Monday, 23 February 2015

People the event "NIGHT BUSTERS" is started.It is an overnight programming challenge. All you need to know about "NIGHT BUSTERS" is that you will be given seven coding questions. You can code in any language you want to and try as many questions as you can. You need to submit your answers on the mail id below before 24th 11:30 p.m. :
utkarsh.mits11@gmail.com
After the given time no entries will be entertained. So hurry up!!!For further details contact:


Mahima Mehta 9413527858
Anushree Kulshrestha 9587078854
Vishraja Shrivastava 8829030099


The questions for the event are:

Q1.  Write a program to print the pattern  

              4 3 2 1 2 3 4
             3 3 2 1 2 3 3
             2 2 2 1 2 2 2
             1 1 1 1 1 1 1
              2 2 2 1 2 2 2
              3 3 2 1 2 3 3
              4 3 2 1 2 3 4

Q2. Write a program to separate the numbers and characters in a string and then arrange in the order of numbers and charcters occurring alternatively.

Q3. 

                 
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_Zlt926b-tzb3VQDHU5WFz0gfvQz9x9v8-hMffPMNn6HVrqjO4K1hRns0XfmtdC3qnCf-WzE8VC2cZ_sAFvNZnleyyDPVruFg_ZF-0yEeeMcsn-DkDagRQvazSq5jZZLOz4SQ6srpbP4/s1600/Untitled.png
                         

 In this problem you are to write a program to explore the above array for a treasure. The values in the array are clues. Each cell contains an integer between 11 and 55; for each value the ten's digit represents the row number and the unit's digit represents the column number of the cell containing the next clue. Starting in the upper left corner (at 1, 1), use the clues to guide your search of the array. (The first three clues are 11, 34, and 42). The treasure is a cell whose value is the same as its coordinates. Your program must first read in the treasure map data into a 5 by 5 array. Your program should output the cells it visits during its search, and a message indicating where you found the treasure.


Q4. 1. Consider the sequence of digits from 1 through N (N<=9) in increasing order: 1 2 3 4 … N Insert either a ‘+’ (for addition) or a ‘-‘ (for subtraction) between each of the digits so that the resultant sum is zero. Print all possible combinations that sum to zero for a number 7. Example: Enter a number: 7 and print all the possible combinations.


Q5. Write a program to search for the "saddle points" in a 5 by 5 array of integers. A saddle point is a cell whose value is greater than or equal to any in its row, and less than or equal to any in its column. There may be more than one saddle point in the array. Print out the coordinates of any saddle points your program finds. Print out "No saddle points" if there are none.


Q6. WAP to generate the first n elements of the Stöhr defined as follows: S[0] = 1 S[n] is the smallest number that cannot be expressed as the sum of two distinct previous elements in the sequence. Thus the sequence begins with 1, 2, 4, 7, and 10. The next element is 13, because 11 (=1+10) and 12 (=2+10) are sums of previous elements, but 13 is not.


Q7. Write a program to check if a given tree is balanced or not? If not than balance it.


Monday, 2 February 2015

People the event "NIGHT BUSTERS" is started.It is an overnight programming challenge. All you need to know about "NIGHT BUSTERS" is that you will be given seven coding questions. You can code in any language you want to and try as many questions as you can. You need to submit your answers on the mail id below before 3rd 11:00 p.m. :
utkarsh.mits11@gmail.com
After the given time no entries will be entertained. So hurry up!!!
For further deatils contact:

Mahima Mehta 9413527858
Anushree Kulshrestha 9587078854
Vishraja Shrivastava 8829030099

The questions for the event are:

Q1.  Write a program to print the pattern  

                                                                               1

                                                                           1       A

                                                                        1     A     2

                                                                     1     A      2     B

                                                                  1     A     2      B     3

Q2. Write a program to separate the numbers and characters in a string and then arrange in the order of numbers and charcters occurring alternatively.

Q3. 

                 
                         

 In this problem you are to write a program to explore the above array for a treasure. The values in the array are clues. Each cell contains an integer between 11 and 55; for each value the ten's digit represents the row number and the unit's digit represents the column number of the cell containing the next clue. Starting in the upper left corner (at 1, 1), use the clues to guide your search of the array. (The first three clues are 11, 34, and 42). The treasure is a cell whose value is the same as its coordinates. Your program must first read in the treasure map data into a 5 by 5 array. Your program should output the cells it visits during its search, and a message indicating where you found the treasure.


Q4. 1. Consider the sequence of digits from 1 through N (N<=9) in increasing order: 1 2 3 4 … N Insert either a ‘+’ (for addition) or a ‘-‘ (for subtraction) between each of the digits so that the resultant sum is zero. Print all possible combinations that sum to zero for a number 7. Example: Enter a number: 7 and print all the possible combinations.


Q5. Write a program to search for the "saddle points" in a 5 by 5 array of integers. A saddle point is a cell whose value is greater than or equal to any in its row, and less than or equal to any in its column. There may be more than one saddle point in the array. Print out the coordinates of any saddle points your program finds. Print out "No saddle points" if there are none.


Q6. WAP to generate the first n elements of the Stöhr defined as follows: S[0] = 1 S[n] is the smallest number that cannot be expressed as the sum of two distinct previous elements in the sequence. Thus the sequence begins with 1, 2, 4, 7, and 10. The next element is 13, because 11 (=1+10) and 12 (=2+10) are sums of previous elements, but 13 is not.


Q7. Write a program to check if a given tree is balanced or not? If not than balance it.

Saturday, 23 November 2013


BAXTER-THE BLUE COLLAR ROBOT




Baxter is an industrial robot built by Rethink Robotics, a start-up company founded by Rodney Brooks. It was introduced in September 2012. Baxter is a 3-foot tall (without pedestal; 5'10" - 6'3" with pedestal), two-armed robot with an animated face. It weights 165 lbs without the pedestal and 306 pounds with the pedestal.Baxter exhibits behavior based ‘common sense,’ capable of sensing and adapting to its task and its environment. It requires no complex programming or costly integration and with its uniquely low price point featuring an unprecedented $22,000 as base price. It also provides a compelling alternative to low-cost off shoring for manufacturers of all sizes which makes it versatile for a range of repetitive tasks and requires no safety cages.

Functions of work

  • Transportation: Baxter can be trained to transport parts from one designed location to another. Also, it could load and unload parts from moving conveyors.
  • Assembling: Baxter can be easily taught to pack a bag or box.  It could align and assemble parts and placed them into containers.
  • Machine operation: Baxter could also be trained to implement operational control sequences on other machine.
  • Testing and Sorting: Baxter can test parts for features like weight, shape and so on depends on the programming training.




Thursday, 24 October 2013

Samsung Galaxy S5 to feature eye scanning sensor   
                                                              
Samsung is reportedly working on a new eye-scanning feature which is expected to be introduced on the Galaxy s4’s successor.
According to a report by Androids- as that cites some sources from Korea, claims that the South Korean giant has started working on an eye-scanning sensor which will be featured in the rumored Galaxy S5. The feature is said to bring the eye-scanning unlock ability to the smartphones. Unfortunately, the report does not reveal many details of the alleged eye-scanning unlock feature.

The eye-scanning feature has not been introduced on any smartphone (from a major manufacturer) as an unlocking method, and if the rumor is true, Samsung would become the first handset maker to debut the feature on a smartphone. However, there is no official word from Samsung on the alleged eye-scanning feature.


Tuesday, 15 October 2013


         Wear Your Death Date on Your Wrist




For a more literal interpretation of this carpe diem theme, there’s Tikker, a watch that not only tells time, but counts down the years, months, days, hours, minutes and seconds until your death. Sure, it’s a morbid accessory, but like Herrick, Tikker’s creator wants to remind people to lead a more vibrant life.
They think we can have a better life, and make better choices, if we are more aware of our upcoming expiration, Fredrik Colting told Mashable. “It gives us perspective — the little stuff suddenly doesn’t seem so important anymore. That’s why I see Tikker as a happiness watch.
The watch comes with a questionnaire designed to help wearer’s estimate their remaining years. Once programmed, the liquid crystal display starts the countdown. Launched as a now-funded Kick starter campaign, the black and white time piece can be yours for $39.
But the point we are trying to make is that the wearer should in some way be conscious of their own expiration, and that in turn will make you better appreciate life. Like people who’ve had near-death experiences, or lived through diseases.

Wednesday, 2 October 2013

HP Debuts First PC with Built-In Leap Motion


Announced jointly by Leap Motion and HP, the HP ENVY 17 is the first PC with built-in leap motion.

 ENVY 17 is a 17.3-inch laptop with a built-in Leap Motion sensor that provides 3-dimensional gesture control to users. Much thinner than the regular Leap Motion standalone sensor, the embedded sensor is located to the right of the touch pad and below the keyboard. In order to take advantage of motion control, the user places his/her hand above the sensor approximately six to twelve inches and perform various gestures depending on the application running on the laptop.
The laptop will come preloaded with Airspace, Leap’s application store for 3-D motion controlled software such as games, educational programs, productivity apps and creative tools.

In addition, Leap will include five games, one of which has been specifically designed for HP. While the laptop includes the option of a touchscreen monitor for Windows 8 interactivity, users can also download third party software to map gesture controls to the Windows 8 interface. Hypothetically, users could navigate Windows 8 without ever actually touching the laptop. 

Friday, 27 September 2013

FINGERPRINT SCANS NEW KEY TO UNLOCK MOBILE PHONES


The pain of rustling up and remembering passwords will soon be a thing of the past following recent developments in online security and identification. Surveys show that an average person is required to recall at least 10 unique passwords and pin codes for workaday online logins and transactions.But this memory stress may soon get some relief. The latest iPhone 5S,has taken a swipe at it, making a big impression with a fingerprint reader called Touch ID. Introduced in a low-key manner during the launch of the new iPhones earlier this week (at the very end of the presentation) by Apple executives, the Touch ID fingerprint scanner will enable a quicker access to the users device while preventing unauthorized users from accessing a device's data, an increasingly frequent occurrence because of password breaches. The technology comes mainly from the $356 million acquisition Apple made in 2012 of the firm AuthenTec, which specialized in fingerprint scans, and which in turn had acquired firms such as EzValidation.

Apple isn’t the first phone make, much less tech company, to introduce fingerprint scanning on smartphones. Motorola did it in 2011,using the technology in its Atrix smartphone. In fact, Sony is credited with introducing the world’s first thumb drive with a fingerprint scanner as far back as 2003.But the technology was still in its infancy and reportedly threw up too many errors. Apple claims to have better technology. More importantly, it says the fingerprint data will be stored on the device and encrypted, and won’t be backed up to iCloud.

The development, involving major advances in biometrics, opens up a whole range of possibility .Scans will eventually be used not just to open smart phones and other devices, but also conduct other transactions. All it needs even with the occasional glitch is for the technology to acquire the critical mass it needs, which should come easily with the mass selling Apple smart phones.