Internship Document
Internship Document
21X51A3239
SANTHIRAM ENGINEERING COLLEGE
CSE-DS
INTERNSHIP
REPORT
Submitting to:
Sai Sathish Sir
Artificial Intelligence medial and
Engineering Researchers Society
info@AimersSociety.com
1
About AIMERS
Overview:
The Artificial Intelligence Medical and Engineering Researchers Society (AIMER Society)
stands as a premier professional organization at the forefront of the advancement of
Artificial Intelligence (AI) within the realms of medical and engineering research. This
esteemed society is committed to driving innovation and excellence in AI by fostering a
collaborative environment among researchers, practitioners, and students from diverse
backgrounds and disciplines.
The AIMER Society's mission is to serve as a catalyst for the development and application of
cutting-edge AI technologies that can address complex challenges in healthcare and
engineering. By creating a vibrant and inclusive platform, the society facilitates the exchange
of knowledge, ideas, and best practices among its members. This collaborative approach
ensures that AI research is not only innovative but also practically applicable, leading to real-
world solutions that can significantly improve medical outcomes and engineering processes.
In pursuit of its mission, the AIMER Society organizes a wide array of activities and
initiatives designed to promote AI research and development. These include annual
conferences, symposiums, and workshops that bring together leading AI experts to discuss
the latest advancements and trends. Such events provide invaluable opportunities for
networking, collaboration, and professional growth.
Mission:
The mission of the AIMER Society is to promote the development and application of AI to
solve complex medical and engineering problems, improve healthcare outcomes, and enhance
engineering solutions. The society aims to bridge the gap between theoretical research and
practical implementation, encouraging interdisciplinary collaboration and real-world impact.
2
Objectives:
- To advance research in AI and its applications in medical and engineering fields. - To provide
a platform for researchers, practitioners, and students to share knowledge and collaborate on
AI projects.
- To organize conferences, workshops, and seminars for the dissemination of AI research and
knowledge.
- To support the professional development of AI researchers and practitioners through training
programs, certifications, and networking opportunities.
- To foster ethical AI practices and address societal challenges related to AI deployment.
Key Activities:
- Conferences and Workshops: Organizing annual conferences, symposiums, and workshops
that bring together leading AI experts, researchers, and practitioners to discuss the latest
advancements and trends in AI.
- Research Publications: Publishing high-quality research papers, journals, and articles on AI
technologies and their applications in medical and engineering fields.
- Competitions and Contests: Hosting AI model development and chatbot contests to
encourage innovation and practical applications of AI among students and professionals. -
Training Programs: Offering training and certification programs in AI and related
technologies to enhance the skills and knowledge of members.
- Collaboration Projects: Facilitating collaborative projects between academia, industry, and
healthcare institutions to drive AI innovation and practical solutions.
Membership:
The AIMER Society offers various membership categories, including individual, student, and
corporate memberships. Members gain access to exclusive resources, networking
opportunities, and discounts on events and publications. The society encourages participation
from AI enthusiasts, researchers, practitioners, and organizations interested in the
advancement of AI technologies.
3
Leadership:
The AIMER Society is led by a team of experienced professionals and experts in the fields of
AI, medical research, and engineering. The leadership team is responsible for strategic
planning, organizing events, and guiding the society towards achieving its mission and
objectives.
Future Goals:
- Expand the scope of research and applications in AI to cover emerging fields and
technologies.
- Increase collaboration with international AI societies and organizations.
- Enhance training and certification programs to meet the evolving needs of AI professionals.
- Promote ethical AI practices and address challenges related to AI governance and societal
impact.
Contact Information:
- Website: AIMER Society Website http://www.aimersociety.com
- Email: info@aimersociety.org
- Phone: +91 9618222220 - Address: Sriram Chandranagar, Vijayawada
4
List of Topics Learned
Topics
Sno
1. Computer Vision
3. Image Classification
8. Mediapipe Studio
9. OpenCv Basics
12. Generative AI
5
Tasks:
No Description Link
1 Image
Classification: For https://www.linkedin.com/posts/m-mukesh-kumar-
image classification 20280b312_aimers-aimersociety-apsche-activity-
use google 7215314116788244480-
teachable machine o3z6?utm_source=share&utm_medium=member_android
in that we have
types of projects for
image classification
I choose image
project and next
label the images
using web cam
after that training
will be placed after
training we can test
the model
6
4 Recognizing Hand
gesture: https://www.linkedin.com/posts/m-mukesh-kumar-
For this I am using 20280b312_aimers-aimersociety-aimersociety-activity-
media pipe studio it 7215573836853825538-
have lots of projects 4qAX?utm_source=share&utm_medium=member_android
choose project we need
And test the project
5 Chat Bot :
I have developed a https://www.linkedin.com/posts/m-mukesh-kumar-
telegram bot that 20280b312_aimers-aimersociety-apsche-activity-
can interact with 7215372027757518848-
human directly EHlp?utm_source=share&utm_medium=member_android
with natural
language.
7
8 Power BI data https://www.linkedin.com/posts/m-mukesh-kumar-
visualization: 20280b312_aimers-aimersociety-apsche-activity-
For this I am 7215379665778008064-
using loksabha LVBo?utm_source=share&utm_medium=member_android
dataset to
visualize the
dashboard
8
1. Computer Vision
Enabling machines to interpret and process visual information from the world involves several
techniques and applications from the field of computer vision. Here are some key techniques
and their applications:
Techniques:
1. Image Classification:
o Description: Assigning a label or category to an entire image.
o Applications: Identifying objects in images, such as recognizing whether an image
contains a dog or a cat.
2. Object Detection:
o Description: Identifying and localizing multiple objects within an image.
o Applications: Autonomous driving (detecting pedestrians, cars, traffic signs), video
surveillance, counting objects in a scene.
3. Semantic Segmentation:
o Description: Assigning a class label to each pixel in an image, effectively dividing
the image into meaningful segments.
o Applications: Medical image analysis, urban planning, image editing.
4. Instance Segmentation:
o Description: Similar to semantic segmentation, but distinguishing between
different instances of the same class (e.g., distinguishing between different cars).
5. Image Captioning:
9
o Applications: Accessibility tools for the visually impaired, content-based image retrieval.
Applications:
● Security and Surveillance: Monitoring for unusual activities, recognizing faces, and
identifying potential threats.
● TensorFlow and PyTorch: Deep learning frameworks that include tools and modules
for building and training computer vision models.
10
2. Convolutional Neural Networks(CNN)
The class of deep neural networks most commonly applied to analyzing visual imagery is
Convolutional Neural Networks (CNNs). CNNs have revolutionized the field of computer
vision due to their ability to effectively learn hierarchical representations directly from pixel
data.
Key Features of CNNs:
1. Convolutional Layers:
o These layers apply filters (kernels) to input images, capturing spatial
hierarchies of features like edges, textures, and patterns. This process allows
CNNs to learn meaningful representations at different scales.
2. Pooling Layers:
o Pooling layers downsample the feature maps generated by convolutional
layers, reducing the spatial dimensions while retaining important information.
Common pooling methods include max pooling and average pooling.
3. Activation Functions:
o Non-linear activation functions like ReLU (Rectified Linear Unit) are typically
applied after convolutional and fully connected layers to introduce non-
linearity into the network, enabling it to learn complex mappings from input to
output.
Applications of CNNs:
11
● Semantic Segmentation: Assigning class labels to each pixel in an image, enabling
precise understanding of object boundaries.
● Medical Image Analysis: Detecting and diagnosing diseases from medical scans
like MRI and CT scans.
● Artistic Style Transfer: Applying the artistic style of one image onto another image
while preserving its content.
Notable Architectures:
● VGG: Known for its simplicity and effectiveness, consisting of multiple convolutional
layers followed by fully connected layers.
● MobileNet: Optimized for mobile and embedded devices, balancing between accuracy
and computational efficiency.
12
3. Image Classification
For google image classification we have many tools the mainly used tool is “Google
Teachable machine”. Google's Teachable Machine is a web-based tool that allows users to
easily create machine learning models without needing to write code.
How It Works:
● Training Models: Users start by selecting the type of model they want to create
(image, pose, or sound). They then collect examples for each class they want the model
to recognize. For example, if creating an image classification model, users might
collect images of different objects and label them accordingly.
● Labeling and Training: Teachable Machine guides users through labeling their
collected examples and training the model using a neural network backend. The
training process involves optimizing the model's parameters to improve accuracy.
● Testing and Exporting: After training, users can test their model's performance
in real-time. If satisfied, they can export the model for use in their own applications or
projects.
Process:
1.go to the website https://teachablemachine.withgoogle.com/ The page appears like this
13
2.After click on get started it appears like……..
Here you can choose the project you like.Here I am going to select Image project.
3.After selecting project we have to label the images using web cam or you can upload the images
directly.
4. After labelling click on training then it will going to train the model.
14
5. After training go to export model in that we can use web cam to test the model the output like
…..
In above both images we observe that the images are identified as well as classified. like this we can
use google teachable machine to classify the images.
15
4. Image Object Detection
Inorder to detect the object we can use the platform called Roboflow .in that we have a large number
of pre-trained data sets.we can the data set in universe and train the model using yolo. YOLO is a
powerful and widely used framework for image object detection due to its speed, efficiency, and
capability to detect multiple objects in real-time.
Create a project
16
Choose dataset
17
Object detection
18
5. Yolo (You look only once)
YOLO, which stands for "You Only Look Once," is a state-of-the-art real-time object detection system.
YOLO have several versions like Yolov3,YOLOv5,YOLOv6,YOLOv8,YOLOv9. YOLOv8 is the latest
installment and it is better version compared YOLOv9 and all.YOLOv8 was developed by Ultralytics .
3. After that,you can upload minimum 500 images or you can upload a youtube link and then we
have to labell all the images that we need to detect.All 500 images we need ti label them
correctly.
19
4. otherwise,we have an option called Universe
5. Select a Dataset you want and download the dataset and you must use “YOLOv8” version then
it can generate a code copy it. Then go to the AI model called YOLOv8 you can train the model
on colab,Kaggle etc.. you need to choose colab.
7. Then train the model by running the cells.you can custom the model here you can change epoch
rate also it means no.of iterations you need after that you can inference the model.
20
8. you must need to download the Best.pt file after the iterations completed it generates a file you
must download it.
9. finally it give the path like runs/detect/predict your output is there you check and download it.
Otherwise, there is a option to connect with our drive you can connect with your drive and drag
the out put to your drive.
Here I used this YOLOv8 on Agriculture based and detecting various insect in agriculture field.
In same way I use the YOLOv8 AI model for detecting coordinates also.
21
Applications:
Autonomous Driving: YOLO models, including advanced versions like YOLOv8, can be
used for real-time detection of pedestrians, vehicles, traffic signs, and other objects on the road,
crucial for the perception module of autonomous vehicles.
Medical Imaging: Detecting and analyzing anomalies or specific organs in medical images
for diagnosis and treatment planning.
22
6. Medical Image Analysis and Labelling
By using Robo flow platform we can Analyse Medical Images also. Roboflow is a platform
that helps streamline the process of labeling and preparing data for training computer vision
models, including for medical image analysis.
1. Data Upload: Start by uploading your medical images to Roboflow. These images
could be scans such as X-rays, MRI scans, CT scans, or histopathology images.
6. Export: Once annotated, export your dataset in the desired format (e.g., COCO
JSON, Pascal VOC XML, YOLO TXT) compatible with your chosen machine learning
framework or tool.
23
Benefits of Using Roboflow
o Efficiency: Streamline annotation workflows with intuitive tools and automated features.
o Accuracy: Ensure precise labeling and annotation quality control for reliable model training.
o Compatibility: Export annotated datasets in various formats compatible with popular machine
learning frameworks.
o Scalability: Manage large volumes of medical image data efficiently, facilitating research and
clinical applications.
24
7. Human Pose Estimation
For Estimating the Human poses we can use the platform called “Google Teachable Machine”.
Google Teachable Machine is a web-based tool developed by Google that allows users to easily
train machine learning models without requiring extensive programming knowledge.
2. Training Models: You can create three types of machine learning models:
o Pose Classifier: Recognize poses captured from a webcam. This can be used for
gesture recognition or exercise form analysis.
3. Training Process:
o Data Collection: Gather examples of each class you want the model to recognize.
For example, collect multiple images of different types of flowers if training an
image classifier.
o Training: Teachable Machine uses transfer learning to train the model based on
the collected examples. Transfer learning leverages pre-trained models to speed up
the training process.
o Testing and Refinement: After training, you can test the model’s performance
in real-time using webcam input or by uploading new data.
Refine the model by adding more examples or adjusting parameters if needed.
25
In this we have to choose pose project then upload the images from web cam or directly from the
device.
26
Here is the out put on pose estimation .
I use the web cam to label the images and train the model after I got the output like that.
27
Applications of Google Teachable Machine
● Education: Introduce students to machine learning concepts in a hands-on and interactive
manner.
● Art and Creativity: Enable artists to create interactive installations or digital artworks
that respond to gestures or sounds.
● Personal Projects: Hobbyists and enthusiasts can explore machine learning and develop
custom models for personal projects or experiments.
28
8. Mediapipe Studio
MediaPipe Studio is a tool developed by Google's MediaPipe team that simplifies the
creation of real-time multimedia applications. It provides a graphical interface for building
and customizing pipelines for media processing tasks such as image and video processing,
object detection and tracking, pose estimation, and more.
Here is what I done with mediapipe studio recognizing hand weather it is opened ,closed,
thumbs-up etc……
29
30
9. OpenCV Basics
OpenCV (Open Source Computer Vision Library) is a powerful open-source computer vision
and machine learning software library. It provides a wide range of functionalities that are
essential for tasks involving image and video processing, including both simple and advanced
operations. Here are some fundamental concepts and functionalities of OpenCV:
Fundamental Concepts:
Image Representation: OpenCV represents images as multidimensional arrays (matrices or
tensors), where each element represents the intensity or color value of a pixel. It supports
various color spaces like RGB, HSV, grayscale, etc.
Image i/o: OpenCV can read and write images in various formats, including JPEG, PNG, BMP,
TIFF, etc. It also supports video file formats for processing video streams.
Filtering and Convolution: Applying filters like Gaussian blur, median blur, and custom
kernels using convolution.
Feature Detection: Identifying key points in images, such as corners (Harris corner detector,
Shi-Tomasi corner detector).
Feature Description: Describing local image patches around keypoints (e.g., SIFT, SURF,
ORB).
31
Object Detection and Recognition:
Camera Calibration: Estimating camera parameters such as intrinsic and extrinsic matrices.
Structure from Motion (SfM): Building 3D models from multiple images or video frames.
Machine Learning and Deep Learning Integration: OpenCV has bindings for
popular machine learning frameworks (like TensorFlow, PyTorch) and includes its own
machine learning module (cv::ml) for tasks like classification, regression, clustering, etc.
Functionalities:
Image and Video I/O: Loading, saving, and streaming of images and videos.
Feature Detection and Description: Key point detection, feature matching, and local
invariant descriptors.
Object Detection and Tracking: Pre-trained models (like Haar cascades) and deep learning-
based object detectors (e.g., using SSD, YOLO).
Machine Learning: Integration with machine learning frameworks for training and inference,
and standalone algorithms in the cv::ml module.
GUI and Visualization: Tools for displaying images, drawing shapes, and annotations.
32
Performance Optimization: Utilizes hardware acceleration (like SSE, AVX) and parallel
processing (OpenMP) for efficient computation.
33
10. Chatbot Development
Here I developed a “Telegram Bot” using chat gpt, api keys,and telegram etc…….
5. it asks choose a name for your bot you need to give the name for your bot
34
6. again it asks a username for your bot you need o give a user name to your bot
7. It generate your telegram bot token you need to copy it In that it provide your bot link also.
For that we use a python code to it you can run the code in any python platform here iam
using google colab take a new notebook install the packages required and run the main code
int that code we need to change the telegram bot token that was generated by Bot Father and
also change the “Api key” with your system generated key.
And then run the code go to you bot ask something it will interact with you .
35
Here are the packages required to install.
It is the code
Now I will share how it works
36
. 11. Google Dialogflow
o Entity Recognition: Identify and extract specific parameters or entities from user messages,
such as dates, locations, or product names.
o Dialog Design: Use a graphical interface to design conversational flows, including defining
responses for different intents and managing context across conversations.
o Rich Responses: Create responses that include text, images, buttons, cards, and quick replies
to provide a more engaging user experience.
3. Multi-platform Support:
o Integration: Easily integrate Dialogflow with various platforms including websites, mobile
apps (iOS and Android), messaging platforms (such as Facebook Messenger, Slack), and voice
assistants (like Google Assistant and Amazon Alexa).
o Pre-built Agents: Utilize pre-built agents and templates for common use cases (e.g.,
booking appointments, customer support), accelerating development and deployment.
37
5. Analytics and Insights:
o Analytics Dashboard: Gain insights into user interactions, including usage patterns,
frequently asked questions, and user satisfaction metrics.
o Integration with Google Cloud: Leverage Google Cloud services for advanced analytics,
scaling, and security capabilities.
o Data Privacy: Dialogflow adheres to Google’s robust security practices, ensuring data
protection and compliance with industry standards and regulations.
38
12. Generative AI
Generative AI means Techniques and models used to generate new content, such as music,
text, and images.It can generate anything such as:
-Music Generation: Creating music using AI models.
- Text Generation: Producing coherent and contextually relevant text using AI.
- Image Generation Models: Generating new images using AI techniques.
1. Music generation:
In order to generate music there is a music generator name is ai music studio.
give the prompt for music and the music is successfully generated
39
2. Text Generation:
Inorder to generate text we widely use Chat Gpt it one of the modt power ful AI.
I liked it very much I face a good experience also. It provide solution for every thing.
3. Image Generation:
40
13.Visual Question & Answering
Input:
● Image: An image containing objects, scenes, or actions that is used as the visual
context.
● Question: A natural language question (e.g., "What is the color of the car?" or "How
many people are in the park?") that asks about the content of the image.
Output:
● Answer: The output of the VQA system is a textual answer (e.g., "Red" or "Three
people") that correctly responds to the question based on the visual content of the
image.
41
➢ Here I upload an image that contains dog and a person sitting at the beach I askes what is
the color of the dog it says answer as tan
42
14. Power BI and Visualization
Introduction to Power BI
Power BI is a powerful business analytics tool developed by Microsoft. It allows users to
visualize and share insights from their data through interactive dashboards and reports. Power
BI integrates seamlessly with a variety of data sources, making it ideal for analyzing large
datasets such as elections data. By leveraging its features, users can gain valuable insights, spot
trends, and make data-driven decisions efficiently.
Visualizing elections data using Power BI enhances understanding and facilitates insightful
analysis. Here’s how Power BI can be utilized for elections data
1. Interactive Maps: Displaying election results geographically provides a clear picture of voting
patterns across regions. Power BI's map visualizations can show voting outcomes by district,
state, or country, helping to identify electoral trends and regional preferences.
43
2. Time Series Analysis: Utilizing line charts or area charts, Power BI can depict changes in
voting trends over time. This is crucial for understanding shifts in voter behavior, turnout rates,
and the impact of campaigns during different election cycles.
3. Demographic Analysis: Power BI enables segmentation of voting data by demographics such
as age, gender, ethnicity, or income level. Visualizing this data through bar charts or pie charts
helps in identifying voting trends among different demographic groups.
4. Comparative Analysis: Power BI allows for side-by-side comparisons of election results across
different years, regions, or political parties. Visualizations like stacked bar charts or clustered
column charts can highlight changes in electoral outcomes and the performance of candidates
or parties.
5. Predictive Analysis: Using Power BI's machine learning capabilities, users can build predictive
models based on historical elections data. Visualizing these predictions through forecasting
visuals helps in anticipating future electoral outcomes and planning campaign strategies
accordingly.
44
15. Other Topics
Using Vision API: Implementing Google's Vision API for image analysis:
● Small Language Models (SLMs) refer to compact versions of larger language models
like BERT (Bidirectional Encoder Representations from Transformers) and GPT
(Generative Pre-trained Transformer). These models are optimized for efficiency
while maintaining competitive performance in natural language processing tasks such
as text classification, named entity recognition, and sentiment analysis. SLMs are
particularly useful for deployment on resource-constrained devices or applications
where real-time inference is crucial.
45
size, making them suitable for applications where computational resources are limited,
such as smartphones, IoT devices, and edge computing scenarios. These models enable
tasks like image classification, object detection, and natural language understanding
directly on device hardware, enhancing privacy and reducing latency.
46
Deepfakes: Synthetic media where a person in an existing image or video
is replaced with someone else's likeness:
● Deepfakes are generated using deep learning techniques, particularly generative
adversarial networks (GANs), to replace a person's face in an image or video with
another person's likeness. While they have potential applications in entertainment and
digital content creation, deepfakes also raise concerns regarding misinformation,
privacy infringement, and ethical implications. Efforts are ongoing to develop
detection methods and policies to mitigate the negative impact of malicious uses of
deepfake technology.
***
47
Cyber Security Topics
Sno Topics
1. Cyber Security Basics
2. Types of Cyber Crimes
3. CIA Triad
4. AAA Framework
5. OWASP
6. SQL Injection
7. Cross Site Scripting (XSS
8. Firewall
9. Vulnerability Scanner
48
1. Cyber Security Basics
Protecting computer systems and networks from cyber threats involves a combination of
fundamental principles and best practices. Here are key principles and practices to consider:
Fundamental Principles:
Defense-in-Depth:
Implement multiple layers of security controls (e.g., network, host, application) to create a
robust defense against different types of cyber threats. This ensures that if one layer is
breached, others can still provide protection.
Least Privilege:
Grant users and systems only the minimum level of access necessary to perform their tasks.
This principle limits the potential impact of a compromised account or system.
Patch Management:
Regularly apply security patches and updates to operating systems, software, and firmware to
address vulnerabilities and mitigate potential exploits.
Educate users and IT staff about cybersecurity best practices, such as recognizing phishing
attempts, creating strong passwords, and reporting suspicious activities. Awareness helps in
reducing human error as a factor in security breaches.
Monitor systems and networks continuously for suspicious activities and indicators of
compromise (IoCs). Establish an incident response plan to quickly detect, respond to, and
recover from security incidents.
Encryption:
49
Use encryption to protect data both at rest and in transit. This ensures that even if data is
intercepted or accessed without authorization, it remains unreadable and unusable without the
decryption key.
Access Control:
Best Practices:
Deploy firewalls and configure them to restrict unauthorized access to network resources.
Use network segmentation to isolate critical assets from less secure parts of the network.
Require multi-factor authentication for accessing sensitive systems and data. MFA adds an
extra layer of security beyond passwords, such as a one-time code sent to a mobile device.
Regular Backups:
Implement regular backups of critical data and systems. Ensure that backups are stored
securely and can be restored quickly in case of data loss due to ransomware, hardware failure,
or other incidents.
50
2. Types of Cyber Crimes
Illegal activities conducted via the internet, often referred to as cybercrime, encompass a wide
range of activities that exploit digital technologies for unlawful purposes. Here are some
common forms of illegal activities conducted via the internet:
51
o State-Sponsored Attacks: Nation-states or state-sponsored actors
conducting cyber espionage to steal classified information, intellectual
property, or disrupt critical infrastructure of other countries.
o Cyber Warfare: Using cyber attacks to undermine the military, economic,
or political stability of other nations through disruption of critical infrastructure
or dissemination of misinformation.
52
o State-Sponsored Attacks: Nation-states or state-sponsored actors
conducting cyber espionage to steal classified information, intellectual property,
or disrupt critical infrastructure of other countries.
o Cyber Warfare: Using cyber attacks to undermine the military, economic, or
political stability of other nations through disruption of critical infrastructure or
dissemination of misinformation.
53
3. CIA Triad
CIA Triad
- Definition:
- Concept:
- Confidentiality: Ensuring that information is accessible only to those
authorized to have access.
54
1. AAA Framework
1. Authentication:
Definition: Authentication is the process of verifying the identity of a user, device, or entity
attempting to access a system or resource.
Objectives:
● Identity Verification: Confirming the claimed identity of the user or entity (e.g.,
username, digital certificate, biometric data).
Techniques:
2. Authorization:
Objectives:
55
● Access Control: Granting or denying access permissions based on the identity's
attributes (e.g., role, group membership) and organizational policies.
Techniques:
● Access Control Lists (ACLs): Lists specifying what resources a user or group
can access and what actions they can perform.
Definition: Accounting involves tracking and logging actions and events related to
authentication and authorization processes.
Objectives:
● Monitoring and Accountability: Recording access attempts, actions taken, and
resource usage to detect anomalies or security incidents.
Techniques:
56
● Unified Framework: Integrating authentication, authorization, and accounting
into a cohesive framework ensures consistent and secure management of identities and
access across the organization.
57
5.OWASP
OWASP, or the Open Web Application Security Project, is a global community-driven
organization focused on improving the security of software. It provides resources, tools, and
guidelines to help organizations develop, deploy, and maintain secure web applications and
APIs.
3. Guidelines and Best Practices: OWASP provides guidelines, best practices, and
standards for secure software development. These resources are freely available and
regularly updated to reflect emerging threats and technologies.
1. OWASP Top 10: The OWASP Top 10 is a list of the top ten most critical web
application security risks. It serves as a standard awareness document for developers,
organizations, and businesses to understand and prioritize their efforts in mitigating
these risks.
2. OWASP Testing Guide: This guide provides techniques and methodologies for
testing the security of web applications during development and deployment phases.
It covers aspects such as authentication, session management, input validation, and
more.
58
guide that summarizes secure coding practices for various programming languages
and development platforms. It helps developers implement security controls and
avoid common vulnerabilities.
4. OWASP WebGoat and OWASP Juice Shop: These are deliberately
vulnerable web applications designed for educational purposes. They allow
developers and security professionals to practice identifying and mitigating
vulnerabilities in a safe environment.
● Industry Standard: OWASP guidelines and projects are widely recognized and
adopted by developers, security professionals, and organizations worldwide as
industry standards for web application security.
59
6.SQL Injection
One of the most destructive code injection techniques that can potentially destroy a database
is known as SQL Injection (SQLi). SQL Injection occurs when an attacker is able to
manipulate or inject malicious SQL code into a query executed by a database. Here’s how
SQL Injection can lead to database destruction:
1. Vulnerability Exploitation:
o SQL Injection exploits vulnerabilities in web applications that accept user
input without proper validation or sanitization. This input is then directly
incorporated into SQL queries sent to the database.
3. Query Manipulation:
o The injected SQL code alters the original query’s structure or executes
unintended commands. In the case of DROP DATABASE, it instructs the database
Potential Impact:
● Data Loss: Executing DROP DATABASE deletes the entire database, including all
● Data Breach: Attackers can extract sensitive information stored within the database
before or after deletion, depending on their access and objectives.
60
Mitigation and Prevention:
To mitigate SQL Injection attacks and prevent database destruction, consider the following
best practices:
61
7.Cross Site Scripting (XSS)
1. Reflected XSS:
o Occurs when the injected script is reflected off a web server (e.g., in search
results or error messages) and executed in the victim's browser when they visit
a crafted URL.
62
2. Stored XSS:
o Also known as persistent XSS, this occurs when the injected script is stored on
the server-side (e.g., in a database or message board) and executed every time
a user accesses the affected page.
3. DOM-based XSS:
o In this variant, the vulnerability is exploited within the Document Object
Model (DOM) rather than the server response. The malicious script is executed
within the victim's browser based on how the client-side code handles user
input.
● Impact: XSS attacks can compromise user privacy, damage reputations, and lead to
financial losses for individuals and organizations.
Prevention:
o Input Validation: Validate and sanitize user input to ensure that it does not
contain executable code.
63
8. Firewall
Operation of a Firewall:
Traffic Filtering: the process of monitoring and controlling the incoming and outgoing
network traffic to prevent unauthorized access, malware attacks, and other security threats.
Packet Filtering: Examines each packet of data entering or leaving the network and
accepts or rejects it based on predefined rules (e.g., IP addresses, ports, protocols).
Stateful Inspection: Tracks the state of active connections and allows only legitimate
traffic that corresponds to established sessions.
Access Control:
Defines and enforces policies that dictate which network services and resources (e.g., web
servers, databases) can be accessed from both internal and external networks.
Prevents unauthorized access attempts from external sources (e.g., hackers, malware) trying
to exploit vulnerabilities in network services.
Security Zones:
Segments the network into security zones or segments (e.g., LAN, DMZ, WAN) and applies
different firewall rules and security policies to each zone based on its security requirements.
Records and logs details of network traffic, firewall rule violations, and security events for
monitoring, analysis, and audit purposes.
64
Helps in identifying suspicious activities, investigating security incidents, and maintaining
compliance with regulatory requirements.
Types of Firewalls:
Network Firewalls:
Operate at the network layer (Layer 3) of the OSI model and inspect packets based on IP
addresses, ports, and protocols. Examples include traditional stateful firewalls and next-
generation firewalls (NGFW) with advanced features like application awareness and deep
packet inspection.
Host-based Firewalls:
Installed on individual devices (e.g., computers, servers) and control traffic based on local
security policies. They provide an additional layer of defense, especially for devices
connecting to untrusted networks.
Application Firewalls:
Focus on specific applications or services (e.g., HTTP/HTTPS) and monitor and filter traffic
based on application-layer data (e.g., URL paths, HTTP methods). They protect against
application-level attacks and unauthorized access attempts.
Benefits of Firewalls:
65
Considerations for Deployment:
Policy Definition: Establish clear firewall rules and policies tailored to the organization’s
security requirements and network architecture.
66
9. Vulnerability Scanner
Vulnerability means weakness same like humans even software also have weakness if you
want to see vulnerabitity for web aplications you may go to :OWASP website.org
even mobile aplication alsa have lot of vulnerability to check vulnerability for mobile
aplication yo may to OWASP mobile.
Web application pentester target is to find the vulnerability of website. He can do manually or
with tools.
1. Nessus
One of the top most vulnerability scanner is “Nessus” it can do if you pass ip address it is
going to scan and gives report. Scanner systems, iot devices, web application, servers
67
2. Accunetix
Specially designed for web application vulnerability scanning.
68
Detailed Descriptions and Insights
1. Computer Vision
Image Processing: Techniques like filtering, edge detection, and image segmentation.
Architecture: Layers including convolutional layers, pooling layers, and fully connected
layers. Use Case: Primarily used for image classification, object detection, and
segmentation tasks.
3. Image Classification
Google Teachable Machine: A user-friendly tool for training machine learning models
without coding. Process: Upload images, label them, train the model, and use it to classify
new images.
69
Drones: Monitoring wildlife or agricultural fields.
Techniques: Use for labeling medical images such as X-rays, MRIs, and CT scans to assist
in diagnosis.
8. Mediapipe Studio
Framework: Provides pre-built ML solutions for hand gestures, facial landmarks, and
more.
9. OpenCV Basics
Fundamentals:
70
11. Google Dialogflow
12. Generative AI
13. AI Models
Transformers: Process sequential data using self-attention mechanisms (e.g., GPT, BERT).
71
17. Large Language Models (LLMs)
Using Vision API: Implementing Google's Vision API for image analysis tasks like OCR
and facial detection.
Small Language Models (SLMs): Efficient models like BERT and GPT for various
NLP tasks.
TensorFlow Lite Models: Lightweight models for mobile and embedded devices.
Cyber Security Basics: Cyber Security Basics encompass fundamental principles and
practices aimed at safeguarding computer systems, networks, and data from unauthorized
access, attacks, and damage. It involves a range of techniques including network security,
application security, endpoint security, data security, and identity management. Key practices
include regular software updates, strong password policies, encryption, access control, and
user education about phishing and social engineering threats.
Types of Cyber Crimes: Cyber crimes refer to criminal activities carried out through
the use of computers or the internet. Common types include
72
● Phishing: Fraudulent attempts to obtain sensitive information (e.g., passwords,
credit card numbers) by masquerading as a trustworthy entity.
CIA Triad: The CIA Triad is a widely accepted model for guiding policies for information
security within an organization:
● Availability: Ensuring that data and systems are accessible and usable by authorized
users when needed.
AAA Framework: The AAA framework stands for Authentication, Authorization, and
Accounting:
73
OWASP (Open Web Application Security Project): OWASP is a nonprofit
organization focused on improving software security. It provides freely available resources,
tools, and documentation to help organizations and developers improve the security of web
applications. OWASP's flagship document is the OWASP Top Ten, which lists the ten most
critical security risks to web applications.
SQL Injection: SQL Injection is a type of cyber attack where malicious SQL code is
inserted into an entry field for execution. It can be used to manipulate a database or gain
unauthorized access to data, often by exploiting vulnerabilities in web applications that interact
with databases.
Cross Site Scripting (XSS): XSS is a security vulnerability commonly found in web
applications. It allows attackers to inject malicious scripts into web pages viewed by other
users. These scripts can then execute in the browsers of unsuspecting users, potentially
compromising their sessions, stealing cookies, or performing other malicious actions.
Firewall: A firewall is a network security device or software that monitors and controls
incoming and outgoing network traffic based on predetermined security rules. It acts as a
barrier between a trusted internal network and untrusted external networks (such as the
internet), allowing or blocking traffic based on defined security policies.
My Experience in internship:
Actually iam from Data science department so that i don’t have any knowledge about AI and
Cyber Security before I joined in this internship I learned allot from this internship mainly
74
about AI .really idont know the proper usage of chat gpt also after this internship I developed
and do many tasks easily because only of Sai Satish sir .
Cyber Security it is completely different to my department I think after these internship also
it takes time to learn Cyber Security but one thing that learn during Cyber Security sessions
Is that I very much aware from cyber crimes and I also take precautions
Once in my intermediate my friend suggested me a website he says that by using that you
can get 50rs daily and refer to your friends and family members to get more money that time
me and my family have no knowledge about Cyber Crimes in that actually we don’t get loss
or gain.
Another situation we faced in same time is that a person who knows me suggested that invest
some amount in this you will get double my dad believe that and invest on it we get money
but when we are going to invest more money we invested in it we loss the amount. It tell a
good lesson to me in that time I have no knowledge on it but now I got a knowledge about
Cyber Crime how they influence me.
75
Skills Acquired (After AIMER Introduction)
1. Computer Vision:
- Techniques and applications for enabling machines to interpret and process visual information.
- Understanding of image processing techniques.
- Development and implementation of vision-based solutions.
3. Image Classification:
- Experience using Google Teachable Machine for image classification.
- Understanding the workflow from image collection to model training and evaluation.
- Skills in categorizing and labeling images based on specific rules.
8. Mediapipe Studio:
- Knowledge of building multimodal applied machine learning pipelines.
- Experience using Mediapipe Studio for hand gesture recognition and other applications.
9. OpenCV Basics:
- Understanding fundamental concepts and functionalities of OpenCV.
- Practical skills in using OpenCV for various computer vision tasks.
76
10. Chatbot Development:
- Skills in creating interactive agents that can converse with humans using natural language.
- Experience with designing and integrating conversational user interfaces.
13. AI Models:
- Knowledge of various AI models used for different applications.
- Skills in summarization, fill-mask models, and transformers.
77
Cyber Security Skills Acquired
3. CIA Triad:
- Core principles of cybersecurity—Confidentiality, Integrity, and Availability.
4. AAA Framework:
- Knowledge of Authentication, Authorization, and Accounting framework for managing and
securing identities and their access.
5. OWASP:
- Familiarity with the Open Web Application Security Project and its focus on improving
software security.
6. SQL Injection:
- Understanding of SQL injection techniques and prevention methods.
8. Firewall:
- Knowledge of network security systems that monitor and control incoming and outgoing
network traffic based on predetermined security rules.
9. Vulnerability Scanner:
- Proficiency in using tools like Acunetix for identifying and addressing vulnerabilities in
systems and applications.
78
Conclusion:
My Experience in internship:
Actually, I am from Data science department so that i don’t have any knowledge about AI and Cyber
Security before I joined in this internship I learned allot from this internship mainly about AI really i
don't know the proper usage of chat gpt also after this internship I developed and do many tasks easily
because only of Sai Satish sir.
Cyber Security it is completely different to my department I think after these internship also it takes
time to learn Cyber Security but one thing that learn during Cyber Security sessions.
I am excited to learn everyday a new topic I am very enthusiastic about the internship and the new
ideas and teachings of Sai Sathish sir. The opportunity not only deepened my technical skills but
I’m now equipped with a solid foundation to contribute effectively in this dynamic and critical
field, eager to continue learning and applying innovative solutions to protect against emerging
threats.
During my internship focused on machine learning models, I've had the opportunity to delve deep
into the intricacies of data preprocessing, model selection, and evaluation techniques. I was very
much excited to join this internship. Thank you sir for giving this knowledge and it is a wonderful
experience.
79
References and Acknowledgments References:
1.chat Gpt main resourse that I used in this internship and some of other references are
3.youtube.
5.Hugging face.
6.tensorflow.
7. Roboflow
9. google colab
10. DALL-E
Acknowledgments:
Thank you so much sir for conducting this type internships. Conduct these type type of internships more
for us.
Mentor: Satya Narayana sir thanks for your support during internship mam.
Organization: AIMERS society Sai Satish sir thank you so much sir for providing this type of
internship and also thanks to share your valuable time and experience with us.
80
MARUBOTHULA MUKESH KUMAR
21x51a3239
Cse(data science)
81