0% found this document useful (0 votes)
51 views19 pages

Internship Report Yash

The document discusses an internship report submitted by a student. It provides details about the internship, including the company and tasks completed. It discusses the technical learning achieved and concludes with future opportunities in related fields.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views19 pages

Internship Report Yash

The document discusses an internship report submitted by a student. It provides details about the internship, including the company and tasks completed. It discusses the technical learning achieved and concludes with future opportunities in related fields.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

KIET Group of Institutions, Ghaziabad

Computer Science

Internship Report
on

INFOSYS SPRINGBOARD AI/ML

Summer Internship at INFOSYS

(Duration)
(Aug-Sep)
(2022)

Submitted By:Yash Srivastava


B.Tech/Computer Science(7 Sem Sec-C)
ClassRoll No.-60
Index for Internship Report
Following essentials are to be taken in to consideration during preparation
of internship report:

1. Acknowledgement
2. Certificate
3. Industry/Company Profile
4. Abstract/overview of Project.
5. Introduction of Project Internship.
6. Details of task/s assigned
7. Details of Technical learning during delivery of task
8. Conclusion or Outcome of Internship
9. Future scope of work
10. Attach certificate/s of moocs(with verification link).
11. Attach literature review report (based on 5-10 Research papers
downloaded from Nalanda E-Consortium platform).
12. Attach Daily Log report/supervisor report.
1. ACKNOWLEDGEMENT

I’ve got this golden opportunity to express my kind gratitude and sincere thanks
to my Head of Institution, KIET Group of Institutions of Engineering and
Technology, and the Head of the Department of “Computer Science” for their
kind support and necessary counseling in the preparation of this project report.
I’m also indebted to each and every person responsible for the making up of this
project directly or indirectly.

I must also acknowledge our deep debt of gratitude to each one of my colleagues
wholed this project to come out in the way it is. It’s my hard work untiring sincere
efforts and mutual cooperation to bring out the project work. Last but not least, I
would like to thank my parents for their sound counseling and cheerful support.
They have always inspired us and kept our spirits up.

Yash Srivastava

B-Tech CS
7C
2000290120197
2. CERTIFICATE

This is to certify that the internship project report entitled "INFOSYS


SPRINGBOARD AI/ML" submitted by Mr. Yash Srivastava in the
Department of Computer Science of KIET Group of Institutions, Ghaziabad,
affiliated to Dr.
A. P. J. Abdul Kalam Technical University, Lucknow, Uttar Pradesh, India, is a
record of the candidate's summer internship. He/She has successfully completed
his/her internship under my supervision and guidance and is worthy of
consideration for the same.

Signature of Supervisor:
Supervisor’s Name:
Date:
3. Industry/Company Profile
COMPANY NAME :-INFOSYS

INTERNSHIP TYPE:- LEARNING

• Introduction to Artificial Intelligence


• Introduction to Natural Language Processing
• Introduction to Data Science
• Introduction to Deep Learning
• Introduction to Robotic Process Automation
• Computer Vision 101
4. Abstract/overview of Project

Notification support people in remembering things. It is a little


piece of text that appears on the desktop or mobile screen to
inform the user about the updates or any other significant
chunks of information. This information enables the user to
focus on vital events and ignore the less significant ones. The
notifications are stored in the notification bar, which we can
refer to after completing the work.
In the following tutorial, we will learn to create a customized
desktop notifier application for the computer in some easy steps
with the help of the Python programming language.
But before we get started, let us briefly understand a desktop
notifier and its working.
A Desktop Notifier is a straightforward application that
generates a notification message in the form of a pop-up
message on the desktop. The main objective of the desktop
notification application that we will learn to develop today is to
constantly remind us of the different things that we require to
accomplish throughout the day.
5. Introduction of Project Internship.

we have imported the notification object from the plyer package. We


then defined two string variables that stores the value of the title and
message for the desktop notifier. At last, we have used the notify()
method. Within this method, we have specified the parameters
like title consisting of the notification's title, message containing the
message to be displayed, app_icon containing the icon to be displayed
along with themessage, timeout consisting of the time to display the
message for (defaults to 10), toast consisting of the Boolean value
depicting the simple message instead of full notification.
As a result, we can see a pop-up on the desktop displaying the title and
message for the users.

Importing the required libraries and modules


We will start by importing the required libraries and modules like
datetime, time, requests, and plyer. Let us consider the following
snippet of code demonstrating the same:
We have imported the datetime module to read the current date in the
above snippet of code. We have also imported the time module to
suspend the execution for a specific time. We have then imported the
requests library in order to retrieve coronavirus data from the web.At
last, we have imported the notification object from the plyer
library that will help us get notifications on the computer.
Fetching the data from the Web
We will now retrieve the data from the web using the requests library.
Let us consider the following snippet of code demonstrating the same:
6. Details of task/s assigned

• In the internship we were assigned daily tasks to learn and


complete theintegrated assignments

• In this learning we have to complete modules created and


suggested by industry-leading experts.
• The learnings are bifurcated into 6 domains
➢ Introduction to Artificial Intelligence
➢ Introduction to Natural Language Processing
➢ Introduction to Data Science
➢ Introduction to Deep Learning
➢ Introduction to Robotic Process Automation
➢ Computer Vision 101
7. Details of Technical learning during delivery of
task

• A logical approach to work

• The ability to explain technical matters clearly

• A keen interest in technology

• Computer literacy

• Strong knowledge of Artificial Intelligence

• Strong knowledge of ML,DL.

• Strong knowledge of Computer Vision

• Strong NLP foundation

• RPA foundation
8. Conclusion or outcome of the project:
After completing my internship programme, I had a better
understanding of the business environment, which helped me to be
ready to advance my skills and professionalism in order to succeed in
a professional sector. I was given the task of learning or gaining
information about AI,cyber security,Iot,cloud and RPA in the early
stages of my internship. Later, the team was formed and given the
assignments to work on throughout my internship, which allowed me
to learn more about the real professional world. It was my first
experience working in an environment where there were rules and
everything was done in a methodical way. I worked truly and
diligently to learn more about the new items. I researched the tasks
that were given to us, and initially I learned that we originally started
with the operation of simple algorithms. The most crucial department
in every business is its cyber security section. Ethical hackers defend
private information and defend the community against cybercrimes.
In light of this internship's conclusion, it is wise for beginners to be
aware of current security concerns. And how can someone protect
himself from these types of dangers and lot of new technologies and
roles of RPA For individuals who are seriously interested in a career
in IT industry,this internship programme is quite advantageous. I
provide you with the fundamental information regarding the same.
9. Future scope of work
• The scope of Artificial Intelligence is limited to
domestic and commercial purposes as the medical and
aviation sectors are also using AI to improve their
services. If AI is outperforming human efforts, then
opting for AI automation will reduce costs in the long
run for a business.
• Cloud computing is strong and expansive, and it will
continue to grow and give many benefits in the future
since it is incredibly cost-effective, and businesses can
use it to grow. Thus Cloud computing careers have a
bright future ahead, with benefits for both the host
and the customer.
• The demand for cybersecurity is at an all-time high as the
global business environment shifts to cloud data storage
and online management. With increased internet
exposure, commercial organisational data and the
personal data of users are at a threat of being misused.
• IoT is bound to be an effective technology in the future,
and IoT enabled devices are likely to be all-pervasive,
from industry to households. The future scope of IoT
is bright and varied, and it is only a matter of time
before the above applications of the technology are
realized.
• The future of RPA is integrated, intelligent and
intuitive
Automation and the technology that facilitates it
move quickly. For those who make smart decisions
early, this quick advancement is an advantage that allows
for agility years into the future.
10. Certificate and badges of completion
of Internship:
11. Literature Review Report (Research papers
summary )
Trends and Technology of Artificial Intelligence
used in Health Care Industries
Whether you are talking about deep learning, strategic
thinking or another species of AI, the foundation of its
use is in situations that require lightning-fast responses.
AI is now part of our daily lives. We have AI solutions
for quality control, video analytics, speech-to-text and
autonomous driving, as well as solutions in healthcare,
manufacturing, financial services and entertainment.
Talking about the healthcare different trends and
technologies of AI have been improved. There are
smart wearables which help us to stay updated about
our health and keep track of daily calorie intake. Still
gaps and challenges in the healthcare sector reflect
deep-confirmed issues around shy backing, weak
regulation, inadequate healthcare structure, and deeply
bedded socio-artistic practices. These cannot be
addressed by AI results alone. The AI devices are more
likely to serve the higher class people so it's also not in
the customer friendly budget. These devices are widely
being accepted but we still need farther exploration to
see if it can fully be dependent on.
Comparative Analysis of Various National Cyber Security Strategies

By Narmeen Shafqat, Ashraf Masood

Publication: 2016

• The primary aim of the research paper is to analyze and


compare the different cyber security trends, measures and
approaches outlined in the respective publically available
strategy documents.
• Ranking of countries based on Cyber Security,
1. Developed Countries 2. Developing Countries
• Ranking Comparison Metrics
1. Understanding of major key terms i.e. cyberspace and cyber
security,
2. Level of prioritization assigned to national cyber security,
3. Country’s perception of cyber threats,
4. Organizational Overview: i.e the leading organizations and
public actors responsible for maintaining the state of cyber
security at the federal level,
5. Critical sectors and infrastructure listed in the strategy
• Diverging Understanding of Key Terms in Various Countries:-
1. Cyberspace: For most of the countries, cyberspace is
perceived to be a complete network of all virtual and physical
ICT devices that can be the target of evil cyber actors.
2. Cyber Security: Australia, France, Germany, Netherland,
Saudi Arab and New Zealand have clearly mentioned their
definition of cyber security, UK and Canada have used
descriptive texts to define their concept of cybersecurity
A Study of Cyber Security Challenges and Its Emerging Trends on Latest
Technologies

By Nikhita Reddy Gade, Ugander G J Reddy

Publication: 2014

• This paper mainly focuses on challenges faced by cyber security on the


latest technologies.

• Trends Changing Cyber Security: -

1. Web Servers

2. Cloud computing and its services

3. Mobile Networks

4. IPv6: New internet protocol

5. Encryption of the Code

• The ability of individuals to share information with an audience of


millions is at the heart of the particular challenge that social media
presents to businesses. In addition to giving anyone the power to
disseminate commercially sensitive information.

• Cyber Security Techniques:

1. Access control and password security

2. Authentication of data

3. Malware scanners

4. Firewalls

5. Anti-virus software
Role of Information Technology in Agriculture and Rural
Diversification

The generation and application of agricultural knowledge is


progressively important, particularly for small and marginal farmers,
who require relevant information in order to improve, sustain, and
diversify their farm enterprises In developing countries, expenditure
on computers and internet is not in the affordable range of the poor or
rural population of the country. Information technology include
computers, internet, networking hardware and software, satellites,
broadcasting technologies (radio and television), and telephony (land
lines and cellular). Information technology can be defined as a set of
various technical tools and resources used to communicate, broadcast,
deposit and handle information. Information technology refers to how
we use information, compute and communicate information to the
people The role of information technology is, users need with the
right information, in right form, in right time. Internet access
availability is also low in rural area as compared to urban area
because most of the internet service providers provide service in
urban areas. As satellite technology is very expensive the cellular
network is the most powerful network to connect the remotest rural
areas. In short information technology is helpful to communicate the
knowledge. For the successful implementation of ICT in rural areas
proper internet connection is mandatory. Although in the last few
years a great advancement has been made in the connectivity of rural
areas. With the huge investment of private ISPs in town and cities
now it has become possible to connect villages in large numbers. In
developing countries like India where Agriculture is a major
contributor to GDP, it cannot be ignored in an era of rapid
transformation. In addition to this, it requires services and functions
linked with it for instance web portals, email, SMS, video-
conferencing, etc.
Applications of Machine Learning Techniques in the
Realm of Cyber security

ML-based automated cybersecurity systems enable various organizations to


invest less in human resources and to analyse data more accurately than human
analysts. The ML technology is capable of handling massive real-time network
data which allows various issues present in conventional cybersecurity systems
to be overcome. In the present chapter, various issues related to the applications
of ML in cybersecurity have been discussed. Since the last decade, ML
technology has been used in various domains because it possesses numerous
interesting characteristics such as adaptability, robustness, learnability, and its
ability to take instant actions against unexpected challenges. The present
chapter discusses how do the ML approaches resolve different issues that exist
in traditional cybersecurity systems. Various problems and challenges faced by
researchers while integrating cybersecurity and ML algorithms have been
investigated. ML techniques are being widely used for various real-world
applications and cybersecurity practitioners have adopted them to protect cyber-
facets of their organizations. The adaptation of ML in cybersecurity helps in
developing automated security systems which complement the shortage of
security experts. The current chapter presents available datasets and algorithms
for the successful implementation of ML technology in the domain of
cybersecurity. Thus, the systems can act only upon the ‘knowledge’ fed to them
and human intervention is continually required for the proper functioning of
traditional cybersecurity systems. The present chapter also explains some of the
popular cybersecurity datasets and ML algorithms along with a pre- case
comparison of datasets. Since the past decade, extensive research studies have
been carried out on the cybersecurity applications of ML technologies. The
traditional cybersecurity systems are built on rules, attack signatures, and fixed
algorithms. On the other hand, ML technology can recognize various patterns
from past experiences and is capable of predicting or detecting future attacks
based on seen or unseen data
12. Daily log report
SR NO. MODULES COMPLETION

1 Introduction to YES
Artificial
Intelligence

2 Introduction YES
to Natural
Language
Processing
3 Introduction YES
to Data
Science
4 Introduction to YES
Deep Learning

5 ➢ Introduction YES
to Robotic
Process
Automation
➢ Computer
Vision 101

You might also like