IIT Guwahati PhD Interview Experience 2020

IIT Guwahati conducted their Ph.D. CSE examination through online amidst the corona situation.

ROUND 1:

Around 97 people were shortlisted based on Gate score and  Btech, or Mtech CGPA.

Round 2:

The round was conducted over skype.



The panel consisted of 4-5 professors. They asked us to fill a Google form where we were supposed to mention our preferences for Ph.D. My choices were Machine Learning and Theoretical Computer Science (2 options were mandatory to fill). Other than that, they have asked for the Statement of Purpose, mentioning all the projects that we have done.

I was first asked questions on Machine Learning, my first preference.

Question1:

Explain k-means clustering.

Ans-: Answer to the above question can be found here https://www.geeksforgeeks.org/k-means-clustering-introduction/.

There was a counter-question that will k-means clustering always give the best clusters?

Ans- No, but over multiple iterations, they will give answers close to that.

Question 2:



Explain back-propagation in a feed-forward network.

Ans-: Answer to the above question can be found here https://www.geeksforgeeks.org/k-means-clustering-introduction/.

There was a counter-question, will back-propagation always reduces errors?

Ans- No, but over multiple iterations, they will give answers close to that.

After that, they asked me questions on Theoretical Computer Science.

Question 1:

A rational number is represented in its decimal form. For example, 2/3 is represented by 0.666666. Will, all the prefix of the number in its decimal form forms a regular language?

Ans-: Yes, we can design a finite automata for it.

Will it be true for any irrational number?

Ans-Know we don’t know when an irrational number like pi will recur, so they are not regular. Again taking any irrational number and applying pumping lemma will also prove this.



Then they asked about my projects on ML and computer architecture. A very brief description of the same.

Question 2:

Give an example of a buffer-overflow attack?

Ans: This happens when an attacker transmits irrelevant packages at a constant time interval (smaller than the time interval between two packets in a standard scenario), making the buffer overflow. Because of this, the relevant packages get discarded.

The interview lasted for 25 mins.

The result came out. I got selected for Ph.D. in IIT Guwahati.


Write your Interview Experience or mail it to contribute@geeksforgeeks.org

My Personal Notes arrow_drop_up


If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to contribute@geeksforgeeks.org. See your article appearing on the GeeksforGeeks main page and help other Geeks.

Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.


Article Tags :

1


Please write to us at contribute@geeksforgeeks.org to report any issue with the above content.