0% found this document useful (0 votes)
23 views

0.intro Overview

This document outlines cases of academic ethics violations that occurred in electrical engineering courses at KAIST, along with the sanctions imposed in each case. It shares 12 cases of homework plagiarism that resulted in department-level discipline and social service hours. There were also cases of unauthorized material distribution, aiding cheating, and examination violations, which were disciplined with warnings, social service, or suspensions depending on the offense. The document aims to promote academic integrity by sharing real examples of ethics violations and their consequences.
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views

0.intro Overview

This document outlines cases of academic ethics violations that occurred in electrical engineering courses at KAIST, along with the sanctions imposed in each case. It shares 12 cases of homework plagiarism that resulted in department-level discipline and social service hours. There were also cases of unauthorized material distribution, aiding cheating, and examination violations, which were disciplined with warnings, social service, or suspensions depending on the offense. The document aims to promote academic integrity by sharing real examples of ethics violations and their consequences.
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 37

EE 205: Lecture 1, Introduction

Data Structure and Algorithms


for Electrical Engineering

Yung Yi

1
Instructor

• Yung Yi ( 이융 )
• N1, 810
• http://lanada.kaist.ac.kr, [email protected]
 LANADA: LeArning in Networking: Algorithm, Design, and
Analysis
• Office Hours
 To be announced later

2
TAs

• 6 Excellent TAs

• Wan Ju Kang
• Joonki Hong
• Kyunghwan Son
• Jihwan Bang
• Taeyoung Lee
• Hoyong Choi

• They will be with us to help you.

3
Course Homepage
• KLMS
 http://klms.kaist.ac.kr/
 To download course materials
 To submit your assignments
 To check your score on each assignment

• Classum
 To ask questions about everything
 We will let you know the code that you can use later

4
Textbook
Goodrich and Tamassia,
Data structures and Algorithms in C++ (2 nd edition)

5
Grading
• 4 Programming Assignments
• In-class quiz and written homework assignments
• Midterm and final exams
• Class participation

• Grading portions (Strict)


 A(40%), B(30%), C(20%), D(10%), F …

6
Two Groups
• Group A
 Students
 Who take this course first time
 Who did not take any course on data structure in other departments
 Who took the data structure course in other departments, but its
grade is equal to and below `C-’
 Who took this course, but retakes it again
• Group B
 Other students

• Grading will be made in each group

7
Late Policy & Attendance Check
• All written assignments should be submitted at the
beginning of each class.
 Any work received after that time is given 0 credits.
• Programming Assignments
 Deducted x% for each day being late.
• Attendance check
 Mostly, at the beginning of each class
(taking photos for the attendance check)
 Often, in the middle of or at the end of each class

8
Programming Language and Platform
• C++ and Linux

• Video lectures about C++ in KLMS


 Please watch and study them as soon as possible

• Where to do programming
 Haedong Lounge, E3-4 #1412
 https://ee.kaist.ac.kr/en/node/15084?language=en
• IDs will be created

• Please finish registering the class as soon as possible


9
What You Should NOT Do

10
How to Communicate
• Most should be via Classum
 Technical questions about lectures, homework, and etc

• DO NOT
 Individually send emails to Prof. Yung Yi and TAs (or making calls or sending
Kakaotalk msgs) about the technical questions (course contents,
homework etc)
 All the questions need to be shared among the students

 DO NOT POST a chunk of source codes. TAs are not debuggers. We cannot
fix your bugs and we don't want to parse through your code to find the
bugs.

 But, you can send an email to Prof. Yung Yi for the things that need to be
individually discussed

11
12
13
Summary (This Class)
수업자료 공유정책 비고 *
가능여부 (o/x)
( 현 학기 중 공유 / 이후 학기 공유를 모두 포함 ) ( 수업 별 특수 정책이 있는 경우 명시 )

출제된 과제 및 과제풀이의 공유 및 배포
x Cannot give your homework to
someone later

제공된 강의 자료의 공유 및 배포 O
출제된 시험문제의 공유 및 배포 O

비고 *
이전 수업자료 참고정책 가능여부 (o/x)
( 수업 별 특수 정책이 있는 경우 명시 )

No internet materials,
과제 수행 시 이전 기출 과제 및 과제풀이 참조 X
Only discussion, discussion based
과제 수행 시 수강생 간의 토론 / 협업 O, X on the code copied to your com-
puter not allowed

시험 준비 시 , 이전 기출문제 자료 참조 O
14
Summary (This Class)

Policy for sharing teaching materials Permission


Note*
(Including present semester and after) (o/x)
Cannot give your homework to some-
Sharing/distributing set assignment and solution
x one later

Sharing/distributing provided lecture material O


Sharing/distributing questions from examinations O
Permission
Policy for reference (previous teaching materials) Note*
(o/x)
Previous assignment and solution for reference while carrying
out assignment X No internet materials
Only discussion, discussion based on
Discussion/cooperation between students while carrying out as-
signment O, X the code copied to your computer not
allowed

Questions from previous examinations for reference O

15
학업윤리 위반 사례 공유

위반행위 처분내용 발생 횟수 비고

학부 내 징계
과제물 표절 12
사회봉사 30 시간
허용되지 않은 자료 학부 내 징계
9
제공 및 전달 사회봉사 15 시간
부정행위 방조 및
경고 ( 경고메일 발송 ) 3
허용되지 않은 자료 단순 열람
학부 내 징계 튜터링 과정에서 튜티에게 부정행위를 권유 및
튜터의 윤리위반 2
사회봉사 30 시간 , 지원한 경우

유기정학 2 개월 , 전기및전자공학부 과목에서 발생한 부정행위


2
사회봉사활동 100 시간 EE 학생 윤리규정에 따라 처분 .
시험부정행위
학부 내 징계 타과 과목에서 발생한 부정행위 , 과목 담당
1
사회봉사 60 시간 교수가 학생 징계를 요청하지 않은 케이스

진상조사 / 면담 / 심의를 진행하였으나 ,


시험부정행위
- 1 제보내용 외 부정행위를 확정할 수 있는 근거가
( 익명제보 )
없어 처분하지 않음 .
Cases of Violation of Academic Ethics
Violation Sanction Number of Incidents Note
Individual sanction in the De-
Homework plagiarism partment, 12
30 hours of social service
Individual sanction in the De-
Delivering unauthorized materi-
partment, 9
als
15 hours of social service
Aiding a violation or simple
browsing through unauthorized Letter of warning (via email) 3
materials
Individual sanction in the De- Recommending and supporting an eth-
Ethical violation by a Tutor partment, 2 ical violation to the Tutee during Tutor-
30 hours of social service ing time.
Defined suspension of Violation during a course in EE. Sanc-
2 months, 2 tions imposed as noted in the EE Stu-
100 hours of social service dent Ethics Policy.
Violation during examinations
Individual sanction in the De- Violation during a course in another
partment, 1 Dept. Course professor did not request
60 hours of social service sanctions.
No sanction can be imposed.
Cause there’s no other actual evidence
Violation during examinations
- 1 except for the anonymous report, de-
(anonymous report)
spite investigation, interview and de-
liberation.
Recommendation
• If you are not clear about whether what you do is cheating
or not, please ask Prof. Yung Yi

• Basically,
 Don’t copy the code from the Internet
 Don’t store other people’s code in your storage
 Don’t discuss by looking at others’ code (even in the screen)
 Highly likely to share codes

• Remember
 Zero Tolerance!

18
Announcement: First In-class Test
• 30 mins Exam on Sep. 5th(Wed)

• About C++ lectures (the problems will be made mainly based


on my lecture notes)

• So, please watch and study them as soon as possible!

19
Announcement: First Programming Assignment
• Will be Announced on Aug. 29th

• Due on Sep. 19th

• Practice about C++ programming

• Not very difficult

20
Course Overview

21
Data Structures
Definitions
• Ways to organize and store data
 Data Storages
• Ways to access and manipulate the stored data.
 Methods to access storages

22
Example (adjacent states)

23
Problem
• Definition: adjacency: if two states share a boundary,
the two states are adjacent.

• Given a state X, print a state Z that is not adjacent to X,


but is adjacent to a state Y adjacent to X.
 for example,
 Input: North Carolina
 Output: Florida

24
Come up with Data Structures
• Suppose you have only the following information
 for each state x, the list of states that are adjacent to state x.
 for example,
 North Carolina : Georgia, south Carolina, Virginia, Tennessee.
• How are you going to store this adjacency information to solve
the problem efficiently?

25
Lessons
• Different data structures lead to different ways to solve a
given problem. (algorithms).
• Different algorithms may give different efficiency (space and
time).

26
Course outline
• First Topic: How to measure the efficiency of an
algorithm.
 Each data structure has a different use and

application. So we will also study….


 Applications (problems), algorithms.
 Their efficiency.

27
Course outline
• Data Structures
 Arrays
 Stacks, Queues
 List
 Priority queues
 Search Trees
 Graphs
 etc …

28
Stack
• A container of objects that are inserted and removed
according to the last-in-first-out (LIFO) principle.
• Only the last (the most recently inserted) object can be
removed.

29
Queue
• Differs from a stack in that its insertion and removal
follows the first-in-first-out (FIFO) principle.
• The element which has been in the queue the longest
may be removed.

30
List
• A collection of linearly arranged element (a linear order).
• Provides methods for accessing, inserting, and removing
arbitrary elements.
• Notion of position, before and after.

• Stacks and queues


are a restricted form
of a sequence.
• Example,
 A,B,C,D,E,F
 a_1, a_2, a_3,…

31
Tree
• A collection of objects arranged in a hierarchical fashion.
• E.g., organization of a corporation, a table of content, dos/unix
file systems, family tree.
• Notion of parents and children, root and leaves.

32
Priority queue
• An abstract type for storing a collection of prioritized
elements that supports arbitrary element insertion but
support removal of elements only in order of priority.
• Examples…..

33
Graphs
• Representing a way of connections or relationships between
pairs of objects.

34
Graphs
• Not only physical connectivity, but also logical relationship.

35
Algorithms and Applications
• Every computer software uses some collections of data
structures.
• We will study algorithms to efficiently solve problems using
various data structures.
• Proof techniques for correctness or efficiency.

36
Questions?

37

You might also like