Encryption Standard) in order to
hide image.Such Encryption technique helps to avoid intrusion attacks.

Language : Python Programming

Digital Marketing

1. Create your own strategy to promote a company around India.


Examples: Companies like transportation/any start
start-ups/college/training
ups/college/training
institute/product-oriented promotion
Content Writer
Task:

Create a content strategy for a client/product


 Keyword density.
 Meta Tags
 Body Tags
 Alt Tags
 URL Structure
 Internal/External linking
Web Development
Task:

Create a Multi-Page
Page Responsive Website.

1. Create your own strategy to promote a company around India.

Examples: Companies like transportation/any start-ups/college/training


ups/college/training
institute/product-oriented promotion.
Example2: How can you promote the following links you can show as a Reference toother
companies.

SocialLinks:
www.exposysdata.com
https://www.youtube.com/channel/UCCdSuhhzWqmj9h9
youtube.com/channel/UCCdSuhhzWqmj9h9
uyEl-JSA
https://www.facebook.com/Exposysdatalabs/
ebook.com/Exposysdatalabs/
https://www.linkedin.com/compa
/www.linkedin.com/company/13574296/admin/
https://www.instagram.com/exposysdatalabs/
gram.com/exposysdatalabs/

1. Meta Tags
a) Body Tags
b) Alt Tags
c) URL Structure
d) Internal/External linking

Photography/Short
Short film Maker/Ad Maker:
1. Create Ad for Promotional purpose:

Usecase:

Take Exposys Data Labs Virtual internships Info


Information
rmation create Short video for
Promotions. Meanwhile apply your creativity make Advertisement
1. Collect Across india Engineering college Deatails which includes total 28 States.
1. Andhra Pradesh 19. Odisha
2. Arunachal Pradesh 20. Punjab
3. Assam 21. Rajasthan
4. Bihar 22. Sikkim
5. Chhattisgarh 23. Tamil Nadu
6. Goa 24. Telangana
7. Gujarat 25. Tripura
8. Haryana 26. Uttar Pradesh
9. Himachal Pradesh 27. Uttarakhand
10. Jharkhand 28. West Bengal
11. Karnataka A. Andaman and Nicobar Islands
12. Kerala B. Chandigarh
13. Madhya Pradesh C. Dadra and Nagar Haveli and Daman and Diu
14. Maharashtra D. Jammu and Kashmir
15. Manipur E. Ladakh
16. Meghalaya F. Lakshadweep
17. Mizoram G. National Capital Territory of Delhi
18. Nagaland H. Puducherry
S.No College Principal Principal TPO Name TPO Email
Name Name Email
How to promoto Company Links Like Follow,Share. Youtube Channels and
Subcribe through Pan India/World Wide Using own Stretagies. Examples the
following Links can be Use user Own digital media promotion Stretagies.
2.Come with Solution all Digital media promotion and channels and increasethe
followers.

YouTube
Instagram
Pinterest.
Twitter.
LinkedIn.
Facebook

Social Links:
http://www.exposysdata.com/
https://www.youtube.com/channel/UCCdSuhhzWqmj9h9uyEl
youtube.com/channel/UCCdSuhhzWqmj9h9uyEl-
JSA https://www.facebook.com/Exposysdatalabs/
ebook.com/Exposysdatalabs/
https://www.linkedin.com/compa
/www.linkedin.com/company/13574296/admin/
https://www.instagram.com/exposysdatalabs/
gram.com/exposysdatalabs/

1. Build contacts with potential clients to create new businessopportunities


2. Keep prospective client database updated
3. Make cold calls for new business leads
4. Support in writing new business proposals
5. Maintain knowledge of all product and service offerings of thecompany
6. Arrange meetings for senior management with prospective clients
7. Follow company guidelines and procedures for acquisition ofcustomers, submission
of tenders etc.

You might also like