Data Communications and networking
Instructor: EL Zarki
Textbook: Data Communications and networking Fourth Edition Forouzan
Download Slides from here
Cryptography and Network Security
Instructor : Mahalingam Ramkumar
Overview :Computer networks are vital infrastructures needed for our day to day
lives. Our increasing reliance on computers and networks of computers
calls for robust measures to secure this infrastructure from malicious
intents.
Present day networks face continuous threats from hackers. An
understanding of the potential perils, and the strengths and
limitations of existing solutions to this problem is relevant not only
for students specializing in
security, but for every person for whom a computer is an indispensable
part of life.
Cryptography, once considered to be solely restricted to the realm of
spies and secret service agencies, is an increasingly important
building block for realizing computer and network security. An
understanding of the principles of cryptography is therefore essential
for comprehending approaches to realize secure networks.
The course will introduce private and public key encryption, key
distribution (Kerberos, public key infrastructure), cryptographic hash
functions, digital signatures, IP Security, Secure Socket Layer, WEP
(Wired Equivalent Privacy
for wireless networks), intrusion detection, Firewalls, denial of
service, spam, email viruses, phishing, and an overview of many attacks
that the Internet has experienced, especially in the last decade.
Text : Cryptography and Network
Security, Third Edition, by William Stallings, Prentice Hall,
2003
Additional References
- Cryptography, Theory and Practice, Douglas R. Stinson, 2nd Edition, CRC Press.
- A Course in Number Theory and Cryptography, Neal Koblitz
- Supplemental material that will be provided by the instructor in electronic form - usually in pdf format.
Lecture Slides (PDF), Introduction
Lecture Slides (PDF), Symmetric Cryptography
Lecture Slides (PDF), Asymmetric Cryptography
Lecture Slides (PDF), Key Distribution
Kerberos (PDF)
Lecture Slides (PDF), Network Security
Lecture Slides (PDF), PGP
Lecture Slides (PDF), PGP
Lecture Slides (PDF), Web Security
Lecture Slides (PDF), IPsec
Lecture Slides (PDF), Wily Hacker
Lecture Slides (PDF), Intrusion Detection
Lecture Slides (PDF), Firewalls
Lecture Slides (PDF), Wireless Security
Cryptography Review
Computer Networks
Textbook: Computer Networks by Andrew Tanenbaum, 4th
Course Slides
Chapter 1: Introduction (slides)
Chapter 2: Physical Layer (slides)
Chapter 3: Datalink Layer (slides)
Chapter 5: Network Layer (slides)
Text books required: Computer Networking: A top-down approach featuring the Internet, Kurose and Ross, 4th edition, Addison Wesley, 2008. (This year, 3rd edition is OK, too.)
Objectives:
Using the Internet as a vehicle, this course introduces the underlying concepts and principles of modern computer networks,
with emphasis on protocols, architectures, and implementation issues.
Students will first learn how to implement network applications (e.g.,
e-mail, ftp) using the existing network protocols and architectures.
Students then study how/why these protocols and architectures work by
using the layered organization of the Internet in a top-down fashion:
Application, Transport, Network, Data Link and Physical layers. The
course will also cover advance topics including quality-of-service (QoS), wireless networking.
Course Topics:
- Introduction (Ch 1)
- Application Layer (Ch 2)
- Transport Layer (Ch 3)
- Network Layer and Routing (Ch 4)
- Physical Layer (Ch 5)
- Wireless and Mobile Networks (Ch 6)
- QoS and Multimedia Networking (Ch 7)
Class Notes
Principles, Techniques, & Tools of Compiler Design
Instructor: R Sekhar
Textbook: Compilers: Principles, Techniques, and Tools, Second Edition by Aho, Sethi, and Ullman.
Download Slides from here
Lecture Notes:
- Course Introduction PDF
- Overview of Compiler PDF
- Lexical Analysis PDF
- Add'l Lexical Analysis Notes PDF
- Context-Free Grammars and Parsing PDF
- Syntax-directed translation PDF
- Types PDF
- Type Checking PDF TXT
- Evaluation and Runtime Environments PDF
- Exceptions, memory management PDF
- Intermediate code generation PDF
- Optimization and Program analysis PDF
- Machine code generation PDF
- Review/Summary PDF
COMPUTER CRYPTOGRAPHY
Lecture Slides
Here are links to the PDF, PowerPoint for the lecture slides.
Title
|
PDF
|
PowerPoint
|
Josh Benaloh: Practical Aspects of Modern Cryptography
| ||
John Manferdelli: Symmetric Key Ciphers and Hashes
| ||
Josh Benaloh: Public Key Ciphers
| ||
Homework 2 Solutions
| ||
Brian LaMacchia: Protocols, Part 1
| ||
Homework 3 Solutions
| ||
Brian LaMacchia: Protocols, Part 2
| ||
Homework 4 Solutions
| ||
John Manferdelli: Analysis of Block Ciphers
| ||
Homework 5 Solutions
| ||
John Manferdelli: AES and Attacks on Cryptographic Hashes
| ||
Homework 6 Solutions
| ||
Brian LaMacchia: Certificates, Trust & PKI
| ||
Homework 7 Solutions
| ||
Josh Benaloh: Public Key Crypto
| ||
Homework 8 Solutions
| ||
John Manferdelli: Digital Rights Management
| ||
Brian LaMacchia: The Politics of Crypto
| ||
Josh Benaloh: Attacks
|
C PROGRAMMING INSTRUCTOR: Dr. KHAMIS OMAR
SLIDES :
- Introduction to C Programming
- Structured Program Development
- Introduction to Java Applications and Applets
- Java Multimedia: Images, Animation, Audio and Video
Computer Graphics
Instructor: R.J Renka
Textbook:introduction to Computer Graphics
Download slides from here
Description :
This course teaches the fundamental mathematics, algorithms, techniques, and programming skills for 2D and 3D graphics. Students will be well prepared to take any of our advanced courses in computer graphics.
This is not a course in the use of graphics software such as Photoshop or Maya. Rather, the course will teach the underpinnings of those programs. Although students will use OpenGL in this course, the focus will be on the underlying mechanisms of OpenGL rather than its sophisticated use.
SLIDES:
Introduction | |||
1 | 9/7 | Raster Graphics and Color | |
2 | 9/9 | Image Processing and Sampling | Warmup due |
3 | 9/14 | Image Warping, Compositing, and Morphing | |
4 | 9/16 | 3D Rendering | |
5 | 9/21 | Ray Casting | |
6 | 9/23 | Local Illumination | Image Processing due |
7 | 9/28 | Transformations | |
8 | 9/30 | Viewing, 3D Graphics Pipeline | |
9 | 10/5 | Clipping | |
10 | 10/7 | Scan Conversion: Lines, Circles, Fractals | Raytracer due |
COMPUTER ARCHITECTURE Instructor: Professor Sin-Min Lee
Lecture
|
Slides
|
Introduction
| |
Discussion: Binary-Decimal Conversion
| |
Number Systems and Boolean Algebra
| |
Boolean Algebra and Karnaugh Maps
| |
Karnaugh Maps
| |
LogicWorks Tutorial
| |
K-Maps and Circuit Analysis
| |
Circuit Design [updated Feb 17]
| |
Review
| |
Decoders
| |
Multiplexers
| |
Review
| |
Addition and Multiplication
| |
Subtraction
| |
Midterm 1 Review
| |
ALU
| |
Review
| |
Latches
| |
Flip Flops
| |
Review
| |
Sequential Circuit Analysis
| |
Sequential Circuit Design
| |
Review
| |
Counters
| |
Registers
| |
Review
| |
RAM: Static Memory
| |
Dynamic Memory, ROMs, and PLAs
| |
Review
| |
Midterm 2 Review
| |
Midterm 2 (in class)
| |
Datapath
| |
Review
| |
Instruction Set Architecture
| |
Instruction Encoding
| |
Review
| |
Control Unit Introduction and Design
| |
Microprogramming
| |
Review
| |
Other ISAs
| |
Hamming Codes
| |
Computer Communication Networks
- Slide Set 1 (Introduction):
In PDF | In PDF (6 per-page) | In Powerpoint
- Slide Set 2 (Application Layer):
In PDF | In PDF (6 per-page) | In Powerpoint
- Slide Set 3 (Transport Layer, Part I):
In PDF | In PDF (6 per-page) | In Powerpoint
- Slide Set 4 (Transport Layer, Part II (TCP)):
In PDF | In PDF (6 per-page) | In Powerpoint
- Slide Set 5a (Network Layer: Internetworking, IP):
In PDF | In PDF (6 per-page) | In Powerpoint
- Slide Set 5b (Network Layer: Routing):
In PDF | In PDF (6 per-page) | In Powerpoint
- Slide Set 6a (Modeling: Probability):
In PDF | In PDF (6 per-page) | In Powerpoint
- Slide Set 6b (Modeling: Inside a Router):
In PDF | In PDF (6 per-page) | In Powerpoint
- Slide Set 7a (Data Link Layer):
In PDF | In PDF (6 per-page) | In Powerpoint
- Slide Set 7b (Data Link Layer: II):
In PDF | In PDF (6 per-page) | In Powerpoint
- Slide Set 7c (Data Link Layer: III):
In PDF| In PDF (6 per-page) | In Powerpoint
COMPUTER LITERACY Instructor: Elaine Rich
Introduction
· Python
· Notes
· Algorithms
· Part I
· Part II
· Networks
· Robots
COMPUTER ARCHITECTURE AND ENGINEERING
Instructor: Prof John KubiatowiczExpanded Description:
This course will give you an in-depth understanding of the inner-workings of modern digital computer systems and tradeoffs present at the hardware-software interface. You will get an understanding of the design process in the context of a complex hardware system and practical experience with computer-aided design tools. Topics include: Instruction set design, computer arithmetic, controller and datapath design, memory systems, input-output systems, networks interrupts and exceptions, pipelining, performance and cost analysis, computer architecture history, and a survey of advanced architectures. There will be a computer design project requiring 100+ hours. We will implement a major subset of the MIPS architecture to the gate level.book: We will be using the second edition of Patterson and Hennessy's Computer Organization and Design book.
The "MIPS RISC Architecture" book will be essential for the project.
"Computer Architecture: A Quantitative Approach" is an excellent reference, but is not required for the course.
Lec
No. |
Lecture Topic
Click on lecture for WEB cast |
Notes
| |||
1
|
Introduction, 5 components of a computer
| ||||
2
|
Review of MIPS ISA, Performance
| ||||
3
|
Logic Design, Technology & Delay Modeling
| ||||
First Sections
| |||||
Prerequisite Quiz:
In class | |||||
4
|
Performance and the Design process
| ||||
5
|
High-Level design and FPGA
| ||||
6
|
Verilog (finished), Multiplication
| ||||
7
|
[Homework quiz #2 at beginning of lecture]
Single-Cycle Processor
| ||||
8
|
Instruction Decode/Multicycle Processor
| ||||
9
|
Multiprogramming/Exceptions
| ||||
10
|
Exceptions (continued), Pipelining
| ||||
11
|
[Homework quiz #3 at beginning of lecture]
Pipelining (Continued)
| ||||
12
|
Pipelining Control
| ||||
13
|
Static Scheduling and compiler optimizations
| ||||
14
|
Compiler Optimizations (continued), Dynamic Scheduling
| ||||
15
|
Tomasulo Scheduling
| ||||
16
|
[Homework quiz #4 at beginning of lecture]
Dynamic Scheduling (Con't), Speculation | ||||
17
|
Speculation (Con't)
| ||||
18
|
Speculation (Finished), Memory Technology
| ||||
19
|
Memory Technology
| ||||
20
|
Caches
| ||||
21
|
Virtual Memory
| ||||
22
|
Buses and I/O
| ||||
23
|
[Homework quiz #5 at beginning of lecture]
I/O and Queueing theory | ||||
24
|
Queueing Theory, I/O arrays
| ||||
25
|
Low Power Design, Intel Processors
| ||||
26
|
Quantum computing + Wrap-up Lecture: Look at all you have learned!
| ||||
Computer and Programming
Lecture Slide (By Dr. Anan Pholperm )
- Lecture 1 Introduction to Computer (powerpoint2000)
- Lecture 2 Basic Pascal Element (powerpoint2000)
- Lecture 3 Flow Chart - If then Else (powerpoint2000)
- Lecture 4 While- Do (powerpoint2000)
- Lecture 5 Repeat- For (powerpoint2000)
- Lecture 6 Data Type (powerpoint2000)
- Lecture 7 Subroutine - Procedure (powerpoint2000)
- Lecture 8 Function (powerpoint2000)
- Lecture 9 Array (powerpoint2000)
- Lecture 10 Multi-dimension Array (powerpoint2000)
Computational Geometry
Introduction and ObjectiveIntroduction to data structures, algorithms, and analysis techniques for computational problems that involve geometry. Line segment intersection. Polygon triangulation and visibility problems. Linear programming. Range queries. Point location. Arrangements and duality. Voronoi diagrams and Delaunay triangulations. Convex hulls. Other selected topics. Programming assignments..Textbook
M. de Berg, M. van Kreveld, M. Overmars and O. Schwarzkopf. Computational Geometry (2nd edition). Springer-Verlag, 2000. ISBN: 3-540-65620-0.The book is accompanied by a website http://www.cs.uu.nl/geobook/ which provides additional material such as pointers to software and research papers. For general background on algorithms, you can consult the following.
J. Kleinberg and E. Tardos, Algorithm Design, Addison-Wesley, 2005; ISBN 0-321- 29535-8.Slides download here.
T. H. Cormen, C. E. Leiserson, R. L. Rivest and C. Stein, Introduction to Algorithms, Second Edition MIT Press, 2001; ISBN 0-262-03293-7
Date | Topic |
---|---|
Jan 12 | Geometric Basics
Convex Hulls |
Jan 14 | Line Segment Intersection |
Jan 19 | Doubly-Connected Edge List Overlay of Two Subdivisions |
Jan 21 | The Art Gallery Problem
(Graphs, BFS, DFS ) |
Jan 26 | Triangulation |
Jan 28 | Half-Plane Intersection |
Mar 23 | Duality |
Mar 25 | Arrangement of Lines |
Computational Complexity
Instructor : Andrej Bogdanov
Textbook : Computational complexity A conceptual perspective. Oded Goldreich
Download slides from here
Topic | reading |
Computational problems. P and NP. Hierarchy theorems. | [pdf] |
Circuits. | [pdf] |
Constant depth circuits. Lower bounds. | [pdf] |
Logarithmic space. Barrington and Immerman-Szelepcsényi theorems. | [pdf] |
Randomized computation. | [pdf] |
Pseudorandomness. The Nisan-Wigderson generator. | [pdf] |
Random walks and eigenvalues. | [pdf] |
Expanders. Undirected connectivity in log-space. | [pdf] |
The polynomial-time hierarchy. Oracles. | [pdf] |
Counting problems. Toda's theorem. | [pdf] |
Interactive proofs. Guest lecture by Shengyu Zhang | [pdf] |
Probabilistically checkable proofs. | [pdf] |
Proof of the PCP theorem. | [pdf] |
COMBINATORIAL AND GRAPH THEORY
INSTRUCTOR: Dr. CAR LEE
Course Information
Assignments
Other Resources
- Starting to Count
- Continuing to Count -- Binomial Coefficients
- Multinomial Coefficients
- Graph Theory with Applications
- Sperner, Brouwer, and Nash
- Graph Theory in the Information Age
- Hex (Temporary)
- Hex (Temporary)
- Decoding the Hamming Code by Richard Ehrenborg
Interesting Websites
- GeoGebra
- Graph Theory, by Bondy and Murty
- The On-Line Encyclopedia of Integer Sequences
- Small Simple Graphs
- WolframAlpha
Community Police
To
find your notes quickly please see the contents on the right hand side
of this page which is alphabetically arranged and right click on it.
After clicking immediately you find all the notes ppt / pdf / html /
video of your searching subjects.
It
is better to search your subject notes by clicking on search button
which is present at middle of right side of this web page. Then enter
your subject and press enter key then you can find all of your
lectures notes and click on it.
Thank you for visiting our site.
Click here to download the files:-
Chapter 1
Chapter 2
Chapter 3
Chapter 4
Chapter 6
Chapter 7
Chapter 8
Chapter 9
Chapter 10
Chapter 11
Chapter 12
Chapter 13
Chapter 14
Chapter 15
Chapter 16
Chapter 20
Community Police
To
find your notes quickly please see the contents on the right hand side
of this page which is alphabetically arranged and right click on it.
After clicking immediately you find all the notes ppt / pdf / html /
video of your searching subjects.
It
is better to search your subject notes by clicking on search button
which is present at middle of right side of this web page. Then enter
your subject and press enter key then you can find all of your
lectures notes and click on it.
Thank you for visiting our site.
Click here to download the files:-
Chapter 1
Chapter 2
Chapter 3
Chapter 4
Chapter 6
Chapter 7
Chapter 8
Chapter 9
Chapter 10
Chapter 11
Chapter 12
Chapter 13
Chapter 14
Chapter 15
Chapter 16
Chapter 20
Computer System Security
Instructor: R . Sekar
Textbook: Matt Bishop, Introduction to Computer Security, Addison Wesley
Download Slides from here
Textbook: Matt Bishop, Introduction to Computer Security, Addison Wesley
Download Slides from here
Description/Reading
|
Slides
|
Notes
|
Introduction: Overview of Security Threats Emerging threats and research directions | ||
Cryptography Basics Reading: Who is guarding the guardians, or how secure are the CAs | ||
Identification and Authentication Reading: Lamport's One-Time Password Scheme Reading: How anonymous hacked into a security firm | ||
Discretionary Access Control Reading: Revisiting "Setuid Demystified" | ||
Capabilities, Mandatory Access Control Reading: The Confused Deputy (or why capabilities might have been invented) | ||
DTE and SELinux. POSIX Capabilities. Commercial Security Policies Reading: Confining Root Programs with Domain and Type Enforcement | ||
OS Security, UNIX Security, Database Security Reading: Linux capabilities (alternative link) Reading: SELinux | ||
Principles and practices for secure system design Reading: The Protection of Information in Computer Systems | ||
Background: Runtime memory organization | TXT | |
Stack-smashing, Heap overflows and Format string attacks Reading: Smashing the stack for fun and profit | ||
Integer overflows Memory corruption defenses: guarding, ASR, DSR, ... Reading: Memory exploitation defenses in Windows Optional Reading: (Not so) Recent advances in exploiting buffer overruns Optional Reading: Basic Integer Overflows | ||
Memory-error detection: Bounds-checking, etc. | ||
Injection Attacks, Taint-tracking Taint-enhanced policies Reading: Taint-Enhanced Policy Enforcement | ||
Race conditions and other Software vulnerabilities Reading: Top 25 Software Vulnerabilities | ||
Malware Evasion, obfuscation, Software tamper-resistance A very short article from 2011 on specific malware trends. | ||
Securing Untrusted Code: System-call interception, Inline-reference monitoring | ||
Securing Untrusted Code: Inline-reference monitoring, Software-based fault isolation, Control-flow integrity | ||
Binary analysis and transformation: Disassembly, static binary rewriting Dynamic translation | ||
Untrusted Code: Java, Javascript and Web security | ||
Untrusted Code: Virtual Machines | ||
Intrusion detection overview Host-based/Application layer Intrusion detection Intrusion detection models Reading: A sense of self for Unix processes | ||
Vulnerability analysis: Program analysis overview, Model-checking Abstract interpretation | ||
Course summary |
Computer Networks and Internet
Instructor: Hossam S. Hassanein
Textbook: Computer Networking: A Top-Down Approach, 6th edition. Addison-Wesley.
Download Slides from here
- Chapter 1: Computer Networks and the Internet
- Chapter 2: Application Layer
- Chapter 3: Transport Layer
- Chapter 4: The Network Layer
- Chapter 5: The Link Layer and Local Area Networks
- Chapter 6: Wireless and Mobile Networks
NLP Natural Language Processing
Instructor: Rada MihalceaTextbook: Speech and Language Processing
Download slides from here
Lecture |
Course overview [ppt] |
Short Perl tutorial (I) [ppt] |
Short Perl tutorial (II) [ppt] |
Linguistics Essentials [ppt] |
Language Models [ppt] |
Language Models [ppt] |
Language Models [ppt] |
Collocations [ppt] |
Morphological Processing [ppt] |
Word classes and part of speech tagging ppt] |
Word classes and part of speech tagging ppt] |
HMM Tagging. Viterbi Algorithm. [ppt] |
Context Free Grammars [ppt] |
Parsing with Context Free Grammars [ppt] |
Probabilistic Parsing [ppt] |
Word Sense Disambiguation (1) [ppt] |
Word Sense Disambiguation (2) [ppt] |
Word Sense Disambiguation (3) [ppt] |
Text semantic similarity [ppt] |
Special topics: Subjectivity and sentiment analysis [ppt] |
Special topics: Subjectivity and sentiment analysis [ppt] |
Special topics. Logic form transformation [ppt] |
Information Retrival
IInstructor: Rada Mihalcea
Textbook:Introduction to Information Retrival ,Christopher D. Manning, Prabhakar Raghavan and Hinrich Schutze
Download slides from here
Textbook:Introduction to Information Retrival ,Christopher D. Manning, Prabhakar Raghavan and Hinrich Schutze
Download slides from here
Lecture |
Course overview (ppt) |
Introduction to IR models and methods [ppt] |
Short Perl tutorial [ppt] |
Short Perl tutorial [ppt] |
Short Perl tutorial [ppt] Text processing [ppt] |
Text processing [ppt] |
Text properties [ppt] |
Web Spidering [ppt] Practical problems in web spidering [ppt] |
Boolean model and extensions [ppt] |
Vector space model [ppt] |
Vector space model [ppt] |
Term weighting schemes |
Alternative IR models. [ppt] |
IR evaluation and IR test collections. [ppt] |
Relevance feedback. [ppt] |
Relevance feedback. [ppt] |
Text classification [ppt] |
Text classification [ppt] |
Link analysis. HITS. PageRank. [ppt] |
Topic Sensitive PageRank |
Question Answering [ppt] |
Question Answering [ppt] |
Cross language Information Retrieval (ppt) |
Keyword Extraction (ppt) |
Chemical Principles I
CHEM 110 (GN) Chemical Principles I (3) Basic concepts and quantitative relations.
CHEM
110 is the first semester of a two-semester, comprehensive general
chemistry course that introduces the students to the basic principles of
chemistry with an emphasis on the relationships between the microscopic
structure and macroscopic properties of matter. Principles are
illustrated with a wide variety of examples from the sciences,
engineering and technology, and from everyday life. The course covers
the following topics: matter and measurement, molecules and molecular
compounds, ions and ionic compounds, chemical reaction types, atomic and
molecular weights, the mole, quantitative calculations with chemical
reactions, the periodic table, nomenclature, aqueous reactions and
solution stoichiometry, thermochemical, electronic structure of atoms,
periodic properties of the elements, chemical bonding, molecular
geometry, the gaseous, liquid, and solid states of matter, properties of
solutions, some basic aspects of chemical equilibrium, and applications
to the real world including environmental chemistry. GN credit for
CHEM 110 requires that CHEM 111 also be completed.
lectures :
Fall 2009 :
Lecture
notes for Dr. Bojan's sections of Chemistry 110 will be posted here for
viewing or downloading as each set of lecture notes becomes available.
To view a set of notes from a campus computer lab simply double click
on any one of the underlined lectures. From other computers see the
notes provided below.
NOTE: these are not complete notes. Sections are intentionally left blank.
Lecture #1- Monday Aug, 24
Introduction and Chapter 1
Lecture #2 - Weds. Aug. 26
Structure of the Atom and
Lecture Problem Instructions
Format for Lecture Problems
Lecture 3 - Aug. 28
Spectroscopy and Intro to Thermodynamics
Lecture 4 Aug. 31
Energy Light and Matter: Spectroscopy
Chapter 6 part 1
Bohr Equation
Lecture 5 and 6- Sept. 1 and 3
Chapter 6 part 2
Electronic Structure of Atoms (Electron Configurations)
Lecture #7- Sept. 9
Chapter 7
Periodic Properties of atoms
Lecture #8 to 11- Sept. 11, 14, 16 and 18
Chapter 8
Ionic Bonding, Electronegativity and Lewis Structures
Lecture 12 Sept 22 Review
Lecture 13 and 14- Sept. 23 and 25
Chapt. 3 Sect. 3-5
Composition of molecules and Intro to Organic
Lecture 15 Sept. 28
Organic Molecules
Extra notes on fats
Lecture 16 Sept. 30
Chapter 9 part 1 Molecular Geometry
Lecture 17 Oct. 2 Chapter 9 part 2
Molecular Geometry II: Polarity
Lecture 18 Oct. 5
Hybrid Orbitals and Bonding
Lecture #19 - Oct. 7
Intermolecular Forces 8am
Intermolecular Forces 9:05am
Lecture #20 - Oct. 9 Intermolecular Forces
Lecture 21 Oct 12 Review for Exam 2
Lectures 22 & 23, Oct. 15 & 17
Chapter 10 part 1
Gases part 2
Lecture # 24- Oct. 19
Non-Ideal Gases
Lecture #25 - Oct. 21 Chapter 18, 1-4
Atmospheric Chemistry
Lecture #26, 27- Oct. 23 and 26
Chapter 11 Liquids
Lecture #29 and 30- Oct. 28 and 30
Solutions I Chapter 4 electrolytes
Lecture #31 and 32 - Nov. 2, 4 and 6
Solutions II
Solution Applications
Lecture #33 - Nov. 10 Exam 3 Review
Lecture #34 -37 - Nov. 11, 13, 16, and 18
Chapter 3 and 4 Reactions and Stoichiometry
Template for Problem Solving
Chapters 4 and 10 Reactions and stoichiometry
Lecture #37, 38- Nov. 18 and 20
Chapter 5 Thermodynamics
Lecture # 39- Nov. 30
Chapter 5 Thermochemistry (Enthalpy)
Sample Problem 1 if time allows
Sample Problem 2
Lecture # 40-42: Dec. 2 and 4 Equilibrium Part 1
Derivation of Kp/Kc relationship
Lecture #28 - Dec. 7 and 9 Equilibrium II
Concept Final
Read the instructions and try to have this done before the final Chem 110 lecture.
Calculus Lecture Notes
To view the following notes, you must have Adobe Reader .
Mac, DOS, Windows and SUN versions are available for download from Adobe
Gold Notes
- Mathematical Sign Language
- Induction
- Polynomials and Rational Functions
- The Mean Value Theorem for Rational Functions
- Approximation of Rational Functions
- Solving Polynomial Equations
- Asymptotic Behaviour of Rational Functions
- Taylor Approximation
- Complex Numbers
- Gold Problems
Redbook Notes
- Review Notes
- Functions
- Limits and Continuity
- Techniques of Differentiation
- Related Rates
- Rolle's Theorem, the Mean Value Theorem, and L'Hopital's Rule
- Graph Sketching
- Estimating Functions
- Applications of Maxima and Minima
- Newton's Method
- The Definite Integral
- Techniques of Integration
- Applications of the Definite Integral
- Numerical Integration
- Taylor's Theorem
- Differential Equations
CHEM 110 (GN) Chemical Principles I (3) Basic concepts and quantitative relations.
CHEM 110 is the first semester of a two-semester, comprehensive general chemistry course that introduces the students to the basic principles of chemistry with an emphasis on the relationships between the microscopic structure and macroscopic properties of matter. Principles are illustrated with a wide variety of examples from the sciences, engineering and technology, and from everyday life. The course covers the following topics: matter and measurement, molecules and molecular compounds, ions and ionic compounds, chemical reaction types, atomic and molecular weights, the mole, quantitative calculations with chemical reactions, the periodic table, nomenclature, aqueous reactions and solution stoichiometry, thermochemical, electronic structure of atoms, periodic properties of the elements, chemical bonding, molecular geometry, the gaseous, liquid, and solid states of matter, properties of solutions, some basic aspects of chemical equilibrium, and applications to the real world including environmental chemistry. GN credit for CHEM 110 requires that CHEM 111 also be completed.
lectures :
Fall 2009 :
Lecture notes for Dr. Bojan's sections of Chemistry 110 will be posted here for viewing or downloading as each set of lecture notes becomes available. To view a set of notes from a campus computer lab simply double click on any one of the underlined lectures. From other computers see the notes provided below.
NOTE: these are not complete notes. Sections are intentionally left blank.
Lecture #1- Monday Aug, 24
Introduction and Chapter 1 |
Lecture #2 - Weds. Aug. 26
Structure of the Atom and Lecture Problem Instructions Format for Lecture Problems |
Lecture 3 - Aug. 28
Spectroscopy and Intro to Thermodynamics
Lecture 4 Aug. 31
Energy Light and Matter: Spectroscopy Chapter 6 part 1 Bohr Equation |
Lecture 5 and 6- Sept. 1 and 3
Chapter 6 part 2 Electronic Structure of Atoms (Electron Configurations) |
Lecture #7- Sept. 9
Chapter 7 Periodic Properties of atoms |
Lecture #8 to 11- Sept. 11, 14, 16 and 18
Chapter 8 Ionic Bonding, Electronegativity and Lewis Structures |
Lecture 12 Sept 22 Review
|
Lecture 13 and 14- Sept. 23 and 25
Chapt. 3 Sect. 3-5 Composition of molecules and Intro to Organic |
Lecture 15 Sept. 28
Organic Molecules Extra notes on fats |
Lecture 16 Sept. 30
Chapter 9 part 1 Molecular Geometry |
Lecture 17 Oct. 2 Chapter 9 part 2
Molecular Geometry II: Polarity |
Lecture 18 Oct. 5
Hybrid Orbitals and Bonding |
Lecture #19 - Oct. 7
Intermolecular Forces 8am Intermolecular Forces 9:05am |
Lecture #20 - Oct. 9 Intermolecular Forces
|
Lecture 21 Oct 12 Review for Exam 2
|
Lectures 22 & 23, Oct. 15 & 17
Chapter 10 part 1 Gases part 2 |
Lecture # 24- Oct. 19
Non-Ideal Gases |
Lecture #25 - Oct. 21 Chapter 18, 1-4
Atmospheric Chemistry |
Lecture #26, 27- Oct. 23 and 26
Chapter 11 Liquids |
Lecture #29 and 30- Oct. 28 and 30
Solutions I Chapter 4 electrolytes |
Lecture #31 and 32 - Nov. 2, 4 and 6
Solutions II Solution Applications |
Lecture #33 - Nov. 10 Exam 3 Review
|
Lecture #34 -37 - Nov. 11, 13, 16, and 18
Chapter 3 and 4 Reactions and Stoichiometry Template for Problem Solving Chapters 4 and 10 Reactions and stoichiometry |
Lecture #37, 38- Nov. 18 and 20
Chapter 5 Thermodynamics |
Lecture # 39- Nov. 30
Chapter 5 Thermochemistry (Enthalpy) Sample Problem 1 if time allows Sample Problem 2 |
Lecture # 40-42: Dec. 2 and 4 Equilibrium Part 1
Derivation of Kp/Kc relationship |
Lecture #28 - Dec. 7 and 9 Equilibrium II
|
Concept Final
Read the instructions and try to have this done before the final Chem 110 lecture. |
Mac, DOS, Windows and SUN versions are available for download from Adobe
Gold Notes
- Mathematical Sign Language
- Induction
- Polynomials and Rational Functions
- The Mean Value Theorem for Rational Functions
- Approximation of Rational Functions
- Solving Polynomial Equations
- Asymptotic Behaviour of Rational Functions
- Taylor Approximation
- Complex Numbers
- Gold Problems
- Review Notes
- Functions
- Limits and Continuity
- Techniques of Differentiation
- Related Rates
- Rolle's Theorem, the Mean Value Theorem, and L'Hopital's Rule
- Graph Sketching
- Estimating Functions
- Applications of Maxima and Minima
- Newton's Method
- The Definite Integral
- Techniques of Integration
- Applications of the Definite Integral
- Numerical Integration
- Taylor's Theorem
- Differential Equations
Calculus Class Notes
Copies of the classnotes are on the internet in PDF and Postscript
formats as given below. I have included versions with both color figures
and black and white figures (the "black and white" files are roughly
1/3 the size of the "color" files).
- Section 1-1: Rates of Change and Limits. PDF. PS.
- Section 1-2: Finding Limits and One-Sided Limits. PDF. PS.
- Section 1-3: Limits Involving Infinity. PDF. PS.
- Section 1-4: Continuity. PDF. PS.
- Section 1-5: Tangent Lines. PDF. PS.
- Study Guide. PDF. PS.
Chapter 2: Derivatives.
- Section 2-1: The Derivative as a Function. PDF. PS.
- Section 2-2: The Derivative as a Rate of Change. PDF. PS.
- Section 2-3: Derivatives of Products, Quotients, and Negative Powers. PDF. PS.
- Section 2-4: Derivatives of Trigonometric Functions. PDF. PS.
- Section 2-5: The Chain Rule and Parametric Equations. PDF. PS.
- Section 2-6: Implicit Differentiation. PDF. PS.
- Section 2-7: Related Rates. PDF. PS.
- Study Guide. PDF. PS.
Chapter 3: Applications of Derivatives.
- Section 3-1: Extreme Values of Functions. PDF. PS.
- Section 3-2: The Mean Value Theorem and Differential Equations. PDF. PS.
- Section 3-3: The Shape of a Graph. PDF. PS.
- Section 3-4: Graphical Solutions of Autonomous Differential Equations. PDF. PS.
- Section 3-5: Modeling and Optimization. PDF. PS.
- Section 3-6: Linearization and Differentials. PDF. PS.
- Section 3-7: Newton's Method. PDF. PS.
- Study Guide. PDF. PS.
- Section 4-1: Indefinite Integrals, Differential Equations and Modeling. PDF. PS.
- Section 4-2: Integral Rules; Integration by Substitution. PDF. PS.
- Section 4-3: Estimating with Finite Sums. PDF. PS.
- Section 4-4: Riemann Sums and Definite Integrals. PDF. PS.
- Section 4-5: The Mean Value and Fundamental Theorems. PDF. PS.
- Section 4-6: Substitution in Definite Integrals. PDF. PS.
- Section 4-7: Numerical Integration. PDF. PS.
- Study Guide. PDF. PS.
- Section 5-1: Volumes by Slicing and Rotation About an Axis. PDF. PS.
- Section 5-2: Modeling Using Cylindrical Shells. PDF. PS.
- Section 5-3: Lengths of Plane Curves. PDF. PS.
- Study Guide. PDF. PS.
Chapter 5: Applications of Integrals.
Chapter 6: Transcendental Functions and Differential Equations.
Chapter 7: Integration Techniques, L'Hopital's Rule, and Improper Integrals.
Chapter 8: Infinite Series.
- Section 5.4: Springs, Pumping, and Lifting. PDF. PS.
- Section 5.5: Fluid Forces. PDF. PS.
- Section 5.6: Moments and Centers of Mass. PDF. PS.
Chapter 6: Transcendental Functions and Differential Equations.
- Section 6.1: Logarithms. PDF. PS.
- Section 6.2: Exponential Functions. PDF. PS.
- Section 6.3: Derivatives of Inverse Trigonometric Functions; Integrals. PDF. PS.
- Section 6.4: First-Order Seperable Differential Equations. PDF. PS.
- Section 6.5: Linear First-Order Differential Equations. PDF. PS.
- Section 6.6: Euler's Method: Population Models. PDF. PS.
- Section 6.7: Hyperbolic Functions. PDF. PS.
Chapter 7: Integration Techniques, L'Hopital's Rule, and Improper Integrals.
- Section 7.1: Basic Integration Formulas. PDF. PS.
- Section 7.2: Integration by Parts. PDF. PS.
- Section 7.3: Partial Fractions. PDF. PS.
- Section 7.4: Trigonometric Substitution. PDF. PS.
- Section 7.5: Integral Tables, Computer Algebra Systems, and Monte Carlo Integration. PDF. PS.
- Section 7.6: L'Hopital's Rule. PDF. PS.
- Section 7.7: Improper Integrals. PDF. PS.
Chapter 8: Infinite Series.
- Section 8.1: Limits of Sequences of Numbers. PDF. PS.
- Section 8.2: Subsequences, Bounded Sequences, and Picard's Method. PDF. PS.
- Section 8.3: Infinite Series. PDF. PS.
- Section 8.4: Series of Nonnegative Terms. PDF. PS.
- Section 8.5: Alternating Series, Absolute and Conditional Convergence. PDF. PS.
- Section 8.6: Power Series. PDF. PS.
- Section 8.7: Taylor and Maclaurin Series. PDF. PS.
- Section 8.8: Applications of Power Series. PDF. PS.
- Section 8.9: Fourier Series. PDF. PS.
- Section 8.10: Fourier Cosine and Sine Series. PDF. PS.
- Section 1-1: Rates of Change and Limits. PDF. PS.
- Section 1-2: Finding Limits and One-Sided Limits. PDF. PS.
- Section 1-3: Limits Involving Infinity. PDF. PS.
- Section 1-4: Continuity. PDF. PS.
- Section 1-5: Tangent Lines. PDF. PS.
Chapter 3: Applications of Derivatives.
- Section 3-2: The Mean Value Theorem and Differential Equations. PDF. PS.
- Section 3-7: Newton's Method. PDF. PS.
- Section 4-4: Riemann Sums and Definite Integrals. PDF. PS.
- Section 4-5: The Mean Value and Fundamental Theorems. PDF. PS.
- Section 4-6: Substitution in Definite Integrals. PDF. PS.
- Section 4-7: Numerical Integration. PDF. PS.
- Section 5-1: Volumes by Slicing and Rotation About an Axis. PDF. PS.
- Section 5-2: Modeling Using Cylindrical Shells. PDF. PS.
- Section 5-3: Lengths of Plane Curves. PDF. PS.
Chapter 5: Applications of Integrals.
Chapter 6: Transcendental Functions and Differential Equations.
- Section 6.1: Logarithms. PDF. PS.
- Section 6.2: Exponential Functions. PDF. PS.
- Section 6.3: Derivatives of Inverse Trigonometric Functions; Integrals. PDF. PS.
- Section 6.5: Linear First-Order Differential Equations. PDF. PS.
- Section 6.6: Euler's Method: Population Models. PDF. PS.
- Section 6.7: Hyperbolic Functions. PDF. PS.
Chapter 7: Integration Techniques, L'Hopital's Rule, and Improper Integrals.
- Section 7.2: Integration by Parts. PDF. PS.
- Section 7.5: Integral Tables, Computer Algebra Systems, and Monte Carlo Integration. PDF. PS.
- Section 7.7: Improper Integrals. PDF. PS.
Chapter 8: Infinite Series.
- Section 8.1: Limits of Sequences of Numbers. PDF. PS.
- Section 8.2: Subsequences, Bounded Sequences, and Picard's Method. PDF. PS.
- Section 8.4: Series of Nonnegative Terms. PDF. PS.
- Section 8.5: Alternating Series, Absolute and Conditional Convergence. PDF. PS.
- Section 8.7: Taylor and Maclaurin Series. PDF. PS.
- Section 8.9: Fourier Series. PDF. PS.
Cell Physiology
Instructor: Dr. Malgosia Wilk, M.D., Ph.D. (M.A. Wilk-Blaszczak)
Course Prerequisites: BIOL 1441, 1442. CHEM 2181 and BIOL 3315 are recommended.
Required Textbook: Cell Biology by T.D. Pollard and W.C. Earnshaw
Student learning outcomes:
1. Understand the fundamental physiological mechanisms of cell function.
2. Know the scientific methods that are currently being used to explore cell physiology.
Download lectures slides :
Lecture Topic
Text
First Class
1
1
2
2,4
6
Exam I
Census Date
Exam review
7
10
8
10
9
10
17,18
19
20
End of first drop
20
21, 22
23
24
Exam II
Exam review
Midsemester
Overview of signaling
25
Spring Break
26
27
28
29
Last Drop
29
29
30,31
TBD
32
33
34
35, 36
37
38
Exam III
39
40, 41
42
Q and A
Comprehensive Final Wed May 9th 8-10:30 am
Lecture Topic
Text
First Class
1
1
2
2,4
6
Exam I
Census Date
Exam review
7
10
8
10
9
10
17,18
19
20
End of first drop
20
21, 22
23
24
Exam II
Exam review
Midsemester
Overview of signaling
25
Spring Break
26
27
28
29
Last Drop
29
29
30,31
TBD
32
33
34
35, 36
37
38
Exam III
39
40, 41
42
Q and A
Comprehensive Final Wed May 9th 8-10:30 am
Process Dynamics and Control
Instructor: Seborg
Textbook:Process Dynamics and Control third Edition ,Seborg,Edgar,Mellichamp,doyle
Download Slides from here
Slides
|
Topics
|
Chapter 1 | Introduction |
Feedback control | |
Chapter 2 | Mathematical modeling |
Dynamic responses | |
Chapter 3 | Laplace transforms |
Chapter 4 | Transfer functions |
First order systems | |
Chapter 5 | Second order systems |
Chapter 6 | Complex processes |
Chapter 7 | Fitting models to data |
Fitting models to data | |
Chapter 8 | PID controllers |
Chapter 9 | Instrumentation and valves |
Chapter 10 | |
Chapter 11 | Closed loop transfer function |
Block diagrams, Stability | |
Chapter 12 | Control loop analysis |
Chapter 13 | Overview of control system |
Chapter 14 | Frequency response |
Chapter 15 | Ratio control |
Feedforward control | |
Air Heater Demonstration | |
Chapter 16 | Advanced control strategies |
Chapter 17 | Advanced control strategies |
Chapter 18 | Multivariable control |
Multivariable control | |
Chapter 19 | Real-time optimization |
Chapter 20 | Modeel predictive Control |
Chapter 21 | Process monitoring |
Chapter 22 | Batch Processing |
Chapter 23 | Biosystem control design |
Chapter 24 | Dynamics and Control of Biological system |
Appendix A | |
AMD process control | |
Air Liquide Slides |
No comments:
Post a Comment