King Hussein School for Information Technology
Department of Computer Science
Operating Systems Lab CS11355
Spring Semester 2016-2017
Lab Assignment #8
Student Name
Student Univ. ID
Total Mark
/ 10
Lab Exercises
In this hands-on project, you will practice
King Hussein School for Information Technology
Department of Computer Science
Operating Systems Lab CS11355
Spring Semester 2016-2017
Lab Assignment #7
Student Name
Student Univ. ID
Total Mark
/ 10
Lab Exercises
In this hands-on project, you will practice
King Hussein School for Information Technology
Department of Computer Science
Operating Systems Lab CS11355
Spring Semester 2016-2017
Lab Assignment #6
Student Name
Student Univ. ID
Total Mark
/ 10
Lab Exercises
In this hands-on project, you will practice
King Hussein School for Information Technology
Department of Computer Science
Operating Systems Lab CS11355
Spring Semester 2016-2017
Lab Assignment # 3
Student Name
Student Univ. ID
Total Mark
/ 10
Lab Objectives
In this hands-on project, you will practi
King Hussein School for Information Technology
Department of Computer Science
Operating Systems Lab CS11355
Fall Semester 2016-2017
Lab Assignment #4
Student Name
Student Univ. ID
Total Mark
/ 10
Lab Exercises
In this hands-on project, you will practice:
King Hussein School for Information Technology
Department of Computer Science
Operating Systems Lab CS11355
Spring Semester 2016-2017
Lab Assignment # 1
Student Name
Student Univ. ID
Total Mark
/ 10
Lab Objectives
Opening the Terminal
Using the Basic Linu
Cryptography and
Network Security
Public-Key Cryptography
Prime Numbers
prime numbers only have divisors of 1 and self
they cannot be written as a product of other numbers
note: 1 is prime, but is generally not of interest
eg. 2,3,5,7 are prime, 4,6,8,9,1
Cryptography and
Network Security
Sixth Edition
by William Stallings
Chapter 4
Block Ciphers and the Data
Encryption Standard
Stream Cipher
Encrypts a digital data
stream one bit or one byte
at a time
Examples:
Autokeyed Vigenre cipher
Vernam cipher
In th
Cryptography and
Network Security
Key Management; Other
Public Key Cryptosystems
Key Management
Public-key
encryption helps address key
distribution problems
Have two aspects of this:
distribution of public keys
use of public-key encryption to distribut
Cryptography and
Network Security
Message Authentication
and Hash Functions
Message Authentication
Message authentication is concerned with:
protecting the integrity of a message
validating identity of originator
non-repudiation of origin (dispute resolut
BIG
Da
Ta
Hadoop
Dr. Akram Alkouz
Princess Sumaya University for Technology
The Next Frontier for Innovation, Competition and Productivity
What is Hadoop
Terminology Review
Hadoop Architecture
HDFS
MapReduce
Type of Nodes
Topology awareness
Writin
BIG
Da
Ta
Querying data
Dr. Akram Alkouz
Princess Sumaya University for Technology
The Next Frontier for Innovation, Competition and Productivity
Overview
Pig
Hive
Jaql
The Next Frontier for Innovation, Competition and Productivity
Similarities of Pig, H
BigInsights Text Analytics Tutorial
Fred Reiss, Laura Chiticariu, Yunyao Li
IBM Research - Almaden
[email protected][email protected][email protected]
2013 IBM Corporation
Road Map
re
e
h
e
r
ua
o
Y
2
What is Information Extraction?
Applications
A
BIG
Da
Ta
Introduction
Dr. Akram Alkouz
Princess Sumaya University for Technology
The Next Frontier for Innovation, Competition and Productivity
The Next Frontier for Innovation, Competition and Productivity
The Next Frontier for Innovation, Competition a
BigInsights Text Analytics Tutorial
Fred Reiss, Laura Chiticariu, Yunyao Li
IBM Research - Almaden
[email protected][email protected][email protected]
2013 IBM Corporation
Road Map
re
e
h
e
r
ua
o
Y
2
What is Information Extraction?
Applications
A
BIG
Da
Ta
Big Table (Hbase)
Dr. Akram Alkouz
Princess Sumaya University for Technology
The Next Frontier for Innovation, Competition and Productivity
Introduction
Data Model
Architecture
Access
The Next Frontier for Innovation, Competition and Productivit
CMPS 101
Abstract Data Types
Winter 2003
Programming Assignment 3
Breadth First Search and Shortest Paths in Graphs
Due Thursday February 6, 12:00 midnight
The purpose of this assignment is to implement a Graph ADT and associated algorithms in java. You w
Design and Analysis Algorithm
Lecture 4
Recurrent Algorithms
BINARY SEARCH
for an ordered array A, finds if x is in the array A[lohi]
Alg.: BINARY-SEARCH (A, lo, hi, x)
1
2
3
if (lo > hi)
2 3 5
return FALSE
mid (lo+hi)/2
lo
if x = A[mid]
return TRUE
if (
Design and Analysis of Algorithms
Lecture 2
Algorithm Analysis
The amount of resources used by the algorithm
Space
Computational time
Running time:
The number of primitive operations (steps) executed
before termination
Order of growth
The leading t
Design and Analysis of Algorithms
Fall 2016
Introduction
Lecture 1
Course details
This course is designed for third year undergraduate
students at Princess Sumaya University for Technology
University.
Course Title: Design and Analysis of Algorithms
Course
Design and Analysis of Algorithms
Lecture 7
Insertion Sort
Idea: like sorting a hand of playing cards
Start with an empty left hand and the cards facing
down on the table
Remove one card at a time from the table, and insert
it into the correct position
Design and Analysis
Algorithms
Lecture 10
Background on Trees
Def: Binary tree = structure composed of a finite set
of nodes that either:
Contains no nodes, or
Is composed of three disjoint sets of nodes: a root node, a
left subtree and a right subtree
SystemsAnalysis&Design
7thEdition
Chapter 11
PhaseDescription
Systems Operation, Support, and Security is
the final phase in the systems development
life cycle (SDLC)
You will be supporting a functioning
information system
You continuously will access
Design and Analysis Algorithms
Lecture 16
Properties of DFS
u = [v] DFS-VISIT(v) was
called during a search of us
adjacency list
u
v
1/
2/
w
3/
Vertex v is a descendant of vertex u
in the depth first forest v is
discovered during the time in which
u is
SystemsAnalysis&Design
7thEdition
Chapter 10
PhaseDescription
Systems Implementation is the fourth of five
phases in the systems development life cycle
(SDLC)
Includes application development, testing,
documentation, training, data conversion,
system ch
Design and Analysis Algorithms
Lecture 15
Graphs
Applications that involve not only a set of items, but also the
connections between them
Maps
Schedules
Hypertext
Computer networks
Circuits
Graphs - Background
Graphs = a set of nodes (vertices) with edge
A Gift of Fire
Fourth edition
edition
DR. Malik Qasaimeh
Chapter 2:
Privacy
Slides prepared by Cyndi Chie and Sarah Frye. Fourth edition revisions by Sharon Gray.
Facts
Who is the Attacker?
Why Attacks?
Profit and money.
Competitive advantage.
Retaliation
Design and Analysis Algorithm
Lecture 17
Minimum Spanning Trees
A connected, undirected graph:
Vertices = houses, Edges = roads
A weight w(u, v) on each edge (u, v) E
Find T E such that:
4
1. T connects all vertices
2. w(T) = (u,v)T w(u, v) is
minimized
Design and Analysis Algorithm
Presentation
Assembly Line Scheduling
Dynamic Programming
An algorithm design technique for optimization
problems (similar to divide and conquer)
Divide and conquer
Partition the problem into independent subproblems
Solve
Design and Analysis Algorithms
Presentation
Count Sort, Radix Sort, and Bucket Sort
How Fast Can We Sort?
Insertion sort, Bubble Sort, Selection Sort
Merge sort
(n2)
(nlgn)
Quicksort
(nlgn)
What is common to all these algorithms?
These algorithms sor