Monday, January 27, 2020

The Importance Of Studying Money Finance Essay

The Importance Of Studying Money Finance Essay Money helps us in avoiding the double coincidence of needs as required by a barter economy and by enabling specialization. However, the money supply has a lot of effects on the well being of its users. Some of these effects can be summarized as inflation, wealth creation/destruction etc. Thus it is very important to study money. Banking and financial markets are intermediaries that help provide a common platform, or a market place, for all individuals to inter act with each other. Banking and financial markets provide liquidity to the system and helps 2 individuals with exactly opposite needs meet on a common platform. Without an apt knowledge of the banking and financial markets, it is impossible to understand how changes around us would affect our wealth and in which way can we best utilize our wealth and help it grow and accumulate. Discuss the advantages and disadvantages of using financial intermediaries. Financial intermediaries help us by bringing together those entities with surplus funds and willingness to lend, with those with a shortage of funds and willingness to borrow. The benefits of such intermediation include; maturity and risk transformation, lesser transaction costs due to higher liquidity, better bargaining power due to alternative options etc. The function of financial intermediaries is to provide these advantages and make a profit while raising the overall efficiency of the economy. The disadvantage of financial intermediation is that such intermediation may be expensive on occasions. As seen in the recent economic crisis, financial intermediaries may also falter on exploiting structural loopholes in greed of higher profits in the short term while posing a threat to the economic stability in the long term. The given computer entry tells us that the Northwestern Energy company has issued bonds on March 15, 2001, with a principal value of $100,000, expiring in 20 years on March 15, 2021 and carrying an interest rate of 6% payable semi-annually. In the event of interest rates rising for new bonds issued in to the market for the same quality, it would imply that the bonds issued by Northwestern will be relatively expensive and thus less attractive than the newer bonds. Therefore, the value of the Bonds issued by Northwestern will have to fall to an extent that the yield on the bond becomes equal to the yield of the newer bonds issued. In making this inference we are assuming that the yield and interest rates are same. Friedmanà ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒ ¢Ã¢â‚¬Å¾Ã‚ ¢s belief that when Fed lowers interest rates, they fall but do not stay lower for very long, reiterates his belief that in a free economy, the market always sets up at an equilibrium. Even though, there may be interventions by monetary authorities desired to accomplish certain goals and objectives, such intervention only leads to a temporary imbalance in the demand and supply attributes and over a longer period of time, the market resets itself to equilibrium. In the graph above, we assume that Dd is the initial money demand curve and Ss is the initial money supply curve. Thus, at equilibrium i* is the market determined interest rate and Q* the money supply and demand. Now, if the central bank authorities bring this interest rate down to say ia, a new but short lived equilibrium is formed due to the shift of the supply curve from Ss to Ssa. At this equilibrium, the demand curve has not yet responded to the change in Fed rates. Now as per Friedman, due to a lower interest rate, the liquidity in the market increases, thereby pushing the income of individuals northward. With higher level of incomes, inflation sets in due to a shift in the demand curve from Dd to Dda and the price levels begin to rise to offset the increase in income. Since inflation is a component of interest rates, the interest rates also rise proportionately in order to reset the market at another equilibrium where, in the example above, i* is the equilibrium interest rate and Q*a is the equilibrium money supply and demand. A company that has never received a bond rating will have to contact the rating agency, say Fitch, first. Once the agency is contacted, a credit analyst collates and gathers information required to determine risk to investors who might own or buy the bond. The kinds of information that are to be dispersed are background and history of the company/entity, industry trends, management vision/mission, experience, track record, and attitude towards risk, organization structure etc. He then analyzes the information on hand and develops a conclusion in committee on the appropriate rating. The analyst may also seek explanations and clarifications in to business procedures and audit some financial statements. After the rating is finalized, the agency monitors the security on an ongoing basis. In 2009, the Fed and the treasury were facing the most difficult times they have had to face since the great depression. On 19th March 2009, Fed decided to expand its balance sheet by a US$1,000,000,000,000. The Fed announced that it would inject up to $750 billion in Agency MBS that year. This was over and above an earlier commitment of $500 billion. Fed also announced the buying in to Agency bonds for $200 billion. It further declared that it would purchase up to $300 billion of longer dated Treasuries over the term. So, what was the fear behind such drastic measures? Answer is deflation. Earlier that year in January, Fed took the historic step of cutting the benchmark interest rate to as low as zero. They also called for greater government spending to help revive the economy. Such drastic measures were the result of the failure of Fed efforts like record rate cuts, emergency lending programs and backstops for debt markets, to halt the crisis.

Sunday, January 19, 2020

Forward the Foundation Chapter 2

2 But Seldon, while he did not forget Amaryl's warning, did not think of it with any great degree of concentration. His fortieth birthday came and went-with the usual psychological blow. Forty! He was not young any longer. Life no longer stretched before him as a vast uncharted field, its horizon lost in the distance. He had been on Trantor for eight years and the time had passed quickly. Another eight years and he would be nearly fifty. Old age would be looming. And he had not even made a decent beginning in psychohistory? Yugo Amaryl spoke brightly of laws and worked out his equations by making daring assumptions based on intuition. But how could one possibly test those assumptions? Psychohistory was not yet an experimental science. The complete study of psychohistory would require experiments that would involve worlds of people, centuries of time-and a total lack of ethical responsibility. It posed an impossible problem and he resented having to spend any time whatever on departmental tasks, so he walked home at the end of the day in a morose mood. Ordinarily he could always count on a walk through the campus to rouse his spirits. Streeling University was high-domed and the campus gave the feeling of being out in the open without the necessity of enduring the kind of weather he had experienced on his one (and only) visit to the Imperial Palace. There were trees, lawns, walks, almost as though he were on the campus of his old college on his home world of Helicon. The illusion of cloudiness had been arranged for the day with the sunlight (no sun, of course, just sunlight) appearing and disappearing at odd intervals. And it was a little cool, just a little. It seemed to Seldon that the cool days came a little more frequently than they used to. Was Trantor saving energy? Was it increasing inefficiency? Or (and he scowled inwardly as he thought it) was he getting old and was his blood getting thin? He placed his hands in his jacket pockets and hunched up his shoulders. Usually he did not bother guiding himself consciously. His body knew the way perfectly from his offices to his computer room and from there to his apartment and back. Generally he negotiated the path with his thoughts elsewhere, but today a sound penetrated his consciousness. A sound without meaning. â€Å"Jo†¦ Jo†¦ Jo†¦ Jo†¦Ã¢â‚¬  It was rather soft and distant, but it brought back a memory. Yes, Amaryl's warning. The demagogue. Was he here on campus? His legs swerved without Seldon's making a conscious decision and brought him over the low rise to the University Field, which was used for calisthenics, sports, and student oratory. In the middle of the Field was a moderate-sized crowd of students who were chanting enthusiastically. On a platform was someone he didn't recognize, someone with a loud voice and a swaying rhythm. It wasn't this man, Joranum, however. He had seen Joranum on holovision a number of times. Since Amaryl's warning, Seldon had paid close attention. Joranum was large and smiled with a kind of vicious camaraderie. He had thick sandy hair and light blue eyes. This speaker was small, if anything-thin, wide-mouthed, dark-haired, and loud. Seldon wasn't listening to the words, though he did hear the phrase â€Å"power from the one to the many† and the many-voiced shout in response. Fine, thought Seldon, but just how does he intend to bring this about-and is he serious? He was at the outskirts of the crowd now and looked around far someone he knew. He spotted Finangelos, a pre-math undergraduate. Not a bad young man, dark and woolly-haired. â€Å"Finangelos,† he called out. â€Å"Professor Seldon† said Finangelos after a moment of staring as though unable to recognize Seldon without a keyboard at his fingertips he trotted over. â€Å"Did you come to listen to this guy?† â€Å"I didn't come for any purpose but to find out what the noise was. Who is he?† â€Å"His name is Namarti, Professor. He's speaking for Jo-Jo.† â€Å"I hear that, † said Seldon as he listened to the chant again. It began each time the speaker made a telling point, apparently. â€Å"But who is this Namarti? I don't recognize the name. What department is he in?† â€Å"He's not a member of the University, Professor. He's one of Jo-Jo's men.† â€Å"If he's not a member of the University, he has no right to speak here without a permit. Does he have one, do you suppose?† â€Å"I wouldn't know, Professor.† â€Å"Well then, let's find out.† Seldon started into the crowd, but Finangelos caught his sleeve. â€Å"Don't start anything, Professor. He's got goons with him.† There were six young men behind the speaker, spaced rather widely, legs apart, arms folded, scowling. â€Å"Goons?† â€Å"For rough stuff, in case anyone tries anything funny.† â€Å"Then he's certainly not a member of the University and even a permit wouldn't cover what you call his ‘goons'. Finangelos, signal through to the University security officers. They should have been here by now without a signal.† â€Å"I guess they don't want trouble,† muttered Finangelos. â€Å"Please, Professor, don't try anything. If you want me to get the security officers, I will, but you just wait till they come.† â€Å"Maybe I can break this up before they come.† He began pushing his way through. It wasn't difficult. Some of those present recognized him and all could see the professorial shoulder patch. He reached the platform, placed his hands on it, and vaulted up the three feet with a small grunt. He thought, with chagrin, that he could have done it with one hand ten years before and without the grunt. He straightened up. The speaker had stopped talking and was looking at him with wary and ice-hard eyes. Seldon said calmly, â€Å"Your permit to address the students, sir.† â€Å"Who are you?† said the speaker. He said it loudly, his voice carrying. â€Å"I'm a member of the faculty of this University,† said Seldon, equally loudly. â€Å"Your permit, sir?† â€Å"I deny your right to question me on the matter.† The young men behind the speaker had gathered closer. â€Å"If you have none, I would advise you to leave the University grounds immediately.† â€Å"And if I don't?† â€Å"Well, for one thing, the University security officers are on their way.† He turned to the crowd. â€Å"Students,† he called out, â€Å"we have the right of free speech and freedom of assembly on this campus, but it can be taken away from us if we allow outsiders, without permits, to make unauthorized-â€Å" A heavy hand fell on his shoulder and he winced. He turned around and found it was one of the men Finangelos had referred to as â€Å"goons.† The man said, with a heavy accent whose provenance Seldon could not immediately identify, â€Å"Get out of here fast. â€Å" â€Å"What good will that do?† said Seldon. â€Å"The security officers will be here any minute.† â€Å"In that case,† said Namarti with a feral grin, â€Å"there'll be a riot. That doesn't scare us.† â€Å"Of course it wouldn't,† said Seldon. â€Å"You'd like it, but there won't be a riot. You'll all go quietly.† He turned again to the students and shrugged off the hand on his shoulder. â€Å"We'll see to that, won't we?† Someone in the crowd shouted, â€Å"That's Professor Seldon! He's all right! Don't pound him!† Seldon sensed ambivalence in the crowd. There would be some, he knew, who would welcome a dust-up with the University security officers, just on general principles. On the other hand, there had to be some who liked him personally and still others who did not know him but who would not want to see violence against a member of the faculty. A woman's voice rang out. â€Å"Watch out, Professor!† Seldon sighed and regarded the large young men he faced. He didn't know if he could do it, if his reflexes were quick enough, his muscles sturdy enough, even given his prowess at Twisting. One goon was approaching him, overconfidently of course. Not quickly, which gave Seldon a little of the time his aging body would need. The goon held out his arm confrontationally, which made it easier. Seldon seized the arm, whirled, and bent, arm up, and then down (with a grunt-why did he have to grunt?), and the goon went flying through the air, propelled partly by his own momentum. He landed with a thump on the outer edge of the platform, his right shoulder dislocated. There was a wild cry from the audience at this totally unexpected development. Instantly an institutional pride erupted. â€Å"Take them, Prof!† a lone voice shouted. Others took up the cry. Seldon smoothed back his hair, trying not to puff. With his foot he shoved the groaning fallen goon off the platform. â€Å"Anyone else?† he asked pleasantly. â€Å"Or will you leave quietly?† He faced Namarti and his five henchmen and as they paused irresolutely, Seldon said, â€Å"I warn you. The crowd is on my side now. If you try to rush me, they'll take you apart. Okay, who's next? Let's go. One at a time.† He had raised his voice with the last sentence and made small come-hither motions with his fingers. The crowd yelled its pleasure. Namarti stood there stolidly. Seldon leaped past him and caught his neck in the crook of his arm. Students were climbing onto the platform now, shouting â€Å"One at a time! One at a time!† and getting between the bodyguards and Seldon. Seldon increased the pressure on the other's windpipe and whispered in his ear, â€Å"There's a way to do this, Namarti, and I know how: I've practiced it for years. If you make a move and try to break away, I'll ruin your larynx so that you'll never talk above a whisper again. If you value your voice, do as I say. When I let up, you tell your bunch of bullies to leave. If you say anything else, they'll be the last words you'll say normally. And if you ever come back to this campus again, no more Mr. Nice Guy. I'll finish the job.† He released the pressure momentarily. Namarti said huskily, â€Å"All of you. Get out.† They retreated rapidly, helping their stricken comrade. When the University security officers arrived a few moments later, Seldon said, â€Å"Sorry, gentlemen. False alarm.† He left the Field and resumed his walk home with more than a little chagrin. He had revealed a side of himself he did not want to reveal. He was Hari Seldon, mathematician, not Hari Seldon, sadistic twister. Besides, he thought gloomily, Dors would hear of this. In fact, he'd better tell her himself, lest she hear a version that made the incident seem worse than it really was. She would not be pleased. 3 She wasn't. Dors was waiting for him at the door of their apartment in an easy stance, hand on one hip, looking very much as she had when he had first met her at this very University eight years before: slim, shapely, with curly reddish-gold hair-very beautiful in his eyes but not very beautiful in any objective sense, though he had never been able to assess her objectively after the first few days of their friendship. Dors Venabili! That's what he thought when he saw her calm face. There were many worlds, even many sectors on Trantor where it would have been common to call her Dors Seldon, but that, he always thought, would put the mark of ownership on her and he did not wish it, even though the custom was sanctioned by existence back into the vague mists of the pre-Imperial past. Dors said, softly and with a sad shake of her head that barely disturbed her loose curls, â€Å"I've heard, Hari. Just what am I going to do with you?† â€Å"A kiss would not be amiss.† â€Å"Well, perhaps, but only after we probe this a little. Come in.† The door closed behind them. â€Å"You know, dear, I have my course and my research. I'm still doing that dreadful history of the Kingdom of Trantor, which you tell me is essential to your own work. Shall I drop it all and take to wandering around with you, protecting you? It's still my job, you know. It's more than ever my job, now that you're making progress with psychohistory.† â€Å"Making progress? I wish I were. But you needn't protect me.† â€Å"Needn't I? I sent Raych out looking for you. After all, you were late and I was concerned. You usually tell me when you're going to be late. I'm sorry if that makes me sound as though I'm your keeper, Hari, but I am your keeper.† â€Å"Does it occur to you, Keeper Dors, that every once in a while I like to slip my leash?† â€Å"And if something happens to you, what do I tell Demerzel?† â€Å"Am I too late for dinner? Have we clicked for kitchen service?† â€Å"No. I was waiting for you. And as long as you're here, you click it. You're a great deal pickier than I am when it comes to food. And don't change the subject.† â€Å"Didn't Raych tell you that I was all right? So what's there to talk about?† â€Å"When he found you, you were in control of the situation and he got back here first, but not by much. I didn't hear any details. Tell me-What-were-you-doing?† Seldon shrugged. â€Å"There was an illegal gathering, Dors, and I broke it up. The University could have gotten a good deal of trouble it didn't need if I hadn't.† â€Å"And it was up to you to prevent it? Hari. you're not a Twister anymore. You're a -â€Å" He put in hastily, â€Å"An old man?† â€Å"For a Twister, yes. You're forty. How do you feel?† â€Å"Well-A little stiff.† â€Å"I can well imagine. And one of these days, when you try to pretend you're a young Heliconian athlete, you'll break a rib. Now tell me about it.† â€Å"Well, I told you how Amaryl warned me that Demerzel was in trouble because of the demagoguery of Jo-Jo Joranum.† â€Å"Jo-Jo. Yes, I know that much. What don't I know? What happened today?† â€Å"There was a rally at the Field. A Jo-Jo partisan named Namarti was addressing the crowd-â€Å" â€Å"Namarti is Gambol Deen Namarti, Joranum's right-hand man.† â€Å"Well, you know more about it than I do. In any case, he was addressing a large crowd and he had no permit and I think he was hoping there would be some sort of riot. They feed on these disorders and if he could close down the University even temporarily, he would charge Demerzel with the destruction of academic freedom. I gather they blame him for everything. So I stopped them. Sent them off without a riot.† â€Å"You sound proud.† â€Å"Why not? Not bad for a man of forty.† â€Å"Is that why you did it? To test your status at forty?† Seldon thoughtfully clicked the dinner menu. Then he said, â€Å"No. I really was concerned that the University would get into needless trouble. And I was concerned about Demerzel. I'm afraid that Yugo's tales of danger had impressed me more than I realized. That was stupid, Dors, because I know that Demerzel can take care of himself. I couldn't explain that to Yugo or to anyone but you.† He drew in a deep breath. â€Å"It's amazing what a pleasure it is that I can at least talk to you about it. You know and I know and Demerzel knows and no one else knows-at least, that I know of-that Demerzel is untouchable.† Dors touched a contact on a recessed wall panel and the dining section of their living quarters lit up with a soft peach-colored glow. Together, she and Hari walked to the table, which was already set with linen, crystal, and utensils. As they sat, the dinner began to arrive-there was never any long delay at this time of evening-and Seldon accepted it quite casually. He had long since grown accustomed to the social position that made it unnecessary for them to patronize the faculty dinners. Seldon savored the seasonings they had learned to enjoy during their stay at Mycogen-the only thing about that strange, male-dominated, religion-permeated, living-in-the-past sector they had not detested. Dors said softly, â€Å"How do you mean, ‘untouchable'?† â€Å"Come, dear, he can alter emotions. You haven't forgotten that. If Joranum really became dangerous, he could be†-he made a vague gesture with his hands- â€Å"altered: made to change his mind.† Dors looked uncomfortable and the meal proceeded in an unusual silence. It wasn't until it was over and the remains-dishes, cutlery, and all-swirled down the disposal chute in the center of the table (which then smoothly covered itself over) that she said, â€Å"I'm not sure I want to talk about this, Hari, but I can't let you be fooled by your own innocence.† â€Å"Innocence?† He frowned. â€Å"Yes. We've never talked about this. I never thought it would come up, but Demerzel has shortcomings. He is not untouchable, he may be harmed, and Joranum is indeed a danger to him.† â€Å"Are you serious?† â€Å"Of course I am. You don't understand robots-certainly not one as complex as Demerzel. And I do.†

Saturday, January 11, 2020

Unknown

B. Sc. (H) Computer Science 3-YEAR FULL TIME PROGRAMME RULES, REGULATIONS AND COURSES CONTENTS DEPARTMENT OF COMPUTER SCIENCE FACULTY OF MATHEMATICAL SCIENCES UNIVERSITY OF DELHI DELHI – 110007 2010 Semester Systems at the undergraduate level Course of Study: B. Sc. (H) Computer Semester – I CSHT-101 Programming Fundamentals CSHT-102 Discrete Structures Digital Electronics Calculus and Matrices CSHT-203 Data Structures Semester – II CSHT-204 computer Systems Architecture English Calculus and Geometry using C++ Semeser – III CSHT-305 Algorithms CSHT-306 Systems Programmin g CSHT-307 File Structures and Database Basic Probability and Statistics Semester – IV CSHT-408 Operating Systems CSHT-409 Data Communica tion and Computer CSHT-410 Software Engineering Real Analysis / Differential Equations Semester – V CSHT-511 Theory of Computations CSHT-512 Microproces sors CSHT-513 Internet Technologie s Optimization I/ Real Analysis/To be decided by the student Semeser – VI CSHT-614 Computer Graphics CSHT-615 Information Security CSHT-616 Electives Statistical Methodology/ DE/To be decided by the student Electives: 1. Software Testing 2. Artificial Intelligence 3. Network Programming and Administration 4. Data Mining 5. Combinatorial Optimizations Proposed Structure and Syllabi for B. Sc. (H) Computer Science – July 2010 Semester I Coding Title L–T–P Credits Total Marks 100 Pre-requisites CSHT-101 Programming Fundamentals using C++ Discrete Structures Digital Electronics Calculus and Matrices Software Lab based on 101 Lab based on Digital Electronics 5 – 0-0 5 – CSHT-102 ** ** CSHP-101 5 – 0-0 5 100 – 0-0-8 4 100 Semester II Coding Title L–T–P Credits Total Marks 100 100 Pre-requisites CSHT-203 CSHT-204 ** ** CSHP-202 CSHP-203 Data Structures Computer Systems Architecture EL – II (Language) Calculus and Geometry Software Lab based on 203 Lab based on 204 5 – 0-0 5 –0-0 5 5 101 0-0-8 0-0-4 4 2 100 50 Semester III Coding Title L–T–P Credits Total Marks 100 100 Pre-requisites CSHT-305 CSHT-306 Algorithms Systems Programming 5-0-0 5 – 0 -0 5 5 101,203 101, 203 CSHT-307 ** CSHP-304 CSHP-305 CSHP- 306 Database Systems Basic Statistics and Probability Software Lab based on 305 Software Lab based on 306 Software Lab based on 307 5–0-0 5 100 101, 203 0-0-4 0-0-4 0-0-4 2 2 2 50 50 50 Semester IV Coding Title L–T–P Credits Total Marks 100 100 Pre-requisites CSHT-408 CSHT-409 Operating Systems Data Communication and Computer Networks Software Engineering Real Analysis/ Differential Equations Software Lab based on 408 Software Lab based on 409 Software Lab based on 410 5 – 0-0 5 – 0-0 5 5 101, 203 CSHT-410 ** 5 – 0-0 5 100 101, 203 – CSHP-407 CSHP-408 CSHP-409 0-0-4 0-0-4 0-0-4 2 2 2 50 50 50 Semester V Coding Title L–T–P Credits Total Marks 100 100 100 Pre-requisites CSHT-511 CSHT-512 CSHT-513 ** CSHP-510 Theory of Computations Microprocessors Internet Technologies Optimization I/Real Analysis/* Software Lab based on 512 5 – 0– 0 5–0-0 5–0-0 5 5 5 01 204 409 0-0-4 2 50 CSHP-511 Lab based on 513 0-0-4 2 50 Semester VI Coding Title L–T–P Credits Total Marks 100 100 100 Pre-requisites CSHT-614 CSHT-615 CSHT-616 ** Computer Graphics Information Security Elective Differential Equations/ Statistical Methodology/* Software Lab based on 614 Softwar e Lab based on 615 Software Lab based on 616 5-0-0 5-0-0 5-0-0 5 5 5 – CSHP-612 CSHP-613 CSHP-614 0-0-4 0-0-4 0-0-4 2 2 2 50 50 50 †¢ To be decided by the student from any discipline * * Will be finalized after the syllabi by the respective departments (Electronics / Mathematics / Statistics / English) are made. CSHT-101 Programming Fundamentals (60 Lectures) Basic Computer Organization: Functional Units, basic I/O devices and storage devices; Representation of integers, real (fixed and floating point), characters (ASCII and Unicode); Basic operations of a programming environment. Problem Solving Approaches: Notion of an algorithm, problem solving using top-down design and decomposition into sub-problems, stepwise methodology of developing an algorithm, methodology of developing an algorithmic solution from a mathematical specification of the problem, use of recursion for problems with inductive characterization. Programming using C++: basic data types; constants and variables, arithmetic and logical expressions, assignment; input-output interface; control structures in conditionals, loops; procedural abstractions; strings and arrays; command line arguments; file handling; error handling. Introduction to the object-oriented programming paradigms; data abstraction and encapsulation — objects and classes; inheritance; polymorphism; Recommended Books: 1. B. A. Forouzan and R. F. Gilberg, Computer Science, A structured Approach using C++, Cengage Learning, 2004. 2. R. G. Dromey, How to solve it by Computer, Pearson Education 1982 3. E. Balaguruswamy, Object Oriented Programming with C++ , 4th Edition, Tata McGraw Hill 1997 4. G. J. Bronson, A First Book of C++ From Here to There, 3rd Edition, Cengage Learning 2005. 5. G. Seed, An Introduction to Object-Oriented Programming in C++, with applications in Computer Graphics Springer 2nd Edition 2001. CSHT 102 Discrete Structures (60 Lectures) Introduction: Sets – finite and Infinite sets, uncountably Infinite Sets; functions, relations, Properties of Binary Relations, Closure, Partial Ordering Relations; counting – Pigeonhole Principle, Permutation and Combination; Mathematical Induction, Principle of Inclusion and Exclusion. Growth of Functions: Asymptotic Notations, Summation formulas and properties, Bounding Summations, approximation by Integrals Recurrences: Recurrence Relations, generating functions, Linear Recurrence Relations with constant coefficients and their solution, Substitution Method, Recurrence Trees, Master Theorem Graph Theory: Basic Terminology, Models and Types, multigraphs and weighted graphs, Graph Representaion, Graph Isomorphism, Connectivity, Euler and Hamiltonian Paths and Circuits, Planar Graphs, Graph Coloring, Trees, Basic Terminology and properties of Trees, Introduction to Spanning Trees Prepositional Logic: Logical Connectives, Well-formed Formulas, Tautologies, Equivalences, Inference Theory Recommended Books: 1. C. L. Liu & Mahopatra, Elements of Discrete mathematics, 2nd Sub Edition 1985, Tata McGraw Hill 2. Rosen, Discrete Mathematics and Its Applications, Sixth Edition 2006 3. T. H. Coremen, C. E. Leiserson, R. L. Rivest, Introduction to algorithms, Prentice Hall on In dia (3rd edition 2009) 4. M. O. Albertson and J. P. Hutchinson, Discrete Mathematics with Algorithms 1988 Johnwiley Publication 5. J. L. Hein, Discrete Structures, Logic, and Computability, Jones and Bartlett Publishers, 3rd Edition, 2009 6. D. J. Hunter, Essentials of Discrete Mathematics, Jones and Bartlett Publishers, 2008 Digital Electronics In consultation with Department of Electronics) Number System and Codes: Decimal, Binary, Hexadecimal, Octal, BCD, Conversions, Complements (1’s and 2’s), Signed and Unsigned numbers, Addition and Substraction, Multiplication Gray and Hamming Codes Logic Gates and Boolean Algebra: Truth Tables, OR, AND, NOT, EXOR, Universal (NOR and NAND) Gates, Boolean Theorems, DeMorgan’s Theorems. Combinational Logic Analysis and Design: Standard representation of logic functions (SOP and POS), Minimization Techniques(Karnaugh Map Method: 4,5 variables). Multiplexers(2:1,4:1)) and Demultiplexers (1:2,4:1), Adder (half and full) and th eir use as substractor, Encoder (8-line-to-3-line) and Decoder (3-line-to-8-line) , Code Converters( Binary to BCD and vice versa). Sequential logic design: Latch, Flip flop, S-R FF , J-K FF, T and D type FFs, Clocked FFs, Registers, Counters (ripple, synchronous and asynchronous, ring, modulus), State Table, State Diagrams and Sequential Machines. A/D and D/A Converters: Successive Approximation ADC, R/2R Ladder DAC. Memories: General Memory Operation, ROM, RAM (Static and Dynamic), PROM, EPROM, EEPROM, EAROM. Suggested Books: 1. Digital Electronics, Principles and Applications, R. L. Tokheim, Tata McGraw-Hill. 2. Digital Principles, R. L. Tokheim, Schaum’s Outline Series, Tata McGraw-Hill. 3. Digital Systems, Principles and Applications, R. J. Tocci and N. S. Widner, Pearson Education Asia. 4. Digital Principles and Applications, A. P. Malvino and D. Leach, Tata McGraw Hill. 5. Digital Design, M. M. Mano, Pearson Education Asia. 6. Digital Fundamentals, T. L. Floyd, Pearson Education Asia. 7. Solved Problems in Digital Electronics, S. P. Bali, Sigma Series, Tata McGraw-Hill. 8. Digital Electronics, W. H. Gothmann, Prentice Hall of India. 9. Modern Digital Electronics, R. P. Jain, Tata McGraw-Hill. CSHT 203 Data Structures (60 Lectures) Introduction: Abstract Data Types, Arrays- Single and Multidimensional arrays, Sparse matrices. Linear structures: Stacks, Queues (linear as well as circular implementation), singly-, doubly-, and circularly- linked lists — Operations and applications. Recursion: Problem solving using recursion, run time stack in recursion, tail recursion, and its removal. Searching techniques: Linear search, Binary search and their efficiency, Skip Lists, Hashing. Tree Structures: Trees, Binary Trees, Complete Binary trees and almost complete Binary trees, binary search trees, Insertion, Deletion, Tree traversal algorithms, Threaded trees (recursive as well as Non recursive), applications of trees. Multiway trees – B-Trees and introduction to B+ Trees. Recommended Books: 1. A. Drozdek, Data Structures and algorithm in C++, 3rd Edition, Course Technology 2004. 2. Data Structures using C and C++, Tannenbaum, 2nd edition ** 1995 3. Data Structures and Algorithms in C++. Publication John Wiley 2003 4. S. Sahni, Data Structures, Algorithms and applications in C++, Publication Silicon Press 2004 5. B. R. Preiss, Data structures and algorithms with object oriented design patterns in C++, John Wiley and sons, 1998. CSHT 204 Computer System Architecture (60 Lectures) Basic Computer Organization and Design: Computer registers, bus system, instruction set, timing and control, instruction cycle, memory reference, input-output and interrupt, Interconnection Structures, Bus Interconnection design of basic computer. Central Processing Unit: Register organization, arithmetic and logical micro-operations, stack organization, micro programmed control. Instruction formats, addressing modes, instruction codes, machine language, assembly language, input output programming, RISC, CISC architectures, pipelining and parallel architecture. Memory Organization: Cache memory, Associative memory, mapping. Input-output Organization: Input / Output: External Devices, I/O Modules, Programmed I/O, Interrupt-Driven I/O, Direct Memory Access, I/O Channels Recommended Books: 1. M. Mano, Computer System Architecture, Prentice Hall of India Third edition / Pearson Education 1992. 2. A. J. Dos Reis, Assembly language and computer architecture using C++ and JAVA, Course Technology, 2004. 3. W. Stallings, Computer Organization and Architecture Desiguing for Performance 8th Edition 2009, Prentice Hall of India. CSHT 305 Algorithms (60 Lectures) Introduction: Basic Design and Analysis techniques of Algorithms, Correctness of Algorithm. Algorithm Design Techniques: Iterative techniques, Divide and Conquer, Dynamic Programming, Greedy Algorithms. Sorting and Searching Techniques: Elementary sorting techniques – Bubble Sort, Insertion Sort, Merge Sort, Advanced Sorting techniques – Heap Sort, Quick Sort, Sorting in Linear Time Bucket Sort, Radix Sort and Count Sort, Searching Techniques, Medians & Order Statistics, complexity analysis; Lower Bounding Techniques: Decision Trees Balanced Trees – Red-Black Trees Advanced Analysis Technique: Amortized analysis Graphs: Graph Algorithms – Breadth First Search, Depth First Search and its Applications, Minimum Spanning Trees. String Processing: String Matching, KMP Technique Recommended Books: 1. T. H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein Introduction to Algorithms, PHI, 3rd Edition 2009 2. Sarabasse & A. V. Gelder Computer Algorithm – Introduction to Design and Analysis, Publisher – Pearson 3rd Edition 1999 CSHT 306 Systems Programming (60 Lectures) Introduction: Introduction to Systems Software and machine architecture. Assemblers: Example of an assembly language, programming in assembly language, assembler features and functions, Load and Go assembler, One-pass and two pass assemblers, Macros and macro processors. Compilers: Compiler functions and features, phases of compilation, optimization. Loaders and Linkers: Basic Loader functions and features, Relocation, Program Linking, static and dynamic linking. Recommended Books: 1. A. J. Dos Reis, Assembly language and computer architecture using C++ and JAVA, Course Technology, 2004 2. D. M. Dhamdhere Systems Programming and Operating Systems, Tata McGraw-Hill Publishing Company, Ltd; Second Revised Edition 1996 3. L. Beck, D. Manjula, System Software, An Introduction to Systems Programming, Pearson, 3rd Edition 1996. 4. S. Chattopadhyay, Systems Software, PHI 2007. CSHT 307 Database Systems (60 Lectures) Introduction: Characteristics of database approach, data models, database system architecture and data independence. Entity Relationship(ER) Modeling: Entity types, relationships, constraints. Relation data model: Relational model concepts, relational constraints, relational algebra, SQL queries, programming using embedded SQL. Database design: mapping ER model to relational database, functional dependencies, normal forms. Transaction Processing: ACID properties, concurrency control, recovery. Web based databases: XML documents and databases. Books Recommended: 1. R. Elmasri, S. B. Navathe, Fundamentals of Database Systems 6th Edition, Pearson Education 2010. 2. R. Ramakrishanan, J. Gehrke, Database Management Systems 3rd Edition, McGraw-Hill 2002. 3. A. Silberschatz, H. F. Korth, S. Sudarshan, Database System Concepts 6th Edition, McGraw Hill 2010. CSHT 408 Operating Systems (60 Lectures) Introduction: Basic OS functions, resource abstraction, types of operating systems – multiprogramming systems, batch systems , time sharing systems; operating systems for personal computers & workstations, process control & real time systems. Operating System Organization: processor and user modes, kernels, system calls and system programs. Process Management: System view of the process and resources, process abstraction, process hierarchy, threads, threading issues, thread libraries; Process Scheduling, non-pre-emptive and pre-emptive scheduling algorithms; concurrent and processes, critical section, semaphores, methods for inter-process communication; deadlocks. Memory Management: Physical and virtual address space; memory allocation strategies -fixed and variable partitions, paging, segmentation, virtual memory File and I/O Management: Directory structure, file operations, file allocation methods, device management. Protection and Security: Policy mechanism, authentication, internal access authorization. Recommended Books: 1. A Silberschatz, P. B. Galvin, G. Gagne, Operating Systems Concepts, 8th Edition, John Wiley Publications 2008. 2. A. S. Tanenbaum, Modern Operating Systems, 3rd Edition, Pearson Education 2007. 3. G. Nutt, Operating Systems: A Modern Perspective, 2nd Edition Pearson Education 1997. 4. W. Stallings, Operating Systems, Internals & Design Principles 2008 5th Edition, Prentice Hall of India. 5. M. Milenkovic, Operating Systems- Concepts and design, Tata McGraw Hill 1992. CSHT 409 Data Communication and Computer Networks (60 Lectures) Introduction to Computer Networks: Network definition; network topologies; network classifications; network protocol; layered network architecture; overview of OSI reference model; overview of TCP/IP protocol suite. Data Communication Fundamentals and Techniques: Analog and digital signal; data-rate limits; digital to digital line encoding schemes; pulse code modulation; parallel and serial transmission; digital to analog modulation-; multiplexing techniques- FDM, TDM; transmission media. Networks Switching Techniques and Access mechanisms: Circuit switching; packet switching- connectionless datagram switching, connection-oriented virtual circuit switching; dial-up modems; digital subscriber line; cable TV for data transfer. Data Link Layer Functions and Protocol: Error detection and error correction techniques; data-link control- framing and flow control; error recovery protocols- stop and wait ARQ, goback-n ARQ; Point to Point Protocol on Internet. Multiple Access Protocol and Networks: CSMA/CD protocols; Ethernet LANS; connecting LAN and back-bone networks- repeaters, hubs, switches, bridges, router and gateways; Networks Layer Functions and Protocols: routing; routing algorithms; network layer protocol of Internet- IP protocol, Internet control protocols. Transport Layer Functions and Protocols: Transport services- error and flow control, Connection establishment and release- three way handshake; Overview of Application layer protocol: Overview of DNS protocol; overview of WWW & HTTP protocol. Recommended Books: 1. B. A. Forouzan: Data Communications and Networking, Fourth edition, THM Publishing Company Ltd 2007. 2. A. S. Tanenbaum: Computer Networks, Fourth edition, PHI Pvt. Ltd 2002. CSHT 410 Software Engineering (60 Lectures) Introduction: The Evolving Role of Software, Software Characteristics, Changing Nature of Software, Software Engineering as a Layered Technology, Software Process Framework, Framework and Umbrella Activities, Process Models, Capability Maturity Model Integration (CMMI). Requirement Analysis: Software Requirement Analysis, Initiating Requirement Engineering Process, Requirement Analysis and Modeling Techniques, Flow Oriented Modeling, Need for SRS, Characteristics and Components of SRS. Software Project Management: Estimation in Project Planning Process, Project Scheduling. Risk Management: Software Risks, Risk Identification, Risk Projection and Risk Refinement, RMMM Plan. Quality Management: Quality Concepts, Software Quality Assurance, Software Reviews, Metrics for Process and Projects. Design Engineering: Design Concepts, Architectural Design Elements, Software Architecture, Data Design at the Architectural Level and Component Level, Mapping of Data Flow into Software Architecture, Modeling Component Level Design. Testing Strategies & Tactics: Software Testing Fundamentals, Strategic Approach to Software Testing, Test Strategies for Conventional Software, Validation Testing, System Testing, BlackBox Testing, White-Box Testing and their type, Basis Path Testing. Recommended Books: 1. R. S. Pressman, Software Engineering: A Practitioner’s Approach (7th Edition), McGrawHill, 2009. 2. P. Jalote, An Integrated Approach to Software Engineering (2nd Edition), Narosa Publishing House, 2003. 3. K. K. Aggarwal and Y. Singh, Software Engineering (revised 2nd Edition), New Age International Publishers, 2008. 4. I. Sommerville, Software Engineering (8th edition), Addison Wesle, 2006. 5. D. Bell, Software Engineering for Students (4th Edition), Addison-Wesley, 2005. 6. R. Mall, Fundamentals of Software Engineering (2nd Edition), Prentice-Hall of India, 2004. CSHT 511 Theory of Computation (60 Lectures) Languages: Alphabets, string, language, Basic Operations on language, Concatenation, Kleene Star Finite Automata and Regular Languages: Regular Expressions, Transition Graphs, Deterministics and non-deterministic finite automata, NFA to DFA Conversion, Regular languages and their relationship with finite automata, Pumping lemma and closure properties of regular languages. Context free languages: Context free grammars, parse trees, ambiguities in grammars and languages, Pushdown automata (Deterministic and Non-deterministic), Pumping Lemma, Properties of context free languages, normal forms. Turing Macines and Models of Computations: RAM, Turing Machine as a model of computation, Universal Turing Machine, Language acceptability, decidability, halting problem, Recursively enumerable and recursive languages, unsolvability problems. Recommended Books: 1. Daniel I. A. Cohen, Introduction to computer theory – John Wiley (1996 2nd Edition). 2. Lewis & Papadimitriou, Elements of the theory of computation – II Edition PHI 1997. 3. Hoperoft, Aho, Ullman, Introduction to Automata theory, Language & Computation –3rd Edition 2006, Pearson Education. 4. P. Linz, An Introduction to Formal Language and Automata 4th edition Publication Jones Bartlett 2006 CSHT 512 Microprocessors (60 Lectures) Microprocessor architecture: Internal architecture, system bus architecture, memory and I/O interfaces. Microprocessor programming: Register Organization, instruction formats, assembly language programming. Interfacing: Memory address decoding, cache memory and cache controllers, I/O interface, keyboard, display, timer, interrupt controller, DMA controller, video controllers, communication interfaces. Recommended Books: 1. Barry B. Brey : The Intel Microprocessors : Architecture, Programming and Interfacing. Pearson Education, Sixth Edition. 2. Walter A Triebel, Avtar Singh; The 8088 and 8086 Microprocessors Programming, Interfacing, Software, Hardware, and Applications. PHI, Fourth Edition 2005. CSHT 513 Internet Technologies (60 Lectures) JavaScript: Data types, operators, functions, control structures, events and event handling. Java: Use of Objects, Array and ArrayList class , Designing classes, Inheritance, Input/Output, Exception Handling. JDBC: JDBC Fundamentals, Establishing Connectivity and working with connection interface, Working with statements, Creating and Executing SQL Statements, Working with Result Set Objects. JSP: Introduction to JavaServer Pages, HTTP and Servlet Basics, The Problem with Servlets, The Anatomy of a JSP Page, JSP Processing, JSP Application Design with MVC, Setting Up the JSP Environment, Implicit JSP Objects, Conditional Processing, Displaying Values, Using an expression to Set an Attribute, Declaring Variables and Methods, Error Handling and Debugging, Sharing Data Between JSP Pages, Requests, and Users, Database Access. Java Beans: Java Beans Fundamentals, JAR files, Introspection, Developing a simple Bean, Connecting to DB Recommended Books: 1. Web Enabled Commercial Application Development Using Html, Dhtml,javascript, Perl Cgi By Ivan Bayross, BPB Publications, 2009. 2. BIG Java Cay Horstmann, Wiley Publication , 3rd Edition. , 2009 3. Java 7 ,The Complete Reference, Herbert Schildt, 8th Edition, 2009. 4. The Complete Reference J2EE, TMH, Jim Keogh, 2002. 5. Java Server Pages, Hans Bergsten, Third Edition, O'Reilly Media December 2003. CSHT 614 Computer Graphics (60 Lectures) Introduction to Graphics systems, Basic elements of Computer graphics, Applications of computer graphics. Graphics Hardware: Architecture of Raster and Random scan display devices, input/output devices. Fundamental Techniques in Graphics: Raster scan line, circle and ellipse drawing, thick primitives, Polygon filling, line and polygon clipping algorithms, 2D and 3D Geometric Transformations, 2D and 3D Viewing Transformations (Projections- Parallel and Perspective), Vanishing points. Geometric Modeling: Representing curves & Surfaces. Visible Surface determination: Hidden surface elimination. Surface rendering: Illumination and shading models. Basic color models and Computer Animation. Books Recommended: 1. J. D. Foley, A. Van Dan, Feiner, Hughes Computer Graphics Principles & Practice 2nd edition Publication Addison Wesley 1990. 2. D. Hearn, Baker: Computer Graphics, Prentice Hall of India 2008. 3. D. F. Rogers Procedural Elements for Computer Graphics, McGraw Hill 1997. 4. D. F. Rogers, Adams Mathematical Elements for Computer Graphics, McGraw Hill 2nd edition 1989. CSHT 615 Information Security (60 Lectures) Introduction: Security, Attacks, Computer Criminals, Security Services, Security Mechanisms. Cryptography: Substitution ciphers, Transpositions Cipher, Confusion, diffusion, Symmetric, Asymmetric Encryption. DES Modes of DES. ,Uses of Encryption. ,Hash function,key exchange, digital signatures,Digital Certificates. Program Security: Secure programs,Non malicious Program errors, Malicious codes virus,trap doors,salami attacks, covert channels,Control against program Threats. Protection in OS: Memory and Address Protection, Access control, File Protection, User Authentication. Database Security: Requirements, Reliability, Integrity, Sensitive data, Inference, Multilevel Security. Security in Networks: Threats in Networks s Networks security Controls, detection systems, Secure e-mails firewalls, Intusion Administrating Security: Security Planning, Risk Analysis, Organisational Security Policy, Physical Security. Ethical issues in Security: Protecting Programs and data. Information and law. Recommended Books: 1. C. P. Pfleeger, S. L. Pfleeger; Security in Computing, Prentice Hall of India, 2006 2. W. Stallings ; Network Security Essentials: Applications and Standards, 4/E, 2010 CSHT 616 (i) Foundations of Software Testing Fundamentals of testing: Need for testing, process, The psychology of testing General testing principles, Fundamental test Testing throughout the software life cycle: Software development models, Test levels (Unit, Integration, System Acceptance testing), Test types (functional, non-functional, regression testing), Maintenance testing Static techniques: Static techniques and the test process, Review process (types of review, roles and responsibilities), Test design techniques: The Test Development Process, Categories of test design techniques, Specification-based or black-box techniques (Equivalence partitioning, Boundary value analysis, Decision table testing, State transition testing, Use case testing), Structure-based or white-box techniques (Statement testing and coverage, Decision testing and coverage, other structure-based techniques), Experience-based techniques, Choosing test techniques Test management: Test organization (test leader, tester), Test planning and estimation ( Test planning, Test planning activities, Exit criteria, Test estimation, Test approaches), Test progress monitoring and control (Test progress monitoring, test reporting, test control), Configuration management, Risk and testing (Project risks, Product risks), Incident management Web Application Testing Foundation: Basic test planning and testing methods for web applications, Introduction to gray-box testing and its application to testing web applications, Outline knowledge, methods and tools for testing web applications, Introduction to web testing tools and sources, Introduction to research tools on the Net. Tool support for testing: Types of test tool, Test tool classification, Tool support for management of testing and tests, static testing, test specification, test execution and logging, performance and monitoring, specific application areas, using other tools, Effective use of tools: potential benefits and risks Recommended Books: 1. 2. 3. 4. 5. Boris Beizer, â€Å"Software Testing Techniques†, Van Nostrand Reinhold Louise Tamres, â€Å"Software Testing†, Pearson Education Paul Jogerson, â€Å"Software Testing† CRC Press Roger R Pressman, â€Å"Software Engineering – A Practitioner’s approach† Mc Graw Hill Testing Applications on the Web, 2nd Edition by Nguyen, Michael Hackett, and Bob Johnson (Wiley, 2003 CSHT 616 (ii) ARTIFICIAL INTELLIGENCE Introduction: (60 Lectures) Introduction to Artificial Intelligence, Background and Applications, Turing Test and Rational Agent approaches to AI, Introduction to Intelligent Agents, their structure, be havior and environment. Problem Solving and Searching Techniques: Problem Characteristics, Production Systems, Control Strategies, Breadth First Search, Depth First Search, Hill climbing and its Variations, Heuristics Search Techniques: Best First Search, A* algorithm, Constraint Satisfaction Problem, Means-End Analysis, Introduction to Game Playing, Min-Max and Alpha-Beta pruning algorithms. Knowledge Representation: Introduction to First Order Predicate Logic, Resolution Principle, Unification, Semantic Nets, Conceptual Dependencies, Frames, and Scripts, Production Rules, Conceptual Graphs. Programming in Logic (PROLOG). Dealing with Uncertainty and Inconsistencies: Truth Maintenance System, Default Reasoning, Probabilistic Reasoning, Bayesian Probabilistic Inference, Possible World Representations. Understanding Natural Languages: Parsing Techniques, Context-Free and Transformational Grammars, Recursive and Augmented Transition Nets. BOOKS RECOMMENDED: 1. 2. DAN. W. Patterson, Introduction to A. I and Expert Systems – PHI, 2007. Russell & Norvig, Artificial Intelligence-A Modern Approach, LPE, Pearson Prentice Hall, 2nd edition, 2005. Rich & Knight, Artificial Intelligence – Tata McGraw Hill, 2nd edition, 1991. W. F. Clocksin and Mellish, Programming in PROLOG, Narosa Publishing House, 3rd edition, 2001. 5. Ivan Bratko, Prolog Programming for Artificial Intelligence, Addison-Wesley, Pearson Education, 3rd edition, 2000. 3. 4. CSHT 616 (iii) Network Programming and Administration Transport Layer Protocols: TCP, UDP, SCTP protocol. Socket Programming: Socket Introduction; TCP Sockets; TCP Client/Server Example ; signal handling; I/O multiplexing using sockets; Socket Options; UDP Sockets; UDP client server example; Address lookup using sockets. Network Applications: Remote logging; Email; WWWW and HTTP. LAN administration: Linux and TCP/IP networking: Network Management and Debugging. Books recommended: 1. W. Richard Stevens, Bill Fenner, Andrew M. Rudoff, Unix Network Programming, The sockets Networking API, Vol. 1, 3rd Edition, PHI. 2. B. A. Forouzan: Data Communications and Networking, Fourth edition, THM Publishing Company Ltd. 3. Nemeth Synder & Hein, Linux Administration Handbook, Pearson Education, 2nd Edition 4. R. Stevens, Unix Network Programming, PHI 2nd Edition CSHT 616 (iv) Data Mining Overview: Predictive and descriptive data mining techniques, supervised and unsupervised learning techniques, process of knowledge discovery in databases, pre-processing methods Data Mining Techniques: Association Rule Mining, classification and regression techniques, clustering, Scalability and data management issues in data mining algorithms, measures of interestingness Books Recommended: 1. Introduction to Data Mining, Pang-Ning Tan, Michael Steinbach, Vipin Kumar, Pearson Education. 2. Data Mining: A Tutorial Based Primer, Richard Roiger, Michael Geatz, Information; Pearson Education 2003. 3. Introduction to Data Mining with Case Studies, G. K. Gupta, PHI,2006. 4. Insight Into Data Mining: Theory And Practice, Soman K P,Diwakar Shyam, Ajay V, PHI, 2006 CSHT 616 (v) Combinatorial Optimization Introduction: Optimization problems, neighborhoods, local and global optima, convex sets and functions, simplex method, degeneracy; duality and dual algorithm, computational considerations for the simplex and dual simplex algorithms-Dantzig-Wolfe algorithms. Integer Linear Programming: Cutting plane algorithms, branch and bound technique. Graph Algorithms: Primal-Dual algorithm and its application to shortest path, Math-flow problems Dijkstra’s algorithm, Max-flow problem, matching problem, bipartite matching algorithm, non-bipartite matching algorithms. Books recommended: 1. C. H. Papadimitriou and K. Steiglitz, Combinatorial Optimization: Algorithms and complexity, Prentice-Hall of India, 2006 2. K. Lange, Optimization, Springer, 2004 3. Mokhtar S. Bazaraa, John J. Jarvis and Hanif D. Sherali, Linear Programming and Network Flows, John Wiley & Sons, 2004 4. H. A. Taha, Operations Research: An Introduction (8th Edition), Prentice Hall, 2006 Unknown Life is an experience that comes along with failure. Have you ever had the feeling like you haven't done your best at something or the feeling that you're disappointing the people you care about most? Well Eve had that feeling multiple times especially in middle school. In middle school Eve experience lots of failure; failure with friendships, relationships, and rejection. Failure to me is being unhappy with yourself and not doing what you believe in.My 8th grade year in middle school was a earning experience that came along with lots of failure. The beginning of 8th grade was the easiest part of middle school because there was no drama and less friends. As time went by I gained more friends and more pressure was put on my shoulders. I learned a lot about friendships and the meaning of them. Losing the friends that meant the most to me is one of my failures and something that was challenging. Friendships from the past have a huge impact on the friendships that Eve made today.In middl e school I was always open to meeting new people and starting new reined friendships with anyone but now I realize that I can't do that without getting to know the person first. During my years in high school Eve been more selective with how I choose my friends. Eve learned that in order to trust someone in full and to consider them a good friend, I would have to get to know that person first. Throughout my high school experience Eve gained many friends and learned to trust them. Whenever I had a problem, I would turn to them for advice. Their advice always helped me through my problems and anything else I needed.Throughout my experience in high school and middle school, Eve learned a lot about friendship and values. Eve been making better decisions for myself and how I have been choosing my friends. How I chose my friends will help me in college because Eve had experience with good friends and bad friends. My experience with friends at school is teaching me so much about life. Midd le school and high school has helped me with better decision making when choosing friends. I will use this decision making in college to help me build new friendships.

Friday, January 3, 2020

Organizational Behavior Around The World Japan - 1087 Words

Organizational Behavior around the World: Japan Jonathan Andrew Hughett East Tennessee State University Organizational Behavior around the World: Japan If one is to study organizational behavior among all nations in the world, he or she would find some similarities and many differences between countries and cultures. While it is relatively easy for an American to understand American organizational behavior, it may be difficult to understand other cultures and business norms. Japan shares some similarities to America in the business environment, but there are some key differences between the two. American organizational structure cannot be used to perfectly fit in Japanese companies, nor can Japanese management styles be imposed on†¦show more content†¦If there is a major mistake to take place, the manager is the one who often takes the blame. Likewise, if the department does well during a particular quarter or performs well on a major project, the manager will most likely receive most of the praise (Japanese American Management Styles., n.d.). Japanese Leadership Japanese leadership differs from the United States mostly because it is more of a collectivistic society than the United States. While more individualistic than other Asian countries, Japanese businesses often show characteristics of collectivism when compared to their American counter-parts. They tend to be very loyal to their company, and managers work very closely with their employees to get goals accomplished. Employees are invited to be involved with the decision making process and are expected to help improve the company in any way they can. Unlike the United States, Japanese managers are more likely to have faith in their subordinates to take initiative and lead themselves. Each member of a group is expected to pull their weight and contribute to help meet deadlines. Therefore, the group is likely to get rewarded or punished based on performance, rather than a single individual. Mangers from other nations running companies in Japan should be made aware of the collectivi sm the employees will most likely have in order to limit conflict in interests (What about Japan?, n.d.) BusinessShow MoreRelatedThe Damage to Toyotas Brand Image Essay1610 Words   |  7 Pagesautomaker Toyota was faced with one of the biggest threats to its brand, the safety of its vehicles. Toyota failed miserably in its response to the safety issues due to a few major management issues. 1. Group think 2. Lack of leadership 3. An organizational structure that could not offer quick response 4. A flawed evaluation and control process These issues led to Toyota losing much of its brand equity as a leader in safety. According to an article in Time Magazine from February 2010, the automakerRead MoreCulture Metaphor - Morgan G.19861442 Words   |  6 PagesLinh Nguyen – 1149482 AFM Assignment 2 One of the major strengths of the culture metaphor rests in the fact that it directs attention to the symbolic significance of even the most rational parts of organizational life ( Morgan, G. 1986) Discuss the issues raised in the quotation above, and comment on: †¢ †¢ †¢ the effects of organization culture on the design of organization structure; the effects of national culture on organization culture; and the ways in which power exists in different organizationRead MoreEssay about Ethics in International Business1657 Words   |  7 Pagesï » ¿ Ethics in International Business Abstract International business ethics challenges the corporate world to deal with questions of what to do in situations where ethical standards come into conflict as a result of the different cultural practices in the nation. Since, there is this dilemma that has progressively troubled the large multinational corporations, international business ethics has arisen to help address these adhesive subject matters. There are several international businessRead MoreThe Business Management Academic Discipline1216 Words   |  5 Pagesteaching case will be focused within the business management academic discipline. Teaching Topic Area The teaching case will be concentrated in the area of organizational behavior and will examine the employee interactions with the company’s business environment. It will address the organizational change component within the organizational development (OD). More specifically, it will evaluate this construct from the context of a proactive component. Class / Target Audience The teaching case willRead MoreCultural Differences Are Nuisance At Best And Often A Disaster1544 Words   |  7 Pagesperformed a comprehensive study of how values in the workplace are influenced by culture. In the 1970’s, as a Dutch researcher Dr. Geert Hofstede, collected and analyzed data from 116,000 surveys taken from IBM employees in forty different countries around the world. From those results, Hofstede developed a model that identifies four primary dimensions of differentiate cultures. These include: Uncertainty Avoidance (UA), Masculinity-Femininity (MAS), Individualism-Collectivism (IND), Power and DistanceRead MoreA Guide For Conducting Business Essay1687 Words   |  7 PagesBusiness in Japan Abstract This paper analyses the various aspects of Japanese culture. It describes the differences and distinctiveness of Japanese culture. The main objective of this paper is to understand how Japanese conduct their business. Then the culture of Japan is analyzed according to the models suggested by Edward Hall, Hofstede.In the end there is a cultural profile which guides an American while dealing with Japanese during any business. Due to the technical advancement in Japan many countriesRead MoreToyota Case Study : Toyota Company1309 Words   |  6 PagesToyota is one of the largest manufacturers of cars in the world, with scores of factories in dozens of countries. Its standing in the automotive world as the most successful and most profitable carmaker is unquestioned. The historical background of Toyota began in 1933 with the organization being a division of Toyoda Automatic Loom Works gave to the creation of autos under the heading of the organizer s child, Kiichiro Toyoda. Kiichiro Toyo da had flown out to Europe and the United States in 1929Read MoreHonda Company Business Plan1689 Words   |  7 Pagesspent Six years as an apprentice in Tokyo Service Station. In 1931 after opening his own repair shop he received a patent from for metal spokes that replaced wood in wheels. In1937 Honda started a piston ring Company and during 2nd world war because of the bombing in Japan and earthquakes most of his factories and manufacturing units were destroyed. In 1946 Honda began motorizing bicycles and later with the help of popularity in bicycles they began making engines and the company soon started it journeyRead MoreAlcohol Is The World’S Fifth Leading Risk Factor For Social1135 Words   |  5 PagesAlcohol is the world’s fifth leading risk factor for social and public health problems around the world[1, 2]ï ¼â€º however, alcohol drinking has still been intensively increasing among adolescents[3, 4]. Drinking habits are highly socially modeled, while socia l relationships influence an individual s drinking at all ages. The social pressured by family, friends, and acquaintances can motivate either drink more or less[5]. It is worth noting that almost every event of the daily lives is marked with someRead MoreMultinational Companies : An Organization Essay1536 Words   |  7 PagesIntroduction Multinational companies are playing something new and introduced a new role in local and globalization, thus, the rising numbers to achieve and strive from emerging companies in world market. It also defines to accomplish goals in organisational, local, and international management, thus, to be able to success the weakness and strength of the company must recognize to determine their capabilities before the management can proceed to international. It is very important for the multinational