Soumya Somayajula

Student at Sreenidhi Institute of Science and Technology

Introduction to Computer Organisation

Types of Computers, Functional Units, Basic Operational Concept, Bus Structures, Software, Performance, Processor Clock, Basic Performance Equation, Pipelining and Superscaling Operation, Clock Ratio, Instruction Set: CISC and RISC, Compiler, Performance Measurement, Multi-Processors and Multi-COmputers, Data Representation, Number Systems, Fixed Point Representation, Floating Point Representation.

Introduction to Eyegaze Technology

The Eye gaze System is a direct-select vision-controlled communication and control system. It was developed in FAIRFAX, Virginia by LCTechnologies. This system is mainly used for the people with complex physical disabilities. Its users are adults and children with cerebral palsy, spinal cord injuries, brain injuries, ALS, multiple sclerosis, brainstem strokes. Good control of one eye Adequate vision Ability to maintain a position in front of the Eye gaze monitor. Mental abilities that improve the probability for successful Eyegaze use: Cognition Ability to read Memory

An Introduction To Nano Technology

Nano is a unit of length. Technology is usage of tools,machines,techniques. Nano Technology: Study of extremely small things. Engineering at very micro level. Positional control Self-assembly The positional devices Positional controlled reactions Stiffness Scanning tunneling microscope Nano tech solar cells Manufactured at low cost Batteries using nano materials Batteries are recharged faster Lightweight spacecraft Enable sensors to detect

Electronic Voting Machine-2.0

According to a survey, In the case of elections to Municipal bodies or Rural bodies like Panchayat Elections, the EVMs used do not belong to the Election Commission of India. Local bodies elections come under the jurisdiction of State Election Commission/s (SECs), which procure their own machines and have their own handling system. ECI is not responsible for EVMs used by SECs. In order to resolve this problem, we came up with an idea of digitalising EVM. Basically, we used WeMos D1 R1 microcontroller as it has in-built ESP8266 wifi module. We used fingerprint sensor to verify person details from Aadhar card. A database is created and the votes for respective parties is stored in this database. (Database was stored using Firebase) This avoids EVM tampering and illegal voting. EVM cannot be tampered . Multiple votes can't be casted. Rural empowerment can be done by introducing them with new emerging technologies . Count of the votes are stored in the cloud server, thus results can be declared easily.

Biometric ATM

Biometric ATMs are self-service cash machines that use a biometric measure to identify customers and allow them to withdraw cash. The biometric check may be the only customer identifier used, or it may be used in conjunction with another format, such as a payment card, a mobile device or an additional security credential, such as a PIN. The biometric measures used will generally include palm or finger vein print biometrics, although they may also include other functionalities such as iris recognition. Biometric ATM are used for wide range of applications like for Banking, Coupons & Self service ATM. Biometrics ATM offer ATM type interface along with at-least one Biometrics capture device like Fingerprint Scanner, Iris camera, Palm/Finger Vein scanner , Face recognition camera. Biometrics have been touted as the next leap forward in ATM security. You don't need to memorize a PIN or even carry a card to access cash.

Introduction to Files In C

FILES: A file is an external collection of related data treated as a unit. The primary purpose of a file is to keep a record of data. Record is a group of related fields. Field is a group of characters they convey meaning. Files are stored in auxiliary or secondary storage devices. The two common forms of secondary storage are disk (hard disk, CD and DVD) and tape. Each file ends with an end of file (EOF) at a specified byte number, recorded in file structure. A file must first be opened properly before it can be accessed for reading or writing. When a file is opened an object (buffer) is created and a stream is associated with the object. FILE NAME: File name is a string of characters that make up a valid filename. Every operating system uses a set of rules for naming its files. When we want to read or write files, we must use the operating system rules when we name a file. The file name may contain two parts, a primary name and an optional period with extension. Example: input.txt program.c

FILES In C Programming

Scanf and printf functions are used to read and write the data through terminals. This is fine as long as the data is small. When data is large, it is time consuming to handle the data through terminals. The entire data is lost when the program is terminated or the computer is turned off. It is necessary to maintain the data in a manner that could be retrieved or used whenever needed. A file is an external collection of related data treated as a unit. The primary purpose of a file is to keep record of data. Record is a group of related fields. Field is a group of characters they convey meaning. Files are stored in auxiliary or secondary storage devices. The two common forms of secondary storage are disk (hard disk, CD and DVD) and tape.

FILES In C Programming

Scanf and printf functions are used to read and write the data through terminals. This is fine as long as the data is small. When data is large, it is time consuming to handle the data through terminals. The entire data is lost when the program is terminated or the computer is turned off. It is necessary to maintain the data in a manner that could be retrieved or used whenever needed. A file is an external collection of related data treated as a unit. The primary purpose of a file is to keep record of data. Record is a group of related fields. Field is a group of characters they convey meaning. Files are stored in auxiliary or secondary storage devices. The two common forms of secondary storage are disk (hard disk, CD and DVD) and tape.

FILES In C Programming

Scanf and printf functions are used to read and write the data through terminals. This is fine as long as the data is small. When data is large, it is time consuming to handle the data through terminals. The entire data is lost when the program is terminated or the computer is turned off. It is necessary to maintain the data in a manner that could be retrieved or used whenever needed. A file is an external collection of related data treated as a unit. The primary purpose of a file is to keep record of data. Record is a group of related fields. Field is a group of characters they convey meaning. Files are stored in auxiliary or secondary storage devices. The two common forms of secondary storage are disk (hard disk, CD and DVD) and tape.

Enum, Structure, and Unions

Files – File name, file information table, streams, text and binary streams, stream file processing, system created steams, Standard library I/O functions, file open and close, Formatting I/O functions, Character I/O functions, Binary I/O, Standard library functions A type definition, typedef, gives a name to a data type by creating a new type that can then be used anywhere a type is permitted. Its purpose is to redefine the name of an existing variable type.

String Manipulation Functions

The C Library provides a rich set of string handling functions that are placed under the header file and . Some of the string handling functions are (string.h): strlen() strcat() strcpy() strrchr() strcmp()  strstr() strchr() strrev() Some of the string conversion functions are (ctype.h): toupper() tolower() toascii() All I/O functions are available in stdio.h scanf() printf() gets() puts() getchar() putchar()

Sentiment Analysis In NLP

Sentiment Analysis is also known as Opinion Mining. It is a field within NLP where it builds a software which can identify and understand the message or information which is shared in it. Sentiment analysis is the field which uses the vast amount of data ( approx. 2.5 quintillion bytes of data per day) which is produced by the users and understands it. The result of this analysis can be used in various fields by various organizations and in turn it leads in the development of the world