+ All Categories
Home > Documents > TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY

TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY

Date post: 22-Dec-2015
Category:
Upload: dipak-tated
View: 164 times
Download: 3 times
Share this document with a friend
Description:
Teckdezine 2015 is a technical college magazine. It is bagged with lot of interesting and innovating technological stuffs for readers of all age groups
Popular Tags:
47
Transcript
Page 1: TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY

TECKDEZINE

Page 2: TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY

S.BOOBESH Association Secretary CSE

RAM PRASAD.M

Association Secretary IT

SARAVANA PRABU S R Association Treasurer CSE

SATHISH SAssociation Treasurer IT

Page 3: TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY
Page 4: TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY

Prof.K.S.PALANISAMY H.O.D

Page 5: TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY
Typewritten text
ASSOCIATION SECRETARIES
Typewritten text
ASSOCIATION TREASURERS
Page 6: TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY
Typewritten text
thanks
Page 7: TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY
Page 8: TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY

Drones, self-driving cars, robots, balloons providing internet access – Google is stretching a long way from search.Google is making big investments in the medical field: A contact lens to help dia-betics monitor their glucose levels; magnetic nano particles to detect signs of cancer and impending heart attacks.And now, SPOONS.Google offers hi-tech spoons that stay steady in shaky hands. The company has added a “smart” spoon to its portfolio of hi-tech products.These spoons are a bit more than our basic utensil.Google has started promotingits Liftware spoon, a utensil that uses hundreds of algorithms to sense howa hand is shaking and makes instant adjustments to stay balanced. Liftware includes two parts: a stabilizing handle and a utensil attachment. Liftware automatically turns on the moment both parts are connected. Liftware spoon could make life easier for the millions of people who live with Parkinson's disease or with essential tremor, a nervous system disorder that causes rhythmic shaking.MoreMore than 10 million people worldwide, including Google co-founder Sergey Brin's mother, have es-sential tremors or Parkinson's disease.The spoon comes embedded with an electronic device. It then uses "active cancellation" (used in noise-canceling headphones), in which tiny motors in the handle move the spoon opposite to the tremor to help keep the spoon steady. The google spoon is techni-cally called a “tremor-canceling” invention, which means that it reads incoming movement and uses onboard motors to offset that movement and keep the bowl of the spoon as stationary as possible. It has to do more than just mechanical shock-absorbing, as it must dynamically undo the movement caused by random nerve firing, while also identifying and not trying to offset the user’s attempts to move the spoon toward the mouth. In clinical trials, the spoons reduced shaking by an average of 76%. The current version of the spoon has a chunky handle that holds the motor and sensors, which move a thousand times per second to stabilize the spoon. This invention led to a positive result for the people who are not able to eat independently.

Page 9: TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY

Google glass….That’s so 2014…Now, contact lenses that allow you to zoom in and zoom out!!!

Researchers have unveiled the latest version of a telescopic contact lens that allows the wearer to zoom in and zoom out with the wink of an eye.The contact lenses have to be paired with smart glasses that recognize winks and ignore blinks to allow wearers to switch between normal and magnified vision. These lenses hold a lot of promise for low vision and age-related macular degeneration (AMD) and work by age-related macular degeneration (AMD) and work by incorporating a very thin reflective telescope inside a 1.55mm thick lens. The electronic glasses paired with lenses use a small light source and light detector to recognize winks and ignore blinks. The wearer will wink their right eye for magnification, and left eye for normal vision.This switching functionality is crucial for the lenses to be widely useful for non-AMD susufferers,who will be able to have magnification "on demand."Amazing.Right??

A touchscreen that 'touches' you back…Say What!!!WhatWhat if the touchscreen of your smartphone or tablet could touch you back?That would be awesome right….!!!In a study published in the journal Proceedings of the National Academy of Sciences (PNAS), of people drawing their fingers over a flat surface that has two "virtual bumps", the team from Northwestern University and Carnegie Mellon University found that, under certain circum-stances, the subjects feel only one bump when there really are two.This so-called "virtual bump illu-sion" wherein two bumps are presented as one when bump and finger spacing were identical, the brain thinks it is too coincidental that there should be two bumps at the same time so it registers the bumps as one. The new model could one day lead to flat-screen displays featuring active touch-back technology such as making your touchscreen's keyboard actually feel like a keyboard.

Baahh…!!! Baahh…!!!The Internet of Sheep..???!! We have heard of the Internet of Things -- the idea that eventually all physical objects could commu-nicate data over the internet to other connected devices.Already many devices in cities from automo-biles to thermostats, communicate information to operators, manufacturers and consumers via the in-ternet about their status.We may think there’s nothing much to exceed that.But in rural Wales, a region not noted for its connectivity, researchers have proven this wrong and have begun a study into the In-ternet of Sheep, attaching wireless devices to livestock to gather information.

Page 10: TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY

It has been widely reported that flocks of sheep in the project could transmit WiFi and improve internet coverage in rural areas.(Oh my God!!!).But the official study is all about gleaning data from the flock, not transmitting WiFi signals from the animals,according to Professor Gordon Blair of Lancaster UniversitLancaster University. The beauty of sheep was that they flock together, easily transmitting data until the flock come close to an internet receiving station which would take up the data and transmit it to researchers at Lancaster University.The principle is that “the signal goes from sheep to sheep to sheep, a bit like gossip”.Sheeptastic!!!

I’m watching you!!!I’m watching you!!!With Artificial Intelligence Shaking up the world with the increasing popularity of Siri,Alice and our very own Natasha,Samsung has jumped into the scene with the introduction of an eavesdrop-ping TV which uses voice recognition technology works similar to Apple's Siri, Google Now,Microsoft's Cortana or any other speech-to-text service. Voice recognition on its SmartTVs happens two ways: through the TV and through the remote control.Although the TV is constantly "listening" to your voice, it is waiting for you to say a set of prede-termined commands, like "change the channel" and "increase the volume." This kind of voice data isn't stored anywhere, and is not transmitted over the Internet.Through the remote, people can press a button to activate a Siri-like "assistant" that responds to voice commands. We can say, for exam-ple, "recommend a good Sci-Fi movie."Only those voice commands activated by a button-press on the remote are sent over the internet. A company called Nuance (NUAN), maker of Dragon speech-to-text software, converts that voice data to text and sends it back to the TV so it can run a search. Samsung also collects those commands so that it can improve its service.This interaction works like most any other voice recognition service available on other products including smart-phones and tablets but on a much practical basis.

Page 11: TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY

man- in-the- middle (MITM) - Apple’s cloud service attack

On August 31, 2014 Apple cloud service (i.e.) icloud was hacked. Apple’s icloud storage and backup services in china was attacked. Hackers targeted celebrities profile and hacked the personal information which is released in internet. It was believed that china government was behind the attack where the government strongly rejected the claim.“man-in-the-middle” (MITM) attack was used. I.e. the hackers interposed their own website between the user and the Apple’s cloud server, intercepting data and potentially gaining access to password, iMessages, photos and contacts. intercepting data and potentially gaining access to password, iMessages, photos and contacts. Customers believed that they are using correct website but they used hackers website which leads to get their account password.

Attack using malware & Wiper - Sony picture attack.The Sony picture, a famous movie produc tion company was hacked on November 24, 2014 which is one of the major attacks. It requires more than 8 solid days to recover from the cyber attack. In that attack they gathered all the details. i.e. per sonal information about Sony pictures employees and their salaries. T hey also get the copies of unreleased\ Sony films. The hackers called themselves as “Guardians of peace”.

They demanded the cancellation of the preplanned movie “The Interview”, a comedy about a plot to assassinate North Korean Leader Kim Jong-un.US Cyber security believed that the attack was sup-ported by North Korea however North Korea has denied all responsibility.The duration of attack is still mystery. It is estimated that the hackers took 100 terabytes of data and then they implement Wiper on Sony Infrastructure which is malware software program designed to erase all the data from the server.

Page 12: TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY

*Cloud computing I dont need a hard disk in my computer if I can get to the server faster.*Green computing Carbon free,Lead free,RoHS,Solar and Energy efficient computing.*Data mining Information is the oil of the 21st century and analytics is the combustion engine.**Smartphones Social connection that disconnect one's social.*Blue brain Build a virtual brain in a supercomputer's blue gene.*Machine learning It's all about the big picture.Genie was able to look at big picture more effectively than a human could have.**Neural networks In a field like neural network,one is usually too optimistic in the short run but never optimistic enough over the long run.*BigData Hiding within those mounds of data is knowledge that could change the life of a patient or change the world.*iPhones It grows old faster than a media news.*Virtual machines The machine has no feelings,no fear and no hope.It operates according to the pure logic of probability.

Page 13: TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY

Fact #1:

The Palm OS fits in less than 100Kb, which is less than one per cent the size of Windows 98 or the Mac OS.

Fact #2:

It is impossible to create a folder with the name "con" on any Microsoft operating system.

FFACT #3

The computing power in today’s cell phones is much higher than the processing power of all the computers in the Apollo 11 Lunar Lander that put 2 men on the moon.

FACT #4

Here are the languages using which some of the most popular websites are designed ...

1. Google – Java (Web), C++ (indexing).2. Facebook – PH2. Facebook – PHP.3. YouTube- Flash, Python, Java.4. Yahoo– PHP and Java. 5. Wikipedia – PHP6.Twitter – Ruby on Rails, Scala, Java

Page 14: TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY

FACT #5

The first hard drive was introduced by Seagate in 1979 and held a capacity of 5MB of data.

FACT #6:

Mosaic was the first popular web browser which was released in 1993.

FACT #7:

The average human being blinks 20 times a minute – but only 7 times a minute when using aThe average human being blinks 20 times a minute – but only 7 times a minute when using a computer.

Page 15: TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY

Frozen Computer? Maybe if I start clicking everywhere, it might just work

Display not working? Off and On the computer an infinite amount of times before realizing that the power cable to the monitor is loose

Wrong password?TTypes password again…..still wrong password? Pause for a second and types password carefully, one character at a time...Wrong password again? Bangs the keys on the keyboard in frustration and then realizes that the CAPSLOCK was ON the entire time.

Complies program….1 errorFixes it and compiles again….965281 errors

Net connection goes offFoForgets that the computer has other functionalities too

The Generation Gap“Are you still on Windows 7? I have Windows 95”………What better way to depict the

widening generation gap than these memes on the internet ;)

Page 16: TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY
Page 17: TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY

1. Who is Google's current CEO? a.Larry Page b.Sergey Brin c.Marissa mayer d.Eric Schmidt

2.What was Google's biggest acquisition to date? a.Youtube b.Motorola c.Blogger d.Android

3. Who was Google's first investor? a.Jeff Bezos b.Ram Sriram c..Andy Bechtolsheim d.Steve Jobs

4. Google is headquartered in what California City? a. Silicon Valley, Calif. b. Cupertino, Calif. c. Los Angeles, Calif. d. Mountain View, Calif.

5. Google's famous 5. Google's famous moto is... a."You get back what you put in. b. "Don't be evil." c."Have fun." d."Man cannot live by incompetence alone."

6. What was Google's first hardware product? a. Google nexux one b. Google nexus Q c. Google chrome pixel d.Project glass c. Google chrome pixel d.Project glass

7.How many search terms are limited to in google?

8.A movie released in 2013 in which main location of the film is GooglePlex, the real head quarters of Google.........?

9.Original project name of Google before its release?

Page 18: TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY

Lumus is the name for the new age lens technology. It is a path breaking new technology in the visual technology area. This technology has been developed after many years of efforts and is constantly ad-vancing as it progresses. Initially, it was a 720p near HD quality augmented reality display. The display is embedded into a thin glass which would be almost impossible to sight from a distance or even from proximity. This offers amazing display features and quality. It is possible to watch movies and videos like on any other screen, for example TV or computer. There have been many enhancements to this technologytechnology in the recent times and is now being viewed as a game changer in wearable technologies and devices

Best features • Unobtrusive, natural look and feel of regular eyeglasses, which can be worn all day, even when screen is off• Huge expandable screen with image appearing even larger over distance• Situational awareness enabling watching on the go while seeing what's going on around you• Hands-free flow of critical data, keeping you constantly connected no matter what you are doing• Personal and private screen allowing discreet viewing of video and data anywhere

Page 19: TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY

Thanks to the exponential revolution, a computer bought in 2050 is one billion times more powerful than a computer from 2005.This means that a few (less than 5) computers in 2050 will have the same computing power as all the computers that existed back in 2005.

A brand new industry called BAP, short for Brain Augmented Performance is born. Different types of devices (such as brain enhancing memory chip) and treatments are becoming available and the industry is growing at a tremendous rate. Brain to Brain (Br2Br) communications are also ex-pected to be available in the foreseeable future.

Advances in brain research allow the complete understanding and recording of dreams. They can then be reviewed and quickly analyzed. In addition, a computer can give proper stimulus during the night so your brain will steer away from a nightmare toward a more pleasant dream. This technol-ogy has received mitigated reviews though as psychiatrist are arguing that nightmares are part of the normal learning process for children and we shouldn’t steer them away from them.s are also expected to be available in the foreseeable future.

Policies such as "bring your own device" are becoming more popular as the functions on con-sumer devices allow for more business use.It makes sense that if you can have one device to store personal and work information, it beats using two separate devices.

Shopping on the fifth avenue in New York from anywhere in the world is now possible for everyone. “Brick and mortar” type of shopping still exist and is enjoyed by many, but for those far away from New York, it was not necessarily easy to glance at all those fancy stores. It is now possible to rent a robot and with simulated reality and immersive telepresence, the person controlling feel as if they were there in person. In addition, the robot can change shapes to match its “controller” shape to properly try on clothes and give a good rendition of reality.

3D printers will be common in every household. Most of the day to day simple objects you might need will be simply printed at home. The printer will be filled up with different com-pounds, similar to ink, which will allow it to create in just a few minutes the object you requested. As for the blueprint of the object, a public database of common objects will be made available and more unique items blueprints will be available for purchase online.

Page 20: TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY

Apple’s most personal device yet.Apple’s goal has always been to make powerful technology more accessible. more relevant and ul-timately more personal. Apple Watch represents a new chapter in the relationship people have with technology. It’s the most personal product we’ve ever made, because it’s the first one designed to be worn. An experience built from the wrist up.Every aspect of Apple Watch is designed for precisely when you use it and where you wear it — on your wrist. Each interaction is quick and light. Right from the watch face, the Glances feature gives you real-time views of the information you check most often, like the weather, stock quotes, upcoming calendar events, and more. Apple Watch notifications take on a whole new feel because they discreetly come right to your wrist. And they’re designed to let you address or dismiss them just as subtly.A more immediate, intimate way to connect.AppleApple Watch is right there on your wrist, so it makes all the ways you’re used to communicating more convenient. And because it touches your skin, we were able to add a physical dimension to alerts and notifications — you’ll feel a gentle tap when you receive an incoming message. Apple Watch also allows you to connect with your favorite people in some new, spontaneous ways not possible with any other device

Music.Music. Control the music on your iPhone without taking it out of your pocket. And when you leave iPhone at home to go for a jog, listen to music directly on Apple Watch.Remote Camera. Apple Watch doubles as a remote viewfinder for the iSight camera on your iPhone. Use Apple Watch to display a live preview of what your iPhone sees, snap the photo, or set the timer on the camera.

Page 21: TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY

In telecommunications, a femtocell is a small, low-power cellular base station, typically designed for use in a home or small business. A broader term which is more widespread in the industry is small cell, with femtocell as a subset. It connects to the service provider’s network via broadband (such as DSL or cable); current designs typically support two to four active mobile phones in a residential setting, and eight to 16 active mobile phones in enterprise settings. A femtocell allows service providersproviders to extend service coverage indoors or at the cell edge, especially where access would other-wise be limited or unavailable. Although much attention is focused on WCDMA, the concept is applicable to all standards, including GSM, CDMA2000, TD-SCDMA, WiMAX and LTE solutions.

Use of femtocells benefits both the mobile operator and the consumer. For a mobile operator, the attractions of a femtocell are improvements to both coverage, especially indoors, and capacity. Coverage is improved because femtocells can fill in the gaps and eliminate loss of signal through buildings. Capacity is improved by a reduction in the number of phones attempting to use the main network cells and by the off-load of traffic through the user's network (via the internet) to the operator'soperator's infrastructure. Instead of using the operator's private network (microwave links, etc.), the internet is used.Consumers benefit from improved coverage since they have a base-station inside their building. As a result the mobile phone (user equipment) achieves the same or higher data rates using less power, thus battery life is longer. They may also get better voice quality. The carrier may also offer more attractive tariffs, e.g., discounted calls from home.Femtocells are an alternative way to deliver the benefits of Fixed–mobile convergence (FMC).

Page 22: TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY

1.The first domain name ever registered was Symbolics.com. 2.U.S. President Bill Clinton's inauguration in january 1997 was the first to be webcast.

3.Google uses an estimated 15 billion KWh of electricity per year,more than most countries.However,google generates a lot of their own power with their solar panels.

4.There are approximately 1,319,872,109 people using the internet.

5.When5.When the first Apple computer which was built by Steve Jobs and Steve Wozniak,it was made by using parts they got for free from their employers.They were made to scrounge spare parts from work.

6.The first 1GB hard disk,announced in1980,weighed about 550 pounds,and was priced at $40,000.

7.A program named "Rother J"was the first computer virus to come into sight"in the wild"that is.outside the single computer or lab where it was created.

8.Mosaic was the first popular web browser which was released in 1993.8.Mosaic was the first popular web browser which was released in 1993.

9.Until 14th september,1995,domain registration was free.

10.HP,Google,Microsoft,and Apple have one thing in common.All of them were started in garages.

Page 23: TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY

Screen-less Display, Not a figment of our imagination any moreEverEver since Princess Leia appeared in a screen-less 3-D projection in Star Wars, the world became fascinated with the idea of a screen-less display. Movies like Avatar, The Avengers and Iron man also showcased this technology. Screen-less Display was an excellent thought that came up in order to solve major problems related to device miniaturization. Screenless, as the word suggests clearly means ‘no screen’. It is the projection of visual information through the deflection of light. Usually light is deflected through fog, mirrors or plastic films but research is still going on whether air can be used to deflect light. Apart from this, there are other types of screen-less displays as well; thesethese displays do not require an intermediate medium for the projection of light. Broadly speaking, screen-less displays can be categorized into three groups: Visual Image, Retina Display and Synap-tic Interface.

Visual Image Screenless DisplayThis kind of display usually requires a medium for the deflection of light. Light is always deflected before reaching a person’s eye. One example of this display is a hologram. Holographic Displays allow the display of three dimensional images by using simple components like Helium – Neon Laser, a Lens, an object, mirror and a holographic film. The laser beam used will initially create a plasma environment. When the laser and object beams coincides, a 3D image will be projected. The projected image will appear to be floating in air. Presently, MIT’s Media Lab reported a holo-graphic color video display with high resolution.

Page 24: TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY

Retinal DisplayRetinaRetina Display aims at projecting the image directly onto a person’s retina. In this type of display, light is not deflected, rather it is projected directly onto the retina and thus only authorized person-nel are able to see the information. This display can be extremely helpful in maintaining the pri-vacy and security of the contents. A person can even control the intensity of display through his voice. With this technology available in the market, you can even work anywhere without even having to worry about other people around you. Eye Tap and Bionic Contact Lenses are some pre-sent day examples for retinal displays. Eye Tap, is a display device that can act as a camera and a monitor. The famous Google glass does deserve a mention here.

Synaptic InterfaceThis type of display does not use light at all. Instead, the information is directly sent to the brain. This technology is the most advanced of all, and is still under great development. In the movie X-men, Professor X(Charlie) seems to be using this technology. In reality, Synaptic Interface has not been tested on humans yet but scientists are of the view that it will prove to be extremely help-ful especially in the case of blind people. The advancement in this field will ensure that even the blind can drive vehicles relying solely on the images conjured up in their brain.This technology is slowly evolving and only some aspects of it are being used at present. Several patents have been filedfiled and many companies are working towards developing different aspects of screenless dis-plays. We can expect a decrease in cost along with lower power consumption and better privacy with the increased development of screenless products. Well, who doesn’t want to be like Tony Stark after all?

Page 25: TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY

Left to right1. A _______ statement must be placed in between cases5. Execute a loop a specific amount of times determined in advance6. Classes require a main _________ in order to be an executable program7. Variables that cannot change8. Program used to code9.9. Variable names must start with a ___________ letter10. Used when a task is needed to be done if the outcome of the comparison is false, you need to use the else part of this to be true

Page 26: TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY
Page 27: TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY

Li-Fi stands for Light-Fidelity. Li-Fi technology, proposed by the German physicist—Harald Haas, provides transmission of data through illumination by sending data through an LED light bulb that varies in intensity faster than the human eye can follow. This paper focuses on developing a Li-Fi based system and analyzes its performance with respect to existing technology. Wi-Fi is great for general wireless coverage within buildings, whereas Li-Fi is ideal for high density wireless data coverage in confined area and for relieving radio interference issues. Li-Fi provides better bandwidth, efficiency, availability and security than Wi-Fi and has already achievedachieved blisteringly high speed in the lab. By leveraging the low-cost nature of LEDs and lighting units there are many opportunities to exploit this medium, from public internet access through street lamps to auto-piloted cars that communicate through their headlights. Haas envisions a future where data for laptops, smart phones, and tablets will be transmitted through the light in a room. Li-Fi can play a major role in relieving the heavy loads which the current wireless systems face since it adds a new and unutilized bandwidth of visible light to the currently available radio waves for data transfer. Thus it offers much larger frequency band (300 THz) compared to that available in RF communications (300GHz). Using a standard white-light LED, researchers at the Heinrich Hertz Institute in Berlin, Germany, have reached data rates of over 500 megabytes per second . Using a pair of Casio smart phones, the technology was demonstrated at the 2012 Consumer Electronics Show in Las Vegas to exchange data using light of varying intensity given off from their screens, detectable at a distance of up to ten meters . A consortium called ‗Li-Fi Consortium‘ was formed in October 2011 by a group of companies and industry groups to promote high-speed optical wireless systems and overcome the limited amount of radio based wireless spectrum. According to the Li- Fi Consortium,Consortium, it is possible to achieve more than 10 Gbps of speed, theoretically which would allow a high-definition film to be downloaded in just 30 seconds.

Page 28: TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY

A blind authentication protocol that does not reveal any information about the biometric samples to the authenticating server. Information regarding the classifier, employed by the server, to the user or client.

SALTING - Design a classifier in the encrypted feature space. Specific to a biometric trait. Security using a transformation function seeded by a user specific key. Do not offer well defined security

NON-INVENON-INVERTIBLE TRANSFORM - Apply non-invertible function on the biometric template. Key must be available at the time of transformation Eg. Robust hashing, Cancelled templates.

KEY BINDING AND KEY GENERATION - Integrate the advantages of biometrics and cryptogra-phy. Using the biometric as a protection for the secret key or to generate secret key.

Features Of Blind Authentication • Strong encryption• Non-reputable authentication• Protection against replay and client-side attacks• RevocabilityAuthenticationBlind Authentication Process: Linear kernel computation for encrypted feature vectors. At no point, the identity vectors x, w or the intermediate results xi and wi is revealed to anyone.

Page 29: TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY

1)Why n++ executes faster than n+1? The expression n++ requires a single machine instruction such as INR to carry out the increment operation whereas, n+1 requires more instructions to carry out this operation.

2)Is it possible to execute code even after the program exits the main() function? The standard C library provides a function named atexit() that can be used to perform ?cleanup? operations when your program terminates.operations when your program terminates. You can set up a set of functions you want to perform automatically when your program exits by passing function pointers to the at exit() function.This can be done by using #pragma directive as: #pragma exit <function name>Using above code, any function can be executed after program exits the main function but function must be declared before pragma directive is reached.

3. What is a “null pointer assignment” error? What are bus errors, memory faults , and core dumps? faults , and core dumps? If a pointer points to NULL memory address and we try to store some data in it using pointer, it will lead to core dump (state of application at the time of failure.) If an application tries to store data at address 0, the kernel will send SIGSEGV (segmentation violation) signal to application. The default behavior for such signal is stop the execution of the program and generate a core file so that the developer can debug the cause of the problem. The system generates core dump for an application for irrecoverable errors. The bus error (SIGBUS) is another example that causes core dump for unaligned accesses on platforms such as SPARC. The Intel x86 systems generally ignore unaligned accesses.

4.What is Dangling pointer? Dangling Pointer is a pointer that doesn’t point to a valid memory location. Dangling pointers arise when an object is deleted or deallocated, without modifying the value of the pointer, so that the pointer still points to the memory location of the deallocated memory.

5.5. What are different application of stack. Some of the applications of stack are as follows: - Function calls. - Reversal of a string.

Page 30: TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY

7) What is Fibonacci search?- It is a search algorithm that applies to a sorted array.- It uses divide-and-conquer approach that reduces the time needed to reach the target element.

8) What is sequential search? What is the average number of comparisons in a sequential search? Searching an element in an array, the search starts from the first element till the last element. TheThe average number of comparisons in a sequential search is (N+1)/2 where N is the size of the array. If the element is in the 1st position, the number of comparisons will be 1 and if the element is in the last position, the number of comparisons will be N.

9) what data structure is used in google?1.As well as Google Search also provides auto-completeness on the basis of how frequently that keyword was searched? So it also has property of Max-Heap.2.It2.It even corrects spelling and recognizes words which were mistakenly not separated by space. There could be more that I am missing . So, what could be the possible Data Structure that Google uses for its search engine.

Page 31: TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY
Page 32: TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY

5. APPVIEWX, the project got tremendous response in the F5 Agility event.

Could you elaborate us on that?That was the example of “listening to customers”.That was the example of “listening to customers”. The customers in Traffic Management space had to be given a proper hardware management and good support. Today there are multiple challenges. Internet traffic is tremendously increasing and at the same time application products adopt to pretty fast software development life cycle. There are lots of security issues popping up and tackling that was a big challenge. There were sophisticated traffic management hardware but faced software challenges. That is where we came in and listened to their customers. We then gave an integrated solution for their problems called Ap-ppViewX which solves their pain. F5 appreciated and helped us out in various ways. After that traffic man-agement folks came to us for solutions and thus we got into the limelight with AppViewX.

6. What was the most important de ning moment as the CEO of PAYODA?

The first break through by which we got the cash coming in is quite memorable. We had huge custom-ers though we din’t have a matured organization. Negotiating with the customers, missions that could make an impact on the company’s future. We learnt on a lot on customer satisfaction in the real time sce-narios. Winning customers and awards were the major defining moments. There are lots more defining moments to come.

7. Being a CEO with huge responsibilities and work pressure how do you

manage the work-life balance?

Anybody who wants to be a sound career focused person must focus on breadth and mind. If you have a sports car and you are keen on its performance, you have to maintain it better by engine tuning and other maintenance than an ordinary car. Similarly if a person wants to perform well and be at the top of the game, he has to take care of himself. I do subtle workout, sudarshana kriya for the last 10 years. Every evening I do yoga to keep myself fit as a fiddle. The discipline learnt from this is amazing too which the secret that many don’t understand is. India being the home for yoga has not got the youth’s complete attention. I was fortunate enough to learn the right things from the right people.complete attention. I was fortunate enough to learn the right things from the right people. Yoga keeps me light and makes me happy. It is simple but most people don’t understand this and at the end all they get is stress.

Page 33: TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY

8. What would be your strategy at the time of failure and how would you re-

spond to handle it?

Put proper plans for failures too and it’s good to fail as we get to learn something new. We must look at failure as the “course correction” plan. There will be a lot of failures on the way to success and the trick is to plan the failures. Planning with check points and measuring yourself in a periodic will make things better.

9. What do you think is the next technology that is going to make a revolu-

tion in IT eld? According to me, Mobile based technologies are growing tremendously and will continue to grow. Big data will also make a revolution as the data amount will increase tremendously. There will be a lot of investments and innovation coming up in the analytics space. A lot more technologies will be used in trending domains like healthcare in the west. In the future the government services will be even more automated.

10. What is the next milestone of PAYODA?

AppViewX is maturing and scaling up. Our next milestone is to hear a lot more success stories on that. Our next milestone will also be to get the customer base for the new products in new technologies and also in healthcare domain.

11. Are students of CIT playing a vital role in the success path of PAYODA?

There some smart kids from CIT and many people have notified me about the smart work done by the CIT students. We are very happy with the folks that we have recruited from CIT.

12. When can we hear your inspiring talk at our college campus?12. When can we hear your inspiring talk at our college campus?

Any functions, any time , just pull me in. Reach out to Hari any time, I will come there.13. What is the major key for the success of PAYODA within such a short

span?

We focus on soft skills for a lighter work atmosphere. Innovation comes when there is no stress and that is what we are working towards. Our vision and dream was big. Everything that we do is aligned to that – Big Thinking. Right from hiring, cultural aspects and current technologies we use, our vision has helped us succeed. Another key is to give importance to divinity and luck

DIPAK.B.TATEDVIJAY SAI

KALATHIESWARI

Page 34: TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY
Page 35: TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY

By, VIJAY SAI & SHIVA Third Year

Page 36: TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY

S.NO DATE EVENT TOPIC/ACTIVITIES OF THE EVENT

RESOURCE PERSON/CHIEF GUEST

1 25.06.2014 Inaugural Function

* Brief on Association Activities

Mr.Senthil Kumar, TCS Coimbatore

2 11.07.2014 Seminar “Big Data” Mr.Satyamoorthy ,

NIELSEN CATALINA SOLUTIONS,FLORIDA, USA

3 28.07.2014 First Year Mini Association

Introduction about college

dressing,behavior,rules and regulations

regarding academics and laboratories

Final Year Students

4 31.07.2014 First Year Mini Association

Session for improving communication skills

Final Year Students

5 04.08.2014 First Year Mini Association

laboratory session about introduction on

computers Final Year Students

6 07.08.2014 First Year Mini Association

Talk on "Mending the youth minds to face the challenges of the world

in a global context"

Dr.Selvam,Professor,Government Arts College,Coimbatore

7 04.09.2014 Briefing about GATE EXAM

Awareness about GATE Exam and its benefits

and opportunities Resource Persons from GATE Academy

8 11.09.2014 Quantitative and

Technical Aptitude tests

Periodical Placement Training

Final Year Students

9 25.09.2014 Invited Talk "Gynec related health

issues" for women

Dr.Poornima Associate Professor in dept of Obstetrics and

Gynecology, PSGIMSR,Coimbatore

10 26.09.2014 Quantitative and

Technical Aptitude tests

Periodical Placement Training

Final Year Students

11 29.09.2014 TCS Best Project Award Ceremony

Presentation of best project award to passed out final year students

(2010-Batch)

Mr.Bhaskar,TCS-Coimbatore

12 18-12-2014 ACM

Distinguished Speaker Program

"Privacy and Security in Online Social Media"

Dr.K.Ponnurangam, IIIT Delhi

13 22.12.2014 Quantitative and Tech Aptitude

Periodical Placement Training

Final Year Students

Department Of CSE and IT

Association Activities

Academic Report(2014-2015)

Page 37: TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY

14 29.12.2014 Quantitative and

Technical Aptitude tests

Periodical Placement Training

Final Year Students

15 08.01.2015 Guest Lecture "You & Your Career- how to excel personally

& in Corporate” AshikSiraj, Operations Manager

16

09.01.2015 to

11.01.2015

Entrepreneurship Development Workshop

Various Sessions on Entrepreneurship

Development

Mr.P.RRangasamy, Mr.RangaRajagopal,Mr.P.Jegannathan, Dr.R.Ramachandran, Ms. B. Kayalvizhi,Dr.Chandrasekhar , Dr. N. Vivek ,

Dr.UmaMaheswari,Melvin,

Dr.Subramaniam,Dr.K.RathnaSabapathy

17 27.01.2015 KovaiTechathon 2015

Mr.Sukumar,Kovai Tech

18 05.02.2015 Yellow Tree

Academy Mr.Sathish

19 18.02.2015 & 19.02.2015

Mock interview for 3rd year

Final Year Students

20 26.02.2015

Community Service - An

awareness session on digital

literacy at SaibabaVidyalayamSchool,Coimb

atore.

CSE/IT Association

21 05.03.2015 Syllogism - an

intra college coding event

Coding Event Final Year Students

22 12.03.2015 Association Valedictory

Fuction

Prize distributions,release of

magazine and Valedictor Address

CSE/IT Department

Typewritten text
"TECKDEZINE"
Page 38: TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY

S.No Company name CSE IT

1 INDIX 1 0

2 PAYODA SOLUTIONS 5 0

3 SKAVA SYSTEMS 2 1

4 MU SIGMA 0 0

5 UNISYS 9 -

6 COMMVAULT 0 0

7 ROBERT BOSCH 0 -

8 ODESSA TECHNOLOGIES 0 0

9 DELOITTE 0 1

10 ARICENT 0 1

11 LATENT VIEW ANALYTICS 2 0

12 MULTICOREWARE 0 0

13 VEMBU 0 0

14 FCS TEKSYSTEM 2 1

15 THOROGOOD ASSOCIATES 0 0

16 ORACLE PGBU 0 1

17 CHALK STUDIO 0 0

18 INFORMATICA 1 0

19 ATHENA HEALTH 0 1

20 ZOHO CORP 3 1

21 AKAMAI 0 0

22 SUCCESSFACTORS 0 0

23 THOUGHTWORKS 0 0

24 TCS 25 21

PLACEMENT STATISTICS

Page 39: TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY

25 ORACLE SYSTEMS 1 0

26 ACCENTURE 5 4

27 ORGANIC APEX 0 0

28 TECH MAHINDRA 0 0

29 HP Services 1 0

30 ASPIRE SYSTEMS 2 0

31 L&T Infotech 0 0

32 ALCATEL LUCENT 0 0

33 TOSHIBA 3 2

34 APTEAN 0 0

35 HP R&D 0 0

36 TATA ELXSI 0 -

37 POLARIS 0 1

38 FRACTAL ANALYTICS 0 0

39 HOME LANE 1 1

40 L&T TECH SERVICES 0 0

41 ADP 1 0

42 MARKET SIMPLIFIED 0 0

43 TAVANT TECHNOLOGIES 3 4

44 IMPIGER TECHNOLOGIES 0 0

45 AKAMAI 0 0

46 DIVUM 2 1

47 MALLOW TECHNOLOGIES 0 1

48 SUTHERLAND 2 1

49 GLOBAL ANALYTICS 1 1

Page 40: TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY
Page 41: TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY
Page 42: TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY
Page 43: TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY
Page 44: TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY
Page 45: TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY
Page 46: TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY
Page 47: TecKDezine2015 COIMBATORE INSTITUTE OF TECHNOLOGY

SPECIAL THANKS TO:

*MS.P.KUMUDHA *MS.ABIRAMI*KARTHIK.S*RAM PRASAD*VIJAY SAI*BHARATH.T*SIVA SUBRAMANI*NASEER.P*KALATHIESWARI*MATILD REEMA*EXPANADABLES*DHINESH KUMAR*ANAND.M*JAYANT*MURALI

Typewritten text
3rd year CSE

Recommended