Skip to main content

Posts

Featured Post

Emotional and Psychological Trauma

Recent posts

IMPULSE CAPTURE CAMERA Overview Part-1

  Objective The Android camera platform designed in this project can turn its direction Manually using Button. If a person claps hands, then it will Detect and Impulse and capture the Moment this Device will capture multiple photos if more than one claps detected. It will not only detect clap sound it can detect any kind of noise and starts capturing the photos. The system which we have detected can distinguish between n oise and impulse sound.    Motivation When we travel alone, it can be inconvenient to take pictures with yourself in it. Often, we have to hold the camera with our hands and capture a close photo with barely background. In a better case, we still need to pre - set a short timer, which requires us rushes back from the camera. Therefore, we came up with platform that uses microphones to detect clap direction and ATmega 32 microcontroller with servo motor to control the camera and earpod t o shutter. This design makes selfie much more easier and convenient since all you

Capstone Work: Experience setting up LAMP Infrastucture

    The “L” of the LAMP stack is achieved by instantiating an Ubuntu server on the Azure platform. By and large this process is straight-forward and follows the Azure provided instructions. As this is documented in Microsoft documentation, this will not be reproduced here.     In our tests, we chose an Ubuntu 18.04 image and deployed it on a Standard B1ms (1 vcpus, 2 GiB memory) virtual machine. We chose the B1ms VM because the B-series VMs seem to provide “burstable performance” (Shimanskiy & Hughes, 2020). Here is an excerpt of the Microsoft Document on the B-series VMs:     Part of the challenge of using the Azure platform is that we had to be very deliberate in the chosen specifications relating to VMs as these decisions will have financial impacts. Azure offers various sizes of General Purpose, Compute-Optimized, Storage-Optimized, Memory-Optimized, GPU, and High Performance Compute VMs. As our web server did not require any specific features, we stayed in the General

What is Public key Infrastructure(PKI)?

Wiki Page Definition      A public key infrastructure ( PKI ) is a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption. The purpose of a PKI is to facilitate the secure electronic transfer of information for a range of network activities such as e-commerce, internet banking and confidential email. It is required for activities where simple passwords are an inadequate authentication method and more rigorous proof is required to confirm the identity of the parties involved in the communication and to validate the information being transferred. Ref: https://en.wikipedia.org/wiki/Public_key_infrastructure Major Keywords Definitions Certificate Authorities Certificate Authority also acronym as "CA" is trusted third party which authorize the identities of websites, web server, Individual Software and other entities. They Issue Digital Certificate which em

Education is an Key Inventory of Life

     There are different Definitions for Education in Society and Social Science. According to Marxist, Purpose of Formal Education is “the transmission of certain attitudes, knowledge and skills to the members of a society through formal systematic training”. Education is immensely important in the 21st Century, but it’s not necessary for someone to become successful and earn more money. However, Education plays vital roles in getting white collar job with good wages in co-operate worlds. Money can bring fame but Education is required to maintain fame gained over the time. Which leads to Moral learnings we learned in elementary to high school. Most basic learnings we gained from our elementary schooling is how to respect the elders and behave with them. As we grew up we practiced those moral values in our day-to-day life while attending meetings, helping the needy community during the crisis like COVID-19 pandemic. One should take inspiration from Ratan Tata chairperson of Tata Group

How is Data Management Strategy plays key role in Securing Financial database?

Sensitivity of data       Some database contains what is called sensitive data. As a working definition sensitive data are data which cannot be made public. Determining which field and entities are sensitive based on individual database and underlying meaning of data. There are two category of databases nothing sensitive and completely sensitive. Some of the example of nothing sensitive database is public library digest, Movies database and many more. However, there are very few databases completely sensitive such as financial database, defence database and partial co-operate databases.       This Blog mainly focus on financial database so let’s investigate some simple entity relation diagram just related to customer account. Basic Customer account table entities carries name, Address, type of account, Account Number and many more sensitive fields. Which can be used to grant access to credit card or health details from authorized stakeholders. ER Diagram of Simple Financial