Showing posts with label Social. Show all posts
Showing posts with label Social. Show all posts

Sunday, October 16, 2011

How to do a good presentation.

In this article I will highlight one major aspect you have to understand before you do a presentation. That is identifying the audience. There are four major types of people in a audience.
  1. Amiable : 
    Devoted, consistent, dependable, and loyal, the Amiable is a hard worker and will persevere long after others have given up.
  2. Driver :
    The Driver is a high achiever – a mover and shaker who is definitely not averse to risk.
  3. Expressive :
    The Expressive, a verbally adept personality, is engaging, accommodating,supportive of others, persuasive, socially adept, and relationship- rather than task-oriented.
  4. Analytic :
    The Analytical is polite but reserved, logical, fact- and task-oriented.
You have to identify following qualities of them to do a good presentation. Because they will search those qualities in you and your presentation . If you doesn't show the qualities they like,  nothing will happen.....

Amiable
  • patient
  • loyal
  • sympathetic
  • team person
  • relaxed
  • mature
  • supportive
  • stable
  • considerate
  • empathetic
  • persevering
  • trusting
  • congenial
Expressive
  • verbal
  • motivating
  • enthusiastic
  • convincing
  • impulsive
  • influential
  • charming
  • confident
  • dramatic
  • optimistic
  • animated
Driver
  • action-orientated
  • decisive
  • problem solver
  • direct
  • assertive
  • demanding
  • risk taker
  • forceful
  • competitive
  • independent
  • determined
  • results-orientated

Analytic
  • controlled
  • orderly
  • precise
  • disciplined
  • deliberate
  • cautious
  • diplomatic
  • systematic
  • logical
  • conventional
You can find your group using these quizes,


http://www.peterursbender.com/quiz/quiz.html


References :
  1. Peter Urs Bender's Guide to Strengths and Weaknesses of Personality Types, http://www.peterursbender.com/quiz/swtable.html
  2. If You Only Understood Your Customer's Personality Style,  http://www.ahfx.net/weblog/37

     


Friday, June 10, 2011

IPv6 Day Conference 2011 Sri Lanka

The Department of Computer Science and Engineering of the University of Moratuwa, which is
one of the leading advanced technology research organizations in the country engaged in ICT
research has completed a major technology assessment initiative. This R&D activity is with
respect to the readiness of Sri Lanka to move into the next generation of the global Internet that
would operate using the IPv6 technology and is done through a web based technology portal
www.ipv6day.lk.
The Department of Computer Science and Engineering of the University of Moratuwa, in
collaboration with the Information Technology and Communication Engineering Sectional
Committee of the Institution of Engineers, Sri Lanka (IESL) has organized a Sri Lankan IPv6
technology event to coincide with the "World IPv6 Day" activities scheduled for 08th June 2011.

Sunday, October 24, 2010

The most Interesting Question in IEEE 4.0


This is a encrypted message passing technique. If you are interested read this question.

Digraph Cipher
Exchanging information securely has been a challenge and a fascination since the time human beings started communicating. A digraph cipher is an encryption mechanism that replaces each pair of letters in the plaintext (message to be encrypted) by another pair of letters. In order to encrypt and transmit a message, the sender and receiver must agree on a keyword. Before encryption, the letters of the alphabet are written in a 5x5 square (The Keyword is XTREM for all Encryptions), beginning with the keyword, and combining the elements I and J into a single cell. Next, the message is broken into pairs of letters called digraphs. So that each pair contains two unique letters, an x is added between any repeated letters that fall in the same pair or at the end to make a single final letter a digraph. All digraphs fall into one of three categories: both letters are in the same row; both letters are in the same column; or both letters are in different rows and columns. For encryption, letters in the same row are replaced by the letter to the immediate right of each one in the matrix. If a letter is at the end of a row, it is replaced by the letter at the beginning. Letters in the same column are replaced by the letter immediately below each one. If a letter is at the bottom of a row, it is replaced by the letter at the top. If the letters are in neither the same row nor the same column, the first letter is replaced by the letter in its row that is at the intersection with the column of the second letter. The second letter is replaced by the letter in its row that is at the intersection with the column of the first letter. The message is easily deciphered by the recipient using the same keyword.

Task

Please, write a program that takes a keyword and a message and returns the message in its encrypted format.
Encryption Square:
X T R E M
A B C D F
G H I/J K L
N O P Q S
U V W Y Z

Input

The program gets two unique inputs: the keyword and the message.
Valid assumptions:
1. Keyword contains only alphabets and message text contain only alphabets and spaces.
2. The message is only one line of text.
3. DO NOT include white spaces when comparing
4. Add X’s for double letters before adding X’s at the end to create an incomplete digraph
e.g. littles -> li tx tl e -> li tx tl ex
5. If I/J is selected as a digraph solution for a message, then the output should only be “I” (not IJ, J, I/J)
e.g. lp -> is

Output

The program outputs the given message in an encrypted form.

Sample InputKeyword: Xtreme
Message: This is fun

Sample Output

Message: Bolp lp azua

Thursday, October 14, 2010

MYJE - Navigational System for Exmo 2010 and Innovation CSE 2010

This project is a navigational system for Sri Lanka, which provides you the paths to unknown destination and guide you through the path. Also it had a robot car demonstration, which shows the functionality of the project. This Project has won the second place at the Innovation CSE 2010 organized by CSE University Of Moratuwa. 
Read these articles which will explain you about it's implementation level details.