WORKSHOP ON BIG DATA ANALYTICS
A workshop/training session is being organized on the following topics by
IEEE STUDENT BRANCH:
1. Big Data & Hadoop with Spark.
2. Machine Learning with Tensor flow.
3. Artificial Neural Networks.
4. Artificial Intel
Random Network Model
Significance of Modeling hypothetical creation of a simple
representation of a complex network
Model enables to derive properties
used to predict outcomes under certain constraints
appropriate analysis of proposed mode
Introduction to the IoT
2010 Gartner IT Hype Cycle
for Emerging Technologies
The IoT Hype (2015)
The IoT Concept
Yes, an actual cupcake
ATM that Davis called a
Random Networks where number of nodes increase dynamically with
respect to time, i.e. network grow
Scientific Networks Young researchers possess smaller collaborations
Citation Network Newa
Notice of Invited Talk
Mr. Saurabh Kumar Singh, Advocate, Delhi High Court, New Delhi would be delivering a
talk on Careers in Cyber Law at 11:00 am on 4th March, 2017 in FF-6, JIIT, Noida-62.
Summary of the Talk:
Awareness of IT Act -2000
Dear Mr Rohatgi,
It was great connecting with you this afternoon. As discussed, TechGig Code Gladiators, Indias biggest coding
contest is going on. With over 5,000 prizes worth a whopping Rs 3 Crores and the title of Best Coder of India at
bet, we are sur
' Student mine. I I: Enrollment No.:
' Jaypee Institute of Infarmation Technology, Noida
QDDSEMESTER 2013 p C S E,
Course Code: 1031101511 4 t 5 '1'" Pl iii! "0'"? . Duration: 1m-
Course Name: Operating System I 'i Max Marks: 20
01 Marks] .Assume that t
ji'tisimplttiedi.umi I cfw_r l/ D] (1, at) Of/ lief
Name: _ : Roll NOW
Jaypec Institute of Information Technoiogy
T2 Exam, Oetoher 2013 W 5 CSE
Q ' . 3 . . .
abject. Them; of Computation lll' F Subject Code: 1031 1C1513
Max Durationz'l Hour LIJ I EQIM
[j fitsimplified .eevn LESINEXdMIS UFM [Jiitsimpilied .wm
i ' =_ T?) Enrollment No.
J aypee Institute of Information Technology, Noida
End Semester Examination, December 2013
B.Tech CSE V Semester
Course Title : Theory Of Computation
M ' ' :
What constitutes good marketing
What are good metrics for measuring
How can marketers assess their return
on investment of mar
JOB DESIGN AND QUALITY OF
Explain what is meant by job analysis and job design.
Understand the uses of job analysis.
Describe the content of a job description and a job
Discuss the collection of job
What are the components of a modern
marketing information system?
What are useful internal records?
What is involved in a marketing
Partnering to Build
Understand company-wide strategic
planning and its four steps.
Learn how to design business
portfolios and develop strategies for
growth and downsizing.
Class & Objects
C+ offers another user-defined data type known
class which is the most important feature of the
A class can declare and define both data and
functions that are hidden from the external use.
The binding of da
Inheritance is the process of creating new classes
from the existing class or classes.
Using inheritance, one can create general class
that defines traits common to a set of related
items. This class can then be inherited (reused)
by the oth
Polymorphism, Virtual Functions
It was discussed earlier that polymorphism is
the property of giving different meanings to the
The overloading of functions and operators have
been described in details, in the previous slides.
This type of p
The first line of the program
tells the compiler to add the source file iostream.h to the
programs source file.
It contains the declarations that are needed by the cout, cin
identifiers and the < , > operator
Object Oriented Programming:
The term object-oriented means that we
organize software as a collection of discrete
objects that incorporate both data structure and
This is in contrast to conventional
programming in which a data structure and
Suppose we want to perform the
combined multiply and add
operations with a stream of
A i * Bi + C i
for i =1,2,3,7
The suboperations performed in
each segment of the pipeline are
R1 Ai, R2 Bi
R3 R1 * R2
Pipeline and Vector
Dr. Bernard Chen Ph.D.
University of Central Arkansas
A parallel processing system is able to perform
concurrent data processing to achieve faster
The system may have
Data security means protecting our database from unwanted actions of the users that do not
have access or wants to steal the information contained in our database. Today we need to
have secure and private networks for sending our information. The network