Posts

Showing posts from October, 2016

Operating Systems in a nutshell

Image
Operating systems are the software that makes the hardware usable. Operating systems perform the following rudimentary functions -  Process Management Process Scheduling Process Synchronization Memory Management In addition, an operating system (OS)    also provides facilities like a GUI or embedded application software that make the system more user-friendly. OSs generally deal with allocation, scheduling and monitoring of resources available to the system. Popular examples are the Windows, Linux and Mac OS series. A process is a program in execution. Processes require resources to complete execution and the allocation of these resources is fulfilled by the operating system. Appropriate allocation algorithms must be utilized to avoid deadlocks. A deadlock occurs when the system is in a standstill because the requirements of all processes can't be met due to a lack of available resources. Common examples of deadlock are the dining philosophers problem and the readers/wr

Story - Beyond The Mundane

Archael shot himself into the sky and burst across the horizon. He sensed a presence pursuing his energy. It was his twin, Azrael trailing behind him. They were late for class.  Having made sure their presence was hidden, they teleported into their classrooms. Archael made a decent decoy with his limited magic power like he usually did and snuck out of class. Azrael, the more studious of the brothers, preferred meditating by himself in his seat, augmenting his magical energy. Archael, or Arch as his friends used to call him, was always hyperactive and rebellious in class. Although, this description was of the clones he used to make for the most part. He rarely attended class himself. Azrael was much more proficient in creating clones and would maintain about fifty or so clones at all times to do all sorts of odd jobs and chores. Archael focused more on his athletic abilities and would hone his agility and strength by battling monsters and lesser demons while his clone was causing a r

Drawings - Part 3

Image
Rough sketch of Teen Gohan SS2, my favourite dragonballz character. 

Goodbye Tofu(⏔)? - Google's Noto Project

Image
When text is rendered by a computer, characters in the text can't be displayed at times, because no font that supports them is available to the computer. When this occurs, small boxes are shown to represent the characters. In slang those small boxes have sometimes been called "tofu"(⏔). Noto as in "No Tofu", aims to remove tofu from the Web. Google recently released its open source Noto font which aims to create a united platform for several languages used around the world, rare or common. As of 8/10/2016 there are 114 Noto fonts, of which 95 are sans-serif style, 13 are serif style, and six fonts are not classified as serif or sans-serif. The Noto Color Emoji font only works under Android and Linux, and cannot be installed under Mac OS or Microsoft Windows. All these fonts are available for download in the url below- https://www.google.com/get/noto/ They can be downloaded in batch or individually .

Drawings Part 2

Image
Simple sketch of a model on some magazine.

DBMS cheatsheet

Image
Database  is a collection of related data and data is a collection of facts and figures that can be processed to produce information. A  database management system  stores data in such a way that it becomes easier to retrieve, manipulate, and produce information. A 3-tier architecture separates its tiers from each other based on the complexity of the users and how they use the data present in the database. It is the most widely used architecture to design a DBMS. Database (Data) Tier  − At this tier, the database resides along with its query processing languages. We also have the relations that define the data and their constraints at this level. Application (Middle) Tier  − At this tier reside the application server and the programs that access the database. For a user, this application tier presents an abstracted view of the database. End-users are unaware of any existence of the database beyond the application. At the other end, the database tier is not aware of any othe

Why I like programming

Image
I remember the days I spent as a kid wreaking havoc on friends' computers by making them click on different Windows batch files I made with appealing names like, "Try Your Luck" and whatnot. They usually contained code like: shutdown -s or the more sophisticated (at that time): :loop start goto loop Once I learned C programming I went with less transparent methods using the more difficult to edit executable files. Here's a snippet of code whose consequences most programmers would understand: for(;;) system("start"); Of course, this wouldn't potentially be harmful to an operating system other than a Windows one. For Windows, this would cause what I like to call a "process bomb" - multiple instances of cmd eating up your system resources in this case. I wasn't really satisfied with this, so I took things a bit further: main() {     for(;;)     {         system("start");         system("notepad");        

Story Time! Part 1

Image
Being a student forced to sit through monotonous classes for more than 7 hours per day, 6 days in a week, it helps to find innovative ways to kill boredom.. without attracting the attention of the "demon" lecturer, of course. I collaborated with my deskmate to make a story supplied with lines alternating back and forth between us. This is the mess I got in my notebook as a result: Once,there was a man. There is a man notorious for his demonic disposition. His name is ( insert your choice here). He has the power to manipulate other beings....by making them sleep! ( you don't say~ ) He can manipulate shadows and create nightmares while his victims sleep ( my friend's an avid Naruto fan.. ). He had a best friend, ( insert second demon, preferably a demoness). She can manipulate memories. When they met, she had nightmares about her memories and he had memories of his nightmares. It was love at first sight! Together, they took control of ( your college here). Nowada

Finite & Infinite Impulse Response Filters

Image
Finite Impulse Response In  signal processing , a  finite impulse response (FIR)  filter is a  filter  whose  impulse response  (or response to any finite length input) is of  finite  duration, because it settles to zero in finite time. This is in contrast to  infinite impulse response  (IIR) filters, which may have internal feedback and may continue to respond indefinitely (usually decaying). For a  causal   discrete-time  FIR filter of order  N , each value of the output sequence is a weighted sum of the most recent input values : where : {\displaystyle \scriptstyle x[n]}  is the input signal, {\displaystyle \scriptstyle y[n]}  is the output signal, {\displaystyle \scriptstyle N}  is the filter order; an  {\displaystyle \scriptstyle N} th-order filter has  {\displaystyle \scriptstyle (N\,+\,1)}  terms on the right-hand side {\displaystyle \scriptstyle b_{i}}  is the value of the impulse response at the  i' th instant for  {\displaystyle \scriptstyle \ 0\ \leq \ i\ \leq

Password authentication through contact!

Image
Transmitting a secret code over airborne radio waves like WiFi or Bluetooth means anyone can eavesdrop, making those transmissions vulnerable to hackers who can attempt to break the encrypted code. University of Washington computer scientists and electrical engineers have devised a way to send secure passwords through the human body — using benign, low-frequency transmissions generated by fingerprint sensors and touchpads on consumer devices. “Fingerprint sensors have so far been used as an input device. What is cool is that we’ve shown for the first time that fingerprint sensors can be re-purposed to send out information that is confined to the body,” said senior author  Shyam Gollakota , UW assistant professor of computer science and engineering. The research team tested the technique on iPhone and  other fingerprint sensors, as well as Lenovo laptop  trackpads and the Adafruit capacitive touchpad. In  tests with 10 different subjects, they were able to  generate usable on-bod

CRISPR/Cas9 - possibilities in the future

Image
CRISPR has been a popular topic of late and has invoked interest in countless people in recent times. Clustered regularly interspaced short palindromic repeats  ( CRISPR , pronounced  crisper ) are segments of  prokaryotic   DNA  containing short repetitions of base sequences. Each repetition is followed by short segments of " spacer DNA " from previous exposures to a bacteriophage virus or  plasmid . Cas9  ( C RISPR  as sociated protein  9 ) is an  RNA -guided  DNA   endonuclease   enzyme  associated with the  CRISPR  (Clustered Regularly Interspaced Short Palindromic Repeats) adaptive immunity system in  Streptococcus pyogenes , among other bacteria.  S. pyogenes  utilizes Cas9 to memorize  and later interrogate and cleave foreign DNA,  such as invading bacteriophage DNA or plasmid DNA. For the first time  in 2012,  Virginijus Šikšnys  together with G. Gašiūnas, R. Barrangou, and P. Horvath, purified Cas9 in complex with crRNA from the E. coli strain engineered to car

Drawings Part 1

Image
One of my drawings of an anime boy. Hope you like it!