The document provides the name Venkatasubramanian M A and indicates they are associated with Sri Sairam Institute of Technology. No other details are included in the short document.
This certificate certifies that Venkatasubramanian M A successfully completed an online Introduction to Soft Skills course offered by TCS iON on June 8, 2020. The course covered acquiring soft skills, the importance of soft skills, and the difference between hard and soft skills.
This certificate certifies that Venkatasubramanian M A successfully completed an online presentation skills course offered by TCS iON on June 8, 2020. The course covered topics such as what a presentation is, the 5 Ws for a presentation, how to prepare effective slides, dos and don'ts for creating and presenting a presentation, and handling questions. It was certified by the Head of Learning at the TCS iON Digital Learning Hub.
This certificate certifies that Venkatasubramanian M A successfully completed the online Communication Skills course offered by TCS iON on June 8, 2020. The course covered topics on the importance and process of communication, barriers to communication, non-verbal and verbal communication, and effective communication. The certificate was issued by the Head of Learning at TCS iON's Digital Learning Hub.
This document is a certificate recognizing completion of training on growth mindset. It contains the date of completion, June 10, 2020, and references files on a computer hard drive containing information to print or download the certificate. The certificate acknowledges an understanding of growth mindset principles from the training received.
The document provides the name Venkatasubramanian M A and indicates they are associated with Sri Sairam Institute of Technology. No other details are included in the short document.
This certificate certifies that Venkatasubramanian M A successfully completed an online Introduction to Soft Skills course offered by TCS iON on June 8, 2020. The course covered acquiring soft skills, the importance of soft skills, and the difference between hard and soft skills.
This certificate certifies that Venkatasubramanian M A successfully completed an online presentation skills course offered by TCS iON on June 8, 2020. The course covered topics such as what a presentation is, the 5 Ws for a presentation, how to prepare effective slides, dos and don'ts for creating and presenting a presentation, and handling questions. It was certified by the Head of Learning at the TCS iON Digital Learning Hub.
This certificate certifies that Venkatasubramanian M A successfully completed the online Communication Skills course offered by TCS iON on June 8, 2020. The course covered topics on the importance and process of communication, barriers to communication, non-verbal and verbal communication, and effective communication. The certificate was issued by the Head of Learning at TCS iON's Digital Learning Hub.
This document is a certificate recognizing completion of training on growth mindset. It contains the date of completion, June 10, 2020, and references files on a computer hard drive containing information to print or download the certificate. The certificate acknowledges an understanding of growth mindset principles from the training received.
The document is a scanned receipt from a grocery store purchase on June 15th, 2022 totaling $58.37. It lists items bought including ground beef, chicken breasts, tortillas, cheese, and produce such as tomatoes, lettuce, and onions. The receipt shows the item prices, taxes, and total amount due.
Mr. Venkatasubramanian M A is an individual from Sri sairam institute of technology. The document provides the name and affiliation of Mr. Venkatasubramanian M A from Sri sairam institute of technology in a single line.
Venkatasubramanian M A from Sri Sairam Institite Of Technology, Chennai successfully attended the India First Leadership Talk webinar with Prof D. P. Singh, Chairman UGC that was broadcasted on 9th May, 2020 by MHRD's Innovation Cell. This is certified by Dr. Abhay Jere, Chief Innovation Officer of MHRD's Innovation Cell.
We have designed & manufacture the Lubi Valves LBF series type of Butterfly Valves for General Utility Water applications as well as for HVAC applications.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
Determination of Equivalent Circuit parameters and performance characteristic...pvpriya2
Includes the testing of induction motor to draw the circle diagram of induction motor with step wise procedure and calculation for the same. Also explains the working and application of Induction generator
The document is a scanned receipt from a grocery store purchase on June 15th, 2022 totaling $58.37. It lists items bought including ground beef, chicken breasts, tortillas, cheese, and produce such as tomatoes, lettuce, and onions. The receipt shows the item prices, taxes, and total amount due.
Mr. Venkatasubramanian M A is an individual from Sri sairam institute of technology. The document provides the name and affiliation of Mr. Venkatasubramanian M A from Sri sairam institute of technology in a single line.
Venkatasubramanian M A from Sri Sairam Institite Of Technology, Chennai successfully attended the India First Leadership Talk webinar with Prof D. P. Singh, Chairman UGC that was broadcasted on 9th May, 2020 by MHRD's Innovation Cell. This is certified by Dr. Abhay Jere, Chief Innovation Officer of MHRD's Innovation Cell.
We have designed & manufacture the Lubi Valves LBF series type of Butterfly Valves for General Utility Water applications as well as for HVAC applications.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
Determination of Equivalent Circuit parameters and performance characteristic...pvpriya2
Includes the testing of induction motor to draw the circle diagram of induction motor with step wise procedure and calculation for the same. Also explains the working and application of Induction generator
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...DharmaBanothu
The Network on Chip (NoC) has emerged as an effective
solution for intercommunication infrastructure within System on
Chip (SoC) designs, overcoming the limitations of traditional
methods that face significant bottlenecks. However, the complexity
of NoC design presents numerous challenges related to
performance metrics such as scalability, latency, power
consumption, and signal integrity. This project addresses the
issues within the router's memory unit and proposes an enhanced
memory structure. To achieve efficient data transfer, FIFO buffers
are implemented in distributed RAM and virtual channels for
FPGA-based NoC. The project introduces advanced FIFO-based
memory units within the NoC router, assessing their performance
in a Bi-directional NoC (Bi-NoC) configuration. The primary
objective is to reduce the router's workload while enhancing the
FIFO internal structure. To further improve data transfer speed,
a Bi-NoC with a self-configurable intercommunication channel is
suggested. Simulation and synthesis results demonstrate
guaranteed throughput, predictable latency, and equitable
network access, showing significant improvement over previous
designs
This study Examines the Effectiveness of Talent Procurement through the Imple...DharmaBanothu
In the world with high technology and fast
forward mindset recruiters are walking/showing interest
towards E-Recruitment. Present most of the HRs of
many companies are choosing E-Recruitment as the best
choice for recruitment. E-Recruitment is being done
through many online platforms like Linkedin, Naukri,
Instagram , Facebook etc. Now with high technology E-
Recruitment has gone through next level by using
Artificial Intelligence too.
Key Words : Talent Management, Talent Acquisition , E-
Recruitment , Artificial Intelligence Introduction
Effectiveness of Talent Acquisition through E-
Recruitment in this topic we will discuss about 4important
and interlinked topics which are
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...PriyankaKilaniya
Energy efficiency has been important since the latter part of the last century. The main object of this survey is to determine the energy efficiency knowledge among consumers. Two separate districts in Bangladesh are selected to conduct the survey on households and showrooms about the energy and seller also. The survey uses the data to find some regression equations from which it is easy to predict energy efficiency knowledge. The data is analyzed and calculated based on five important criteria. The initial target was to find some factors that help predict a person's energy efficiency knowledge. From the survey, it is found that the energy efficiency awareness among the people of our country is very low. Relationships between household energy use behaviors are estimated using a unique dataset of about 40 households and 20 showrooms in Bangladesh's Chapainawabganj and Bagerhat districts. Knowledge of energy consumption and energy efficiency technology options is found to be associated with household use of energy conservation practices. Household characteristics also influence household energy use behavior. Younger household cohorts are more likely to adopt energy-efficient technologies and energy conservation practices and place primary importance on energy saving for environmental reasons. Education also influences attitudes toward energy conservation in Bangladesh. Low-education households indicate they primarily save electricity for the environment while high-education households indicate they are motivated by environmental concerns.
Accident detection system project report.pdfKamal Acharya
The Rapid growth of technology and infrastructure has made our lives easier. The
advent of technology has also increased the traffic hazards and the road accidents take place
frequently which causes huge loss of life and property because of the poor emergency facilities.
Many lives could have been saved if emergency service could get accident information and
reach in time. Our project will provide an optimum solution to this draw back. A piezo electric
sensor can be used as a crash or rollover detector of the vehicle during and after a crash. With
signals from a piezo electric sensor, a severe accident can be recognized. According to this
project when a vehicle meets with an accident immediately piezo electric sensor will detect the
signal or if a car rolls over. Then with the help of GSM module and GPS module, the location
will be sent to the emergency contact. Then after conforming the location necessary action will
be taken. If the person meets with a small accident or if there is no serious threat to anyone’s
life, then the alert message can be terminated by the driver by a switch provided in order to
avoid wasting the valuable time of the medical rescue team.
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.