Thursday, October 31, 2019

Cross-Cultural Awareness Respond to question Essay - 1

Cross-Cultural Awareness Respond to question - Essay Example adership’ in their areas of expertise.  Both the leaderships of various organizations and the workforce having little influence anticipate free flow of information through participatory communication. At 80 China occupies a higher ranking on the PDI scale. The society believes that social and economic disparities amongst people are normal. The relationship between subordinates and their seniors seems to be ineffective and thus the society is prone to misuse of authority by the high and mighty. Individuals tend to honor formal leadership and orders and are usually upbeat about people’s competence for management initiatives. Chinese believe people should restrain their ambitions to their current position, especially in the corporate world. According to Adler (2008), individualism primarily connotes the level of interdependence amongst members of a society. It involves whether people refer to themselves individually or collectively. In an Individualist system, people are expected to look after themselves and their nearest and dearest only. Collectivist societies on the other hand witness people organize themselves in groups that fulfill their interests in exchange for allegiance. The United States scores 91 on this measure. This means the American culture is highly individualistic. Adler (2008) avers that the American culture is loosely-knit, and as a result people take care of themselves and those who are close to them. Americans have a high affinity to covering large distances and doing business with members of different cultures. In the corporate world, employees tend to be their own bosses, especially in their various capacities or areas of expertise. Good work eventually may earn them promotion. At 20, China is a highly communalist society where decisions are made by groups rather than individuals. In the group scenario, employee hiring and job promotions tend to be based on family and friendship ties.   Employees tend to be less committed to the

Tuesday, October 29, 2019

Renaissance architecture, sculpture, & painting Essay

Renaissance architecture, sculpture, & painting - Essay Example The essay "Renaissance architecture, sculpture, & painting" explores architecture, sculpture, & painting of Renaissance. The Renaissance artists depicted the world in its natural situation in their art forms. They had the sense of space and perspective that medieval artists lacked. Their representation of the natural world is most evident in the paintings of the time. Landscapes became the â€Å"earthly settings† of the paintings. For instance, consider Andrea Mantegna’s Arrival of Cardinal Francesco Gonzaga. This fresco, completed in 1474, features a landscape as the setting, depicting the trees, hills, and the surroundings in their natural look. Pietro Bruegel, the Elder, in his The Peasant Dance (1568), painted his subjects over a natural setting of a village. It is not only in the settings of the Renaissance art forms that the beauty of the natural world was portrayed; it was depicted as well in the human figures as subjects. As paintings of the time became less of religious forms, they came to portray subjects realistically. Apart from the representation of the natural world in the paintings, the liveliness of the human form became evident in the artworks. Da Vinci’s ever-famous Mona Lisa was such a humanistic portrayal. The smile on that womanly face had caught the attention ever since. In sculpture, Michelangelo’s Moses is a good example. He was dedicated to portraying lifelike human details that he even pared muscles and veins. The humanistic approach to paintings was also implied.

Sunday, October 27, 2019

Customer Satisfaction and Expectation in Hotel

Customer Satisfaction and Expectation in Hotel INTRODUCTION Hospitality is linked to Customer satisfactions because this industry produces and provides customer satisfactions. Now, Customer requirements can be both tangible and intangible but satisfying all of them and hence meeting their requirements is called customer satisfaction. To construct arguments justifying the facilities, layout and ambience of the bedroom, only using the concept as a source of examples to illustrate / support the line of argument. The emphasis is on constructing arguments to justify a detail about the concept. The concept of our hotel revolves around the theme SPORTS. We have decided to build an ALL SPORTS HOTEL in the Cardiff bay area near the millennium stadium, which would be completely focussed on the sports oriented market, for the people who have a niche for sports. Our vision is to amuse and dazzle sports fans. AIM To use and apply theoretical concepts and models to structure a discussion which critically appraises how the proposed hotel concept will meet customer expectations and satisfy customers. The main motive of this piece of work is to research in general terms about what theory says in answer to these questions: What is customer expectation and satisfaction? What are the expectations of hotel customers? What satisfies hotel customers? What is it about my concept that will result in customer satisfaction? To construct arguments justifying the facilities, layout and ambience of the bedroom, only using the concept as a source of examples to illustrate / support the line of argument. The emphasis is on constructing arguments to justify a detail about the concept. WHAT IS CUSTOMER EXPECTATION AND SATISFACTION? Customer Expectation: The definition of customer expectation according to Parasuraman, Zeithaml and Berry (Leonard L) is: the ideas and feelings that a  customer  has about a  product  or  service, based on what he or she needs from it and  expects  it to do. (Consumer  expectation  can be formed by earlier  experiences,  marketing, what other customers say about it,  alertness  of  competitors services, and  product image. If consumer expectations are met, then customer feels satisfied.) The need, desires and ideas of a consumer about a product or facility, and what a customer wants from a service he/she is paying for is called consumer expectations. The level of consumer service is also an aspect, and a consumer might expect to meet effectiveness, cooperation, consistency, assurance in the staff, and a personal interest in his/her patronage. POSSIBLE LEVEL OF CUSTOMER EXPECTATIONS AS DESCRIBED BY PARSHURAM, ZEITHAML and BERRY (LEONARD L) (figure 1): CUSTOMER SATISFACTION A business term, is a appraisal of how goods and services supplied by a company meetup or surpass customer expectation. In a aggressive market where companies compete for consumers, customer contentment is seen as a key differentiator and progressively has become a key element of industry strategy. As Parasuraman, Zeithaml and Berry (Leonard L) emphasis, the significance of consumer satisfaction diminishes when a firm has greater than before bargaining power, because consumer satisfaction would be way too low, and consumers would easily have the alternative of leaving for an enhanced hotel offer. There is a significant body of pragmatic literature that establishes the advantages of customer satisfaction for firms. Businesses need to retain existing consumers while targeting non- consumers. Measuring client satisfaction provides a sign of how flourishing the business is at providing products and/or services to the consumers. Consumer satisfaction as described by Bluestein, Abram; M. Moriarty; R. J. Sanderson (2003) is an intangible concept and the actual sign of the state of satisfaction will vary from individual to individual and service to service. The state of satisfaction depends on some particular like both emotional and physical variables which associate with satisfaction behaviour such as return and suggest rate. The stage of satisfaction can also differ depending on other factors such as other products against which the consumer can compare the business products. Factors influencing consumer satisfaction: Product/service features. Exact products or service feature Customer emotions Attributions for service achievement or breakdown Perception of impartiality or fairness Other customers. Price Individual factors the customers mood or emotional state situational factors WHAT ARE THE EXPECTATIONS OF HOTEL CUSTOMERS? To understand the customer expectations from a hotel, we need to think from the customers point of view. When I`m a customer, i expect that i am: (methodology of customer expectations, what he expects from a particular service or hotel) 1. Attention 10. Wide Knowledgeable help 2. Competent, efficient service 11. Friendly nature of staff 3. Anticipation of customers needs 12. To be informed 4. Explanations in customers terms 13. Follow up with 5. Essential Courtesies 14. Honest 6. To be informed of the options 15. Feedback of services 7. Not to be passed around 16. Professional service 8. To be listened to (and heard) 17. Empathetic 9. Personalised attention 18. Respect The involvement of consumers in the modernization process is significant for the development of ground-breaking services and products because very often customers make substantial contributions through the articulation of idea, wishes and needs (Beiger and Graf, 2004) The majority of todays consumer have increasingly higher expectations and tend to be: Informed Confident Independent Educated Consumer-driven Not bound by traditional demographics. WHAT SATISFIES HOTEL CUSTOMERS? A customer is satisfied when his expectations are met. Customer satisfaction is met through The product itself -quality, quantity, presentation, price The service timing and speed to suit the market, efficiency, expertise of staff, appearance and social skills of staff The product support -dà ©cor, display, heating, lighting, linen, glass, cutlery, cleanliness, etc. must all support the product. From marketing viewpoint, it is important to consider the needs and requirements for customer satisfaction for at least three major reasons: People do not buy goods and services for what they are they buy them for what they do for them. Understanding what makes people tick and why they buy things makes it far more likely one will be able to satisfy those needs. If a group of customers display similar behaviours and have similar needs, they form a market segment. It is far easier, and more profitable, to supply a common range of goods and services to a group segment than to a wide-ranging set of individuals. One particular approach to people needs, which fits the hospitality industry very well, was advanced by a behavioural scientist called Abraham Maslow in 1943. He proposed a hierarchy (figure 2) of needs consisting of five levels: Maslows premise is that all of us have needs which require satisfying in ascending order, i.e. higher-level needs only emerge as those immediately proceeding are satisfied. At the base of the triangle are physiological needs of food and drink, necessary for survival. At the next level are the needs of safety and security, represented by the stability of a home, a job, and freedom from anxiety. Then come the need for love, companionship and a sense of belonging. This whole area of needs is central to the hospitality industry whether its a case of providing an intimate family meal for four or a celebration for a victorious sports team. After that is the need for esteem and status. The hospitality industry caters to the egos of its customers as much as to their stomachs, and with some justification. many people are hungrier for recognition than they are for food and drink alone. Warm, friendly greeting and the appropriate use of customers names do much to reinforce their esteem and accord them the status they seek, which gives them mental satisfaction. The need for self-actualization, the desire for self-fulfilment or being the best you can, can be met through activity breaks, featuring special interest groups fishing, golf, antique master-classes, painting, hot air ballooning. Whatever a persons hobby or interests, most activities can be catered for by the hotels over a course of year to satisfy the customer needs. The methodology discussed is actually what a customer expects from service industry. Meeting the consumer expectations will cement relations, increase their fulfilment, and retain their business. Here are six consumer expectations that are the foundation stone of exceptional service and consumer satisfaction: Well-informed and accessible staff: While a consumer is making the buying decision, they want to be well informed, available  when they want it. Friendly people:  Customers not only desire product-confident sales persons, they want them to be welcoming and polite. Value for money:  This is where money factors come in. Customers need value-for-money. Convenience:  The rule here is simple: make it easy! A fast finish:  They want thoughtful help making the right choice. Most business lose 25% of their customers annually and yet most companies spend five time as much on generating new customers on retaining existing ones. Steve Mawson (2000) explains that customer satisfaction or dissatisfaction comes more and more from the way the person is treated. Improved technology, more affluence, greater sophistication, foreign travel, intense competition all play their part in increasing customers expectations of levels of service. WHAT IS IT ABOUT MY CONCEPT THAT WILL RESULT IN CUSTOMER SATISFACTION? As I mentioned earlier, my concept of proposing a hotel in Cardiff Bay Area, Wales is of ALL SPORTS HOTEL. It is located near the Millennium stadium, Cardiff, also Cardiff City FC and Cardiff City Stadium are easily reachable. This hotel would be one of a kind in the market, and will surely attract a fair amount of market due to the immense sporting experience it would offer its customers, and also out-of-the-class facilities available at the hotel. To give a sportier feel its decided that the hotel would be stadium shaped. There would be 120 en-suites on four floors and each of them would be designed with a different theme Ground Floor It would consist of front office, cricket and football themed lobbies, sports museum, an exclusive sports merchandise shop. First Floor Designed for the people who love live for cricket, with 30 en-suites on the name of famous cricketing countries like: ENCHANTING ENGLAND INVINCIBLE INDIA With a theatre where customers can watch live cricket matches going on or specially request matches from the past, with a seating capacity of 30 people and a cricket bar. Second Floor Designed for the football crazy people, and 30 en-suites named on major teams like: CHELSEA FC MANCHESTER UNITED Theatre with 30 people capacity, live and on request matches and all football bar. Third Floor with 40 en-suites, which can be designed on the customer request if he wish to live in his favourite sports room. Like Mr Dave Andrews in presentation said that his favourite football club is BIRMINGHAM FC, so we would design a room with the Club theme, so that no guest goes away disappointed. Fourth floor with 20 en-suites, which would be highly luxurious and designed for international sporting personalities who would love to be satisfied in this all-modern sporting facility hotel. Achieving customer satisfaction can be of ease with an interesting concept like this. Experiencing sporting lifestyle with a touch of nature would be of everyones interest as it is out-of-the-box hotel concept. It is earlier discussed that when the hotel meets customers needs and expectation, customer is satisfied. Margaret M. Kappa, Aleta Nitschke and Patricia B. Schappert states that No other feature or service provided by the hotel will impress the guest than a spotlessly clean and comfortable guest room. This statement is very true because it reflects the hotels reflection and eagerness to provide services and satisfy consumers. After designing the bedroom it is the prime duty of the house keeping dept to maintain the standards. At the end of the day a hotel room is the most revenue generating sector of the hotel. The overall objective of any type of designing activity is to provide services at its best that satisfies customers. The bedroom design must be easily accepted, highly pleasing, comfort zones must be established. But at the same time one must have a clear idea of the budget issued for operations to take place and the level of services to be offered. The way designs and services are offered creates an impact on the customer expectations and satisfactions. In simple words, Designing is a process aimed at meeting customer expectations by shaping activities, resources and processes. Lets explain how a customer will be satisfied by our hotel concept, focussing on The facilities, layout and ambience of the bedroom: A football fan books a room in our hotel as his favourite team Manchester United is playing against Chelsea FC next week in the nearby stadium and is accompanied by his wife and two football maniac kids and books the MAN-U Room in the hotel. As in his booking form he filled that he is a die-hard fan of MAN-U FC and his kids love playing football too. He arrived 2 days before the event and before his arrival his expectations were LAYOUT Big Spacious room, additional rooms for kids, perfectly designed as it is an exclusive sports hotel. FACILITIES Exclusive beddings and room accessories, big TV screen in room, games for kids, 24*7 assistance, entry to exclusive football facilities available. AMBIENCE Sporty, Energetic vibrant. How was he satisfied Layout He was offered a MAN-U theme en-suite on the football floor i.e. 2nd floor for  £80 +  £40(kids room). It was a big spacious room + adjoining kids room with the balcony facing towards the millennium stadium where his favourite team MAN-U will be competing after 2 days, so that he might catch a glimpse of his favourite stars or 2. Walls were exclusively designed keeping the MAN-U theme in mind, with his favourite stars wallpapers. Walls in the kids room were specially designed keeping the MAN-U FOR KIDS theme in mind, satisfied the guest with the layout of the room. Facilities Exclusive MAN-U beddings and accessories was the room designed with. MAN-U themed curtains, alarm clock, table lamp Games for kids was pre-installed in the room, big TV screens were installed in the room as well as in the bathroom so that our guest dont even miss a bit of football and guest even enjoyed exclusive MAN-U players interviews and past matches of MAN-U free of cost. He was even offered free entry to the all-exclusive football bar which included 2 free drinks and unlimited soft-drinks/juices for kids, where he can watch and support MAN-U play with a complete stadium like scenario, satisfied his expectations for the facilities being provided. AMBIENCE The time he entered the room he noticed that the room was completely designed on his favourite team, the floor looked like artificial grass and at both the ends of the wall an imaginary goal-post were present. When he called the room service for order the attendant came dressed like a footballer and the dishes in which food was served was completely based on the theme Football. Exclusive football bar was full with fans, supporting their favourite team and enjoying with other fans. The customer expectations of ambience were also met and he was satisfied. The Guest was satisfied with the services being provided and enjoyed his stay at THE ALL SPORTS HOTEL and promised to return in near future.

Friday, October 25, 2019

Children And Exercise Essay -- essays research papers

  Ã‚  Ã‚  Ã‚  Ã‚  In our society today one of the most difficult problems we are facing is the large numbers of obesity in our children. One of the major factors in that is this; our children have become less physically active. At an early age children start watching TV, learn how to operate a computer, and play video games. Having technological skills is now a necessity in all of our lives because everything has turned â€Å"computerized,† but the fact is that our children are relying on these types of entertainment rather than getting up and physically exercising to entertain them selves. This directly affects the large number of obese children in our country today because of the lack of physical exercise. It is not that we want our kids to look a certain way or to be better at sports than everyone else, but it is that we want our kids to be physically fit and to develop a healthy lifestyle. Physical exercise is not only for adults, it is for children as well, so we must understand the importance of our children exercising and the benefits from it. By doing that it will make an impact on that child for the rest of his/her life.   Ã‚  Ã‚  Ã‚  Ã‚  The reason we should be hesitant to allow our children to watch TV or play video games is that once a child does that, then he/she starts to enjoy it and wants to do it more and more. It becomes an event that they look forward to doing. Whether it is anxiously waiting on a certain TV show to come on, or hurrying in the house to get to their favorite video game. Children have become obsessed with these types of entertainment and have completely forgot about physical activities. Children do not look forward to getting some friends over to play football in the backyard as much anymore. They look forward to getting friends over to go inside and play a video game while eating chips and drinking cokes. Not only are they eating wrong foods, but also they are cutting out the physical activities to burn those calories off. Granted children should have restrictions on the types of food they eat, I am not taking anything away from that fact. But if a child is at least exerci sing then he/she will burn off a lot of those calories consumed in those unhealthy foods. So one question to ask is this; why are children becoming more dependent on technology rather than physical activity?   Ã‚  Ã‚  Ã‚  &nbs... ...verything you and your child need to know about   Ã‚  Ã‚  Ã‚  Ã‚  sports, Physical activity, and good health - a doctor’s guide for parents an coaches.   Ã‚  Ã‚  Ã‚  Ã‚  New York: Newmarket Press. Kalish, Susan. (1996). Your Child’s Fitness: Practical advice for parents. Champaigne:   Ã‚  Ã‚  Ã‚  Ã‚  Human Kinetics. Hinson, Curt. (1995). Fitness for Children. Champaign: Human Kinetics. Gabbard, C., LeBlanc, B., & Lowy, S. (1994). Physical Education for Children: Building   Ã‚  Ã‚  Ã‚  Ã‚  the Foundation, 2nd edition. New Jersey: Prentice-Hall, inc. American Heart Association. Exercise (Physical Activity) and Children. April 4th, 2005   Ã‚  Ã‚  Ã‚  Ã‚  < http://www.americanheart.org/presenter.jhtml?identifier=4596 > Diagnose-Me. Problems associated with lack of exercise. March 27th, 2005. April 4th, 2005. < http://www.diagnose-me.com/cond/C380381.html >. IDEA Fitness Journal. Exercise Decreases Risk of Depression in Kids. October 2004. April   Ã‚  Ã‚  Ã‚  Ã‚  4th, 2005. < http://pdfserve.galegroup.com/pdfserve/get_item/1/Scdbf1ew6   Ã‚  Ã‚  Ã‚  Ã‚  _1/SB806_01.pdf >.

Thursday, October 24, 2019

King of Hearts

The film â€Å"King of Hearts† directed by Philippe De Broca, is a quirky and humorous comment on the futility of war and a reflection on who is more insane, the inmates of an insane asylum or the sane people of the outside world where men kill men for seemingly no reason.This film is an anti-war allegory, set towards the end of World War I that depicts the madness of war. It clearly illustrates the futility of war through the use of humor. Charles Plumpick is a Scottish soldier who is sent to a French village to diffuse any active bombs that may have been planted by the retreating Germans. He finds the village populated by quirky villagers who are actually the inmates of a mental asylum.They crown him the â€Å"King of Hearts† and present him with a bride and readily accept him into their midst. War is raging outside the walls of the village where death and conflict abound. The pointlessness of the war outside is made more poignant by the fantasy world inside the villa ge walls. If insane people from a mental asylum can live harmoniously then the world at large definitely has no use for war.The viewer is left wondering as to who is more insane, the inmates of the asylum or the warring people of the world. In this story of the madness of war, the inmates of the asylum seem more rational. The film uses a lot of symbolism to depict this strange world we live in. Even the heroine of the film with whom the hero falls in love with is a tight-rope walker, symbolizing the tight-rope that people straddle in trying to make sense out of this seemingly sane world. Quirky humor is tellingly used to drive home the point.The people are amiably mad but not crazy. Although they happily live out their cloistered lives, they are not unaware of the grim reality of the outside world. At one point Plumpick does try to ride outside on horseback to look for help but the people call him back. Towards the end of the film the people, weary of the game they were playing in t rying to populate the village, discard the costumes they had donned and walk back into the asylum. This is a serious quiet scene where the asylum inmates reject the madness of the sane world. A chastened Plumpick also joins them, symbolically divesting himself of all paraphernalia and clothes that bind him to the sane world.The world outside is a world without reason where men killed men. The senseless killing of wartime is illustrated when the two warring sides kill off each other in the streets of the village. The opposing forces symbolically wipe out themselves. The fantasy world inside the walls of the village with its child-like innocence and wonder further drives home the unreasonableness of the outside world where hostile warring forces are unleashing terror. The many philosophical moments in the film force the viewer to think deeply of the possibility of a world where harmony and peace reigns.This story of the madness of war would hold true in all times and societies where i t may be based. The innocence and startling wisdom of the insane also make a viewer reflect on the pressing need for a saner and more peaceful world. The film is ultimately a profound film where gentle humor is effectively used to drive home the futility of war.References :The Internet Movie Database. Roi De Coeur, Le (1966). Retrieved on Aug 14, 2008, from http://www.imdb.com/title/tt0060908/

Wednesday, October 23, 2019

Unknown

B. Sc. (H) Computer Science 3-YEAR FULL TIME PROGRAMME RULES, REGULATIONS AND COURSES CONTENTS DEPARTMENT OF COMPUTER SCIENCE FACULTY OF MATHEMATICAL SCIENCES UNIVERSITY OF DELHI DELHI – 110007 2010 Semester Systems at the undergraduate level Course of Study: B. Sc. (H) Computer Semester – I CSHT-101 Programming Fundamentals CSHT-102 Discrete Structures Digital Electronics Calculus and Matrices CSHT-203 Data Structures Semester – II CSHT-204 computer Systems Architecture English Calculus and Geometry using C++ Semeser – III CSHT-305 Algorithms CSHT-306 Systems Programmin g CSHT-307 File Structures and Database Basic Probability and Statistics Semester – IV CSHT-408 Operating Systems CSHT-409 Data Communica tion and Computer CSHT-410 Software Engineering Real Analysis / Differential Equations Semester – V CSHT-511 Theory of Computations CSHT-512 Microproces sors CSHT-513 Internet Technologie s Optimization I/ Real Analysis/To be decided by the student Semeser – VI CSHT-614 Computer Graphics CSHT-615 Information Security CSHT-616 Electives Statistical Methodology/ DE/To be decided by the student Electives: 1. Software Testing 2. Artificial Intelligence 3. Network Programming and Administration 4. Data Mining 5. Combinatorial Optimizations Proposed Structure and Syllabi for B. Sc. (H) Computer Science – July 2010 Semester I Coding Title L–T–P Credits Total Marks 100 Pre-requisites CSHT-101 Programming Fundamentals using C++ Discrete Structures Digital Electronics Calculus and Matrices Software Lab based on 101 Lab based on Digital Electronics 5 – 0-0 5 – CSHT-102 ** ** CSHP-101 5 – 0-0 5 100 – 0-0-8 4 100 Semester II Coding Title L–T–P Credits Total Marks 100 100 Pre-requisites CSHT-203 CSHT-204 ** ** CSHP-202 CSHP-203 Data Structures Computer Systems Architecture EL – II (Language) Calculus and Geometry Software Lab based on 203 Lab based on 204 5 – 0-0 5 –0-0 5 5 101 0-0-8 0-0-4 4 2 100 50 Semester III Coding Title L–T–P Credits Total Marks 100 100 Pre-requisites CSHT-305 CSHT-306 Algorithms Systems Programming 5-0-0 5 – 0 -0 5 5 101,203 101, 203 CSHT-307 ** CSHP-304 CSHP-305 CSHP- 306 Database Systems Basic Statistics and Probability Software Lab based on 305 Software Lab based on 306 Software Lab based on 307 5–0-0 5 100 101, 203 0-0-4 0-0-4 0-0-4 2 2 2 50 50 50 Semester IV Coding Title L–T–P Credits Total Marks 100 100 Pre-requisites CSHT-408 CSHT-409 Operating Systems Data Communication and Computer Networks Software Engineering Real Analysis/ Differential Equations Software Lab based on 408 Software Lab based on 409 Software Lab based on 410 5 – 0-0 5 – 0-0 5 5 101, 203 CSHT-410 ** 5 – 0-0 5 100 101, 203 – CSHP-407 CSHP-408 CSHP-409 0-0-4 0-0-4 0-0-4 2 2 2 50 50 50 Semester V Coding Title L–T–P Credits Total Marks 100 100 100 Pre-requisites CSHT-511 CSHT-512 CSHT-513 ** CSHP-510 Theory of Computations Microprocessors Internet Technologies Optimization I/Real Analysis/* Software Lab based on 512 5 – 0– 0 5–0-0 5–0-0 5 5 5 01 204 409 0-0-4 2 50 CSHP-511 Lab based on 513 0-0-4 2 50 Semester VI Coding Title L–T–P Credits Total Marks 100 100 100 Pre-requisites CSHT-614 CSHT-615 CSHT-616 ** Computer Graphics Information Security Elective Differential Equations/ Statistical Methodology/* Software Lab based on 614 Softwar e Lab based on 615 Software Lab based on 616 5-0-0 5-0-0 5-0-0 5 5 5 – CSHP-612 CSHP-613 CSHP-614 0-0-4 0-0-4 0-0-4 2 2 2 50 50 50 †¢ To be decided by the student from any discipline * * Will be finalized after the syllabi by the respective departments (Electronics / Mathematics / Statistics / English) are made. CSHT-101 Programming Fundamentals (60 Lectures) Basic Computer Organization: Functional Units, basic I/O devices and storage devices; Representation of integers, real (fixed and floating point), characters (ASCII and Unicode); Basic operations of a programming environment. Problem Solving Approaches: Notion of an algorithm, problem solving using top-down design and decomposition into sub-problems, stepwise methodology of developing an algorithm, methodology of developing an algorithmic solution from a mathematical specification of the problem, use of recursion for problems with inductive characterization. Programming using C++: basic data types; constants and variables, arithmetic and logical expressions, assignment; input-output interface; control structures in conditionals, loops; procedural abstractions; strings and arrays; command line arguments; file handling; error handling. Introduction to the object-oriented programming paradigms; data abstraction and encapsulation — objects and classes; inheritance; polymorphism; Recommended Books: 1. B. A. Forouzan and R. F. Gilberg, Computer Science, A structured Approach using C++, Cengage Learning, 2004. 2. R. G. Dromey, How to solve it by Computer, Pearson Education 1982 3. E. Balaguruswamy, Object Oriented Programming with C++ , 4th Edition, Tata McGraw Hill 1997 4. G. J. Bronson, A First Book of C++ From Here to There, 3rd Edition, Cengage Learning 2005. 5. G. Seed, An Introduction to Object-Oriented Programming in C++, with applications in Computer Graphics Springer 2nd Edition 2001. CSHT 102 Discrete Structures (60 Lectures) Introduction: Sets – finite and Infinite sets, uncountably Infinite Sets; functions, relations, Properties of Binary Relations, Closure, Partial Ordering Relations; counting – Pigeonhole Principle, Permutation and Combination; Mathematical Induction, Principle of Inclusion and Exclusion. Growth of Functions: Asymptotic Notations, Summation formulas and properties, Bounding Summations, approximation by Integrals Recurrences: Recurrence Relations, generating functions, Linear Recurrence Relations with constant coefficients and their solution, Substitution Method, Recurrence Trees, Master Theorem Graph Theory: Basic Terminology, Models and Types, multigraphs and weighted graphs, Graph Representaion, Graph Isomorphism, Connectivity, Euler and Hamiltonian Paths and Circuits, Planar Graphs, Graph Coloring, Trees, Basic Terminology and properties of Trees, Introduction to Spanning Trees Prepositional Logic: Logical Connectives, Well-formed Formulas, Tautologies, Equivalences, Inference Theory Recommended Books: 1. C. L. Liu & Mahopatra, Elements of Discrete mathematics, 2nd Sub Edition 1985, Tata McGraw Hill 2. Rosen, Discrete Mathematics and Its Applications, Sixth Edition 2006 3. T. H. Coremen, C. E. Leiserson, R. L. Rivest, Introduction to algorithms, Prentice Hall on In dia (3rd edition 2009) 4. M. O. Albertson and J. P. Hutchinson, Discrete Mathematics with Algorithms 1988 Johnwiley Publication 5. J. L. Hein, Discrete Structures, Logic, and Computability, Jones and Bartlett Publishers, 3rd Edition, 2009 6. D. J. Hunter, Essentials of Discrete Mathematics, Jones and Bartlett Publishers, 2008 Digital Electronics In consultation with Department of Electronics) Number System and Codes: Decimal, Binary, Hexadecimal, Octal, BCD, Conversions, Complements (1’s and 2’s), Signed and Unsigned numbers, Addition and Substraction, Multiplication Gray and Hamming Codes Logic Gates and Boolean Algebra: Truth Tables, OR, AND, NOT, EXOR, Universal (NOR and NAND) Gates, Boolean Theorems, DeMorgan’s Theorems. Combinational Logic Analysis and Design: Standard representation of logic functions (SOP and POS), Minimization Techniques(Karnaugh Map Method: 4,5 variables). Multiplexers(2:1,4:1)) and Demultiplexers (1:2,4:1), Adder (half and full) and th eir use as substractor, Encoder (8-line-to-3-line) and Decoder (3-line-to-8-line) , Code Converters( Binary to BCD and vice versa). Sequential logic design: Latch, Flip flop, S-R FF , J-K FF, T and D type FFs, Clocked FFs, Registers, Counters (ripple, synchronous and asynchronous, ring, modulus), State Table, State Diagrams and Sequential Machines. A/D and D/A Converters: Successive Approximation ADC, R/2R Ladder DAC. Memories: General Memory Operation, ROM, RAM (Static and Dynamic), PROM, EPROM, EEPROM, EAROM. Suggested Books: 1. Digital Electronics, Principles and Applications, R. L. Tokheim, Tata McGraw-Hill. 2. Digital Principles, R. L. Tokheim, Schaum’s Outline Series, Tata McGraw-Hill. 3. Digital Systems, Principles and Applications, R. J. Tocci and N. S. Widner, Pearson Education Asia. 4. Digital Principles and Applications, A. P. Malvino and D. Leach, Tata McGraw Hill. 5. Digital Design, M. M. Mano, Pearson Education Asia. 6. Digital Fundamentals, T. L. Floyd, Pearson Education Asia. 7. Solved Problems in Digital Electronics, S. P. Bali, Sigma Series, Tata McGraw-Hill. 8. Digital Electronics, W. H. Gothmann, Prentice Hall of India. 9. Modern Digital Electronics, R. P. Jain, Tata McGraw-Hill. CSHT 203 Data Structures (60 Lectures) Introduction: Abstract Data Types, Arrays- Single and Multidimensional arrays, Sparse matrices. Linear structures: Stacks, Queues (linear as well as circular implementation), singly-, doubly-, and circularly- linked lists — Operations and applications. Recursion: Problem solving using recursion, run time stack in recursion, tail recursion, and its removal. Searching techniques: Linear search, Binary search and their efficiency, Skip Lists, Hashing. Tree Structures: Trees, Binary Trees, Complete Binary trees and almost complete Binary trees, binary search trees, Insertion, Deletion, Tree traversal algorithms, Threaded trees (recursive as well as Non recursive), applications of trees. Multiway trees – B-Trees and introduction to B+ Trees. Recommended Books: 1. A. Drozdek, Data Structures and algorithm in C++, 3rd Edition, Course Technology 2004. 2. Data Structures using C and C++, Tannenbaum, 2nd edition ** 1995 3. Data Structures and Algorithms in C++. Publication John Wiley 2003 4. S. Sahni, Data Structures, Algorithms and applications in C++, Publication Silicon Press 2004 5. B. R. Preiss, Data structures and algorithms with object oriented design patterns in C++, John Wiley and sons, 1998. CSHT 204 Computer System Architecture (60 Lectures) Basic Computer Organization and Design: Computer registers, bus system, instruction set, timing and control, instruction cycle, memory reference, input-output and interrupt, Interconnection Structures, Bus Interconnection design of basic computer. Central Processing Unit: Register organization, arithmetic and logical micro-operations, stack organization, micro programmed control. Instruction formats, addressing modes, instruction codes, machine language, assembly language, input output programming, RISC, CISC architectures, pipelining and parallel architecture. Memory Organization: Cache memory, Associative memory, mapping. Input-output Organization: Input / Output: External Devices, I/O Modules, Programmed I/O, Interrupt-Driven I/O, Direct Memory Access, I/O Channels Recommended Books: 1. M. Mano, Computer System Architecture, Prentice Hall of India Third edition / Pearson Education 1992. 2. A. J. Dos Reis, Assembly language and computer architecture using C++ and JAVA, Course Technology, 2004. 3. W. Stallings, Computer Organization and Architecture Desiguing for Performance 8th Edition 2009, Prentice Hall of India. CSHT 305 Algorithms (60 Lectures) Introduction: Basic Design and Analysis techniques of Algorithms, Correctness of Algorithm. Algorithm Design Techniques: Iterative techniques, Divide and Conquer, Dynamic Programming, Greedy Algorithms. Sorting and Searching Techniques: Elementary sorting techniques – Bubble Sort, Insertion Sort, Merge Sort, Advanced Sorting techniques – Heap Sort, Quick Sort, Sorting in Linear Time Bucket Sort, Radix Sort and Count Sort, Searching Techniques, Medians & Order Statistics, complexity analysis; Lower Bounding Techniques: Decision Trees Balanced Trees – Red-Black Trees Advanced Analysis Technique: Amortized analysis Graphs: Graph Algorithms – Breadth First Search, Depth First Search and its Applications, Minimum Spanning Trees. String Processing: String Matching, KMP Technique Recommended Books: 1. T. H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein Introduction to Algorithms, PHI, 3rd Edition 2009 2. Sarabasse & A. V. Gelder Computer Algorithm – Introduction to Design and Analysis, Publisher – Pearson 3rd Edition 1999 CSHT 306 Systems Programming (60 Lectures) Introduction: Introduction to Systems Software and machine architecture. Assemblers: Example of an assembly language, programming in assembly language, assembler features and functions, Load and Go assembler, One-pass and two pass assemblers, Macros and macro processors. Compilers: Compiler functions and features, phases of compilation, optimization. Loaders and Linkers: Basic Loader functions and features, Relocation, Program Linking, static and dynamic linking. Recommended Books: 1. A. J. Dos Reis, Assembly language and computer architecture using C++ and JAVA, Course Technology, 2004 2. D. M. Dhamdhere Systems Programming and Operating Systems, Tata McGraw-Hill Publishing Company, Ltd; Second Revised Edition 1996 3. L. Beck, D. Manjula, System Software, An Introduction to Systems Programming, Pearson, 3rd Edition 1996. 4. S. Chattopadhyay, Systems Software, PHI 2007. CSHT 307 Database Systems (60 Lectures) Introduction: Characteristics of database approach, data models, database system architecture and data independence. Entity Relationship(ER) Modeling: Entity types, relationships, constraints. Relation data model: Relational model concepts, relational constraints, relational algebra, SQL queries, programming using embedded SQL. Database design: mapping ER model to relational database, functional dependencies, normal forms. Transaction Processing: ACID properties, concurrency control, recovery. Web based databases: XML documents and databases. Books Recommended: 1. R. Elmasri, S. B. Navathe, Fundamentals of Database Systems 6th Edition, Pearson Education 2010. 2. R. Ramakrishanan, J. Gehrke, Database Management Systems 3rd Edition, McGraw-Hill 2002. 3. A. Silberschatz, H. F. Korth, S. Sudarshan, Database System Concepts 6th Edition, McGraw Hill 2010. CSHT 408 Operating Systems (60 Lectures) Introduction: Basic OS functions, resource abstraction, types of operating systems – multiprogramming systems, batch systems , time sharing systems; operating systems for personal computers & workstations, process control & real time systems. Operating System Organization: processor and user modes, kernels, system calls and system programs. Process Management: System view of the process and resources, process abstraction, process hierarchy, threads, threading issues, thread libraries; Process Scheduling, non-pre-emptive and pre-emptive scheduling algorithms; concurrent and processes, critical section, semaphores, methods for inter-process communication; deadlocks. Memory Management: Physical and virtual address space; memory allocation strategies -fixed and variable partitions, paging, segmentation, virtual memory File and I/O Management: Directory structure, file operations, file allocation methods, device management. Protection and Security: Policy mechanism, authentication, internal access authorization. Recommended Books: 1. A Silberschatz, P. B. Galvin, G. Gagne, Operating Systems Concepts, 8th Edition, John Wiley Publications 2008. 2. A. S. Tanenbaum, Modern Operating Systems, 3rd Edition, Pearson Education 2007. 3. G. Nutt, Operating Systems: A Modern Perspective, 2nd Edition Pearson Education 1997. 4. W. Stallings, Operating Systems, Internals & Design Principles 2008 5th Edition, Prentice Hall of India. 5. M. Milenkovic, Operating Systems- Concepts and design, Tata McGraw Hill 1992. CSHT 409 Data Communication and Computer Networks (60 Lectures) Introduction to Computer Networks: Network definition; network topologies; network classifications; network protocol; layered network architecture; overview of OSI reference model; overview of TCP/IP protocol suite. Data Communication Fundamentals and Techniques: Analog and digital signal; data-rate limits; digital to digital line encoding schemes; pulse code modulation; parallel and serial transmission; digital to analog modulation-; multiplexing techniques- FDM, TDM; transmission media. Networks Switching Techniques and Access mechanisms: Circuit switching; packet switching- connectionless datagram switching, connection-oriented virtual circuit switching; dial-up modems; digital subscriber line; cable TV for data transfer. Data Link Layer Functions and Protocol: Error detection and error correction techniques; data-link control- framing and flow control; error recovery protocols- stop and wait ARQ, goback-n ARQ; Point to Point Protocol on Internet. Multiple Access Protocol and Networks: CSMA/CD protocols; Ethernet LANS; connecting LAN and back-bone networks- repeaters, hubs, switches, bridges, router and gateways; Networks Layer Functions and Protocols: routing; routing algorithms; network layer protocol of Internet- IP protocol, Internet control protocols. Transport Layer Functions and Protocols: Transport services- error and flow control, Connection establishment and release- three way handshake; Overview of Application layer protocol: Overview of DNS protocol; overview of WWW & HTTP protocol. Recommended Books: 1. B. A. Forouzan: Data Communications and Networking, Fourth edition, THM Publishing Company Ltd 2007. 2. A. S. Tanenbaum: Computer Networks, Fourth edition, PHI Pvt. Ltd 2002. CSHT 410 Software Engineering (60 Lectures) Introduction: The Evolving Role of Software, Software Characteristics, Changing Nature of Software, Software Engineering as a Layered Technology, Software Process Framework, Framework and Umbrella Activities, Process Models, Capability Maturity Model Integration (CMMI). Requirement Analysis: Software Requirement Analysis, Initiating Requirement Engineering Process, Requirement Analysis and Modeling Techniques, Flow Oriented Modeling, Need for SRS, Characteristics and Components of SRS. Software Project Management: Estimation in Project Planning Process, Project Scheduling. Risk Management: Software Risks, Risk Identification, Risk Projection and Risk Refinement, RMMM Plan. Quality Management: Quality Concepts, Software Quality Assurance, Software Reviews, Metrics for Process and Projects. Design Engineering: Design Concepts, Architectural Design Elements, Software Architecture, Data Design at the Architectural Level and Component Level, Mapping of Data Flow into Software Architecture, Modeling Component Level Design. Testing Strategies & Tactics: Software Testing Fundamentals, Strategic Approach to Software Testing, Test Strategies for Conventional Software, Validation Testing, System Testing, BlackBox Testing, White-Box Testing and their type, Basis Path Testing. Recommended Books: 1. R. S. Pressman, Software Engineering: A Practitioner’s Approach (7th Edition), McGrawHill, 2009. 2. P. Jalote, An Integrated Approach to Software Engineering (2nd Edition), Narosa Publishing House, 2003. 3. K. K. Aggarwal and Y. Singh, Software Engineering (revised 2nd Edition), New Age International Publishers, 2008. 4. I. Sommerville, Software Engineering (8th edition), Addison Wesle, 2006. 5. D. Bell, Software Engineering for Students (4th Edition), Addison-Wesley, 2005. 6. R. Mall, Fundamentals of Software Engineering (2nd Edition), Prentice-Hall of India, 2004. CSHT 511 Theory of Computation (60 Lectures) Languages: Alphabets, string, language, Basic Operations on language, Concatenation, Kleene Star Finite Automata and Regular Languages: Regular Expressions, Transition Graphs, Deterministics and non-deterministic finite automata, NFA to DFA Conversion, Regular languages and their relationship with finite automata, Pumping lemma and closure properties of regular languages. Context free languages: Context free grammars, parse trees, ambiguities in grammars and languages, Pushdown automata (Deterministic and Non-deterministic), Pumping Lemma, Properties of context free languages, normal forms. Turing Macines and Models of Computations: RAM, Turing Machine as a model of computation, Universal Turing Machine, Language acceptability, decidability, halting problem, Recursively enumerable and recursive languages, unsolvability problems. Recommended Books: 1. Daniel I. A. Cohen, Introduction to computer theory – John Wiley (1996 2nd Edition). 2. Lewis & Papadimitriou, Elements of the theory of computation – II Edition PHI 1997. 3. Hoperoft, Aho, Ullman, Introduction to Automata theory, Language & Computation –3rd Edition 2006, Pearson Education. 4. P. Linz, An Introduction to Formal Language and Automata 4th edition Publication Jones Bartlett 2006 CSHT 512 Microprocessors (60 Lectures) Microprocessor architecture: Internal architecture, system bus architecture, memory and I/O interfaces. Microprocessor programming: Register Organization, instruction formats, assembly language programming. Interfacing: Memory address decoding, cache memory and cache controllers, I/O interface, keyboard, display, timer, interrupt controller, DMA controller, video controllers, communication interfaces. Recommended Books: 1. Barry B. Brey : The Intel Microprocessors : Architecture, Programming and Interfacing. Pearson Education, Sixth Edition. 2. Walter A Triebel, Avtar Singh; The 8088 and 8086 Microprocessors Programming, Interfacing, Software, Hardware, and Applications. PHI, Fourth Edition 2005. CSHT 513 Internet Technologies (60 Lectures) JavaScript: Data types, operators, functions, control structures, events and event handling. Java: Use of Objects, Array and ArrayList class , Designing classes, Inheritance, Input/Output, Exception Handling. JDBC: JDBC Fundamentals, Establishing Connectivity and working with connection interface, Working with statements, Creating and Executing SQL Statements, Working with Result Set Objects. JSP: Introduction to JavaServer Pages, HTTP and Servlet Basics, The Problem with Servlets, The Anatomy of a JSP Page, JSP Processing, JSP Application Design with MVC, Setting Up the JSP Environment, Implicit JSP Objects, Conditional Processing, Displaying Values, Using an expression to Set an Attribute, Declaring Variables and Methods, Error Handling and Debugging, Sharing Data Between JSP Pages, Requests, and Users, Database Access. Java Beans: Java Beans Fundamentals, JAR files, Introspection, Developing a simple Bean, Connecting to DB Recommended Books: 1. Web Enabled Commercial Application Development Using Html, Dhtml,javascript, Perl Cgi By Ivan Bayross, BPB Publications, 2009. 2. BIG Java Cay Horstmann, Wiley Publication , 3rd Edition. , 2009 3. Java 7 ,The Complete Reference, Herbert Schildt, 8th Edition, 2009. 4. The Complete Reference J2EE, TMH, Jim Keogh, 2002. 5. Java Server Pages, Hans Bergsten, Third Edition, O'Reilly Media December 2003. CSHT 614 Computer Graphics (60 Lectures) Introduction to Graphics systems, Basic elements of Computer graphics, Applications of computer graphics. Graphics Hardware: Architecture of Raster and Random scan display devices, input/output devices. Fundamental Techniques in Graphics: Raster scan line, circle and ellipse drawing, thick primitives, Polygon filling, line and polygon clipping algorithms, 2D and 3D Geometric Transformations, 2D and 3D Viewing Transformations (Projections- Parallel and Perspective), Vanishing points. Geometric Modeling: Representing curves & Surfaces. Visible Surface determination: Hidden surface elimination. Surface rendering: Illumination and shading models. Basic color models and Computer Animation. Books Recommended: 1. J. D. Foley, A. Van Dan, Feiner, Hughes Computer Graphics Principles & Practice 2nd edition Publication Addison Wesley 1990. 2. D. Hearn, Baker: Computer Graphics, Prentice Hall of India 2008. 3. D. F. Rogers Procedural Elements for Computer Graphics, McGraw Hill 1997. 4. D. F. Rogers, Adams Mathematical Elements for Computer Graphics, McGraw Hill 2nd edition 1989. CSHT 615 Information Security (60 Lectures) Introduction: Security, Attacks, Computer Criminals, Security Services, Security Mechanisms. Cryptography: Substitution ciphers, Transpositions Cipher, Confusion, diffusion, Symmetric, Asymmetric Encryption. DES Modes of DES. ,Uses of Encryption. ,Hash function,key exchange, digital signatures,Digital Certificates. Program Security: Secure programs,Non malicious Program errors, Malicious codes virus,trap doors,salami attacks, covert channels,Control against program Threats. Protection in OS: Memory and Address Protection, Access control, File Protection, User Authentication. Database Security: Requirements, Reliability, Integrity, Sensitive data, Inference, Multilevel Security. Security in Networks: Threats in Networks s Networks security Controls, detection systems, Secure e-mails firewalls, Intusion Administrating Security: Security Planning, Risk Analysis, Organisational Security Policy, Physical Security. Ethical issues in Security: Protecting Programs and data. Information and law. Recommended Books: 1. C. P. Pfleeger, S. L. Pfleeger; Security in Computing, Prentice Hall of India, 2006 2. W. Stallings ; Network Security Essentials: Applications and Standards, 4/E, 2010 CSHT 616 (i) Foundations of Software Testing Fundamentals of testing: Need for testing, process, The psychology of testing General testing principles, Fundamental test Testing throughout the software life cycle: Software development models, Test levels (Unit, Integration, System Acceptance testing), Test types (functional, non-functional, regression testing), Maintenance testing Static techniques: Static techniques and the test process, Review process (types of review, roles and responsibilities), Test design techniques: The Test Development Process, Categories of test design techniques, Specification-based or black-box techniques (Equivalence partitioning, Boundary value analysis, Decision table testing, State transition testing, Use case testing), Structure-based or white-box techniques (Statement testing and coverage, Decision testing and coverage, other structure-based techniques), Experience-based techniques, Choosing test techniques Test management: Test organization (test leader, tester), Test planning and estimation ( Test planning, Test planning activities, Exit criteria, Test estimation, Test approaches), Test progress monitoring and control (Test progress monitoring, test reporting, test control), Configuration management, Risk and testing (Project risks, Product risks), Incident management Web Application Testing Foundation: Basic test planning and testing methods for web applications, Introduction to gray-box testing and its application to testing web applications, Outline knowledge, methods and tools for testing web applications, Introduction to web testing tools and sources, Introduction to research tools on the Net. Tool support for testing: Types of test tool, Test tool classification, Tool support for management of testing and tests, static testing, test specification, test execution and logging, performance and monitoring, specific application areas, using other tools, Effective use of tools: potential benefits and risks Recommended Books: 1. 2. 3. 4. 5. Boris Beizer, â€Å"Software Testing Techniques†, Van Nostrand Reinhold Louise Tamres, â€Å"Software Testing†, Pearson Education Paul Jogerson, â€Å"Software Testing† CRC Press Roger R Pressman, â€Å"Software Engineering – A Practitioner’s approach† Mc Graw Hill Testing Applications on the Web, 2nd Edition by Nguyen, Michael Hackett, and Bob Johnson (Wiley, 2003 CSHT 616 (ii) ARTIFICIAL INTELLIGENCE Introduction: (60 Lectures) Introduction to Artificial Intelligence, Background and Applications, Turing Test and Rational Agent approaches to AI, Introduction to Intelligent Agents, their structure, be havior and environment. Problem Solving and Searching Techniques: Problem Characteristics, Production Systems, Control Strategies, Breadth First Search, Depth First Search, Hill climbing and its Variations, Heuristics Search Techniques: Best First Search, A* algorithm, Constraint Satisfaction Problem, Means-End Analysis, Introduction to Game Playing, Min-Max and Alpha-Beta pruning algorithms. Knowledge Representation: Introduction to First Order Predicate Logic, Resolution Principle, Unification, Semantic Nets, Conceptual Dependencies, Frames, and Scripts, Production Rules, Conceptual Graphs. Programming in Logic (PROLOG). Dealing with Uncertainty and Inconsistencies: Truth Maintenance System, Default Reasoning, Probabilistic Reasoning, Bayesian Probabilistic Inference, Possible World Representations. Understanding Natural Languages: Parsing Techniques, Context-Free and Transformational Grammars, Recursive and Augmented Transition Nets. BOOKS RECOMMENDED: 1. 2. DAN. W. Patterson, Introduction to A. I and Expert Systems – PHI, 2007. Russell & Norvig, Artificial Intelligence-A Modern Approach, LPE, Pearson Prentice Hall, 2nd edition, 2005. Rich & Knight, Artificial Intelligence – Tata McGraw Hill, 2nd edition, 1991. W. F. Clocksin and Mellish, Programming in PROLOG, Narosa Publishing House, 3rd edition, 2001. 5. Ivan Bratko, Prolog Programming for Artificial Intelligence, Addison-Wesley, Pearson Education, 3rd edition, 2000. 3. 4. CSHT 616 (iii) Network Programming and Administration Transport Layer Protocols: TCP, UDP, SCTP protocol. Socket Programming: Socket Introduction; TCP Sockets; TCP Client/Server Example ; signal handling; I/O multiplexing using sockets; Socket Options; UDP Sockets; UDP client server example; Address lookup using sockets. Network Applications: Remote logging; Email; WWWW and HTTP. LAN administration: Linux and TCP/IP networking: Network Management and Debugging. Books recommended: 1. W. Richard Stevens, Bill Fenner, Andrew M. Rudoff, Unix Network Programming, The sockets Networking API, Vol. 1, 3rd Edition, PHI. 2. B. A. Forouzan: Data Communications and Networking, Fourth edition, THM Publishing Company Ltd. 3. Nemeth Synder & Hein, Linux Administration Handbook, Pearson Education, 2nd Edition 4. R. Stevens, Unix Network Programming, PHI 2nd Edition CSHT 616 (iv) Data Mining Overview: Predictive and descriptive data mining techniques, supervised and unsupervised learning techniques, process of knowledge discovery in databases, pre-processing methods Data Mining Techniques: Association Rule Mining, classification and regression techniques, clustering, Scalability and data management issues in data mining algorithms, measures of interestingness Books Recommended: 1. Introduction to Data Mining, Pang-Ning Tan, Michael Steinbach, Vipin Kumar, Pearson Education. 2. Data Mining: A Tutorial Based Primer, Richard Roiger, Michael Geatz, Information; Pearson Education 2003. 3. Introduction to Data Mining with Case Studies, G. K. Gupta, PHI,2006. 4. Insight Into Data Mining: Theory And Practice, Soman K P,Diwakar Shyam, Ajay V, PHI, 2006 CSHT 616 (v) Combinatorial Optimization Introduction: Optimization problems, neighborhoods, local and global optima, convex sets and functions, simplex method, degeneracy; duality and dual algorithm, computational considerations for the simplex and dual simplex algorithms-Dantzig-Wolfe algorithms. Integer Linear Programming: Cutting plane algorithms, branch and bound technique. Graph Algorithms: Primal-Dual algorithm and its application to shortest path, Math-flow problems Dijkstra’s algorithm, Max-flow problem, matching problem, bipartite matching algorithm, non-bipartite matching algorithms. Books recommended: 1. C. H. Papadimitriou and K. Steiglitz, Combinatorial Optimization: Algorithms and complexity, Prentice-Hall of India, 2006 2. K. Lange, Optimization, Springer, 2004 3. Mokhtar S. Bazaraa, John J. Jarvis and Hanif D. Sherali, Linear Programming and Network Flows, John Wiley & Sons, 2004 4. H. A. Taha, Operations Research: An Introduction (8th Edition), Prentice Hall, 2006 Unknown Life is an experience that comes along with failure. Have you ever had the feeling like you haven't done your best at something or the feeling that you're disappointing the people you care about most? Well Eve had that feeling multiple times especially in middle school. In middle school Eve experience lots of failure; failure with friendships, relationships, and rejection. Failure to me is being unhappy with yourself and not doing what you believe in.My 8th grade year in middle school was a earning experience that came along with lots of failure. The beginning of 8th grade was the easiest part of middle school because there was no drama and less friends. As time went by I gained more friends and more pressure was put on my shoulders. I learned a lot about friendships and the meaning of them. Losing the friends that meant the most to me is one of my failures and something that was challenging. Friendships from the past have a huge impact on the friendships that Eve made today.In middl e school I was always open to meeting new people and starting new reined friendships with anyone but now I realize that I can't do that without getting to know the person first. During my years in high school Eve been more selective with how I choose my friends. Eve learned that in order to trust someone in full and to consider them a good friend, I would have to get to know that person first. Throughout my high school experience Eve gained many friends and learned to trust them. Whenever I had a problem, I would turn to them for advice. Their advice always helped me through my problems and anything else I needed.Throughout my experience in high school and middle school, Eve learned a lot about friendship and values. Eve been making better decisions for myself and how I have been choosing my friends. How I chose my friends will help me in college because Eve had experience with good friends and bad friends. My experience with friends at school is teaching me so much about life. Midd le school and high school has helped me with better decision making when choosing friends. I will use this decision making in college to help me build new friendships.