#aissms polytechnic
Explore tagged Tumblr posts
aissmseducation · 4 years ago
Text
Conducting Practical Sessions In Online Mode: Opportunity For Value Addition
Most of the teachers like me might conduct practical sessions for science and technology courses in online mode now. Pandemic made this happen. Shall we thank pandemic for such an opportunity or keep cursing? It is all dependent on how one looks at it. Early discussions were centered on why not do it? What are the limitations and how it will affect a teaching-learning process? Very few attempted to develop content for practical sessions for the subjects, which need experimentations using materials, tools, equipment, and test setups. Whether this was really new and never seen before for others? No. It’s quite known to most of the teachers and many of us had attended at least few sessions during our academic or professional career. The next question is whether we are scared of the usage of technology or incompetent to handle it? Not at all. Whether we teachers are scared about delivering content online? No again.
Practical conduct is always thought of as verification of concept taught in theory and establishing the truth, affirming it. The method usually follows demonstration by teachers and then experimentation by students under given sets of parameters and constraints. Output is usually proof or trend of a particular process or to understand the effect of some material or process. Practical is ideally expected to be carried out by an individual student, in reality, it is carried out as a group activity. Naturally, some members of the group are passive, not doing anything. Another way round, one can say, the system including teacher failed to generate the interest, for whatsoever reason.
The real issue in online conduction is more of psychological nature and mindset. It is hidden in a way, our generation brought up and the way we communicate, interact with each other and students. We always like the audience in front of us and expect to express and interact. MUTED mike and OFF Video miss the bus for communication. Many times, it is claimed even by eminent, that practical must be physically conducted. Agree with it. But, when the situation does not allow you to conduct so, you cannot stop. As time never waits and one has to ready for the alternatives, what matters is to be receptive and tune ourselves with the situation. See the opportunity in it.
📷
📷
Example 1 : Simulation of Electronic Circuit
Example 2 : Simulation of Network Topology
When you are conducting it in online mode and internet connectivity, the availability of simulation software is not an issue, the real challenge is to understand and practice the method. I had displayed two such examples of electronic circuit of operational amplifier and CISCO packet tracer – STAR network for easy reference. Replicate what we do in physical conduction mode. A better part of this is, we can record and reproduce it, as required. Quite easy to set and tune, as everything is virtual. There is minimum risk of breakages and no fear of an accident. No need to run from pillar to post and pick and place bulky equipment. On top of this, everybody is doing it independently. It becomes a must-do activity and no member can be passive. If everyone practices it, is a boon. One can do repetitions and all possible combinations, at his time and pace. The entire setup is in your system and just a click away, apply innovative methods explore all possible limits. A complete video journal can also be created out of this for records and evaluation purposes. If stressed further, more opportunities for adding value to the subject matter can be explored. Institutes of repute are already doing this. Now it’s our turn, a pandemic had provided the opportunity, let’s grab it and flourish the teaching-learning process.
Manisha Talware
Lecturer in EJ/IS,
AISSMS’s Polytechnic
0 notes
aissms-organisation · 4 years ago
Text
Medical Store Automation - AISSMS Polytechnic
Tumblr media
One of the top Polytechnic College, AISSMS Polytechnic has got their research paper published in International Research Journal of Engineering & Technology. The system  presented in this paper play an important role in health care. Implemented “automatic drawer opening system or cabinet system with stock inventory”. The main objective is to find the place of the required medicine by automatically opening that drawer to save time in searching.
0 notes
aissms-organisation · 4 years ago
Text
Detection of false Injection Attack - AISSMS Polytechnic
Tumblr media
One of the best Polytechnic College, AISSMS Polytechnic has got their research paper published in International Research Journal of Engineering & Technology. This paper explains about False injection attack is  implemented within in sub-network mistreatment camera. Whenever the external person redirects into server that point server can find so apprize to admin regarding within attack.
0 notes
aissms-organisation · 4 years ago
Text
Pseduo News Detection Using Machine Learning - AISSMS Polytechnic
Tumblr media
One of the best Polytechnic College, AISSMS Polytechnic has got their research paper published in International Research Journal of Engineering & Technology. This paper helps us to identify the precision of the forgery article using Machine Learning Algorithm.
0 notes
aissms-organisation · 4 years ago
Text
Door Lock Control using Wireless Biometric - AISSMS Polytechnic
Tumblr media
One of the best Polytechnic College, AISSMS Polytechnic has got their research paper published in International Research Journal of Engineering & Technology.
In this paper, proposed fingerprint scanning system is unique and quick to understand fingerprints that enable user interaction and provide strong security.
0 notes
aissms-organisation · 4 years ago
Text
Lost Humanity in Corona
Tumblr media
As important as the fight against Corona is, it is just as important to give each other mental strength and support. Mrs. Rohini Gurav from AISSMS Polytechnic, one of the best polytechnic college in pune share her thoughts in an article about lost humanity in corona.
0 notes
aissms-organisation · 6 years ago
Text
Electronics & Telecommunication Engineering | AISSMS Polytechnic
Tumblr media
Can we see our day-to-day life without mobile phones, TV, Digital Watches, Computer, Internet banking, ATM, Head Phones, Internet Connection, Microwave Ovens, Countless gadgets & Communication Systems,No, We Can’t ! all this is possible due to electronics & Telecommunication Engineer.The chief driving strength for the current time Information Technology uprising is the expansion in Electronics Engineering. The progress in microelectronics, satellite and optical fiber technology, analog and digital, in communication techniques have given rise to emerging complex electronics devices, circuits and equipment are proficient of employing extravagant and efficient telecommunication systems.So the opportunity for electronics engineers in the approaching years is not going to come down, then again what will be the most interesting principles, is the talent of engineers that the businesses expect. With extra technological progress, industries of now are challenging engineers who are more hands-on and can support instantly in their procedure without wanting to spend time & resource on training.Read More At http://aissmspoly.org.in/electronics-telecommunication-engineering-is-one-of-the-common-engineering-branches-out-there/
0 notes
aissms-organisation · 6 years ago
Text
Is Peer Pressure Is Harmful or Beneficial To an Individual | AISSMS Polytechnic
Tumblr media
The changing ways of life, of our peers, often forces us to change our ways of looking at life and leading it.
It’s a human tendency to do what the crowd does. The few have the courage to oppose the peer pressure and be the own selves rather than being one among the lot. Peer pressure is affecting most of us, both, positively and negatively.
Peer pressure is useful since it makes us more alert, we can improve own-self and attentive to the happenings around us even the small ones that we might look over but actually be helpful for our knowledge and development.
CLICK HERE TO READ MORE
0 notes
aissms-organisation · 6 years ago
Text
BASALT FIBER REINFORCED CONCRETE INVESTIGATION | AISSMS POLYTECHNIC
Tumblr media
Today a significant growth is observed in  the manufacture of composite material. With this also the energy  conservation, corrosion risk, and sustainability is important when a  product is changed or the new product is manufactured.
Such as the basalt fiber (BF) and basalt rebars are used in reinforced concrete,  which is one of the high-performance non-metallic fibers made from   basalt rock melted at high temperature. By considering the most   effective mechanical properties of basalt fiber there are various   applications such as civil engineering structures where RCC members   required sufficient stability against the loads and stresses developed   into the structures due to the seasonal effects.  Basalt fiber is used   to improve the strength of concrete structures.
In  short, basalt fiber reinforced concrete offers more characteristics   such as light weight, good fire resistance and strength. In future it is  very beneficial for construction industry. Many applications of basalt  fiber are residential, industrial, highway and bridges etc. READ MORE..
0 notes
aissms-organisation · 4 years ago
Link
0 notes
aissms-organisation · 6 years ago
Text
Carrier Opportunities in Industry - AISSMS Polytechnic
Tumblr media
Increasing importance is dependent on soft skills and interview communications. Guest Lecture in top polytechnic college in pune have topics like " Career Opportunities in Industry "helps to enhances personal attributes that enable student to interact well with other people.
0 notes
aissms-organisation · 6 years ago
Text
Best Electronic and Telecommunication Engineering - AISSMS Polytechnic
Tumblr media
Electronics and Telecommunication cover large areas in the field of engineering. Best Electronic and telecommunication engineering colleges discipline where non-linear and active electrical components such as electron tubes, and semiconductor devices, especially transistors, diodes and integrated circuits, are utilized to design electronic circuits, devices and systems.
0 notes
aissms-organisation · 5 years ago
Text
AISSMS Polytechnic - Importance Of Database For Entrepreneurship Or Business
Entrepreneurship or any business plays the most important role to develop economic growth of the country. It is a contributor to product inventiveness and improvement.
Tumblr media
Under Database Maintaining System many small businesses and lots of users use Microsoft Excel or word or Google spreadsheets. Databases can make your business much well-organized and give management valuable perceptions. They help make logic of your information. They can help you make your products and services more valued.
1 note · View note
aissms-organisation · 5 years ago
Text
AISSMS Polytechnic Cricket Team for the Winner of D2 Zone Cricket
Tumblr media
Congratulations...! AISSMS Polytechnic College  Cricket Team for the Winner of D2 Zone Cricket under Inter Engineering Diploma Student Sports Association (IEDSSA) #AISSMS
1 note · View note
aissmseducation · 4 years ago
Text
Machine Learning And Cyber Security
In May of 2017, a horriblecyber-attack knockout more than 200,000 computers in 150 nations over the course of just a rare days. Nicknamed “WannaCry,” it conquered a vulnerability that was main discovered by the National Security Agency (NSA) and later lifted and dispersedaccessible.
It functionedapproximating this: Afterwardsfruitfullybreaking a PC, WannaCry encoded that PC’sarchives and reduced them illegible. In order to improve their confined material, goals of the outbreak were expressed they wanted to purchase superior decryption software. Predict who retailed that software? That’s right, the invaders.
Machine Learning In Cyber security
ML has developed a vibrantskill for cyber security. ML proactivelybrands out cyber terrorizations and boostssafetysubstructure through pattern discovery, actualcyber-crimecharting and fullperception testing.
The purported “ransom ware” barrierexaggeratedpersons as well as bigadministrations, with the U.K.’s NationwideFitnessFacility, Russian banks, Chinese schools, Spanish telecom giant Telefonica and the U.S.-based distributionfacility FedEx. By certainapproximations, entirevictimsloomed $4 billion.Additionalkinds of cyber-attacks, such as “crypto jacking,” are extracrafty and fewerharmful, but quietexpensive. Crypto jacking is a method where cyber-criminals distribute malware on manyPCs or servers. The factotumgrabscontroller of a device’s processing control to pitcrypto currency — a procedure that insatiablyguzzles together computing power and voltage — and formerlydirects that crypto back to the committers.
Even protuberantfirms with vigorous cyber security events aren’t resilient, as disclosed by this 2018 scare at Tesla that was curedcheers to aobservant third-party collection of cyber securityexperts.
Malicious hacks v. machine learning
But in 2018 only, there were 10.5 billion malware attacks. That’s too abundantcapacity for persons to grip. Luckily, machine learning is alternative forcertainloose.
A subclass of artificial intelligence, machine learning practices algorithms intuitive of preceding datasets and numericalexamination to make conventionsaround a computer’s performance. The computer can then amends its activities — and even dojobs for which it hasn’t been openlyautomated.
And it’s been a benefit to cyber security.
Through its capability to sort through lots of records and recognizehypotheticallydangerous ones, machine learning is gradually being cast-off to reveal dangers and habituallysqueeze them beforehand they can causechaos.
Software from Microsoft seeminglyfixedimpartial that in initial 2018. Allowing to the enterprise, cyber crooks used Trojan in an effort “to mountnasty crypto currencydrillers on hundreds of thousands of PCs.”
The attack was immobile Microsoft’s Windows Guardian, software that servicesnumerous layers of machine learning to recognize and slabapparentextortions. The crypto-miners remainedclosed down nearly as rapidly as they started excavating. Here are other instances of Microsoft’s software catching these spasmsprimary.
Crisscrossavailablecorporations that custom ML to strengthen their cyber security systems and keep malware at woof.
Microsoft
Microsoft uses its own cyber securitystage, Windows Defender Advanced Threat Protection (ATP), for precautionaryguard, breakfinding, mechanizedexamination and reply. Windows Defender ATP iserected into Windows 10 strategies, routinely updates and services cloud AI and severalstages of machine learning algorithms to advertdangers.
BlackBerry
BlackBerry, whose web-connected smartphones were once ubiquitous in definiteloops, has turned and currentlyvends software and amenities to largefirms. Amongst the firm’s specialisms are cyber security that employs AI and ML to stopcyber securityextortions and industrializecustomers’dangerretortcompetences. In November 2018, BlackBerry acquired AI cyber securitysteadyCylance for $1.4 billion.
Is MLsufficient to halt cybercrime?
ML does certainstuffsactuallyfine, such as rapidly scanning bigquantities of facts and examining it using data. Cyber securitymethodsmakeamounts of facts, so it’s no miracle the expertise is such a beneficialdevice.
“We have additionalfactsaccessible, then the facts is usually telling a story,” Raffael Marty, maininvestigation and intellectmajor at cyber securityfixed Force point, expressesConstructed In. “If you recognizein what way to examine the facts, you should be able to originate up with the deviations after the model.”
And those deviations occasionallydisclosefears. Cheers to that vital function, the use of ML arepouring in numerousareas. It’s working for responsibilities that need image acknowledgement and talkinggratitude. It has even beaten the domain’s top Go actor at his own game.
But while it has enhancedcyber security, Marty says, individuals are tranquilvital.
“There’s this potential that you can just gaze at previous data to forecast the future—overlooking that domain proficiency is actuallysignificant in this reckoning,” he says. “There are crowds of persons who reason you can studyall from the data, but that’s merely not factual.”
Over-reliance on AI in cyber security can makeauntrueintellect of security, Marty adds. That’s why, in tallying to sensiblypractical algorithms, his steadyservices cyber securityspecialists, data scientists and psychologists. As with all presentAI, MLcomplements and augments human exertions, rather than substituting them.
Conclusion
Machine Learning methods are broadly useful to resolve several categories of cyber security difficulties. Advances in the arena of machine learning and deep learning compromises auspicious resolutions to cyber security matters. But it is vital to classify which algorithm is appropriate for which application. Complexmethods are needed to keep the explanationstrong against malware outbreaks and to attainextraordinaryuncoveringdegrees. The choice of a specific model plays a vibrantpart in resolvingcyber securitymatters.
Lecturer Computer Department AISSMS’s Polytechnic Pune.
Mrs. Hemlata Ajaykumar Shinde
0 notes
aissmseducation · 4 years ago
Text
Cyber Evolution
📷
“As Cyber Threats Evolve,
We Need To Evolve As Well”
Humans are innately unique from other living beings or machines because of our potentiality to use:
· Communication: Language capability.
· Creativity: Abstract inventiveness.
· Critical Thinking: Reasoning and planning.
A similar thought that arises in every individual’s mind these days – How safe will I be in this Internet-trapped world? How safe is my information online?
The solution to all these questions can be achieved by having information about cybersecurity. Cyber Security will no longer employ as a codicil in the world of information technology. As companies leverage emerging trends and move more toward cloud computing, Cyber Security will become a critical business function and will be an integral business process. Personally Identifiable Information (PII) and Data Protections are real-life concerns that are continuously creeping to the forefront as media coverage of data breaches will affect our trust in brands. Making information security a functional necessity will place a business as a believable entity and ensure efficient delivery of products and services.
· These aspects make cybersecurity an engaging challenge. Ultimately, cybersecurity is a fight between humans.
· With enlightened threats, attackers and defenders use their unique ways of humanness — communication, creativity, and critical thinking — to find methods to achieve their goals. The most ruinous attacks are those that are unexpected.
· In spite of this, we regularly continue to see security defenders push forward with the idea of not just bracing but replacing human beings with Artificial Intelligence and Automation.
📷
Best Ways to Avoid Cybercrime?
While a third of people don’t trust social media companies with their data and 63.5% increase in Cyber Crime cases Post-Digital India Movement, here are a few best practices to keep yourself away from being a victim of Cybercrime.
· Change your passwords regularly.
· Use different passwords for different sites.
· Use complicated passwords which do not consist of dictionary words – Use alphabets and numbers both to set up as passwords (Alpha-Numeric Passwords).
· Make sure any of the old devices are completely destroyed if you don’t consume them anymore.
· People don’t have to become victims; they can actually take some command themselves.
While Cyber Threat is not only a nightmare to common man, it could also be one of the worst nightmares for many renowned MNC’s.
One such victim was Cognizant Technology Solutions Corp. They were impacted by the disruption of client services, revenue, and impact on margins.
On April 18, 2020, Cognizant Technology Solutions (CTS) Corporation, became a victim of the Maze ransomware cyber-attack, which resulted in service disruption of their clients.
The tech giant disclosed the data breach on its website. It took various steps to contain the cybersecurity incident and confirmed its clients about the data breach and effective measures to take to further secure their systems.
Throughout a ransomware data breach attack, attackers generally fill the company’s systems with the virus, purloin the data, and demand a certain ransom amount from the company to reinstate the data. But, in the case of the Cognizant Maze ransomware cyber-attack, attackers intimidated the company to pay the ransom amount or they would spread the breached information online.
Later, in May, CTS revealed that it paid a ransom amount of $50-70 million to cyber attackers to reinstate its services.
While we see an increase in cybercrime in our day-to-day lives it also creates more opportunities for budding aspirants to build their careers in the same.
The question is how well can you keep yourself updated with the latest trends and how securely can you make the experience user-friendly amongst the generations?
Go Give it a try!!
Author
Mr. Farhan Attar,
Third Year, Information Technology AISSMS Polytechnic
0 notes