GICT Certified Blockchain Specialist course is designed to provide an understanding of Blockchain and the decentralized digital currencies (cryptocurrencies)
Find Out More : https://globalicttraining.com/
ATTRIBUTES AND EVALUATION OF DISCUSSION CONTRIBUTIONSDue Date E.docxrosemaryralphs52525
ATTRIBUTES AND EVALUATION OF DISCUSSION CONTRIBUTIONS
Due Date: End of weekly
Percentage of Course Grade: 20%.
Learner Guidelines for Evaluation of Discussion Contributions
All discussion contributions will be read by your instructor each week. The instructor will provide feedback to you regarding your discussion postings. Expecting that every discussion posting and response contain all of the attributes of an exemplary discussion posting is setting a high standard for both you and the instructor. This level of high performance is the standard expected of graduate learners at Capella.
Attributes of an Exemplary Discussion Contribution or Response:
1. The discussion contribution or response clearly addresses the content issue(s) presented by the question.
2. The discussion contribution or response includes the appropriate level(s) of critical analysis.
3. The discussion contribution or response includes pertinent course and disciplinary concepts, theories, or materials, and applies them correctly.
4. The discussion contribution or response provides validation and support by including relevant examples and supporting evidence, as appropriate.
5. The discussion contribution or response stimulates fellow learners to clarify, extend, and strengthen their dialogue.
6. The discussion contribution or response is concise, clearly organized, and well structured.
7. The discussion contribution or response uses grammar, usage, and mechanics expected of graduate level composition and expression.
8. All citations and references adhere to APA 6th edition style.
9. The discussion contribution or response fosters collaboration with fellow learners and communicates in a manner that respects the dignity and integrity of fellow learners and the instructor.
10. The discussion response meaningfully supplements and extends consideration of the topic by including one of more of the following: new information, questions, constructive or corrective feedback, or alternative viewpoints.
For additional details regarding discussion participation and contributions, please consult the Professional Communications and Writing Guide.
Submission UUID: 58593f67-986c-da25-634f-34f2af328387
Originality Report https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/original...
1 of 8 2/14/2020, 4:35 PM
Word Count: 631
Block Chain technology.docx
Originality Report https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/original...
2 of 8 2/14/2020, 4:35 PM
Originality Report https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/original...
3 of 8 2/14/2020, 4:35 PM
Originality Report https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/original...
4 of 8 2/14/2020, 4:35 PM
Originality Report https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/original...
5 of 8 2/14/2020, 4:35 PM
Originality Report https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/original...
6 of 8 2/14/2020, 4:35 PM
Originality Report https://blackboard.ne.
Smart SE: Recurrent Education Program of IoT and AI for BusinessHironori Washizaki
Hironori Washizaki, "Smart SE: Recurrent Education Program of IoT and AI for Business," 2021 IEEE International Conference on Educational Technology (ICET), Keynote, Online, June 20, 2021.
GICT Certified Blockchain Specialist course is designed to provide an understanding of Blockchain and the decentralized digital currencies (cryptocurrencies)
Find Out More : https://globalicttraining.com/
ATTRIBUTES AND EVALUATION OF DISCUSSION CONTRIBUTIONSDue Date E.docxrosemaryralphs52525
ATTRIBUTES AND EVALUATION OF DISCUSSION CONTRIBUTIONS
Due Date: End of weekly
Percentage of Course Grade: 20%.
Learner Guidelines for Evaluation of Discussion Contributions
All discussion contributions will be read by your instructor each week. The instructor will provide feedback to you regarding your discussion postings. Expecting that every discussion posting and response contain all of the attributes of an exemplary discussion posting is setting a high standard for both you and the instructor. This level of high performance is the standard expected of graduate learners at Capella.
Attributes of an Exemplary Discussion Contribution or Response:
1. The discussion contribution or response clearly addresses the content issue(s) presented by the question.
2. The discussion contribution or response includes the appropriate level(s) of critical analysis.
3. The discussion contribution or response includes pertinent course and disciplinary concepts, theories, or materials, and applies them correctly.
4. The discussion contribution or response provides validation and support by including relevant examples and supporting evidence, as appropriate.
5. The discussion contribution or response stimulates fellow learners to clarify, extend, and strengthen their dialogue.
6. The discussion contribution or response is concise, clearly organized, and well structured.
7. The discussion contribution or response uses grammar, usage, and mechanics expected of graduate level composition and expression.
8. All citations and references adhere to APA 6th edition style.
9. The discussion contribution or response fosters collaboration with fellow learners and communicates in a manner that respects the dignity and integrity of fellow learners and the instructor.
10. The discussion response meaningfully supplements and extends consideration of the topic by including one of more of the following: new information, questions, constructive or corrective feedback, or alternative viewpoints.
For additional details regarding discussion participation and contributions, please consult the Professional Communications and Writing Guide.
Submission UUID: 58593f67-986c-da25-634f-34f2af328387
Originality Report https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/original...
1 of 8 2/14/2020, 4:35 PM
Word Count: 631
Block Chain technology.docx
Originality Report https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/original...
2 of 8 2/14/2020, 4:35 PM
Originality Report https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/original...
3 of 8 2/14/2020, 4:35 PM
Originality Report https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/original...
4 of 8 2/14/2020, 4:35 PM
Originality Report https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/original...
5 of 8 2/14/2020, 4:35 PM
Originality Report https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/original...
6 of 8 2/14/2020, 4:35 PM
Originality Report https://blackboard.ne.
Smart SE: Recurrent Education Program of IoT and AI for BusinessHironori Washizaki
Hironori Washizaki, "Smart SE: Recurrent Education Program of IoT and AI for Business," 2021 IEEE International Conference on Educational Technology (ICET), Keynote, Online, June 20, 2021.
The main aim of this project is to control the cyber crimes. Cyber security incidents will cause significant financial and reputation impacts. In order to detect malicious activities, the SIEM (Security Information and Event Management) system is built. If any pre-defined use case is triggered, SOC analysts will generate OTRS in real time. So that user will be aware of threats
Certified Deep Learning Specialist (CDLS)GICTTraining
GICT Certified Deep Learning Specialist (CDLS) course will focus on the implementation of the newest libraries for implementing Deep Learning
Find Out More : https://globalicttraining.com
DJSCOE-ACM student chapter was recognized as the best student chapter for the year 2015-16. The award and recognition came through due to the hard work of the entire team of 52 members. We also conducted numerous workshops and seminars, getting directly involved in student development in the college. Amongst the various responsibilities carried, the most important were Human Resource management, Financial management and Event Planning along with management.
Among the various events, the most awaited were TechTalks and the DJSCOE Internship Fair.
TechTalks provided a platform for student-entrepreneur interaction, with various experts of the computer and marketing industry coming in to share their knowledge and experience with the students of the college.
The DJSCOE Intership Fair, which was the first such event ever in the history of D. J. College of Enigineering was instituted to be a path to connect students to companies and employers looking for trainees and interns, with a total of 7 major companies coming in to the college.
website: djacm.in
I strongly believe in the quote; "Anything worth doing is worth doing well!", by Hunter S Thompson and I always strive to achieve only the best in what I do, leading by example, always!
I strongly believe in the quote; "Anything worth doing is worth doing well!", by Hunter S Thompson and I always strive to achieve only the best in what I do, leading by example, always!
BLOCKLOGY | AN INITIATIVE TO EMPOWER STUDENTS TOWARDS FUTURE TECHNOLOGIESshantanubhattacharya14
Blocklogy is an e-Learning Platform initiated by KMPARDS, in order to
educate and empower the youth across the globe towards next-gen
technologies like Blockchain, Intelligent IoT, Artificial Intelligence,
Machine Learning, Ethical Hacking and more in an affordable cost.
Blocklogy has been established for the last 2-years and is one of the
leading training companies in Mumbai, that educate students efficiently on
Futuristic Technologies.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
More Related Content
Similar to 10 Blockchain_Technology_SDP_Report_CE_FH2020 (1).pdf
The main aim of this project is to control the cyber crimes. Cyber security incidents will cause significant financial and reputation impacts. In order to detect malicious activities, the SIEM (Security Information and Event Management) system is built. If any pre-defined use case is triggered, SOC analysts will generate OTRS in real time. So that user will be aware of threats
Certified Deep Learning Specialist (CDLS)GICTTraining
GICT Certified Deep Learning Specialist (CDLS) course will focus on the implementation of the newest libraries for implementing Deep Learning
Find Out More : https://globalicttraining.com
DJSCOE-ACM student chapter was recognized as the best student chapter for the year 2015-16. The award and recognition came through due to the hard work of the entire team of 52 members. We also conducted numerous workshops and seminars, getting directly involved in student development in the college. Amongst the various responsibilities carried, the most important were Human Resource management, Financial management and Event Planning along with management.
Among the various events, the most awaited were TechTalks and the DJSCOE Internship Fair.
TechTalks provided a platform for student-entrepreneur interaction, with various experts of the computer and marketing industry coming in to share their knowledge and experience with the students of the college.
The DJSCOE Intership Fair, which was the first such event ever in the history of D. J. College of Enigineering was instituted to be a path to connect students to companies and employers looking for trainees and interns, with a total of 7 major companies coming in to the college.
website: djacm.in
I strongly believe in the quote; "Anything worth doing is worth doing well!", by Hunter S Thompson and I always strive to achieve only the best in what I do, leading by example, always!
I strongly believe in the quote; "Anything worth doing is worth doing well!", by Hunter S Thompson and I always strive to achieve only the best in what I do, leading by example, always!
BLOCKLOGY | AN INITIATIVE TO EMPOWER STUDENTS TOWARDS FUTURE TECHNOLOGIESshantanubhattacharya14
Blocklogy is an e-Learning Platform initiated by KMPARDS, in order to
educate and empower the youth across the globe towards next-gen
technologies like Blockchain, Intelligent IoT, Artificial Intelligence,
Machine Learning, Ethical Hacking and more in an affordable cost.
Blocklogy has been established for the last 2-years and is one of the
leading training companies in Mumbai, that educate students efficiently on
Futuristic Technologies.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
1. SIES Graduate School of Technology
Department of Computer Engineering
Organizing
Student Development Program and Internship
Blockchain Technology
June 15-20, 2020, 10.00 AM to 5.00 PM
The widespread popularity of digital crypt-currencies has led the foundation of
Blockchain, which is fundamentally a public digital ledger to share information in a
trustworthy and secure way. The concept and applications of Blockchain have now spread
from crypto-currencies to various other domains, including business process management,
smart contracts, IoT and so on. This course is a covers both the conceptual as well as
application aspects of Blockchain. This includes the fundamental design and architectural
primitives of Blockchain, the system and the security aspects, along with various tools to
implement the Blockchain for various application domains.
Course Objectives:
Learn about the concept of Blockchain and crypto-currencies.
Understand the importance of Blockchain technology in Business
Use of various tools to implement the Blockchain.
Course Outcome:
After This Course the students should be able to:
Identify the problem of security associated with the third party inclusion in transaction.
Identifying the need for Blockchain Technology in various use cases.
Demonstrate the various tools used for Blockchain technology.
Implementing Blockchain in any security application.
2. Course Contents:
Basics of Blockchain Technology and Crypto-currency
Permissioned and Permission-less Blockcahin
Consensus protocols and Algorithms.
Implementation of Blockchain using JAVA
Creating of SMART contract using solidity
Design, Test and Deploy Secure Smart Contracts
Creating of Block Chain Network using Hyperledger Composer platform
Implementing block chain using Node JS
Creating the Ethereum Blockchain using a Tool.
Who Should Attend: Any student from SE/TE (CE/IT)
Course Fees: Course is free of cost (only for SIES GST students)
Certification: Course completion and internship certificate is provided.
Internship: At the end of 6 days program participants will undergo 15 days internship
covering developing secure web applications, identification of security threats and
developing the security solution for various organizations (For ex: Bank Sector/Medical
Sector/Insurance/IT Sector).
Registration link:
https://docs.google.com/forms/d/e/1FAIpQLSe-
ujQPPtqZNvSVhvdKSJh7brVRSqqARJYlz_ZdeB_YXDbXwA/viewform?usp=sf_link
Contact for Registration:
Prof. Rizwana Shaikh: rizwana.shaikh@siesgst.ac.in, 9619197014
Prof. Masooda Modak: masooda.modak@siesgst.ac.in 9833161007
Prof Kalyani P: kalyani.pampattiwar@siesgst.ac.in, 9819370257
3. Day Wise Schedule:
Date Day 1 Day 2 Day 3 Day 4 Day 5 Day 6
Resource person Dr,Rizwana
Shaikh
Ms. Kalyani
Pampattiwar
Ms.
Masooda
Modak
Ms. Namrata
Patel
Dr. Rizwana
Shaikh
NA
Time 10 am to
1:30 pm
10 am to 1:30
pm
10 am to
1:30 pm
10 am to 1:30
pm
10 am to
1:30 pm
10:00 am to
5:00 pm
Introduction
to
Blockchain,
Applications
and
advantages
Bitcoin:
Introduction
Cryptocurre
ncy and
applications
Cryptography
and
Cryptanalysis,
Use of
cryptography
in Blockchain,
Symmetric
key
cryptography,
Asymmetric
key
cryptography,
RSA
cryptosystem
with example.
What are
Smart
Contracts?
Key
Properties
of smart
Contracts,
Language
for Smart
Contracts.
Environment
setup for
blockchain
development
Constructor
function
explaination
Prototype
explaination,Cre
ating new
Transaction,
Ethereum
component
s, features
,Wallets,
Transaction
s, Public &
Private keys
4. Assignment/
Activity
Case Study
of Bitcoin
and
Blockchain
Quiz on
cryptography
basics
Design of
Smart
Contracts
Generate hash
when nonce is
7890
Current block
data having two
transactions
George sent
Jacob 345666
Shyam sent ram
34123
Take previous
block hash as
“23986yasjdasu
dyr326gyajsd”
Generate hash
value by
changing atleast
one string in
any of above
value.
Implement
ation of
Blockchain
using
Ethereum,
creating
wallet,
writing
transaction,
mining and
generating
crypto
currency
Time 1:30 pm to 5
pm
1:30 pm to 5
pm
1:30 pm to
5 pm
1:30 pm to 5 pm 1:30 pm to
5 pm
Components
of
blockchain ,
Types of
blockchain
and
applications,
Blockchain
Structure,
How
Blockchain
Works ,
Smart
Contracts ,
Various
implementat
ion tools.
Cryptographic
Hash function,
Hash Chain,
Merkle Tree,
Digital
signature,
Cryptocurrenc
y using hash,
chain and
digital
signature.
Deploying
Smart
Contracts,
Using
Metamask
for transfer
of ethers
Adding hash
block,Creatingan
d Testing proof
of work,
Adding nonce
and mining the
transaction,Crea
ting Genesis
block
Projects
topics to be
selected for
Internship
after
discussion
with All
Trainers
6. Department of Computer Engineering
Event Report
Student Development Program on Blockchain Technology
Event Information
Event Type: Student Development Program
Eve Event Title: Blockchain Technology
Resource Persons: Dr.Rizwanashaikh, Prof.MasoodaModak, Prof.KalyaniPampattiwar, Prof.Namrata Patel
Event Date: 15/06/2020 to 20/06/2020
Organized for: SE, TE Comp/IT/EXTC Students
Organized by: Computer Engineering, SIES GST
Target Audience (Branch & Nos.): Undergraduate Students (CE/IT/EXTC : 13 students)
Attachments:
1. Photographs (JPEG/PNG)
2. Attendance Report
3. Feedback Report
7. Event Description
Department of Computer Engineering of SIES GST organized an SDP from 15/06/2020 to 20/06/2020 for
SE/TE students.
Dr. Aparna Bannore, HOD CE has addressed the students about the overview of program and internship to
be conducted. She explained the benefits of learning security and blockchain. Also various career
opportunities available in the field of security.
Around 13 participants from SE and TE attended the SDP . Entire program was carried out in six days span.
Eveready’s session is divided into two halves morning and afternoon.
The Sessions started with covering basics of Security and need of Blockchain. Various tools were identified
and studied along with the demonstration. A sample project in the form of mini project is the expected
outcome of the course.
The first day session was conducted by Dr. Rizwana Shaikh. She has covered Introduction to blockchain,
Bitcoin: Introduction Cryptocurrency and applications followed by afternoon session on Smart Contracts,
Various implementation tools. Second day session was conducted by Prof. Kalyani Pampattiwar on
Cryptography required for Blockchain, Public key cryptography and Markeley tree and Hash function. Day 3
session was conducted by prof. Masooda Modak on Introduction to solidity, Remix IDE framework and
Sample contract., Deploying Smart Contracts, using Metamask for transfer of ethers.. Day 5 session was
delivered by Prof. Namrata Patel on Building a Blockchain using javascript, Accessing Blockchain using API
and Consensus algorithms. Day 6 was conducted by Dr. Rizwana Shaikh on Case study on Blockchain and at
the end internship project topics were discussed with students. Students have been given 15 days time to
complete their project. Vote of thanks was presented by HOD CE, Dr. Aparna Bannore. She has congratulated
all the students for attending the SDP with full enthusiasm.
13. 4
3 3
2 2
4
4
3
6
7
6
4
4
6
3 3
4 4
0
1
2
3
4
5
6
7
8
1. General
impression
about the
content of the
course?
2. How well
did the
content
address your
expectations?
3. How do you
rate the
quality of
content
presented?
4. How
relevant was
the content to
your
profession?
5. How do you
rate the
amount of
content
presented?
6. How do you
rate hands on
experience of
this lab
session?
Outstanding
Excellent
Very good
Good
Average Poor
14. 4. Impact Analysis:
1. Students got exposure to upcoming applications of Blockchain technology.
2. They have learnt the concepts which are beyond their curriculum.
3. As a outcome of it in their internship students have developed a mini project based on concepts they
have learnt during these six days.