Category Archives: Uncategorized

XINO 2018

XINO 2018, was held at Delhi Public School, Rohini, on 12th May 2018. Exun Clan bagged the overall trophy. Individual Results are as follows:

X-Word – Winners
Udit Malik
Sumay Mishra

Tech Exult – Winners
Udit Malik
Kabir Goel

Execute.exe – Winners
Naman Dhingra [NE]

Exclamation Point – Winners
Aditya Joshi

X-Quest – WInners
Aaryak Garg

Exposure – Runner-Up
Ayush Chinmay [Digex]

Extreme Pursuit – Runner-Up
Karan Handa [NE]

Exquisite – Runners-Up
Vishrut Malik
Anirudh Chauhan
Yashwardhann Kumar

Congratulations to all the winners!

Exun e-Lite 2018 Learning Resources

Exun Clan will soon hold e-Lite, our annual recruitment test, open to anyone from classes 6–11 (and to exceptional students from class 12).

This year, rather than having a separate recruitment test for each discipline (quizzing, programming, creative, and group discussion), we’re going to integrate the induction process. Although the final details of the recruitment process are still being worked out, our aim with e-Lite this year is to induct people who are passionate about technology and are willing to learn skills beyond those for which they are inducted. We want people who yearn to learn, and can pick up new skills quickly.

In this post, we’ve provided some learning resources (blog posts, tutorials & docs) that you can use to learn new skills in preparation for e-Lite. Go over the docs for the skills and see what you like. We encourage you to pick up as many skills as you can.

Before you go through the following resources, read this doc on how to learn.

Quizzing

If you have a good memory and a creative mind, then quizzing is for you. Here’s a doc explaining what quizzing is all about.

Programming

Programmers use code to solve problems. Here’s a doc with sample problems and some resources to get started.

The Web & Development

This involves code that runs awesome web applications like Google & Facebook, as well as mobile development. Here’s a doc to get you started.

Design

Do you love tweaking pixels in Sketch or Illustrator, or spend hours every day poring over Dribbble or Behance? Then design might just be for you. This doc will walk you through what it is designers do.

3D Design

3D Design involves making three-dimensional models of the world. This doc will guide you through it.

Hardware

The hardware division explores what makes our machines tick. This doc will tell you all you need to know about hardware.

Group Discussion

The people involved in group discussion form the voice of Exun. Read through this doc to find out what the skill entails.

There’s also other more advanced skills you can learn, like Machine Learning (warning: requires a lot of high-level mathematics & programming knowledge), but it’s not necessary to learn these for e-Lite. Do them if you have time and are interested, though.

Get in touch with us at exun@dpsrkp.net if you have any questions. You can also contact us through:

  • Kabir Goel (11-J): email
  • Shashwat Goel (12-F): email
  • Shiv Sethi (11-G): email
  • Natasha Arya (10-M): email

[If you’re a girl, considering taking part in The Technovation Challenge, a program where you can learn to identify a problem in your community and create a mobile app solution to address it. The curriculum is open to everyone.]

Overall Winners at Access 2017

Access 2017 was held at Modern School, Barakhamba Road on 23-24 December, 2017. Exun Clan bagged the Overall Trophy.

The individual results are as follows:

Software Development — Winners
Josh Randhawa

Open Programming — Winners
Aman Verma

Sub Junior Programming — Winners
Sarthak Mangal

Website Design — Winners
Vishrut Malik

Crossword — Winners
Udit Malik & Sumay Mishra

Hardware & Networking — Winners
Bhavya Khandelwal [NE]

Robotics — Winners
Aahan Birla [NE]

Audio Editing — Runners Up
Anirudh Chauhan

Open Programming — Runners Up
Shashwat Goel

Open Quiz — Runners Up
Kabir Goel & Alhad Sethi

Junior Quiz — Runners Up
Alhad Sethi

Website Design — Runners Up
Yashwardhan Kumar

3D Design — Second Runners Up
Ashvin Verma

Sub Junior Quiz — Second Runners Up
Angad Singh & Ashay Srivastava

Junior Programming — Second Runners Up
Bharat Goel

Congratulations to all the winners!

Brain-Computer Interfaces by Angad Singh

Brain-Computer Interfaces: An Overview

Picture this, it’s late at night and you have a big test tomorrow which you haven’t studied for. As you steadily move through the course material you wonder if there was a way by which you could just download information straight to your brain. That might be closer than you think.
Technology (like DARPA’s Neural Engineering System Design) now exists by which your brain can directly interact with a computer- this is called a Brain Computer Interface(BCIs).  Even though this might seem magical there’s actually something very simple behind this. Our brains have millions of neurons connected by Axons and Dendrites. When we think, move, or memorize something, our neurons work to transfer data through small electrical signals. These electrical signals move around our brain at speeds more than 250 mph! Although, the paths these signals take are insulated by a fatty white substance called myelin, some of them escape. These electrical signals are what allow us to interpret our thoughts and translate them into mouse-clicks and keypresses. Following animal-testing, the first prosthetics that could be directly controlled by their users’ brains came up in the 1990s.

A Brief History


Hans Berger discovered the electrical activity of the brain in 1924 and recorded it by the means of EEG or electroencephalogy.
In order to record these electrical signals, he inserted silver wires into the scalps of his patients, which were later replaced by silver foils attached to the patient’s head by rubber bandages.


Jacques Vidal, a UCLA professor, is widely recognized as the creator of BCIs. He coined the term and produced the first peer-reviewed publication on this topic.
Now, BCIs are most often used for researching, mapping, assisting, augmenting or repairing human cognitive or sensory-motor functions.

Devices like these can be very helpful for disabled people. DARPA is funding the research and development of BCIs, which allow blind people to see . This might sound complicated, but the concept behind this is fairly simple: researchers can figure out what electrical signals are sent to the brain when our eyes see the color red and then rig up a camera to do the same.

BCIs can also allow people to control prosthetic limbs with their brains. Due to the incredible cortical plasticity of the brain, signals from prosthetics can after some alteration, be interpreted by the brain in the same way as it would interpret signals sent by natural limbs.

There’s options for people who’d like to experiment with BCIs outside the lab. wyrm, a Python library, allows you to play around with EEGs and make your own brain-computer interfaces.

Angad Singh

COL. SANDERS’ NEW FLAGSHIP KILLER

It took a couple of re-reads to fully let the impact of the news sink in. At first, it was just words that registered: China, KFC, Phone. Then the concept fully began to connect.

The Chinese are now making a KFC smartphone.

Why are the Chinese now making a KFC smartphone?

Don’t get me wrong, I love China. I mean, like 90% of the tech that you get is “Made In China”, even the ubiquitous iPhone: “Designed in California, Made In Taiwan”. Not just tech, but even food! Did you know that although KFC originated in the U.S., it’s now the largest restaurant chain in China? Now, on KFC’s 30 year anniversary, it’s partnered with Huawei, one of China’s biggest smartphone producers, to release a KFC phone.

You read that right.

Granted, a KFC special phone manufactured by the same guys who make the perfectly reasonable Mate and Honor line of devices wasn’t exactly the product the world was pining for, but doesn’t it warm your heart to be living in an era of gratuitous marvels of technology such as this?

First Ever Fried Chicken Phone! [I think]

It’s a special edition version of the Huawei Enjoy 7 Plus. It has a 5.5-inch 720p display, a Snapdragon 435 SoC, a 12MP camera, 3GB of RAM, and 32GB of storage that can be expanded up to 128GB via a microSD card. There’s a fingerprint scanner on the back and, with a 3,020MAh battery, it should last a while on a charge.

It’s admittedly not a bad phone for the price (162 USD, or about Rs.10,000), although the contending Redmi Note 4 does pop into mind as a rival device by a fellow Chinese manufacturer.

But come on, let’s get real. We all know you’re not buying this thing for the specs. Doing so would be like buying Air Jordans to go for a run. No, you’re buying this baby for the prestige afforded by being the owner of a limited edition phone (Huawei says they’re only make 5,000) with Col. Sanders on the back.

“Kentucky China 30 years from 1987 to 2017, 30 years accompanied by the taste of the times, suck refers to the aftertaste! Kentucky together with Huawei joint cooperation, the introduction of Huawei Chang enjoy 7 Kentucky commemorative version of gorgeous struck! Commemorative Edition laser back carving, pre-installed Kentucky Super APP, with WOW member 10 thousand K gold, but also the first to experience k-music song function. Limited to 5000 will soon be on sale, waiting for you to grab!”

A cursory examination of the the quoted text (which is a victim of some unfortunate translation) reveals the phone is the whole package, coming with ten thousand K-Dollars (the restaurant’s digital currency) and the ability to share songs from a playlist when on the premises of a KFC, which basically means they’re simultaneously re-inventing the jukebox. Such innovation is rarely seen outside keynote events, so take note.

If you’re dead set on getting mileage out of the phone, though, you’d ideally be Chinese, as the bands the phone uses may not work worldwide and the version of Android 7.0 comes without Google built into it, as it’s meant for the Chinese market.

Better reach into the bucket of cash and pull out some dollars, cause this phone be finger-licking good.

Ishir Bhardwaj

The Lost Legacy

Uncharted: The Lost Legacy

Release Date: 22 August 2017

Platform: PlayStation 4

Developer: Naughty Dog

This unexpected addition to the hit adventure game franchise has been highly entertaining and maintains the franchise’s reputation thoroughly.

It has almost been a year since the fan-favorite Uncharted 4, with Nathan Drake’s final adventure came to a close. Naughty Dog has once again proved that its line of PlayStation exclusives are not going anywhere.

The Lost Legacy is essentially an expansion to last year’s game rather than a whole new entry, so it makes sense that it isn’t as massive a jump. However, with two powerful female protagonists having great backstories, Lost Legacy represents its subject matter excellently.

They’re a far cry from the roguish charms of Drake and Sully, but they end up being more than competent replacements.

Chloe, a thief with stealthy assassination skills made her first appearance in Uncharted 2 and Nadine, a short-tempered mercenary made hers in Uncharted 4. Their chemistry works well with Chloe’s charming personality and Nadine’s tough attitude making the story solid.

PLOT

The story is based in India, with the two protagonists finding the legendary tusk of Ganesh, son of the Hindu god Shiva.

But as with every Uncharted game, another party is also competing to find the treasure, this time it is a ruthless warmonger, Asav.

Chloe and Nadine compete with Asav and his large army in order to obtain the ancient artifact. There are many close-calls and plot twists  which make the plot energetic.

GAMEPLAY

Throughout the subtle single-player story you control Chloe while Nadine is AI-controlled.

The nice addition this time is that if you ever get stuck in a puzzle, Nadine completes it for you. This helps in maintaining the fast paced flow of the game.

In combat, players can use long-ranged weapons such as snipers, and short-barreled guns such as pistols and revolvers. Handheld explosives such as grenades and C4 are also available. Though players can attack enemies directly, they have the option to use stealth tactics to attack undetected or sneak by them. The game also introduces silenced weapons and lock-picking, a new addition using which players can obtain ammo and side-treasures.

Apart from these additions, the Lost Legacy still includes the familiar adventures of climbing the mountain along with the loop of exploration, platforming, shooting, and puzzle solving that has become the core to the gameplay experience of the franchise.

On the multiplayer side, The Lost Legacy also has the familiar Third-Person-Shooter with a wide array of weapons and power-ups. It is good for playing a quick match or two, but gets boring and repetitive over a period of time. The survival mode is offered offline and online, providing a challenging way to sharpen your shooting skills.

GRAPHICS

The graphics speak for themselves; Naughty Dog has been the master of squeezing every last bit out of the PlayStation system. With the previous Uncharted games and The Last of Us on PS3, they pushed the boundaries of the system’s software making their games look visually stunning. This time, with the PS4 Pro’s 4K and HDR capabilities the game has raised the bar to a new high.

WRAP UP

The Lost Legacy is as fun and satisfying as the other entries in the series. It may not be as dynamic and emotional as Uncharted 4, but it is still an awesome way to spend the weekend.

PROS-

  • Powerful characters
  • Smooth shooting mechanics
  • Simple story
  • Smart puzzles
  • Great visuals
  • Free of cost if you bought Uncharted 4.

CONS-

  • Only 6-7 hours of gameplay.
  • A bit of a clichéd ending.

OVERALL: 4.5/5                

 

 

The Journey of Pendrive: From flash drives to wireless stick by Kaushiv Agarwal

Technology changes very fast, from big computers to portable laptops; from snail-paced 2G to blazing-fast 4G. However, the most drastic change was in terms of storage of data: The Invention of the USB Drive.

USB flash drives were invented at M-Systems, an Israeli company, and a US patent was filed on April 5, 1999, by Amir Ban, Dov Moran, and Oron Ogdan, all M-Systems employees. The product was announced by the company in September 2000 and was first sold by IBM in 8MB capacity starting December 15, 2000. Since the December of 2000, this nifty little tool has evolved considerably.

First Generation:

An original IBM DiskOnKey USB flash drive, providing 8 MB of storage. In 2000, Lexar introduced a Compact Flash (CF) card with a USB connection, and a companion card read/writer and USB cable that eliminated the need for a USB hub.

Second Generation:

By 2003, most USB flash drives had USB 2.0 connectivity, which has 480 Mbit/s as the transfer rate upper bound; after accounting for the protocol overhead that translates to a 35 MB/s effective throughput.

Third Generation:

Like USB 2.0 before it, USB 3.0 dramatically improved data transfer rates compared to its predecessor. It was announced in late 2008, but consumer devices were not available until the beginning of 2010. The USB 3.0 interface specifies transfer rates up to 5 Gbit/s (625 MB/s), compared to USB 2.0’s 480 Mbit/s (60 MB/s)

Fourth Generation:

Manufacturers have announced USB 3.1 type-C flash drives with read/write speeds of around 530 MB/s. An example of this generation would be the SanDisk Connect Wireless Stick, a flash drive reinvented to work not just with your computer, but also with your phone and tablet. With the SanDisk Connect Stick in your pocket, bag, or across the room, you can wirelessly access your media, transfer large files, stream HD videos and music, and save and share media from your mobile device. Delivering up to 256GB of extra capacity, the SanDisk Connect Wireless Stick empowers your mobile lifestyle , whether you’re running a sales meeting or taking a hike in the woods. SanDisk Connect Wireless Stick lets you stream videos or music to as many as three other devices at the same time and gives you access to all of your things from your pocket. When you’re feeling old school, use the USB connector to plug in.

The Music Revolution

 

Spotify was founded by Daniel Ek and Martin Lorentzon in Sweden, and currently, has 140 million users.

Pandora Internet Radio was founded by Will Glaser, Jon Kraft and Tim Westergren and currently, has 81 million users

Apple Music is Apple’s streaming service and was introduced in mid-2015 and has and currently, has 30 million users

Warmup:

Streaming and sharing is a revolution in the music industry. From phonographs in the beginning to cassettes and CDs in the 20th century, music has come a long way. Music streaming in the 21st century has taken the internet by storm.

 

The Players:

Today, the giants in the music industry include Spotify, Pandora, and Apple Music. But that isn’t all; Jay Z bought the streaming service, Tidal, in mid-2016, and technology giants like Tesla also have their streaming services in the works. Celebrity Will.i.am has also decided to launch his own streaming service.The competition is tough.

 

The Battleground and Leaderboard:

Music streaming is a daily routine now. With a target audience of all ages, it’s a hard game. Music streaming is everywhere, whether you’re using a phone, laptop, desktop or tablet; whether you’re in New York City, or in the most remote location, you can stream music anytime, anywhere as long as you have an Internet connection. With the current scene, the leaderboard looks a little bit like this:

Services with the number of users(millions):

SoundCloud (175)

Spotify (140)

Pandora(77.9)

NetEase Cloud Music (55)

Jango (48)

Apple Music(30)

The Issues:

Music streaming has had its share of controversy too; from the fake artists controversy of Spotify, which reported that Spotify was promoting fake artists for its royalty system, to Apple Music’s controversy about paying artists. This game involves dirty play.

 

The Final Problem:

In a nutshell, music streaming is the largest tech industry with a tough competition, and a huge audience. Only one can survive.

 

Vinayak Pachnanda

The Future of Computing Lies In The Cloud

THE FUTURE OF COMPUTING LIES IN THE CLOUD

Cloud computing, often referred to as simply “the cloud,” is the delivery of on-demand computing resources — everything from applications to data centers — over the internet on a pay-for-use basis. It uses a remote server connected to the client by internet for using services like storage, processing, software etc.

There are many ways of implementing cloud    computing. The three major ways are:

 

  1. Software as a Service (SaaS): The required software is installed on a server and can be used by the client through the internet. They ensure that the same version of the software is accessible almost everywhere. Examples include Google Docs, Microsoft Office 365, Agile CRM.

  1. Platform as a Service (PaaS): The developers are provided a development and deployment platform on the cloud where they can upload their code snippets and let the cloud decide how to manage the resources needed to execute it. This enables the developers to create applications without worrying about server management. This is extremely useful for small startups or new developers. For example, AWS Elastic, Microsoft Azure, Google App Engine, SAP Cloud Platform and so on.
  2. Infrastructure as a Service (IaaS): IaaS involves using a remote server for storage and computation over the Internet. The main limitation of IaaS is data bandwidth. It can be used effectively only when the data bandwidth is comparable to the corresponding bandwidth of the local system. For instance, the average internet download speed in the USA is 70Mbps or 17.5MB/s. This is comparable to the average speed of 20MB/s of a USB2.0 external hard disk drive. So, storing data in the cloud has become more feasible now. For computation, services like Google Compute Engine are employed to analyze huge data in a batch-wise processing fashion. They can double up as primary servers or as additional servers in times of high demand. A few examples include Google Drive, Amazon Web Services, Google Compute Engine.

 

What is the future?

 

Due to the advantages of scalability and low maintenance costs associated with it, most businesses will shift their workload to the cloud. As developers need not care about managing the servers, this will lead to a “serverless architecture”.

 

I believe that in the future, the cloud is going to be responsible for a large portion of computation tasks of devices, and these devices will become essentially “thin clients”, ie. they will only have to compute enough power to manage the I/O devices and basic computations for networking as most of the computation tasks will be outsourced to the cloud.

 

The 5 main factors which will affect the future of cloud computing are:

  1. Scalability: The cloud is able to easily allocate resources for a task and use the unallocated resources for another task, thereby being more efficient than local computing. In traditional computing, the system remains idle for that time when there is no task. Also, whenever there is a surge in demand, the system hangs or crashes for some time as it is unable to get more resources for the more tasks in a traditional computing architecture. You must have experienced this in situations like booking tickets, checking results etc. The cloud solves this problem by adjusting the resources, so, in case of a surge in demand, it can provide more resources to stop the system from hanging.
  2. 5G: The biggest hurdle for a centralized computing platform is the network bandwidth. 5G will break this hurdle by providing speeds up to 10Gbps. This will make communication with the central server easier, and it can be used for processing.
  3. Quantum Computing: When quantum computers will be commercialized and will start being used as servers to become a part of the cloud, they will be able to provide huge computing power to small devices which will then allow them to connect to high-speed Internet.
  4. Internet of Things: Computing will become ubiquitous and devices will keep becoming smaller and cheaper in order to include full-fledged processors in them, which will not be a feasible option. In consequence, they will need to send the collected data to a cloud server which will analyse them to give instructions.

5. Machine Learning: Google announced in the GCP NEXT 2016 conference that it is going to make the process of data ingestion, storage, and training machine models as simple as calling an API. This will allow developers to focus on creating incredible new applications without having to understand complex concepts like neural networking. As machine learning becomes more advanced, the local general purpose servers will no longer be efficient enough to work on the neural networks. Such tasks for AI, Machine Learning, and Deep Learning computations will be carried out by Google’s application specific integrated circuits called Tensor Processing Units (TPUs) which are about 10 to 20 times more efficient than traditional GPGPUs cost-performance wise. However, most of the Deep Learning tasks are executed in a manner similar to batch processing, so it can be easily taken to the cloud where the cloud servers use the TPUs. Cloud TPUs are easy to program via TensorFlow, the most popular open-source machine learning framework. It is interesting to note here that even NVIDIA (one of the largest GPU manufacturers) is interested to compete with Google with its Tesla V100 GPGPU.

Aditya Singh

A Basic Introduction to Machine Learning Algorithms

A Basic Introduction to Machine Learning Algorithms

Machine learning is a field in computer science, which gives computers the ability to learn without explicitly being programmed to do so, and has widespread applications across several fields, such as diagnosis of diseases, optical character recognition, computer vision and email filtering. Many machine learning techniques are in-fact being used on a day-to-day basis for technologies like smart advertisements, friend recommendations as well as suggested search results, and we interact with them all the time.

Machine learning emerged from similar artificial intelligence fields like pattern recognition, and computational learning, and it heavily relies on statistics and mathematical optimizations. Many classification problems including anomaly-detection problems, can be solved using different machine learning algorithms put together. These algorithms form the backbone of the many technologies for use of artificially intelligent systems.

Machine Learning algorithms are broadly divided into three categories that take on different approaches to help computers learn how to solve tasks on their own. These are: Supervised Learning, Unsupervised Learning and Reinforcement Learning.

Supervised Learning

 

This approach to machine learning involves giving a set of inputs and outputs to a computer, and training it based on a dataset of ‘training examples’ we gave. Then it can be further used to predict new values when new inputs are provided to it.

Typically the dataset consists of pairs that consist of an input vector, and a corresponding output. The task of the machine is generally to determine a function such that on taking an argument of a new input vector, it should be able to output a value which has a high rate of accuracy of being the correct output.

This criterion leads to the necessity what is known as a bias-variance trade-off. A high-bias, low-variance machine learning model will overfit the data to even accommodate the outliers and the anomalies, and will not be able to adjust to the new inputs that are provided to it. Meanwhile, a high-variance, low-bias model will underfit the data, and though it will generalize itself well to different data, its accuracy will be low and not fit any data particularly well.

Thus most algorithms provide a parameter that adjusts this bias-variance tradeoff so that the model generalizes well to other data outside the training data with higher accuracy.

Unsupervised Learning

 

This is used to infer results from unclassified data, where the data is provided in the form of unlabelled points without any output values given. Then, this data is grouped into separate categories based on different criterion such as the proximity of the data points, etc.

A notable difference between unsupervised and supervised machine learning algorithms is the absence of an accuracy feature to check the viability of the unsupervised model. This is useful when we need to find hidden structures in unlabelled data, and can draw inferences from it.

Data can in general, be grouped into clusters which are similar in some respect, and these hence create a new structure for finding patterns within the data. This is especially useful in data where such information or structure would have usually gone unnoticed.

 

Reinforced Learning

 

This is an area in machine learning which is inspired by behaviourist psychology, in which the program takes actions depending on which it is either rewarded or penalized. It utilises dynamic programming techniques and is often studied in many other disciplines, such as game theory, statistics as well as information theory. This approach helps the model make the ideal choices given a particular situation.

There exist many different solutions to such problems, however, common ones include those which will provide greater reward in the long run, as opposed to immediately after. Its applications are manifold, ranging from controlling robotic arms to programming robots to avoid obstacles by creating penalties for every obstacle hit. Logical games, such as chess, can also be programmed to be played by such models.

Machine Learning is a wide and varied field with plenty of potential uses that can improve not only our technology, but also our lives. In a world filled with pessimistic warnings about the potential impact of AI on our lives, it is important to remember that such models have several advantages, too, and have led to groundbreaking research in many fields, ranging to diagnosis of diseases such as cancer simply by clicking a photo to cybersecurity and financial analysis. As in any such debate, understanding how they work is often one step closer to arriving at a compromise or a solution.

Perhaps we can avoid Judgement Day, after all.

Sagnik Anupam