University of Cincinnati Logo
 

CS-110 - Introduction to Computer Science
School of Computing Sciences and Informatics

Lecture Notes
   
    Topic Section 001
Essence of Computer Science
    What is Computer Science?   23 Sep   
    Creativity: what, why, how   23 Sep   
    Matlab exercises   23,28 Sep   
 
Introduction to Matlab
    Matlab Primer   28 Sep   - numbers, strings, vectors, matrices
    Square Root   28 Sep   - an ancient algorithm
    Discussion   28 Sep   - why does the above work?
    Cube Root   28 Sep   - cube root algorithm
    Pi   28 Sep   - calculate π accurately
    Others   28 Sep   - additional problems to iterate
    Draw a circle   30 Sep   - use sin and cos to draw a circle
 
Puzzles
    Odd sum   30 Sep   
    Powers of 7   30 Sep   
    Chicken and egg   30 Sep   
    Lies like a dog   30 Sep   
    Glass rearrangement   30 Sep   
    Three months   30 Sep   
    Barn suicide   30 Sep   
    Pencil prices   30 Sep   
    Double doors   30 Sep   
    Double doors II   30 Sep   
    Marble drop   30 Sep   
    Morning pills   30 Sep   
    Hole in the sphere   30 Sep   
    Track   30 Sep   
    Dashing courtier   30 Sep   
    Numbers   30 Sep   
    Binary numbers   30 Sep   
    Newspaper Headlines   30 Sep   
 
Representation of Numbers and Characters as Numbers
    Byte Representations I      5 Oct   - what is binary and hexadecimal
    Byte Representations II   5 Oct   - binary, hex, character, decimal
    Arithmetic Operations I     5 Oct   - integer arith, 2s complement rep
    Arithmetic Operations II     5 Oct   - floating point rep and ops
    Bitwise Logic Operations     5 Oct   - and, or, xor, negation, shift left/right
 
Algorithms for Nearly Real Problems
    Find largest number in a list   7,12 Oct
    Find largest number in a matrix   7,12 Oct
    Find best rational approximation for π   7,12 Oct   
    Search for a stored data item   7,12 Oct   
    Red-Black Tree   7,12 Oct   
    Minimum Cost Network   7,12 Oct   
    Shortest Path   7,12 Oct   Conceptual Solution
    Topological Sort   7,12 Oct   Discussion     Build Sort
 
Message Encryption
    XOR three numbers   14,19 Oct   - an important crypto operation
    Simple XOR-based cryptography   14,19 Oct   - a weak approach to cryptography
    Brute force attack on XOR cipher   14,19 Oct   - what to do?
    Double lock protocol   14,19 Oct   -
    Cracking the double lock protocol   14,19 Oct   -
    A more secure version of DLP   14,19 Oct   -
    RSA: public key encryption   14,19 Oct   -
    Simple hash function   14,19 Oct   -
    Random Number Generator   14,19 Oct   -
    Karn: secret key encryption   14,19 Oct   -
 
Ethics and Morals
    Index   26 Oct   
 
Statistics
    Discussion   2 Nov   
    Parkinsons disease   2 Nov   
 
Java experiments
    Index   23 Nov   
 
Internet Applications
    Instant Messenger   --   
    Get the weather   --   
    Find open ports   --   
    Web Server   --   
    Simple client and server   --   
    Game of checkers   --   
    MP3 Player   --   
 
Graphics Applications
    A Cannon   --
    Colors   --
    Simple calculator   --
    Moving dots   --
    Banging balls   --
    Billiards   --
    Racing dots   --
    Blackjack   --
    Sudoku solver   --
ERC
MainStreet
Paul Erdos
NIT
Ladies on Campus
Oscar Robinson