diff --git a/.travis.yml b/.travis.yml
index b80f170..45362f6 100644
--- a/.travis.yml
+++ b/.travis.yml
@@ -5,8 +5,8 @@ android:
components:
- platform-tools
- tools
- - build-tools-26.0.2
- - android-26
+ - build-tools-27.0.3
+ - android-27
- extra-android-m2repository
before_script:
- chmod +x gradlew
diff --git a/app/build.gradle b/app/build.gradle
index 9ede0a1..10200c9 100644
--- a/app/build.gradle
+++ b/app/build.gradle
@@ -28,7 +28,11 @@ dependencies {
androidTestImplementation 'com.android.support.test:runner:1.0.1'
androidTestImplementation 'com.android.support.test.espresso:espresso-core:3.0.1'
+
+ //Room dependencies
+ implementation 'android.arch.persistence.room:runtime:1.0.0'
+ annotationProcessor 'android.arch.persistence.room:compiler:1.0.0'
// butter knife
- compile 'com.jakewharton:butterknife:8.8.1'
+ implementation 'com.jakewharton:butterknife:8.8.1'
annotationProcessor 'com.jakewharton:butterknife-compiler:8.8.1'
}
diff --git a/app/src/main/AndroidManifest.xml b/app/src/main/AndroidManifest.xml
index ba96da7..d311298 100644
--- a/app/src/main/AndroidManifest.xml
+++ b/app/src/main/AndroidManifest.xml
@@ -4,21 +4,24 @@
-
+ android:theme="@style/AppTheme"
+
+ >
+
+
-
-
-
+
+
+
\ No newline at end of file
diff --git a/app/src/main/java/com/example/androidtechies/majorproject/DescriptionActivity.java b/app/src/main/java/com/example/androidtechies/majorproject/DescriptionActivity.java
index 6c842fa..b5108e3 100644
--- a/app/src/main/java/com/example/androidtechies/majorproject/DescriptionActivity.java
+++ b/app/src/main/java/com/example/androidtechies/majorproject/DescriptionActivity.java
@@ -1,9 +1,11 @@
package com.example.androidtechies.majorproject;
import android.content.Intent;
+import android.os.Bundle;
import android.support.design.widget.CollapsingToolbarLayout;
import android.support.v7.app.AppCompatActivity;
-import android.os.Bundle;
+import android.support.v7.widget.RecyclerView;
+import android.support.v7.widget.Toolbar;
import android.util.Log;
import android.widget.TextView;
@@ -18,11 +20,15 @@ public class DescriptionActivity extends AppCompatActivity {
TextView techDescription;
@BindView(R.id.collapsingtoolbar)
CollapsingToolbarLayout cToolBar;
+ @BindView(R.id.projectModule)
+ TextView modulein;
+
@Override
protected void onCreate(Bundle savedInstanceState) {
super.onCreate(savedInstanceState);
setContentView(R.layout.description);
+
ButterKnife.bind(this);
Intent intent = getIntent();
@@ -30,9 +36,15 @@ protected void onCreate(Bundle savedInstanceState) {
String title = model.getTitleOfProject();
String intro = model.getIntroProject();
String tech = model.getTechnologyUsed();
+ String module = model.getModulein();
Log.d("Information", title+ " 2 "+intro+ " 3 "+tech);
introDescription.setText(intro);
+ introDescription.setTextSize(20f);
techDescription.setText(tech);
+ techDescription.setTextSize(20f);
+ modulein.setText(module);
+ modulein.setTextSize(20f);
cToolBar.setTitle(title);
+
}
}
diff --git a/app/src/main/java/com/example/androidtechies/majorproject/HomeScreen.java b/app/src/main/java/com/example/androidtechies/majorproject/HomeScreen.java
index 65a80ca..a1a09f5 100644
--- a/app/src/main/java/com/example/androidtechies/majorproject/HomeScreen.java
+++ b/app/src/main/java/com/example/androidtechies/majorproject/HomeScreen.java
@@ -3,27 +3,39 @@
import android.content.Intent;
import android.support.v7.app.AppCompatActivity;
import android.os.Bundle;
+import android.support.v7.widget.Toolbar;
import android.view.View;
import android.widget.Button;
+import com.example.androidtechies.majorproject.RoomSample.AppDatabase;
+import com.example.androidtechies.majorproject.RoomSample.DatabaseInitializer;
+
public class HomeScreen extends AppCompatActivity {
public static final String HomeScreenTag = "HomeScreen";
- public static final Integer cseValue = 0;
- public static final Integer it = 0;
- public static final Integer ece = 0;
- public static final Integer eee = 0;
+ public static final Integer cseValue = 1;
+ public static final Integer itValue = 0;
+// public static final Integer eceValue = 2;
+// public static final Integer eeeValue = 3;
+ AppDatabase appDatabase;
+ Toolbar homeToolbar;
+
@Override
protected void onCreate(Bundle savedInstanceState) {
super.onCreate(savedInstanceState);
setContentView(R.layout.activity_home_screen);
- final Button cse = (Button) findViewById(R.id.cseTag);
- Button ece = (Button) findViewById(R.id.eceTag);
+
+ homeToolbar = findViewById(R.id.hometToolbar);
+ homeToolbar.setTitle("Select Branch");
+
+ Button cse = (Button) findViewById(R.id.cseTag);
+// Button ece = (Button) findViewById(R.id.eceTag);
Button it = (Button) findViewById(R.id.itTag);
- Button eee = (Button) findViewById(R.id.eeeTag);
+// Button eee = (Button) findViewById(R.id.eeeTag);
cse.setOnClickListener(new View.OnClickListener() {
@Override
public void onClick(View view) {
+
Intent cseIntent = new Intent(HomeScreen.this, ListPage.class);
cseIntent.putExtra(HomeScreenTag, cseValue);
startActivity(cseIntent);
@@ -33,27 +45,42 @@ public void onClick(View view) {
// ece.setOnClickListener(new View.OnClickListener() {
// @Override
// public void onClick(View view) {
-// Intent ece = new Intent(HomeScreen.this, ECEHomeScreen.class);
-// startActivity(ece);
+// Intent eceIntent = new Intent(HomeScreen.this, ListPage.class);
+// eceIntent.putExtra(HomeScreenTag, eceValue);
+// startActivity(eceIntent);
//
-// }
-// });
-// it.setOnClickListener(new View.OnClickListener() {
-// @Override
-// public void onClick(View view) {
-// Intent it = new Intent(HomeScreen.this, ITHomeScreen.class);
-// startActivity(it);
//
// }
// });
+ it.setOnClickListener(new View.OnClickListener() {
+ @Override
+ public void onClick(View view) {
+
+ Intent itIntent = new Intent(HomeScreen.this, ListPage.class);
+
+ itIntent.putExtra(HomeScreenTag, itValue);
+ startActivity(itIntent);
+
+
+ }
+ });
// eee.setOnClickListener(new View.OnClickListener() {
// @Override
// public void onClick(View view) {
-// Intent eee = new Intent(HomeScreen.this, EEEHomeScreen.class);
-// startActivity(eee);
+//
+// Intent eeeIntent = new Intent(HomeScreen.this, ListPage.class);
+// eeeIntent.putExtra(HomeScreenTag,eeeValue);
+// startActivity(eeeIntent);
+//
//
// }
// });
}
+
+
+ private void populateDatabase() {
+ DatabaseInitializer.populateAsync(AppDatabase.getAppDatabase(this));
}
+}
+
diff --git a/app/src/main/java/com/example/androidtechies/majorproject/InformationModel.java b/app/src/main/java/com/example/androidtechies/majorproject/InformationModel.java
index 6502074..de8ed0d 100644
--- a/app/src/main/java/com/example/androidtechies/majorproject/InformationModel.java
+++ b/app/src/main/java/com/example/androidtechies/majorproject/InformationModel.java
@@ -11,11 +11,14 @@ public class InformationModel implements Parcelable {
String titleOfProject;
String introProject;
String technologyUsed;
+ String modulein;
- public InformationModel(String titleOfProject, String introProject, String technologyUsed) {
+ public InformationModel(String titleOfProject, String introProject, String technologyUsed, String modulein) {
this.titleOfProject = titleOfProject;
this.introProject = introProject;
this.technologyUsed = technologyUsed;
+ this.modulein = modulein;
+
}
public String getTitleOfProject() {
@@ -42,9 +45,20 @@ public void setTechnologyUsed(String technologyUsed) {
this.technologyUsed = technologyUsed;
}
+ public String getModulein() {
+ return modulein;
+ }
+
+ public void setModulein(String modulein) {
+ this.modulein = modulein;
+ }
+
+
+
@Override
public int describeContents() {
return hashCode();
+
}
@Override
@@ -52,15 +66,21 @@ public void writeToParcel(Parcel parcel, int i) {
parcel.writeString(titleOfProject);
parcel.writeString(introProject);
parcel.writeString(technologyUsed);
+
+ parcel.writeString(modulein);
+
}
protected InformationModel(Parcel in) {
titleOfProject = in.readString();
introProject = in.readString();
technologyUsed = in.readString();
+ modulein = in.readString();
}
+
public static final Parcelable.Creator CREATOR = new Parcelable.Creator() {
+
@Override
public InformationModel createFromParcel(Parcel in) {
return new InformationModel(in);
@@ -68,7 +88,9 @@ public InformationModel createFromParcel(Parcel in) {
@Override
public InformationModel[] newArray(int size) {
- return new InformationModel[0];
+
+ return new InformationModel[size];
+
}
};
diff --git a/app/src/main/java/com/example/androidtechies/majorproject/ListAdapter.java b/app/src/main/java/com/example/androidtechies/majorproject/ListAdapter.java
index a566d9f..d480b45 100644
--- a/app/src/main/java/com/example/androidtechies/majorproject/ListAdapter.java
+++ b/app/src/main/java/com/example/androidtechies/majorproject/ListAdapter.java
@@ -61,6 +61,7 @@ public MyViewHolder(View itemView) {
}
}
+
public interface ClickListener {
void onItemClick(View v, int position);
diff --git a/app/src/main/java/com/example/androidtechies/majorproject/ListPage.java b/app/src/main/java/com/example/androidtechies/majorproject/ListPage.java
index e479454..db93075 100644
--- a/app/src/main/java/com/example/androidtechies/majorproject/ListPage.java
+++ b/app/src/main/java/com/example/androidtechies/majorproject/ListPage.java
@@ -6,10 +6,13 @@
import android.support.v7.widget.DefaultItemAnimator;
import android.support.v7.widget.LinearLayoutManager;
import android.support.v7.widget.RecyclerView;
+
+import android.support.v7.widget.Toolbar;
import android.util.Log;
import android.view.View;
import java.util.ArrayList;
+import java.util.List;
public class ListPage extends AppCompatActivity {
ArrayList informationModelArrayList;
@@ -19,13 +22,14 @@ public class ListPage extends AppCompatActivity {
protected void onCreate(Bundle savedInstanceState) {
super.onCreate(savedInstanceState);
setContentView(R.layout.activity_list_page);
+
Intent intent = getIntent();
- Integer value = intent.getIntExtra(HomeScreen.HomeScreenTag,0);
+ Integer value = intent.getIntExtra(HomeScreen.HomeScreenTag,1);
informationModelArrayList = new ArrayList<>();
informationModelArrayList = createFakeData(value);
- recyclerView = (RecyclerView) findViewById(R.id.recyclerView);
+ recyclerView = findViewById(R.id.recyclerView);
// listAdapter = new ListAdapter(informationModelArrayList, this);
listAdapter = new ListAdapter(informationModelArrayList, this, new ListAdapter.ClickListener() {
@@ -34,6 +38,7 @@ public void onItemClick(View v, int position) {
Intent intent = new Intent(ListPage.this, DescriptionActivity.class);
intent.putExtra("Information",informationModelArrayList.get(position));
startActivity(intent);
+
}
});
@@ -47,16 +52,80 @@ public void onItemClick(View v, int position) {
private ArrayList createFakeData(int value) {
ArrayList arrayList = new ArrayList<>();
- int length = getResources().getStringArray(R.array.project_title_it).length;
+ Toolbar toolbar = findViewById(R.id.listtoolbar);
InformationModel model;
- for(int i=0 ; i projectsList = db.projectDao().getAll();
+
+ int count = db.projectDao().countProjects();
+ // Log.d(DatabaseInitializer.TAG,);
+ Log.d(DatabaseInitializer.TAG, "Branch name: " + projectsList.get(0).getProjectBranch()+ "\nNumber of rows: "+count);
+ }
+
+ private static class PopulateDbAsync extends AsyncTask {
+
+ private final AppDatabase mDb;
+
+ PopulateDbAsync(AppDatabase db) {
+ mDb = db;
+ }
+
+ @Override
+ protected Void doInBackground(final Void... params) {
+ populateWithTestData(mDb);
+ return null;
+ }
+
+ }
+}
diff --git a/app/src/main/java/com/example/androidtechies/majorproject/RoomSample/Project.java b/app/src/main/java/com/example/androidtechies/majorproject/RoomSample/Project.java
new file mode 100644
index 0000000..dab46d9
--- /dev/null
+++ b/app/src/main/java/com/example/androidtechies/majorproject/RoomSample/Project.java
@@ -0,0 +1,75 @@
+package com.example.androidtechies.majorproject.RoomSample;
+
+import android.arch.persistence.room.ColumnInfo;
+import android.arch.persistence.room.Entity;
+import android.arch.persistence.room.PrimaryKey;
+
+@Entity(tableName = "project_table")
+public class Project {
+
+ @PrimaryKey(autoGenerate = true)
+ private int id;
+
+ @ColumnInfo(name = "branch")
+ private String projectBranch;
+
+ @ColumnInfo(name = "title_project")
+ private String titleOfProject;
+
+ @ColumnInfo(name = "intro_project")
+ private String introOfProject;
+
+ @ColumnInfo(name = "technology_used")
+ private String technologyUsed;
+
+ @ColumnInfo(name = "modules")
+ private String modulesOfProject;
+
+ public int getId() {
+ return id;
+ }
+
+ public void setId(int id) {
+ this.id = id;
+ }
+
+ public String getProjectBranch() {
+ return projectBranch;
+ }
+
+ public void setProjectBranch(String projectBranch) {
+ this.projectBranch = projectBranch;
+ }
+
+ public String getTitleOfProject() {
+ return titleOfProject;
+ }
+
+ public void setTitleOfProject(String titleOfProject) {
+ this.titleOfProject = titleOfProject;
+ }
+
+ public String getIntroOfProject() {
+ return introOfProject;
+ }
+
+ public void setIntroOfProject(String introOfProject) {
+ this.introOfProject = introOfProject;
+ }
+
+ public String getTechnologyUsed() {
+ return technologyUsed;
+ }
+
+ public void setTechnologyUsed(String technologyUsed) {
+ this.technologyUsed = technologyUsed;
+ }
+
+ public String getModulesOfProject() {
+ return modulesOfProject;
+ }
+
+ public void setModulesOfProject(String modulesOfProject) {
+ this.modulesOfProject = modulesOfProject;
+ }
+}
diff --git a/app/src/main/java/com/example/androidtechies/majorproject/RoomSample/ProjectDao.java b/app/src/main/java/com/example/androidtechies/majorproject/RoomSample/ProjectDao.java
new file mode 100644
index 0000000..26ded65
--- /dev/null
+++ b/app/src/main/java/com/example/androidtechies/majorproject/RoomSample/ProjectDao.java
@@ -0,0 +1,27 @@
+package com.example.androidtechies.majorproject.RoomSample;
+
+
+import android.arch.persistence.room.Dao;
+import android.arch.persistence.room.Delete;
+import android.arch.persistence.room.Insert;
+import android.arch.persistence.room.Query;
+
+import java.util.List;
+
+@Dao
+public interface ProjectDao {
+
+ @Query("SELECT * FROM project_table")
+ List getAll();
+
+
+ @Query("SELECT COUNT(*) from project_table")
+ int countProjects();
+
+ @Insert
+ void insertAll(Project... users);
+
+ @Delete
+ void delete(Project user);
+
+}
diff --git a/app/src/main/java/com/example/androidtechies/majorproject/SplashScreen.java b/app/src/main/java/com/example/androidtechies/majorproject/SplashScreen.java
index 109febf..64ff9c4 100644
--- a/app/src/main/java/com/example/androidtechies/majorproject/SplashScreen.java
+++ b/app/src/main/java/com/example/androidtechies/majorproject/SplashScreen.java
@@ -2,6 +2,7 @@
import android.annotation.SuppressLint;
import android.content.Intent;
+import android.os.Handler;
import android.support.v7.app.AppCompatActivity;
import android.os.Bundle;
import android.view.animation.Animation;
@@ -18,24 +19,14 @@ protected void onCreate(Bundle savedInstanceState) {
setContentView(R.layout.activity_main);
textView=(TextView) findViewById(R.id.projectName);
imageView=(ImageView) findViewById(R.id.splashIcon);
- Animation myanim = AnimationUtils.loadAnimation(this,R.anim.mytransition);
- textView.startAnimation(myanim);
- imageView.startAnimation(myanim);
- final Intent branch = new Intent(this,HomeScreen.class);
- Thread timer = new Thread(){
- public void run(){
- try {
- sleep(5000);
- } catch (InterruptedException e) {
- e.printStackTrace();
- }
- finally {
- startActivity(branch);
- finish();
- }
+ Handler splash = new Handler();
+ splash.postDelayed(new Runnable() {
+ @Override
+ public void run() {
+ Intent branch = new Intent(SplashScreen.this,HomeScreen.class);
+ startActivity(branch);
}
- };
- timer.start();
+ },2000);
}
}
diff --git a/app/src/main/res/anim/mytransition.xml b/app/src/main/res/anim/mytransition.xml
deleted file mode 100644
index 95a5e08..0000000
--- a/app/src/main/res/anim/mytransition.xml
+++ /dev/null
@@ -1,6 +0,0 @@
-
-
diff --git a/app/src/main/res/drawable/atlogo.png b/app/src/main/res/drawable/atlogo.png
new file mode 100644
index 0000000..f48a00c
Binary files /dev/null and b/app/src/main/res/drawable/atlogo.png differ
diff --git a/app/src/main/res/drawable/round_corner.xml b/app/src/main/res/drawable/round_corner.xml
new file mode 100644
index 0000000..6adf4c9
--- /dev/null
+++ b/app/src/main/res/drawable/round_corner.xml
@@ -0,0 +1,9 @@
+
+
+
+
+
+
\ No newline at end of file
diff --git a/app/src/main/res/layout/activity_home_screen.xml b/app/src/main/res/layout/activity_home_screen.xml
index 79bbb87..318b47e 100644
--- a/app/src/main/res/layout/activity_home_screen.xml
+++ b/app/src/main/res/layout/activity_home_screen.xml
@@ -1,51 +1,73 @@
-
-
-
-
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
diff --git a/app/src/main/res/layout/activity_list_page.xml b/app/src/main/res/layout/activity_list_page.xml
index f011dd7..a38bc85 100644
--- a/app/src/main/res/layout/activity_list_page.xml
+++ b/app/src/main/res/layout/activity_list_page.xml
@@ -1,13 +1,23 @@
-
-
+ android:orientation="vertical">
+
+
+
+
+
-
+
diff --git a/app/src/main/res/layout/activity_main.xml b/app/src/main/res/layout/activity_main.xml
index e0d5faf..04d6bdc 100644
--- a/app/src/main/res/layout/activity_main.xml
+++ b/app/src/main/res/layout/activity_main.xml
@@ -3,13 +3,15 @@
android:layout_width="match_parent"
android:layout_height="match_parent"
android:orientation="vertical"
- android:background="@color/colorPrimary"
+
android:gravity="center" >
+
+ android:layout_width="187dp"
+ android:layout_height="176dp"
+ android:src="@drawable/atlogo"
+ android:scaleType="centerInside"/>
diff --git a/app/src/main/res/layout/collaptoolbar.xml b/app/src/main/res/layout/collaptoolbar.xml
new file mode 100644
index 0000000..82661ff
--- /dev/null
+++ b/app/src/main/res/layout/collaptoolbar.xml
@@ -0,0 +1,28 @@
+
+
+
+
+
+
+
+
diff --git a/app/src/main/res/layout/description.xml b/app/src/main/res/layout/description.xml
index 281e5d6..363e36a 100644
--- a/app/src/main/res/layout/description.xml
+++ b/app/src/main/res/layout/description.xml
@@ -1,4 +1,5 @@
+
-
-
-
-
-
-
-
+
@@ -69,7 +45,7 @@
android:layout_width="match_parent"
android:layout_height="wrap_content"
android:text="@string/technology_used"
- android:textSize="25sp"
+ android:textSize="25sp"
android:textStyle="bold"
android:textColor="@android:color/black"/>
@@ -77,29 +53,41 @@
android:id="@+id/tech_brief"
android:layout_width="match_parent"
android:layout_height="wrap_content"
-
- android:text="@string/techno_one"
+ android:textColor="@color/secondary_text"
+ android:text="@string/techno_one_it"
android:layout_marginTop="5dp"
/>
+
-
-
+
+
+
+
+
+
+
+
+
+
+
+
+
+
diff --git a/app/src/main/res/layout/general_toolbar.xml b/app/src/main/res/layout/general_toolbar.xml
new file mode 100644
index 0000000..b8e39ba
--- /dev/null
+++ b/app/src/main/res/layout/general_toolbar.xml
@@ -0,0 +1,9 @@
+
+
+
+
diff --git a/app/src/main/res/values/arrays.xml b/app/src/main/res/values/arrays.xml
index 3103308..c0d697d 100644
--- a/app/src/main/res/values/arrays.xml
+++ b/app/src/main/res/values/arrays.xml
@@ -3,30 +3,212 @@
-
- @string/title_one
- @string/title_two
- @string/title_three
- @string/title_four
+
+ @string/title_one_it
+ @string/title_two_it
+ @string/title_three_it
+ @string/title_four_it
+ @string/title_five_it
+ @string/title_six_it
+ @string/title_seven_it
+ @string/title_eight_it
+ @string/title_nine_it
+ @string/title_ten_it
+ @string/title_eleven_it
+ @string/title_twelve_it
+ @string/title_thirteen_it
+ @string/title_fourteen_it
+ @string/title_fifteen_it
+ @string/title_sixteen_it
+ @string/title_seventeen_it
+ @string/title_eighteen_it
+ @string/title_ninteen_it
+ @string/title_twenty_it
+ @string/title_twentyone_it
+ @string/title_twentytwo_it
+ @string/title_twentythree_it
+ @string/title_twentyfour_it
+ @string/title_twentyfive_it
+ @string/title_twentysix_it
+ @string/title_twentyseven_it
- @string/intro_one
- @string/intro_two
- @string/intro_three
- @string/intro_four
+ @string/intro_one_it
+ @string/intro_two_it
+ @string/intro_three_it
+ @string/intro_four_it
+ @string/intro_five_it
+ @string/intro_six_it
+ @string/intro_seven_it
+ @string/intro_eight_it
+ @string/intro_nine_it
+ @string/intro_ten_it
+ @string/intro_eleven_it
+ @string/intro_twelve_it
+ @string/intro_thirteen_it
+ @string/intro_fourteen_it
+ @string/intro_fifteen_it
+ @string/intro_sixteen_it
+ @string/intro_seventeen_it
+ @string/intro_eighteen_it
+ @string/intro_ninteen_it
+ @string/intro_twenty_it
+ @string/intro_twentyone_it
+ @string/intro_twentytwo_it
+ @string/intro_twentythree_it
+ @string/intro_twentyfour_it
+ @string/intro_twentyfive_it
+ @string/intro_twentysix_it
+ @string/intro_twentyseven_it
- @string/techno_one
- @string/techno_two
- @string/techno_three
- @string/techno_four
+ @string/techno_one_it
+ @string/techno_two_it
+ @string/techno_three_it
+ @string/techno_four_it
+ @string/techno_five_it
+ @string/techno_six_it
+ @string/techno_seven_it
+ @string/techno_eight_it
+ @string/techno_nine_it
+ @string/techno_ten_it
+ @string/techno_eleven_it
+ @string/techno_twelve_it
+ @string/techno_thirteen_it
+ @string/techno_fourteen_it
+ @string/techno_fifteen_it
+ @string/techno_sixteen_it
+ @string/techno_seventeen_it
+ @string/techno_eighteen_it
+ @string/techno_ninteen_it
+ @string/techno_twenty_it
+ @string/techno_twentyone_it
+ @string/techno_twentytwo_it
+ @string/techno_twentythree_it
+ @string/techno_twentyfour_it
+ @string/techno_twentyfive_it
+ @string/techno_twentysix_it
+ @string/techno_twentyseven_it
+
+
+ @string/module_one_it
+ @string/module_two_it
+ @string/module_three_it
+ @string/module_four_it
+ @string/module_five_it
+ @string/module_six_it
+ @string/module_seven_it
+ @string/module_eight_it
+ @string/module_nine_it
+ @string/module_ten_it
+ @string/module_eleven_it
+ @string/module_twelve_it
+ @string/module_thirteen_it
+ @string/module_fourteen_it
+ @string/module_fifteen_it
+ @string/module_sixteen_it
+ @string/module_seventeen_it
+ @string/module_eighteen_it
+ @string/module_ninteen_it
+ @string/module_twenty_it
+ @string/module_twentyone_it
+ @string/module_twentytwo_it
+ @string/module_twentythree_it
+ @string/module_twentyfour_it
+ @string/module_twentyfive_it
+ @string/module_twentysix_it
+ @string/module_twentyseven_it
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
\ No newline at end of file
diff --git a/app/src/main/res/values/colors.xml b/app/src/main/res/values/colors.xml
index e04526b..3aa06ed 100644
--- a/app/src/main/res/values/colors.xml
+++ b/app/src/main/res/values/colors.xml
@@ -1,8 +1,13 @@
- #9E9E9E
- #616161
- #FF4081
+
+ #303F9F
+ #1A237E
+ #E91E63#000000
+ #212121
+ #424242
+ #FFFFFF
+ #BDBDBD
diff --git a/app/src/main/res/values/strings.xml b/app/src/main/res/values/strings.xml
index 56a09bd..0f9df63 100644
--- a/app/src/main/res/values/strings.xml
+++ b/app/src/main/res/values/strings.xml
@@ -1,57 +1,260 @@
- DetailPage
-
-
- IntroDuction
- Technology used
- Team Members
+ Major project
+
+ Introduction
+ Technology Used
+ Module
+ Developed by "android TECHIES" OF GTBIT
+
+ IT
+ CSE
+ ECE
+ EEE
- Hinton
- Analyst
- Autonmont
- Market BASKET ANALYSIS
+
+ Hinton
+
+ Analyst
+
+ Autonmont
+
+ Market BASKET ANALYSIS
+
+ Lambee: 3D Navigation of the Web
+
+ AutoPass (Toll tax collection system)
+
+ Porto Serugo’s Safe Driver Predition
+
+ Smart Garbage Monitoring System using Internet of Things(IOT)
+
+ Biometric authentication
+
+ Web Scrapping and CTR Score Analysis
+
+ Coding Ground
+
+ Remote Vehicle Monitoring System
+
+ RETAIL DATA ANYLYSIS USING HADOOP
+
+ IOT based Patient Health Monitoring System and Smart Medicine Box
+
+ Smart Automated irrigation system
+
+ Smart Card System Using RFID Tags
+
+ STEGANOGRAPHY
+
+ Enhancing security of image and text
+
+ Crypter
+
+ Tow detection and anti-accident system
+
+ WORD TO VECTOR
+
+
+ FOG COMPUTING
+
+ Gideon Personal Assistant
+
+
+ Fire Fighting Robot
+
+ Motion Detection System Using Matlab
+
+ Intelligent Home
+
+ Student smart payment
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
- Python,OpenCV,JavaScript,HTML,CSS,Pytorch
- html, php, css, javascript, jquery
- Internet of Things, Arduino, PHP, Javascript
- Java ,html, css, jsp, javascript
+
+ Python,OpenCV,JavaScript,HTML,CSS,Pytorch
+
+
+ html, php, css, javascript, jquery
+
+
+ Internet of Things, Arduino, PHP, Javascript
+
+
+ Java ,html, css, jsp, javascript
+
+ ML + CV: Python\n
+ Backend: Python + JS\n
+ (Platform)
+ ML: Keras + Tensorflow\n
+ CV: OpenCV\n
+ Web: Socket.io + ScoketProgramming\n
+
+
+ Android , JSP , MySQL
+
+
+ R, R-studio
+
+
+ Software- Arduino IDE, Blynk, LuaTool\n
+ Hardware- NodeMCU, Jumper wires, 2x AA Batteries,Ultrasonic Sensor, Plastic container
+
+
+ Operating System :
+ Window 2000, XP\n
+ Presentation layer : Java,
+ Servlets, JSP\n
+ Database : My SQL\n
+ Documentation Tool :Ms
+ Office\n
+
+
+ PHP, HTML, CSS, Javascript and SQL
+
+
+ Java, JSP,HTML,SQL
+
+ Python
+
+
+ Hadoop , Hive , Pig , Sqoop
+
+
+ Embedded C,
+Amazon web service
+
+
+
+ Language used Embedded C, Java and SQL.\n
+Platform used Arduino Uno IDE, Android Studio, SQLite, Thingspeak (Cloud based platform)
+
+
+
+ A Java based desktop application which will provide user interface to interact with the client using RFID tags which is nothing but a unique card containing electronically stored information that is assigned to the student and the same system is used to store and process student related information using RFID tags via scanning these tags.
+
+
+ MATLAB
+
+
+ Java
+
+
+ Django ,python3.5, AJAX, js
+
+
+ Embedded C
+
+ Python\n
+Platform: ATOM
+
+ Operating System - Windows 95/98/2000/XP /7/10/OS
+ Application Server - Tomcat5.0/6.X
+ Front End - HTML, Java, Jsp
+ Scripts - JavaScript.
+ Server side Script - Java Server Pages.
+ Database - Mysql
+ Database Connectivity - JDBC
+
+ VB.NET, JSON, AJAX, XML
+
+
+ Language used : C programming
+Platform used : Kiel micro Vision
+
+
+
+ Language/Platform Used: Matlab
+
+
+ Language Used : C#, arduino coding\n
+ Platform(s) Used : Visual Studio for C#, Arduino IDE.
+
+
+
+ Advance java,sql,netbeans ide 8.1
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
- Zaid Khan,Piyush Gandhi,Romit Dhamija,Ayushi Bansal
- Ayush Ghai, Aman Manocha, Sachpreet Kaur, Amarpreet Singh
- Rishabh Sachdeva, Kriti Duggal, Anshul Gupta, Mansi Gandhi
- Taranjeet Kaur, Chanpreet Singh, Gurjyot Singh, Amitoz Kaur
+
+
+
+
- Hinton is a fake news generator (video) platform that aims to create
- awareness among the society about how fake new generation is
- possible and it aims to make people believe not to blindly follow
- what is seen on social media platforms like Facebook or Instagram.
- The main working of the project comes in form that we can alter
- facial expressions in a video live upto an extent that it is very
- difficult to distinguish between original and generated video.
- We use ResNet34 model trained to detect 68 points facial
- landmarks on the target video, pix2pix research paper for creating a
- GAN that has 2 neural networks I.e a discriminator and a generator
- both trained on Pytorch, Tensorflow and Keras separately for
- comparisons and then combined to make the final architecture of
- the pix2pix model
- Analyst is action-packed with latest SEO updates and metric analysis to help you rise
- through the difficulties and hardship you generally face during your Search engine
- ranking process. It takes into account analyzing your website’s usability, mobile
- friendliness, technologies, social signals, visitor count and link metrics to evaluate the
- end score and grade your website. Further, you can even download the generated SEO
- report from your browser onto your mobile or desktop PC by just hitting the
- Download Report button for easy access or even share your score on various social
- media platforms.
- Automation and Real Time Monitoring are now becoming an integral part of every industrial
+ Hinton is a fake news generator (video) platform that aims to create
+ awareness among the society about how fake new generation is
+ possible and it aims to make people believe not to blindly follow
+ what is seen on social media platforms like Facebook or Instagram.
+ The main working of the project comes in form that we can alter
+ facial expressions in a video live up to an extent that it is very
+ difficult to distinguish between original and generated video.
+ We use ResNet34 model trained to detect 68 points facial
+ landmarks on the target video, pix2pix research paper for creating a
+ GAN that has 2 neural networks I.e a discriminator and a generator
+ both trained on Pytorch, Tensorflow and Keras separately for
+ comparisons and then combined to make the final architecture of
+ the pix2pix model
+
+ Analyst is action-packed with latest SEO updates and metric analysis to help you rise
+ through the difficulties and hardship you generally face during your Search engine
+ ranking process. It takes into account analyzing your website’s usability, mobile
+ friendliness, technologies, social signals, visitor count and link metrics to evaluate the
+ end score and grade your website. Further, you can even download the generated SEO
+ report from your browser onto your mobile or desktop PC by just hitting the
+ Download Report button for easy access or even share your score on various social
+ media platforms.
+
+ Automation and Real Time Monitoring are now becoming an integral part of every industrial
setup. This project proposes an IOT (Internet of Things) based real-time monitoring and automation system
for a prototype of an industrial setup. This system allows the operator/manager/owner of the plant to monitor
and control the various industrial appliances of the plant remotely through an interactive web application.
@@ -62,8 +265,10 @@
from any internet enabled device and in order to provide fast delivery of any emergency action.
The major aim of this project is to demonstrate the effectiveness of an IOT based system in increasing the
security, minimizing the power consumption, providing real time analysis and providing remote access to the
- physical system of the industrial setup using an alternate source of energy.
- Market Basket Analysis is a modelling technique based upon the theory that if you buy a
+
+ physical system of the industrial setup using an alternate source of energy.
+
+ Market Basket Analysis is a modelling technique based upon the theory that if you buy a
certain group of items, you are more (or less) likely to buy another group of items. Market Basket Analysis is one
of the most common and useful types of data analysis for marketing and retailing. It checks the items that
are frequently purchased by customers and offers are send to that customer related to that particular item
@@ -71,6 +276,591 @@
AR (Association Rules) is a powerful technique that can search through very large sets of seemingly random
data to identify various types of patterns.The purpose of market basket analysis is to determine what products
customers purchase together. It takes its name from the idea of customers throwing all their purchases into a
- shopping cart (a "market basket") during grocery shopping.
+ shopping cart (a "market basket") during grocery shopping.
+
+
+With Project Lambee, we make use of the cheapest interaction tool available to mankind, hands. Making use of advanced Computer Vision Techniques and integrating them with Machine Learning and Deep Learning techniques we can extract meaning out of the normal hand gestures and patterns. Normal hand waves, for example, indicate navigation to either of the directions. Up, down, left, right navigation can be achieved by respective gestures by the index finger, download on the other hand can be achieved by the action of clinching of a fist, zooming via pinch etc.
+
+
+ In today’s era of technology, where machines are being extensively used in all the fields we
+ are trying to emulate concept, which will be of great use in public transport systems.
+ In order to decrease this traffic, we decided to work on the construction of a project which
+ reduces the manual work and hence increases the vehicle speed passing by the toll booth This
+ will increase the speed of the passing by vehicles allowing them to pass through the booth
+ without stopping and also will reduce the manual work and as a result reducing the traffic
+ gathering at the toll collecting booths. In our project, we have a vehicle equipped with the
+ application (user), an admin maintaing all the necessary details and a system at the toll station.
+ Whenever the vehicle enters into the coverage area of toll, it scans the car number using OCR,
+ and maps all the details stored in the database relating to that particular vehicle.
+ The in charge at the toll station realises whether the toll is payed earlier through the virtual wallet ,
+ and if not, it can pay the toll at that instant instead.
+ If the toll is already paid , the vehicle can automatically pass and doesn’t need to stop at the gate.
+ Therefore, it reduces the traffic by reducing the turnaround time of every user.
+
+
+ This is an extensive Exploratory Data Analysis for the Porto Seguro’s Safe Driver Prediction competition within the R environment of the tidyverse and ggplot2. We will visualise all the different data features, their relation to the target variable, explore multi-parameter interactions, and perform feature engineering. The aim of this challenge is to predict the probability whether a driver will make an insurance claim, with the purpose of providing a fairer insurance cost on the basis of individual driving habits.
+
+
+ One of the main concerns with our environment has been solid waste management which
+ involves the detection, monitoring and management of wastes. We have proposed a method
+ of smart garbage monitoring in which waste management is automated by using ‘Internet of
+ Things(IOT)’. It was observed that the garbage truck used to go around the town to collect
+ solid waste twice a day. Although this system was thorough, it was very inefficient. For
+ example, let say street A is a busy street and we see that the garbage fills up really fast
+ whereas maybe street B even after two days the bin is not even half full. So, our goal was to
+ optimise the routes taken by the trash collectors so as to plan their daily/weekly pick up
+ schedule which in turn would increase fuel efficiency.The system monitors the garbage bins
+ and informs about the level of garbage collected in the garbage bins via an android app at
+ any time. Using that data we can then optimize waste collection routes and ultimately reduce
+ fuel consumption.The highly filled garbage bins will be covered first followed by the others
+ depending on the amount of garbage in the bin.
+
+
+ The candidate details are
+ collected in the database.
+ Each record is identified by
+ the candidateʼsfinger print
+ and the respective personal
+ details are stored in the
+ database. This database is
+ then used for authenticating
+ the candidate.
+ In biometric finger print
+ identification a scanner is
+ used to get the image of the
+ A.
+ finger. When a user places
+ his or her finger on the
+ terminals of scanner, the
+ image is electronically
+ read,analysed and
+ compared with a previously
+ recorded image of the same
+ finger, which has been
+ stored in finger scan data
+ base. After the candidate
+ has been authenticated, he
+ is taken to a window where
+ he can casthis vote to the
+ preferred candidate.The
+ vote count for each
+ candidate is then generated
+ with the help of association
+ rules and NaïveBayes data
+ mining algorithms.This helps
+ to draw results of the voting
+ in a easy,secure and hasslefree
+ manner.
+
+
+ CTR Score Analysis, CTR stands for “Click Through Rate”, Average CTR (or average click-through rate) is the ratio of ad clicks to impressions in our AdWords campaigns. Also, the ratio of clicks to impressions on our site links ranked on google after Search Engine Optimisation. While basic CTR measures the rate of clicks on each ad, average CTR calculates the amount of clicks vs. impressions across your campaign, or for each individual keyword. Extending it to the analysis of Meta Titles and Meta Descriptions, the end product will be a complete tool for analysis of how proficient your website is, using the traditional web scrapping method.
+
+
+ The Main Aim of this Project is to generate a platform for students and teachers, to code , compile and execute Programs online . In Existing System , Compilation is an Offline Process. A sufficient amount of memory is utilized in the host machine as the Java Development Kit need to be installed in the host machine. We can compile and run our java program online.
+
+
+ With the emerging technological innovations, users are looking for automotive system than the manually operated system. As the number of vehicle users increased, the number of thefts is increasing. Due to a convergence of multiple technologies usage of Internet evolved in the field of networking, which helps objects to be sensed and controlled remotely. Pi based Vehicle Monitoring System is used for tracking and controlling over internet uses mobile or computer device to monitor, track, and control the vehicle. This project is also aimed to monitor the driver activity through the internet from anywhere around the world by the owner of the vehicle. The owner can monitor the different sensors in the vehicle and can also keep track of the vehicle using GPS in the system and can store these data. The entire activities of the sensors are controlled by the Raspberry Pi which acts as a master controller.
+
+
+ The volume, variety, and velocity of data being produced in all areas of the retail industry is growing exponentially, creating both challenges and opportunities for those diligently analyzing this data to gain a competitive advantage. Although retailers have been using data analytics to generate business intelligence for years, the extreme composition of today’s data necessitates new approaches and tools. This is because the retail industry has entered the big data era, having access to more information that can be used to create amazing shopping experiences and forge tighter connections between customers, brands, and retailers. A trail of data follows products as they are manufactured, shipped, stocked, advertised, purchased, consumed, and talked about by consumers – all of which can help forward-thinking retailers increase sales and operations performance. This requires an end-to-end retail analytics solution capable of analyzing large datasets populated by retail systems and sensors, enterprise resource planning (ERP), inventory control, social media, and other sources Hadoop is an open-source framework that allows to store and process big data in a distributed environment across clusters of computers using simple programming models. It is designed to scale up from single servers to thousands of machines, each offering local computation and storage. Due to the advent of new technologies, devices, and communication means like social networking sites, the amount of data produced by mankind is growing rapidly every year. The amount of data produced by us from the beginning of time till 2003 was 5 billion gigabytes. If you pile up the data in the form of disks it may fill an entire football field. The same amount was created in every two days in 2011, and in every ten minutes in 2013. This rate is still growing enormously. Though all this information produced is meaningful and can be useful when processed, it is being neglected.
+
+
+ This project gives us the opportunity for the development of a microcontroller based system for wireless heartbeat and temperature monitoring using Wi-Fi module along with a smart medicine box system. By this we can easily provide real time information available for many users and can send them alert in critical conditions over internet. In India, many patients are dying because of heart attacks along with several other causes and the reason behind this factor is that they are not getting proper help during the after-operation and treatment period. To give them timely and proper help first we want continuous monitoring of patient health. The fixed monitoring system can be used only when the patient is lying on bed and these systems are huge and only available in the hospitals in ICU. The system is developed for home use by patients that are not in a critical condition but need to be timely monitored by doctor or family. In any critical condition the SMS is sent to the doctor or any family member. So that we can easily save many lives by providing them quick service. With the development of world, Health monitoring system is used every field such as hospital, home care unit, sports, etc. This Patient Monitoring System could be used for patients with chronicle diseases who have daily check-up regime. There are various instruments available in market to keep track on internal body changes but there are many limits in maintenance part due to their heavy cost, size of instruments and mobility of patients.
+
+
+ This project deals with the problem incurred in fields due to manual farming methods. It promises a remote access and real time monitoring. In this we have connected sensors to check the exact moisture condition of soil and weather accordingly irrigate the crops. The android app gives farmer the access to the system even while sitting remotely and control the system, he can turn it on/off anytime just by a click on his phone. A WiFi module is used to link the analog signals to digital data. The sensed data is then mapped to a website that stores and retrieves data on cloud called thingspeak where he can view the status of the soil, plants etc graphically. This helps him understand the crop requirements and improve the yield. Parameters like soil moisture that cant manually be checked can be sensed instantly thereby reducing the farmer’s effort. He is also given a manual control over the system. Database SQLite is used for logging in and storing the credentials. This helps the farmer to secure this system from any 3rd party intervention.
+
+
+ Student smart card is a project which aims towards building a system/application which would allow students to have multiple benefits using a single smart card issued to them.\n
+ -The project involves a card which contains a RFID card which is nothing but a unique card that is assigned to the student. This card can be refilled as and when required by the student with the help of admin.\n
+ -This card can be used for attendance using the scanner system in every classroom and as a gate entry passes for each and every student.\n
+ - This card is useful for the student in places like cafeteria, parking and stationary shops. When the card is inserted or scanned using the scanner , the unique id stored is scanned and accordingly cash is deducted.\n
+ Same way in case of stationary shop where the cash amount is deducted from the student's account and same way in case of canteen. Thus the student just needs to carry the portable card. Thus this card is very beneficial for a student and makes many of its work easy.
+
+
+
+ Steganography is the hiding of a secret message within an ordinary message and the extraction of it at its destination. Steganography takes cryptography a step farther by hiding an encrypted message so that no one suspects it exists. Ideally, anyone scanning your data will fail to know it contains encrypted data\n
+ The aim is to communicate a text among a transmitter and receiver, such that a third party (Intruder/Hacker) cannot understand the message.\n
+ Aim of stenography is to avoid decryption through an opponent who does not distinguish the secret key generate.\n
+ Design new algorithm Sequential-DNA, Round-LSB to calculate the accuracy of method.\n
+ Review various assets about security of steganography.\n
+ Comparing previous algorithm with the proposed algorithms.\n
+
+
+
+ In computer science, secure transmission refers to the transfer of data such as confidential or proprietary information over a secure channel. Many secure transmission methods require a type of encryption. Some organizations transmit data between applications, such as an electronic health record. It is wise to view such transmissions, if the data travels outside an organization, as any message sent over the Internet, meaning its subject to interception and misuse unless protected properly. The data transmitted over the internet is in the form of images and in order to protect the secure data like bank details which are generally shared through the form of images image processing is to be studied in detail along with other audio formats which may also act as a way of transmission that is why our project is aimed at implementing image, text processing in terms of cryptography and steganography via the use of a java application
+
+
+ Representation of market trend of top 10 crypto currencies , various factors like market cap of each curreny, one point destination for any news on that cryptocurrency.
+The platform will be useful for investors to take informed decisions about their investments.
+
+
+ his is a special idea for tow detection and anti-accident system. This system would be installed on a vehicle for proper application. In this project we demonstrate the idea of two detection and alerting system. For this purpose we use an IR sensor that sense the ground level and in case of vehicle tow then system sense the tow condition and will weep a buzzer and alert the resp. Person using gsm calling feature so that the person can take appropriate action fir the protection of vehicle.
+In the case if anti-accident again we use IR sensors that will sense any object in its range and will change the direction of the car automatically.
+
+ Word2vec is a method of computing vector representations of words introduced by a team of researchers at Google led by Tomas Mikolov.
+The word2vec model, has led to significant improvements to natural language processing (NLP) task performance.
+This paper outlines an approach to improving upon the word2vec skip-gram
+model. In order to obtain better word representations for morphologically rich languages and to yield more accurate results for rare or unseen words. A word representation is derived from the vector embeddings of its constituent ngrams, which are updated and learned in the training process.
+The recently introduced continuous Skip-gram model is an efficient method for learning high-quality distributed vector representations that capture a large number of precise syntactic and semantic word relationships. By subsampling of the frequent words we obtain significant speedup and also learn more regular word representations. We train two models on different corpus: one with unigram embeddings, and another with bi-gram embeddings. We evaluate the models using word similarity and word analogy tasks and comparing to a word2vec skip-gram baseline.
+
+ Fog computing can be further used in augmented reality, content delivery and mobile big data
+analytics. A Smart Home With the rapid development of the Internet of Things, more smart
+devices and sensors are connected at home. However, products from different vendors are hard
+to work together. It can also be used in Smart Grid. The smart grid is an electricity distribution
+network, with smart meters deployed at various locations to measure the real time status
+information. A centralized server called SCADA system gathers and analyzes the status
+information, and sends commands to respond to any demand change or emergency to stabilize
+the power grid. Smart Vehicle Fog computing can be integrated into vehicular networks.
+Depending on whether extra infrastructure is needed, vehicular fog computing can be
+categorized into two types, infrastructure-based and autonomous.
+
+ Gideon is a personal assistant, it will answer the questions asked by the
+ person. It is made up with the help of VB.net and MIT app inventor. The coding
+ of the application is done in language visual basic.net and the Android application build using MIT app inventor guide on is a virtual assistant to reduce the human effort it works as an intelligent personal assistant and knowledge navigator the feature uses and natural language user interface and to answer questions, make recommendations and perform actions by delegating request to database or a set of Web Services the language used is easily understandable. Gideon is working via bluetooth or using internet the system should have bluetooth connectivity to make connection via bluetooth. To make connection over internet the QR code should be scanned ones by the Android device after
+ that take that device anywhere along with you that order will work properly.
+
+ It is a micro controller based fire fighting robot. we have used ADC and
+ comparator system which work in a way when heat detect is nearby the heat sensor,
+ it will activate the motor which is connected to water tank and will remain in the
+ activated state till sensor again detect that temperature is drawn normal.
+
+ Motion detection is the process of detecting a change in the position of an object relative to its surroundings or a change in the surroundings relative to an object. Motion detection can be achieved by either mechanical or electronic method. A typical motion detection system can be divided into front-end system and back-end system. The task of the front-end system is to recognize motion by web-camera and represents it by a set of rectangles (red and blue).Features like Movement detection and Luminescence density. The feature is extracted using Kalman Algorithm. The task of the back-end system is to create a model to recognize the motion from the image in recognition phase.
+
+
+ Intelligent Home is a project of Home Automation. Home automation is done with the help of Arduino. The project involves the use of Artificial intelligence for Speech Recognition.Home automation system uses a Software, which you can use to control electrical appliances with clicks or voice commands. Commands are sent to Arduino. So one need not get up to switch on or off the device while watching a movie or doing some work.This is possible because of the smartphones and internet that we are widely using. Home automation can again be divided in to just controlling the appliances using a smartphone from a remote location and another type filled with sensors and actuators which controls the lighting, temperature, door locks, electronic gadgets, electrical appliances etc. using a “smart” system.
+
+
+
+ Our project is about to make a cashless life in college.
+ This project will allow to pay his/her bills through a account which is maintained by admin. Admin will provide a unique QR code to each student which will be scanned for processing transaction.
+Student can refill his account whenever he needs.this project can also be used for attendance purpose which will reduce the chances of proxy.
+At the time of transactio.student need to enter his pin which is provided by the admin at the time of registration.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ Module 1.\n
+ ResNet34 Training Module:-
+ This module uses a ResNet34 architecture to train on the 68 point facial landmark detection dataset.\n
+ Module 2.\n
+ Data Generation Module:-
+ This module is used to generate data from an incoming video file.\n
+ Module 3.\n
+ Generator Network Module:-
+ This module is used to make the generator neural network.\n
+ Module 4.\n
+ Discriminator Network Module:-
+ This module is used to make the discriminator neural network.\n
+ Module 5.\n
+ Pix2pix Module:-
+ This module intakes the different architectures and then combines them to form the pix2pix architecture.\n
+ Module 6.\n
+ API Views:-
+ Module that contains API Backend views\n
+ Module 7.\n
+ Static Files:-
+ Module that contains static files of API (frontend)\n
+
+
+ Module 1.\n site vs site: It allows you to analyse your business search engine competition to get the most on internet investment \n
+ Module 2.\n Pdf Report Generation: Download seo pdf to easy and reliable offline access to your search engine insights\n
+ Module 3.\n Share: You can share your seo scores on various social media platforms\n
+ Module 4.\n Keyword consistency: allows you to analyse your webpage as per their keyword concentration\n
+ Module 5.\n Usability testing: analyse user behaviour as per the search engine standards\n
+ Module 6.\n Compare Domains Individually: Get instant compare analysis when you are done analysing a single domain without heading back to site vs site page\n
+ Module 7.\n Broken Links Analysis: Broken links send users to non-existing web pages. They are bad for your site usability, reputation and SEO.\n
+ Module 8.\n Social Login: Allows user to login via facebook, twitter and google.\n
+ Module 9.\n Multi-Language Support: Allows website to used in multiple language forms\n
+ Module 10.\n Indexed Page Checker: Checks how many pages are indexed in the search engine database\n
+
+ Module 1.\n Motor Module: This module comprises of four motors along with four LEDs which indicate their ON/OFF status .One pair of motors is temperature-dependent while the other is time- dependent. The working of temperature dependent motors alternates on the basis of increasing temperatures measured using temperature sensors. While the load share of time dependent motors alternates between the main and auxiliary motor with time.\n
+ Module 2.\n Lighting Module: The second module comprises of three LDRs (Light Dependent Resistors: whose functioning depends on the incident light intensity) and eight LEDs. The LEDs adjust their brightness based on the intensity of the natural light coming from the window that is sensed by the LDRs so that the plant is always well lit and thus providing an increased efficiency.\n
+ Module 3.\n Secure Room Module: This module constitutes of a proximity sensor, servo motor, and a fingerprint sensor lock mechanism. The primary function of the module revolves around automatic door opening mechanism using the above mentioned devices. The proximity sensor helps to judge the presence of a person near the door while the fingerprint sensor uses the fingerprint pattern which is unique, to detect whether the person is authenticated to enter the premises of the secure room or not.\n
+ Module 4.\n Smoke Sensing Module and Website: There is also a smoke sensor which senses smoke in case of a fire and alerts the industry staff through piezoelectric buzzer and sending an SMS and a notification in the UI as well. The various modules of the project are interconnected via the BOLT cloud to a Web Application accessible only via OTP protected login page. A fully functional admin control panel gives the admin functionality of shifting from an automatic mode to manual mode and control each hardware part separately.\n
+
+
+ Module 1. Email alert\n
+ Module 2. Login\n
+ Module 3. Logout\n
+ Module 4. Database connectivity\n
+ Module 5. Data Mining\n
+ Module 6. Data Analysis\n
+ Module 7. Data processing\n
+ Module 8. Data Tracking\n
+
+
+ Module 1.\n ML: Image classification model working. Can make out the difference b/w dogs, cats and other animals.\n
+ Module 2.\n CV: Background subtraction, segmentation and hand recognition working.Based on this, we can count the no. of fingers being pointed at the screen\n
+ Module 3.\n JS: Creating and maintaining sockets b/w two systems. Based on this, a chat application working.\n
+ Module 4.\n Web: Socket based triggers and corresponding movements\n
+
+
+
+ Module 1.\n Login Activity: This module comprises of two facets, login id and password , for necessary authentication and connection to the database. Login Activity is necessary to access personalized account of every user.\n
+ Module 2.\n Admin Panel: The second module comprises of a panel consisting of functions regulated by the admin including my profile, new registration, vehicle registration, black list vehicle, manage users, and logout. Each option leads to separate functionality.\n
+ Module 3.\n Profile: This module tells the admin all its personal details including userid, name, fathers name ,email id, mobile number, address, user type, reg date and account balance. These details are fetched from the database through a JSP conncetion.\n
+ Module 4.\n New Registration module: This module allows registration of a new user, including owner of a vehicle, admin or toll manager.The menu allows the user to enter all his personal details which are then stored in MySQL database connected through JSP.\n
+ Module 5.\n Vehicle Registration: Allows registration of a vehicle, entry of attributes such as vehicle no. , license no. , model no., description to enter in the table vehicle in database.\n
+ Module 6.\n Black List Vehicle: The module allows to black list an unauthorized vehicle, changing to true or false accordingly in the database, barring the aunauthorized vehicle to pass through the gate.\n
+ Module 7.\n Deactivating User: The admin is allowed the access to deactivate the user , so that an unauthorized user is unable to use his virtual wallet.\n
+ Module 8.\n MySql database(PHP MyAdmin) : Used to monitor data in a database, using two separate tables , user details and vehicle details.\n
+
+
+ Module 1.\n Data visualization\n
+ Module 2.\n Feature analysis\n
+ Module 3.\n Missing value analysis\n
+ Module 4.\n Univariate analysis\n
+ Module 5.\n Bivariate analysis\n
+ Module 6.\n Correlation overview\n
+ Module 7.\n Exploring correlated features \n
+ Module 8.\n Feature engineering\n
+ Module 9.\n Modeling preparation \n
+ Module 10.\n Xgboost modelling and feature importance\n
+
+
+ Module 1.\n The NodeMCU Development board is flashed with the binary files of the latest firmware
+ and then the compatible drivers (CH341G) are installed on the system.\n
+ Module 2.\n The Arduino IDE is then installed , along with the NodeMCU libraries through boards
+ manager which recognize and help coding arduino sketches compatible to the NodeMCU
+ board.\n
+ Module 3.\n Now, we test the board for internet connectivity by connecting it with a wifi router/hotspot.
+ This is achieved by coding in the SSID and Password and using the ESP8266 WiFi libraries
+ compatible with arduino IDE.\n
+ Module 4.\n Once the sketch is verified and compiled, we upload it by selecting the available COM
+ port. Once it is flashed, the Serial Monitor (which would display the IP Address as output) is
+ used to check whether the Node MCU is connected to the available WiFi network.\n
+ Module 5.\n Further we interface the ultrasonic sensor with the NodeMCU development board to
+ calculate the distance of an object in front of it. We use the principle of speed of sound in air
+ and the time period to calculate distance of the object in front of the sensor.\n
+ Module 6.\n First, the height of the dustbin is calculated which would eventually help to generate the
+ percentage of the trash in the can as it fills up.\n
+ Module 7.\n As the ultrasonic sensor measures the distance of the trash and hence the percentage of
+ the can filled, it sends this data to the microcontroller. The microcontroller in return, is
+ connected to the blynk cloud servers which sends the data on the mobile application.\n
+ Module 8.\n As the trash in the bin reaches a certain amount, the application notifies the collector
+ about the increasing level. (In this case, the threshold is kept at 75% of the amount of the
+ dustbin which can be altered according to the preferences of the user.)\n
+ Module 9.\n The application displays a series of three virtual LEDs that indicate the urgency of the
+ action required for a particular can in the form of red, yellow and green lights.\n
+ Module 10.\n Also, an animated level indicator virtually displays the level of trash filled in the can, in
+ accordance with the lights for the collector’s perusal.\n
+
+
+ Module 1 \nAdmin panel:\n
+ a) Register candidate-Admin will register the candidates to whom citizens will give votes
+ like president, vice president.\n
+ b) View candidate list- He can view the list of candidates which are standing in the election
+ for their respective post.\n
+ c) Register citizens with biometric: He will register the citizens using their personal info
+ alongwith fingerprint.\n
+ d) View Registered citizens: He can view the list of citizens who will give votes in the
+ election process.\n
+ e) Add agenda: He can add the agenda of candidates party-wise.\n
+ f) View results: He can view the result in the sorted order like the candidate which has
+ acquired the maximum votes will be on the top.\n
+ g) View result in graph form: He can also view the result in some structure format like
+ bargraph or piechart.\n
+ h) View feedback : He can view the feedback given by the citizens about any particular
+ candidate or party using naive bayesian data mining algo .\n
+ i) Feedbackʼs graph: He can view the feedback in graph form also.\n
+ Module 2\nCitizens panel:\n
+ a) Login: Citizens will login with their respective id and password alloted to them at the time of
+ registration and then using fingerprint also.\n
+ b) Update profile: They can update their profile like change their phone no or any other personal
+ info. \n
+ c) Vote: Citizens will give vote to whomsoever candidate they wish to but they cam give only one time
+ vote.\n
+ d) View agenda: They can view the agenda of any party.\n
+ e) Give feedback: They can give feedback about any candidate if they wish to.\n
+ On the home page other than these panels, there are other sub pages like about us , contact us,
+ services and login\n
+
+
+ Module 1.\n Link Crawler Module\n
+ A) SetUrl Module: This module fetches the url input by the user and stores it into the $url variable. It then also recognizes the host of the url entered by the user and stores it into the $host variable.\n
+ B) Crawl Module: This module comprises of two parts, firstly it checks the value in $url, if it is empty, then it throws and exception “URL must be set” and after the URL is set it, it runs the crawl function. It fetches the pre-requisite depth and URL from the $depth and $url variables. After the execution of crawl function, it arranges the fetched URLs alphabetically. And stores it into the $results array.\n
+ C) _crawl Module: This module constructs an array named $seen, checks if the there is no value in $url, and if it’s so, it fetches the url from the buildurl function. It then checks for the value if depth and url again. After both the values are fetched, they are stored in the $results array.\n
+ D) Dom Module: This module constructs a Document Object Model from the fetched url. The url(s) and depth(s) of the fetched urls are stored in the $results array. Then the above constructed $seen array is stored in newly constructed $crawled array. This is done for the comparison of urls later.\n
+ E) Anchor Module: This module fetches all the urls from the DOM by identifying the anchor tag. All these anchors are now stored in $elements. It then checks for the href tags, if not found, is fetched from the $elements and stored in the $seen array.\n
+ F) Array_diff: This module compares the urls stored in $seen array and $crawled array. If the crawled url matches the urls in seen array, the crawler skips it to prevent ambiguity.\n
+ G) Buildurl Module: This module helps build a proper url by looking for and removing any “#” values and “javascripts” in the fetched urls. It also trims the required urls and stores then into the $parts array. The $parts data is then parsed using the value of $url and fetching the href it stores the complete path in $path.\n
+ H) BuildUrlFromParts Module: This module fetches all the values from the $parts array, the href, the host name, the port etc and builds a url to be stored in the $new_href.\n
+ I) GetHostFromUrl Module: This module parses the url, input by the user, compares it with a string of regular expressions and returns the value of the fetched host in the $host variable.\n
+ Module 2.\nMeta Title Crawler Module\n
+ This module crawls the meta titles of the crawled urls. This data is then stored for later user-end display and website proficiency check and CTR Score.\n
+ Module 3.\n Meta Description Crawler Module\n
+ This module crawls the meta descriptions of the crawled urls. This data is then stored for later user-end display and website proficiency check and CTR Score.\n
+ Module 4.\nWebsite (User End) Module\n
+ This is the front-end or the user end of the tool, which allows the user to directly input the url of whose CTR Score they want to analyse and data they want to fetch. It will display all the fetched data[url(s), meta title(s) and meta description(s)], with the CTR Score as well as a functionality of downloading the fetched data to the user.\n
+
+
+
+ Module 1.\n Editor: Student can compile and run their code using editor on Coding Ground.\n
+ Module 2.\n Practice: Students can practice their coding skills in practice area.\n
+ Module 3.\n Signup: User can enter their credentials to get registered into the system.\n
+ Module 4.\n Login: User can login using their registered credentials.\n
+ Module 5.\n Homepage: User details will be shown on this web page.\n
+
+
+
+ Module 1.\n Raspberry pi 3 model B : The Raspberry Pi 3 Model is the latest version of the Raspberry Pi, a tiny credit card size computer.\n
+ Module 2.\n GPS module : GPS is used to detect the Latitude and Longitude of any location on the Earth, with exact UTC time. GPS module is the main component in our vehicle tracking system project.\n
+ Module 3.\n UART module :This is a USB to Serial UART converter module. It is allow you to connect your computer through USB port and use it as a regular serial communication.4. 16 GB class 10 micro SD card.
+ In order to store the Raspbian operating system if you are using Raspberry pi 3. 16 GB class 10 micro SD card.\n
+ Module 4.\n Jumper wires:
+For connecting the GPIO pins together.\n
+Module 5.\n Raspberry pi OS:
+Normally a raspberry pi uses rasping as an operating system it also uses a Debian based Linux operating system.\n
+Module 6.\n Putty:
+It is software which is used to interface the raspberry pi and laptop screen.\n
+Module 7.\n Filezilla:
+ FileZilla is a free software, cross-platform FTP application, consisting of FileZilla Client and FileZilla Server.\n
+Module 8.\n VNC Viewer:VNC Connect is screen sharing software that enables you to solve problems, help people and work remotely control remote computers as though sitting in front of them, at any time, from any device.\n
+Module 9.\n GPS Antenna: It's job is to convert the energy in the electromagnetic waves arriving from the satellites into an electric current that can be processed by the electronics in the receiver.\n
+
+
+
+ Module 1.\n Sqoop: To load data into SQL from CSV file and from the Hive and Pig results. It is basically used communicate with HDFS.\n
+ Module 2.\n Pig: In this module we use pig to analyse the data like top 10 customer, top 10 companies, chain wise sales etc. As pig is a non SQL database therefore queries used in pig are different. All the work done in pig is in cache memory therefore all the results are temporary.\n
+ Module 3.\n Hive: In this module we use hive to analyse the data like chain wise sales, top 10 brands etc. As hive uses HQL(hive Query Language) therefore all queries are written in hive shell.\n
+
+
+
+ Module 1.\n Microcontroller-
+ We are using Arduino Nano microcontroller. As its name, Arduino Nano is a compact and breadboard-friendly version board based on ATmega328 processor. The dimension of Arduino Nano is only 43mm x 18mm, it comes with 6 PWM I/O from the total of 14 digitals I/O, 8 Analog inputs, 16Mhz clock speed and 32kB of flash memory.
+ This chip provide support to other peripheral devices and sensors. We can manipulate the working of other devices by using this microcontroller and we can change its functionality by its programme which is written in its Arduino application.\n
+
+ Module 2.\n DHT sensors-
+ The DHT sensors are made of two parts, a capacitive humidity sensor and a thermistor. There is also a very basic chip inside that does some Analog to Digital conversion and spits out a digital signal with the humidity. This digital signal is fairly easy to read using any microcontroller.\n
+
+ Module 3.\n Temperature Sensor-
+ We are using Lm35 Temperature. The LM35 series are precision integrated circuit LM35 temperature sensors, whose output voltage is linearly proportional to the temperature in Celsius (Centigrade). It measures the temperature of patient and sent that Analog readings to microcontroller.\n
+
+ Module 4.\n Heart Beat Sensor-
+ Heart beat sensor is designed to give digital output of heart beat when a finger is placed inside it. This digital output can be connected to Arduino directly to measure the Beats per Minute (BPM) rate. It works on the principle of light modulation by blood flow through finger each pulse. IC LM358 is used for this sensor.\n
+
+
+
+ Module 5.\n Wi-Fi-
+ Wi-Fi is must in this project as it helps in connectivity of health monitoring system to others like to the emergency contacts and regular updates to doctor and it is also used in sending data.\n
+
+ Module 6.\n Web services-
+ Amazon web service. Essentially AWS is Amazon’s cloud-computing platform. It is providing services such as computing power database messaging and storage. With the help of this web service we can send alert message to the relatives of patient or doctor, when patient is critical. This cloud-computing platform will also work as our database, it will store the data like patient’s relative contacts, alert messages, health of patient, medicines schedule and other important data.\n
+
+
+
+ Module 1.\n Android app module – Helps to remotely access the system and gives the control to the user even from a distance. Secured.\n
+ Module 2.\n Cloud based module- Connects the sensors to the website and helps map the analog signals digitally. Helps to let you analyze and visualize your data and act on it.\n
+ Module 3.\n Microprocessor Arduino Nano module- Sensor data can be sent to ThingSpeak from Arduino. It is used to program the sensors and make them react according to certain specified conditions. It is known to add “life” to the hardware.\n
+ Module 4.\n WiFi module- Gives any microcontroller access to your WiFi network. Interfaces the analog and digital data and takes commands from arduino nano.\n
+ Module 5.\n Soil moisture sensing module- Helps monitor the level of moisture in soil that’s favorable to the plant which cant manually be tested.\n
+ Module 6.\n Digital humidity temperature sensing module- DHT11 is a low cost humidity and temperature sensor that reacts to changes in these parameters according to reference values.\n
+ Module 7.\n Rainfall sensing module- Switching device activated by rainfall\n
+
+
+
+ The implementation is done using Java based desktop application which is used to scan a card which is nothing but a RFID card that is assigned to the student and the same system is used to store and process student related information using barcode scanner.\n
+Functionality of our Student Smart Card System-\n
+Module 1.\n Admin Module\n
+The admin can login and can refill the balance of the student’s card. The admin can also access the other information of students:\n
+Student’s payment related information.\n
+ Student’s attendance related information.\n
+ Other common admin features\n
+
+Module 2.\n Student Module-
+The Student can login and view balance and last five transactions which will help him to be aware of his card balance and accordingly refill it whenever required.\n
+
+Module 3.\n Account maintenance-
+The admin is responsible for maintaining the accounts of the students holding the card.\n
+
+Module 4.\n ID scanning-
+The card is being scanned to deduct cash amount from the user's account or get the student's important documents or mark the attendance.\n
+Module 5.\n Payment in cafeteria –
+This ID on the card can be scanned to pay for the food items purchased in cafeteria.\n
+Module 6.\n Payment for parking and Document Carrier –
+The card can also be used to pay for parking.The card's unique ID can be used to retrieve the important documents (results,) of the student stored on the server. Thus the student doesn’t have to carry the hardcopy of the documents always.\n
+Module 7.\n College Entry –Card will be used as an entry pass for the college entrance\n
+
+
+
+ Module 1.\n Steganocoder: This module "hides" a message within an image that the user provides. The final output is an image file that contains the message protected by encryption and encoding.\n
+ Module 2.\n Steganocoder_rand : This module is an upgrade to the STEGANCODER Function b/c the message is hidden randomly across pixels within the target "canvas" image. The STEGANCODER Function sequentially "hides" the message. It has been demonstrated that sequential encoding makes the message far easier to detect and recover.\n
+ Module 3.\n Sender : This module encrypts and hide message to a canvas image.\n
+ Module 4.\n Receiver : This module decrypts and extracts the message from hidden image.\n
+ Module 5.\n Receiver_img_to_img : This module extract image message from hidden image.\n
+ Module 6.\n Receiver_img_to_text : this module extract text message from hidden image.
+
+
+
+ Module 1.\n Nowdays information security is becoming important in data storage and transmission. It is important to hide the important information which we are doing through modified playfair cipher. Our first module is about this.\n
+ Module 2.\n In this method we are using 6X6 matrix to perform the encryption and decryption. The matrix includes both numbers and letters. Hence, making it difficult to decrypt the hidden information\n
+ Module 3.\n Modified Playfair cipher can be used in 2 ways hence it enhances the security.\n
+ Module 4.\n The modified playfair cipher can be extended further and we can also use 10X9 matrix which includes the special characters even.\n
+ Module 5.\n The cipher is easy to implement and earlier we applied brute force and frequency analysis on it.\n
+ Module 6.\n Image steganography is the technique of hiding the data in image in such a way that prevents the unintended user to detect the hidden message or data.\n
+ Module 7.\n This technique is used to hide passwords and encryption technique and is also used to transfer the hidden messages.\n
+ Module 8.\n A common approach of hiding the data within image file is least bit substitution in which binary representation of hidden data is taken and then we overwrite the LSB of each byte within the cover image.\n
+
+
+
+ Module 1.\n-coinmarketcap api used for getting data about changing rates\n
+ Module 2.\ncryptocurrencychart api for representation\n
+ Module 3.\ngraphs of market cap\n
+ Module 4.\nnewsapi for news from different countries on currencies\n
+ Module 5.\nxhr\n
+ Module 6.\ncors\n
+ Module 7.\nnotification\n
+ Module 8.\nreal time price checking\n
+ Module 9.\nsignup and login feature\n
+ Module 10.\nkeeping record of all coins of the user\n
+
+
+ Module 1.\n Idea of project\n
+ Module 2.\n Components list\n
+ Module 3.\n Circuit diagram\n
+ Module 4.\n Purchasing components\n
+ Module 5.\n Designing pcb\n
+ Module 6.\n Assemble components\n
+ Module 7.\nTest the soldering dry or not\n
+ Module 8.\n Designing code in embedded C language\n
+ Module 9.\n Programming IC\n
+ Module 10.\nTesting of features\n
+
+
+ Module 1.\n Txttocsv.py\n
+ Module 2.\n Word2vec.py\n
+ Module 3.\nWord2vecgenism.py\n
+ Feeding the word 2 vector with related corpus that would like to find analogies with so that it would probably find good analogies between similar words.\n
+ Module 4.\nSdata.py\n
+ SICK dataset is a corpus which is trained to find similaritiesbetween words combonation,which is tested by MIKOLOV TESTSET(contains countries with capital names)\n
+ Module 5.\nBdata.py\n
+ IMBD data set,which we have feed in the input to check the word similarity both in the case of unigram and bigram tested by MIKOLOV test set.\n
+ Module 6.\nSwordsim.py\n
+ TCK data set tested by word sim test set.\n
+ Module 7.\nBwordsim.py\n
+ IMBD data set tested by TURNEY TESTSET.
+
+ We monitor data access in the cloud and detect abnormal data access patterns User profiling is a
+well known Technique that can be applied here to model how, when, and how much a user
+accesses their information in the Cloud. Such ‘normal user’ behavior can be continuously
+checked to determine whether abnormal access to a user’s information is occurring. This method
+of behavior-based security is commonly used in fraud detection applications. Such profiles
+would naturally include volumetric information, how many documents are typically read and
+how often. We monitor for abnormal search behaviors that exhibit deviations from the user
+baseline the correlation of search behavior anomaly detection with trap-based decoy files should
+provide stronger evidence of malfeasance, and therefore improve a detector’s accuracy.
+Cloud computing is a model for enabling convenient, on demand network access to a shared pool
+of configurable computing resources (for example, networks, servers, storage, applications, and
+services) that can be rapidly provisioned and released with minimal management effort or
+service-provider interaction. We propose a different approach for securing data in the cloud
+using offensive decoy technology. We monitor data access in the cloud and detect abnormal data
+access patterns. We launch a disinformation attack by returning large amounts of decoy
+information to the attacker. This protects against the misuse of the user’s real data. We use this
+technology to launch disinformation attacks against malicious insiders, preventing them from
+distinguishing the real sensitive customer data from fake worthless data the decoys, then, serve
+two purposes:\n
+(1) Validating whether data access is authorized when abnormal information access is detected.\n
+(2) Confusing the attacker with bogus information.
+
+ Module 1.\n Weather: it will provide user with the real time weather update.\n
+ Module 2.\n QR code: it will allow user to connect there Android device to the guide on app by just simply scanning the QR code.\n
+ Module 3.\n Chat bubble R: it will allow you to type in your query in the app and it will appear on right side.\n
+ Module 4.\n Chatbubble L: it will allow assistant to reply to your query and details appear on left.\n
+ Module 5.\n Chat flow: page on which the whole chat with appear.\n
+ Module 6.\n Facebook login : allow user to login via Facebook.\n
+ Module 7.\n News strip: it will allow user to fetch news.\n
+ Module 8.\n Imdb panel: it will give IMDb rating of a particular movie.\n
+ Module 9.\nGoogle strip: direct your search result to Google homepage.\n
+ Module 10.\n Game panel: it will allow user to run any game which is on the system by making voice command.\n
+
+
+ Module 1.\n PCB :Board on which the components are assembled.\n
+Module 2.\n Microcontroller : A low power, high performance,CMOS 8 bit with 40 pin (89s52).\n
+Module 3.\n DC Pump: A pump used which is operated on 9 volt.\n
+Module 4.\n Heat Sensor : Sensor used of tungsten material because as soon as it gets temperature it spreads in vicinity.\n
+Module 5.\n Variable resistance preferably 103 ohms is used.\n
+Module 6.\n Capacitors: 30 Pico farad ceramic capacitor is used.\n
+Module 7.\n PN junction diode : 1N4007 pn junction diode used as 1N4007 diode is electrically compatible with other rectifier diodes, and can be used as a replacement for any diode in the 1N400x family.\n
+Module 8.\n Dc Gear motor :Operated on 9 volt at 60 Revolution per minute.\n
+Module 9.\n Darlanting amplifier : connected to motor.\n
+Module 10.\n Circuit is forward biased.\n
+
+
+
+ Module 1.\n Kalman filtering: It is an algorithm that uses a series of measurements observed over time, containing statistical noise and other inaccuracies, and produces estimates of unknown variables that tend to be more accurate than those based on a single measurement alone.\n
+
+Module 2.\n Creating A GUI: GUIDE (GUI development environment) provides tools to design user interfaces for custom apps.\n
+
+Module 3.\nInvariants: These are especially useful when reasoning about whether a computer program is correct.\n
+
+Module 4.\nImage Type: It is a particular method of associating matrix values with pixel colors.\n
+
+Module 5.\n True Color Image: In a truecolor image, every image pixel has three values associated with it: the red, green, and blue components.\n
+
+Module 6.\nIndexed Image: It is the image matrix values do not determine the pixel colors directly. Instead, MATLAB uses the matrix values as indices for looking up colors in the figures colormap.\n
+
+Module 7.\nScaled Indexed Image: It is a scaled indexed image uses matrix values to look up colors in the figure’s colormap.\n
+
+Module 8.\nGrayscale Images: It contains only brightness information. A grayscale image is a scaled indexed image that uses a grayscale colormap.\n
+
+Module 9.\nIntensity: It is a numerical value which represents a pixel, i.e. for a 8-bit gray scale image the value of a pixel can be in the range of [0,255], where (generally) numerical “0” represents black color and numerical “255” represents white color.\n
+
+Module 10.\n Brightness: It is a relative term which can be understood visually. If two pixels (say, pixel1 and pixel2) of an image have intensity values, 125 and 210 respectively, then pixel2 is brighter than pixel1:\n
+
+
+ Module 1.\n Arduino and Arduino IDE: The Arduino Uno is a microcontroller board based on the ATmega328 (datasheet). It has 14 digital input/output pins (of which 6 can be used as PWM outputs), 6 analog inputs, a 16 MHz ceramic resonator, a USB connection, a power jack, an ICSP header, and a reset button. It contains everything needed to support the microcontroller; simply connect it to a computer with a USB cable or power it with a AC-to-DC adapter or battery to get started.Arduino consists of both a physical programmable circuit board (often referred to as a microcontroller) and a piece of software, or IDE (Integrated Development Environment) that runs on your computer, used to write and upload computer code to the physical board.\n
+ Module 2.\n Relay board: A relay is an electrical device which is generally used to control high voltages using very low voltage as an Input. This consists of a coil wrapped around a pole and a two small metal flaps(nodes) that are used to close the circuit. One of the node is fixed and other is movable. Whenever an electricity is passed through the coil, it creates a magnetic field and attracts the moving node towards the static node and the circuit gets completed. So, just by applying small voltage to power up the coil we can actually complete the circuit for the high voltage to travel.\n
+ Module 3.\n Visual Studio for C# : Microsoft Visual Studio is an integrated development environment (IDE) from Microsoft. It is used to develop computer programs, as well as web sites, web apps, web services and mobile apps. Visual Studio includes a code editor supporting IntelliSense (the code completion component) as well as code refactoring. The integrated debugger works both as a source-level debugger and a machine-level debugger. Other built-in tools include a code profiler, forms designer for building GUI applications, web designer, class designer, and database schema designer. It accepts plug-ins that enhance the functionality at almost every level.Visual studio is used to run the C# software for Speech Recognition. Speech recognition is the inter-disciplinary sub-field of computational linguistics that develops methodologies and technologies that enables the recognition and translation of spoken language into text by computers. It is also known as "automatic speech recognition" (ASR), "computer speech recognition", or just "speech to text" (STT). Some speech recognition systems require "training" (also called "enrollment") where an individual speaker reads text or isolated vocabulary into the system. The system analyzes the person's specific voice and uses it to fine-tune the recognition of that person's speech, resulting in increased accuracy.\n
+
+
+
+
+ Modules are not disclosed yet
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
diff --git a/app/src/main/res/values/styles.xml b/app/src/main/res/values/styles.xml
index 0eb88fe..334040c 100644
--- a/app/src/main/res/values/styles.xml
+++ b/app/src/main/res/values/styles.xml
@@ -7,5 +7,7 @@
@color/colorPrimaryDark@color/colorAccent
-
+
diff --git a/build.gradle b/build.gradle
index e6b32bc..47825b2 100644
--- a/build.gradle
+++ b/build.gradle
@@ -7,7 +7,7 @@ buildscript {
jcenter()
}
dependencies {
- classpath 'com.android.tools.build:gradle:3.0.1'
+ classpath 'com.android.tools.build:gradle:3.1.0'
// NOTE: Do not place your application dependencies here; they belong
diff --git a/gradle/wrapper/gradle-wrapper.properties b/gradle/wrapper/gradle-wrapper.properties
index 57a3ad8..abedcad 100644
--- a/gradle/wrapper/gradle-wrapper.properties
+++ b/gradle/wrapper/gradle-wrapper.properties
@@ -1,6 +1,6 @@
-#Tue Mar 13 13:19:59 IST 2018
+#Tue Mar 27 20:08:43 IST 2018
distributionBase=GRADLE_USER_HOME
distributionPath=wrapper/dists
zipStoreBase=GRADLE_USER_HOME
zipStorePath=wrapper/dists
-distributionUrl=https\://services.gradle.org/distributions/gradle-4.1-all.zip
+distributionUrl=https\://services.gradle.org/distributions/gradle-4.4-all.zip