Basics of WWW, HTTP protocol methods and headers, HTTP Request and Response, Architecture of web browser, Web server installation and configuration, Web security, CORS, Understanding SEO
Introduction to Server side programming , PHP variables, decision and looping with examples, PHP and HTML, Arrays, Functions, Browser control and detection, String, Form processing, File uploads, Dates and timezone, Working with Regular Expressions, Exception Handling, Working with JSON data, Object Oriented Programming with PHP
Javascript Syntax, Types of Javascript, variables, arrays, functions, conditions, loops, Pop up boxes, Javascript objects and DOM, Javascript inbuilt functions, Javascript validations, Regular expressions, Event handling with Javascript, Callbacks in Javascript, Function as arguments in Javascript, Object concepts in Javascript
Asynchronous Web requests using AJAX, Creating REST API using PHP
jQuery: Working with jQuery, Using plugins in jQuery and Creating Image slider, Generating charts from data using 3rd Party Libs
HTML page structure, formatting tags in HTML, tables, links, images, meta tags, frames, html form tags, media, APIs, HTML5 tags in relation to validations and SEO.
CSS: Need for CSS, Basic syntax and structure, Backgrounds, Colors and properties, Manipulating texts, Fonts, borders and boxes, Margins, Padding Lists, CSS2, CSS3, Animations, Tool-Tips, Style images, Variables, Flex Box, Media Queries, Wildcard Selectors (*, ^ and $) in CSS, Working with Gradients, Pseudo Class, Pseudo elements, basic of frameworks like Bootstrap, Responsive web design and Media Query, CSS variables
After the prison's destruction and his band is separated, Rick and Carl search for shelter in a nearby town and reunite with surviving friends. Rick's physical and mental state begin to unravel, while Carl grows increasingly independent and apathetic. They eventually manage to reunite with their other survivors and end up at Hershel's farm. Three new people arrive and inform the group that they are on a mission to Washington D.C. to cure the plague. Rick's band decides to join their journey...
Introduction to Server side programming , PHP variables, decision and looping with examples, PHP and HTML, Arrays, Functions, Browser control and detection, String, Form processing, File uploads, Dates and timezone, Working with Regular Expressions, Exception Handling, Working with JSON data, Object Oriented Programming with PHP
Javascript Syntax, Types of Javascript, variables, arrays, functions, conditions, loops, Pop up boxes, Javascript objects and DOM, Javascript inbuilt functions, Javascript validations, Regular expressions, Event handling with Javascript, Callbacks in Javascript, Function as arguments in Javascript, Object concepts in Javascript
Asynchronous Web requests using AJAX, Creating REST API using PHP
jQuery: Working with jQuery, Using plugins in jQuery and Creating Image slider, Generating charts from data using 3rd Party Libs
HTML page structure, formatting tags in HTML, tables, links, images, meta tags, frames, html form tags, media, APIs, HTML5 tags in relation to validations and SEO.
CSS: Need for CSS, Basic syntax and structure, Backgrounds, Colors and properties, Manipulating texts, Fonts, borders and boxes, Margins, Padding Lists, CSS2, CSS3, Animations, Tool-Tips, Style images, Variables, Flex Box, Media Queries, Wildcard Selectors (*, ^ and $) in CSS, Working with Gradients, Pseudo Class, Pseudo elements, basic of frameworks like Bootstrap, Responsive web design and Media Query, CSS variables
After the prison's destruction and his band is separated, Rick and Carl search for shelter in a nearby town and reunite with surviving friends. Rick's physical and mental state begin to unravel, while Carl grows increasingly independent and apathetic. They eventually manage to reunite with their other survivors and end up at Hershel's farm. Three new people arrive and inform the group that they are on a mission to Washington D.C. to cure the plague. Rick's band decides to join their journey...
One person attempts to hang herself on the way to Washington. Rick holds Abraham, who thinks she's dead, at gunpoint and prevents him from shooting her in the head. Rick, Abraham, and Carl head to Rick's hometown to find weapons. They discover Morgan, whom Rick met when he woke up from his coma, and he joins Rick's survivors...
The Walking Dead comic book volume 3, Safety Behind Bars
The Walking Dead centers around Rick Grimes, a former police officer who was shot in the line of duty and wakes up from a coma after the world has succumbed to the zombie plague. Dazed from months in the hospital, and confused as to why he can't find anyone alive, he makes his way home only to find his wife and son missing. He packs up supplies from his station and travels to Atlanta in search of his family after hearing the cities would be safe (heard from Morgan and Duane Jones, his previous neighbors). Arriving in the city on horseback, Rick is overcome by a horde of zombies and narrowly escapes death with the aid of another survivor named Glenn, who has been scavenging the city for supplies. Glenn takes Rick back to his camp just outside of town where Rick's wife Lori and son Carl happen to be living, alive and well. His partner and best friend Shane had taken Lori and Carl to the outskirts of Atlanta to wait for rescue by the US Government. There they found a small group of survivors.
The Walking Dead comic book volume 5, The Best Defense
The Walking Dead centers around Rick Grimes, a former police officer who was shot in the line of duty and wakes up from a coma after the world has succumbed to the zombie plague. Dazed from months in the hospital, and confused as to why he can't find anyone alive, he makes his way home only to find his wife and son missing. He packs up supplies from his station and travels to Atlanta in search of his family after hearing the cities would be safe (heard from Morgan and Duane Jones, his previous neighbors). Arriving in the city on horseback, Rick is overcome by a horde of zombies and narrowly escapes death with the aid of another survivor named Glenn, who has been scavenging the city for supplies. Glenn takes Rick back to his camp just outside of town where Rick's wife Lori and son Carl happen to be living, alive and well. His partner and best friend Shane had taken Lori and Carl to the outskirts of Atlanta to wait for rescue by the US Government. There they found a small group of survivors.
Life at the prison continues in what passes for normal in this apocalyptic world. Glenn and Maggie marry. Several residents search for supplies and engage in a shootout with men from Woodbury. Lori goes into labor and Judith is born. Dale is out on a mission siphoning gas when he is bitten in the leg. Dale's friends amputate the leg and he survives. Carol commits suicide by allowing a zombie to bite her. The issue ends with the Governor's arrival with his army and a tank...
Rick's group settles into Alexandria Safe-Zone and take jobs in the community. Rick, as constable, tries to increase safety and stability when he stops a dangerous man inside the community. Scavengers arrive and threaten the community. Alexandria wins the battle but alert a massive herd of hundreds of zombies to their presence. Rick takes command of his community...
Patent Law, Trademark Law, Copyright, Software – Copyright or Patented, Domain Names and Copyright disputes, Electronic Data Base and its Protection, IT Act and Civil Procedure Code, IT Act and Criminal Procedural Code, Relevant Sections of Indian Evidence Act, Relevant Sections of Bankers Book Evidence Act, Relevant Sections of Indian Penal Code, Relevant Sections of Reserve Bank of India Act, Law Relating To Employees And Internet, Alternative Dispute Resolution , Online Dispute Resolution (ODR)
12th issue of Volume 13. Asaib Number is 25th Special Number is based on Asaib. Special number that contains special blessings, impressions and talismans, actions, treatments and prayers for protection and deliverance from the devil & satin. A very useful Special Number for everyone.
Development Of Unix/Linux, Role & Function Of Kernel, System Calls, Elementary Linux command & Shell Programming, Directory Structure, System Administration
Case study: Linux, Windows Operating System
One person attempts to hang herself on the way to Washington. Rick holds Abraham, who thinks she's dead, at gunpoint and prevents him from shooting her in the head. Rick, Abraham, and Carl head to Rick's hometown to find weapons. They discover Morgan, whom Rick met when he woke up from his coma, and he joins Rick's survivors...
The Walking Dead comic book volume 3, Safety Behind Bars
The Walking Dead centers around Rick Grimes, a former police officer who was shot in the line of duty and wakes up from a coma after the world has succumbed to the zombie plague. Dazed from months in the hospital, and confused as to why he can't find anyone alive, he makes his way home only to find his wife and son missing. He packs up supplies from his station and travels to Atlanta in search of his family after hearing the cities would be safe (heard from Morgan and Duane Jones, his previous neighbors). Arriving in the city on horseback, Rick is overcome by a horde of zombies and narrowly escapes death with the aid of another survivor named Glenn, who has been scavenging the city for supplies. Glenn takes Rick back to his camp just outside of town where Rick's wife Lori and son Carl happen to be living, alive and well. His partner and best friend Shane had taken Lori and Carl to the outskirts of Atlanta to wait for rescue by the US Government. There they found a small group of survivors.
The Walking Dead comic book volume 5, The Best Defense
The Walking Dead centers around Rick Grimes, a former police officer who was shot in the line of duty and wakes up from a coma after the world has succumbed to the zombie plague. Dazed from months in the hospital, and confused as to why he can't find anyone alive, he makes his way home only to find his wife and son missing. He packs up supplies from his station and travels to Atlanta in search of his family after hearing the cities would be safe (heard from Morgan and Duane Jones, his previous neighbors). Arriving in the city on horseback, Rick is overcome by a horde of zombies and narrowly escapes death with the aid of another survivor named Glenn, who has been scavenging the city for supplies. Glenn takes Rick back to his camp just outside of town where Rick's wife Lori and son Carl happen to be living, alive and well. His partner and best friend Shane had taken Lori and Carl to the outskirts of Atlanta to wait for rescue by the US Government. There they found a small group of survivors.
Life at the prison continues in what passes for normal in this apocalyptic world. Glenn and Maggie marry. Several residents search for supplies and engage in a shootout with men from Woodbury. Lori goes into labor and Judith is born. Dale is out on a mission siphoning gas when he is bitten in the leg. Dale's friends amputate the leg and he survives. Carol commits suicide by allowing a zombie to bite her. The issue ends with the Governor's arrival with his army and a tank...
Rick's group settles into Alexandria Safe-Zone and take jobs in the community. Rick, as constable, tries to increase safety and stability when he stops a dangerous man inside the community. Scavengers arrive and threaten the community. Alexandria wins the battle but alert a massive herd of hundreds of zombies to their presence. Rick takes command of his community...
Patent Law, Trademark Law, Copyright, Software – Copyright or Patented, Domain Names and Copyright disputes, Electronic Data Base and its Protection, IT Act and Civil Procedure Code, IT Act and Criminal Procedural Code, Relevant Sections of Indian Evidence Act, Relevant Sections of Bankers Book Evidence Act, Relevant Sections of Indian Penal Code, Relevant Sections of Reserve Bank of India Act, Law Relating To Employees And Internet, Alternative Dispute Resolution , Online Dispute Resolution (ODR)
12th issue of Volume 13. Asaib Number is 25th Special Number is based on Asaib. Special number that contains special blessings, impressions and talismans, actions, treatments and prayers for protection and deliverance from the devil & satin. A very useful Special Number for everyone.
Development Of Unix/Linux, Role & Function Of Kernel, System Calls, Elementary Linux command & Shell Programming, Directory Structure, System Administration
Case study: Linux, Windows Operating System
Virtual machines; supporting multiple operating systems simultaneously on a single hardware platform; running one operating system on top of another. True or pure virtualization.
Process and Threads Management: Process Concept, Process states, Process control, Threads, Uni-processor Scheduling: Types of scheduling: Preemptive, Non preemptive, Scheduling algorithms: FCFS, SJF, RR, Priority, Thread Scheduling, Real Time Scheduling. System calls like ps, fork, join, exec family, wait.
Key management and distribution, symmetric key distribution using symmetric and asymmetric encryptions, distribution of public keys, X.509 certificates, Public key infrastructure
Digital Signature, its properties, requirements and security, various digital signature schemes (Elgamal and Schnorr), NIST digital Signature algorithm
Cryptographic Hash Functions, their applications, Simple hash functions, its requirements and security, Hash functions based on Cipher Block Chaining, Secure Hash Algorithm (SHA)
Public Key Cryptosystems with Applications, Requirements and
Cryptanalysis, RSA algorithm, its computational aspects and security, Diffie-Hillman Key Exchange algorithm, Man-in-Middle attack
Computer system overview, Architecture, Goals & Structures of
O.S, Basic functions, Interaction of O.S. & hardware architecture, System calls,
Batch, multiprogramming. Multitasking, time sharing, parallel, distributed & realtime
O.S.
Stream ciphers and block ciphers, Block Cipher structure, Data Encryption standard (DES) with example, strength of DES, Design principles of block cipher, AES with structure, its transformation functions, key expansion, example and implementation
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.