Documente Academic
Documente Profesional
Documente Cultură
ESC101
April 6, 2018
Mid-Sem Lab Exam: Date and Time
• Lab end sem on April 8 (Sunday)
Lab Sections Time
CC-02 A9, A10, A11 9:00 am – 12:00 am
CC-01 A7 9:00 am – 12:00 am
CC-03 A8 9:00 am – 12:00 am
Maths Lab (NCL) A12, A13 9:00 am – 12:00 am
printf("\n");
return 0;
}
Operator Precedence
Operators Description Associativity
( ) [] -> . Left to Right
(unary)- ++ -- ! ~ Unary plus/minus etc., logical Not Right to left
(type) * & sizeof
HIGH */% Multiply, divide, remainder Left to right
+- Add, subtract Left to right
I
N
C >> << Shift Operators Left to right
R
E
A < > >= <= Relational operators Left to right
S
I
N
== != Equal, not equal Left to right
G
& Bitwise and Left to right
^ Bitwise xor Left to right
| Bitwise or Left to right
&& And Left to right
LOW
|| Or Left to right
?: Conditional Right to left
= += -= &= |=
4/18/2018 Assignment 26 Right
Esc101,to left
Programming
Shell Programming
• A shell program (sometimes called a shell
script) is a text file that contains standard
UNIX and shell commands.
#include<stdio.h>
#include<stdlib.h>
int main(int argc, char *argv[]){ prog2.c
return atoi(argv[1]) * 5;
}
Shell Program Example
#!/bin/sh
# This is a comment!
Output: 20
Running a shell script
$ vi run.sh
$ Chmod +x run.sh
$ ./run.sh
20
The Story has just Started
• Systems
– Operating system
– Networks
– Software design
– Security
• Theory
– Algorithms
– Complexity
• Applications
– Data mining
– Machine learning
– Computational science
– Game design
Apr-18 Esc101,FileIO 31
Operating Systems
• What does an OS do?
– Talk to devices
– Controls programs
– Manages data access
– Manages resource access
– Manages network communication
• Linux kernel written in C
– You can create your own OS by adding kernel modules
to pre-existing base OS
• Try it on a PC you don’t mind wrecking!
Security
• Reading from and writing to unknown parties
is risky
• Particularly when information is financial
• Have to secure access
• This is a job for cryptography
• Basic idea is to encrypt message such that
only entities that should be receiving the
information can decrypt
Theory
• Algorithm design tries to address issues of
efficiency and scale
• We will see some examples, such as in merge-
sort and quick-sort
• Vast area, with massive multiplier influence
Data analysis
Working with Data
• When we know what we’re looking for
– Data analysis
– Targeted, high quality data
– Domain knowledge matters
• When we don’t know what we’re looking for
– Data mining
– Exploratory, data quality unknown
– Algorithmic prowess and skill matters
Machine Learning
• Subset of data mining
• Basic idea is to
– Get algorithms to find things that look like other
things we show them
– Get algorithms to categorize things automatically
• Lots of very well-developed code libraries pre-
exist
– Weka
– Matlab ML toolbox
– Scikit-learn library in python
• You want to know python
Possibilities are Wide Open
• Have fun writing code the rest of your time
here and beyond
• Don’t hesitate to talk to any of the CSE faculty
– It would help if you know what you want to talk
about
• Be bold in coming up with ideas
– Worst case scenario: it won’t work
– Your next idea will be a better one, guaranteed
Remaining Classes
Lectures on Sorting
• Prof. Purushottam kar (Faculty Tutor)
Assistant Professor
Department of CSE
• Prutor
• Gradescope
• Piazza
• Slides
– From former instructors, Profs Nisheeth
Srivastava, Rajat Mittal, Nitin Saxena, Sunil Simon,
Vinay Nambudoori, Amey Karkare and others
Apr-18 Esc101,FileIO 45
Team
• Faculty Tutor Prof. Purushottam Kar
• 45 TAs
• 18 Tutors
• Lab staffs
• Hrishikesh
• Shubhangi
• Umair
Apr-18 Esc101,FileIO 48
Course Feedback
• OARS section will send you a link to the course
feedback form
• You will be able to give feedback about the
course, the instructor and the tutors
• Please do
Have fun writing code for the rest of your time
here and beyond…