Skip to content
Related Articles

Related Articles

Improve Article

IIT Guwahati PhD Interview Experience 2020

  • Last Updated : 28 Jul, 2020
Geek Week

IIT Guwahati conducted their Ph.D. CSE examination through online amidst the corona situation.

ROUND 1:

Around 97 people were shortlisted based on Gate score and  Btech, or Mtech CGPA.

Round 2:

The round was conducted over skype.



The panel consisted of 4-5 professors. They asked us to fill a Google form where we were supposed to mention our preferences for Ph.D. My choices were Machine Learning and Theoretical Computer Science (2 options were mandatory to fill). Other than that, they have asked for the Statement of Purpose, mentioning all the projects that we have done.

I was first asked questions on Machine Learning, my first preference.

Question1:

Explain k-means clustering.

Ans-: Answer to the above question can be found here https://www.geeksforgeeks.org/k-means-clustering-introduction/.

There was a counter-question that will k-means clustering always give the best clusters?

Ans- No, but over multiple iterations, they will give answers close to that.

Question 2:



Explain back-propagation in a feed-forward network.

Ans-: Answer to the above question can be found here https://www.geeksforgeeks.org/k-means-clustering-introduction/.

There was a counter-question, will back-propagation always reduces errors?

Ans- No, but over multiple iterations, they will give answers close to that.

After that, they asked me questions on Theoretical Computer Science.

Question 1:

A rational number is represented in its decimal form. For example, 2/3 is represented by 0.666666. Will, all the prefix of the number in its decimal form forms a regular language?

Ans-: Yes, we can design a finite automata for it.

Will it be true for any irrational number?

Ans-Know we don’t know when an irrational number like pi will recur, so they are not regular. Again taking any irrational number and applying pumping lemma will also prove this.



Then they asked about my projects on ML and computer architecture. A very brief description of the same.

Question 2:

Give an example of a buffer-overflow attack?

Ans: This happens when an attacker transmits irrelevant packages at a constant time interval (smaller than the time interval between two packets in a standard scenario), making the buffer overflow. Because of this, the relevant packages get discarded.

The interview lasted for 25 mins.

The result came out. I got selected for Ph.D. in IIT Guwahati.

Hey geek! It’s time to become a success story instead of reading them. Check out our most renowned DSA Self Paced Course, now at a student-friendly price and become industry ready. And if you are looking for a more complete interview preparation resource, check out Complete Interview Preparation Course that will prepare you for the SDE role of your dreams!

Feeling prepared enough for your interview? Test your skills with our Test Series that will help you prepare for top companies like Amazon, Microsoft, TCS, Wipro, Google and many more!

My Personal Notes arrow_drop_up
Recommended Articles
Page :