Thursday, May 21, 2020

Case Study A Tale Of Two Classes - 1110 Words

Case Study One: A Tale of Two Classes Ebony, a university student, finds herself in two classes, each with their own unique atmosphere. Interpersonal Communication comes first and is taught by Professor Gardner, who has been teaching for 20 years. Organizational Communication is her second class, taught by Professor Morgan, who is younger than Professor Gardner. Each professor has a different style of teaching and opinion on how students learn most efficiently. Professor Gardner sets out his expectations, rules of conduct, and strict no-technology policy on the first day of class; he values structure and consistency for his students. Professor Morgan does not present rules for her class; she does not mind if students come in late or leave early, and appreciates the use of technology for the purpose of adapting the learning environment for each student. Professor Morgan values freedom and self-responsibility for her students. Ebony loves Interpersonal Communication, and notices that t he students, when provided with structure, tend to thrive, communicate freely, and connect with other students right away. There is a lot of laughter involved, and most everyone knows each other’s names. In Organizational Communication, however, Ebony feels lost and out of touch with the path of the class. She finds that the spontaneity of Professor Morgan is more confusing than helpful; Ebony senses the disconnect between students, as most of them do not know each other’s names. ProfessorShow MoreRelatedThe Massacre Of Cats1010 Words   |  5 Pages By utilizing classic folk tales and various case studies: police files, intellectuals, bourgeois, and most interestingly, the massacre of cats, Darnton attempts to tell a cultural history of pre-Revolution France. He argues that by using an anthropological viewpoint: through the usage of such â€Å"unfamiliar(5)† techniques, that he can show how â€Å"intellectuals and common people coped with the same sort of problems(7)† as well as give insight into a topic that many people had not yet explored with success:Read MoreThe Struggles And Inequalities Of Mexican Americans1264 Words   |  6 Pageswere in buildings that were not in good condition. They were given worn out books, outdated equipment, and were taught in very crowded classrooms (A Tale of Two Schools). They also received an â€Å"imbalanced and subtractive curriculum† (Kloosterman 8). In these schools, boys were taught industrial skills and girls were taught domestic skills (â€Å"A Tale of Two Schools †). Also, their curriculum did not include Mexican language, history, and culture (Kloosterman 8). There was also a â€Å"no Spanish rule† whichRead MoreThe Middle Ages1747 Words   |  7 Pages For example, the Canterbury tales by Geoffrey Chaucer is the most important work of this period in England (â€Å"Poetry: Christian Poetry†). The overall narrative format of the Canterbury Tales is very simple (â€Å"The Canterbury Tales†). It is set in the popular medieval framework of a pilgrimage (â€Å"Poetry: Christian Poetry†). With the tales being told by a group of pilgrims traveling from London to Canterbury and entertaining each other with stories. In addition, the tales represent fourteenth-centuryRead MoreTypes Of Dwellings Used By Ancient Romans773 Words   |  4 Pageshad never seen an empire as extensive and encompassing as the Roman Empire (Mark, 2011). Even after her fall tales of her exploits continue to be told and retold. However, the R oman Empire was not merely comprised of emperors, generals and poets. Like all civilizations that came before it and that have come since, the domain of Rome comprised of many different people from varying social classes who lived in homes just like people today. For this unit’s discussion, I will discuss the layout and functionRead MoreShould a Computer Grade Your Essays?1499 Words   |  6 PagesCase Study 11: Should a Computer Grade Your Essays? The case study discusses the April 2013 launch of Harvard/MIT’s joint venture MOOC (massively open online course) essay scoring program, utilizing AI (artificial intelligence) technology to grade educational essays and short answers, with immediate feedback and ability to revise, resubmit, and improve grades. In 2012, a group of colleagues, Les Perleman, Mark Shermis, and Ben Hamner, introduced over 16,000, K7-12 standardized school tests toRead MoreThe, The Hungry Cowboy, By Karla A. Erickson Essay1164 Words   |  5 Pagesan issue being ignored by many, but also being addressed in small ways which provokes an interesting concept in viewing interactions among the people who work for the students versus college students who may or may not take it for granted. In this case, Oliver Hall is Saint Mary’s College main place for students to eat and where the research question is implemented with participant observation and a survey sent out. Race/ethnicity of Saint Mary’s students is the independent variable, which will varyRead MoreThe Mono Tale Of The Hero s Journey1549 Words   |  7 Pagesis a common trait among individuals in our society, it is one that I view unique to every individual who had the opportunity to obtain it. I will retell my literacy journey in a way that encompasses one of my favorite theories in writing, the mono-tale of the Hero’s Journey by Joseph Campbell. This theory states that the Hero’s journey is a pattern in a narrative that forms the basic template of all great stories (Gunn 1). Call to adventure My childhood has revolved in the same area. Born on theRead MorePlagiarism: The Blurred Line of Literature Essay examples1094 Words   |  5 Pagestheir valor in academia they both plagiarized, the only difference being that Viswanathan was getting royalties for her act of plagiarism. One has to question whether there really is a difference between these two cases, because both individuals clearly intentionally plagiarized. When handling cases of plagiarism one has to be extremely cautious due to the various degrees of plagiarism that depend on the individual’s intentionality and regards to profit. There is no accusation of plagiarism for someRead MoreTraditional Practices And Other Cultural Beliefs1748 Words   |  7 Pageshusband. She disagrees with any information regarding Ana’s higher education studies even after being convinced by Ana’s high school teachers. However, Ana does not give up on college education and embarks on working at her sister’s dress warehouse. Ana gets into a relationship but ensures that her mother does not get wind of it for fear of disapproval. Her college education dreams liven up when she receives a grant to study at Columbia University in New York City. She tells her family about the grant

Wednesday, May 6, 2020

Effects Of Recession And The Financial Crisis - 1263 Words

The Effects of the Recession and the Financial Crisis in Spain Crises are unavoidable phenomenon that appear at a certain time in different regions. These might affect a country s economy quite devastatingly, or might disappear rapidly without serious outcomes. Spain, in 2008 was highly affected by a crisis that lasted for several years, changing the economy of the country significantly. At the point when the worldwide emergency struck in 2008, Spain was going by the Socialist legislature of Prime Minister Josà © Luis Rodrà ­guez Zapatero. Not at all like Greece, it was not an incessant over-high-roller. Its obligation was simply 36% of its GDP in 2007, about a large portion of the obligation weight of the U.S. furthermore Germany at the time. The Socialist Party wasn t loaded with bank industry shills, or submissive admirers of voracious private enterprise, yet their response to the emergency crushed their own particular constituents generally as Spain s decades-long financial model was impending fixed. There are lessons for Americans in unde rstanding what happened to Spain. A developing piece of the Spanish economy was reliant on the private building division. The increment of house costs, the resulting riches impact and the monetary motivations connected to purchase houses created a lodging rise as in different nations. The diminishing estimation of investment rates expanded the general obligation of family units (home loans) and firms. Current record offsetsShow MoreRelatedEconomic Recession1290 Words   |  6 PagesEconomic Recession of 2007 William Mwangi Class title and section Professor’s name Due date of Assignment: 26th August 2011. William Mwangi Economic crisis Class Professor’s name 24th August, 2011. Economic Recession of 2007: What caused it and what were the after effects? Can we predict another major recession? Thesis Statement: Although the recession that dates back in 2007 is still long and deep and surely has shown some recovery, the potential that it will completelyRead MoreThe World s Economy Was Devastated1732 Words   |  7 Pages Assignment 4 GEOG200 Bradley Bache 3129292 Submitted September 10, 2015 In 1929, the western world’s economy was devastated. With the crash of the United States Wall Street, the realm drove into what is now known as the â€Å"Great Recession†. Its neighbour to the north, Canada also felt these affects as unemployment and poverty grew. After a decade of despair, the massive rise in government spending for the Second World War and the reductions in taxes, the economies returned to prosperRead MoreThe 2008 Financial Crisis Essay1326 Words   |  6 Pagesintroduction The 2008 financial crisis led to a sharp increase in mortgage foreclosures primarily subprime leading to a collapse in several mortgage lenders. Recurrent foreclosures and the harms of subprime mortgages were caused by loose lending practices, housing bubble, low interest rates and extreme risk taking (Zandi, 2008). Additionally, expert analysis on the 2008 financial crisis assert that the cause was also due to erroneous monetary policy moves and poor housing policies. The federal governmentRead MoreThe Great Recession Of 2008 Was A Worldwide Economic Downturn1673 Words   |  7 PagesThe Great Recession of 2008 was a worldwide economic downturn that impacted the global economy. Economists consider the economic decline as one of the most damaging recessions that occurred since the Great Depression of 1930’s. Several documentations and research regarding the recession have been made to make a better understanding of the economic downturn in 2008 as well as the global economy a s a whole. The book used as reference in this essay, the Diary Of A Very Bad Year: Confessions of an AnonymousRead MoreThe Role of Banks in Economic Recessions1644 Words   |  7 PagesThe role of banks in economic recessions 05.05.2009 In today’s wavering global economic context, the word `crisis` is omnipresent, taking the media by assault and infringing into the population’s daily life, although many countries haven’t even officially entered recession yet. Although recession is generally referred to as a negative Gross Domestic Product growth for a period of at least two consecutive quarters, other important economicRead MoreAnalysis of â€Å"the Global Financial Crisis: Causes, Effects, Policies and Prospects† Dominick Salvatore, Journal of Politics Society, Columbia University1110 Words   |  5 PagesAnalysis of â€Å"The Global Financial Crisis: Causes, Effects, Policies and Prospects† Dominick Salvatore, Journal of Politics Society, Columbia University June 2010 Marija Nikolic December 2012 Global financial crises has brought into focus debate about decisions made by the countries which are leading economic forces, making them to reconsider past living standards and habits. With the aim to examine the causes, effects, policies and prospects for the financial crisis D.Salvatore publishedRead MoreFinancial Crisis Of A Single Country1671 Words   |  7 Pages Table of Contents Summary 2 Financial crisis 3 Impact of financial crisis 4 Effect of financial crisis on different on the economies of different countries 5 Mathematical problems 6 Conclusiom 8 References ..................................................................................................................................................9 Summary Financial crisis has long been a part of global economic recession throughout the history. Here, the purpose of this assignmentRead MoreBailouts Effect on Economy770 Words   |  3 PagesAlmost 1.2 trillion dollars were spent on bailing out the various banks in the 2008 financial crisis. First, what bailouts are is explained. Then, the history of bailouts in the US is told. Finally, the effects of the recent bailouts are analyzed. Because billions of dollars are spent on bailouts, they need to be understood by the public by knowing their history and their effects on the economy to ensure informed decisions in the future on whether or not banks should be allowed to fail. A bailoutRead MoreFinancial Crisis Essay1119 Words   |  5 Pagesnegative effects are best stated up John Taylor in the Hover Digest: â€Å"On the Fraser index, the United States ranked 2 in the year 2000 and it ranks 14 today. On the Heritage index it ranked 5 in 2008 and it ranks 12 today. On the World Banks Doing Business indicator it ranked 3 in 2008 and it ranks 7 today.† (Hover Digest 9). Much of this shrinkage has been attributed to various periods of economic turmoil in the past several decades; the 1979 energy crisis, the Savings and Loans crisis of 1982,Read MoreThe World Experienced A Tremendous Financial Crisis Essay1131 Words   |  5 Pagestremendous financial crisis which rooted from the U.S housing market; moreover, it is considered by many economists as one of the worst recession since the Great Depression in 1930s. After posing a huge effect on the U.S economy, the financial crisis expanded to Europe and the rest of the world. It brought governments down, ruined economies, crumble financial corporations and impoverish individual lives. For example, the financial crisis has resulted in the collapse of massive financial institutions

Unknown Free Essays

Life is an experience that comes along with failure. Have you ever had the feeling like you haven’t done your best at something or the feeling that you’re disappointing the people you care about most? Well Eve had that feeling multiple times especially in middle school. In middle school Eve experience lots of failure; failure with friendships, relationships, and rejection. We will write a custom essay sample on Unknown or any similar topic only for you Order Now Failure to me is being unhappy with yourself and not doing what you believe in. My 8th grade year in middle school was a earning experience that came along with lots of failure. The beginning of 8th grade was the easiest part of middle school because there was no drama and less friends. As time went by I gained more friends and more pressure was put on my shoulders. I learned a lot about friendships and the meaning of them. Losing the friends that meant the most to me is one of my failures and something that was challenging. Friendships from the past have a huge impact on the friendships that Eve made today. In middle school I was always open to meeting new people and starting new reined friendships with anyone but now I realize that I can’t do that without getting to know the person first. During my years in high school Eve been more selective with how I choose my friends. Eve learned that in order to trust someone in full and to consider them a good friend, I would have to get to know that person first. Throughout my high school experience Eve gained many friends and learned to trust them. Whenever I had a problem, I would turn to them for advice. Their advice always helped me through my problems and anything else I needed. Throughout my experience in high school and middle school, Eve learned a lot about friendship and values. Eve been making better decisions for myself and how I have been choosing my friends. How I chose my friends will help me in college because Eve had experience with good friends and bad friends. My experience with friends at school is teaching me so much about life. Middle school and high school has helped me with better decision making when choosing friends. I will use this decision making in college to help me build new friendships. How to cite Unknown, Papers Unknown Free Essays B. Sc. (H) Computer Science 3-YEAR FULL TIME PROGRAMME RULES, REGULATIONS AND COURSES CONTENTS DEPARTMENT OF COMPUTER SCIENCE FACULTY OF MATHEMATICAL SCIENCES UNIVERSITY OF DELHI DELHI – 110007 2010 Semester Systems at the undergraduate level Course of Study: B. We will write a custom essay sample on Unknown or any similar topic only for you Order Now Sc. (H) Computer Semester – I CSHT-101 Programming Fundamentals CSHT-102 Discrete Structures Digital Electronics Calculus and Matrices CSHT-203 Data Structures Semester – II CSHT-204 computer Systems Architecture English Calculus and Geometry using C++ Semeser – III CSHT-305 Algorithms CSHT-306 Systems Programmin g CSHT-307 File Structures and Database Basic Probability and Statistics Semester – IV CSHT-408 Operating Systems CSHT-409 Data Communica tion and Computer CSHT-410 Software Engineering Real Analysis / Differential Equations Semester – V CSHT-511 Theory of Computations CSHT-512 Microproces sors CSHT-513 Internet Technologie s Optimization I/ Real Analysis/To be decided by the student Semeser – VI CSHT-614 Computer Graphics CSHT-615 Information Security CSHT-616 Electives Statistical Methodology/ DE/To be decided by the student Electives: 1. Software Testing 2. Artificial Intelligence 3. Network Programming and Administration 4. Data Mining 5. Combinatorial Optimizations Proposed Structure and Syllabi for B. Sc. (H) Computer Science – July 2010 Semester I Coding Title L–T–P Credits Total Marks 100 Pre-requisites CSHT-101 Programming Fundamentals using C++ Discrete Structures Digital Electronics Calculus and Matrices Software Lab based on 101 Lab based on Digital Electronics 5 – 0-0 5 – CSHT-102 ** ** CSHP-101 5 – 0-0 5 100 – 0-0-8 4 100 Semester II Coding Title L–T–P Credits Total Marks 100 100 Pre-requisites CSHT-203 CSHT-204 ** ** CSHP-202 CSHP-203 Data Structures Computer Systems Architecture EL – II (Language) Calculus and Geometry Software Lab based on 203 Lab based on 204 5 – 0-0 5 –0-0 5 5 101 0-0-8 0-0-4 4 2 100 50 Semester III Coding Title L–T–P Credits Total Marks 100 100 Pre-requisites CSHT-305 CSHT-306 Algorithms Systems Programming 5-0-0 5 – 0 -0 5 5 101,203 101, 203 CSHT-307 ** CSHP-304 CSHP-305 CSHP- 306 Database Systems Basic Statistics and Probability Software Lab based on 305 Software Lab based on 306 Software Lab based on 307 5–0-0 5 100 101, 203 0-0-4 0-0-4 0-0-4 2 2 2 50 50 50 Semester IV Coding Title L–T–P Credits Total Marks 100 100 Pre-requisites CSHT-408 CSHT-409 Operating Systems Data Communication and Computer Networks Software Engineering Real Analysis/ Differential Equations Software Lab based on 408 Software Lab based on 409 Software Lab based on 410 5 – 0-0 5 – 0-0 5 5 101, 203 CSHT-410 ** 5 – 0-0 5 100 101, 203 – CSHP-407 CSHP-408 CSHP-409 0-0-4 0-0-4 0-0-4 2 2 2 50 50 50 Semester V Coding Title L–T–P Credits Total Marks 100 100 100 Pre-requisites CSHT-511 CSHT-512 CSHT-513 ** CSHP-510 Theory of Computations Microprocessors Internet Technologies Optimization I/Real Analysis/* Software Lab based on 512 5 – 0– 0 5–0-0 5–0-0 5 5 5 01 204 409 0-0-4 2 50 CSHP-511 Lab based on 513 0-0-4 2 50 Semester VI Coding Title L–T–P Credits Total Marks 100 100 100 Pre-requisites CSHT-614 CSHT-615 CSHT-616 ** Computer Graphics Information Security Elective Differential Equations/ Statistical Methodology/* Software Lab based on 614 Softwar e Lab based on 615 Software Lab based on 616 5-0-0 5-0-0 5-0-0 5 5 5 – CSHP-612 CSHP-613 CSHP-614 0-0-4 0-0-4 0-0-4 2 2 2 50 50 50 †¢ To be decided by the student from any discipline * * Will be finalized after the syllabi by the respective departments (Electronics / Mathematics / Statistics / English) are made. CSHT-101 Programming Fundamentals (60 Lectures) Basic Computer Organization: Functional Units, basic I/O devices and storage devices; Representation of integers, real (fixed and floating point), characters (ASCII and Unicode); Basic operations of a programming environment. Problem Solving Approaches: Notion of an algorithm, problem solving using top-down design and decomposition into sub-problems, stepwise methodology of developing an algorithm, methodology of developing an algorithmic solution from a mathematical specification of the problem, use of recursion for problems with inductive characterization. Programming using C++: basic data types; constants and variables, arithmetic and logical expressions, assignment; input-output interface; control structures in conditionals, loops; procedural abstractions; strings and arrays; command line arguments; file handling; error handling. Introduction to the object-oriented programming paradigms; data abstraction and encapsulation — objects and classes; inheritance; polymorphism; Recommended Books: 1. B. A. Forouzan and R. F. Gilberg, Computer Science, A structured Approach using C++, Cengage Learning, 2004. 2. R. G. Dromey, How to solve it by Computer, Pearson Education 1982 3. E. Balaguruswamy, Object Oriented Programming with C++ , 4th Edition, Tata McGraw Hill 1997 4. G. J. Bronson, A First Book of C++ From Here to There, 3rd Edition, Cengage Learning 2005. 5. G. Seed, An Introduction to Object-Oriented Programming in C++, with applications in Computer Graphics Springer 2nd Edition 2001. CSHT 102 Discrete Structures (60 Lectures) Introduction: Sets – finite and Infinite sets, uncountably Infinite Sets; functions, relations, Properties of Binary Relations, Closure, Partial Ordering Relations; counting – Pigeonhole Principle, Permutation and Combination; Mathematical Induction, Principle of Inclusion and Exclusion. Growth of Functions: Asymptotic Notations, Summation formulas and properties, Bounding Summations, approximation by Integrals Recurrences: Recurrence Relations, generating functions, Linear Recurrence Relations with constant coefficients and their solution, Substitution Method, Recurrence Trees, Master Theorem Graph Theory: Basic Terminology, Models and Types, multigraphs and weighted graphs, Graph Representaion, Graph Isomorphism, Connectivity, Euler and Hamiltonian Paths and Circuits, Planar Graphs, Graph Coloring, Trees, Basic Terminology and properties of Trees, Introduction to Spanning Trees Prepositional Logic: Logical Connectives, Well-formed Formulas, Tautologies, Equivalences, Inference Theory Recommended Books: 1. C. L. Liu Mahopatra, Elements of Discrete mathematics, 2nd Sub Edition 1985, Tata McGraw Hill 2. Rosen, Discrete Mathematics and Its Applications, Sixth Edition 2006 3. T. H. Coremen, C. E. Leiserson, R. L. Rivest, Introduction to algorithms, Prentice Hall on Ind ia (3rd edition 2009) 4. M. O. Albertson and J. P. Hutchinson, Discrete Mathematics with Algorithms 1988 Johnwiley Publication 5. J. L. Hein, Discrete Structures, Logic, and Computability, Jones and Bartlett Publishers, 3rd Edition, 2009 6. D. J. Hunter, Essentials of Discrete Mathematics, Jones and Bartlett Publishers, 2008 Digital Electronics In consultation with Department of Electronics) Number System and Codes: Decimal, Binary, Hexadecimal, Octal, BCD, Conversions, Complements (1’s and 2’s), Signed and Unsigned numbers, Addition and Substraction, Multiplication Gray and Hamming Codes Logic Gates and Boolean Algebra: Truth Tables, OR, AND, NOT, EXOR, Universal (NOR and NAND) Gates, Boolean Theorems, DeMorgan’s Theorems. Combinational Logic Analysis and Design: Standard representation of logic functions (SOP and POS), Minimization Techniques(Karnaugh Map Method: 4,5 variables). Multiplexers(2:1,4:1)) and Demultiplexers (1:2,4:1), Adder (half and full) and the ir use as substractor, Encoder (8-line-to-3-line) and Decoder (3-line-to-8-line) , Code Converters( Binary to BCD and vice versa). Sequential logic design: Latch, Flip flop, S-R FF , J-K FF, T and D type FFs, Clocked FFs, Registers, Counters (ripple, synchronous and asynchronous, ring, modulus), State Table, State Diagrams and Sequential Machines. A/D and D/A Converters: Successive Approximation ADC, R/2R Ladder DAC. Memories: General Memory Operation, ROM, RAM (Static and Dynamic), PROM, EPROM, EEPROM, EAROM. Suggested Books: 1. Digital Electronics, Principles and Applications, R. L. Tokheim, Tata McGraw-Hill. 2. Digital Principles, R. L. Tokheim, Schaum’s Outline Series, Tata McGraw-Hill. 3. Digital Systems, Principles and Applications, R. J. Tocci and N. S. Widner, Pearson Education Asia. 4. Digital Principles and Applications, A. P. Malvino and D. Leach, Tata McGraw Hill. 5. Digital Design, M. M. Mano, Pearson Education Asia. 6. Digital Fundamentals, T. L. Floyd, Pearson Education Asia. 7. Solved Problems in Digital Electronics, S. P. Bali, Sigma Series, Tata McGraw-Hill. 8. Digital Electronics, W. H. Gothmann, Prentice Hall of India. 9. Modern Digital Electronics, R. P. Jain, Tata McGraw-Hill. CSHT 203 Data Structures (60 Lectures) Introduction: Abstract Data Types, Arrays- Single and Multidimensional arrays, Sparse matrices. Linear structures: Stacks, Queues (linear as well as circular implementation), singly-, doubly-, and circularly- linked lists — Operations and applications. Recursion: Problem solving using recursion, run time stack in recursion, tail recursion, and its removal. Searching techniques: Linear search, Binary search and their efficiency, Skip Lists, Hashing. Tree Structures: Trees, Binary Trees, Complete Binary trees and almost complete Binary trees, binary search trees, Insertion, Deletion, Tree traversal algorithms, Threaded trees (recursive as well as Non recursive), applications of trees. Multiway trees – B-Trees and introduction to B+ Trees. Recommended Books: 1. A. Drozdek, Data Structures and algorithm in C++, 3rd Edition, Course Technology 2004. 2. Data Structures using C and C++, Tannenbaum, 2nd edition ** 1995 3. Data Structures and Algorithms in C++. Publication John Wiley 2003 4. S. Sahni, Data Structures, Algorithms and applications in C++, Publication Silicon Press 2004 5. B. R. Preiss, Data structures and algorithms with object oriented design patterns in C++, John Wiley and sons, 1998. CSHT 204 Computer System Architecture (60 Lectures) Basic Computer Organization and Design: Computer registers, bus system, instruction set, timing and control, instruction cycle, memory reference, input-output and interrupt, Interconnection Structures, Bus Interconnection design of basic computer. Central Processing Unit: Register organization, arithmetic and logical micro-operations, stack organization, micro programmed control. Instruction formats, addressing modes, instruction codes, machine language, assembly language, input output programming, RISC, CISC architectures, pipelining and parallel architecture. Memory Organization: Cache memory, Associative memory, mapping. Input-output Organization: Input / Output: External Devices, I/O Modules, Programmed I/O, Interrupt-Driven I/O, Direct Memory Access, I/O Channels Recommended Books: 1. M. Mano, Computer System Architecture, Prentice Hall of India Third edition / Pearson Education 1992. 2. A. J. Dos Reis, Assembly language and computer architecture using C++ and JAVA, Course Technology, 2004. 3. W. Stallings, Computer Organization and Architecture Desiguing for Performance 8th Edition 2009, Prentice Hall of India. CSHT 305 Algorithms (60 Lectures) Introduction: Basic Design and Analysis techniques of Algorithms, Correctness of Algorithm. Algorithm Design Techniques: Iterative techniques, Divide and Conquer, Dynamic Programming, Greedy Algorithms. Sorting and Searching Techniques: Elementary sorting techniques – Bubble Sort, Insertion Sort, Merge Sort, Advanced Sorting techniques – Heap Sort, Quick Sort, Sorting in Linear Time Bucket Sort, Radix Sort and Count Sort, Searching Techniques, Medians Order Statistics, complexity analysis; Lower Bounding Techniques: Decision Trees Balanced Trees – Red-Black Trees Advanced Analysis Technique: Amortized analysis Graphs: Graph Algorithms – Breadth First Search, Depth First Search and its Applications, Minimum Spanning Trees. String Processing: String Matching, KMP Technique Recommended Books: 1. T. H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein Introduction to Algorithms, PHI, 3rd Edition 2009 2. Sarabasse A. V. Gelder Computer Algorithm – Introduction to Design and Analysis, Publisher – Pearson 3rd Edition 1999 CSHT 306 Systems Programming (60 Lectures) Introduction: Introduction to Systems Software and machine architecture. Assemblers: Example of an assembly language, programming in assembly language, assembler features and functions, Load and Go assembler, One-pass and two pass assemblers, Macros and macro processors. Compilers: Compiler functions and features, phases of compilation, optimization. Loaders and Linkers: Basic Loader functions and features, Relocation, Program Linking, static and dynamic linking. Recommended Books: 1. A. J. Dos Reis, Assembly language and computer architecture using C++ and JAVA, Course Technology, 2004 2. D. M. Dhamdhere Systems Programming and Operating Systems, Tata McGraw-Hill Publishing Company, Ltd; Second Revised Edition 1996 3. L. Beck, D. Manjula, System Software, An Introduction to Systems Programming, Pearson, 3rd Edition 1996. 4. S. Chattopadhyay, Systems Software, PHI 2007. CSHT 307 Database Systems (60 Lectures) Introduction: Characteristics of database approach, data models, database system architecture and data independence. Entity Relationship(ER) Modeling: Entity types, relationships, constraints. Relation data model: Relational model concepts, relational constraints, relational algebra, SQL queries, programming using embedded SQL. Database design: mapping ER model to relational database, functional dependencies, normal forms. Transaction Processing: ACID properties, concurrency control, recovery. Web based databases: XML documents and databases. Books Recommended: 1. R. Elmasri, S. B. Navathe, Fundamentals of Database Systems 6th Edition, Pearson Education 2010. 2. R. Ramakrishanan, J. Gehrke, Database Management Systems 3rd Edition, McGraw-Hill 2002. 3. A. Silberschatz, H. F. Korth, S. Sudarshan, Database System Concepts 6th Edition, McGraw Hill 2010. CSHT 408 Operating Systems (60 Lectures) Introduction: Basic OS functions, resource abstraction, types of operating systems – multiprogramming systems, batch systems , time sharing systems; operating systems for personal computers workstations, process control real time systems. Operating System Organization: processor and user modes, kernels, system calls and system programs. Process Management: System view of the process and resources, process abstraction, process hierarchy, threads, threading issues, thread libraries; Process Scheduling, non-pre-emptive and pre-emptive scheduling algorithms; concurrent and processes, critical section, semaphores, methods for inter-process communication; deadlocks. Memory Management: Physical and virtual address space; memory allocation strategies -fixed and variable partitions, paging, segmentation, virtual memory File and I/O Management: Directory structure, file operations, file allocation methods, device management. Protection and Security: Policy mechanism, authentication, internal access authorization. Recommended Books: 1. A Silberschatz, P. B. Galvin, G. Gagne, Operating Systems Concepts, 8th Edition, John Wiley Publications 2008. 2. A. S. Tanenbaum, Modern Operating Systems, 3rd Edition, Pearson Education 2007. 3. G. Nutt, Operating Systems: A Modern Perspective, 2nd Edition Pearson Education 1997. 4. W. Stallings, Operating Systems, Internals Design Principles 2008 5th Edition, Prentice Hall of India. 5. M. Milenkovic, Operating Systems- Concepts and design, Tata McGraw Hill 1992. CSHT 409 Data Communication and Computer Networks (60 Lectures) Introduction to Computer Networks: Network definition; network topologies; network classifications; network protocol; layered network architecture; overview of OSI reference model; overview of TCP/IP protocol suite. Data Communication Fundamentals and Techniques: Analog and digital signal; data-rate limits; digital to digital line encoding schemes; pulse code modulation; parallel and serial transmission; digital to analog modulation-; multiplexing techniques- FDM, TDM; transmission media. Networks Switching Techniques and Access mechanisms: Circuit switching; packet switching- connectionless datagram switching, connection-oriented virtual circuit switching; dial-up modems; digital subscriber line; cable TV for data transfer. Data Link Layer Functions and Protocol: Error detection and error correction techniques; data-link control- framing and flow control; error recovery protocols- stop and wait ARQ, goback-n ARQ; Point to Point Protocol on Internet. Multiple Access Protocol and Networks: CSMA/CD protocols; Ethernet LANS; connecting LAN and back-bone networks- repeaters, hubs, switches, bridges, router and gateways; Networks Layer Functions and Protocols: routing; routing algorithms; network layer protocol of Internet- IP protocol, Internet control protocols. Transport Layer Functions and Protocols: Transport services- error and flow control, Connection establishment and release- three way handshake; Overview of Application layer protocol: Overview of DNS protocol; overview of WWW HTTP protocol. Recommended Books: 1. B. A. Forouzan: Data Communications and Networking, Fourth edition, THM Publishing Company Ltd 2007. 2. A. S. Tanenbaum: Computer Networks, Fourth edition, PHI Pvt. Ltd 2002. CSHT 410 Software Engineering (60 Lectures) Introduction: The Evolving Role of Software, Software Characteristics, Changing Nature of Software, Software Engineering as a Layered Technology, Software Process Framework, Framework and Umbrella Activities, Process Models, Capability Maturity Model Integration (CMMI). Requirement Analysis: Software Requirement Analysis, Initiating Requirement Engineering Process, Requirement Analysis and Modeling Techniques, Flow Oriented Modeling, Need for SRS, Characteristics and Components of SRS. Software Project Management: Estimation in Project Planning Process, Project Scheduling. Risk Management: Software Risks, Risk Identification, Risk Projection and Risk Refinement, RMMM Plan. Quality Management: Quality Concepts, Software Quality Assurance, Software Reviews, Metrics for Process and Projects. Design Engineering: Design Concepts, Architectural Design Elements, Software Architecture, Data Design at the Architectural Level and Component Level, Mapping of Data Flow into Software Architecture, Modeling Component Level Design. Testing Strategies Tactics: Software Testing Fundamentals, Strategic Approach to Software Testing, Test Strategies for Conventional Software, Validation Testing, System Testing, BlackBox Testing, White-Box Testing and their type, Basis Path Testing. Recommended Books: 1. R. S. Pressman, Software Engineering: A Practitioner’s Approach (7th Edition), McGrawHill, 2009. 2. P. Jalote, An Integrated Approach to Software Engineering (2nd Edition), Narosa Publishing House, 2003. 3. K. K. Aggarwal and Y. Singh, Software Engineering (revised 2nd Edition), New Age International Publishers, 2008. 4. I. Sommerville, Software Engineering (8th edition), Addison Wesle, 2006. 5. D. Bell, Software Engineering for Students (4th Edition), Addison-Wesley, 2005. 6. R. Mall, Fundamentals of Software Engineering (2nd Edition), Prentice-Hall of India, 2004. CSHT 511 Theory of Computation (60 Lectures) Languages: Alphabets, string, language, Basic Operations on language, Concatenation, Kleene Star Finite Automata and Regular Languages: Regular Expressions, Transition Graphs, Deterministics and non-deterministic finite automata, NFA to DFA Conversion, Regular languages and their relationship with finite automata, Pumping lemma and closure properties of regular languages. Context free languages: Context free grammars, parse trees, ambiguities in grammars and languages, Pushdown automata (Deterministic and Non-deterministic), Pumping Lemma, Properties of context free languages, normal forms. Turing Macines and Models of Computations: RAM, Turing Machine as a model of computation, Universal Turing Machine, Language acceptability, decidability, halting problem, Recursively enumerable and recursive languages, unsolvability problems. Recommended Books: 1. Daniel I. A. Cohen, Introduction to computer theory – John Wiley (1996 2nd Edition). 2. Lewis Papadimitriou, Elements of the theory of computation – II Edition PHI 1997. 3. Hoperoft, Aho, Ullman, Introduction to Automata theory, Language Computation –3rd Edition 2006, Pearson Education. 4. P. Linz, An Introduction to Formal Language and Automata 4th edition Publication Jones Bartlett 2006 CSHT 512 Microprocessors (60 Lectures) Microprocessor architecture: Internal architecture, system bus architecture, memory and I/O interfaces. Microprocessor programming: Register Organization, instruction formats, assembly language programming. Interfacing: Memory address decoding, cache memory and cache controllers, I/O interface, keyboard, display, timer, interrupt controller, DMA controller, video controllers, communication interfaces. Recommended Books: 1. Barry B. Brey : The Intel Microprocessors : Architecture, Programming and Interfacing. Pearson Education, Sixth Edition. 2. Walter A Triebel, Avtar Singh; The 8088 and 8086 Microprocessors Programming, Interfacing, Software, Hardware, and Applications. PHI, Fourth Edition 2005. CSHT 513 Internet Technologies (60 Lectures) JavaScript: Data types, operators, functions, control structures, events and event handling. Java: Use of Objects, Array and ArrayList class , Designing classes, Inheritance, Input/Output, Exception Handling. JDBC: JDBC Fundamentals, Establishing Connectivity and working with connection interface, Working with statements, Creating and Executing SQL Statements, Working with Result Set Objects. JSP: Introduction to JavaServer Pages, HTTP and Servlet Basics, The Problem with Servlets, The Anatomy of a JSP Page, JSP Processing, JSP Application Design with MVC, Setting Up the JSP Environment, Implicit JSP Objects, Conditional Processing, Displaying Values, Using an expression to Set an Attribute, Declaring Variables and Methods, Error Handling and Debugging, Sharing Data Between JSP Pages, Requests, and Users, Database Access. Java Beans: Java Beans Fundamentals, JAR files, Introspection, Developing a simple Bean, Connecting to DB Recommended Books: 1. Web Enabled Commercial Application Development Using Html, Dhtml,javascript, Perl Cgi By Ivan Bayross, BPB Publications, 2009. 2. BIG Java Cay Horstmann, Wiley Publication , 3rd Edition. , 2009 3. Java 7 ,The Complete Reference, Herbert Schildt, 8th Edition, 2009. 4. The Complete Reference J2EE, TMH, Jim Keogh, 2002. 5. Java Server Pages, Hans Bergsten, Third Edition, O’Reilly Media December 2003. CSHT 614 Computer Graphics (60 Lectures) Introduction to Graphics systems, Basic elements of Computer graphics, Applications of computer graphics. Graphics Hardware: Architecture of Raster and Random scan display devices, input/output devices. Fundamental Techniques in Graphics: Raster scan line, circle and ellipse drawing, thick primitives, Polygon filling, line and polygon clipping algorithms, 2D and 3D Geometric Transformations, 2D and 3D Viewing Transformations (Projections- Parallel and Perspective), Vanishing points. Geometric Modeling: Representing curves Surfaces. Visible Surface determination: Hidden surface elimination. Surface rendering: Illumination and shading models. Basic color models and Computer Animation. Books Recommended: 1. J. D. Foley, A. Van Dan, Feiner, Hughes Computer Graphics Principles Practice 2nd edition Publication Addison Wesley 1990. 2. D. Hearn, Baker: Computer Graphics, Prentice Hall of India 2008. 3. D. F. Rogers Procedural Elements for Computer Graphics, McGraw Hill 1997. 4. D. F. Rogers, Adams Mathematical Elements for Computer Graphics, McGraw Hill 2nd edition 1989. CSHT 615 Information Security (60 Lectures) Introduction: Security, Attacks, Computer Criminals, Security Services, Security Mechanisms. Cryptography: Substitution ciphers, Transpositions Cipher, Confusion, diffusion, Symmetric, Asymmetric Encryption. DES Modes of DES. ,Uses of Encryption. ,Hash function,key exchange, digital signatures,Digital Certificates. Program Security: Secure programs,Non malicious Program errors, Malicious codes virus,trap doors,salami attacks, covert channels,Control against program Threats. Protection in OS: Memory and Address Protection, Access control, File Protection, User Authentication. Database Security: Requirements, Reliability, Integrity, Sensitive data, Inference, Multilevel Security. Security in Networks: Threats in Networks s Networks security Controls, detection systems, Secure e-mails firewalls, Intusion Administrating Security: Security Planning, Risk Analysis, Organisational Security Policy, Physical Security. Ethical issues in Security: Protecting Programs and data. Information and law. Recommended Books: 1. C. P. Pfleeger, S. L. Pfleeger; Security in Computing, Prentice Hall of India, 2006 2. W. Stallings ; Network Security Essentials: Applications and Standards, 4/E, 2010 CSHT 616 (i) Foundations of Software Testing Fundamentals of testing: Need for testing, process, The psychology of testing General testing principles, Fundamental test Testing throughout the software life cycle: Software development models, Test levels (Unit, Integration, System Acceptance testing), Test types (functional, non-functional, regression testing), Maintenance testing Static techniques: Static techniques and the test process, Review process (types of review, roles and responsibilities), Test design techniques: The Test Development Process, Categories of test design techniques, Specification-based or black-box techniques (Equivalence partitioning, Boundary value analysis, Decision table testing, State transition testing, Use case testing), Structure-based or white-box techniques (Statement testing and coverage, Decision testing and coverage, other structure-based techniques), Experience-based techniques, Choosing test techniques Test management: Test organization (test leader, tester), Test planning and estimation ( Test planning, Test planning activities, Exit criteria, Test estimation, Test approaches), Test progress monitoring and control (Test progress monitoring, test reporting, test control), Configuration management, Risk and testing (Project risks, Product risks), Incident management Web Application Testing Foundation: Basic test planning and testing methods for web applications, Introduction to gray-box testing and its application to testing web applications, Outline knowledge, methods and tools for testing web applications, Introduction to web testing tools and sources, Introduction to research tools on the Net. Tool support for testing: Types of test tool, Test tool classification, Tool support for management of testing and tests, static testing, test specification, test execution and logging, performance and monitoring, specific application areas, using other tools, Effective use of tools: potential benefits and risks Recommended Books: 1. 2. 3. 4. 5. Boris Beizer, â€Å"Software Testing Techniques†, Van Nostrand Reinhold Louise Tamres, â€Å"Software Testing†, Pearson Education Paul Jogerson, â€Å"Software Testing† CRC Press Roger R Pressman, â€Å"Software Engineering – A Practitioner’s approach† Mc Graw Hill Testing Applications on the Web, 2nd Edition by Nguyen, Michael Hackett, and Bob Johnson (Wiley, 2003 CSHT 616 (ii) ARTIFICIAL INTELLIGENCE Introduction: (60 Lectures) Introduction to Artificial Intelligence, Background and Applications, Turing Test and Rational Agent approaches to AI, Introduction to Intelligent Agents, their structure, be havior and environment. Problem Solving and Searching Techniques: Problem Characteristics, Production Systems, Control Strategies, Breadth First Search, Depth First Search, Hill climbing and its Variations, Heuristics Search Techniques: Best First Search, A* algorithm, Constraint Satisfaction Problem, Means-End Analysis, Introduction to Game Playing, Min-Max and Alpha-Beta pruning algorithms. Knowledge Representation: Introduction to First Order Predicate Logic, Resolution Principle, Unification, Semantic Nets, Conceptual Dependencies, Frames, and Scripts, Production Rules, Conceptual Graphs. Programming in Logic (PROLOG). Dealing with Uncertainty and Inconsistencies: Truth Maintenance System, Default Reasoning, Probabilistic Reasoning, Bayesian Probabilistic Inference, Possible World Representations. Understanding Natural Languages: Parsing Techniques, Context-Free and Transformational Grammars, Recursive and Augmented Transition Nets. BOOKS RECOMMENDED: 1. 2. DAN. W. Patterson, Introduction to A. I and Expert Systems – PHI, 2007. Russell Norvig, Artificial Intelligence-A Modern Approach, LPE, Pearson Prentice Hall, 2nd edition, 2005. Rich Knight, Artificial Intelligence – Tata McGraw Hill, 2nd edition, 1991. W. F. Clocksin and Mellish, Programming in PROLOG, Narosa Publishing House, 3rd edition, 2001. 5. Ivan Bratko, Prolog Programming for Artificial Intelligence, Addison-Wesley, Pearson Education, 3rd edition, 2000. 3. 4. CSHT 616 (iii) Network Programming and Administration Transport Layer Protocols: TCP, UDP, SCTP protocol. Socket Programming: Socket Introduction; TCP Sockets; TCP Client/Server Example ; signal handling; I/O multiplexing using sockets; Socket Options; UDP Sockets; UDP client server example; Address lookup using sockets. Network Applications: Remote logging; Email; WWWW and HTTP. LAN administration: Linux and TCP/IP networking: Network Management and Debugging. Books recommended: 1. W. Richard Stevens, Bill Fenner, Andrew M. Rudoff, Unix Network Programming, The sockets Networking API, Vol. 1, 3rd Edition, PHI. 2. B. A. Forouzan: Data Communications and Networking, Fourth edition, THM Publishing Company Ltd. 3. Nemeth Synder Hein, Linux Administration Handbook, Pearson Education, 2nd Edition 4. R. Stevens, Unix Network Programming, PHI 2nd Edition CSHT 616 (iv) Data Mining Overview: Predictive and descriptive data mining techniques, supervised and unsupervised learning techniques, process of knowledge discovery in databases, pre-processing methods Data Mining Techniques: Association Rule Mining, classification and regression techniques, clustering, Scalability and data management issues in data mining algorithms, measures of interestingness Books Recommended: 1. Introduction to Data Mining, Pang-Ning Tan, Michael Steinbach, Vipin Kumar, Pearson Education. 2. Data Mining: A Tutorial Based Primer, Richard Roiger, Michael Geatz, Information; Pearson Education 2003. 3. Introduction to Data Mining with Case Studies, G. K. Gupta, PHI,2006. 4. Insight Into Data Mining: Theory And Practice, Soman K P,Diwakar Shyam, Ajay V, PHI, 2006 CSHT 616 (v) Combinatorial Optimization Introduction: Optimization problems, neighborhoods, local and global optima, convex sets and functions, simplex method, degeneracy; duality and dual algorithm, computational considerations for the simplex and dual simplex algorithms-Dantzig-Wolfe algorithms. Integer Linear Programming: Cutting plane algorithms, branch and bound technique. Graph Algorithms: Primal-Dual algorithm and its application to shortest path, Math-flow problems Dijkstra’s algorithm, Max-flow problem, matching problem, bipartite matching algorithm, non-bipartite matching algorithms. Books recommended: 1. C. H. Papadimitriou and K. Steiglitz, Combinatorial Optimization: Algorithms and complexity, Prentice-Hall of India, 2006 2. K. Lange, Optimization, Springer, 2004 3. Mokhtar S. Bazaraa, John J. Jarvis and Hanif D. Sherali, Linear Programming and Network Flows, John Wiley Sons, 2004 4. H. A. Taha, Operations Research: An Introduction (8th Edition), Prentice Hall, 2006 How to cite Unknown, Papers